STUDIES IN INTELLIGENCE [Vol 2, No. 1 - 4, Winter thru Fall 1958]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78T03194A000100020001-2
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
261
Document Creation Date: 
December 16, 2016
Document Release Date: 
February 23, 2005
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1958
Content Type: 
SINT
File: 
AttachmentSize
PDF icon CIA-RDP78T03194A000100020001-2.pdf28.44 MB
Body: 
[CONFIDENTIAL STUDIES INTELLIGENCE 25X1 VOL. 2 NO. I WINTERI-fi 3 CENTRAL INTELLIGENCE AGENCY OFFICE OF TRAINING Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFlDENT1ALa All opinions expressed in the Studies are those of the authors. They do not represent the official views of the Central Intelligence Agency or of the Office of Training. tONFIDENTIAL STUDIES 'IN 'INTELLIGENCE Articles for the Studies in Intelligence may be written on any theoretical, doc- trinal, operational, or historical aspect of intelligence. The final responsibility for accepting or rejecting an article rests with the Edito- rial Board. The criterion for publication is whether or not, in the opinion of the Board, the article makes a contribution to the litera- ture of intelligence. This material contains information affecting the National Defense of the United States within the meaning of the espionage laws, Title 18, USC, Sees. 793 and 794, the trans- mission or revelation of which to an unauthorized person is EDITORIAL BOARD SHERMAN KENT, Chairman LYMAN B. KIRKPATRICK LAWRENCE R. HOUSTON CONFIDENT Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL CONTENTS CONTRIBUTIONS AND DISTRIBUTION Contributions to the Studies may come from any member of the intelligence community or, upon invitation, from persons outside. Manuscripts should be submitted directly to the Ed- itor, Studies in Intelligence, Room 2013 R & S Building 143- and need not be coordinated or submitted through nels. They should be typed in duplicate, double-spaced, the original on bond paper. Footnotes should be inserted in the body of the text following the line in which the reference occurs. Articles may be classified through SECRET. For inclusion on the regular Studies distribution list call your office dissemination center or the responsible OCR desk, = For back issues and on other questions call the OM the Editor, Page Origin, Missions, and Structure of CIA Lyman B. Kirkpatrick 1 Strategic Thinking and Air Intelligence Major General James H. Walsh 7 Concepts for a Philosophy of Air Intelligence Lewis R. Long 31 Developments in Air Targeting: The Military Resources Model . . . . . . . . . Robert W. Leavitt 51 Horrible Thought . . . . . . . . . W. A. Tidwell 65 ELINT: A Scientific Intelligence System Charles A. Kroger, Jr. 71 Report on Hungarian Refugees . . . . Guy E. Coriden 85 Paper Mills and Fabrication . . . Stephen M. Arness 95 Lost Order, Lost Cause C. Bowie Millican, Robert M. Gelman, and Thomas A. Stanhope 103 Critiques of Some Recent Books on Intelligence The New Class-An Analysis of the Communist System, by Milovan Djilas . . . . . . . . Lena Marks 115 The Soviet Secret Police, by Simon Wolin and Robert M. Slusser . . . . . . . . . . John Rondeau 123 We Spied . . . . . . . . . Walter L. Pforzheimer 131 CONFIDENTIAL 25 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 ORIGIN, MISSIONS, AND STRUCTURE OF CIA Lyman B. Kirkpatrick This is a brief summary of the history of the modern origin of the central intelligence concept and thus of the Central Intel- ligence Agency. In 1940 the fortunes of Britain and France were at their lowest ebb. Some high-level officials of the US Government were predicting that Great Britain could not hold out against the Germans. To check on this, President Roosevelt sent Colo- nel William J. Donovan, prominent New York attorney and winner of the Congressional Medal of Honor as Commanding Officer of the 69th Regiment in World War I, abroad to dis- cover and report his estimate of the situation. Donovan first visited the Mediterranean area, and on his second trip talked to leaders of both Britain and France. His report indicated that Britain would hold out, but he urged that. the US im- mediately organize itself for global warfare. Donovan's par- ticular interest was in the intelligence field, and he went to talk to Secretary of the Navy Knox, Secretary of War Stimson, and Attorney General Jackson about his concept of an agency which would combine intelligence with the forces of propa- ganda and subversion. On 10 June 1941, Donovan proposed "a service of strategic information." This service would have an advisory panel com- posed of the chiefs of intelligence of the Army, the Navy, the Department of State, and the FBI. It would draw its personnel from the Army and the Navy and would also have a civilian staff. It would not displace or encroach upon the intelligence prerogatives of the established departments, although it would collect information independently. This was the start of the Office of the Coordinator of Information which combined in- formation, intelligence, and clandestine activities. In 1942, however, the Coordinator of Information was split and the Office of War Information-the predecessor of the present US Information Agency-was created and given the respon- sibility for all overt attributable propaganda information, and to the Office of Strategic Services went the responsibility for SECRET MORI/HRP PAGES 1-5 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 clandestine activities and for research and analysis of intelli- gence. From the OSS the present day intelligence community in- herited certain assets. Among these were records and some methods and means of procuring both overt and secret intelli- gence. There were certain basic counterespionage files devel- oped with the advice and assistance of some foreign intelligence services, particularly the British. There was a considerable reservoir of knowledge of procedures for research and analysis of basic intelligence information. There were some skilled per- sonnel. Finally, but far from last in importance, there were agreements with key foreign intelligence services. The history of the OSS, and particularly its relationship with other US intelligence organizations during World War II, is far too detailed for discussion in this essay. But it should be noted that shortly after the creation of the Office of Strategic Services, top level officials in the US intelligence community started to think about a peacetime intelligence service. On 25 August 1942, Brigadier General John Magruder wrote a paper on a proposed plan for a joint intelligence bureau which would be an agency of the Joint Chiefs of Staff. For the next two years there was considerable discussion of this and similar papers. On 5 October 1944 a document was originated in the office of General Donovan entitled "The Basis for a Permanent World- Wide Intelligence Service." Certain of the principles enun- ciated in this document are interesting to note. This service would collect, analyze, and deliver intelligence on the policy or strategy level. The proposed organization would have its own means of communication and control over its secret operations. It would not interfere with departmental intelligence and it would not have any police function. An individual rather than a collective responsibility for national intelligence was pro- posed. Finally, the director of the proposed organization would be responsible directly to the President. It is interesting to note that Secretary of War Stimson com- mented on the subject of intelligence coordination in his biog- raphy "On Active Service in Peace and War." This quotation. reads: "Stimson was insistent that no impatience with its occa- sional eccentricities should deprive the Army of the profits of co- operation with General Donovan's Office of Strategic Services. Throughout the war the intelligence activities of the United SECRET 3 States Government remained incompletely coordinated, but here again it was necessary to measure the profits of reorgani- zation against its dislocations and on the whole, Stimson felt that the American achievement in this field, measured against the conditions of 1940, was more than satisfactory. A full re- organization belonged to the post war period." On 18 January 1945, the Joint Strategic Survey Committee reported to the JCS on the subject of a central intelligence organization. The members proposed first a national intelli- gence authority composed of the Secretaries of State, War, and Navy and the Chief of Staff to the President. There would be an advisory board consisting of the heads of the various intel- ligence services. The new organization would have the power to inspect the operations of the various departmental intelli- gence services and would have the responsibility for protecting sources and methods. At this juncture the press got wind of the discussions for creating a new intelligence organization and, on 9 February 1945, fairly complete details appeared in the Chicago Tribune and the Washington Times Herald. There was considerable furor, and some members of Congress took a dim view of the creation of what they felt might become a peacetime "gestapo." Shortly after this - just a few days before his death - President Roosevelt asked General Donovan to get together with the heads of the various intelligence and security services and get a consensus of views on a central service. Donovan did this and also went further and queried by letter all of the members of the Cabinet. Within the intelligence community there was general agreement that a central service might be appropriate, but there were several conflicting views as to whether it should report to the Joint Chiefs of Staff, to the Department of State, or to the President, and there was also controversy as to whether there should be individual or collec- tive responsibility for national intelligence. The response from the Cabinet members was varied and ranged from yes to no. After open hostilities had ceased, as we all vividly remember, there was almost frantic haste to demobilize not only the mili- tary services but many of the war agencies. On 20 September 1945 the OSS was disbanded. Its Research and Analysis Branch and its Presentation Unit were transferred to the De- partment of State, its Secret Intelligence and Special Opera- Approved For Release 2005/03/15 : CIA-RDP78TO3194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 4 SECRET tions Units were transferred to the Army, and the former were preserved in the Strategic Services Unit which reported to the Secretary of the Army. On 22 October 1945 a report prepared by Ferdinand Eberstadt on possible unification of the Army and Navy recommended a central intelligence organization and a national security coun- cil. On 14 November 1945 the Secretaries of State, War, and Navy met, discussed the proposed central intelligence organiza- tion, and set up an interdepartmental working committee to attempt to arrive at a unanimous recommendation. The end product of these reports and committees was the issuance on 22 January 1946 of the Executive Order creating the Central Intelligence Group. This Executive Order reflected much of the thinking and work that had gone on during the war. A National Intelligence Authority was created, composed of the Secretaries of State, War, and Navy and the Military Chief of Staff to the President. The Director