STUDIES IN INTELLIGENCE [Vol. 4 No. 3, Summer 1960]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78-03921A000300290001-3
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
141
Document Creation Date:
December 16, 2016
Document Release Date:
January 27, 2005
Sequence Number:
1
Case Number:
Publication Date:
January 1, 1960
Content Type:
STUDY
File:
Attachment | Size |
---|---|
CIA-RDP78-03921A000300290001-3.pdf | 7.07 MB |
Body:
FILE #29
CONFIDENTIAL
STUDIES
n
INTEL LICEN
CE
106 N0..2$_Q,-J9.2LAq
BOX NO. _-3 --------
FOLDER NO. _e
TOTAL DOCS HEREIN
25X1
VOL. 4 NO. 3
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
25X1
Approved For Rel
25X1
Ap
proved For Release 2005/03/16 : CIA-RDP78-03921A0003002900
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency, the Office of
Training, or any other organizational component of the
intelligence community.
This material contains information affecting the National
Defense of the United States within the meaning of the
espionage laws, Title 18, USC, Sees. 793 and 794, the trans-
mission or revelation of which to an unauthorized person is
prohibited by law.
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002901001-3
25C~
Approved For Rele
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence
may be written on any theoretical, doc-
trinal, operational, or historical aspect
of intelligence.
The final responsibility for accepting or
rejecting an article rests with the Edito-
rial Board.
The criterion for publication is whether
or not, in the opinion of the Board, the
article makes a contribution to the litera-
ture of intelligence.
LYMAN B. KIRKPATRICK
LAWRENCE R. HOUSTON
EDITORIAL BOARD
SHERMAN KENT, Chairman
Additional members of the Board
represent other CIA components.
25C
1 ~
25
25XI
Approved For Releas4 2005/03/16 : CIA-RDP78-03921A0003g0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003
CONTRIBUTIONS AND DISTRIBUTION
Contributions to the Studies or communications to the editors
may come from any member of the intelligence community or,
upon invitation, from persons outside. Manuscripts should be
submitted directly to the Editor Studies in Intelligence, Room
I I and need not be coordinated
or submitted through channels. They should be typed in
duplicate, double-spaced, the original on bond paper. Foot-
notes should be inserted in the body of the text following the
line in which the reference occurs. Articles may be classified
through Secret.
Approved For Release 2005/03/16 : CIA-RDP78-g3921A000300290001-3
25C~
Approved For Release 29
CONTENTS
CLASSIFIED ARTICLES
Pa
ge
The Validity of Soviet Economic Statistics
Edward L. Allen
1
Figures are not fudged or fabricated but neverthe-
less call for expert interpretation. SECRET
The Interrogation of Defectors . . Stanley B. Farndon
9
The psychology and mechanics of making a subject
cooperative, be he authentic fugitive or hostile
agent. SECRET
The Polygraph in Agent Interrogation
Chester C. Crawford
31
Balance sheet on the results produced with a coun-
terintelligence instrument. SECRET
Audiosurveillance . . . . . . . . . . Alfred Hubest
39
Instruments and plan of operations for eaves-
dropping on the adversary. SECRET
Laboratory Analysis of Suspect Documents
James Van Stappen
47
Role of the test tube and microscope in probing the
authenticity of written material or identifying the
writer.
Postal Forgeries
SECRET
in Two World Wars
Gordon Torrey and Donald Avery
57
The philate
tions. S
Obstacle Course
list sees through some intelligence opera-
ECRET
for Attaches . . . Thomas W. Wolfe
71
Devious So
viet techniques to block the overt ob-
servation
Communication
s of foreign experts. OFFICIAL USE
s to the Editors . . . . . . . . . . .
79
On the mili
Assessment
tary attaches;
by graphology; and
Jet-age reporting. SECRET
Approved For Release 200?/03/16 : CIA-RDP78-03921A00030029p001-3
Approved For Rel ase - -
UNCLASSIFIED ARTICLES
Intelligence Operations of OSS Detachment 101
Page
W. R. Peers Al
Blazing a trail for allied forces on the road to Man-
dalay and beyond.
For. College Courses in Intelligence. A15
Learning the bases for decision-making as aid to
effective action in many fields.
Soviet Publicists Talk About U.S. Intelligence
A19
All-embracing octopus of espionage and terror that
keeps the cold war going.
25X1
25X1
Intelligence in Recent Public Literature
Intelligence and Economic Theory . . .
. .
. . .
A27
Intelligence and Military Strategy . . .
. .
. . .
A32
Clandestine Operations . . . . .
. . .
. .
. . .
A35
Propaganda . . . . . . . . . .
. . .
. .
. . .
A40
Miscellany . . . . . . . . . . .
. . .
. .
. . .
A43
Approved For Rel$ase 2005/03/16 : CIA-RDI'78-03921A000300290001-3
Approved For Release 2005/01
/16 : CIA-RDP78-039
CONTRIBUTORS TO THIS ISSUE
Edward L. Allen is CIA's Chief of Economic Research.
Stanley B. Farndon is a senior CIA interrogations supervisor.
Chester C. Crawford directs a section of the CIA security staff.
Alfred Hubest is an instructor in audio operations.
James Van Stappen directs a CIA headquarters facility for the
technical examination of questioned documents.
Gordon Torrey and Donald Avery are current intelligence
analysts and members of the Royal Philatelic Society.
Colonel Thomas W. Wolfe served from 1956 to 1958 as Air
Attache of the U.S. Embassy in Moscow. At time of writ-
ing he was a member of the U.S. delegation at the ten-
nation disarmament conference in Geneva.
Colonel W. R. Peers, now with Defense Department's Weapons
Systems Evaluation Group, commanded OSS Detachment
101 during World War II.
25
25X I
25
Approved For Release 2005/0p/16 : CIA-RDP78-0392PA000300290001-3
Approved For Relea - 78-03921A000300290001-3
An annual award of $500 is offered for the most significant
contribution to the literature of intelligence submitted for
publication in the Studies. The prize may be divided if the
two or more best articles submitted are judged to be of equal
merit, or it may be withheld if no article is deemed sufficiently
outstanding.
Except as may be otherwise announced from year to year,
articles on any subject within the range of the Studies' pur-
view, as defined in its masthead, will be considered for the
award. They will be judged primarily on substantive original-
ity and soundness, secondarily on literary qualities. Mem-
bers of the Studies editorial board and staff are of course ex-
cluded from the competition.
Awards will normally be announced in the first issue (Win-
ter) of each volume for articles submitted during the preced-
ing calendar year. The editorial board will welcome readers'
nominations for awards, but reserves to itself exclusive com-
petence in the decision.
Approved For Rele$se 2005/03/16 : CIA-RDPI8-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET
Evidence that Soviet plan ful-
fillment figures are not seriously
fudged or fabricated, but need
be interpreted with care.
THE VALIDITY OF SOVIET ECONOMIC STATISTICS
Edward L. Allen
The publication, beginning in 1956, of a variety of Soviet
statistical handbooks on the economy of the USSR signalled
the end of a twenty-year data drought. This shift from the
Stalin-imposed era of virtually complete concealment, when
even a report on the production of samovars was considered a
state secret, has been most welcome. No longer is the student
of the Soviet economy forced to function like an archeologist,
spending most of his time digging for individual isolated facts.
He now can start with figures which, while far from complete,
indeed quite skimpy by comparison with data published on the
U.S. economy, provide a sufficient basis for serious analysis.
A sufficient basis, if a valid one. Can we accept these So-
viet-supplied data as reliable and bona fide? Has the Central
Statistical Agency at the bidding of N. S. Khrushchev per-
haps erected a Potemkin village of false figures, deliberately
fabricated to deceive the West? Or, alternatively, are the data
so distorted at their source on the enterprise level as to be
meaningless when aggregated? Both these possibilities are
briefly examined in this paper.
Checks at the Enterprise Level
First, let us look at the possibility of falsification at the
source. Consider at the outset the environment in which the
enterprise director works. He is an instrument of the centrally
directed, government-owned and -operated economy. The gov-
ernment collects economic data in order to facilitate planning
and as a basis for the allocation system which channels ma-
terials and supplies where they are needed to fulfill its ob-
jectives. The operation of an economy through a system of
material balances, by allocation, requires accurate data. It
is therefore to the interest of the central control authorities
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3I
MORI/HRP
from pg.
01-08
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Soviet Statistics
that enterprises provide accurate statistics, and falsification
has been made subject to severe punishment.
Yet plant managers do manipulate output and inventory
data, at the risk of their careers and stiff jail terms, as evi-
denced by the many horrible examples cited in the Soviet
press and technical journals. Why is it they resort to extra-
legal practices? The usual reason is that the centrally de-
termined production goal for the enterprise is very high; and
also the director is at the mercy of his suppliers in his efforts
to fulfill the plan. The successful industrial leader in the
Soviet Union, as in the United States, plays the game by the
rules which are actually in force, not according to a strict in-
terpretation of legal statutes. The question is whether these
manipulations are so widespread or of such a magnitude as
to invalidate production figures across the board.
There are a number of in-built controls over the director
within the enterprise itself. The chief accountant is responsi-
ble to the state for refusing to execute any orders from the
director or other senior officials to fudge his accounts and for
reporting such demands "up the line." Another plant official,
the chief of the quality control department, is subject to im-
prisonment if he falsely certifies substandard products as meet-
ing stipulated technical requirements. A more knowledgeable
representative of central authority within the enterprise is the
secretary of the Party organization in the plant, and his salary
is paid from Party funds, not by the enterprise. The role
of the Party apparatus in guiding and monitoring the activities
of enterprises has been greatly increased since Stalin's death.
Another completely independent plant official is the chief of
the "special section," or secret police, who is extremely well
paid and who maintains dossiers on all key enterprise per-
sonnel. This enforcement officer is almost certainly aware,
through his network of informers, of any shady or illegal ac-
tivities being carried on in the plant. If some such activities,
however, are necessary to carry out the government's plans-
black-market purchase of materials needed to meet the cur-
rent production goals of the enterprise, for example-he may
decide to tolerate them.
Finally, the books of the enterprise are subject to inspec-
tion by outside agencies reporting directly to the Council of
2Approved For Release 2005/03/16 : CIA-RDP78-03921ADo&560290001-3
Approvedo1eReSl pafssefi~ 005/03/16 : CIA-RDP78-03921A00030029~PM
Ministers. Representatives of the Ministry of Finance, period-
ically collecting profits and taxes, check this aspect of the en-
terprise's financial performance against the plan. The Min-
istry of State Control polices all enterprises charged with carry-
ing out the decrees of the Council of Ministers and has broad
powers to subpoena the records of any unit under suspicion.
The State Bank also plays an important role as a control
and inspection arm of the Council of Ministers. Virtually
all financial activities of an enterprise-its purchases, wage
payments, sales, etc.-are reflected in the transactions re-
corded in its account at the Bank's local branch. The Bank
is responsible for auditing these transactions to insure that
they correspond in detail to the specifications of the plan for
production. Capital expenditures of the enterprise are sim-
ilarly controlled and reviewed by the Construction Bank of the
Ministry of Finance, which disburses investment funds.
As long as the enterprise is functioning successfully, the
watchdogs of the central authorities permit the director
legal elbow-room. Thus, if he needs to "borrow" one percent
of next month's expected output to reach this month's plan
goal no one is likely to object to his reporting the plan as ful-
filled. But this borrowed production must be made up in the
next accounting period by subtraction from the then current
production. If the director continues to fall behind, one or an-
other of the enterprise watchdogs will denounce him to the
higher authorities and receive credit for uncovering the
"skandal."
The system, as it is reported by hundreds of Soviet refugees
to operate in practice, thus lets only marginal and discontinu-
ous manipulation of output data go unpunished. The error
introduced into Soviet production figures by such distortions,
one would then conclude, is in all likelihood too small to in-
terfere with their usefulness.
Intelligence Verifications
We in intelligence have further means to check the reason-
ableness of individual enterprise reports. Military and civilian
embassy officials have been engaged in observational report-
ing from iron curtain countries for many years.
SECRET 3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921000300290001-3
SECRET Soviet Statistics
Within the past few years, opportunities for observational
reporting have been multiplied as a result of the East-West
exchange program. Visits to the USSR by U.S. experts which
followed the signing of the Lacy-Zaroubin agreement of 27
January 1958 have been particularly valuable in providing a
check on official reports of industrial production. In 1958 and
1959, U.S. technical personnel visited Soviet factories in the
iron and steel, electronics, plastics, electric power, and anti-
biotics industries. Similar exchanges have taken place be-
tween USSR and United Kingdom experts.
1See H. H. Hemenway's
25X1
4Approved For Release 2005/03/16 : CIA-RDP78-03924650300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Soviet Statistics SECRET
In some cases, though not in all, the Western experts have
been able to check production records against observed plant
capacities. In the Soviet iron and steel industry such a check
was extensively carried out, plants representing 40 percent
of total Soviet capacity being included on the itineraries. No
case of falsification has been reported, although some data
given the U.S. delegates by the Soviets are regarded with
skepticism.
Agricultural Enterprise
Special mention should be made of particular problems
which affect the collection of agricultural statistics. First of
all, there is the problem of the competence of the rural col-
lector. Despite the sweeping claims made for Soviet educa-
tion, only 40 percent of the adult population in 1959 had had
eight years of schooling, and the proportion in the rural areas
was undoubtedly lower than this nation-wide average. The
quality of Soviet agricultural statistics has suffered from the
consequent lack of adequate training given the collectors.
Secondly, the typical peasant expertise at ochkovtiratel'-
stvo-throwing dust in the eyes-had developed to a fine art
in response to the challenge of the Tsar's tax collectors. That
it continued to be practiced long after the Communist take-
over was shown by the 1951 Soviet decree that no report of a
collective farm claiming the death of an animal from natural
causes would be accepted without a veterinary's corroboration.
Through most of the years of the Soviet regime, the final
authority for estimating crop production lay with the Office
of the Chief Inspector for Estimating Crop Yields, attached
to the Council of Ministers. This office relied on a staff of
local agents to inspect reports and used historical correlations
of weather conditions with crop yields to check the validity of
local reports and determine output. It is interesting that U.S.
intelligence officers now use this same technique to judge the
reasonableness of official Soviet claims for agricultural crop pro-
duction. Agricultural output statistics are still regarded as
generally less reliable than industrial production data, and the
agricultural delegations which have gone to the USSR under
the exchange program have provided few, if any, checks on
the published figures.
5
Approved Kfdlease 2005/03/16: CIA-RDP78-03921A000300290001-3
Aooroved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Soviet Statistics
There are, however, a number of current developments fa-
vorable to improved agricultural reporting, to wit:
The rapidly increasing size and decreasing numbers of col-
lective farms-from 250,000 in 1950 to about 55,000 in
1959-must be resulting in the assignment of better quali-
fied personnel to prepare statistical reports.
The increasing percentage of agricultural output given food-
industry processing before going to consumers requires
that the center receive relatively accurate data in order to
plan for the food processing plants.
The progressive substitution of money wages for payments
in kind to labor will reduce independent marketing of col-
lective farm produce, putting more of it under state con-
trol and facilitating the spread of economic accounta-
bility.
Integrity at the Center
We can move now from the origination of statistics at the
farm or factory to their collation and publication at the cen-
ter. Statistics are an essential operating tool for an economy
that relies on allocation rather than a market price system
as its controlling mechanism. Lenin's decree of 1918 set up
the first Soviet statistical organization, and an industrial census
was taken the same year. Since 1948 the Central Statistical
Administration has been an independent agency reporting to
the Council of Ministers, with jurisdiction over reporting forms
and authority to check on the accuracy of reports received
from subordinate echelons. The CSA runs its own schools
for training accountants and statisticians, writes textbooks,
anti develops calculating machinery. It receives quantities of
reports covering quarterly, monthly, ten-day, and, if the sub-
ject is important enough, even daily results.
The reports that CSA receives must be reasonably accurate
if the central system of allocations is to work. Despite cut-
backs, from 700 to 800 commodities were still reported under
centralized distribution in 1959, including the most important
ferrous and non-ferrous metals, fuels, chemicals, and machin-
ery. The question of the integrity of the CSA statistics is thus
reduced to whether it publishes total production figures unre-
lated to the sum of the plant production figures it receives.
6Approved For Release 2005/03/16 : CIA-RDP78-03921AS-FO'OOF3O0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Soviet Statistics SECRET
In other words, does it keep two sets of books, one for the
internal operation of the economy, and another to throw dust
in Western eyes?
Our most comprehensive check on centralized reporting be-
came available at the close of World War II. The German
Army, in its penetration of the USSR, had captured a 750-
page statistical document carrying the official Soviet security
classification Not for Publication and entitled "State Plan for
the Development of the National Economy of the USSR in
1941." This document was recovered from the Germans by
U.S. intelligence personnel, and the data contained in it were
compared with openly published statistics, particularly those
given at the 18th Party Congress. It was found that the
openly published data were identical, except for minor dis-
crepancies that could be accounted for, with those in the
classified document intended for the official use of Soviet
planners.
It should also be remembered that Soviet officials need not
falsify data to keep the West uninformed. The USSR can
easily withhold information either for security reasons or be-
cause it would reflect unfavorably on the regime. Since the
Communists first came into power they have followed a policy
of selective release of data. The controlled release of informa-
tion, although usually designed to mislead, is conceptually
and practically quite different from falsification.
One of the best examples of Soviet manipulation of data
for propaganda purposes was in reporting grain production,
when they shifted, for the years 1933-1954, from quantity har-
vested (barn yield) to the larger figures for the size of the
crop in the field (biological yield). Although they made no
secret of this switch from standard world-wide procedure, some
unsuspecting and careless Western writers accepted the bio-
logical yield figures without correction for comparison with
Western barn yields.
Need for Interpretation
The interpretation of Soviet commodity statistics, in com-
mon with those of other countries, depends upon definition
of the categories being measured. Soviet definitions and usage
are often different from those commonly accepted in the United
d
Approve Fo R For Release 2005/03/16 : CIA-RDP78-03921 A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Soviet Statistics
States. Some such lack of direct statistical comparability
exists, of course, in the economic data of any two countries,
but the reconciliation of Western data is usually an easy task
because of explanatory notes appended or explanations avail-
able in convenient source books.
Such is not the case in the USSR. Often terms are not
explicitly defined, and their meaning must be determined by
laborious cross-checking. For these reasons, the statistics re-
leased by the Soviet Union must be screened very carefully
and not assumed to be comparable to U.S. figures unless so
proved by rigorous analysis.
Finally, Soviet aggregate statistics, such as those stating
total industrial and agricultural production and national in-
come, whatever merits they may have for internal measure-
ment of progress or external propaganda purposes, cannot be
compared with similar measures of total economic activity re-
leased by Western nations. The conceptual differences be-
tween East and West are too great. For example, the Soviet
definition of national income is one of physical production,
excluding most of the governmental, professional, and domestic
services included in Western income definitions. Variant meth-
ods of pricing manufactured products probably introduce an-
other area of noncomparability.
The Soviets have released enough data on physical produc-
tion, however, to enable us, by augmenting it with additional
commodity figures obtained through intelligence research, to
compute reasonably satisfactory indexes of both industrial
production and national income in terms of Western concepts.
These computations will remain a necessity: no matter how
liberal the data disclosures of the Soviet leadership in the
future, it is unlikely that they will supply us with computa-
tions of aggregate indexes based on non-Marxist definitions.
We can be reasonably sure that economic data presented
by the Soviet Union will continue to have both meaning and
significance. The major research problem will remain in the
future what it has been in the past-to find out just what
this meaning and significance is.
Approved For Release 2005/03/16: CIA-RDP78-03921A MR290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002 NS-.
Description and empirical anal-
ysis of the interrogation process
as applied to East European de-
fectors, bona fide and mala.
THE INTERROGATION OF DEFECTORS
Stanley B. Farndon
In time of war the most massive source of information re-
garding the enemy is the flow of prisoners and deserters from
his ranks. In a cold war era an important segment of positive
and operational intelligence is similarly derived from defectors,
refugees, and would-be agents. Their offering of information,
however, is not laid freely and untainted at our feet. It must
be extracted from them, sometimes against the utmost resist-
ance, and the authentic sorted out from the deceptive, the
useless from what fills our needs. This process, the job of
the interrogator, is made less difficult in wartime by our hav-
ing the prisoner wholly at our mercy for the duration; over
peacetime enemy sources the equivalent control must for the
most part be achieved by psychological means.
Particularly the critical first phase of an interrogation-
that undertaken to determine whether the defector is genuine,
an enemy agent, or just a swindler-demands much poise,
knowledge, human understanding, dexterity, and perseverance.
The interrogator must have the manner and bearing to im-
press his subject as a person of authority. His knowledge
of the subject's country should be such as to evoke respect,
and his command of the language so fluent as to permit easy,
natural conversation and an instant grasp of subtleties. He
needs to sense the kind of person he is dealing with and dis-
cern quickly any change of attitude reflecting uneasiness, re-
lief, reserve, or unrestraint. He must be able to convince the
subject of his deep personal interest in his welfare. He must
be tactically skilled and flexible in his approach, keeping the
spun threads of the story effortlessly in mind, spotting in-
consistencies, exploiting openings, recognizing significant in-
formation, learning without revealing his interest. With some
subjects he needs inordinate patience and determination.
R
ApprovedForr
1 elease 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
09-30
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
Aims and Precepts
In all three types of defector interrogation-the initial coun-
terintelligence probing of the subject's bona fides, debriefing a
bona fide defector of his knowledge useful to intelligence, and
the extraction of operational information from the purported
defector in intelligence employ-the interrogator's aim is to
get the subject to give information willingly and without re-
serve. This he can accomplish best by achieving a harmonious
atmosphere and creating a close personal rapport with the
subject, a rapport based on the subject's respect for the in-
terrogator and confidence in his good will. To this end he
must on the one hand be understanding, just, and friendly, and
on the other maintain the psychological superiority essen-
tial to control.
During the early stages of an interrogation, the interro-
gator's main objective is to discover exactly what sort of per-
son he is dealing with, and so how best to use his own per-
sonality to get the subject to answer questions willingly and
truthfully. But the subject also tries to use his personality.
He usually assumes a number of poses by means of which
he hopes to gain the good will and trust of his interrogator
in order to assure his own future well-being, or if he is an
agent, in order to pass safely through the security channel
and end up in position to fulfill his mission. Regardless of
the capability of the interrogator and the character of the
subject, these assumed poses make it very difficult to achieve
frankness and sincerity during the initial interrogation periods.
The process can be hastened, however, by preparation in ad-
vance, and the interrogator should try to forearm himself
with all available information on the subject's professional in-
terests and the details of his everyday existence in his home-
land. Thus he can start a flow of conversation on topics within
the range of the subject's knowledge and interest. Then as
he senses the subject's outlook on life and his views on mat-
ters discussed, his sympathetic understanding of these will
lead the subject to talk more freely. Every effort should be
made to induce him to speak freely rather than merely an-
swer questions. Uninterrupted privacy is an important con-
dition at this stage. Once the interrogator has gained his own
19"
,proved For Release 2005/03/16 : CIA-RDP78-039210290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029QQ -.3
Interrogation tt
impressions of the subject's personality and character, his
background knowledge of the case and his first-hand observa-
tions will enable him to sort out the various poses from his
true characteristics, motives, and intentions.
The tension of the interrogation situation makes the sub-
ject wide awake and perceptive to everything that goes on.
The interrogator must therefore also maintain a state of keen
perceptiveness in the battle of wits, fitting his observations
quickly into the emerging picture as the interrogation pro-
gresses. An interrogator not physically rested and mentally
alert will have a most difficult time gaining psychological su-
periority. Even intellectually inferior defectors have a fine
instinct for sensing the interrogator's qualities and spotting
flaws in his attitude or reasoning which tend to destroy the
respect necessary for psychological control.
The fact that a defector is dependent on the West's good
will for his future well-being is a lever which the interrogator
can utilize to control him; it does not take a defector long to
realize that he enjoys favors in direct proportion to his co-
operation. Yet the prospective source may be under physical
control and still fight the interrogator with his brains and
spirit. At least he may be sizing the interrogator up, care-
fully observing his statements and mannerisms, in order to
find an area for maneuvering. And if he should be an agent,
he can be expected to have been carefully trained and briefed
in anticipation of questions he'll be asked. The problem is
one of motivating the subject to cooperate, usually of de-
veloping confidence in the integrity of the interrogator and
assurance that his future will be adequately taken care of in
resettlement.
The best results are obtained when the subject is impressed
with his interrogator's good judgment and sense of justice.
The interrogator should make only such commitments as lie
within his authority and ability to keep. One of the worst
possible practices is that of making promises that he cannot
or knows he will not keep. The reversal of promises indis-
criminately made destroys the subject's respect for him and
the rapport between them. The interrogator should have
enough authority and latitude to approve or disapprove most
11
Approved For SECRET 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
of the requests made by a subject; he needs to create the
impression that he is a person of consequence, not just a lin-
guist who must check everything out with his boss. When
faced with a request beyond his authority he should give the
subject a logical reason for delay without revealing that he
must ask permission from above, explaining perhaps that this
is a matter to which he must give some thought before decid-
ing. In rejecting a request he should be careful not to leave
any suspicion that he is discriminating against the subject
(unless he is using this tactic as a device in the process of
breaking an agent subject).
It is best for the subject to be brought into the interroga-
tion room after the interrogator is already seated there in
a good position to observe him during the interrogation. A
common error made by some interrogators is to keep the sub-
ject waiting for some time for them in the interrogation
room: waiting gives the subject too much chance to get a
comfortable familiarity with his surroundings. The question-
ing should be done in carefully chosen phrases on the subject's
own language and vocabulary level. The questions should be
clear, direct, and simple: a subject is often unwilling to ex-
pose his ignorance by asking for clarification of intricate ones.
Leading questions should be avoided; they generally result
in the subject's giving an answer he thinks is wanted, and so,
frequently, to a good deal of fabrication.
The subject's behavior must be interpreted in the light of
the interrogator's observations of his personality. A funda-
mental point is whether he is naturally communicative or
hard to draw out. If an inhibited man is taciturn when ques-
tioned on personal aspects of his life, that reticence is sig-
nificant only in showing the interrogator that he must work
the harder to gain his confidence. But if an uninhibited sub-
ject becomes suddenly taciturn, the interrogator can conclude
that his reticence, not being characteristic of his personality,
hides deception. Some subjects, particularly Russians, pre-
tend to be quite simple-minded and stupid in order to avoid
talking too much, but reveal their native intelligence once
they are induced to talk freely.
%proved For Release 2005/03/16 : CIA-RDP78-039211 X680290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029904E31,
Interrogation ``
Defector Behavior Patterns
With the hazards that always attend thinking in terms of
types and with the reservation that the essential thing is to
understand the individual subject's background and psychol-
ogy, it is helpful to have in mind some behavior patterns ob-
served in the East European defector and several distinct
variant types of personality which occur among the Slavs.
Like all human beings, Slavs are particularly talkative after
a harrowing experience such as that which they have usually
had in escaping from their homeland. Whatever their beliefs
and loyalties may have been in the past, the treatment they
experience in the West creates a tremendous psychological im-
pact. They realize how much better Western standards of life
are than those in the Soviet orbit. Since self-preservation is a
strong factor in defection motivation, they can be expected to
try to ingratiate themselves with their interrogators in the
hope of getting special consideration in their resettlement.
They are susceptible to flattery and can readily be convinced
that sincerity and cooperation will exonerate them from any
guilt in defecting. They tend to undervalue the importance
of any information they have, especially if it appears that the
West already has some knowledge along the same lines.
Slavs are inclined to be cooperative when confronted by su-
perior authority. They are particularly sensitive at having
outsiders belittle their national heroes. They respond hu-
manly and well to kindness, consideration, and understanding.
Once induced to talk, it is a simple matter to keep them talk-
ing on subjects of interest to intelligence.
I have found it advantageous, in my experience with East
European defectors, to conceive of four variant types of per-
sonality requiring distinctively different approaches in inter-
rogation. Two or more of these conceptual types, of course,
can mingle and modify one another in a concrete individual,
and the interrogation must be adjusted accordingly. The per-
sonality structure predominant in the four types is respec-
tively what I shall call rational, vital, emotional, And ,tense.,
'Cf. Guide for Intelligence Interrogators, 707 European Command
Intelligence Center, April 1948, col. 10ff.
SECRET 1.3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
The rational-structure personality is one under superior
control by the mind and will. It is characterized by natural
assurance and reserve, with very little outward display of emo-
tions such as fear, surprise, joy, or sadness. An individual of
this type is attentive during interrogation, frankly curious,
and privately he is estimating the situation with objectivity.
His speech is well controlled and modulated. There is little
difficulty in establishing points of contact for conversation
with him, but it soon becomes evident that there is a well-
defined area of personal matters to which he uncompromis-
ingly denies access.
The interrogator must recognize these characteristics in
time to avoid using an inappropriate approach that would
spoil all chance of achieving any degree of psychological su-
periority. He must be something of a rational type himself
to cope with one, adopting an objective, cause-and-effect at-
titude. He must recognize the logical validity of the moral or
material considerations that underlie the subject's behavior.
It is rarely that a rational-structure personality turns out to
be an agent.
The vital-structure personality, characterized by self-asser-
tive `energy and resilient vitality, is most often found in Rus-
sian subjects. Its intense energy often gives it charm and the
momentum of great self-confidence, but it is likely to be
driven by instinctive urges without deliberate rational pur-
pose. It can endure long suffering and emerge with vigor and
self-assurance.
If a subject of this type is met with inconsiderate harsh-
ness, he will defend himself with tenacity and resilience. He
patiently stores up his emotions to react when he finds a vul-
nerable spot in his interrogator. On the other hand, any soft,
sentimental approach makes him suspicious. He is shrewd and
adaptable, and can conceal his true character by playing any
part assigned him or one to support some theory he feels the
interrogator has formed. Then he can reverse the field and
produce an entirely different story, rendering the results of
all previous interrogation useless, in order to gain time and a
fresh stand for resisting the investigation.
Psychological superiority over the vital-structure type is
hard to attain. The interrogator must likewise display a
14Approved For Release 2005/03/16: CIA-RDP78-0392600290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029a0
Interrogation
strong and assured personality, with similar vitality and re-
silience. He must avoid any effort to play on the emotions, be-
cause these subjects do not soften up in their attitude. Under
no conditions should he attempt to bluff one of them; all his
declared intentions must be meticulously carried out. Pa-
tience is an important virtue for the interrogator dealing with
a vital-structure personality, and he should do more listening
than questioning. The best method of establishing rapport
with such a subject is by showing an interest in the details
of his life history, his environment, profession, family, and
his desires for the future.
The emotional-structure personality is dominated by ill-
controlled emotion, rather than mind and will or the drive of
ebullient energy. It is manifested by visible or audible expres-
sion of any joy, excitement, pleasure, depression, defiance, or
other feeling caused it, by sensitive or violent reaction to any
changes of treatment, by emotional exaggeration and plead-
ing, and by general sentimentality of outlook. Emotion may
drive this type to overflowing recklessness and the senseless
risk of his whole career and life, or to a blind beating of his
head against obstructions and limitations. He usually has a
basic yearning to escape the realities of life and a tendency to
lean emotionally on another person, and so to hero-worship.
The emotional type, being easily impressed, is susceptible to
almost any skillful approach employed by the interrogator.
But the interrogator must be particularly alert, self-con-
trolled, and quick on his feet in dealing with these subjects in
order to take full psychological advantage of their changes of
mood. They tend toward extremes, and the interrogator must
catch them at the right extreme. , Logical arguments and per-
suasion can rarely bring about a change in their mood, and
delving into their emotional depths should also be avoided.
They should be made to feel at ease in conversation on some
objective topic, and a rapport established with developing ac-
quaintance on the basis of confidence and respect for. the in-
terrogator.
It is particularly advantageous with this type. that the in-
terrogator..be presented as a person of rank and dignity.. He
can take full advantage of the subject's characteristic need
~~EEr~[
S
or
15
Approved
F
1 elease 2005/03/16 :
CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 :
CIA-RDP78-03921A000300290001-3
SECRET
Interrogation
for another person to lean on, one in whom he has a feeling of
personal confidence. Under no circumstances should the in-
terrogator be persistently cool to the subject when he seeks
support. This is the proper psychological moment for him to
show not only strength and firmness but sufficient benev-
olence and interest in the subject's future to warrant the
subject's putting himself in his hands.
An intelligence agent with an emotional-structure person-
ality normally does not bear up well under long strain. It is
often possible to catch him off guard by deliberately arousing
certain emotions. After tenaciously holding out for some
time he may suddenly abandon his position, having decided
that it is senseless to continue his deception, and in a display
of characteristic recklessness confess that he is an agent.
This breakdown usually follows an inner struggle that is some-
times obvious or at least noticeable in an attitude of gloom,
brooding, and apathy. The interrogator should be sufficiently
sensitive to recognize that such an inner struggle is going on
and not be too aggressive: overvigorous handling could cause
stubbornness and an increased will to resist. He should ob-
serve perceptively the source's moods and calculate what
steps he can tactfully take to remove the last obstacles of
reason and will power. Then a little prompting at the right
moment can often bring on the spontaneous outburst with a
full confession. Sometimes a change of quarters and treat-
ment produces the additional momentum needed. This spon-
taneous self-abandonment is usually genuine in an emotional-
structure personality, but is sometimes simulated by others,
most successfully by the vital-structure type, in order to get
the pressure off and feed the interrogator a new cover story.
The tense-structure personality results from an irreconcil-
able discord of psychological forces which prevents the subject
from achieving a satisfying dignity and meaning for his life.
His behavior manifests his desperate striving for such dignity
and meaning; he is strongly egocentric, with a tendency to-
ward absurd boasting and exaggeration. He often appears to
act from contradictory motives. His artificial poses and un-
natural attitudes may sometimes genuinely express his per-
sonality, but even then they appear insincere and inappropri-
ate to his true character.
1 pproved For Release 2005/03/16: CIA-RDP78-0392 00290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002?p@%h3
Interrogation
Most such subjects act diffident and are difficult to ap-
proach. They are unlikely to have any appreciable reserve of
vitality. Close scrutiny of a subject's life history may reveal
symptoms of a tense-structure personality in advance-fre-
quent personal quarrels with superiors and equals, claims of
intrigues and plots against him, evidence of difficulty in
adapting himself to social environments, explanation of his
failures as the result of vicious actions of others, or pretended
resignation to the whims of fate.
Subjects of tense-structure personality are most difficult to
interrogate. By nature distrustful of people, they shy away
from the interrogator's efforts to win their confidence. It is
hard to find a thread of continuity on which to build rapport
with them when they deny obvious truths stubbornly and
senselessly, becoming subjectively convinced of the plausibility
of their stand. In their constant striving to protect their
own egos, they lose the normal instinct to tell the truth. All
facts obtained from them have to be checked out carefully
against other sources of information. It is quite often im-
possible to establish their bona fides, and even when they have
confessed to being agents the truth of their accounts must
be constantly rechecked.
The CI Interrogation Center
A safehouse should be established in a somewhat isolated
area for exclusive use as a CI interrogation facility. If it is
used as a holding area where several defectors are handled at
the same time, its internal arrangement should be such that
no one of them can ever see or contact another. Quarters
for the defectors should be of three types-ordinary rooms
furnished with a bed, small table, and a dresser; a more elab-
orate room for high-level defectors or for those who, their
bona fides established, are awaiting transfer for positive in-
telligence debriefing; and a cell with only cot and mattress, a
small indirect light, and a slop bucket-no furniture, no wash
basin, no conveniences.
There should be at least two ordinary interrogation rooms
and one special isolation room for obstinate cases. One of the
two ordinary ones must have an adjoining room for making
recordings and visual observations unseen. They should be
furnished formally, with facilities for either a friendly or an
UE 17
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Apma ed For Release 2005/03/16: CIA-RDP78-03921A000300290001-3
Interrogation
unfriendly atmosphere, for example with a desk and executive
chair, one or two easy chairs, a small table, one ordinary
straight-back chair, and one uncomfortable straight-back
chair. There should be a buzzer to summon the guard.
On the wall behind the interrogator's desk there should be
a one-way mirror, in which the interrogator, ostensibly not
watching the subject as he asks a key question, can observe
his unguarded reaction. The mirror also provides for observa-
tions from the adjacent room: agents who, for example, after
a particularly strong session the image of abused innocence,
are left alone, have been seen through it to smile slyly and
preen themselves at having put their act over on the inter-
rogator.
The Establishment of Bona Fides
The defector is brought to the safehouse at night, on a
roundabout route and wearing dark glasses, to protect its lo-
cation. He spends most of the first day in administrative for-
malities, being photographed and fingerprinted, taking a medi-
cal examination and an IQ test, and filling out a questionnaire
that covers the salient facts of his life history and defection.
He also begins to get acquainted with his interrogator before
the day is over, at an informal dinner on the first night. The
interrogator encourages his subject to relax and talk freely on
topics of his own choosing. Recorded for later comparison
with statements made during the formal interrogation, this
spontaneous talk immediately after the shock experience of
successful defection often provides valuable leads. Even pene-
tration agents are affected by the informal atmosphere and
let slip clues that prove useful in unmasking them.
The interrogator studies his subject's personal history
questionnaire for further clues to his personality, as a basis
for planning conversation and the sequence of investigation
topics, and to spot items that appear illogical or vulnerable.
Then on the second day the formal but friendly CI interroga-
tion sessions begin. The initial phase is important. The in-
terrogator should be formal but not officious, sympathetic but
not maudlin. He should strive to be the subject's superior and
yet his good friend, an investigator and yet a defense counsel.
This attitude produces good results even when the subject
turns out to be an agent.
18
Approved For Release 2005/03/16 : CIA-RDP78-03921VQW00290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002 MQ -.3
Interrogation
There are many psychological burdens weighing heavily on
a defector. Regardless of his motivation for coming over, his
spirits are low at this stage of what might be called defection
shock. Guilty about his desertion and apprehensive over his
future, he feels lost and friendless in a foreign land. Above
all else, he wants to be understood. The interrogator can
profit from his feeling of loneliness by showing the friendli-
ness and solicitude he needs and thus earning his gratitude.
This moral support is probably more important to him at this
time than any possible material considerations. An atmos-
phere of relaxed, natural orderliness will help to eliminate his
fears and increase his desire to cooperate with his benefactor.
If he is an agent, the growing sense of relaxation may still
throw him off guard and cause slips that can be exploited
later.
Natural behavior on the part of the interrogator often in-
duces his subject to drop any feigned idiosyncrasies by which
he had hoped to keep the interrogator from prying too deeply
into his background or extracting information of such signifi-
cance as to aggravate his guilt in deserting his native country.
Slavs seem to feel a deeper devotion than some other peoples
to their native land, but most of them do readily adjust their
psychological outlook. Often they are receptive to the sug-
gestion that in cooperating with their interrogator they are
not traitors to their country but rather fighters against its
alien Communist rulers.
The approach of the friendly interrogation can be slanted
to take advantage of the subject's, individual propensities. If
he has deep religious convictions he can often be made coop-
erative by pointing out the great harm done to religion by the
preachings of Communism. Even agents, if they have been
coerced into espionage by fear of reprisal against themselves
or their families, can be helped by religious convictions to
throw off this fear and cooperate in a crusade against Commu-
nism. With vain subjects, and ones in lowly status accustomed
to being ignored, the interrogator can successfully employ a
subtle flattery, building up their egos to the point where they
brag about the things they know to show what big men they
were in their own country.
RE
r
19
Approved Fo
Release 2005/03/16 :
CIA-RDP78-03921A000300290001-3
Ammyed For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Interrogation
It takes from one to four weeks to establish the bona fides
of a legitimate defector. Most of them are thus cleared for
positive exploitation within two weeks or so, but when they
stubbornly refuse to talk about details of their biographies
that happen to be embarrassing to them, more time is re-
quired to clarify discrepancies. After each session the inter-
rogator should write a report of the interrogation and analyze
the data obtained, particularly with respect to those aspects
of the subject's biography, stated motivation for defection, and
escape story which experience has shown to be vulnerable
points in an agent's legend.
A good biographical legend for an agent is likely to follow
quite faithfully his true life story, omitting only his recruit-
ment and intelligence activity. It is to this point we look for
danger flags in a defector's story. Certain incidents he de-
scribes may be ones which normally would be followed by
some kind of security service investigation and involvement
with him. If he claims there were no such consequences, the
suspicion arises that this purported lack of security service
action is attributable to a relationship between him and the
service. Unless he can explain any such flags, the defector
must be considered suspect and be subjected to more intensive
interrogation. No single flag is necessarily an indication that
he is controlled by the hostile service, but several such flags
establish a strong prejudice. Some important flags are the
following:
Contact with foreigners which the security service is claimed
not to have investigated or questioned. (Makers of such
contacts are usually interrogated and warned.)
Mere reprimands for anti-regime activities while a student.
(Such activities usually call for severe punishment.)
Blackmarketeering or embezzlement.
Arrest and periods of imprisonment for criminal or anti-
Soviet activity. (Often used to account for a long gap in
employment history actually devoted to thorough agent
training.)
Inability to account for any period of time.
Membership in anti-Soviet elements during World War II,
including German POW labor force and any underground
movements.
Approved For Release 2005/03/16: CIA-RDP78-03924000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300 90C10 3
Inferrogafion
Membership in an ethnic underground movement.
Success in having lived under a false name.
Admitted informant activities for the security service. (A
tactic to gain the interrogator's confidence and lull suspi-
cions, as well as to account for any reactions that may
show up on the polygraph.)
Manifestations of security service interest in him, but no
approach. No recollection of topics, events, and people
that he obviously should remember.
Indications of high standard of living or educational ad-
vantages but denial of Party membership.
No normal fear of the security service while planning de-
fection and escaping.
Residence in the United States and return to the Soviet
Orbit in the early thirties.
Relatives living in the United States.
Understanding of terms normally known only to persons
familiar with intelligence activities.
The subject's real motivation for defection is an important
determination in establishing his bona fides. Agents under
defector cover usually claim to be anti-Communists, saying
that regime reprisals against family members, for example,
caused their defection, or that they escaped to take up the
fight against Communism through Western emigre organiza-
tions. Questionable motivation claims, however, do not con-
stitute evidence of espionage, since most genuine defectors also
claim to be ideologically motivated. A detailed probing with
a follow-up polygraph test is often necessary to obtain the
truth. Under searching interrogation many of them reveal
that they escaped to avoid prosecution for a crime, because
they had family trouble or an unfaithful wife, or because they
had violated some decree and feared exposure.
In analyzing motivation for defection, a careful look at the
defector's financial status is important. It is unlikely that a,
man of ample financial means occupying a position of dignity
and a satisfying station in life would give all this up for an
unpredictable future in the unfamiliar competition of the
Western world.
KM 21
Approve elease 2005/03/16 :CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
The defector's escape story also provides a number of flags
signaling the possibility of an agent legend. Some points to
be considered suspicious and in need of clarification are the
following:
The claim that he burned or buried all his documents be-
fore crossing the border, or that he does not remember
what documents he used to pass known security check
points.
The claim that he encountered no patrols, barbed wiring, or
other border controls at places known to have them.
The claim that a person he met by chance willingly aided
him in spite of the risk.
Implausibility of escape with respect to weather conditions,
mode of transportation, border guard, or internal secu-
rity measures.
Physical condition inconsistent with declared hardships of
escape.
Condition of clothing, especially shoes, inconsistent with es-
cape story.
Inadequate explanation for having large sums in money or
jewelry.
Participation in tourist group trip while under investigation
for anti-regime sentiment.
Inadequate explanation for success in escaping from the
main body of the tourist group and its security officer.
In a careful review with the subject of all the information
and background furnished by him, the interrogator must keep
in mind that people's lives in Communist countries are deeply
and directly affected by the internal security services. Above
all, a defector fears reprisals against his family if the regime
authorities learn that he has escaped to the West and is coop-
erating with the American intelligence service. This fear is
often sufficient reason for a bona fide defector to give evasive
and misleading answers. By showing full understanding of
this and using every means at his command, the interrogator
must convince him that truthfulness and cooperation will not
cause hardship to his family, since the information he gives
will never be disclosed.
The defector's story is checked out against every available
record and all other sources of information, care being taken
Approved For Release 2005/03/16 : CIA-RDP78-03921Ak b290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300?JJ %% 3
Interrogation
not to divulge to him any information received from other
sources. Then, after analysis of all this material and its im-
plications, a series of questions designed to resolve all discrep-
ancies is composed and presented to the defector in a poly-
graph examination.
The moment of polygraph soul-searching is one of the most
strategically valuable parts of a CI interrogation. The poly-
graph should not be used, however, until the interrogator is
certain that he has obtained all pertinent information or has
reached an impasse. It should be used not to reach but to
substantiate conclusions. When working with a suspected
agent source, the interrogator should try to obtain a confes-
sion before polygraphing. In borderline cases the polygraph
will usually pinpoint the area of sensitivity and perhaps help
to resolve doubts, but it should not be allowed to become a
crutch. The psychological approach by the polygraph opera-
tor plays an important part; when feasible he should be pro-
ficient in the required language, so that the interrogator can
remain outside the room and monitor the test by listening
in and by one-way mirror.
Quite often, the defector clarifies the discrepancies in his
story during or immediately after the polygraph examination.
If a re-examination verifies these explanations, and if the pre-
ponderance of the interrogation material indicates that the
defector is genuine, a statement of his bona fides is issued and
he is removed, at night, from the CI safehouse to an overt
residence for positive intelligence exploitation.
Positive Intelligence Debriefing
The newly assigned PI interrogator normally needs only a
very short time to get into rapport with his source. He picks
up where the CI interrogator left off, and his task is made
much simpler by his being able to approach the source with-
out suspicion. Since his duties call for promoting his well-
being, he should be able to gain his full confidence and respect
and elicit whatever information he has. Nevertheless he
should put some effort into cultivating a friendly relationship
before jumping into direct questions, and he should continue.
to emphasize that all information divulged will be carefully
insulated from the authorities of the source's homeland.
23
ApprovegEFoRr Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
As a bona fide source, the defector enjoys a comfortable life
in which he receives lodging, excellent meals, clothes, toilet
articles, and a small salary. In return for this support, he
has to report for work five days a week, or oftener if neces-
sary, and give his full cooperation in the PI interrogation.
Although he is a free man in the West, he is thus immediately
dependent upon the intelligence service for lodging, suste-
nance, and clothing, and ultimately for documentation to
legalize his immigration and for assistance in resettlement.
Because of these controls and because he is no longer under
any suspicion, it is assumed with reasonable certitude that
he will be truthful in the information he furnishes.
Before beginning his debriefing, the interrogator should
study carefully the report of the CI interrogation in order
to provide himself with all available background information
and foreknowledge of the source's psychological characteris-
tics, his special fields of knowledge, and the extent to which
he can be exploited. Familiarity with the details of the
source's past life will also be of immense help in establishing
quick rapport.
The aim of the PI interrogation is to fill consumer require-
ments without revealing to the source what specific informa-
tion is sought. It is most important that the interrogator
know exactly what information is required. The more he
learns about the customer's needs, the more flexible and in-
genious he can be in the interrogation. On his broad under-
standing of requirements depends also the degree to which
wandering off from specified topics is permissible. Such wan-
dering sometimes leads to topics of even greater value than
the requirements being serviced, but the interrogator must
be capable of distinguishing useless drivel from worthwhile
information. The amount of research he needs to do in any
particular case depends upon the subject matter and what
the particular source is likely to know; but the interrogator's
chief weapon is knowledge, and his effectiveness is directly pro-
portional to its readiness.
The debriefing will usually proceed much more smoothly if
the questions asked are worded in such a manner as to elicit
specific answers. Each topic should be thoroughly explored
and completed before going off into another area. The inter-
24
A
pproved For Release 2005/03/16 : CIA-RDP78-03921A OR96290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Interrogation SECRET
rogator should never accept a negative response to a question
until he has covered all possible variations on it: quite often
a source knows things which he does not even realize he knows
until a probing question brings them to the surface. His
first answer covers what immediately comes to mind, but his
thoughts can be channeled to surface further observations
by brief follow-up questions-"Can you explain that in more
detail?" "Can you give an example?" "How did you learn
this?" Under no circumstances, however, should the inter-
rogator ask leading questions or make hints which might in-
fluence the substance of the replies.
The PI interrogation is usually not recorded verbatim; a
record is written up from the interrogator's notes. These
are best transcribed on the same day as the interrogation ses-
sion. Then if they are found to be incoherent or incomplete
at any point, they can be clarified at the next session.
In most respects the PI interrogation of a bona fide defec-
tor parallels ordinary debriefing and interviewing procedures.
Let us return now to the CI interrogation which does not issue
in the establishment of bona fides.
The Extraction of Confessions
When the CI interrogator feels that a preponderance of
evidence turned up by interrogation and polygraph examina-
tion indicates that the defector is an intelligence agent, he
begins a more intensive interrogation. This intensive ap-
proach to the clarification of existing discrepancies must be
carefully planned. The methods that may be used are com-
plex and varied, depending among other factors on the char-
acter of the subject and the capabilities of the interrogator.
If the interrogator decides that drastic measures and strong
control are necessary, he must be sure that he can play the
tough disciplinarian's role.
The variety of techniques for unfriendly interrogation run
from mildly unpleasant ones to measures just short of vio-
lence. In one type of approach the subject may be made to
feel it futile to protect information that apparently is already
in the interrogator's hands, especially if he has to experience
discomfort and unpleasantness to do so. The interrogator
must be thoroughly briefed for this approach; he begins by
E 25
Approved1o rRelease 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
posing questions to which he already has the answers. When
the subject hesitates to reply, the interrogator then scorn-
fully gives the answer himself, until the subject feels foolish
at trying to hide things that appear to be common knowledge
when by cooperating he would become eligible for better treat-
ment.
The interrogator may exploit the subject's emotional en-
tanglement in personal problems and desires, playing up his
anger, jealousy, homesickness, or other passions until he has
developed a state of emotional confusion and instability. He
may create in the subject a sense of insecurity and anxiety
by becoming vociferous, kicking furniture around, banging
on the table, and giving vent to well-acted rage, until the sub-
ject is willing to talk simply to escape this wrath. He can
let the subject know that he is fully familiar with Soviet in-
terrogation tactics and could practice them himself if pro-
voked by continued lack of response to humane methods. He
can bluff with specific threats if he is sure the bluff won't be
called.
Sometimes it is decided to use two interrogators with two
completely different approaches, the first displaying a great
deal of aggressiveness, discourtesy, bluster, and threat, the
second soft-spoken, kind, and sympathetic. The subject often
comes to look to the second man for sympathy and protec-
tion from the first, and eventually converses freely with him.
If the subject is especially stubborn, he may be moved to
the windowless room with only a small light built into the
wall. He is deprived of most of his cigarette rations and read-
ing materials. Only his underwear is left for clothing. He
has very little chance for suicide with no light cord and little
clothing. He is not permitted to shave. He is deprived of all
human contact and attention except for being brought basic
sustenance. The interrogator keeps reminding him that he
wants to be a friend, that he would like to ease the discomfort,
that he could make everything all right if only he had a state-
ment of the full truth, whatever it might be. Most people,
and especially the gregarious and talkative Slav, cannot en-
dure this prolonged confinement in utter loneliness, and in
time become willing and eager to talk freely, resorting to the
interrogator as their only friend.
2Approved For Release 2005/03/16: CIA-RDP78-039211&b68 0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Interrogation SECRET
If the bewilderment of loneliness does not produce results,
however, two or more interrogators familiar with all of the
facts of the case may take turns at continuous interrogating,
so that the subject cannot rest and keep his mind clear. His
resulting confusion leads to slips that disclose new evidence.
Under further continuous questioning he usually reaches in
time a point where he sees no sense in resistance and makes
a confession. When the confession is reduced to writing and
signed, a probing for details should commence immediately,
tempered only by the subject's condition at the time.
Among the psychological pressures that can be brought to
bear at various phases of these techniques are the following:
Pointing out the subject's untenable position, the fallacy of
his story, persuading him that his service sold him down
the river by providing him with such a stupid legend; em-
phasizing that American intelligence has no interest in
punishing him, but does have interest in his cooperation
in the future.
Isolation in a dark, sound-proofed room, depriving him of
sight, hearing, and mobility; consequent development of
claustrophobia. (A psychiatrist should check to ensure
that his sanity does not reach the breaking point.) Re-
turn to isolation after removal and requestioning with-
out response.
Irregular scheduling of interrogation, waking subject say at
2 a.m. for a six-hour debriefing and on the following day
at 1 a.m. for a 12-hour session.
Alternating light and dark, preventing rest and sleep.
Sound waves.
Creation of terror illusions.
Raising or lowering temperatures to point of discomfort.
Limiting washing and latrine facilities.
Cutting food ration to minimum sustenance. Manipulat-
ing cigarette ration.
Jostling without actual physical harm.
Heavy physical training exercises.
Medical examination disclosing fictitious dread disease;
treatment to depend entirely upon the good will of the
interrogator.
SE RQT 27
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
If all else fails, the interrogator may request permission
to use drugs and narco-hypnosis or hostile methods that may
endanger the subject's mental and physical health. The need
to apply hostile methods represents a degree of moral victory
for the suspect even though he may subsequently confess.
Before making such a request the interrogator must have
exhausted all other means, must be convinced beyond rea-
sonable doubt that the subject is an agent, and must have
reason to believe that his confession would reveal informa-
tion of critical importance to the national security.
The severer methods seldom need be used. Agents some-
times follow instructions to be insubordinate and insolent if
pressure is brought to bear on them, an attitude which bol-
sters their self-confidence and may also incite an interroga-
tor into thoughtless punitive action that in turn reinforces
the agent's resentment and increases his will to resist. But
the exceedingly stubborn agent suspects are relatively few.
Most suspects, after a period of shocked innocence and steady
denials, suddenly and recklessly confess. When the interroga-
tion first became unfriendly they realized that they were sus-
pect, and their worry, loss of sleep, and fear of the future
began eroding their will to resist, especially if they had been
forcibly recruited by the intelligence service, having neither
stomach for espionage nor patriotic motivation.
Under these conditions the interrogator can utilize his
subtlest weapon, his art of asking just the right question at
just the right moment, and in just the manner to elicit an
answer that may lead to a confession. The questioning may
either aim directly at the discrepancies in the defector's story
or search roundabout and apparently random paths for clues
to concealed facts.
When a confession comes too quickly, a thorough and probing
inquiry for detail should be made. The hostile services know
that a man cannot be successfully prosecuted for spying against
the Americans in Europe, and that if an agent confesses he
may before long be legitimately documented and free to carry
on any line of activity he wishes. The interrogator should
obtain as much information as possible about the ready con-
fessor's service and his purported intelligence activities.
When he seems to have told all he knows, he should be poly-
2Jpproved For Release 2005/03/16 : CIA-RDP78-03921AS60290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300295P84- .
Interrogation
graphed again. If discrepancies still exist, the interrogation
must be continued until they are clarified or until the per-
missible period of confinement is exhausted.
Operational Interrogation
In any case, the debriefing of a confessed agent for opera-
tional information should normally be conducted by the CI
interrogator. A confessed agent will frequently try to con-
ceal certain elements of his mission and training, and it is a
relatively simple matter for the CI interrogator to switch
from debriefing back to his old technique to impress the agent
with the error of his ways and obtain his subsequent coopera-
tion. When all operational information has been obtained
he can be transferred if desired for regular PI debriefing.