of the Central Intelli- gence Group was designated by the President, and personnel were to be assigned from the respective departments as well as recruited from civilian life. The Director of the new Central Intelligence Group was charged by the Executive Order with preparing plans for coordination. The new organization could inspect the activities of departmental intelligence if such in- spection were approved by the National Intelligence Authority. It could recommend policies and objectives. It was responsible for correlating, evaluating, and disseminating intelligence and for the performance of services of common concern and such other functions as directed. The Executive Order explicitly stated that the departments would continue to collect, evaluate, correlate, and disseminate departmental intelligence. Finally, an Intelligence Advisory Board, composed of the heads of the service intelligence agencies, was established to advise the Di- rector of the Central Intelligence Group. With the creation of the Central Intelligence Group there commenced a process of accretion of functions taken from the wartime agencies and from departments which were anticipat- ing reductions in budget under peacetime conditions. The Strategic Services Unit was transferred from the Department of the Army and became the Office of Special Operations - charged with espionage and counterespionage functions. The Washington Document Center was taken over from the Navy SECRET 5 and shortly after that the Army's German Military Documents Center at Fort Holabird joined this unit and together became the Foreign Documents Division. The Foreign Broadcast In- formation Service, an organization with worldwide bases for monitoring all non-coded radio traffic, which had originally been under the Federal Communications Commission, was transferred from the Army and became the Foreign Broadcast Information Division. During World War II the Army and Navy and OSS and occasionally other agencies had all ap- proached US businesses and institutions in search of foreign intelligence information. An early agreement was reached that this domestic collection should be performed as a service of common concern by Central Intelligence with other agencies participating as they desired, and this became the Contact Division. Another illustration of the type of functions taken on is the division of responsibilities with the Department of State on biographic intelligence. The list would be much too long if we attempted to enumerate all of the functions acquired in this method. Slightly over a year and a half after the creation of the CIG-on 25 July 1947-the Congress, utilizing most of the fea- tures of this Executive Order, passed the National Security Act of 1947 creating the Central Intelligence Agency. Thus, the mission of the Central Intelligence Agency becomes fairly obvious with the preceding background. The National Security Act of 1947 describes the general mission with em- phasis on coordination and on performing services of common concern. It should be clearly noted also that the legislation assigns two roles to the Director of Central Intelligence and the Deputy Director of Central Intelligence - over-all coordination, as well as the role of head(s) of an Agency. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET 7 Approved For RUease 2005/03/15 : CIA-RDP78TO3194A000100020001-2 STRATEGIC THINKING AND AIR INTELLIGENCE Major General James H. Walsh My purpose in this article is to discuss, in very broad terms, some of the significant aspects of air strategy for the future and the vital functions that intelligence must perform in order to insure the success of future air operations. The suspicions currently entertained that the Soviet sputnik may be getting intelligence of both meteorological and cartographic nature re- quired for accurate firing of ICBMs illustrate some of the possi- ble relationships between air power and intelligence. In a rudi- mentary way, even the first earth satellites point up the tasks and capabilities of future intelligence systems required for survival under conditions of international technological com- petition - intelligence systems which must meet three basic criteria: global coverage, instantaneous discovery, and abso- lute accuracy. I believe that we have a reasonably good understanding of past and present concepts of air warfare and the relation of intelligence to those concepts. It is far more difficult to look into the future and to do so with the precision and clarity needed to prepare ourselves effectively for the trials and dan- gers ahead. The reason for this basic uncertainty is not that many people have neglected the problems of aerial technology and its stra- tegic implications. The reason is rather that we are in the midst of a technological revolution. Changes are becoming so rapid, so penetrating and, in many instances, so contradictory that the direct and indirect results of the technological revolu- tion tend to control - and at the same time toy confuse - the nature and application of tomorrow's air strategy. Neverthe- less, it is in this setting of dynamic technical change and a world beset by what often seems an unlimited number of related and unrelated political, economic, and military prob- lems that we must attempt to examine the future direction of air power. To begin with, we already have seen major alterations in the basic nature of air forces since World War II. The transition Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 $ SECRET to jets, nuclear weapons, sonic speeds, countless black boxes, and, to a degree, missiles typifies the changed environment which governs today's air capabilities as compared with those of 1945. Fifteen years ago the RAF qualitatively was the world's lead- ing air force. Today it is in third place. More important, it is not in a class, by a broad margin, with the air forces of the US and the USSR. It has neither the aircraft, the equipment, the bases, the research and development, nor the funds to become again a truly self-sufficient force, with strategic capa- bilities as required by world conditions. Fifteen years ago the Soviet Air Force was an adjunct- of the Russian army. Statistically it represented a force in quantity, but it had poor operational know-how and no strategic capa- bility. Its aircraft were fair, at best. Today the Soviet Air Force is the largest in the world. It is equipped with modern weapons, some of them as advanced as those of any other nation. It has a well-funded and aggressive research and de- velopment program. Although it still has many weaknesses, the Soviet Air Force is making a bid for world air mastery. The VS Air Force also has come of age in.the postwar period. It has held the quality lead for most of that time and still holds it for most of the important 'equipments. Its personnel are superior in training and efficiency. But the USAF has prob- lems, especially in areas outside the SAC program. Its progress is not to be belittled, but in some areas its progress perhaps has not been so fast or so forward as we would like it to be. The fortunate aspect is that during the postwar period the USAF has grown to be a global force. In fact, to this date, the USAF - not forgetting its naval support - is the only global force extant. This American capability is a fact of overriding importance. It will remain a controlling factor in the inter- national power equation, to a certain extent, irrespective of technological slippage and of the inevitable acquisition by the Soviet Union of a global missile force. The most important single change since World War II is that atomic airpower has become the dominant military force. The only way a nation can deliver nuclear firepower over long dis- tances and in a short time is through the air. Sea and ground delivery of nuclear warheads is important, particularly in spe- cial situations. But in terms of a global nuclear war, these SECRET 9 systems - and some of the secondary means of aerial de- livery - can do no more than furnish local, regional, and tac- tical support to the strategic air strike forces. One of the changes upon us deals with defense in nuclear aerial war. Whereas the offense still seems to have outdis- tanced defense, the old axiom that like weapons are the best defenses against like weapons again could become true. For the moment there is very little one can do when an atomic explosion occurs except to be underground, fully equipped with food and non-contaminated water or, preferably, plenty of Irish whiskey. Nevertheless, the very possession of nuclear weapons for defensive purposes may act as a "prevent- ing" factor - not because even the best defense would be capa- ble of halting an attack, but because a good defense system would boost the force requirements of the attacker, lower the probability that he can execute his plan with full success, and thus, in some cases at least, tend to induce him to delay his aggression until he has reached the required force and tech- nological levels. It is in the nature of a "race," that the aggressor may be unable to achieve such a posture of superi- ority that he can dare take the risk of nuclear attack. If this should be a vain hope, for example, because the defender has failed to keep up with the pace of the race, the actual use of nuclear warheads against incoming vehicles should reduce the effectiveness of the offense. Some of our forward looking scientists are optimistic about the feasibility of employing anti-ICBM missiles, which would take advantage of the greatest point of vulnerability of the early ballistic missile, its fixed trajectory. Many ideas have been proposed about nuclear predetonation and sophisticated employment of modern electronics to interfere with incoming nuclear attack. There are a number of passive defensive steps which could be taken to lessen the vulnerability of our retaliatory force. These include the dispersal of aircraft and missiles, shelters, and other forms of base hardening, short exposure times, rapid reaction procedures, and maintenance of a substantial portion of the alert force in the air at all times. Unfortunately such systems can be very costly. They are limited in their coverage and may not be reliable enough for Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 the safety of personnel and certain equipment. Elaborate pas- sive defenses tend to disrupt and slow the ability of an air force to retaliate as rapidly as required. For these reasons the stra- tegic effectiveness of passive defense is predicated upon effec- tive warning. By warning I refer to technical alarms such as radar and infrared sensing and to interrelated strategic and tactical indications intelligence. The true effectiveness of defense will be a function of the scope, size, quality, and mental effort put into requisite weapons systems needed to furnish capabilities for protection, warning, interception, and countermeasure tasks. It may be dubious whether or not even the best defensive system pitted against combinations of different types of attack weapons ever will attain a high kill rate, but this may not be the critical point. Rather, countersystems embodying nuclear warheads and built around effective warning and reaction responses suggest that a nation may be able to close the gap between the power of the offense and present limitations on defense. Such sys- tems could pre-empt the advantage of surprise by sneak attacks by an aggressive nuclear delivery force. They would force the attacker into more elaborate and costly delivery means, pri- marily large and massive raids which are susceptible to stra- tegic and tactical detection and to interception measures. Through all these means and measures the offensive may not necessarily be priced out of business, but its effectiveness should be reduced against its primary objective -the opponent's re- taliatory force. Thus, it would be hoped, the attacker would be induced not to strike because of the uncertainty over the success of his initial blow and also because he would have -to risk his main force at excessive loss rates. In nuclear war the first blow must be decisive: the retaliatory force must be killed. It is quite clear that intelligence influences the effectiveness of defense. Whatever the technical proficiency of a defense system, it can be improved by better intelligence, whereas even the technically most promising defenses can be invalidated through intelligence failure anywhere along the "assembly line" - from scientific intelligence to tactical warning. Per- haps it should be observed that good intelligence would allow the utilization of foreign scientific and technological achieve- ments for the improvement of our own posture. Beyond pro- SECRET '11 viding us with better design patterns, such intelligence also would enable us to build our equipment to such specifications as to optimize its capabilities against the enemy's weapons. I should like to turn now to a discussion of various tech- nological factors, some of them here now and some on the horizon, and try to relate them into a strategic pattern. During the years ahead we shall be approaching practical terminal limits in certain key parameters of weapons systems. We already may have reached what could be called terminal explosive power, not that it would be impossible to achieve higher yields. Within the next few decades we probably will attain terminal speeds, at least for terrestrial operations. We cannot exceed certain speeds without being forced from the earth's gravita- tional field. Before we achieve theoretical terminal velocities we should reach a far lower practical speed limit for operations directed against targets on the ground. We must remember that the attainment of maximum speed in flight may require more time than would be necessary to reach a terrestrial tar- get at lesser speeds. We certainly shall be capable of terminal ranges in the sense that future air and missile systems will be able to circumnavi- gate the globe at least once. I am convinced that there will be no practical limits to altitude, although there may be tem- porary barriers to surmount before manned and powered space flight becomes a reality. Such restrictions could occur in metallurgy, engines, communications, aero medicine, and nu- clear components, among other fields. Let me dwell for a moment on the relationship of altitude to tomorrow's air strategy. In the immediate future, altitude essentially will be a matter of tactical advantage inasmuch as, with respect to powered flight, we still shall be competing in heights measured by thousands of feet. We have come to recognize that the attack force with the higher altitude capa- bility, generally speaking, is the force with the greater penetra- tion capability. To achieve tactical altitude advantage we are moving into speeds up to Mach 3 as a result of improved rocket fuels, higher thrust engines, aerodynamic advances, and even newer black boxes. I am talking about situations up to 100,000 feet. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 12 SECRET But today we also stand on the threshhold of entirely new altitude dimensions. Space vehicles already have been climb- ing to heights of 600 miles, and unpowered satellites, or sput- niks, are flying around the earth approximately every hour and a half, at heights up to over 1,000 miles. This altitude is by no means a limit but soon will be exceeded. Disregarding the future development of orbital flight, even at this point the significance of the recent quantum jump is that we are acquir- ing the capability of staying in the air. This overriding technological fact will have the most pro- found impact upon military operations. At present altitudes, the airman must worry about hurricanes, fog, winds, and other weather factors characteristic of the dense air which lies just above the earth. Tomorrow's space flyers must be concerned with meteoric showers, cosmic radiation, electronic barriers, and Buck Rogers' conditions within his cabin. Instead of using flight as a means of traveling from one point on the earth's surface to another, either for friendly or unfriendly purposes, the new problem will be to reach an orbit, maintain it, and utilize nonpowered flight for scientific, military, and probably economic purposes. The flying machine of outer space will not spend 90 percent of its time on the ground, but 100 percent of its time aloft. In simple statistics, we are moving from transonic speeds and periodic flights of several thousands miles in length into an environment where speeds will be of the order of 16,000 knots and "ranges," depending upon the height and shape of the or- bit, easily may exceed 1 million miles per day and hundreds of millions of miles per year. The development of terminal weapons - in terms of ex- plosive power, range, endurance, and speed - will not bring the technological race to an end. Strategies will capitalize on the new dimension of altitude and perhaps endurance rather than distance as a decisive area of military competition. Mili- tary superiority will be dependent upon relative advantages in electronics, warning, and deception. Thus the sciences of in- strumentation and intelligence will become truly decisive ele- ments in the equation of a strategy in which the chief maneu- vers seek to conquer altitude and achieve enduring control from the ground to outer space. SECRET 13 Modern air strategy will be affected by a number of additional problems, each of which could become crucial in varying cir- cumstances. There is, for example, the requirement that a portion of the aerial strength must be on constant readiness status. A strike force that requires one or two days to get ready is a military liability. Even in today's war it would be caught on the surface. An effective air force must be numerically strong and able to get its combat aircraft into the air in time. It must be located on a large number of bases, preferably distributed on several continents and located at varying distances from the enemy. Moreover, it must be supported by reconnaissance forces operating vigilantly around the clock. Only such an air force is in a position to achieve a strategic, though not neces- sarily physical, invulnerability. In former wars, material strength was the decisive factor. The speed with' which fire power could be delivered was an important but still a subsidiary element. The nature of a future war is essentially no longer a dispute about territory but a competition for gains in the time dimension. This is because, in the first place, technology is a variable in time. The speed with which this factor varies will continue to increase as long as technological progress continues. In the second place, sur- prise being a key to success in air and missile warfare, the initial rounds of conflict are little more than a contest to operate faster than the opponent. Surprise attack will be successful if the attacker moves faster than the defender. It will fail if the defender's "reaction time" deprives him of targets and dis- rupts the attack schedule. Intelligence must come to closer grips with the time dimen- sion. We are dealing not with one uniform period but with a whole set of different time categories. There is the time prob- lem of maturing manpower, scientific discovery, and technolog- ical invention - measured in generations. There is the dura- tion of research and development programs, decisionmaking, production, and incorporation of weapons into battle orders - a period of years to decades. There is the complex problem of warning - ranging all the way from advanced strategic warn- ing measured in weeks, months, or even years, to tactical warn- ing, measured in minutes. There is the problem of reaction time and interception, measured in seconds and microseconds. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Pre-emptive, retaliation, deterrence, counterforce, retarda- tion, and disruption attacks all, in one way or another, are tied to a specific time requirement. The more mobile warfare be- comes, the more moving targets are assuming significance, the less it is a question of mere "capability" than of "capability in time." An airplane carrying a high yield weapon can knock out an air base; the problem is to destroy it at a time when the target will be most lucrative - for example, just before the moment when an attack is to be launched from that target. Need I add that only intelligence can provide this all-impor- tant "timing capability"? Perhaps an additional illustration will clarify this thesis fur- ther: "Reaction time in guided missiles." It is important to count missiles in terms of numbers, warhead yields, and the like. But the foremost problem is that of reaction time or response. If it takes a strategic missile force four hours to launch, whereas the opponent can launch within minutes, the obvious advantage belongs to the side with the shorter reaction time - provided it has adequate warning. The 4-hour reacting force will never leave the ground; its threat will be pre-empted. If this is correct, it appears to be a mistake for intelligence to count the degree of deterrent power primarily in numbers of missiles or warhead yields. It will be necessary to assess, above all, relative times of reaction. Earlier we discussed the new parameters of altitude. It is appropriate, I believe, that we reflect on the purpose of operat- ing at such altitudes. The use of outer space will permit al- most continuous observation of any point on the earth, a situa- tion which, although not entirely without precedent, marks a new departure in modern strategic warfare. Space platforms are becoming indispensable elements of effective warning sys- tems against future means of weapons delivery. Unless we conquer space, a great deal of the scientific knowledge which we require to remain in the technological race will not be avail- able. Furthermore, orbiting vehicles eventually will be used as weapon carriers and thus will develop into crucial components of offensive and defensive missile warfare. All this poses the spectre of outer space military conflict which will involve three phases: first, the competition to get vehicles into space in sufficient quantities to occupy desirable orbits and to make profitable scientific use of orbital flights; second, the development of military techniques for operating from our own orbits and for countering the enemy's militarily significant orbital activities; and third, the ability to neutralize or destroy terrestrial and aerial components of orbital systems This new sphere of warfare raises some perplexing problems in world relations. In addition to traditional surface bound- aries, there will arise sovereignties over vacuous orbits and the areas beneath them-a system of interlaced surface and spatial boundaries