The CI debriefing should cover:
Name, rank, position, unit, personality description, and all
details regarding his case officer and any other intelli-
gence personnel with whom he has been associated.
Assigned mission, in detail, and time limit for completion.
Area in which the mission is to be performed and main
target field-American intelligence, military installa-
tions, political organizations, emigre groups, economic in-
formation.
Exact method of crossing border and passing various check
points.
Communications, i.e., radio, codes, dead drops, courier, secret
writing, rendezvous points.
When recruited, how, and by whom.
Remuneration.
Intelligence training, i.e., location of school, names of in-
structors, kinds of courses taken, duration, number and
names of other students, unit sponsoring the school.
Documents, currency, equipment, and clothing furnished
for his mission.
Names of any persons who may have assisted him to cross
the border.
Method of accomplishing his mission.
Extent to which the mission has been accomplished.
Knowledge about his own intelligence service, its organiza-
tion, command structure, personnel.
Knowledge about American intelligence.
gorR T 29
Approved F Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Interrogation
Any special knowledge he may have.
Overall positive and operational intelligence knowledge.
Extreme caution must be exercised when a confessed agent
discloses his knowledge readily, divulges important-appearing
information, and offers his services as a double agent. It is
quite possible that, acting according to the hostile intelligence
service's plans, he is making a play to gain the confidence of
American intelligence. The authenticity and completeness of
his operational statements should be rigorously checked on
the polygraph.
If the results of probing operational interrogation and of
the polygraph examination are compatible, then a double-
agent play may be considered. Upon the man's agreement
to work for American intelligence, his true intentions must
be examined again by polygraph with extreme care. It is de-
sirable to place him under careful surveillance and closely
evaluate the take resulting from his activities. He should be
checked periodically by all possible means.
3 Approved For Release 2005/03/16 : CIA-RDP78-03921-W~T00290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029SOEQL9 ET
Some past results and future
prospects for technical instru-
ments to sense deception.
THE POLYGRAPH IN AGENT INTERROGATION
Chester C. Crawford
Philosophers and psychologists, and indeed most of man-
kind, have always been fascinated with the phenomenon of
lying as an aspect of human behavior. It is only during the
past sixty years, however, that researchers and investigators
have proceeded beyond the study of its cognitive phase (the
decision to lie) and behavioral phase (the overt act which de-
ceives) to examine its emotional phase (the ensuing bodily agi-
tation), which is the most significant of the three for purposes
of detection. It is therefore only recently that attempts to
detect deception have advanced from the uncertainty of per-
sonal judgment and the brutality of primitive physical ordeals
and torture to the use of scientific aids in humane interroga-
tion. The "lie detector" or polygraph in use today, a simple
but sensitive device for tracing blood pressure, respiration,
and perspiration, is the most advanced instrument thus far
developed for the detection of deception.
Deception is intrinsic to espionage activity: the ability of a
clandestine operator to deceive his opponent is his most critical
qualification. Conversely, however, the ability to detect the
deceptions of the opposition is the most critical requirement
of a counterintelligence force, and it was inevitable that the
polygraph would become a counterintelligence aid. Although
the use of this instrumental technique is associated in the
popular mind primarily with criminal apprehension, the his-
tory of its application in clandestine government operations
is almost as long as that of its connection with police matters.
One of the first plans for instrumental means to detect. de-
ception was in connection with clandestine operations. In
October 1917, at the request of the Psychological Committee
of the National Research Council, research was undertaken
at Harvard University to investigate the value of using instru-
MORI/HRP
from pg.
31-37
~~FF 31
Approved sFF8'T%elease 2005/03/16: CIA-RDP78-03921A000300290001-3
S (.proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
The Polygraph
ments in deception tests on World War I court-martial cases
and in Military Intelligence Department investigations of sus-
pected enemy agents. Early in World War II an officer of the
Berkeley Police Department in California advocated the use
of the lie detector in the interests of national defense. In
1945 Leonarde Keeler carried out polygraphic experimenta-
tion on several hundred prisoners of war in Rhode Island with
an eye to assessing the practicability of lie detection programs
in government agencies.
Successes of a CIA Program
On 12 August 1948 CIA ran its first polygraph case-the
routine security screening of an applicant. In 1949 it began
planning the use, of the technique in Europe to test the hon-
esty of agents recruited for clandestine operations. In 1951
it conducted polygraph experiments in the Far East. By 1952
the CIA- polygraph program was. operating on a world-wide
basis. Its effectiveness in practice has firmly established it
as a valuable adjunct to clandestine operations.
Its achievements can be illustrated in three studies analyz-
ing the results of polygraphic interrogation over sample pe-
riods of ' time in operational cases from particular geographi-
cal areas. The first, covering the period ? from inauguration
to 1953, is based on the area interrogators' reports for some
three hundred cases. The use of the polygraphic technique
elicited not otherwise obtainable admissions of deception in
the following categories from the indicated numbers of the
300 agents.
Falsification of vital statistics (age, birthplace, employment,
education, etc.) ........................................ 32
Concealment of past membership in Communist and Com-
munist-front organizations ............................... 16
Concealment of other past Communist activities .......... 23
Deception regarding past association with hostile or friendly
foreign intelligence services 18
Deception regarding past criminal arrests .................. 22
Concealment of past undetected crimes ................... 17
Concealment of aliases ................................... 11
Deception regarding security violations 23
Deception regarding medical or mental treatment ........ 4
The filing of false reports ................................ 4
Deception regarding use of drugs .......................... 21
33pproved For Release 2005/03/16 : CIA-RDP78-03921b0290001-3
Approvet,Fo
e r_R~Ieae 2005/03/16 : CIA-RDP78-03921A0003002 E
In addition, 21 instances of deception indicated by the poly-
graph but not admitted were later confirmed through other
sources. Only 6 instances of indicated deception remained
unconfirmed.
Thus more than one in ten of the agents and prospective
agents had deliberately falsified his biographic data; honest
biographic mistakes were not counted as deception. More sig-
nificantly, six percent of them had hidden their past connec-
tions with other intelligence services. It is obvious that with-
out polygraphic interrogation this sample of 300 could not
have been properly assessed.
In another study 123 agent interrogation reports made in
a different geographic area from January to December 1958
were carefully examined. With the aid of the polygraph the
interrogators had obtained previously unknown information
in the following categories from the indicated numbers of the
123 subjects:
Biographic information .................................. 61
Counterespionage information 17
Past employment by a foreign intelligence service .......... 8
Present employment by a foreign intelligence service ...... 4
Fabrication of reports .................................... 5
Hidden ideological affiliations .............................. 5
This time at least half the agents were shown to have prac-
ticed deception of some kind, and the percentage is still higher
if the 61 listed as having misrepresented their biographies
does not include all the deceivers in other categories. Six
percent had worked for foreign intelligence services, and three
percent were still so employed. At least ten agents were ter-
minated as a result of these polygraph interviews. But about
fifty-and this is an important positive product of the poly-
graph technique-were cleared of allegations that had been
made against them.
The third study covers 70 agents interrogated between Jan-
uary and June 1959, who revealed previously unknown infor-
mation as follows:
Biographic information .................................. 24
Counterespionage information ............................ 2
Past employment by another service ..................... 10
Current employment by another service .................. 5
Fabrication of operational reports ........................ 11
Hidden ideological affiliations (usually Communistic) ...... 6
SECRET 33
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET The Polygraph
Here at least one agent in every three was shown to have
practiced deception of some kind. One in seven was found
to have had past connections with other intelligence services
and one in fourteen to have current affiliations. The poly-
graph interrogations led to the termination of at least five
of them, and twenty-three were cleared of allegations against
them.
In summary, out of about five hundred agents and pros-
pects whose polygraphic interrogations were analyzed in these
three studies, from ten to fifty percent revealed deceptions of
some significance. A total of thirty-six agents were shown
to have previously unknown connections with other intelli-
gence services, some of them current affiliations which pre-
sumably made them instruments of infiltration.
Procedures and Limitations
It should be strongly emphasized that these results, al-
though unobtainable without the polygraph, must not be cred-
ited to the polygraph in vacuo. They were achieved by pro-
fessional interrogators using the instrument as an aid to diag-
nose deception in their agent subjects. The interrogator is
thoroughly briefed on all aspects of the subject's personality,
from sense of humor to skill at sports, on all available bio-
graphic data, on questionable and verified items in the sub-
ject's account of his background, and on the extent of his
access to other intelligence services. He studies the reports
from any previous medical or psychiatric examinations and
from any previous interrogations, particularly any previous
polygraph tests. In consultation with the case officer he de-
termines the topics to be covered in the test and constructs
questions designed to elicit information on them. He is pre-
pared to probe for detail regarding the modus operandi, per-
sonnel, and tradecraft of a foreign intelligence service with
which the subject is suspected of having past or present con-
tacts.
The examination begins with a pre-test period in which the
interrogator and the subject preview the questions for dis-
cussion and qualification. The examiner often takes advan-
tage of this opportunity to make his own first-hand assess-
ment of the subject, chatting about apparently unimportant
matters and watching for any tell-tale reactions or idiosyn-
3Approved For Release 2005/03/16: CIA-RDP78-039216&90290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002?@81,3
The Polygraph
cracies that may be exploited in the test. The polygraph is
then connected and the test itself administered-perhaps
twice, four times, or on occasion many more. Then, when indi-
cated by a study of the charts, there follows a post-test inter-
rogation wherein an explanation, admission, or clarification
of recorded emotional responses is sought.
The polygraph lays no claim to one-hundred-percent reli-
ability. Test results can be as varied as the individuals tested,
and the interpretation of the charts is not a simple question
of deciding whether the subject reacted or did not react.
Many charts are quite definitive; but some indicate only a
probability, and from two to five percent of the cases tested
end up being classified as inconclusive, with crucial areas left
unresolved.
Although sources of error in the instrument itself can be
eliminated-it is not hard to maintain a perfectly function-
ing machine-the human variables in the interrogator and
the subject are less easily controlled. And while error poten-
tial in the interrogator can be reduced by careful selection
and long training, the endless variety of human subjects and
their endless variety of reactions to human situations will
not ever be subject to measurement with infallible precision.
Different subjects tend to put different weights on the value
of individual questions; deceivers may show emotional disturb-
ance only at the points where they know their fabrication is
weakest, and sometimes not even then.
For all this reservation, the polygraph technique has estab-
lished its place in clandestine operations. Although in many
situations there is no need for polygraphic scrutiny, the prob-
lem of veracity being more easily resoluble through other
sources, in many others, as these studies show, the duplicity
of an agent cannot be discovered without, the use of the poly-
graph. Add to these revelations the previously unknown in-
formation of a positive nature that is a by-product of an
agent's polygraph test and the many cases of confirmed ve-
racity that enable a. project to get under way, and the value
of the technique to clandestine operations becomes a thing
beyond debate.
A more general dividend realized from the polygraph is its
disciplinary effect on the agent. He is usually a better clan-
35
Approved Vor elease 2005/03/16 : CIA-RDP78-03921A000300290001-3
S~~~ETed For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
The Polygraph
destine operator after being polygraphed. He realizes that
he is working for a highly professional service, concerned
about security for itself and for him. He sees that he will
be expected to account for his activities. Loyal agents almost
always appreciate this attitude and look with greater respect
on the American service after their "ordeal."
An even greater role may be played by the technical detec-
tion of deception in clandestine operations of the future.
There are indications that sensational developments are about
to occur in its instrumentation, and drastic changes in tech-
nique made possible by the utilization of new recording de-
vices. The polygraph of the future may require no physical
attachments on the subject, perhaps utilizing electronic cir-
cuitry to tap physiological phenomena far more subtle but
every bit as diagnostic as the currently used blood pressure
tracings, respiration recordings, etc. It. is unlikely that im-
provements will ever fully eliminate the human variables that
make any technical assessment less than infallible, but a
paper written on this subject ten years from now may show
the uncertainties and limitations still further reduced.
BIBLIOGRAPHY
Barioux, M., Method for the Selection, Training and Evaluation of
Interviewers. Public Opinion Quarterly, Vol. 16, No. 1:128-130, 1952.
Benfield, Wilder, The Interpretive Cortex, Science, 26 June 1959, Vol. 129,
No. 3365, pp. 1719-1725.
Best, Charles Herbert and Taylor, Norman Burke, The Physiological
Basis of Medical Practice, Williams & Wilkins Company, Baltimore,
1955, Sixth Edition, pp. 1096-4098.
Biderman, A. D., Communist Techniques of Coercive Interrogation, Air
Intelligence Digest, 8:12-17, July 1955.
Bledsoe, Anthony H., The Lie Detector and National Defense, San
Francisco Police & Peace Officers Journal, 12 February 1941.
Conklin, E. S., Principles of Abnormal Psychology, Henry Holt & Com-
pany, 1944.
Dana, Homer J. and Barnett, Claude C., A More Sensitive Means of
Detecting and Recording Various Physiological Changes, a paper
presented before the meeting of the Instrument Society at Los
Angeles, September 12 to 16, 1955.
Dunbar, F., Emotions and Bodily Changes, New York, Columbia Uni-
versity Press, 1947.
Ellson, D. G., Detection of Deception, Indiana University, Bloomington,
Indiana, 1952, Office of Naval Research, Contract No. N6-ONR-180.
3
Approved For Release 2005/03/16 : CIA-RDP78-039211?96?60290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002i l9 3
The Polygraph
Fitzgerald, M. J., Handbook of Criminal Investigation, New York,
Greenberg, 1951.
Giogiade, C., Magic as the Origin of Lying and the Genesis of Thought,
Psychological Abstracts, Vol. 15, 1941, Abstr. No. 948.
Gray, H., Anatomy of the Human Body, Philadelphia, Lea & Febiger,
1954.
Hubbard, A. W., Phrasing Questions; The Question of Bias in Inter-
viewing, Journal of Marketing, 15:48-56, July 1950.
Inbau, Fred E. and Reid, J., Lie Detection and Criminal Interrogation,
Baltimore, Williams & Wilkins Company, Third Edition, 1953.
Karpman, Benjamin, Lying-Ethics of Neurotic and Psychopathic
Behavior, Journal of Criminal Law and Criminology, July-August
1959, Vol. XL, No. 2.
Keeler, Leonarde, Debunking the "Lie Detector," Journal of Criminal
Law and Criminology, Vol. XXV, No. 1, May-June 1934.
Lamott, K., Memoirs of a Brainwasher, Harpers, 212:73-76, June 1956.
Larson, John A., Lying and Its Detection, Chicago, University of Chicago
Press, 1938.
Levitt, Eugene E., Scientific Evaluation of the Lie Detector, Iowa Law
Review, 1955, Vol. 40, pp. 440-458.
Marston, William M., The Lie Detector Test, New York, Richard R.
Smith Company, 1938.
Marston, William M., Psychological Possibilities in Deception Tests,
Journal of Criminal Law and Criminology, Vol. XI, No. 4, 552-553, 1921.
Munn, N. L., Psychology, Boston, Houghton Mifflin Company, 1951.
Reymert, M. L., Feelings and Emotions, New York, McGraw-Hill Book
Company, 1950.
Trovillo, P. V., A History of Lie Detection, Journal of Criminal Law
and Criminology, 29 (6) 848 (1939).
Trovillo, Paul V., Report on Chatham Polygraph Program, Russell
Chatham Inc., Oak Ridge, Tennessee, April 14, 1951.
U. S. Army General School, Fort Riley, Kansas, Advanced Interrogation
Techniques, 1954.
U. S. Army, Provost Marshal General's School, Interviews and Interro-
gations, Camp Gordon, Georgia, 1953.
P~~ 37
Approve elease 2005/03/16 :CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET
Technical devices and plan of
operations for eavesdropping on
the adversary.
AUDIOSURVEILLANCE
Alfred Hubest
The relatively modern art of technical audiosurveillance is
the counterpart of audiocommunications, following like a
shadow close on the heels of every development in the latter's
techniques. Shortly after the first telegraph for commercial
purposes was installed between Washington and Baltimore in
1844, private individuals began intercepting its messages in
order to grab profits in east-west marketing manipulations,
to steal exclusive news stories, and to further other unlawful
purposes. By 1862 public concern over the interception of
telegraph messages was shown in California's enactment of
legislation prohibiting the practice. Extensive military use
of wire-tapping during the Civil War established it as a recog-
nized tool of the intelligence services of both armies.
Similarly, telephone tapping had its beginning soon after
the first commercial telephones were installed in 1878 in New
Haven, Connecticut. During the early 1890's it was practiced
to some extent throughout the entire country by private in-
dividuals, and police services had adopted it for active use. In
1892 New York State made telephone tapping a felony.
The clandestine installation of concealed microphones-
"bugging"-was not long in following. Newspaper files and
court records have for years been full of scandals and expo-
sures featuring not only the tapping of telephones and wires
but also the bugging of rooms, both by the police and by pri-
vate citizens. The records of intelligence services are less
readily available, but there is abundant evidence that even
in World War I intelligence made extensive use of microphones
along with other forms of clandestine eavesdropping. During
this period the monitoring of all kinds of communications
media, including radio, came into its own with the establish-
ment of large organized systems of illegal listening-in and
g~ 39
Approved E oRr~T Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
39-46
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Audiosurveillance
cryptanalysis as necessary arms of the military and political
intelligence services.'
During the past 10 years there has been a great new surge
in the use of audiosurveillance by intelligence services. This
phenomenon can be attributed in large part to the develop-
ment of improved listening, transmitting, and recording de-
vices, new installation tools and techniques, a systematized
operational approach to making audio installations, and ad-
vances in rapid processing and full exploitation of the take.
Technical Developments
All the many methods of audiosurveillance are variations of
three basic forms. First, both in frequency of use and in
volume of take obtained, is the telephone tap; second comes
the concealed microphone connected by wires with a recorder;
and third, the microphonic pick-up of a concealed wireless
transmitter in circuit with a monitoring receiver. There is
no mystery about any of these methods; the principles in-
volved are common knowledge among communications and
electronic engineers, and they are employed in practice to a
greater or less extent by all intelligence and policing agen-
cies and by private investigators. There is considerable varia-
tion, however, in the technical sophistication of these devices
and in techniques of using them for audio operations. Many
inventions for the development of hearing aids, radio com-
munications, broadcasting, and recording have been adopted
or adapted for use in organized eavesdropping. The men-
tion of only a few of these that have had an especially great
impact on audiosurveillance will serve to convey an idea of
the technical advances recently achieved.
It is now virtually impossible to detect when a telephone
is tapped by the most sophisticated methods without visually
inspecting every inch of the wires and every element servicing
it, down to the last screw connection. Only crudely placed
taps cause give-away noises such as clicks or crackling or pro-
duce easily detectable changes in line voltage. Electronic
search has been frustrated by the use of new devices. And
the tap can be made more productive by any of several effec-
'See Wilhelm F. Flicke, "The Early Development of Communications
Intelligence," Studies III 1, p. 99.
40
A
pproved For Release 2005/03/16 : CIA-RDP78-039214086290001-3
Approved For. Relea? 2005/03/16 : CIA-RDP78-03921A000300290001-3
udiosurveillance SECRET
tive techniques for "hot miking" which convert the telephone
into a microphone for general eavesdropping when it is not
being used to make a call.
For telephone calls an instrument known as the Dial Re-
corder automatically starts a recording on magnetic tape as
soon as the earpiece of the tapped phone is picked up. It
records the number of the outgoing call being dialed. It
transfers the conversation from the tap to the recorder at a
constant output level, so that a play-back of the tape will
show no volume variations with the distance of the answer-
ing telephone. When the earpiece is returned to its cradle
the recording is stopped. The electrical characteristics of the
Recorder's input section can be made such that an electronic
check of the line will not reveal the presence of a tap.
Developments in the hearing-aid field, together with the
invention of the transistor, have opened new horizons in the
design of miniature microphones, amplifiers, and recorders.
Highly efficient microphones only half an inch square and a
quarter-inch thick, small enough to hide behind a dime, are
now commercially available. Wires and shielding for them
have also been vastly improved, made stronger, more resist-
ant to weather and bruising, and at the same time thinner:
some of them are no thicker than a human hair. Miniature
pre-amplifiers combine with the high-quality microphones and
new mike wire to make possible runs to greater distances with-
out loss of signal, deterioration from moisture, or rupture un-
der stress. Telephone lines have also been turned to use as
clandestine carriers.
Transmitters have undergone a similarly tremendous
change with the advent of transistors. The small size of
these elements and the fact that they generate no heat have
opened the way to miniaturization, and their low current re-
quirements have made it possible to design smaller and bet-
ter batteries for use with them. We now have self-powered
transmitters only slightly larger than a package of cigarettes.
Both these and current-powered transmitters can be equipped
with remote-control switches to turn them off during inspec-
tions by countermeasures technicians or simply to prolong
their service life. They are made in a variety of different
shapes to facilitate concealment.
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Audiosurveillance
There has also been considerable improvement in the tools
and materials for making audio installations-quiet drills,
pipe-pushers, collapsible ladders, acoustic plasters that need
no audio opening, better paints and paint-matching methods,
and an array of new techniques for installing microphones
without actually entering the target area. The countermeas-
ures technician can only hope to find traces by examining all
wail surfaces for merest pinpricks and exploring behind every
crack in the walls and floors, as well as every fixture and elec-
trical outlet.
Important corollary advances have been made in the de-
velopment of recorders. The first magnetic recorders, pat-
ented in 1898, used wire as the storage medium. They were
inefficient, however, and further development was slow. It
was not until 1935 that tape coated to retain magnetic im-
pressions was successfully, if still cumbersomely, used for audio
recording, and not until 1948 that it was developed to the
point that it revolutionized broadcasting practices.
Up to that time the effectiveness of audiosurveillance in in-
telligence operations had been limited by its dependence on
bulky and inefficient equipment and, more importantly, by the
requirement that a monitor familiar with the language, dia-
lect, and terminology actually listen to the live conversation
and with the help of notes retain the desired information
from this single hearing. The advent of an efficient tape re-
corder brought a completely new concept of audio operations.
Recordings could now be taken to a processing point for full
transcription and thorough analysis. The fact that three or
four hours are now devoted to processing each hour of tape,
and considerably more if there are several different languages
on it, gives some measure *of the limitations from which audio
operations have been freed by the availability of a compact,
dependable recorder of high fidelity.
Effective systems of processing the recorded material have
been evolved in order to extract quickly items of immediate
intelligence or operational value. These systems feature
both technical advances and other processing devices. Fun-
damental factors are the improved fidelity of the take and
the training of personnel in translating and evaluating it.
The accumulation of voice libraries and aids like lists of dou-
Ipproved For Release 2005/03/16: CIA-RDP78-03921A CJ0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029RQEIg~i.
Audiosurveillance
ble meanings have also helped to get more out of the raw
material. IBM machines and other electronic classification
devices are being used increasingly to speed up analysis and
tabulation of the product.
Organizing an Audio Operation
Viewed from an operational standpoint, the setting up of an
audio installation must be the execution of a "perfect crime."
It must be perfect not only in that you don't get caught, but
also in that you give no inkling, from the inception of an op-
eration until its termination sometimes five years later, that
such an operation was even contemplated: any show of in-
terest in your target would alert the opposition to lay on
countermeasures. This secrecy and smooth dispatch require
much foreknowledge, a well-laid plan, and the synchronized
coordination of a many-talented team.
Today's audio operations are a far cry from those of the
very recent past, when the responsibility for making an in-
stallation would simply be turned over to a technician. The
audio installation team now includes operational officers who
are experts on the area, skilled in the tradecraft necessary
for the particular operation, and professionally committed to
the success of the job. They work in unison with technicians
who take pride in demanding of themselves that each job show
the flawless perfection of a masterpiece and who have the ver-
satility to become at different times master carpenters, plumb-
ers, masons, plasterers, painters, gardeners, laborers, and
artists.
Since most audio operations are directed against targets of
opportunity, they must be got under way on short notice.
It is therefore necessary, in any given locality, to have accu-
mulated data in advance regarding local building practices,
radio frequencies in use for civilian and military purposes, tele-
graph, telephone, power, and water plants, equipment, meth-
ods, and service practices, traffic patterns and regulations,
local policing capabilities, and other pertinent conditions. A
capability for covert casing and surveillance must also have
been established in advance. Then when an opportunity for
making an audio installation presents itself, the local opera-
tional officers, having this background information on hand,
can concentrate on casing the target and collecting the spe-
SSE~ E 43
ApprovedfFor RRelease 2005/03/16 : CIA-RDP78-03921 A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-Q 3921AQ00300290001-3
SECRET Audiosurverllance
cific information necessary to plan the operation while they
are awaiting the arrival of technicians.
When all the required information, together with photos,
sketches, and floor plans of the target in its orientation to
the listening post, has been assembled and screened, the op-
erational officers and technicians together formulate a plan
that covers in detail all the facets of the coming operation,
however complex it may be. In every case the plan will con-
tain the following elements:
Cover and method for approaching and entering the target
to be bugged or the place where a line is to be tapped.
Preparation of the required tools and equipment and
method of packaging and delivering.
Protective surveillance prior to and during the operation,
with a primary and an alternate means of communica-
tion between the surveillance team and those inside the
target.
Membership of the team assigned to the job, its chain of
command and distribution of responsibility.
The specific assignment for each man, and how it is to be
executed. For example: planting the mike or transmit-
ter and the exact method to be used; digging a channel
in the garden; manning the communications link with
the surveillance team; checking for any tell-tale traces
of the work done-scuff marks, scratches, bits of wire,
etc. No detail is left unassigned.
Manner and timing of departure from the target on com-
pletion of the job, and alternatively in the event of emer-
gency.
The operational plan is set forth on a master sketch of the
area, so that each move is marked out much as in the diagram
of a football play. When the action begins every man will
know exactly what he is to do and when.
Equal care is exercised in renting and establishing a listen-
ing post to monitor the target: a never so perfect installa-
tion would be useless if compromised before activation by at-
tracting attention to the listening post or the monitors being
quartered there. These arrangements must usually be so han-
dled as to assure secure operation over a long period of time,
sometimes years. And finally, with the greatest circumspec-
44pproved For Release 2005/03/16 : CIA-RDP78-039248b& 0290001-3
Approved For Relea$e 2005/03/16 : CIA-RDP78-03921A0003002
Audiosurveillance E
tion of all, communications are established from the listen-
ing post to the intelligence center receiving the take; the ex-
posure of this link would not only spoil a particular operation
but set off a compromising chain reaction that might have
far-reaching effects on the intelligence service itself. The
whole operation is undertaken in full awareness that it. will
be only as successful as its weakest point, and no foreseeable
circumstance is left to an on-the-spot decision.
Countermeasures
Our Sino-Soviet bloc adversaries are aware of the danger
of audiosurveillance-more so, unfortunately, then we-and
accordingly take elaborate precautions to thwart our efforts.
In selecting new quarters for diplomatic or trade mission
offices, they regularly make it a point to show equal interest
in as many as eight or ten different buildings at the same
time, and at the last minute close a deal for one on terms of
immediate occupancy. They then post a guard and closely
supervise any alterations or improvements to be made, in
most cases selecting their own contractors. They are likely
to import their own equipment and technicians to set up the
internal telephone switchboards. In some cases they have
dug a trench six feet deep around the entire building, and
have severed and inspected every pipe and wire servicing the
installation. Their technicians "sweep" the premises imme-
diately upon occupation and periodically thereafter. They
take similarly great pains to protect the residences of their
officials abroad.
Despite these extreme preventive countermeasures, we have
continued to operate successfully against them. Our opera-
tions, profitable during normal periods, sometimes become
even more productive during crises when security is sacrificed
for speed and clarity.
Our success in the face of such vigilance makes dubious the
security of our own overseas offices against hostile audio op-
erations. Although it is not proposed to treat here the coun-
termeasures we should take, it should be noted that we are
mere sitting ducks by comparison. Since March 1949, when
the first hostile audio device was found in the Prague residence
of our military attache, several hundred have turned up in
45
Approved or elease 2005/03/16 : CIA-RDP78-03921 A000300290001-3
proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
E.RET Audiosurveillance
many locations, mostly behind the iron curtain; and their
advanced technical sophistication is illustrated in the Great
Seal installation recently publicized by Ambassador Lodge.
Yet, even after more than 100 devices were discovered in the
first few months of 1956 and the National Security Council
alerted the intelligence community to take countermeasures,
U.S. installations overseas have tended to be complacent about
being targets of hostile audio operations. A thorough exposi-
tion of the dangers and of the possibilities for countermeasures
should be the subject of an article in a future issue of this
journal.
4Approved For Release 2005/03/16 : CIA-RDP78-03921 1%969;0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002 W
Some of the possibilities, meth-
ods, and results of submitting
written materials to examina-
tion by test tube and micro-
scope.
LABORATORY ANALYSIS OF SUSPECT DOCUMENTS
James Van Stappen
Seven or eight years ago an intelligence officer came into
possession, under circumstances which aroused his profes-
sional ardor, of a small scrap of notepaper bearing only an
address and a very common first name scribbled underneath
it. For two years he persisted in trying to identify the writer
of this note, collecting handwriting specimens from a num-
ber of likely places and submitting them for laboratory com-
parison. Some of them matched the original. The points
of venue of these marked the writer's trail through several
trouble-ridden countries, but none identified him. Finally,
back in his own country, the traveler wrote to one of the pro-
spectively useful acquaintances he had made on the trip, and
this correspondent was careless enough to let the letter fall
into our intelligence officer's hands. Verified as the same
handwriting, it gave a complete name and home address. A
search of visa records and other materials on file now yielded
the true identity of the writer, his cover story, background,
and even photographs of him. He is a Soviet intelligence offi-
cer, who since then, thanks to this identification, has unwit-
tingly kept us informed by his presence of certain activities
of his organization.
For twelve years, beginning during World War II, an agent
in Europe had provided generous and significant reports from
around and behind the iron curtain. He had apparently: built
up a network of informants extending deep into the denied
areas. But now a sharp-eyed postal intelligence officer no-
ticed an incorrect postal cachet on one of his envelopes, and
his whole file of 300-odd reports was therefore brought to the
questioned document laboratory. Analysis showed that, the
g 47
Approved ForRREE Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
47-55
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Suspect Documents
reports were written by eight different typewriters, which
might correspond to eight different informants; but some re-
ports from widely separated places had been produced on the
same day by the same machine, and the principal agent's own
correspondence turned out to have been written on one or
another of the typewriters supposedly used by his secret in-
formants behind the curtain. It was not a crude paper mill,
but careless enough to get caught, finally.
At a time when one of the countries that are pulled between
East :and West was negotiating for a tremendous Western
loan, one of its pro-U.S. representatives, a personage interna-
tionally well known, offered a letter typed on blue stationery
as a sample of the Communist blandishments which he was
trying to resist. An awkward signature prompted the sub-
mission of this letter to the questioned document laboratory.
The signature was found to be indeed a crude attempt at
handwriting disguise, executed in American-made fountain-
pen ink, Waterman's Blue Black. The blue watermarked sta-
tionery could have been bought only in Australia or New Zea-
land, on the other side of the world from the purported Com-
munist writer. Moreover, the Communist's letter was typed
on the same machine-a 1927 Underwood Standard rebuilt
after 1940-that this Friend of America had some time before
used to address an envelope to us. A file of miscellaneous doc-
uments our Friend had turned over to us in the past was now
examined, and all were found to be forgeries. Upon interroga-
tion .he admitted his duplicity and begged not to be exposed.
These are three of the more startling questioned document
cases of the 1,500-odd on file, some of them not worth to
anyone the paper they were written on, some of international
consequence. They include analyses of propaganda leaflets
which led to the very presses that printed them. They in-
elude restorations of charred documents, erased and obliter-
ated writings, carbon paper impressions, and writings in-
dented on sheets of paper underneath the ones used by the
writer. They include the investigation of crank letters and
of forgeries using both Dulles brothers' names. They include
examinations of credentials, complementing the work of the
4Approved For Release 2005/03/16 : CIA-RDP78-03921 1M3b0290001-3
Approved or Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Suspect Documents SECRET
identity document analyst 1; in one outstanding case a sus-
pected hostile agent's passport was found to have 27 record-
able errors in make-up, and a complete physical analysis dis-
closed its probable area of origin and a considerable amount
of information on adversary capabilities and modus operandi
in agent documentation.
Of the tell-tale manifestations by which any intelligence
operation necessarily runs the risk of exposing itself, docu-
ments constitute one of the most rewarding to the investi-
gator. Being as they are a permanent, physical item, they
are devoid of the human foibles which so often bear uncer-
tain witness-poor observation, bad judgment, opinion and
hearsay, insincerity, malice. Used to support duplicity, they
often, under expert analysis, tell the truth, and in many
cases much more, not only exposing the particular operation
that occasioned them but supplying intelligence of far-reach-
ing significance. By laboratory examination it may be pos-
sible to develop the complete text of indented or other im-
perfect writings, establish the validity of a document, detect
any alterations or erasures, identify the author by analysis of
the handwriting or typewriting, determine the kind, specific
type, origin, and approximate age of the paper and ink used,
and find the kind, specific type, and origin of the writing in-
struments.
Analysis of Paper
Although a document is legally defined as being of any ma-
terial on which marks may be inscribed, including gravestones
and in a recent case a silver goblet engraved with Josef Sta-
lin's true signature, the material used for most documents is
of course paper. The laboratory analysis of paper must take
into account its color and opacity, the size of the sheet, its
weight and thickness, its fiber content, the direction of the
grain, the finish, and the watermark. Comparison in these
respects with exhaustive files of domestic and foreign paper
stock samples serves to identify most papers. If the paper is
a common, low-grade type, it will yield no clues to the origi-
nator of the document except perhaps his area of operation.
For a description of this field see David V. Brigane's "Credentials-
Bona Fide or False?" in Studies IV 1, p. 37ff.
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-39
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Suspect Documents
But if it is a rarer and more expensive one, with few dealers
and retail outlets, it may be possible to trace through these
the limited number of people who had access to it. A unique
paper may be, and in actual cases has been, traced to a single
individual. The secret markings that identify paper used by
governments, banks, and other official organizations are also
many of them on file along with the paper stocks, as an aid
in checking the authenticity of official documents.
It can be established that a document is forged by showing
that its paper is not as old as its purported date. Sometimes
the age of the paper can be determined from its composition
or watermark, by referring to a file of manufacturers' for-
mulas and watermarks in use at different dates. More often
it is necessary to measure the effects of age on its chemical
content and color, taking into consideration the type of fiber
in the paper and the climatic conditions under which it was
stored. Using chemical reagents and a tintometer or similar
instrument for gauging shades of color, the expert can usually
determine the approximate age of the paper. If the paper
has been artificially aged, a practice forgers often try, the age
test will not be valid; but the false aging can often be de-
tected and the document thus proved a forgery.
Analysis of Inks
The identification of an ink is begun by determining the
type to which it belongs. The three chief types in use today
are gallotannic (the most common), chromic, and anilin.
Others are China ink, the colored vegetable-dye inks, a few
dark ones like those made from wolfram and vanadium, and
those for special application as for mimeograph and stamp
pads. Chemical differences enable the laboratory to identify
these types.
The age of the ink, which has the same bearing as paper age
on the validity of a document, may sometimes be determined
through data on file regarding changes in the manufacturers'
formulas. Waterman, for example, has changed formula four
times in ten years, so that a sample of Waterman's may often
be associated with a particular period of manufacture. An-
other test is color. Permanent inks contain a temporary dye
which soon fades, an iron and sulphur compound, and a weak
acid. The action of the acid, oxygen, and humidity produces
50Approved For Release 2005/03/16 : CIA-RDP78-03921 30290001-3
Approvec~For ReIIase 2005/03/16 : CIA-RDP78-03921A00030029SOt09. .
uspec ocumen s
first a dark color and then over a period of years a slow fading
to a weak stain. By using chemical reagents, the age of the
ink can be approximated by comparing its color, taking into
consideration the color of the paper, with standard color
charts. If ink has been artificially aged the age test is im-
possible, but the induced aging itself is sometimes detectable.
Writing Instruments
When a stroke of ink writing is magnified fifteen or more
? times, the .two tracks made by the point of the pen stand out
much clearer than the line of ink between them. If the pen
is new, the width of these tracks, compared with standard-
brand widths shown in test charts, sometimes serves to
identify the type of pen. When a well-worn pen has been
used, the difference in width and appearance between the two
tracks usually indicates whether the user is right- or left-
handed. If a pen is worn badly enough, it may leave regular,
easily identified scratches which provide positive identification
of the very pen itself. The fact that most people fill their
fountain pens with different kinds of ink at different times
may also serve to identify an individual pen through the
unique combination of inks in it.
The ball-point pen is more easily identified than an ordinary
one. It uses a unique ink, there is a specific width of the ball
point for each brand, and the surface of the ball, smooth as it
may seem to the unaided eye, is really full of scratches which.
leave a pattern on the paper-the pen's own fingerprints.
Any non-standard type of pen is the more readily identified
because of its scarcity.
If a document is written in pencil or crayon, the laboratory
may be able to determine the formula of the material and
through file comparisons perhaps identify the manufacturer.
The age of pencil or crayon writing can be determined only as
to whether it was done within the last ten or fifteen days. A
unique or unusual pencil or crayon may possibly be traced
to the individual who used it.
Identification of Handwriting
Handwriting, like other physical acts performed by adults,
is characteristic of the individual writer; there is probably no
act more characteristic of an adult than his writing. It can
SECRET
51
Approved For Release 2005/03/16 :
CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Suspect Documents
therefore be used for positive identification of the writer
through comparison of the unknown specimen with known
writings. This comparison is a matter not only of letter forms
but also of many other characteristics, among them move-
ment, muscular habits, pen position, line quality, shading, re-
trace, proportion, connections, spacing, and embellishments.
If a sufficient number of similarities are found between a
known handwriting and the questioned specimen, with no dis-
similarities which cannot reasonably be accounted for, it can
be concluded that both were written by the same person.
A person's handwriting is developed by constant repetition
over the years until it becomes second nature to him, a suc-
cession of deeply ingrained habits. The obstacles which con-
front a forger or a disguiser of his own writing are therefore
manifold and great. It is practically impossible for a writer to
divorce himself from certain inherent characteristics mani-
fested in pressure points, pen lifts, the shading of strokes, etc.,
of which he is not even aware. In order to succeed in a forgery
he needs not only to throw off his own characteristics but to
assume the inherent characteristics manifested in another
person's writing, also a virtual impossibility. Handwriting
comparison, however, should not be attempted by an amateur.
Its most difficult aspect is evaluating the weight to be given
each of the various distinguishing characteristics.
Typographical Identification
The identification of typewriting is similarly based on a
sufficient combination of peculiar characteristics. Some of
the more outstanding of these characteristics are the defects
in type faces, the design of the type, misalignment due to mal-
adjusted type bars, and uneven printing due to twisted type
faces. The make and model of a typewriter can be determined
by an examination of its product, and a used typewriter can
be individually identified with certainty. Since manufactur-
ers change type design from time to time, a document may
also be proved fraudulent by showing that its type was not
yet manufactured at the. time of its purported date.
Aside from type design and the individual peculiarities of
used type, the machine may be identified as one on which worn
type has been removed and replaced with a new set. This
new "retread type" may be distinguishable by its sharp, angu-
5Approved For Release 2005/03/16: CIA-RDP78-039210990290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002900013
Suspect Documents SECRET
lax corners, by special retread designs, or by comparison with
the type faces of the numerals, which get little use and are
rarely changed, and therefore will not match the retread font
used for the other characters.
It is occasionally possible to identify the individual who
typed a document from his habit of using particular pressure
on certain keys, making unique mistakes, and in some in-
stances using unique spacings. If a suspect is made to type
a dozen copies of the questioned document on the same ma-
chine, he will follow the same psychological patterns each
time, and a comparison of the test specimens under magnifi-
cation with the original document will make it apparent that
they were typed by the same person. A person who uses the
"hunt and peck" system, for example, characteristically hits
the period so hard that he punctures or almost punctures the
paper. Many people put much more pressure on combina-
tions of letters found in their own names than on the other
letters they type.
The Submission of Questioned Documents
The fruits of this analysis are available, of course, only
when documents have been questioned or found suspect and
submitted to the laboratory. This questioning is generally
the obligation of the intelligence officer who first receives a
document or of some staff analyst who finds that it does not fit
well into the pattern of things already known about a case.
The decision to request technical aid for analysis of written
materials connected with an operation has in retrospect often
turned out to be the most important decision made during its
course. The use of this facility for counterintelligence pur-
poses has been a steadily growing thing, for every find encour-
ages other intelligence officers to bring dead files back to life
for comparison with the newly identified material. Different
areas have on numerous occasions found, when certain docu-
ments were compared, that they were host to the same ad-
versary agent.
Many intelligence officers, however, still overlook the very
evidence which might successfully terminate a case for them.
It is often thought, for example, that a handwriting expert's
services are necessary only when a document is suspected of
being forged, whereas the results of expert examination may
R E~ 53
Approved-For RRelease 2005/03/16 : CIA-RDP78-03921A000300290001-3
Ap, roved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Suspect Documents
be much more far-reaching in identification cases. The hand-
writing on an automobile ownership certificate, a piece of pa-
per found at the scene of a meeting, an ink offset on a blotter,
notations in a memorandum book, or any of a multitude of
other writings may upon analysis prove to be of value to an
operation. In clandestine operations where secret writing is
used as a means of communications, it is often advisable to
have the developed secret writing, as well as the cover letter,
checked in the questioned document laboratory against the
possibility that the agent has been killed, captured, or
doubled and his communications taken over by the adversary.
An earlier article in the Studies 2 showed the value of this pro-
cedure also for the purpose of assessing the agent's stability
under strain.
In order to obtain a maximum benefit from the laboratory
analysis, the intelligence officer should exercise great care in
collecting and preserving the documents he submits. He
should make every attempt to get samples of a suspect's hand-
writing without his knowledge-his signature on pay vouchers,
for example, or reports or letters in his natural writing. The
highest quality of evidence is an uncontaminated original doc-
ument. Anything less than that, such as a photocopy, is bet-
ter than nothing, but still yields only qualified results. When
it is known in advance that a document is to be submitted to
the laboratory, it should be enclosed in a transparent plastic
envelope large enough that folding is unnecessary. Thus pro-
tected, it can be read in transit on both sides and handled
without soiling, wetting, or any physical alteration that might
modify or destroy elements of the evidence.
This brief review should be sufficient to show that the sci-
ence of questioned document analysis requires highly qualified
professionals and, like surgery, should not be attempted by do-
it-yourselfers. Among the cases on file that attest to the haz-
ards of self-service in this matter is that of the 12-year-old
paper mill cited above; it would have been detected at least
two years sooner if the case officer involved had not imagined
he could train himself in the technique. Even the experts
employed in Washington are professionally impotent if sepa-
2 "Graphological Assessment in Action," III 4, p. 49fi.
54 gOU030RET
Approved For Release 2005/03/16 : CIA-RDP78-03921A0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290 0
Suspect Documents SE R
rated from their standards, specimens, files, reference ma-
terial, and technical facilities. Therefore this work cannot
be done on a local basis in the field with any assurance of suc-
cess.
55
ApprovedSPbPRelease 2005/03/16 : CIA-RDP78-03921 A000300290001-3
Approved For Release 2005/03/16: CIA-RDP78-03921A000300299VO
The sharp-eyed philatelist spots
vestiges of wartime intelligence
operations and learns some-
thing of their nature.
POSTAL FORGERIES IN TWO WORLD WARS
Gordon Torrey and Donald Avery
The history and high state of development of stamp collect-
ing has long since made collectors alert to forgeries of postal
stamps. Not long after the first stamp appeared in 1840
forgery began to plague collectors, and as early as 1862 a
Brussels dealer published a treatise on the subject. As
stamps proliferated and the rarer early issues brought a
higher price, the forgers' techniques improved. Collectors
were forced to educate themselves in methods of production,
papers used, postal rates, and cancellations. Today thousands
of collectors in all countries can differentiate at a glance
among fine color shadings, perforation gauges, papers, and
printing methods.
Government-sponsored postal forgery for intelligence pur-
poses began near the end of the first world war. Thereafter,
and again after World War II, collectors found on the philatelic
bourses of Europe both forgeries and political parodies of war-
time postage stamps. Although the intended or actual use
of these stamps is obscured from the public by government
secrecy, serious devotees of philately were able to identify the
origin of many issues by deductions from sketchy evidence and
a comparison of production techniques. They found that in
both wars stamp forgery proper was done only by the western
allies, and that of these the British were by far the most ac-
tive. For intelligence officers, the archives of the Central In-
telligence Agency contain definitive operational information
on American forged printings and reveal by analogy the prob-
able purposes of those sponsored by Great Britain.
Purposes and Problems
Postal forgery was done for purposes of psychological war-
fare rather than of espionage. Agent communications are in
r` 5
ApprovedTorRRelease 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HR
P from
pg. 57-69
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Postal Forgeries
such small volume that genuine stamps could be obtained and
used without risk. But the mass nature of psywar mailing op-
erations precluded purchase of genuine stamps from legiti-
mate dealers in neutral countries, once hostilities were un-
der way. A sudden demand in Sweden or Switzerland, for in-
stance, for 100,000 12-pfennig German stamps of the regular
1941 issue would have betrayed the probability of a mass mail-
ing operation, which then might have been traced to its
source before it started. Thus large-scale forging was the
only feasible approach.
Also to psychological warfare belonged the political parodies
of enemy postage stamps. Whereas the forgeries were a
means for disseminating black propaganda through the en-
emy postal services, the political parodies were themselves
black propaganda. The production of both kinds of stamps
was a sub-operation of complex and varied clandestine print-
ing enterprises that included stickers, leaflets, music, pornog-
raphy, newspapers, surrender passes, and false documents.
The elaborate stamp operation also usually produced forged
envelopes, addresses, postmarks, and sometimes even mailbags.
The quality of the intelligence forgeries varied considerably.
The British were by far the best because they were done by
regular postage stamp production facilities in England. Those
of the Americans and the French resistance were a good deal
poorer, reflecting the cruder production facilities available in
the field. It was apparently considered unnecessary to create
exact reproductions for mass mailing purposes, and imperfec-
tions were probably unavoidable because of wartime short-
ages of material and technicians. A major problem in some
British and all American issues was color control, achieving
and maintaining precisely the right mixture of the printing
ink; in wartime this is a problem even for legitimate postal
administrations. Field production required substitute print-
ing methods as well, with photolithography replacing en-
gravure. Paper shortages and the apparent lack of suitable
perforating machines led to other major technical discrepan-
cies. But the imitation of watermarks on postal paper
proved unnecessary: the watermark is undetectable once the
stamp is affixed to an envelope.
5Approved For Release 2005/03/16: CIA-RDP78-03921 0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Postal Forgeries SECRET
The production and operational use of postal forgeries
reached a climax toward the end of World War II. British
production, judging from the relative quantities of stamps that
eventually reached collectors and the time periods during
which the German and French originals were in use, appears
to fall roughly into two stages-a few issues of high quality
during the first years of the war, and more varieties of a
slightly poorer quality in later years. American postal for-
geries were first used in full scale in early 1945. Political
parodies also multiplied as the war went on, the intensifica-
tion of effort paralleling the social disintegration of Germany.
Opportunities to use the intelligence forgeries increased as
enemy postal services were increasingly disrupted, and the
divisive potential of the political parodies was augmented with
the growing prospect of Axis defeat.
Britain Takes the Lead
In 1918 the British, having decided to organize a propaganda
system to undermine the enemy will to resist, mounted from
Crewe House, their propaganda headquarters, an operation for
distributing antiregime pamphlets, leaflets, and newspapers in
the territory of the Central Powers. They planned to use
air drops but also to post propaganda to selected addresses
through the enemy mails. For this purpose they reproduced
regular-issue common-denomination stamps-the German of
10 and 15 pfennig, the Bavarian of 5, 10, and 15 pfennig, and
the Austrian of 5, 10, and 25 heller. All of these were probably
printed within the same period of a few months, and the die
proof of one shows the date "25 September 1918." The end
of the war overtook the project before it became operational,
but it is worth noting that it contained all the basic ingredi-
ents used by the allies during World War II.
When copies of these stamps appeared on the philatelic mar-
ket in 1921 the philatelists soon discovered where and by
whom they had been printed. They found, by comparing the
papers, printing methods, gums, and perforations, that they
could have been produced only in England, and only in the
plant of De La Rue and Company, one of the three printers
then making stamps for the British post office. The British
government, pleading the Official Secrets Act, has never ad-
mitted to authorship of these issues.
Approve EVtPke 2005/03/16: CIA-RDP78-03921 A00030029000593
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Postal Forgeries
British forgeries of
German stamps, 1918
French stamps
produced in the
U.K. in World
War II
"Cornflakes"
stamped envelope
and meter mark
taatanlt
(5eeh~udlukro~,l
E. BAEUMEL
~n
WIEN, 1
KANTVAISE. !
Approved For Release 2005/03/16: CIA-RDP78-03921AM290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Examples of many of the stamps described
in this article are currently on exhibit in
the CIA Administration Building.
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002 Rg13
Postal Forgeries
In World War II the first reported instance of postal for-
gery was a German operation: in December 1939 British
newspapers said envelopes containing German propaganda had
been delivered to British householders. These, franked with
stamps of neutral countries, had forged postmarks and had
not passed through the mails. But this early case is the only
evidence that the Germans were at all active with postal for-
geries, and the British held their lead.
The British origin of many forged French and German
stamps could be conclusively established by virtue of a slightly
misplaced pin in the perforation machine used in their pro-
duction. The resultant perforation drop at a certain posi-
tion in the second vertical row of stamps in each sheet is ex-
actly the same as that occurring in the regular British 1937
issues printed by the government's contract printer, Harrison
and Sons of London. It is therefore virtually certain that
Harrison's produced the stamps; they were definitely perfo-
rated on a machine owned by that firm.
French Stamps
Forgeries of French stamps used during the Petain regime
are practically all British in origin. Earliest were the 25- and
30-centimes values of the 1938 "Mercury" regular issue,
which was in use until 1942. The forgeries are typographed,
like the originals, and the color matching is very good. But
aside from minute but definite printing variations, they differ
from the originals in the gauge of their perforations. The
forgeries of the Petain issues could pass scrutiny the more
readily because of a wide variation in the printings of the genu-
ine French stamps resulting from the scarcity of proper paper
and inks.
The British also forged a single value of the "Iris" issue of
1939 and eight varieties of the Petain regular issue used from
1942 until the invasion. While no samples of the forgeries
have turned up in used condition, it is likely they were widely
and successfully used in the extensive agent operations run
against France from the United Kingdom.
A single forgery of the Petain issue was produced in France
itself by the French resistance movement at the so-called
"Atelier des Faux de Defense de la France" on the Rue Scribe
RE 61
Approved Vor"Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
m d For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Postal Forgeries
in Paris. Its actual use in mailing operations is questionable:
it is ungummed, printed on poor quality paper, obviously per-
forated differently from the originals, and lithographed in-
stead of typographed; the whole design is clogged with color.
Remainders were exhibited in November 1945 as part of the
production of the Atelier.
German Stamps
. Both the United States and Great Britain forged German
regular issues. That the British started early in the war is
evident in the existence of a forged 12-pfennig stamp of the
1933-36 issue with a portrait of President Hindenburg: by the
end of 1942 all stamps of this type had been superseded by
those with Hitler's portrait. This stamp is technically, the
most deceptive forgery of the Second World War; single copies
almost defy detection. It is identical with the original in
color, paper, perforation, and method of reproduction. It was
printed in sheets of four, however, and examples with sheet
margins are readily distinguished by a wide colored band not
seen on the margins of original sheets. It was used on en-
velopes, probably dropped inside Germany. An envelope with
stamp uncancelled, containing a propaganda leaflet and ad-
dressed to Munich, is extant. None showing postal usage
have been discovered.
I The British subsequently forged the 3-, 4-, 6-, and 8-pfen-
nigvalues of the Hitler head regular issue current from 1941
until the end of the war. They: were printed in accurately
perforated sheets of twenty (5x4) with plain margins, but the
forgery has no watermark and . the gum is yellowish rather
than clear. The engraving also can readily be differentiated
from the original by highlights on the portrait. It is fairly
certain that these saw operational use, probably in airdrops.
Military franchise labels for German army field mail were
also reproduced by the British and apparently used in dis-
seminating propaganda to troops on active duty. Except for
some small discrepancies of color and perforation the repro-
duction is quite passable. They were printed in sheets of
twenty with plain margins, rather than the colored and num-
bered margins of original sheets.
62
Approved For Release 2005/03/16 : CIA-RDP78-03921A6696 0290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Postal Forgeries SECRET
American forgery of German stamps was first made public
with the sale of President Roosevelt's stamp collection after
the war. The examples in this collection were accompanied by
a letter from OSS head General Donovan saying they had been
"printed in Switzerland by O.W.I. representatives" and used
since November 1942 in cross-border mailing of the Frankfurt
Zeitung and other propaganda material.
These forgeries are rather poor in quality and easily dis-
tinguished from the originals by a great difference in perfora-
tion, a poor cloth match, and in the case of the 12-pfennig
stamp by the fact that they were done by photolithography
while the originals were recess printed (engraved). In one
case the reproduction was reportedly so poor that a second
printing was necessary before it could be used.
Italian and Dutch Stamps
Only one forgery of an Italian stamp is known; details of
its production suggest that it is British. It is an unwater-
marked reproduction of the 25-centisimi green of the 1929-42
regular issue bearing the portrait of. King Victor Emanuel. It
is extremely deceptive, being readily distinguishable only by
sheet size (20) and the lack of a watermark. Like the origi-
nal, it was produced by photogravure, and its perforation
differed only very slightly from the original. In 1941 the only
printers among the allies with facilities and experience in the
photogravure process were Harrison and Sons, the owners of
the faulty perforation machine. The absence of further
Italian issues is probably accounted for by Italy's early sur-
render.
There was a very poor forgery of unknown origin of the
11/2-cent stamp of the 1934-46 Netherlands issue, used during
the war to mail printed papers. The reproduction was pre-
sumably intended for propaganda papers and leaflets. Its
poor technical quality suggests that it may have been done
by the Dutch underground in the Netherlands itself or with
makeshift facilities abroad. The color, paper, perforation, and
even size are wrong. The ink is a bluish gray, not the clear
gray of the original, and sunk into the paper. It could have
passed in a dim light, but it is doubtful that any postal clerk
used to handling the genuine article would be deceived.
RE 63
Approved 'or" Release 2005/03/16 : CIA-RDP78-03921 A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Postal Forgeries
Operation Cornflakes
In mid-1944 the Office of Strategic Services began planning
that led to the production of forged 6- and 12-pfennig stamps
of the regular German issue to be used for mass mailing of
anti-Nazi propaganda. Earlier attempts to disseminate propa-
ganda widely in the Reich had been frustrated by lack of ac-
cess. A complicated operation was devised by which the Army
Air Force, after shooting up enemy mail trains, would drop
faked German mail sacks containing subversive material in
forged envelopes alongside them.
During the first four months of 1945, 21 people in the OSS
Morale Operations unit attached to the Mediterranean
Theater of Operations were occupied in carrying out this
scheme, labeled "Operation Cornflakes." Their task was to
exploit the disintegration of German administrative functions
in the last weeks of the war by infiltrating printed prop-
aganda-principally the "underground" newspaper Das Neue
Deutschland-into the Reichspost. Their objectives were to
weaken further the will of the German people to fight, to in-
crease confusion in the communication and transport serv-
ices, and to convince the German people that there was an
anti-Nazi underground in Germany especially active in busi-
ness and banking circles.