thousands of miles in depth and tens of thousands of miles in length. A new pattern of international relations must be developed in which orbits are occupied peacefully or conquered and in which orbits must be delineated. During peacetime the nations must respect each other's scientific and security operations in the orbits, and in wartime, of course, the purpose will be to elimi- nate all of the opponent's space vehicles. In turn, there must be capabilities for protecting the satellites. It is clear that this involves entirely new types of "aerial" operations, as it is also clear that the diplomats and international lawyers will have to do some hard thinking to settle peacefully the problems of orbit allocation and orbit sovereignty. The introduction of the orbital dimension into warfare sig- nifies that factors such as Iron Curtains, the dispersal of air bases and missile sites, and the ability of navies to "hide," so to speak, in the vastness of the oceans will tend to lose signifi- cance. The nature of the new implements is definitive enough to suggest that the use of truly underground and of undersea facilities may dominate the terrestrial scene. As a result, the roles and techniques of surprise will undergo very profound changes, the exact nature of which we cannot predict. For a nation to exist and survive under these conditions, its intelligence system must become a predominant security tech- nique. Such a system must meet three criteria: global cover- age, instantaneous discovery, and absolute accuracy. The sys- tem must be fully operational both in war and peace. Intelli- gence must be run not only for the benefit of, but by those who are responsible for decisions of life or death. I believe I have reached the point where it is necessary to examine this strategic framework with its epochal implications Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 16 SECRET in the practical light of where we are today and to consider the future directions we must take. The problems of strategic and technological surprise are becoming increasingly serious. The danger of tactical sur- prise is not lessened when the enemy, in addition to a high alti- tude and rapid strike capability, also has a capability for low altitude air attack and may be developing mixed high and low altitude offensive forces. Taking an even broader view, we can say that the nuclear explosive and the supersonic delivery vehicle have appeared at a moment when society is quite defenseless against such weap- ons. During the last few centuries, war has taken place at the margins of society. Society supported the war from its produc- tion surpluses and remained intact as a going concern despite losses and devastations. You recall that during ancient times, the situation was dif- ferent. During the Middle Ages, every town had to be self- sufficient for defense, with walls, moats, shelters, food, and water reserves. Practically every citizen had to bear arms. The American frontier town serves as a more recent example of this dangerous way of life. I believe that society eventually will adjust itself to the mod- em technology of destruction. Perhaps we may have to be- come troglodytes; our ancestors were. Architects may develop new types of resistant houses and "safe" urban settlements. Perhaps we shall develop anti-radiation protection. The prin- ciple of "hardening" can be applied to many human needs. I am predicting only that the human mind will not stop in- venting. After it realizes the grim threat of modern weapons, society gradually but inevitably will take measures to assure its survival. I am basing this prediction on my faith that mod- ern man, morally and intellectually, is not inferior to previous generations of 700 and 2500 years ago. Whether this process of social adjustment is going to last 20 or perhaps 50 years I am unable to say. But during this interim phase, humanity well may be passing through the greatest peril of its existence. A war five years. from now prob- ably will be immeasurably more destructive than a war around 2000 A. D. Our security, therefore, must be tailored to get us and the Free World safely through this immediate period of extreme hazard. SECRET 17 It is this interim character of the present military situation which confronts us with many perplexing problems. Defense planning, which includes intelligence, is faced with numerous paradoxes. In this age of maximum offensive strength, there may be a great deal of reluctance to use up-to-date weapons, simply be- cause no one wants to unleash a nuclear war. Yet we must prepare ourselves for a contest which requires us to put the bulk of our resources into nuclear armaments. As a result, we may have only limited capabilities to wage war in which nuclear weapons do not provide the basic fire power. Yet some people have gone so far as to advocate the retention of full-fledged non-nuclear forces in addition to atomic forces. It is generally agreed that we should prepare ourselves to fight with nuclear weapons. Yet some contend that we also should retain a capability to fight in the style of World War II - high explosives on the ground, at sea, and even from the air. We probably could agree that the availability of non-nuclear forces would be very advantageous. Several types of non-nu- clear explosives will remain with us, even in the nuclear age. Under certain tactical conditions, those may be even more ef- fective than nuclear materials, which is the main reason why they should be retained. Unfortunately, the question is not one of advantage or dis- advantage, or even of choice. The question is one of capability in all aspects -manpower, military organization, research, funds, training, equipment, tactics, and so on. Suppose that we maintain both a nuclear and a non-nuclear defense establishment. There is the high probability or near- certainty that the investment in non-nuclear arms would be invalidated as soon as the first atomic weapons are used. This will happen, almost inevitably, at the first serious military set- back of either belligerent. But the question of non-nuclear armaments is not just a matter of duplication. The cost of matching atomic systems with non-nuclear weapons in terms of relative military effec- tiveness would be exorbitant. More significant, such a second force could not be established on any reasonable scale unless we acquire two sets of our national resources, two sets of our qualified manpower, and two sets of our country. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 18 SECRET I am not raising the issue of limited versus general war. The requirements of any local war situation can be met from avail- able and programmed forces and resources. Rather, I am addressing myself to the problem of attempt- ing to build a non-nuclear force at the expense of our atomic strike and defense units, which must be maintained at an in- creasing degree of readiness because of the overwhelming pri- ority of the Soviet nuclear threat to the US and the Free World. We cannot turn back. There may be a collapse of nuclear courage, but no longer can there be any doubt that we have crossed the nuclear Rubicon. A similar paradox confronts us in disarmament. If the danger of attack could be eliminated by reductions of force levels and by the outlawing of particular types of weapons, the security of all nations unquestionably would be enhanced. The trouble is that with the power of modern weapons, even minor infractions to disarmament agreements may prove fatal. After 1919, the Western Powers tried to control German arm- aments. But practically every week a German arms violation of the Versailles Treaty was reported. Many work shops re- peatedly were discovered in which, it was said, machine guns were being produced under the guise of baby carriages. Nevertheless, the security of the Western Powers did not seem vitally threatened, despite the fact that the Germans maintained secret arsenals and continued surreptitiously to produce weapons which they were not supposed to have. These weapons did not seem powerful enough to pose a real threat to Western security. Neither were the camouflaged divisions which the Germans maintained secretly. But in our time a nation which produces perhaps as few as 50, or as many as several hundred high-yield weapons could become a real threat to the peace, even with makeshift delivery vehicles, especially if other nations faithfully adhere to their disarmament agreements. You are well aware of ominous in- fractions to such agreements in North Korea. The point is that we cannot go back in history and undo the discoveries of nuclear fission, electronics, and aviation. We have to live in the modern world. Technological progress tend to "break through" even the most elaborate and sophist", cated disarmament "controls." Each breakthrough will neces SECRET 19 sitate renegotiation of agreements. There will be little, if any, stability and durability, let alone guarantee of assured inter- national safety in such arrangements. I confess that this is a very dismal picture. It will not be changed by expectations that the human race will become peaceful and angelic in the next 20 years. There are two brutal facts which we have to remember. The first is that the Soviet regime still is around. Although it sometimes seems to be showing signs of middle or even old age, there is no new evidence that proves that Kipling was wrong when he wrote: "Make ye no peace with Adanizod, the Bear who walks like a man." The Soviets have not changed their basic objectives. Their policies have remained constant in areas that count, including their fantastic military preparedness effort. It is clear that the Soviets do not expect that the millennium of peace has dawned. While they prepare for war we cannot turn our backs. When they talk conflict, we cannot risk to ignore the peril. When they arm themselves with the most modern weapons, we cannot reduce the magnitude of the threat by wishful thinking about their supposed inability to do that which manifestly they are doing. We can philosophize that the Soviet Union will enter into an evolution which, after some time, will transform the present Bolsheviks into Jeffersonian Democrats or Puritan pacifists. I do not believe that anyone who has studied Russian and other revolutionary history seriously expects such a mutation will take place. Naturally, I do not postulate eternity for the Soviet system: their time will come. The question is, when? So far, reports about their demise usually proved quite "exaggerated." Their resilience has been extraordinary. Distinguishing our hopes from realistic planning assumptions, we would be foolhardy not to give them an additional life expectancy of one or two decades. We must assume that they will remain in power dur- ing the entire period when the technological challenge to the US will be at a maximum. It is not certain, of course, that the Soviets deliberately will launch an attack on the US. But at the same time we cannot be sure they will not. In the same vein, there is no doubt but that the social system of Russia is changing in many ways. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 20 SECRET But is this necessarily a favorable development? One danger surely is that if the Soviet dictatorship were liquidated by force or otherwise, this event - which only optimists expect at this time -could precipitate a major internal crisis. Such a crisis would be uncontrollable. This means that it could lead very easily to a world conflagration. There just is no way by which we could conjure away the ominous dangers in our future. This leads me to the second point of pessimism about peace in the foreseeable future. It is a mistake to consider the Bol- sheviks as the only cause of conflict. Wherever we look at the continents today, there is plenty of politically combustionable material. Old political structures are breaking down. New nations are emerging. Most of them have their own imperi- alistic ambitions, and some of the older nations show frighten- ing signs of decay. Economic difficulties, cultural transfor- mations, intellectual crises, and ideological passions acerbate many of these political changes, not to mention inflammatory propaganda campaigns, political warfare, and the like. Unfortunately many of the political minds still function as though we were living in the time of gun powder and sea power. Few have grasped the significance of the modern technology. There is a dangerous timelag between political thinking and technological reality. As industrial technology advances, psychological stability weakens. We must admit the possi- bility that world society will grow sicker and ever more un- stable, even as the descendants of Icarus reach out for the moon. It is unjustified, therefore, to expect that all nations will observe restraint in order to avoid nuclear conflict. Perhaps most nations will, but the odds are that there will be a few who will act irresponsibly. Hitler was not the last specimen of his type. Recent sociological research asserts that a large percentage of political rulers and regimes have been, historically speaking, criminal in motivation and action. There is no doubt that many rulers, especially those who acquired unlimited powers, may have been, at least partly, insane. In fact, a German historian coined the term "Caesarian insanity" in order to describe the actions of many Roman emperors. Although we have made some political progress, the world nevertheless has had more than its share of insane, criminal,!. SECRET 21 and power-hungry rulers during the 20th century. Crime and insanity rates tend to rise as industrial civilization advances. It may be very convincing to us to say that because of the existence of hydrogen weapons the power-seekers should mend their ways. This type of argument remains unconvincing to the evil doer who is willing to accept the risk, regardless of the consequences. There is only one way to reduce the probability of criminal aggressiveness. That is, to remain militarily overpowering and mentally more vigilant than the would-be aggressor - to outsmart and outarm him at every turn and to apply per- suasive techniques to protect him - and us - from making a miscalculation. It is not enough to possess what could be called a "statistical posture of deterrence." The aggressor also must be convinced that it is inadvisable for him to break the peace. But do we master the techniques by which we could have such an impact on the opponent's mind? We are in the midst of a lasting crisis which Mao Tse-tung has described as "protracted conflict." Political and psycho- logical weapons are being used every day to advance the Com- munist cause. In modern conflict, even though actual shoot- ing may not be taking place, air power and the threat of almost instantaneous massive destruction have become the key ele- ments of the psychological as well as the physical struggle. The extent to which we can deter the opponent from attack- ing us determines our freedom of action on many of the world's battlefields. If the level of our ready deterrent strength is too low to provide the assurance that the enemy will not react with an all-out attack, we could be inhibited in executing proper defense actions in subsidiary theaters. Deterrence is a necessary condition for the maintenance of peace - and the waging of limited war - but it cannot be a static condition if it is to keep that peace. If any nation acquires a more effective weapons system, the best posture of deterrence existing before the technological mutation is subject to rapid nullification. We live in a world where the threats to tomorrow's peace are developing today in the laboratories and on the drawing boards. It is true that so long as the two main competitors run neck to neck, even a major advantage in one or more technological fields may not necessarily upset the balance. A state of mu- Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 22 SECRET tual deterrence may be reached which essentially would mean that a world conflagration could occur against the deliberate planning of both the US and the Soviet Union. Hence I do not believe that the Soviets merely are trying to catch up in the technological race. On the contrary, they seem to have organ- ized themselves to win the technological race on a broad front, not only in many significant scientific areas but also in combat operational strengths as distinguished from mockups and pro- totypes. In other words, they may be trying to surpass us simultaneously by at least one whole and perhaps two weapons generations. The technological race is the very essence of protracted con- flict. It is the main event which we cannot afford to lose. The essence of this conflict is not, as many of our contemporaries believe, a series of limited wars in the jungle and in the desert. Any American intervention into limited war depends crucially upon our relative technological posture. If we lose the tech- nological race we cannot fight on local and regional fronts. Nor will an increase in our capability to fight in Bali or Tim- buctu improve our over-all deterrence. It certainly is not likely that, should the US fall behind in technological capability, the Russians will press their advantage merely to get a few fringe benefits. The struggle between Rome and Carthage is more meaningful to our times than the formalized and restrained war-tournaments of some epochs in the history of Christian Europe. Technological superiority in means of delivery is the essence of success in nuclear war. The idea that nuclear war will take the form of an exchange of mutual blows perhaps forecasts Ii correctly what is going to happen. However, this is not neces- sarily a concept on which the military planner should work. The purpose of planning for nuclear war is to achieve such a predominance of strength that a nuclear blow can be delivered, without the undue risk that a deadly retaliatory blow will be returned. Even the Soviet military leaders who, during the Stalinist period, belittled the importance of military surprise: now appear to recognize that surprise could be the condition of nuclear success. The acquisition and maintenance of a dynamic capability to' deliver a rapid and devastating blow - plus a proportionately, dynamic defense - are prerequisites to survival. The natio SECRET 23 which insures that its retaliatory force is, in fact, effective at all times, is obtaining maximum protection against preventive and pre-emptive attacks. The success of preventive war and pre-emptive nuclear launchings depends upon the achieve- ment of triple or quadruple surprise - technological, tactical, timing, and conceivably strategic. The US can keep its re- taliatory guard up only if it is able to render those surprises too costly, too impractical, and too uncertain. Thus surprise attack will be too risky for enemy resort only if the US keeps ahead in technology and intelligence, as well as in its force levels and, above all, in reaction times. Should we lose tempo and should one or more of these four pillars of our security crumble, the enemy's superiority may become such that he need not use nuclear weapons except as a threat. The so-called ultimate threat of large hydrogen weap- ons could become "demilitarized" - by manipulated fear. Suppose the aggressor says: "I grant that you can retaliate, but you will be completely devastated through my first blows. We leave it to you whether or not you want to elect your own death. If you retaliate, you will die, at best with the comfort- ing thought that you have killed some of us. Or you may survive under our whip. That is your alternative." It is known that the Soviets are doing considerable research on conditioned reflexes and brain-washing techniques. Manipu- lated fear and the conditioning of the opponents' mental and psychological reactions are strategic concomitants to nuclear weapons. The Soviets don't overlook a bet. Previous wars have lasted for years. Ever since the emer- gence of a modem industrial society with its long mobilization requirements, war could not be short. A future war may be decided within a matter of a few hours. I think it is wrong, however, to place all attention on the destructive phase of this type of conflict. in previous times, the length of the war allowed us to remedy the shortcomings and omissions of peace. Today and tomor- row, once the climax of the conflict has come, we shall be the prisoners of our previous decisions. In that critical phase we shall not be able to increase our force levels, acquire a new set of technological weapons, adjust our tactics to outdo those of the enemy, or even reassure the fearful and give orders to the panicky. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 24 SECRET .The protracted conflict may last longer than any previous war. Although the climactic or decision phase of this conflict may be short, still, the conflict could endure for many decades. We are in the battle now. As a consequence, the main battles are being fought by military forces in continued readiness, by warning and intelligence services, by the research and develop- ment community, by national and industrial planners, and by budget makers, as well as by moral and intellectual attitudes. Militarily speaking, the decisive phase could be won or lost by the staff and operational officers who 5 to 10 years before the shooting select or reject certain weapons systems, succeed or fail in shortening lead times, organize offensive and de- fensive forces, determine the balance between force elements, and plan deployment and reaction times. It also may be won or lost by the executive and congressional branches which de- cide, with a timelag of 2 to 3 years, the force levels to be main- tained in any technological phase; by the weapons require- ment, procurement, and logistics planners within the military; and by industry, all of whom, together, have the task of devel- oping and producing superior weapons faster and in larger quantity than the enemy; finally, by intelligence officers who must try to forecast the relative strengths and weaknesses of the strategic equation 5 to 10 years ahead. The latter will suc- ceed - or fail - depending on whether or not they convince the powers-that-be that their best estimates are valid. In protracted conflict, the climactic phase may be war in its most extreme form. If the climax is a matter merely of threat and surrender, it will be the most "peaceful" of all wars. To intelligence its most significant aspect should be that pro- tracted conflict is a war during peace. It is easy to enumerate the need to win the technological race, the requirements for adequate numbers of weapons and forces, the advantage of hardened and dispersed base locations, the ti necessity for fast reaction times, and so forth. But the