"Cornflakes" was built up from scratch. Interrogators, un-
der cover of "administrative research," debriefed former mail
clerks among the German prisoners on postal procedures and
packing and labeling methods. The MO unit studied the lat-
est German postal regulations and reproduced German
stamps, postal cancellations, business stationery, and mail
sacks. A special unit in Rome culled from German telephone
books more than two million names and addresses in cities
all over the Reich, and typists addressed forged envelopes at
the rate of 15,000 a week. Some envelopes were addressed by
hand to provide a plausible mix in each bag.
The drops were executed by the 14th Fighter Group of the
15th Air Force, a unit which was successfully conducting low-
level air attacks against rail traffic in southern Germany and
Austria. The letters to be dropped on each bomb run had to
be so addressed that they would have been carried to, from, or
through towns on one of the rail lines on the day's hunt;
6 Approved For Release 2005/03/16 : CIA-RDP78-03921Ao 6 0290001-3
Approve 1 r oor Fe leases2005/03/16 : CIA-RDP78-03921A000300 3
and this meant that postal cancellations, prepared and pre-
dated in Rome, had to be stamped on the envelopes at the air-
field immediately prior to takeoff. In order to avoid the tell-
tale traces left by the ordinary leaflet bomb, a special bomb
was developed that would eject the mail sack from the canis-
ter on signal from a control button on the pilot's panel.
The 14th Fighter Group worked out its technique for the
mixed mailbag and high explosive bomb runs in several prac-
tice sessions and began operations in early 1945. The Group
would seek out an enemy train, preferably with a mail car at-
tached, moving north from southern Austria, and attack and
demolish it. The mailbags would be ejected from fifty feet
above the train, so that they would drop undamaged. In the
resulting confusion the bags would be picked up from the
debris and forwarded to the nearest post office.
In February and March 1945 ten sorties were successfully
run and about 120 mail sacks dropped. Prisoners interviewed
following the surrender of the German army in Italy verified
the receipt of Das Neue Deutschland through the military
post and said the paper was known as far north as the Baltic
ports. They reported it widely rumored in Germany that an
underground movement called "Das Neue Deutschland" ex-
isted in Austria and parts of Germany.
"Cornflakes" was not executed without mishaps, however.
At least one bag, dropped near St. Poelten, Austria, in Febru-
ary 1945, was neutralized by the misspelling of a return ad-
dress printed on an envelope. A German postal clerk noticed
the substitution of C for K in the word "Kassenverein," and
postal inspection followed. The project was also endangered
at one time by attempts of the screened German prisoners em-
ployed for hand addressing to use it for their own purposes.
They were discovered addressing envelopes for letters written
home.
Propaganda Stamps
Propaganda variations of enemy postage stamps resulted
naturally from combining the practice of stamp forgery with
the simultaneous production of miscellaneous propaganda
stickers and labels. They can be considered in two classes-
comparatively subtle changes meant to serve specific propa-
SECRET 65
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
wed For Release 2005/03/16 : CIA-RDP78-0392?A00003r00 290001-3
Osa es
Goering and Himmler
substitutions
Liberation
propaganda
Hitler
skulls
!IN V(HV RF;[TF~y W(T T
66 SECRET
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
ApprovedpFolr RIease.2005/03/16 : CIA-RDP78-03921A00030029 ff8A
os a orgerles
ganda ends, and broad propagandistic parodies probably in-
tended for world philatelic markets.
In the first category, several stamps produced by the British
and apparently intended to promote divisions within the Nazi
leadership may represent different facets of a single opera-
tion launched late in the war. They all follow the principle of
removing Hitler's portrait from a regular stamp and substitu-
ting that of another Nazi leader. The Hitler birthday com-
memorative was used as the prototype for a souvenir sheet of
six stamps showing Field Marshal Goering and commemorat-
ing his birthday on 12 January 1944. The frequently forged
6-pfennig Hitler head regular issue was changed to show Himm-
ler. (Harrison's perforating machine is again in evidence
on sheets of the Himmler stamp.) Hitler's head was also re-
moved from one value of the Polish occupation issue and re-
placed with that of Governor Frank. This stamp was repro-
duced by Harrison's photogravure method.
Two efforts, one German and one British, were made in sup-
port of national liberation and resistance movements. In
1944, when the leader of the Azad Hind movement, Subhas
Chandra Bose, followed the Japanese into India, the state
printing works in Berlin issued a series of ten Azad Hind
stamps which were never used. And the British, some time
after the August 1944 execution of General Erich von Witzle-
ben, one of the chief conspirators in the 20 July bomb plot,
substituted his portrait for Hitler's on a German stamp is-
sued in November 1943 to mark the 20th anniversary of the
Munich uprising. Changing also the legend on the original,
they retained its color and design.
The broad propaganda parodies are chiefly American and
German. American production centered around a reworking
of the 12-pfennig Hitler head stamp to show a Hitler skull, un-
der which "Futsches" (Collapsed) was substituted in the
legend "Deutsches Reich." One important item in this pro-
duction was a photolithographed parody of a Hitler Souvenir
sheet with four skulls resembling Hitler.
German efforts were late, amateurish, and ineffective.
Himmler reportedly broached the idea of philatelic parodies to
Hitler in February 1944 in answer to the Fuehrer's complaints
that the German foreign propaganda organs had failed to tell
SECRET 67
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET Postal Forgeries
the world how completely Britain had sold out to the Rus-
sians. He was authorized to market parodies throughout the
philatelic world to deliver this message and use the proceeds to
finance SS development.
Parodies were made of one value of the 1935 issue commem-
orating the Silver Jubilee of King George V, of a single stamp
issued for the Coronation of George VI, and of six low values
of the then current regular British issue. Himmler's design
ideas are reflected in liberal use of the Star of Zion and the
substitution of Stalin's head for those of the British mon-
archs. Some of the regular issues were overprinted to adver-
tise the "Liquidation of Empire." The German parodies were
printed on the watermarked paper used for ration books. Few
examples are extant.because the idea never got far beyond pilot
production.
Himmler's scheme met with widespread resistance from of-
ficials of the intelligence services, who regarded it as a waste
of time. Attempts to market the stamps through the "Op-
eration Bernhard" network, already engaged in forging and
selling British banknotes, and through agents of the foreign
Sicherheitsdienst never panned out. Himmler, at last thor-
oughly frustrated by the failure of his idea, ordered that the
stamps be given to Sir Oswald Mosley's Black Shirts for dis-
semination in England, but with the incipient collapse of Ger-
many the confusion in Berlin overtook this final alternative
as well.
The Outlook
Forgery of postage stamps for intelligence purposes may be
unnecessary in future operations. Postage meter marks have
already largely replaced stamps for commercial mailing pur-
poses in most countries of the world. The most widespread
use of meters is for bulk mail and newspapers, printed matter,
precisely the medium through which written propaganda is
most easily disseminated. Meter marks eliminate the need
for both stamp and cancellation forgeries, and reproduction
of the simple red-inked double-purpose impression should
be quite easy and effective. In any one country, meter im-
pressions are to a high degree standardized in design, differ-
ing only in the letter and serial number of the machine. Un-
like postage stamps, moreover, which are changed every few
6~pproved For Release 2005/03/16 : CIA-RDP78-03921'3700290001-3
Approved For elease 2005/03/16 : CIA-RDP78-03921A000300299~g~- .
Postal Forgeries
years, meters remain in use for long periods of time, the
widespread distribution of all sizes of machines in post offices
and business firms precluding frequent change. The Ameri-
can directors of Operation Cornflakes anticipated this develop-
ment in including a meter mark-the only meter mark known
to have been forged in wartime-in their mailbag mix.
gErRe RE 69
Approved F-olease 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16: CIA-RDP78-039?1A8IOA0~39T9~ffij?
The Soviet system of devious
techniques to circumscribe the
overt observations of foreign
experts.
? OBSTACLE COURSE FOR ATTACHES
Thomas W. Wolfe
It may be useful, now that it seems possible the Soviet Union
may one of these days agree to admit nuclear inspection teams
to its territory, to review the kinds of obstacles it regularly
strews in the path of other legitimate trained foreign observers,
the military attaches. As Soviet officials have already given
voice to their suspicion that any nuclear inspectors will be
bent on spying, so they have taken the attitude, in their ob-
session with secrecy, that the attaches are spies when they
exhibit an interest in matters which in most other countries
lie open in the public domain. Hence, although as a bow to
international usage they accept the military attaches of for-
eign diplomatic missions, they severely circumscribe their op-
portunities to travel and make observations-a traditional at-
tache activity ever since the system came into being during
the Napoleonic era.
Soviet measures to limit the observations of military at-
taches fall into two categories. First, there are express legal
proscriptions on attache movement and activities-off-limits
areas, travel registration, prohibitions on photography, etc.
Second, there is a large body of unannounced restraints-ad-
ministrative, psychological, and physical-which take up where
the legal obstacles leave off. It is this second category of ob-
structive techniques over and above the formal restrictions
which I shall illustrate from my own experience in Russia as
American Air Attache from October 1956 to October 1958.
Manipulating transportation. This is one of the most com-
mon methods of interference through administrative meas-
ures after an attache has obtained formal permission to travel.
For example, you have made reservations for a flight in day-
time from Moscow to Baku, but at the last minute you find
that your seat has been switched to a night plane. If you
Approved 1FdrKelease-2Q05/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
71-77
A proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
OFFICIAL USE ONLY Obstacles for Attaches
announce your intention of waiting for the first available day-
time flight, you are informed that all day flights are sold out
"for the indefinite future." The same thing happens on trains.
Sometimes the schedules are altered to keep you from pass-
ing points of interest in daylight. I have been on trains
which for no apparent reason pulled into a siding and waited
until dark, to the bewilderment of Russian fellow-passengers
and even some members of the crew. Similarly, civil air flights
have altered their routes or skipped scheduled stops in per-
fectly good weather for no other reason than to deny us obser-
vation of some inconveniently located installation.
Compartment companions. Rarely are attaches able to se-
cure a compartment to themselves on a Soviet train, no mat-
ter how far in advance they book transportation. The So-
viet citizens who turn up to share a compartment are in most
cases readily identifiable as security agents. They keep the
attache under constant scrutiny during waking hours and
occasionally can be found going through his belongings in the
middle of the night. An auxiliary practice is that of splitting
up foreign travellers: even American husbands (including my-
self) have on occasion been obliged to spend the night in one
compartment and their wives in another with male Russian
companions. This sort of thing naturally does nothing to en-
dear the watchdogs of Soviet security to members of the at-
tache corps, and run-ins with them have been frequent. After
one such skirmish with a particularly obnoxious security type
in the Caucasus, I was called a "hooligan" and other uncom-
plimentary names in the Soviet press, a publicity measure
which serves to put psychological pressure on the attaches as
well as to foster among the Soviet populace the desired at-
titude of suspicious vigilance toward foreigners.
Timely interruption technique. Even if an attache and his
friends or family have managed to secure a train compart-
ment without Soviet company, their privacy is seldom re-
spected for long. Whenever the train approaches the indus-
trial section of a city, for example, the car attendants suddenly
find it necessary to tidy up your compartment. If the door
happens to be locked they let themselves in with a pass key,
so great is their urge to look after your comfort. The win-
dow always seems to need the most attention, and they swipe
7Xpproved For Release 2005/03/16: CIA-9P3AR M0290001-3
Approved For Release 2005/03/16: CIA-RDP78-03921,A~~10A 0 0290Vk&
Obstacles for Attaches USE
away at it with a dust-rag, effectually blocking the view, un-
til you have passed through the factory district.
If this routine cannot be stretched out long enough, there
is a variation which I encountered once while travelling
through a large industrial city on the Volga. Factories were
strung out for several miles on the outskirts of the city, among
them a big aircraft plant. It stood alongside the tracks, of-
fering about the same view you get from a train of the Martin
plant in Baltimore, except that the Soviet plant was boxed
in by a high board fence. On this occasion I found the view
spoiled not only by the fence and the customary activity of
the car attendant. Making doubly sure that I would have
no chance to observe this particular stretch of industrial
scenery, the attendant rubbed the window down with a greasy
rag.
Frosted window routine. On train trips in winter, nature
often cooperates with the Soviet authorities by frosting over
the windows of your car. When nature fails to do the trick,
however, there is usually someone around to lend a hand, as
I found once when boarding a train in Rostov. It was a clear,
cold day and every window in the train was completely free
of frost and ice, with one exception. The window of my com-
partment, in the middle of a car, had been sprayed on the
outside until it was covered with a quarter-inch glaze of ice.
When I attempted to chip some of the ice away, I was im-
mediately stopped by a detail of militiamen. "You are vio-
lating Soviet regulations," they said. "You might scratch the
glass."
Helpful hostess. When attaches board an airplane for a
trip in the Soviet Union, word is passed along to the crew
that foreigners are aboard. The hostess then makes it her
business to distract the attention of the foreign traveller at
moments when he might observe installations of military or
industrial significance. A favorite technique when an air-
plane is taking off or approaching an airport is for the hostess
to lean over your seat with an offering of reading material.
Somehow she usually manages to hold a magazine in front of
your face so you can't see out the window. If you wave the
solicitous girl away at such a moment you are of course be-
ing rude and unappreciative.
3
Approved FFrIIALeaseU R/03/16 : CIA-RDP78-03921A000300290001-3 FQi
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
OFFICIAL USE ONLY Obstacles for Attaches
Smoke screen. When the Soviets are particularly anxious
to conceal some installation from foreign eyes, they may use
this standard military device. It takes a certain amount of
preparation and good communications to time a smoke screen
to go up just as an attache drives down the highway or passes
on the train, but they usually pull it off without a hitch.
This technique, however, has the disadvantage of calling at-
tention to the very object they wish to hide. On one train
trip in central Russia an airfield we passed at a distance of
three or four miles was ringed with upwards of 50, smoke
generators belching away. "What's going on over. there?" I
asked one of the Russians who had been assigned to keep an
eye on me during this journey. "It looks as though that air-
field is on fire." I got a blank stare in return. "Airfield?
Fire? I don't see anything," said the Russian, as though he
could persuade me thus that there was nothing in sight but
the natural Russian landscape.
Highway escort. When attaches undertake an automobile
trip in the Soviet Union, they are accompanied by several cars
of plain-clothes security agents. These keep shifting the order
of their line-up along the highway. to preserve the fiction that
there is no surveillance of foreigners; but since auto traffic on
most out-of-town roads in the Soviet Union is very light, the
pretense is bound to wear thin as the same "protective" caval-
cade of Pobedas and Zims rolls along behind you hour after
hour. When you stop by the roadside to stretch your legs,
the cavalcade pulls up a hundred yards or so' away. For
some reason, the security personnel always make a minute
inspection of your stopping place after you have moved on.
Perhaps they imagine that attaches may plant nefarious de-
vices or hide messages to conspirators along the highways.
Roadside reception committees. Should an auto trip take
you through a region in which military or industrial installa-
tions are located, the motor escort is usually deemed inade-
quate to keep a proper curb on your curiosity, and the local
militia and troops from the nearest military base are turned
out en masse. They stand guard at every intersection to pre-
vent you from turning off the designated route. Along some
stretches of road they are posted at 10-yard intervals to keep
you from making an "unauthorized" stop, thus often calling
74Approved For Release 2005/03/16: CIAt&0)(00290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Obstacles for Attaches OFFICIAL USE ONLY
attention, like the smoke screen, to the very installation you
are supposed not to observe. Running the gauntlet of such
reception committees is generally bothersome, however, es-
pecially when they bar access to the only decent roads in the
vicinity and require you to detour along rutted backcountry
wagon trails to get to your destination. Frequently the only
satisfaction an attache gets from such a trip is the knowledge
that the Soviets have tied up an inordinate amount of man-
power to control his itinerary.
Phoney militiaman routine. Around cities it is not always
feasible to have a guard posted at every corner when attaches
happen to be in town, and a portable militiaman must be im-
provised. The militia are the uniformed police, whom you
are legally required to obey when they flag your car down
and tell you to turn around. Not so the security agent in
plain clothes unless he shows his credentials, a revelation which
security operatives are loath to make. To get around this
difficulty, each auto-load of security men has in its kit a militia
uniform which one of the operatives may put on as occasion
demands. The car speeds ahead, the phoney militiaman jumps
out still buttoning up his jacket, and you are hailed to a
stop.. This technique more or less effectively confines attache
sightseeing in the environs of a Soviet city to churches, ceme-
teries, and other approved cultural attractions.
Frequent interceptions on a drive about a large city may
produce the curious result that you keep encountering the
same phoney militiaman at widely separated points. Once in
Leningrad an agent with a torn shoulder strap on his militia-
man's uniform flagged us down several times in the same
afternoon. As the crowd of onlookers would gather around we
would ask him, each time a bit more caustically: "So it's you
again. Haven't you got that strap fixed yet? Bozhe moi!
you sure are setting a sloppy example for all the genuine
militiamen in Leningrad! " His wrathful frustration was a
pleasure to behold, for no one wants less than a security
agent to become the butt of attention in front of a crowd
of fellow-citizens: his next assignment might involve check-
ing up on one of those same citizens.
"Road under Repair" routine. The pretense that a bridge
is out or that a particular stretch of road is under repair is
Approve or eleasee2Q5T03/16 : CIA-RDP78-03921A00030029000T-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
OFFICIAL USE ONLY Obstacles for Attaches
often used to keep motoring attaches from reaching a destina-
tion the authorities do not want to declare formally out of
bounds. On one occasion, when some travellers were told by
local Soviet officials that they could not proceed to the town
of Pskov because a bridge en route "had been washed out in
a storm," they insisted on going ahead anyway. They had not
got very far along the road when a truck full of soldiers sped
past. A few minutes later they came to a small wooden bridge
in time to see the soldiers beginning to take it apart plank by
plank.
Kerosene in the crankcase. When other devices fail to dis-
courage attaches from an undesirable motoring itinerary,
there is always the alternative of a little midnight attention
to their automobile. Cars which had passed a searching in-
spection before the start of a trip sometimes used to develop
peculiar ailments after having been parked overnight in the
courtyard of a Soviet hotel. I had a brand-new automobile,
mileage still under 3,000, break down with burned-out engine
bearings on a trip in southern Russia. Kerosene in the crank-
case-hardly the work of a mere prankster-turned out to be
the cause.
Indignant citizen act. The attitude of ordinary Soviet citi-
zens toward foreigners is generally a combination of curiosity
and friendliness. Deliberately hostile behavior is quite out
of character, for ordinary citizens are aware that they can
get into trouble by unsanctioned demonstrations of ill will.
It is an obvious artifice, therefore, when planted agitators at-
tempt to incite a crowd of Soviet citizens against attache
travellers. I recall a typical instance wherein two attaches
were set upon while visiting the historic Kremlin of the city
of Kazan.
The Kremlin, sitting on high ground, affords a distant view
of the city's industrial suburbs. Apparently the Soviet au-
thorities thought it best to deny this view to foreign attaches,
but since the Kremlin was open to the public they had no
plausible excuse for barring admittance. Professional agita-
tors were therefore called into action to create a scene. They
collected a crowd, ranted at the travellers, and threatened to
shoot them if they did not leave the premises at once. When
the agitators were asked to show their credentials, they
71 pproved For Release 2005/03/16: CIA-F WQ239 AQ 0290001-3
Approve$EQr Reselease29gPJ%/16 : CIA-RDP78-03
a c q(A%3 9Q j)8
s or
claimed to be "indignant citizens" who did not have to identify
themselves. This tactic usually proves effective, for attaches
cannot afford to become involved in altercations with Soviet
citizens, however strong the provocation, lest they be officially
accused of violating Soviet order. As on many similar oc-
casions, the attaches in this case were harried off the streets
and obliged to take refuge in their hotel room until time to
catch the next train out of town.
The foregoing provides a sample of the harassments and
petty subterfuges by which Soviet authorities prevent military
attaches travelling in nominally open areas from making the
most commonplace observations, observations of a kind which
Soviet representatives in Western countries are perfectly free
to make without hindrance. It seems reasonable to expect
that nuclear inspectors, if they are admitted, will be faced with
the frustration of these and similar obstructive contrivances.
OFFICIAL USE ONLY 77
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET
COMMUNICATIONS TO THE EDITORS
The Military Attaches
Dear Sirs:
Lyman Kirkpatrick's "Unrecognized Potential in the Mili-
tary Attaches"1 is such a good summary of important con-
siderations with which I have been closely concerned over
quite a period of time, as a former G-2 and Army attache
now with CIA, that I cannot resist the temptation to comment
on it. The article, affirming that attaches contribute heavily
to our national intelligence and defending them against some
of their critics, notes deficiencies resulting from the cross ac-
creditation system; but its main burden is that attaches in
many countries have a natural entree, one that should be
more fully exploited, to political leaders with a military back-
ground, and especially to junior officers who are likely to be-
come the country's future leaders. In an extension of this
thesis the author notes that of the many foreign officers that
come to the United States for training a number have later
turned out to be political leaders in their countries; he sug-
gests that there is a great potential for intelligence and, covert
action operations in this situation.
Mr. Kirkpatrick's observations are all sound. If anything
they are too conservative. The distressing thing about them
is that they need to be made at this late stage of the in-
telligence community's development. For this reason I make
bold to amplify his views, speaking in perhaps painfully plain
terms, and make some further suggestions, particularly with
reference to the role CIA should play.
The attache system is recognized, at least in military in-
telligence circles, as an effective collection arm. As in any
system, there are some weak individuals and features and some
reportorial sins of omission and commission, but it is my ob-
servation that the percentage of these is very low indeed,
comparing most favorably with that of any other group of
U.S. intelligence collectors. Certainly there is continuous at-
tention to the selection and training of attaches, to the guid-
ance of collection, and to the evaluation of performance: the
MORI/HRP
from gg 79
Approved*& Llease 2005/03/16: CIA-RDP78-(3f%*(Y00300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET To the Editors: Attaches
important practice of commenting on reports is, at least in
the Army, on a sound and effective basis.
In the matter of distribution of attaches and the problems
of cross accreditation, it would seem wise in the long run to
work out a scheme of joint service representation by an at-
tache in residence. Most observers recognize that an em-
bassy without a service attache lacks an important compo-
nent. Although in some cases the attache's value will lie more
in prestige considerations than in intelligence collection, that
value is nevertheless a real one. The services have repeatedly
wrestled with this problem and sought various joint ways of
meeting it. I agree that the results of these efforts have not
been quite adequate; but at least they have been made. Budg-
etary and personnel considerations may be at the root of the
trouble. There is a role that CIA could play in this matter
that is worthy of reconsideration.
Mr. Kirkpatrick is too diffident about the practicability of
attache contact with junior officers for assessing their poten-
tial. He need have no qualms on this point. Such contact is,
as a matter of fact, a part of basic attache guidance. While
the situation varies in each country, a study of reports will
show that most attaches can and do make these contacts.
In friendly countries junior officers can be cultivated through
all sorts of activities: one attache organized an annual golf
tournament between officers from two areas; one used to make
it a point to attend any amateur dramatic presentations; an
air attache arranged that a delegation including junior of-
ficers visit U.S. military installations. Arrangements like these
are difficult or perhaps even precluded where the atmosphere
is unfriendly, but something can generally be developed.
One of the more disturbing aspects of Mr. Kirkpatrick's
comments is that he finds it necessary to emphasize the po-
litical intelligence value of contacts with the military. This
potential is recognized and stressed in guidance to Army and
Air Force attaches, and although I do not know about the
Navy, which has not combined its attache training with that
of the other services, I assume that its position is similar.
Perhaps the civilian agencies need to be prodded; but to my
knowledge the importance of military contacts has more than
once been raised in CIA. If the needed U.S. interdepartmental
8Approved For Release 2005/03/16: CIA-RDP78-03921MCM0290001-3
Approved1F%R le1se 2a9p/gj3/16 : CIA-RDP78-03921A0003002 f 1
o e ors: ac es
coordination is not in effect, the proper steps to capitalize on
this important opportunity should be taken by command de-
cision.
It is similarly disturbing that there should be a need to
point out the intelligence potential of foreign officers study-
ing in the United States. I know that the Army is alert to
the situation, and I know that it has been brought to the
attention of responsible persons in CIA. I know of cases where
individual attaches have worked along these lines. But I also
know of efforts to take advantage of this opportunity which
failed to gain support. After a British officer, formerly a
Leavenworth instructor, had spent time, money, and effort
establishing informal contacts between UK and U.S. Leaven-
worth graduates in England, the expected U.S. help fell
through. Remarking on Iranian and other foreign officers
who wore with pride the badges of the U.S. schools they had
attended, I was told there were no measures, not even subtle
ones, being taken to keep alive this alma mater spirit. A
project to provide a periodic news letter to foreign officers
failed to win support. A regularized system for getting the
kind of biographic data on foreign military students that Mr.
Kirkpatrick advocates was deemed comparatively unproductive
when proposed a few years ago.
It should be evident that activities like these would be
highly useful and that they can be accomplished cheaply.
We can, however, not rely on the armed services alone to
carry them out. They constitute a project that needs cen-
tralized development and coordinated execution both in the
interest of full coverage and for the sake of efficiency. Such
a venture could advantageously be coordinated with other
programs involving foreign officers that come to the United
States for school and other purposes. CIA has the intelligence
coordinating job. This is one part of it it should pursue.
Mr. Kirkpatrick's analysis does not cover three other aspects
of the military attache program which are of significance
for the intelligence community-attache-MAAG relations, CIA
briefing of attaches, and collection coordination in the field.
In the first, the ball is only partly in our CIA court, but in
the others the next move is squarely up to us.
SECRET
81
Approved For Release 2005/03/16 :
CIA-RDP78-03921A000300290001-3
- ved For Release 2005/03/16: CIA-RRP7P~3921A000.300290001-3
o e hors: Attaches
There are a great many papers and doctrines treating the
relationship between attaches and MAAG's in the matter of
intelligence collection, but their application is no simple mat-
ter; certainly it is not uniformly successful. While both our
friends and our enemies assume that MAAG's as well as at-
taches collect information, we must maintain the fiction that
MAAG's do not. Open recognition of their collection mission
would in fact result in many embarrassments, because MAAG
personnel lack understanding and skill in intelligence collec-
tion. Although a MAAG is for obvious reasons the dominat-
ing U.S. military influence in a nation while it is there, its
job is to work itself out of business; and we cannot afford to
let misguided views on intelligence collection damage the at-
tache collection system, the permanent mechanism upon which
we will have to rely when the MAAG's are gone. It would be
most logical that the attache be given responsibility for co-
ordinating the MAAG's collection activity with his own. A
standing operating procedure covering the subject might be es-
tablished whenever the attache or MAAG chief is changed.
One item on which we can and should take action is the
matter of CIA briefing of attaches. There are good Agency
directives on this point, but the follow-through is spotty. We
leave too much to busy and often too security-conscious per-
sons who may lack confidence in the discretion or understand-
ing of military personnel. It is to our advantage to make good
briefings, and in my experience any personal foibles are
evenly distributed: neither military nor civilian intelligence
operators have a corner on good sense or on blundering.
Another place CIA can help is in better collection coordina-
tion in the field; this will be particularly needful under the
new DCID's. Here the onus is strictly on us and on the em-
bassy. One aspect of this coordination should be the develop-
merit of a process for adjusting NIS collection responsibilities
to the facts of the collection situation in the field. Responsi-
bilities for formulating the different NIS sections, established
after long and thoughtful study, fit the U.S. intelligence and
government structure quite well. The same distribution of
responsibility for collecting the information, however, does not
always meet conditions in the field, sometimes because the
82 gE RET
Approved For Release 2005/03/16 : CIA-RDP78-03921A1YOci3D0290001-3
ApprovedloIhRe~le~?eS200t510$/i 6 : CIA-RDP78-03921 A000300290001-3
structure of the foreign government differs from ours, some-
times for other reasons.
To illustrate, the Army is supposed to collect information on
railroads; but railroads often come under a part of the foreign
government with which military liaison is impracticable or
unwise. The supply and finance aspects of many foreign mili-
tary. forces are controlled by civilian agencies to which State
might have best entree. On the other hand, matters for which
State is assigned responsibility are sometimes to be found in
agencies with which the service attaches have unusually good
contact. In addition, it often happens that personal relation-
ships are such as to give opportunities for collection in fields
outside assigned areas: one attache had a golfing companion
who gave good economic and political information, while a
colleague in the political section of the same embassy had a
lucrative contact in the general staff, and a USIS officer had
one in the troop information service. Surely such opportuni-
ties should be exploited in disregard of bureaucratic alloca-
tions of responsibility. Finally, no matter how wise Wash-
ington may be, it often turns out that what seemed at head-
quarters to require covert collection in fact does not, and
vice versa.
There is no reason why the collection responsibilities at each
embassy should not be adjusted periodically to the facts of life.
If necessary, agreements on this point could be reduced to
writing and forwarded for official approval. Or if Parkinson's
Law and other bureaucratic propensities make such flexibility
too difficult in Washington, the collectors should perhaps just
go ahead and collect as convenient for them, give each other
the appropriate credit in their reports, and let it go at that.
Either from Washington or through its Chief of Mission, CIA
should play a leading role in such a coordinating process. It
can be done without prejudice to security if we are as skillful
as we ought to be.
In summary, I agree with Mr. Kirkpatrick's views on the
attache system and its new horizons, with the reservation that
what is needed in order to reach those horizons and certain
further ends is for CIA to get moving. We have the men and
the resources. All we need is the decision to act.
Peter J. Dorondo
SECRET 83
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
SECRET To the Editors: Graphology
Assessment by Graphology
Dear Sirs:
Keith Laycock's extravagant article in your journal on the
use of handwriting analysis in character assessment,' which
claimed for graphology the capability of disclosing personality
traits ranging from talkativeness through capacity for ab-
stract thinking to sex difficulties, was answered by Dr. Rund-
quist's skeptical appeal for scientific evaluation;2 but you have
now left the last word with James Van Stappen, who writes
that there is no need for such scientific proof.3 As a layman
to both psychology and graphology but a professional in in-
telligence, I should like to take up the cudgels for science on
behalf of all intelligence officers who refuse to be seduced by
untested claims.
I note with pleasure that Mr. Van Stappen does not claim
the swamiesque capabilities listed by Laycock. But neither
does he deny them; and his smokescreen of European uni-
versity citations and long bibliography do nothing to lift the
veil of swami from graphology. That graphologists are some-
times the product of European rather than Indian universi-
ties does not preclude their being charlatans. A number of
fakers have held degrees from first-line universities, especially
from European ones; European schooling in psychology runs
the gamut from excellence to pure fakery. Phrenology and
astrology have had their day there, and physiognomies (the
art of determining character by facial contours) is still in
vogue in European police schools and seriously studied at
leading universities. Only two years ago, the Chief of Train-
ing of a European intelligence service asked which American
university he should write to for a bibliography of American
scholarly works on physiognomies! The fact that graphology
is seriously studied in Europe does not make it a valid science.
Nor does a long bibliography make it valid: there are exten-
sive bibliographies on astrology, phrenology, and physiognomies
too.
' Studies III 3, p. 23. -
2 Studies III 3, p. 45. MORI/HRP
9 Studies III 4, p. 49. from pg.
;;~~rr~~FF 84-86
proved For Release 2005/03/16: CIA-RDP78-03921AWM290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002; ~3
To the Editors: Graphology
The live illustration given in the Van Stappen article dem-
onstrates changes in a single individual's handwriting as that
individual underwent a disturbance. Even in the United
States, where graphology has not been generally accepted be-
cause scientific testing has not validated its claims, psychiatrists
in some cases use graphology as one of many tools in their at-
tempts to probe the roots of a mental disturbance. Van Stap-
pen's case is a valid example of such use. Periodic testing of
an agent's handwriting by competent psychiatrists may tell
whether he is undergoing emotional strain.
It is also possible that graphology, used as a tool by pro-
fessional psychologists, may have a place in agent assessment;
but the Van Stappen article does not show this, and by fail-
ing to deny the claims made by Laycock it implies acceptance
of them. Its description of the Lewinson method is interest-
ing, illustrating a device for graphic representation of differ-
ences in samples of handwriting. But it leaves us in the dark
as to the next step-how one can determine an individual's
"disposition to talk," for example, from a single sample of
handwriting. Its silence in this respect leads one to suspect
that the author is afraid to lay his cards on the table or sub-
mit graphology to scientific checks.
The article lists four other categories of cases where graph-
ology may be of assistance because it is the "only available
method-the unknown source who supplies your agent in-
formation, the agent who refuses to submit to ordinary assess-
ment, the VIP who cannot be asked to undergo tests, and
the writer of anonymous letters." These are cases in which
we are interested, but no examples of how successful graph-
ology may be in such cases are offered. The fact is that these
are situations where no controls for scientific investigation
are available, and operations chiefs and case officers who use
this "service" therefore have nothing upon which to base
an estimate of its value. With Dr. Rundquist, I am afraid of
unwarranted credence in graphological findings until we
have a statistically valid comparison of the performance rec-
ords and standard assessments of individual agents matched
against their graphological assessments under controlled cir-
cumstances.
85
Approved O&FReTease 2005/03/16 : CIA-RDP78-03921A000300290001-3
,,pk?yed For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
To the Editors: Graphology
:[ am not one of those too skeptical to try out graphology.
But I will refuse to consider it seriously until a methodical
validation of its use for intelligence purposes is carried out.
I have had experience with its misuse and the dangerous con-
sequences thereof, and sincerely hope that its advocates will
have the courage to submit it to scientific tests instead of
appealing to the "authority" of European universities and a
bibliography which beclouds the question by citing a number
of works that have absolutely no application to the points at
issue.
86
Approved For Release 2005/03/16: CIA-RDP78-03926 500290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029000 3
To the Editors: Jet Age SECR T
Jet-Age Reporting
Dear Sirs:
A well-known Washington plumber once answered an irate
housewife's complaint that after his ministrations the water
tasted terrible, "Dear lady, all I do is handle the pipe. What
goes in and comes out ain't my department." Like the
plumber, the designer of our jet-age reporting system' has de-
signed a many-splendored network of pipes without adequate
attention to either input or outflow. He has made only a
half-hearted attack on the real problem vexing intelligence
collectors and users since Eve failed to recognize the signifi-
cance of the biological intelligence she received from the first
E-5 source, SERPENT (fnu).
In his system overt, marginal information, or information
responsive to a parochial request not even remotely related
to a set of priorities, is carefully reproduced by the perforator
unit of a standard M-19 teletype machine, with its rows of
up to five holes in different position combinations, each rep-
resenting a letter or function punched on the keyboard of
the machine. This is then fed with loving care into a flexo-
writer, by-passing all intelligence criteria, and sent on its
mechanistic way to a staff communications group, where it is
put into permanent form and disseminated. Bilge is thus min-
gled indiscriminately into the untreated effluent of the pipeline.
One can imagine that over every automatic machine in this
vast jet-age system there hangs mockingly a sign which reads
"THINK."
The jet-age contraption really reaches its ionospheric apogee
when the afterburners are turned on. The feedback to dis-
seminators (machines!) and the feedback to collectors are the
Vernier burners which are supposed to impart the correct azi-
muthal attitude control. Every analyst can then influence
directly the orbit of our intelligence missile, and every punch-
card nuance can have its impact in space. We can confi-
dently look forward to some analyst's query as to whether the MORI/HRP
moon is really made of green cheese; and we can'be sure that, from pg.
in the absence of any critical control, the green cheese re- 87-90
= quirements will carry priorities equivalent to those on the ca-
I William Earling, "Design for Jet-Age Reporting," Studies IV 2, p. 7.
SECRET 87
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
ro a For Release 2005/03/16 TIALA-RDP78-03921A000300290001-3
apufflET To the Editors: Jet Age
pability of submarines lurking in the Chesapeake Bay. Bilge,
untreated effluent, and green cheese in the feed-back hold
great promise of causing a flame-out in our intelligence missile
in outer space.
Francis Tempone
Dear Sirs:
Even in the jet age there are still areas in which the analyst
does not need to get his field report within a week, areas in
which pouch reporting is adequate and even preferable to
more rapid channels. Much economic intelligence falls in this
category. Among the very best economic reports are detailed
documentary lists and studies which are best presented in
upper and lower case, with full punctuation and adequate at-
tention to proofreading. Speed of transmission is only a minor
factor in presenting such information to the proper customer.
A great deal of other good information is being reported
satisfactorily by pouch. True, there is much marginal and
bad information arriving daily by pouch, to be disposed of at
leisure by area desks, not rushed to customer analysts. We
should be well advised to leave this pouch channel open and
allow the inevitable flow of marginal information to settle
there. Faster channels will not improve the judgments of field
reporters, and unless there is a careful screening of incoming
information by officers with specialized area knowledge there
is real danger that more speed will not mean more quality,
but rather the opposite.
Your jet-age writer, conceding that "formal collection re-
quirements alone cannot do the job" of controlling quality,
seems to believe that formal requirements plus numerous rap-
idly transmitted evaluations can. No one would deny the use-
fulness of requirements, especially in fields where collectors
need support from technical specialists; but already too much
effort has been devoted to generating requirements which any
red-blooded intelligence officer would take for granted or which
bear no relation to existing collection potential. There are
fields-politics, for example-where requirements are feeble
aids indeed and where one politically alert case officer is
worth more than volumes of questions unrelated to the facts
of any specific operation.
Approved For Relea a 2005/03/16: CIA-RDP78-0392700290001-3
OUNFIDENTIAL
Approved For Release 2005/03/16: CIA~R6PNI03~2"1'AW01) a4w
To the Editors: Jet Age
As for his "new system for rapid and frequent user criticism
of individual reports in order to point up good material and
weed out at the source any information below the level of sig-
nificance for the intelligence community," those who have ob-
served the impact of customer evaluations on field operations
will be unimpressed. While evaluations from customer analysts
range from very useful to counterproductive, their net effec-
tiveness in guiding the collection effort is not very high. Fur-
thermore, because they are normally prepared by persons un-
aware of what access and potential the producing sources
have, even good evaluations of a report at hand are not very
helpful regarding problems of further exploitation. With re-
spect to significance of information, customer evaluations in
general are not thorough enough in their review nor well
enough coordinated with the scale of priorities to provide a
reliable guide. On the big question of which sources to ter-
minate and which to encourage, their impact, if any, is diffi-
cult to detect.
Bad evaluations, on the other hand, can have a negative
effect. And so many evaluations are prepared cursorily, in
haste, that perhaps we should try rather for fewer evalua-
tions to which more time could be devoted. It is not uncom-
mon that evaluations indifferently prepared or unrelated to
existing priorities serve to encourage the marginal operational
activity which we are striving to eliminate. The prospect that
they might be fired indiscriminately to the field in greater
numbers is frightening to contemplate. It would certainly do
more harm than good.
In any age, information from a source with real access to
a good target looks impressive even when it is a few weeks old;
but in the horse-and-buggy age, the marginal product from
not-very-well-placed spies must have looked like old lettuce
leaves by the time it finally arrived at headquarters. Possibly
we have been somewhat slow in eliminating marginal opera-
tions because rapid communications have given their product
enough timeliness to make them appear worth while. Why
don't we try reporting all but the very best information by
pouch for a few months and see which sources are being up-
held just by the rapid transmission of their marginal output?
Sources with no real access will wither and grow cold in the
"Fe"Mr Or'U -A 89 NTI
Approved For Release 2005/03/16 A- 8- 00 IO020001-3
CONFIDENTIAL
CONFIDE)'TJA
Approved For Release 2005/03 1 IA- P78-03 0300290001-3
To the Editors: rs: Jet et Age
weeks required for a pouch report, and it will be easy to ter-
minate them. This practical approach offers better prospects
for refining intelligence collection than a mechanistic scheme
for greater speed.
E. H. Maydalle
9Kpproved For ?Q F J4 N )EN C I4A[~P78-03921 290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Intelligence Articles IV 3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Aspects of a classical scouting
and resistance-leading unit be-
hind Japanese lines in Burma,
from the viewpoint of its com-
mander.
INTELLIGENCE OPERATIONS OF OSS
DETACHMENT 101
W. R. Peers
For Detachment 101 intelligence was an all-pervasive mis-
sion. The Detachment did plan and carry out espionage op-
erations specifically to collect both strategic and tactical in-
formation, but intelligence was also a by-product of all its
other operations, including guerrilla actions, sabotage, and
psychological measures. Its intelligence activities were there-
fore augmented rather than decreased when large-scale guer-
rilla operations were initiated in the spring of 1944.
Early Operations
The history of Detachment 101 began in the spring of 1942,
when a small group of officers and men was assembled in Wash-
ington under the Office of the Coordinator of Information.
Captain (later Colonel) Carl Eifier was the first commander.
After a short period of training and equipping, the unit shipped
overseas to the China-Burma-India Theater. In the summer of
1942 it received its first directive from General Stilwell, short
and to the point: "Establish a base camp in northeast India
and from there plan and conduct operations against the roads
and railroad leading into Myitkyina in order to deny the Jap-
anese the use of the Myitkyina airfield. Establish liaison with
the British authorities to effect coordination with their opera-
tions."
The remainder of the year was spent in locating and de-
veloping a base camp in Assam Province of northeast India
and in recruiting and training agent personnel for subsequent
operations. An office was established in Calcutta to receive
supplies from headquarters in the United States and to procure
MORI/HRP
from pg.
A01-A13
Al
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
bulk goods from the Army Service of Supply. At that time
there was available no small, portable military or commercial
radio capable of transmitting from northern Burma to As-
sam, a distance of 200 to 500 miles. Accordingly it was nec-
essary for the unit to design and construct its own radio set.
The result was crude, but it worked well. It became the model
from which the SSTR series of sets was built by OSS, which
by now had succeeded to the intelligence and paramilitary
function of COI.
In 1943 exploratory field operations were carried out in
Burma on a trial-and-error basis. Some of them were failures;
but they taught us many lessons as to what could be done
and, even more important, what should not be done. By the
end of the year six base camps had been established behind
the lines in northern Burma, three east of the Irrawaddy River
and three to the west. Each of these had recruited and
trained a small group of indigenous Kachin personnel for local
protection and to perform limited operations, principally sim-
ple sabotage and small ambushes. Each also trained a few
native personnel as low-level intelligence agents, who reported
their information by means of runners or via the bamboo
grapevine. From the field bases this information was for-
warded to the base camp in India by radio. By the end of
the year it was possible to assemble a fairly comprehensive
picture of Japanese strengths and dispositions in northern
Burma.
The field bases also selected native recruits for more in-
tensive intelligence training. These were flown by light air-
craft or infiltrated through the Japanese lines to the airfield
at Fort Hertz in the northern tip of Burma and thence flown
to the base camp in India. Their training, of three to five
months duration, followed the normal curriculum for intelli-
gence agents. The Kachins were particularly adept at CW
radio communications; by the end of the course most of them
were able to operate at 25 to 45 words per minute. When their
training was completed, some of them were returned to their
field bases to expand local information procurement and others
were parachuted into Burma for independent operations.
proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921AQ003002900I'1-
etachment
The Myitkyina Campaign
With the initiation of orthodox military operations in the
winter of 1943-44 by the Chinese ground forces, later aug-
mented by Merrill's Marauders, General Stilwell directed the
Detachment to expand its guerrilla force to a strength of ap-
proximately 3,000 in order to assist in the drive down the
Hukawng Valley and the eventual attack on Myitkyina, and
also to extend its intelligence operations south of Myitkyina
at least to the area of Bhamo and Katha. He made available
the arms, ammunition, personnel, and airlift necessary to ful-
fill this directive. He also stated that should the Detachment
be successful in providing this clandestine support to the com-
bat forces, approval would be forthcoming to expand its guer-
rilla forces to a strength of 10,000, with a commensurate in-
crease in intelligence and other operations.
That the Detachment was indeed successful in this assign-
ment can be illustrated by several incidents from the
Hukawng-Myitkyina campaign. The final drive on Myitkyina
was made in May 1944 by the Galahad Force (Merrill's Ma-
rauders and two Chinese regiments) across the Kumon Range
and thence south through Arang to the Myitkyina airfield.
Detachment 101 assisted this movement by providing two
companies of Kachin guerrillas to reconnoiter and screen the
front and flanks. When the Galahad forces reached Arang
they picked up additional guides and scouts from a Detach-
ment field base located there. One of the scouts, who had
been bitten by a poisonous snake and was so weak that he had
to ride horseback, nevertheless led the Galahad Force to the
airfield over some old unused trails, completely surprising the
Japanese. The airstrip was thus occupied with but little re-
sistance. The part played by the Detachment in this opera-
tion points up the interrelationship between its intelligence
and other activities.
A day or so before the Galahad Force seized the airfield,
Detachment 101 had some of its agent personnel in and out of
Myitkyina town. They estimated the Japanese strength there
at that time to be only approximately 300, and this informa-
tion was given to the Northern Combat Area Command and
the Galahad Force. After the airstrip was seized, two Chinese
A3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
units were therefore assigned to secure the town. It was to be
a double envelopment, one Chinese unit moving north along
the Irrawaddy River and the other attacking from the west.
All went well until the two converged on the railway station
in the center of town at about dusk. It has been reported that
Japanese snipers between them started picking them off.
Whatever the reason, they soon became heavily engaged with
each other and inflicted such severe mutual casualties that
they had to be withdrawn. The attempt at an early seizure of
the town thus came to nought.
'Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
It was two days before the forces were reorganized and
made another assault on the town, and when they did they
encountered a hornets' nest. In the interim the Japanese
had reinforced the town from every direction. They came by
road and railroad from Mogaung to the west, from the supply
installations to the north along the Irrawaddy, from Maingna
and Seniku across the river from the town, and from else-
where. Within two days, it was estimated, Japanese strength
in the town had been augmented to over 1,500, by the end of a
week it exceeded 3,000, and it still continued to grow.
This build-up was so rapid as to create for a while the feel-
ing in some quarters that our original strength estimates must
have been wrong. But Detachment intelligence agents and
guerrilla patrols placed along all the access roads and trails
leading into the city confirmed by observation the frantic ef-
fort of the Japanese to reinforce the garrison. And subse-
quently the interrogation of Japanese POW's by NCAC and
Galahad intelligence staffs verified as proximately accurate
the 300 figure which had been provided by the Detachment.
The only discrepancy was in the other direction: an original
strength figure of 275 for the Myitkyina garrison was obtained
through the interrogations.
The battle for Myitkyina town continued beyond June and
into the monsoon. Meanwhile Detachment 101 had expanded
its activities to the south as directed by General Stilwell and
was providing intelligence and operational support to the com-
bat forces. By the time Myitkyina fell to the allied forces in
August 1944, the Detachment had organized its guerrilla forces
across an area generally 100 miles farther south and was well
on its way toward its ultimate strength of 10,000. Intelligence
operations were also increased, and espionage groups were de-
ployed along Japanese lines of communication as far south as
Toungoo, approximately 400 miles away.
Mandalay and Beyond
In the fall of 1944 the allied forces in northern Burma opened
their drive from Myitkyina toward central Burma. Detach-
ment 101 moved its guerrilla operating area to a line generally
through Lashio to Mandalay and thence to the Chindwin
River and the India border. At that time it reached its great-
est strength and highest stage of development. In the area
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001'435
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
of Lashio there were seven separate battalions, each capable
of independent operations. North of Mandalay there were ap-
proximately 2,500 guerrillas, organized into units of varying
size, depending upon the local situation. To the west, between
the railway corridor and the British 14th Army in the Imphal
area near the India-Burma border, lay a stretch of over 250
miles in which no allied combat forces were operating.
Through this gap ran a series of parallel corridors, excellent
natural approaches for the enemy to the Ledo Road being
constructed behind the allied combat forces. General Sul-
tan, who had succeeded General Stilwell as Commanding
General NCAC, directed Detachment 101 to utilize its guerrilla
and intelligence resources to block these several approaches.
Guerrilla forces were accordingly deployed in each of them,
and with information supplied through intelligence activities
were able-although not without some severe fighting-to fend
off several Japanese probes through the area.
Intelligence operations during this phase of the campaign
were widely developed and reached their greatest degree of re-
liability. There were over 100 operations involving in excess
of 350 agent personnel. Through these and the collection of
information by the guerrilla forces, Detachment 101 was able
to stay abreast of the changing organization, deployments,
and strengths of the Japanese forces. In fact, its intelligence
officers probably knew at least as much about the Japanese
tactical organization and capabilities as the Japanese them-
selves did.
When Lashio and Mandalay were captured by allied forces,
the Detachment was directed to withdraw its forces from the
field and inactivate. Soon, however, the combat situation in
southern China became extremely critical, and it was necessary
to withdraw all Chinese and American combat forces from
northern and central Burma to try to stem the Japanese drive
there. General Sultan therefore directed the Detachment to
reconstitute whatever force was necessary to conduct a mop-
ping-up operation in the southern Shan States and seize the
Taunggyi-Kengtung road, the Japanese escape route to Thai-
land. Most of our intelligence operations had been retained,
fortunately, so there was a sound basis for embarking on this
assignment: with some of the Kachin guerrillas as a nucleus,
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
a force approximately 3,000 strong was organized into four
battalions. The Japanese, however, had evidently not been
told that this was to be a mopping-up operation; it resulted
in some of our bloodiest fighting of the war. In less than
three months the Detachment's forces killed over 1,200 Jap-
anese and suffered more than 300 killed in action themselves,
far more than in any other period. When the escape route
to Thailand had been secured, Detachment 101 was inacti-
vated. This was 12 July 1945.
Requirements and Collection
Intelligence requirements on the Detachment stemmed from
a variety of sources. Tactical information was required chiefly
by Headquarters NCAC, its subordinate commands, and the
10th Air Force, but requests were also received from the Brit-
ish 14th Army and Headquarters Allied Land Forces South-
east Asia. Information of a strategic type would be re-
quested by higher OSS headquarters, CBI Theater Headquar-
ters, and the allied Strategic Air Command under General
Stratemeyer in Calcutta. Detachment 101 itself required in-
formation of all varieties for planning and conducting its field
operations.
With the NCAC, broad intelligence requirements were nor-
mally received from the Commanding General in conference.
Specific requests came through the Detachment's liaison of-
ficer maintained on his G-2 staff. The same general proce-
dures obtained with the 10th Air Force. On the basis of these
requirements, along with all others, an intelligence plan would
be drawn up, outlining the information to be obtained, the
probable target areas, and the likely sources. If sources were
already available in the target area, they could simply be asked
for the information through normal communication channels.
When sources were not available, it was necessary either to
adjust operations to obtain the information or to plan new
intelligence operations, for which indigenous personnel would
have to be recruited, trained, and infiltrated.
The infiltration of agent personnel into proposed areas of
operation was effected by parachute or light aircraft or along
land routes. The infiltration procedures were in general simi-
lar to those used in other theaters of war; but there was one
7
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001 A-IT
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
device we employed that involved a unique use of pigeons.
Each agent parachuted behind the lines had attached to him
a small bamboo cage just large enough to hold a pigeon by
which he could report the condition of the radio that had
been dropped along with him. After the agent had landed,
cleared the drop zone, and had an opportunity to test his radio,
he would release the pigeon, preferably near daylight, with a
coded message either indicating that all was well or giving in-
structions when and where to drop another one. For ranges
up to two or three hundred miles the pigeons were highly re-
liable; beyond 400 miles their dependability decreased rapidly.
The intelligence requirements levied on the Detachment
were such that almost anything taking place behind the enemy
lines was of interest. Primary emphasis was placed upon mili-
tary information, such items as the strength, identity, and
movement of Japanese units, details on supply installations,
airfields, and equipment, and whatever else was required to
provide a continuous, composite picture of the enemy situa-
tion. Much terrain information was also reported, principally
on the condition of roads and railroads, the water level and
fordability of streams, and the location of potential airfields
and drop zones. Since most of the Detachment's personnel
were indigenous to the area and intimately familiar with its
physiography, this information was rather easy to assemble
and report. Economic, sociological, and political intelligence
was also in great demand in higher OSS headquarters in the
theater, in such agencies as OWI for psychological warfare op-
erations, and in air units for pilot briefing and survival train-
ing. It was also needed by the Detachment itself both for
morale operations aimed at psychological subversion and for
developing agent cover.
The main sources of information were the numerous intel-
ligence agents trained at the Assam base or in the field. Each
major field unit had an intelligence officer, usually an Ameri-
can but in some instances a foreign officer or an indigenous re-
cruit trained for the position, whose principal duties were to
interrogate captured enemy soldiers or agents, debrief guer-
rilla personnel, and direct the activities of the espionage
agents assigned to the unit. Intelligence personnel at the
forward operational headquarters and at the base camp were
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921AOQ0300M0091-a
also engaged in collecting information, principally through
interrogation of prisoners and debriefing of operational per-
sonnel returned from the field.
Weather and Air Targets
In conjunction with Air Weather Service of 10th Air Force,
the Detachment developed a capability for collecting and re-
porting weather data. The Weather Service provided the
equipment, instruction, and weather codes. These were given
to selected agents who were then so dispersed, singly or with
other groups, that in the aggregate they provided coverage
of all of central and northern Burma. According to the A-2,
10th Air Force, this service was of considerable assistance in
developing meteorological forecasts for cargo flights over the
"hump" and for tactical air operations in northern Burma.
Of especial interest were some of the procedures used in re-
porting air targets for the 10th Air Force. In the lower
reaches of the Hukawng Valley an intelligence agent worked
out some simple but ingenious ways to pinpoint and report
Japanese supply installations concealed by dense jungle foli-
age. One method was to select a landmark such as a trail
junction, bridge, or prominent tree which could be identified
readily on an air photo or by the pilot of the fighter-bomber
aircraft. From the landmark the location of the target was
given by polar coordinates (distance along a given azimuth).
Another method was to lead the pilot from such a landmark
to the target by a series of reference points.
Numerous Japanese installations located by these means
were bombed or strafed without the pilot being able to see his
target; huge explosions or fires erupting through the trees
would indicate a successful attack. The Japanese knew that
something was amiss. Since the targets were completely hid-
den from the air, they deduced that the attacks were being
directed from the ground and suspected the Kachins. They
accordingly restricted entry to their supply areas and would
shoot a Kachin on sight. To protect the Kachins these opera-
tions had to be suspended for a time.
In the later phase of the Burma campaign procedures were
worked out with the 10th Air Force for immediate air strikes
against targets of opportunity. Pilots flying air alert and
A9
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
agents on the ground were given duplicate sets of air photos
with a special grid superimposed. To obtain action against
a target the agent would send a coded radio message specify-
ing the type of target and its grid location to the Detachment's
forward operations headquarters, located in the immediate vi-
cinity of Headquarters NCAC and the 10th Air Force. 10th
Air Force would relay this to the pilot in the aircraft, and
after a normal elapsed time of 20 to 30 minutes from the
origination of the message an air strike would be made on the
target.
Transmission Channels
To expedite the flow of intelligence to user agencies the De-
tachment established comprehensive handling and transmis-
sion procedures. All messages from the field came in to the
forward operations headquarters, where field operations were
coordinated by an operations officer and a staff including mem-
bers of the morale operations, intelligence, resistance, and
other sections. The intelligence personnel on the operations
staff screened all incoming information. If it was of an urgent
nature, it was given a hasty evaluation and immediately dis-
patched to the using agency. Other intelligence messages
were routed to the intelligence section for review and subse-
quent transmission to user agencies ona routine basis.