basic reason these requirements are difficult to satisfy is that no'., nation has the economic capability to live up to the exigencies., of protracted conflict in the early period of the nuclear age. I am not talking about budgets which can be increased anct, I do not mean various degrees of economic mobiliza tion and readiness. Rather, I refer to more fundamental, limitations. SECRET To win the technological race a nation needs numerical and qualitative superiority in technicians and inventive geniuses. Unless the most revolutionary educational changes are made, it is unlikely that sufficient scientists and technicians will be produced to satisfy the growing needs of increasingly complex military programs. Even a program which marshaled all edu- cational resources into scientific and technical curricula prob- ably would be inadequate for acquiring that degree of technical superiority and material effort which makes the launching of a nuclear attack or the psychological threat of such an attack a relatively riskless affair. The cost of weapons systems is rising geometrically, while the increase in productive capabilities proceeds much slower. There is the problem of protecting and rebuilding our cities and facilities to survive in a nuclear environment. This is a prob- lem - so far largely untouched -- which clearly accentuates the severe limitations on our economic capabilities to meet the challenge of the nuclear age. In this time of economic plenty, scarcity still is the supreme fact of civilian and, above all, mili- tary economics. Material resources are not the only limiting factor. Time, which is a major resource, also is in short supply. For ex- ample, the time needed to transform a blueprint into a modern weapons system has become such that a military force never possesses an active arsenal without at least some obsolescence. I mean obsolescent in the sense that certain tasks simply can- not be accomplished against opposition or must be undertaken at excessive risks and costs. There is one inescapable conclusion from this discrepancy between requirement and capability. It is this: the future strategist has the potential choice of an entire technological spectrum of weapons. At least several weapons systems will be able to do the same task. Because of the technological potential available to both sides, he will have to decide whether to select a faster or slower weapon, an explosive with greater or lower yield, a weapon of endurance or of stealth. Should he guard against high or low level attack? Should he dispense with manned bombers in favor of missiles? Should he select an earth satellite "anchored" approximately 21,000 miles above its target to de- Approved For Release 2005/03/15 : CIA-RDP78TO3194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET SECRET liver nuclear firepower - or should he use a submarine from which to la h unc a missile? In practical terms the strategist can select only a limited number of systems from this entire technical spectrum, which will grow as we progress further into the scientific era. Strat- egists on the other side have to make similar eliminations. The chances are that the choices may not be identical because of different strategic objectives, production capabilities, opera- tional doctrines, concepts of defensive warfare, and so forth. In turn, because the choices probably will be different on both sides, the possibility of surprise and other major military in- itiatives will increase. Therefore, intelligence must forecast, in ample time and cor- rectly, the enemy selection so that proper defenses can be de- signed. Of course, the choice of the enemy may impose the need for counterweapons, which may have a feedback against our original weapons choice. It is necessary to insure that the relationship between what we actually have and what we require to counter the enemy's principal threats is such th t a we are notti accepng undue risks. If we made a poor or overly narrow selection from the spec- trum, if intelligence fails to guide the research and develop- ment community concerning the enemy's probable selections, we might invite attack, provide inadequate defense, and jeop- ardize life and liberty. But if our intelligence is keen and our armament effort generous we might ensure peace for the period of the technological c l yc e . We are in a conflict which has and undoubtedly will endure for decades but which at present is chan in g g complexion G .en- eral J. F. C. Fuller coined the term "machine warfare" to de- scribe World War I s and II Thi .s expression no longer fully applies to future "technological arf ? w are I am afraid that the Communists have shown a rather sophis=- ticated understanding of the strategic robl . - :____ _. .. A p m tech l ` o ogical strul Th gge.ey seem to understand nd t h w ec nical and eco nomic competition. More than that, they are organizing them, selves to achieve an overwh l i e m ng strategict ih posuren the tec nological realm The ar i . y e g rding to wi th t neechnologicd race against the US Wh t a ever the didta .savanages of a dict tonal s ste t y m,heir regime responds to rapid decisionmakin SECRET In this area, we do not seem to have matched their strategic comprehension. We are said to have made the decision never to strike the first blow. At the same time we have neglected to introduce sufficiently into our thinking the fact that if the opponent is allowed opportunity to achieve a broad tactical suc- cess through an initial blow, the retaliatory strategy must be more costly and complicated in order to compensate for the risk and loss which could occur at the outset and weaken the retaliatory force before it goes into battle. Under the postulate that the enemy strikes first, defense must be more expensive than under the postulate that we shall not surrender the initiative. It follows that we must not be re- luctant to pay the price of our security against an opponent to whom we present the gift of the deliberate surprise attack. The technological race has engulfed us exactly as a fast flow- ing river occasionally catches the unsuspecting oarsman. Such a situation cannot be met and overcome by preaching to the river, by throwing away the oars, or by using only one of two hands. In such a situation, all skills and all strengths are needed to ride out the rapids and not get smashed against the rocks. The fundamental conclusion I want to leave is that the tech- nological race, because of various economic limitations and po- litical climates, may not be won by any super power engaging in the competition, even with all its strengths. But this race very well may be lost by a country which fails to put its con- tinued best efforts into the challenge. It is to a large extent the duty of the national intelligence community to explain to our nation's leadership the true na- ture of this strategic problem. I pray that we will not fail in this task which is indispensable not only to our survival but to the survival of civilization. Intelligence has been getting the facts about the Soviet Bloc, or at least enough of them to enable many right decisions to be made. But we have not been able, often enough, to get our Information and evaluations accepted and acted upon. The somber fact is that as professional intelligence people we have not entirely grasped the meaning of protracted conflict in the nuclear missile age. I believe it not unfair to state also that as professional intel- ligence people we have been disappointingly slow in under- SECRET Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 standing the nature of the pressing problems which are con- fronting us. Only too often our categories of analysis and esti- mates still reflect the strategic realities of a passing age. We know all about the deposits of even the least important raw materials, but we may miss major scientific discoveries. Our battle orders of the infantry are considerably better than those of earth satellites. We are adept in measuring floorspace, but we are rarely engaged in comparing lead times. We are able to refine our calculations of weapons yields to the first decimal, but the analysts worrying about Soviet neuropsychology have yet to break through to the national estimates. We produce mountains of "data," but our progress in data handling para- phrases Lenin's title, "one step forward, two steps backward." We are considerably better in post mortems than in warning. Our understanding of man's greatest resource, time, has re- mained fuzzy in most areas. All in all, although we often express our conviction as to how important intelligence is to national security, we ourselves have not quite realized the crucial position we are occupying in the present power struggle. It is really the effectiveness of intel- ligence which, together with the effectiveness of our scientists, is the basis of technology. Beyond the development phase, in- telligence is either. a multiplier or a divisor of military strength- in-being. It is the one "weapons system" which by necessity is in constant touch with the enemy, regardless of whether there is war or peace. And in war, of course, intelligence re- mains a key condition of success. But we must elevate our sights beyond the old saw of intel- ligence being the "first line of defense." Intelligence is the fac for which should make defense economically practical, tech nologically superior, and strategically victorious. In the mils sile age, intelligence literally will merge with the decisive weap= ens system, lest the missiles be entirely ineffective. But intelligence will not be able to do this job unless it com of age as a technological system in its own right. We mus get the equipment our ubiquitous, instantaneous, and ency clopedic mission requires. We must have the forces to opera' these tools. We must develop utilization techniques which at par with or better than those equipments. And we m be able rapidly to feed our information to all users. One feature will remain unchanged: the ability to think. Electric computers and space telescopes are no substitutes for common sense and judgment. Reasoning by false analogy; preoccupation with minor problems to the detriment of major issues, emphasis on decimals and disregard for the large magni- tude, wrong philosophies about the rules of evidence, delusion- ary procedures such as the piling of estimates upon estimates - not to mention normal human failings such as prejudices, wishful thinking, parochial interest arguments, and subver- sion - all those will remain possible in the era of technologi- cal warfare. The machines, even the electrons, are no better than the brains they are designed to serve. It is gratifying to think that when the machine proves to be inadequate - for example, because it may take three months to "program" it - common sense and "conventional thinking" still will be called upon to take its place. The plain fact is that the machine, however good, will not replace the analyst. The machine will make the human brain a more powerful tool - this is the main reason we need it in intelligence. Intelligence technology is indispensable for the rapid handling of thousands of data and for the reduction of innumerable variables to manageable factors. This technology is the key to speed, coverage, and accuracy; to computation; and to experimentation with, and testing of, our conclusions and estimates (for example, through "gaining" techniques). But