Detachment 101 had liaison groups with each of the major
combat commands it supported-NCAC, 10th Air Force, Brit-
ish 14th Army, and ALFSEA. These officers represented the
Detachment in all operational matters, an arrangement that
served to enhance their stature and give them considerable
prestige in their intelligence dealings within the headquarters.
Intelligence-wise, they were responsible for accepting infor-
mation requests from the headquarters and forwarding them
to the Detachment, for passing information and intelligence
received from the Detachment on to the intelligence staff, and
for representing the Detachment in all other intelligence mat-
ters. Information was transmitted to NCAC and the 10th
Air Force by teletype and could be moved most rapidly. The
communication link with 14th Army and ALFSEA was radio,
which required additional time for coding and transmission;
the elapsed time, however, was sufficiently small that it could
be measured in terms of minutes.
AApproved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
Field liaison groups were also maintained with the Chinese
1st and 6th Armies, the British 36th Division, and the Mars
Task Force, which had succeeded Merrill's Marauders. These
liaison groups were small, normally consisting of one officer
(generally one with considerable field experience) and a radio
operator. They performed intelligence functions comparable
to those of the higher headquarters liaison groups.
The intelligence transmitted via radio and teletype was sum-
marized and supplemented in the Detachment's weekly and
monthly situation reports, distributed through ordinary mili-
tary messenger service. These were given fairly wide distribu-
tion in the theater, going to approximately 100 agencies.
Reliability and Security
Detachment personnel concerned with the evaluation of in-
formation arrived at some unusual conclusions. They found,
for example, that information reported by the Kachins was
generally highly accurate, but that their reports of enemy
strength were almost invariably about three times the actual
figures. Strength reporting was then stressed in the training
program to the extent that the pendulum swung the other
way, and the strengths given in Kachin agent reports were so
underestimated that they had to be increased by a factor of
three. It was not until the winter of 1944-45 that it was pos-
sible to obtain reliable strength figures from Kachin person-
nel. Other ethnic groups were found to have comparable
traits, more or less uniform within each group. The evalua-
tors developed correction factors for the Shans, Chins, Bur-
mese, Padaungs, and even the remnants which had remained
behind in Burma from the original Chinese Expeditionary
Force. All of these groups overestimated strengths, but the
Chinese grossly exaggerated them. Their strength figures had
to be reduced approximately ten times, and this practice re-
mained constant to the end of the campaign.
The Detachment's counterintelligence operations were
purely defensive, designed to protect it and its field operations
from infiltration by enemy agents. The number of counterin-
telligence personnel assigned was consistently small,. 3 to 5.
They arranged for the physical security of base installations
and for the indoctrination of U.S. and indigenous personnel.
All
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Detachment 101
The indoctrination was concerned principally with the meth-
ods used by Japanese agents to penetrate and mislead allied
clandestine operations and with means for isolating such
agents. Counterintelligence functions in the field were the
responsibility of the Area Commander or Group Leader in
charge of a unit. As a general rule the commander relied
mainly on his intelligence officer to ferret out enemy agents,
uncover double agents, and of course determine what should
be done with them. The Detachment attempted to make all
personnel security- and counterintelligence-conscious for their
own benefit and to avoid attracting undue attention to the
clandestine activity. As a result, the security of the Detach-
ment and its operations, despite some minor infractions, was
very good. Not a single agent or operation was known to
have been eliminated through enemy intelligence penetration.
Appraisal
Detachment 101's two principal intelligence consumers
made attempts to weigh its intelligence contribution to the
northern Burma campaign. G-2, NCAC, estimated that it
provided between 80% and 90% of all of the combat intelli-
gence utilized by that headquarters. The 10th Air Force re-
ported that it furnished up to 70% of its usable information
and designated between 90% and 95% of its air targets. In
addition, the Detachment was one of the principal sources
of bomb damage assessment information for the 10th Air Force
and for SAC. No attempts were made to measure the intelli-
gence contributed to other headquarters, but letters of appre-
ciation showed that it was welcome and considerable. This
intelligence was also an indispensable ingredient in the de-
velopment of the Detachment's own resistance and other clan-
destine operations.
Units comparable to Detachment 101 collected information
behind the lines in France, Italy, the Philippines, China, and
other areas. In the aggregate they represented an immense
intelligence capability of a type for which, if there should be
another war, there would in all probability be a strong re-
quirement. Each of these operations, however, experienced
growing pains, and there was a lag time of from one to two
years before they were able to produce tangible results. It
would be highly desirable, therefore, that the personnel who
W proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A0Q0300290001-3
Detachhment 101
may be used in such operations in the future should be so
oriented, trained, and organized that this critical lag could
be minimized. How this is to be accomplished appears as a
pressing and continuous problem for the intelligence com-
munity.
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029000'I1-
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Academic studies in interna-
tional relations might usefully
be supplemented by a course in
intelligence processes.
FOR COLLEGE COURSES IN INTELLIGENCE
The transition in the U.S. national posture accomplished
during the first half of this century, from a seeking of security
in isolation to recognition that our national welfare depends
upon active participation in international politics, had its
corollary in the academic world. Many non-government or-
ganizations, foundations, universities, and colleges have
played an important role in increasing the public knowledge
and administrative skills prerequisite to effective U.S. action
in the international arena. A wide variety of new courses and
entire schools have been devoted to foreign affairs and inter-
national relations, and additional ones still continue to be es-
tablished.
The new public interest in global matters has by and large,
however, not been extended to intelligence and the principles
and processes by which it is prepared. At the end of World
War II there was, to be sure, the debate about Allied intelli-
gence in the Bulge, the congressional inquiry ' into the Pearl
Harbor surprise, and a good deal of general regret for the lack
of pre-war interest in intelligence, to which General Eisen-
hower contributed with comments in Crusade in Europe. But
this kind of soul-searching was confined largely to official cir-
cles. In the academic world, I believe, U.S. intelligence is
treated only in its strictly military aspect, in specialized ROTC
courses. There have been academic studies dramatizing busi-
ness espionage 1 and some pedagogical treatment of research
methods applicable in intelligence, but no college training in
the subject as a coordinated whole.
There are good reasons why this has been so. Intelligence
traditionally and for the most part necessarily does its work
behind the scenes, and its influence on the national welfare
seldom strikes the public eye. Nor does this country have be-
For example Competitive Intelligence, by students at the Graduate
School of Business Administration, Harvard University, reviewed in
Intelligence Articles IV 2, p. A46.
A15
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
A15-A18
Approved Fpr Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
courses in intelligence
hind it the centuries of international leadership which devel-
oped the acknowledged British competence in intelligence and
made the British public proud of it. Now that the United
States has come to occupy the center of the international
scene, the role of intelligence is well recognized among offi-
cials of the government; public interest and academic con-
cern have yet to be awakened.
There are signs of a public awakening, however. Commen-
tators showed concern over faltering intelligence on Chinese
Communist participation in the Korean War, on the strength
of the Ho Chi Minh forces in Indochina, and on the British-
French-Israeli Suez venture. More recently a persistent and
widespread discussion of intelligence processes has been set off
by the Senate inquiry into the "missiles gap." Cartoonist
Berryman's J. Q. Public, worried by the intelligence estimates
controversy and saying, "I wish someone would explain it to
me," seems to represent truly a deep interest and a legitimate
requirement of the U.S. citizen. The U-2 incident and its re-
percussions at the summit are certain to give this interest a
new impetus.
It is the thesis of this paper that the awakening public
concern with intelligence offers our universities and colleges
an opportunity and a challenge-the opportunity to take ad-
vantage of a rising interest and to meet a clear need, and the
challenge to meet it effectively and thereby ultimately con-
tribute to improving U.S. intelligence doctrine and competence.
It is suggested that a good beginning could be made by es-
tablishing a basic course of study in the meaning of intelli-
gence, its significance as the foundation for policy planning
and a guide for operations, how it plays those roles, and the
principles and processes by which it is produced and formu-
lated. Such a course should not be narrowed to the specialties
of political or military intelligence, but develop broad princi-
ples applicable in all fields. It should highlight the concept
of intelligence and intelligence processes as a critical factor
in almost every form of human social endeavor-economic,
scientific, and cultural, as well as military and political-be-
ing essentially a processing and use of facts and a making of
judgments in a logical program for a specific purpose.
A16
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Courses in Intelligence
The intelligence course would apply the teachings of many
academic disciplines. Specialists in economics, politics, sociol-
ogy, and logic, in written, oral, and visual presentation could
among others be used in the instruction. The program should
be framed and guided, however, by a competent teacher with
extensive and well-rounded intelligence experience, not merely
a few years in some particular intelligence field. The course
would need to run through two semesters at three class hours
per week, and should be offered to students at the graduate or
at least immediately pregraduate level. Lectures should be
minimized in favor of reading, discussion, conferences, and
practical exercises. It would not be proposed in this basic
course to cover the history of intelligence or to go deeply into
special problems involved in the guiding of the intelligence ef-
fort by its users and its application in the conduct of opera-
tions. Some of these subjects could be incorporated into exist-
ing courses in international affairs, others would be left to
separate advanced courses as the program developed.
The course in intelligence fundamentals, taken by the stu-
dent at point of maturity, would have the broad educational:
advantage of employing and expanding his earlier learning and
making it meaningful within a single coordinated, purposeful
program. It would be of direct value to students contemplat-
ing government service, whether in intelligence or elsewhere,
and of cogent interest to the intellectually inquisitive heading
for careers in most fields of private enterprise. More impor-
tantly, perhaps, since our government is one responsive to
the will of informed citizens, it would provide an indispensable
ingredient to those studies of the policy-making and decision-
reaching process which presently loom so centrally in univer-
sity courses devoted to creating an informed citizenry in the
fields of public administration, foreign affairs, and interna-
tional relations.
All too generally such courses treat only the policies made
and the mechanisms through which they are effected. The
heart of effectiveness, however, in public administration or the
conduct of international affairs is the making of sound deci-
sions, and these must be based on what in broad sense we
call intelligence. In present curricula the student seldom
has the opportunity to learn what kinds of raw materials are
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002900011-
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Courses in Intelligence
needed or how they are collected and consolidated to give the
unitary understanding essential in formulating sound plans
and guiding their execution.
Even a prospective business executive should learn not only
the principles of economics, commercial and industrial organi-
zation, corporate finance, and the other usual subjects, but
also what kinds of facts he needs to know in applying these
principles and how such facts can be collected, evaluated, and
consolidated for use in planning. Study of the intelligence
process can bring home to him the need to take into consid-
eration kinds of factors of which he might otherwise not be
aware. For the student in foreign relations the study of the
production and use of intelligence is of more immediate ap-
plication, bringing out the importance of factors such as cul-
tural differences, economics, and religion, which present col-
lege courses rarely treat in a meaningful way. In short, such
study should round out a student's understanding of his
chosen field, no matter whether it lies in sociology, politics,
or business, and help him to become the kind of citizen de-
manded by the role this country must now play on the stormy
international scene.
.AJ*roved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
The Soviets see in us an un-
differentiated and repugnant
threat to their security, much
like Soviet espionage and sub-
version in U.S. eyes.
SOVIET PUBLICISTS TALK ABOUT
U. S. INTELLIGENCE
Peter Deriabin, in The Secret World,' recalls that an old So-
viet pamphlet on the subject of U.S. intelligence treats the
CIA, CIC, Naval and Air Intelligence, and even the FBI as com-
ponents of a single organization. This concept is entirely in
accord with the standard Soviet public attitude, which regards
U.S. intelligence as a distinct service or function in which
many different U.S. government and private agencies may par-
ticipate at one phase or another. The Soviets most often,
therefore, refer generically to "U.S. intelligence," ignoring the
niceties of bureaucratic organization. When they do men-
tion individual components of the intelligence community,
they are likely to blur or confuse their operational roles. If
this imprecision seems a deliberate device to permit indiscrimi-
nate name-calling or to hide what they do know about U.S.
intelligence organization, one should recall that U.S. citi-
zens, officials, and even intelligence officers are likely to dis-
criminate poorly among the several Soviet intelligence agen-
cies, which have nevertheless been thoroughly described in
Deriabin's book and others.
Spies of the State Department
The espionage activities of U.S. intelligence are generally
depicted as being carried out under the guidance and direction
of the State Department by virtually every group or individual
that deals in any way with foreign governments or peoples.
Several Soviet sources have recently described the State De-
partment's Bureau of Intelligence and Research as "the liai-
son link between striped-pants diplomats and the cloak-and-
dagger personnel abroad." All U.S. embassy personnel are
presumed to be involved in espionage activities directed against
the Soviet Bloc. A Kozev article in Pravda alleged that Gen-
'Doubleday, 1959. Reviewed in Intelligence Articles IV 1, p. 109.
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029000'f-39
MORI/HR
P from
P9.
A19-A26
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
U.S. Intelligence
eral Bedell "Smith's guidance [of the Moscow Embassy] was
notably distinguished by the fact that he forced literally
every single member of the staff, down to the last clerk and
regardless of the department in which he was employed, to en-
gage in intelligence work."
The Soviets see verification of the relationship between di-
plomacy and espionage in such facts as General Smith's hav-
ing been posted, after his tenure as Ambassador to the USSR,
first to CIA and then to State, in Admiral Kirk's position in
Naval Intelligence prior to his assignment as Ambassador to
Moscow and his subsequent chairmanship of the American
Committee for Liberation, and of course in the teaming of the
Dulles brothers at the head of the twin foreign affairs agen-
cies. Over the past eight years Soviet spokesmen have fre-
quently quoted Annabelle Bucar's The Truth about American
Diplomats,2 particularly the examples she gives to show that
"intelligence agents are sent to the USSR under various
.guises: as counsellors, second and third secretaries, attaches,
and even ordinary clerks." Khrushchev's 9 May 1960 remark
at the Czechoslovak Embassy exculpating Ambassador Thomp-
son. of complicity in the U-2 incident was a benign exception
to the general view that there is no cleavage between U.S.
diplomats and U.S. espionage.
A book by I. Nikitinsky, The Perfidious Methods of the Sub-
versive Activity of Imperialist Intelligence Services,3 com-
ments on the excellent espionage training given U.S. diplo-
mats. It says that the student body at Columbia University's
Russian Institute is made up primarily of Foreign Service of-
ficers, cadets from West Point, and students from the Naval
Academy, and that the Universities of Indiana and Pennsyl-
vania, Yale, and the Air Force School at Syracuse University
have similar spy-training programs.
The State Department is also considered the focal point for
espionage against the USSR done by official and unofficial
groupings as diverse as the Ford and Rockefeller foundations,
MSA, ICA, IBRD, the Jehovah Witnesses, the Rand Corpora-
tion, the Vatican, the IRO, journalists, correspondents, and
Republished in the Soviet Union by Literary Gazette in 1950.
? Moscow, 1954.
AAA proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300 0001-3
U.S. Intelligence
many others. Moscow University students have been cau-
tioned particularly against tourists, "50 percent of which are
spies connected in one way or another with American intelli-
gence." A 4 February 1960 Red Star article on the "U.S. es-
pionage octopus" pointed out to Army personnel that "Ameri-
can intelligence employs military attaches, diplomats, and
other official and unofficial observers as spies." Such warn-
ings were given with increasing frequency as East-West ex-
changes and tourism were expanded.
In general, the Soviet military press carries more material
on U.S. intelligence activities than say Pravda or Izvestia, with
the obvious purpose of maintaining a high state of counter-
espionage alert within the Soviet military. Although U.S.
military attaches are described as the main link to the intel-
ligence organs of the armed forces, the distinction between
military and other intelligence is generally presented, as by a
13 March 1959 Red Star article, as a purely functional break-
down: the military attaches are primarily concerned with
military dispositions and technology, whereas others spy out
political and economic matters.
During the past year the Soviets have taken increasing
notice of U.S. intelligence collection by scientific and techno-
logical means. References to electronic devices for monitoring
Soviet rocket tests and the launching of earth satellites, to
the pilotless SD-3, and to project "Sentry" for using earth
satellites to photograph Russian territory have been pub-
lished. Discussions of scientific espionage are sometimes in-
troduced by quoting Mr. Dulles' 15 October 1959 statement in
New York, "We feel that the scientific side of intelligence col-
lection should be emphasized to the point where radar and
electronics tend to take the place of the wiles of the Mata
Hari of several decades ago."
These warnings and other propaganda alerting the people
to U.S. espionage activity are addressed chiefly to those who
might disclose classified information unwittingly, rather than
to the few "bourgeois degenerates" who would deliberately be-
tray state secrets. A typical story is that of a young Soviet
flyer on a train who got involved in a discussion of the rela-
tive merits of Soviet and foreign aircraft. Out of patriotic
pride and in order to show off his knowledge, he cited Soviet
A21
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
A~pp roved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
U.s. Intelligence
advances that were classified information and even described
aircraft in the testing stage. One of the passengers on the
train took little part in the conversation, but occasionally ex-
pressed doubts about the young flyer's knowledge in a way
that incited him to even more revelations. This quiet man, of
course, was a U.S. agent.
Cutthroats of CIA
Several Soviet publicists have recently commented at length
on CIA activities, particularly in connection with H. H. Ran-
som's Central Intelligence and National Security,4 which has
obviously been carefully studied by responsible officials in the
Soviet Union. An April 1959 New Times article by J. Yudin
quotes data from the book on the new CIA building, the num-
ber of buildings currently occupied, the number of employees,
an estimate of the total budget ($2 billion), and some of the
functions of CIA.
Although these commentators take note of its role as co-
ordinator of intelligence, CIA is normally presented primarily
as the agency responsible for planning and carrying out sub-
versive activities in the USSR and other Bloc countries, for
the direction of psychological warfare campaigns, and for
paramilitary operations related to the East-West struggle in
the non-Communist world. The Soviet citizen is given. the
picture of a dangerous and wily adversary willing to stop at
nothing to recruit agents, train them, and give them weapons,
explosives, poison, money, false papers, and other equipment
for organizing subversion in the Soviet camp. These op-
erations have a dual purpose-an economic one, to disrupt the
work of industrial and agricultural components, and a political
one, to prepare revolts, rebellions, street riots, and general dis-
order. It is said that CIA subversion was a major contrib-
uting factor in the Berlin riots and in the Hungarian revolt,
and that such operations are not carried out without the
knowledge of the high diplomats in U.S. embassies.
CIA's clandestine activities are ascribed variously to its
"Secret Operations Branch," its "Department of Dirty
Tricks," or its "Department of Covert Activities." The over-
throw of the Arbenz regime in Guatemala is cited as the prime
'Cambridge, 1958. Reviewed in Intelligence Articles 11 4, p. 79.
AApproved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16: CIA-RDP78-03921Aa0D3QQ290001-3
n e igence
example of such activities outside the Bloc, with the coup
against Mossadegh in Iran a regular second. The Moscow
broadcast of a recent Neues Deutschland article on CIA adds
"two new examples which are fresh in our mind: Jordan,
where the coup succeeded, and Syria, where it failed." The
attempted assassinations of Togliatti, Duclos, and Tokuda and
the murder of Julien Lahaut, however, were attributed gen-
erally to imperialist intelligence services, not to CIA.
Soviet sources refer frequently to the recruitment and use
of defectors as agents against the Bloc. Since the enactment
of the Mutual Security Act in October 1951, CIA is presented
as having inexhaustible funds for this purpose. Propagan-
dists constantly refer to the $100,000,000 granted by the Ker-
sten Amendment and imply that the figure has increased
since that time. It has also been alleged that large U.S.
monopolies such as DuPont and General Motors spend
$350,000,000 annually for subversion and that the AFL pro-
vides $100,000 every month for U.S. intelligence. Occasion-
ally an essayist seeks to sort out the roles of U.S. private
and governmental agencies in subversive work: in the Febru-
ary 1957 International Affairs K. Ivanov distinguishes among
the CIA, CIC, ICA, Office of Special Warfare, and USIA, and
among the several foundations, the Crusade for Freedom, the
Committee for Liberation, etc., noting that they are all coordi-
nated by the OCB.
A book by P. Yakhlakov, Vigilance is the Tested Weapon of
the Soviet People, describes U.S. subversive activities as the
work of unscrupulous people who recruit "gangsters, pimps,
criminals, and bandits from the dregs of society for whom
espionage and subversion are a means of livelihood and profit."
Several books and newspaper articles have referred to an
alleged statement in late 1951 by C. D. Jackson, then described
as the leader of the fascist organization Committee for a Free
Europe: "We need the support of cutthroats and hoodlums,
as many as we can recruit." The procedure is typically de-
scribed as follows: U.S. intelligence agents screen displaced
persons who are detained by force under miserable conditions
in refugee camps in West Germany. All kinds of pressure, in-
cluding deceit, bribery, and blackmail, are applied against
these people to compel them to carry out subversive activity
A23
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
U.S. Intelligence
against their homeland. Selected persons are then sent to
the village of Bad Wiesee near Munich where they are taught
the arts of sabotage, terror, espionage and murder. When
their training is completed they are given the necessary equip-
ment and dropped by parachute from unmarked American
aircraft over the Ukraine. They are instructed to get into
Kiev and use whatever means are necessary, including mur-
der, to obtain genuine Soviet documentation. Then they are
to get into touch by radio with the American espionage cen-
ter in West Germany for further instructions regarding
espionage, sabotage, and subversion.
Soviet publicists also charge CIA with psychological war-
fare operations, of which the Free Europe Committee is seen
as the archtype, and apparently quite dangerous. The Yudin
article of April 1959 says that CIA provides about three-quar-
ters of the funds for the Committee. Another CIA function
in Soviet eyes is to oversee and subsidize the intelligence serv-
ices of other Western governments, but published statements
on this subject are vague and propagandistic. The West Ger-
man intelligence service is most frequently cited as closely
tied to CIA. The recent Neues Deutschland commentary on
CIA had the establishment of a West German center for psy-
chological warfare originating "in the CIA manure pile."
"The espionage-sabotage service of the Hitlerite intelligence
officer, Reinhard Gehlen, lives on American dollars under the
guardianship of Dulles' CIA," says an article by V. Makhov in
a 1957 collection, About Those Who Are Against Peace.
The ten-page Makhov article is probably the most detailed
and comprehensive description of CIA and its works in the
open Soviet literature. It expounds all the themes enumer-
ated above, illustrating them-with characteristic organiza-
tional imprecision-from press reports of General Donovan's
activities in Thailand and during the Hungarian revolution,
from published U.S. allusions to Ambassador Peurifoy's and
Allen Dulles' part in the Guatemalan coup, and from confes-
sions of former members of "Dulles' full division of agents"
who have been apprehended behind the iron curtain. It in-
cludes a biography of the evil genius Dulles himself, stress-
ing his Wall Street background and his status as an agent
for the monopolists in all foreign and military affairs from
A4proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
U.S. Intelligence
insuring the domination of U.S. capital abroad to establish-
ing naval strength ratios. It affirms, on the basis of captured
Nazi Foreign Ministry documents and other evidence, that
his chief wartime mission in Switzerland was to see to the
preservation of German economic and military might as a
bulwark against the USSR.
Analysis, Estimates, and the Shaping of Policy
The very little that is published in the USSR on the U.S.
intelligence community's estimative function is cast in tones
of satire and belittlement. In a recent example, an article
by Leontyev in the 31 January 1960 issue of Red Star, en-
titled "The Spies Count Rockets," noted Defense Secretary
Gates' statement on Soviet ICBM capabilities and said that
his information was derived through the following calcula-
tions: "There are five crows sitting on one fence and three
crows sitting on another fence. Now, how many rockets does
the Soviet Union have?" More generally the Soviets take
the line that our ability to estimate their capabilities accu-
rately is impeded by our preconceptions and by our inability
to see the world situation in realistic terms.
The Nikitinsky book cited above mentions that "sociologists,
historians, economists, geographers, transportation and com-
munication engineers, and other `scholars' are ... a part of
the western intelligence service." These so-called scholars
are said to have sold themselves to U.S. intelligence and bound
themselves to carry out. assignments on the demand of their
masters. This and other such statements imply that aca-
demic or intellectual elements in the community merely prove
what they are told to prove without any attempt to arrive
at logically reasoned conclusions. The Soviets do not present
the U.S. intelligence community or any part of it as an in-
tellectual organization.
But they leave no doubt that the intelligence community,
and CIA in particular, wields a critical influence in the for-
mation of U.S. policy, for "every step a government takes is
determined by the nature and the slant of the intelligence
information it receives," and U.S. intelligence is an integral
part of the Wall Street machinery that determines foreign
policy. The Yudin article cited above says that Allen Dulles,
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001 5
Approved For Release 2005/03/16: CIA-RDP78-03921A000300290001-3
U.S. Intelligence
"though normally only an advisor to the National Security
Council, has become the chief figure in all its deliberations."
Several Soviet publicists have quoted a Washington Post arti-
cle to the effect that "CIA serves as a refuge for dare-devil
cutthroats. . . . Through their activities they can start the
ball rolling in the field of foreign policy." The 1955 summit
conference had hardly ended, Makhov says, when Allen Dulles
demanded that there be no yielding to the spirit of Geneva.
This Soviet view of the effect of intelligence on policy is
consonant with that of the relationship between their own
policy-making and intelligence organs. There was more than
just scapegoating in Soviet statements that Beria, operating
in his capacity as an intelligence chief, was primarily respon-
sible for the rupture in relations between the USSR and Yugo-
slavia. And Soviet spokesmen's treatment of the exposure of
U.S. overflights in its effect on the summit conference epito-
mizes their distrust of the force that intelligence activities
exert on the framing and carrying out of national policy.
A26
For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
INTELLIGENCE IN RECENT PUBLIC LITERATURE
INTELLIGENCE AND ECONOMIC THEORY
THE STAGES OF ECONOMIC GROWTH: A Non-Communist
Manifesto. By W. W. Rostow. (New York: Cambridge
University Press. 1960. Pp. 179. Cloth $3.75, paper $1.45.
Also London: Cambridge University Press. 1960.)
This is an important book. Professor Rostow's thoughtful
and imaginative study takes the masses of discrete facts that
have marked the development of the many modern national
economies and puts them into a single common framework.
In the course of identifying and defining five progressive
stages of development applicable to all the individual cases,
the author presents not only a general theory of the economic
growth of nations but also a synthesis of modern history.
His work is more than provocative analysis of the past, how-
ever, for its concepts have also the predictive value of sound
scientific theory.
The analysis is built around the proposition that the eco-
nomic activity of any nation at a given time can be identi-
fied as falling within one of these stages-the inertia of the
traditional society, fulfillment of the preconditions for take-
off, the takeoff, the drive to maturity, and the age of high
mass consumption. The traditional society is described as
one in which per capita production is limited by inability or
failure to use modern technology in any systematic fashion.
Traditional societies in general concentrate most of their
human and capital resources on agriculture; the resultant
social structure is quite rigid, and people are resigned and
fatalistic about long-run prospects for improving the levels
of living.
The transition to sustained economic growth is preceded by
a period in which the preconditions for takeoff are met. In
this second stage the ideas and institutions making for mod-
ernization gain, not necessarily the upper hand, but first tol-
eration and then enough freedom of action to initiate and
A27
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
A27-A31
lADDrotve.d Fosr Economic 005/03/16: CIA-RDP78-03921A000300290001-3
sustain a process of economic transformation. Some of the
more important of the complex variety of preconditions are
a change in value judgments involving the acceptance of eco-
nomic progress as a desirable goal, the emergence of a class
of entrepreneurs, and the creation of institutions for the mo-
bilization of savings. Probably most important is the estab-
lishment of an effective centralized national state.'
The third stage, the takeoff, is "the great watershed in the
life of modern societies." At this point the forces making for
economic progress achieve critical mass. Rapid growth oc-
curs in a few key sectors of the economy. Investment in-
creases from 5 to 10 percent or more of national income. New
techniques power the rapidly growing manufacturing sector
and penetrate the agricultural sector as well. In short,
growth becomes the normal condition and is sustained by dy-
namic forces, irreversible as the loss of innocence.
Some 60 years after takeoff, with surprising uniformity, the
modern economies have reached maturity, a stage defined as
one in which they demonstrate the ability to apply advanced
technology over the total range of their activities. Then fol-
lows finally the stage of high mass consumption, where the
leading sectors shift toward the production of durable con-
sumers' goods and services. The decisive element in this
stage, the author notes, has historically been the quantity
production of inexpensive automobiles, with its concomitant
revolutionary social and economic effects.
Professor Rostow emphasizes that there is nothing preor-
dained about a society's passage through these conceptual
stages of growth: at every stage it is confronted with funda-
mental policy choices, and making these choices is an exer-
'Professor Rostow and his colleagues at the Massachusetts Institute
of Technology have expanded their analysis of the preconditions
period-perhaps the most crucial one in economic growth, requiring
a vast array of economic and non-economic changes in the tradi-
tional society-in a study prepared for the U. S. Senate Committee
on Foreign Relations, "Economic, Social and Political Change in
the Underdeveloped Countries and Its Implications for U. S. Policy"
(86th Congress, 2nd Session, Washington, D. C., 1960).
A28
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-0 921At00030090001-3.
ecen oo s.?
conomic
cise in value judgments far outside the province of economic
analysis. In the author's words:
The stages of growth are not a set of rigid, inevitable, prede-
termined phases of history. The process of growth imposes for
men and societies certain problems and possibilities from which
they must choose, and modern history can be viewed as the con-
sequences of choices made by various societies at various stages
of growth.
The erection of an alternative rational framework into
which the history since 1700 of all nations may be fitted in-
evitably clashes with the dogma of Communism, and the final
chapter of this book is therefore devoted to a comparison be-
tween Karl Marx's construction of history and the stages-of-
growth concept. Writing 120 years after Marx, Professor
Rostow has an enormous advantage in the experience of the
many nations which during that interval have developed their
economies to the point of high mass consumption. Marx's
predictions about the future evolution of industrial capitalist
societies, based on the single experience of the United King-
dom's drive to maturity, have not been borne out, and the
Marxist-Leninist alternative to capitalism is appraised here as
follows:
Communism is by no means the only form of effective state or-
ganization that can consolidate the preconditions in the transi-
tion of a traditional society, launch a takeoff, and drive a society
to technological maturity ... Communism takes its place . . . as
one peculiarly inhumane form of political organization capable
of launching and sustaining the growth process in societies where
the preconditions period did not yield a substantial and enter-
prising commercial middle class and an adequate political con-
sensus among the leaders of the society. It is a kind of disease
which can befall a traditional society if it fails to organize effec-
tively those elements within it which are prepared to get on with
the lob of modernization.
Such a disenchanted appraisal could not be expected to
bring approving shouts of agreement from the Kremlin. The
Rostow thesis was formally denounced in a Pravda article
("Snipe in the Bog," October 19, 1959), for its failure to take
account of the class struggle and of social formations. This
criticism of the stages-of-growth theory is simply untrue, as
its author, Mr. Yuri Zhukov, head of the State Committee
for Cultural Relations with Foreign Countries, undoubtedly
A29
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Economic
knows. His party-line invective may, however, reflect a gen-
uine concern at the appearance of this new, persuasive theory
of economic development. The men in the Kremlin know
that many decisions fateful for the future of the world are
not being made in Moscow or Washington, but in capitals like
Karachi, Conakry, Djakarta, and Cairo. They are also aware,
from their experience in the spread of the Communist ideol-
ogy, of the truth of the late Lord Keynes' observation:
Madmen in authority who hear voices in the air are distilling
their frenzy from some academic scribbler of a few years back 2
The Rostow thesis has also been attacked from the oppo-
site end of the ideological spectrum for its emphasis on the
important role the state must play in economic development.
See, for example, Professor David McCord Wright's criticisms
in the December 1959 Fortune. To those who believe strongly
that free enterprise provides the only true path to growth,
Professor Rostow's proposition that the vital entrepreneurial
spark can come from either the public or private sectors is
pure heresy. Thus we find the crux of denunciation from
the strange bedfellows of extreme right and left to fall on
the author's conclusion that there are many institutional
roads to sustained economic growth.
This bare outline of the stages-of-growth argument and the
kinds of criticism levied at it gives some indication of the sig-
nificance of the Rostow thesis for intelligence. First, as a
scholarly challenge to the Marxist economic interpretation
of history and a solid refutation of many of the key myths in
Communist lore, this could be one of the most influential
books of our time. For those who are actively working to see
that the newly emerging, fragile nations of Asia and Africa
follow a non-Communist course of development, the Rostow
thesis, with its impressive historical documentation, offers a
powerful weapon to combat the central challenge of our time.
The book should receive the widest dissemination among the
intellectual elite, in and out of government, of those coun-
tries setting out on the path of modernization.
2 John Maynard Keynes, The General Theory of Employment, In-
terest and Money (New York, 1936) p. 383.
AA9iproved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16: CIA-RDP78-R9P9 11Ag88#909t9 xI0
Secondly, for those engaged in the reporting and prepara-
tion of current intelligence and the making of estimates on
nations in the Middle East, Africa, Asia, and Latin America,
Professor Rostow has forged a theoretical framework for
thinking logically about national economic growth. Some of
his descriptive characterizations of the individual stages of
growth-the preconditions stage and the takeoff, for ex-
ample-are already a part of the language of economists
grappling with problems of economic development.
The first publication of Professor Rostow's views came after
his relevant lecture series at Cambridge in the autumn of
1958. The fact that they have stirred up a furious interna-
tional debate in this short period of time is eloquent testimony
not only to their stimulating content but also to their effec-
tiveness in challenging certain aspects of conventional eco-
nomic wisdom on both sides of the iron curtain.
A31
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
INTELLIGENCE AND MILITARY STRATEGY
THE TURN OF THE TIDE-1939-1943. By Arthur Bryant.
(Garden City, N. Y.: Doubleday & Co. 1957. Pp. 624.
$6.95.)
TRIUMPH IN THE WEST-1943-1946. By Arthur Bryant.
(Garden City: Doubleday. 1959. Pp. 438. $6.95.)
Field Marshal Lord Alanbrooke, Chief of the British Im-
perial General Staff and Chairman of the Chiefs of Staff Com-
mittee during the critical war years, made a careful and de-
tailed entry in his diary every day. This diary forms the
basis for these two volumes aggregating more than a thou-
sand pages. British historian Arthur Bryant has indexed it,
edited out superfluous material, and provided continuity as
necessary.
To say that this work will be a treasure house for the his-
torians of World War II is putting it mildly. Here are chron-
icled among other things the conflicts between the British
and the American strategy, with the British viewpoint, of
course, dominant and convincingly laid out. From the be-
ginning there was a constant struggle over the date when the
invasion of Europe should be mounted, the Americans pressing
for an earlier assault. Then followed disagreement on how
the German armies should be destroyed, the British urging
an offensive across the north German plains. And through-
out all, until the collapse of Germany, there was the issue of
getting what the British considered sufficient strength in Eu-
rope in the face of U.S. pressures for devoting more resources
to the Pacific.
If Montgomery's autobiography was blunt in expressing
his thoughts about American inadequacies, the Alanbrooke
diary is even blunter, particularly in its comments about
General Eisenhower and other revered American leaders.
Anti Alanbrooke will be taken more seriously than the flam-
boyant Montgomery. He was an extraordinarily able Chief
of Staff for the British, one of few who could have done so well.
For the student of intelligence, there is considerable mate-
rial to be found in these volumes for the searching. Alan-
brooke is no great admirer of intelligence; he grumbles sev-
MORI/HRP from
A32 pg. A32-A33
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Military
eral times about having to labor through JIC "appreciations"
and about the inadequacies of information on enemy activities
and intentions. Intelligence being not an end in itself, how-
ever, the rich insights conveyed here into its end products
and end uses will be important to any more detailed analyses
that may be made of intelligence successes and failures in
World War II, and of how intelligence was utilized by the
commanders.
MORI/HRP
from pg.
A33-A33
THE QUESTION OF NATIONAL DEFENSE. By Oskar Mor-
genstern. (New York: Random House. 1959. Pp. 306.
$3.95.)
As its title implies, this book examines national defense
policy in the missile age, in particular the relative vulnerabili-
ties of fixed and mobile defenses. The author, described as a
consultant to various defense groups, must be presumed to
speak with more than academic authority, and his analysis
is clear and well written. He makes a very strong case for
mobile defenses-or perhaps one should say retaliatory
forces-specifically, pending the advent of a mobile ICBM
with solid fuel, for the Polaris submarine and an air-
borne SAC.
Professor Morgenstern devotes one chapter of about forty
pages exclusively to intelligence, making a practical compari-
son between the problems facing U.S. intelligence in Soviet
security barriers and other circumstances and the relative
ease with which the Communists get information on the
United States. Here his analysis lacks sophistication: Dr.
Morgenstern has given too much credence to what he reads
in the press or hears on the cocktail circuit without check-
ing it against the facts. The chapter is nevertheless correct
in its main thesis and should despite its inaccuracies be of
help to the lay reader.
FREELY I SERVED. By Stanislaw Sosabowski. (London:
William Kimber. 1960. Pp. 203. 25/-.)
There are two matters of intelligence interest in these con-
tentious memoirs of the man who conceived and built up in
the UK the Polish Parachute Brigade and commanded it in the
lost battle of Arnhem. The first is the boldness of his suc-
Mpp A33
Approved For Release 2005/03/16: CIA-RDP7 MVIV 90001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Military
cessful devices for avoiding arrest in his underground work
and escape from Poland in the confusion after Warsaw's fall
in 1939. The other is his opinion that the major cause of the
Arnhem fiasco, more decisive even than Eisenhower's "dilatori-
ness" and the blunders of all the British commanders involved,
was the failure of intelligence on the German strength in. the
area and its probable reaction to the assault on the Rhine
bridges.
General Sosabowski presents a viewpoint which of course
is lost in the Eisenhower, Montgomery, and other British-
American accounts; but he would have done well to employ
a ruthless editor to weed out personal trivia and damp the
I-knew-better-but-they-wouldn't-listen and I-didn't-want-to-
be-a-personnel-problem-but-I-had-to-stand-up-for-Polish-rights
tone of many passages.
A34
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
THE NILI SPIES. By Anita Engle. (London: Hogarth Press.
1959. Pp. 245. 25/-.)
From the remote past to modern times, from Rahab at the
fall of Jericho to Ethel Rosenberg in World War II, women
have engaged in some of history's most spectacular espionage.
An analytical study might reveal that women, directly or in-
directly, had more radically changed the course of history
through their clandestine efforts than men. Certainly Sarah
Aaronsohn, the field leader of the Nili spies, belongs to the
category of strong-willed history makers from the weaker
sex. She has not yet become a legendary figure only for lack
of public knowledge of her deeds.
The Nili spies, who took their code name from the initial
letters of the biblical phrase Netzach Israel lo Ishikare-"The
eternity of Israel will not fail"-were a dedicated group of
early Zionists engaged in haphazardly courageous endeavor to
save the Yishuv, the Jewish colony in the Turkish province
of Palestine, from oppression and destruction during World
War I. They hoped by collecting detailed and timely intelli-
gence on the situation in the province to catalyze the inertia
of British Headquarters at Cairo into an early military action
which would liberate it. Sarah and her brother Aaron be-
lieved, long before the Balfour Declaration and the concept
of a Mandate Authority, that once Palestine was under Brit-
ish control British law, order, and humanity would eventually
permit the establishment of a homeland for the Jews.
Upon the outbreak of war in 1914, Aaron Aaronsohn, a bot-
anist who had achieved considerable fame, especially in Ger-
man and American academic circles, for his rediscovery of
wild wheat, founded the Nili underground espionage organiza-
tion with the object of sending intelligence to General Allenby
in Egypt. His sister Sarah helped him in this dangerous work;
and after Aaron left Palestine to join Allenby in Cairo and
Absalom Feinberg, her sister's fiance whom she loved, had
been killed trying to slip through the Turkish southern front,
she bore the main burden of organizing the spy network
throughout Palestine, collecting the material and sending it
MORI/HRP
from pg.
A35-A38
Approved For Release 2005/03/16 : CIA-RDP78-03921A0003002900
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Clandestine
to Egypt until she was captured. She escaped her torturers
by a hideously executed suicide and without the consolation
of knowing that her efforts, perhaps more than any other
person's, had been instrumental in the successful launching
of Allenby's Palestine campaign.
To the professional, Nili operations, precisely because they
were amateurish, make interesting reading; they offer many
examples of tactical errors whose inevitable result was the
death of members of the ring. Although the network had a
safe foundation in the loving and trusting devotion of one
family, the Aaronsohns, and their relatives or close friends,
their operational cover was inadequate protection, not,
strangely enough, from the Turks, but from the Jewish com-
munity. Ideological and Zionist rivalries for control of the
early colonizers, along with genuine fear of the Ottoman prac-
tice of holding an entire community responsible for the trea-
son or even misdemeanors of individuals, made the Aaron-
sohns and their friends suspect and disliked. The fact that
Nili became the channel through which Diaspora gold was
brought to the starving Jewish community did not mollify
the local leaders' attitude towards them. They issued what
Sarah considered a cowardly ultimatum to cease operations,
on threat of exposure, shortly before the net was rolled up
by other means.
The local Turkish administration and military forces, cor-
rupt and venal, were bought off almost weekly with Nili gold;
perhaps they would never have been fully conscious of the
espionage in their midst if they had not finally been alerted
and goaded by German intelligence. Meanwhile Nili agents
speaking fluent Turkish, Arabic, Hebrew, and several other
languages managed to carry on unmolested until 1917. Their
ultimate exposure, if one can rely on the accuracy of the au-
thor's details, can be attributed to three important factors-
the lack of proper security precautions and compartmenta-
tion, the unstable personality of one conspirator, and very
poor communications.
All of the Nili leaders and some of their agents knew one
another by their true names and personal recognition, a not
unnatural result of their recruitment from among friends,
from whom they could not hide their identity. Many of these
roved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030 29Q001-3
Recent Books: Clandestine
agents and some couriers knew the location of Nili headquar-
ters in Aaron's experimental station at Athlit. Too many,
including Sarah's old Arab carriage driver, were aware of the
clandestine beach contacts with a British naval ship from
Egypt.
The British courier ship, for various reasons that are not
always explained, maintained an irregular and undependable
schedule which necessitated hurried and haphazard exchanges
of intelligence, gold, and supplies. The failure of the ship to
keep a scheduled rendezvous and the urgency of what Sarah
considered vital information influenced her to send a message
to Egypt by courier pigeon, a method which had already been
proved unreliable. The pigeon, apparently bereft of homing
instincts, flew north instead of south and was intercepted by
the Turks, who, with the assistance of the Germans, began
a methodical counterespionage investigation.
Even this exposure might have been unproductive for the
Turks until too late if the unstable braggadocio Yosef Le-
shansky, who had unnecessarily antagonized the elders of the
community and the Hashomair Hatzair Marxists, had not
boasted of his exploits, his contacts, and his influence to un-
trustworthy individuals, foolishly relying on the loyalty of
some of his Bedouin and Turkish friends. After his arrest
he talked freely, thereby implicating almost everybody.
Reflecting the intricate patterns of human affairs in the
Middle East, the book includes many interesting asides to the
main story. The author almost, but not quite, succeeds in
destroying the myth that Lawrence of Arabia dedicated his
famous Seven Pillars of Wisdom to Sarah Aaronsohn.
Written more as a eulogy than a treatise on espionage, The
Nili Spies is based primarily on the voluminous reports and
diaries of Sarah and Aaron, which in turn are supported by
official British documents and memorabilia of World War I.
The author, who inclines towards the lyrical to the detriment
of her text, adulates Aaron as the unsung hero of the Balfour
Declaration and the man whose imagination and determina-
tion established the foundations upon which Chaim Weizman,
Ben-Gurion, and others built the State of Israel. She nour-
ishes a gentle animosity towards the present Israeli regime
for failure to grant Sarah and Aaron the recognition they
Approved For Release 2005/03/16 : CIA-RDP78-03921A00030029000'f3?
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Clandestine
justly deserve. It does seem strange that Israeli and Zionist
circles, known for their celebration of outstanding contribu-
tions to the cause, should have remained almost silent about
the accomplishments of a valorous woman whose exploits
would have made her a Joan of Are in other countries.
ORDE WINGATE. By Christopher Sykes. (London: Collins.
1959. Pp. 575. 35/-.)
This is a long, well-written, painstakingly researched biog-
raphy of one of the most interesting leaders of World War II.
Orde Wingate was a regular British Army officer, a mystic,
a Zionist, an intelligence officer, and a guerrilla leader. Be-
ginning his career in North Africa, he soon was moved to
Palestine, the land that became his major interest and love.
As British Army intelligence officer turned rabid Zionist, he
apparently perfected a counter-guerrilla system to enable the
Jewish communities to protect themselves from Arab raiders.
Later in Burma he likewise made considerable effort to know
the area, peoples, and languages, and as guerrilla leader there
his peculiar talents were again particularly effective.
'Wingate could almost be described as instinctively an in-
telligence officer but, because of his eccentricities and oddities,
never as a great one. It is a credit to the British that they
recognized his considerable virtues in spite of his aberrations.
Mr. Syke's biography weaves in a wealth of material on in-
telligence techniques, countersubverson, and guerrilla war-
fare that is worth the digging out for today's intelligence
operator.
ONE MAN IN HIS TIME. By Serge Obolensky. (London:
Hutchinson & Co. 1960. Pp. 324. 25/-.)
This autobiography, perhaps an important one for socialites,
qualifies as an intelligence reference because in World War II
its princely author commanded two OSS paratroop operations,
one in 1943 that secured the loyalty of Italian troops on the
Sardinian flank of the Salerno action, and one in France in
1944, undertaken to prevent the withdrawing Germans from
sabotaging a transformer station important for the Paris elec-
tric power supply.
MORI/HRP
roved For Release 2005/03/16: CIA-RDPIMM9 000300290001-3
Approved For Release 2005/03/16 : CIA-RDP7,$-0392lA0P03gp29Q0~1-3
Recent oo s: an es ine
As with other potentially interesting aspects of the book,
however-his childhood and adolescent impressions of the life
of the imperial Russian nobility, his description of cavalry ac-
tions in World War I, and his participation in White Russian
and Tartar resistance to the Bolsheviks in the Crimea-the
light he might throw on these events is buried under a bushel
of trivia. Prince Obolensky has written not for history nor
even for a popular audience, but for himself and his exclusive
circle of celebrities, tracing their intricate family relation-
ships to one another and to royalty and recounting in detail
the things they said and did in the endless round of games
and parties that was their life.
A39
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
DOCTOR GOEBBELS. By Roger Manvell and Heinrich Fraen-
kel. (New York: Simon & Schuster.
1960. Pp. 306.
$4.50.
Also London: William Heinemann.
1960. Pp. 329.
30/-.
Published in France as Goebbels: Sa Vie, Sa Mort.
Robert Laffont. 1960.)
Paris:
This biography of Hitler's indefatigable propaganda chief
and most staunchly loyal comrade traces a thread of conti-
nuity in the history of the Nazi movement and the Third
Reich which no single other life story but Hitler's own could
match, a thread unbroken from the early struggles of the
mid-twenties to those charred bodies in the garden outside
the Fuehrerbunker on May Day 1945. Nor is it a slender
thread: Joseph Goebbels fancied himself the future historian
of the great era and alone among the Nazi leaders kept a
diary for posterity. Only fragments of its some thirty vol-
umes have been found; but these, the diaries of his aides, his
correspondence, and the testimony of surviving acquaintances
have enabled the authors to clothe the man in flesh and blood
and follow him through his career.
The story is of particular interest to propaganda analysts
and propaganda strategists. Goebbels' definition of propa-
ganda was of the broadest, and he regarded command over
propaganda as virtually equivalent to command over the lives
and actions of the audience. Hitler's Minister of Propaganda
was thus in Goebbels' eyes his deputy in charge of the home
front, the captive audience, and after July 1944 he could al-
most be said in fact to have run Germany while Hitler ran
the war. The conquest of Europe, too, if he had been doing
it, would have been undertaken not by force of arms but by
the power of the spoken word over men's minds.
Goebbels' direction of the powerful Third Reich propaganda
organs was meticulous and comprehensive; in spite of Ribben-
trop's efforts to take over foreign propaganda and the fact
that Hitler or one of the other leaders occasionally stepped MORI/HRP from
out of line, essentially everything that was said in the Ger- pg. A40-A41
man press and broadcasts or shown in the German films and
public spectacles flowed from this one man. Thus today's
propaganda strategist, on the one hand, studying the model
"Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDPZ8-0392ook00a000p2990000011---3
of thee extraordinarily effective Nazi system, will find its most
significant feature to be, not what Goebbels characterized as
massive reiteration of simple truths and the Nazi's enemies
dubbed "the big lie technique," but the integrity of unitary
control and consistent one-man direction. The propaganda
analyst, on the other hand, will in this same feature see ful-
filled> his necessary assumption that the propaganda he stud-
ies has a logical, self-consistent content aligned with the pur-
poses of the regime. The Nazi propaganda was in fact so
distressingly self-consistent that it, left the Anglo-American
analyst little foothold for that digging into factional differ-
ences and divergencies among the leaders' policies that has
been the aim of much analysis of Communist propaganda since
the war.
THE REVOLT OF THE MIND. By Tamas Aczel and Tibor
Meray. (New York: Praeger. 1959. Also London: Thames
and Hudson. 1960. Pp. 449. 35/-.)
The subject of this revealing book is not intelligence, but a
conflict of profound interest to the many intelligence officers
who wondered, all through the three middle years of the
fifties, at the strange things being said by the Hungarian
press and radio and tried to divine their portent. Although
it became clear in November 1956 to everyone that this sur-
facing of ideological unrest had reflected no mere adminis-
trative difficulties "of little consequence and likely to dimin-
ish," as some had theretofore concluded, the intellectual crisis
of the time has nowhere been so perceptively and thoroughly
delineated as here by Aczel and Meray.
The authors were prominent young Party writers of sin-
cere Stalinist persuasion, well representative of the Hun-
garian Communist intelligentsia. They were able by and large
to contain their normal artistic passion for individual, non-
conforming creativity and to maintain unwavering loyalty to
the Party through the early phases of the Nagy-Rakosi strug-
gles over the best road to socialism, although the corps of
Communist writers was indeed deeply divided between the two
leaders. It was the revelation late in 1954 of the contrived
and groundless arrests, tortures, imprisonment, and execu-
tions in the wake of the Rajk trial-a revelation made through
A41
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
MORI/HRP
from pg.
A41-A42
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Propaganda
the release of Janos Kadar and a score of other surviving vic-
tims-that reunited the writers and many other intellectuals
in open revolt against the Rakosi leadership, almost against
the very Party. Then a year of ever severer defeats for the
rebels, until the twentieth Soviet Party congress and Khru-
shchev's "secret" speech turned the tide.
At this stage the authors' Hungarian emotions betray them
into oversimplification, and they make Nagy too much the
martyred hero, Rakosi too much the despicable villian, and
Kadar too easily the Judas of their idol Nagy. Earlier char-
acter portraits, like that of the Hungarian Zhdanov, Jozsef
Revai, had been unbiased, sympathetic, and enlightening. Yet
for all this fault the book is a unique documentary on the be-
liefs and motivations of Communist intellectuals, on an im-
portant aspect of what makes Communism work and wherein
it fails to work, and-more profoundly-on the contradictions
between the individual and the social ideals of man at large.
proved For Release 2005/03/16: CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
THE DOUBLE DEALERS. Edited by Alexander Klein. (Lon-
don: Faber & Faber. 1958. Pp. 381. 21/-.)
This anthology of grand hoaxes includes short accounts of
half a dozen intelligence deceptions, one from the Civil War
and the rest from World War II and after. They are the story
of Emma Edmonds, whose first mission as a Union spy was
executed in the guise of a negro lad; Donald Q. Coster's ac-
count of how he persuaded the Germans in North Africa to
expect an American landing at Dakar; Clifton James' recollec-
tions of his appearances as General Montgomery at Gibraltar
and in North Africa in order to divert German expectations
of the Normandy landings; Al Newman's story of a Spanish
MORI/HRP spy for the Nazis whom the British impressed by showing the
from pg. same air squadrons, fleets, and troops repeatedly moved up
A43-A43 along his travel route; the exposure as a fake of Quentin Rey-
nold's book on George DuPre's purported four years as a Brit-
ish agent with the French resistance; and the escape of five
political prisoners from East German prisons engineered in
1953 by Hasso Lindemann with forged release orders and false
telephone calls.
The collection also includes, curiously, one intelligence
story that is not a hoax, Richard Sharpe's reconstruction from
open sources of Allied foreknowledge of the V-2 weapon.
Sharpe credits the discovery of the Peenemuende test area
as early as 1938 to a traveling British writer-agent, the map-
ping of the experimental station to Polish forced laborers, and
the first air photo identification of the weapon to Constance
Babington-Smith. He attributes the catastrophic timing of
the 17 August 1943 obliteration raid to Allen Dulles' source
Gisevius and details about material and construction, capped
finally by shipment of one of the missles intact, to Polish
underground intelligence from the new test range at Blizna
and Sarnaki.
THE MAN THEY COULDN'T KILL. By Dennis Holman.
(London: Heinemann. 1960. Pp. 232. 16/-.)
This is the story of a thread of exceptional luck woven
through the life of one man, Robert Oldfield. Behind it lies
MORI/HRP
4
Approved For Release 2005/03/16: CIA-RDP78-0 1 0300290001-3
A43-A44
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Recent Books: Miscellany
the provocative possibility, of no small interest to intelligence,
that intensive study of many Oldfields might yield a better
understanding of luck's chemistry, and perhaps even a means
of predicting accurately whose ventures will be blessed.
A Royal Navy stoker active in submarines during World
War II, Oldfield's path took him through innumerable close
brushes with death. Characteristic of his experiences was
an incident in prewar Haifa in which he stepped from a truck
seconds before a terrorist-planted bomb demolished the vehi-
cle. In subsequent years deliverance by a matter of seconds
or inches became almost commonplace with him. Among the
perils from which he emerged relatively unscathed were an
earthquake, bombings, a major naval battle, torpedo attacks,
a ship-submarine collision, the sinking of the submarine Sara-
cen by depth charges, a break from a POW camp, an action
with Italian guerrillas, two sentences to death before firing
squads, a stay in a German concentration camp, and a near
electrocution. Between these more dramatic incidents. there
were many minor ones that did not want for lethal quality:
on several occasions, for example, last-minute developments
removed him from the crews of submarines destined not to
return.
Although the account of Oldfield's adventures touches on
POW interrogation, escape and evasion, guerrilla activity,
sabotage, and other matters of intelligence interest, its brief
treatment of these subjects offers nothing particularly new
or significant. The keynote of the book is luck.
"Proved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
25X1
Approved For Release 20
Articles and book reviews on the following pages are un-
classified and may for convenience be detached from the classi-
fied body of the Studies if their origin therein is protected.
The authors of articles are identified in the table of contents
preceding page 1.
The editors gratefully acknowledge the assistance of Mr.
Walter Pforzheimer, Curator of the CIA Historical Intelli-
gence Collection, in scanning current public literature for in-
telligence materials, and of the many intelligence officers who
prepared book reviews for this issue of the Studies. Most
noteworthy in this respect are the following:
Rostow's The Stages of Economic Growth .. EDWARD L. ALLEN
Engle's The Nili Spies ...................
Books on Propaganda ...................
Holman's The Man They Couldn't Kill ... .
25X1
25X1
Approved For Release 2905/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3
Approved For Release 2005/03/16 : CIA-RDP78-03921A000300290001-3