intuition and insight are necessary to make the ma- chines work. In turn, intelligence technology will make its greatest contribution if it allows deeper insights and ever more creative intuitions. Man has remained the key factor in tech- nological warfare, as he was the key to victory when rocks and clubs were the most powerful weapons. Military, or in a broader sense, conflict intelligence will be at its best when it is based on brain intelligence: IQ's plus wisdom. Pending the dawn of the technological age in intelligence, we should face up more courageously to the facts of life, how- ever bitter. As a nation and as the core of the Free World alliance, we have been underrating the danger for more than twelve years. Why was intelligence not more reliable? Why did we fail to are the obvious? Our own thought patterns and our intel- Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 30 SECRET CONFIDENTIAL 31 lectual isolationism have proved to be far more dangerous enemies to our security than the Iron Curtain and the ominous developments behind it. CONCEPTS FOR A PHILOSOPHY OF AIR INTELLIGENCE Lewis R. Long I should like to set forth certain concepts for air intelligence that I feel would vitalize an air intelligence philosophy and could lead to an air intelligence policy and doctrine consistent with the dominant role that air power must play in the years to come. I make no claim of originality in all these concepts; nor do I consider that they alone would form a sound air intel- ligence doctrine. However, together with the valid concepts contained in the doctrinal manuals, they would, I am con- vinced, provide better guidance to the field than has hereto- fore been available. I should like to emphasize that all the concepts presented are meant to be applied within the framework of one overrid- ing concept for a philosophy of air intelligence - that air intel- ligence is geared to air power in a nuclear age. and that it has the same predominant characteristics as has the air force - range, speed, mobility, flexibility, and penetrative ability. Because air forces have the capability of flying to any point on the globe and returning to any desired location, air intelli- gence must provide basic information to guide such flights in peace or in war. Because air forces exert a dynamic impact on all forms of international relations, air intelligence must be pre- pared to expose for the scrutiny of air commanders the entire structure of other nations and to advise and assist in the deter- mination of air strategy and policies. In the established principles for the successful employment of air forces it is considered that the air forces are an entity. gven so, air intelligence must be considered indivisible and re- sponsive at all levels of operation to employment as a single aggregate instrument. Air intelligence must be employed for the attainment of a common objective, which - in essence - Is to contribute to the security of the nation. Air intelligence provides the key to proper employment of the air forces in ex- esdaing the initiative in many different conditions of interna- tional relations, in taking advantage of different opportunities MORIIHRP PAGES 31-50 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 as they occur, and also in creating opportunities in which bene- fits to the US may accrue by the utilization of air forces in peace or in war. Air intelligence must also guide the air force in ex- ploiting the principle of surprise, in order to attain both mili- tary and psychological advantages through speed, deception, audacity, originality, and concentration. For the present, air intelligence must concentrate on indications of imminence of hostilities, without neglecting information on capabilities and vulnerabilities of potential enemy countries. This concentra- tion of effort not only will contribute to the security of our forces. but also will provide guidance for combat operations if war is forced upon us. Finally, air intelligence must be care- fully coordinated through proper control. CONCEPT NUMBER ONE. Intelligence agencies are never more at war than in periods of nominal peace. The logical out- growth of this concept is, of course, the fact that the success of the initial phases of war (and in this thermonuclear age these probably will also constitute the decisive phases) will de- pend on the quality of intelligence produced in peace. Most people can understand and pay lip service, at least, to the lat- ter idea, but they balk completely at a rational consideration of the first one when it comes to providing tangible support needed by the intelligence structure. I have never, in peace- time, seen an intelligence staff at any echelon that was not undermanned, overworked, and restricted in its operations by a lack of real appreciation on the part of the command for the goals the intelligence section had set for itself to accomplish in the light of the command mission. At all echelons intelligence staffs must have adequate num= bers of the best qualified personnel, maximum equipment, facil ities, and funds; maximum freedom of action; and coequal status with other major staff elements. It can be categorically, stated that if the air force intelligence structure had all the support it could profitably employ - and fully Justify-in peacetime, its resources would be ample for any type of war W, might become involved in. Let us now analyse each of the requirements (personnel, m terial support, freedom of action, and coequal status) in to of what other writers have had to say, bearing in mind th three basic intelligence missions: to provide timely warnin the imminence of hostilities (whether on a total or limited w CONFIDENTIAL 33 basis); to provide detailed knowledge of the capabilities and vulnerabilities of potential enemy nations and of friendly and neutral nations; and to provide the best possible intelligence as to the intentions of foreign nations, particularly those that are our potential enemies. PERSONNEL. During wartime, all the services drew heavily on civilian professions for manning intelligence posts. Law- yers, insurance adjustors, investigators, police enforcement of- ficers, scientific and technical personnel, and teachers were put into uniform; and, by and large, these people carried the intel- ligence workload of the services. By and large, too, their con- tributions compared favorably with those of professional mili- tary people. There have been numerous attempts made to identify the qualifications for intelligence personnel. Farago' lists ten major groups of traits which "the good spy is supposed to possess" in -order to qualify for that particular aspect of intelligence work. For the most part, these same traits could be used as a starting basis for selection of personnel for other intelligence tasks. First of all, his morale must be high and he must be genuinely interested in the job ahead. Second, he must be energetic, zealous, and enterpris- ing. Third, he must be resourceful, a quick and practical thinker. He must have good judgment and know how to deal with things, people, and ideas. He must be pro- ficient in some occupational skill. Fourth, he must be emotionally stable, capable of great endurance under stress. He must be calm and quiet, tolerant and healthy. Fifth, he must have the ability to get along with other people, to work as a member of a team, to understand the foibles of others while being reasonably free of the same foibles himself. Sixth, he must know how to inspire collaboration, to organize, administer and lead others. He must be will- Ing to accept responsibility. 1xrago. Ladislas, War of Wits (NY, Funk & Wagnalls Co., 1954), p 187. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 34 CONFIDENTIAL Seventh, he must be discreet, have a passion for ano- nymity and know how to keep his mouth shut and pre- serve a secret. Eighth, he must be able to bluff and mislead, but only when bluffing and misleading become necessary. Ninth, he must be agile, rugged, and daring. Tenth, he must have the ability to observe everything, to memorize details accurately. He must be able to report on his observations lucidly, to evaluate his ob- servations and relate them to the greater complex of things. MATERIAL SUPPORT. I should like to stress the importance of allocating the maximum in equipment, facilities, and funds to intelligence work in time of peace with a quotation from Sun Tzu,2 the Chinese military oracle, whose writings on the art of war in 500 B. C. have influenced military thinking down to this day. Hostile armies may face each other for years, striv- ing for victory which is decided in a single day. This being so, to remain in ignorance of the enemy's condi- tion simply because one grudges the outlay of a hun- dred ounces of silver in honors and emoluments is the height of inhumanity. One who acts thus is no leader of men, no present help to his sovereign, no master of victory. Thus, what enables the wise sovereign and the good general to strike and conquer, and achieve things be- yond the reach of ordinary men, is foreknowledge. In speaking of the cost of the British secret service as whole (both positive and counterintelligence), Seth noted:3 In 1913 the Secret Services cost 46,000 pounds; in 1939, 500,000 pounds; during the recent war 52,000,- 000 pounds annually; and in 1953, 5,000,000 pounds. It is worth many times this amount, for though the American, French and Russian (secret) services tion and notes by B/G Thomas R. Phillips, Harrisburg, Pa., Military Service Publishing Co., 1944). "Ronald Seth, Spies at Work, London: Peter Own Limited MC p. 202. CONFIDENTIAL 35 are now more extensive than at any time in. this cenr tury, British secret service still maintains its lead in performance and results. Farago gives a somewhat different order of magnitude for British expenditures for intelligence. He said that the 1954 budget was three million pounds and that this amount was the highest in the entire history of the British Secret Service. He pointed out, however, that this figure is deceptive because it represents only allotments from public funds and he adds: "The bulk of Britain's intelligence revenue comes from private funds, such as dividends of the Anglo-Iranian Oil Company, some of whose shares are held by the Admiralty." 4 Farago then gave an indication of what US military services are spending for intelligence. In fiscal year 1955, the Army asked for $54,454,000 for intelligence, and for fiscal years 1952- 54, inclusive, the Army spent a total of $176,400,000 on intelli- gence. Yet this represented less than one-half of one percent of the total Army budget .5 Then, stressing his thesis that the cold war is a "War of Wits," Farago pointed out relative ex- penditures for intelligence in the Continental Army and in the services today: 6 Between 1776 and 1781, George Washington spent approximately eleven percent of his entire military budget on intelligence operations. The fact that today we spend less than one percent of our peacetime mili- tary budget on these same activities shows how little effort is being made to solve the "friction" by intel- lectual means rather than brute force. From the contacts I have had with various British intelli- gence officers, visits to JIB (Joint Intelligence Bureau) and some of the intelligence officers of the Air ministry, and from comparing the results of British intelligence with those of USAF Intelligence, I am certainly inclined to agree, at least partially, with Seth's last statement for the quality of British intelligence production is invariably very high, and the quantity compares favorably with that produced by the much larger USAF intelli- pence staffs. The British traditionally have been willing to hrago, op. cit., p. 50. ' /bid.. p. 51. /bid p. 345. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 36 - CONFIDENTIAL spend a great amount of money, time, and effort in the collec- tion of intelligence information, more, perhaps, than most modern nations. They have not, in other words, weighed re- slts obtained by intell igence efforts on a completely pragmatic basis, as we "practical Americans" are inclined to do; they know that one cannot package intelligence results on a "pound-for- pound" basis. So for the past two hundred years they have been preeminent in the field. This is not to say that they have not made serious mistakes; but, by and large, their intelligence estimates have been remarkably sound. Moreover, they have used periods of nominal peace to extend and consolidate their intelligence activities, not only for the purpose of preparing for the next war but also (what is even more important) pre- paring for the peace to follow. FREEDOM OF ACTION. As background for a discussion of the need for granting maximum freedom of action to air force intelligence, I should like to quote the following passage from, the Report of the Task Force on Intelligence Activities: Effect of Diplomacy on the Over-All Collection of In- telligence. The task force has recognized the incompatibility in method between the practice of diplomacy and the more direct and active operations incident to the col- lection of intelligence and the conduct of cold war. While all contribute to the end in view, conflicts be- tween them must be resolved, usually on a high level, and always in the national interest. It must be real- ized that diplomacy is not an end in itself; that while political ends must be served and unjustifiable risks avoided, the collection of intelligence is a vital element in the fight to preserve our national welfare and ex- istence. Instances have come to the attention of the task force where too conservative an attitude has pre- vailed, often to the detriment of vigorous and timely action in the field. Although the foregoing comment was made in connecti with a discussion of the intelligence activities of the Dep ? Intelligence Activities, A Report to the Congress, by the Commissl 1955, pp. 42-43. (Hereafter referred to as "Task Force Report."), CONFIDENTIAL 37 ment of State, it is every bit as applicable to air intelligence as to the Department of State because the air attache system, which is a major contributor of intelligence information, func- tions as an integral part of the State Department's Forefgn Service. It is altogether appropriate that, generally speaking, diplo- matic considerations take precedence over the collection re- quirements of the attaches. Nevertheless, within the frame- work of that principle (which is a part of the principle of civil- ian control over the military establishment), it should be ob- vious from the implications of the Task Force findings that a less conservative attitude toward opportunities for collection of intelligence information should permeate not only the diplo- matic service but also the military establishment. I shall not devote much attention to detailed suggestions for carrying out intelligence operations. My concern is with the promotion of principles that would provide the type of climate in which competent people, using their innate intelligence and ingenuity, can devise an infinite number of ways in which to collect and produce air intelligence - ways which must, of course, be within the framework of US national objectives at all times. Nevertheless, I feel very strongly that we should take a page out of the British Secret Service book and put our intelligence collection efforts on a basis where they can pay their own way, at least in part. This would be a long-term proposition and it would be impossible of achievement under the existing regimentation that governs all business enter- prises in which the government is officially engaged. COEQUAL STATUS WITH OTHER MAJOR STAFF ELE- MENTS. There is, as far as I can discern, no rhyme nor reason in subordinating intelligence as a staff section to operations. My biggest objection to the subordination of intelligence to op- erations lies in the fact that the operations officer is automati- cully placed in the position where he frequently makes purely command decisions. The intelligence officer is supposed to itdvise the commanding officer as to what the enemy can and probably will attempt to do that would interfere with the ac- complishment of the command mission. The operations officer iS Supposed to advise the commanding officer as to what hta own forces can and should do. The commanding officer t then in a position to weigh both his own and the enemy's Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 38 CONFIDENTIAL capabilities and to make a sound command decision as to command action. It is totally wrong for the operations officer to make such a decision, for the commanding officer is thereby deprived of the full value (and probably full information) of enemy capabilities, vulnerabilities, and intentions. Zacharias, commenting on the fallacy of subordinating, told the Con- gressional Committee investigating the Pearl Harbor disaster that one of the organizational deficiencies which was a con- tributing factor was: S That the planning officers were allowed to take over the Intelligence function of evaluation. This resulted in individuals without a full knowledge of the Japanese or their psychology determining what the Japanese might do. This practice applied not only in Washing- ton, but also at Pearl Harbor, where the erroneous con- clusion was reached by the planning officer that there was no chance of an air attack on Pearl Harbor. CONCEPT NUMBER TWO. Success achieved by intelligence in peace will determine the outcome of the war. General Kuter stated: 9 In jet-atomic warfare there will be no room for gross errors of judgment. There will be no time, should hos- tilities start, to correct mistakes in the types of forces that we have provided, the manner in which they have been organized and trained, or the way we fight. And the terrible penalty for failure could be quick and com- plete defeat. Many factors are involved in any satisfactory an- swer. But one thing is sure. The question cannot be answered satisfactorily unless we have the proper doc- trine, and unless the doctrine is accepted. For years the US has believed that its greatest military p tential lay in its industrial might. The validity of this bell' n was demonstrated in World Wars I and II and again in Kor lanned to destroy not only our retaliatory force b ill be p w also our industrial potential. Thus we can see that "no long; 8 Zacharias, p. 253. Kuter, Lawrence S., Lt. Gen., "No Room For Error," Air Force M tine (AWC Curriculum Handout #36-4-a, 24 November 1955). CONFIDENTIAL 39 will the US or any other country be able to build up its mili- tary forces and rely on its industrial potential after the war has begun." 1? Intelligence must be developed before war breaks out if it is to influence our preparations, provide a foundation for our planning, and guide early phases of operations. It is true that Mr. Allen Dulles, present Director of the CIA,11 achieved un- precedented success in the history of espionage with the intelli- gence network he established in Germany, operating from Switzerland, during the war. ... Through this network Mr. Dulles managed to start a conspiracy within the high command of the German armies in the south and to bring about the surrender of the very army on which Hitler was de- pendent for the prolonging of the war from behind the legendary "Alpine redoubt." However, the situation in Japan was a far different matter. Through shortsightedness and perhaps ineptitude and inex- perience, the US had failed to establish the groundwork for an effective espionage system in Japan, notwithstanding the fact that Zacharias and other authorities on Japan had been aware of the need and had advocated such prior planning. In view of the steadily deteriorating relations that existed between Japan and the US right up to the surprise attack against Pearl Harbor, this failure to develop, in advance of war, a workable system for systematic collection (in Japan) of intelligence in- formation during the war that most intelligence personnel were sure was virtually inevitable is an extremely black mark against the US intelligence agencies of that time. Moreover, this country made no serious effort to establish an intelligence net within Japan during the war because it was felt that the effort was far too great in relation to its possible value. Farago pointed out that it is a virtual impossibility ". . . to set up a local network in an enemy country under wartime condi- lions...." 12 [Allen Dulles' success notwithstanding] 'Thomas K. Finletter, Power and Policy, New York: Harcourt, Brace and Co., p. 256. - Tango, op. cit., p. 183. 0Ibid.. p. 182. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 How can we account for the fact that, against all reasonable odds, the US did establish a satisfactory espionage net in Ger- many after war started but failed to do so in Japan, its other major enemy? I suggest that the reason lies, among other factors, in the accessibility of Germany before the outbreak of war. In other words, more Americans and individuals from Allied nations had contacts before the war in Germany than in Japan. Interestingly enough, the Soviets failed to re-establish within Germany an adequate espionage net: ... when their original network, known as the Rote Kapelle or Red Orchestra, was smashed. They managed to create such networks only in countries of their wartime allies, Canada, the United Kingdom, and the United States, and in neutral Switzerland, tra- ditional battleground of international espionage.13 The Soviets did achieve remarkable success in Japan (remem- ber the Sorge espionage case?) 14 It seems to me that there is a direct correlation between the accessibility of a potential enemy, country just before the outbreak of hostilities and the proba- bility of being able to establish (or re-establish) and maintain; an espionage net in that country after war breaks out. What does this mean, as far as the US is concerned at the present time? If it is difficult to penetrate the iron Curtain today, it will be even harder when war breaks out. Therefore, w must go all-out to penetrate it, and to establish many strong ' diversified, and versatile nets as soon as possible. We canno do this under the existing limitations of personnel, equipment, and funds. Yet maximum reliance must be placed on the ability of intelligence to decide by whom, when, where, and what strength the US may be attacked. The responsibility o the Directorate of Intelligence (ACS/I, since 1 July 1957).; USAF, is to develop this information regarding our suscepti bility to air attack - this in an air-nuclear age. CONCEPT NUMBER THREE. Air intelligence must, on a con tinging basis, encompass all aspects of power in foreign na tions (political, economic, and psychosocial, as well as mini - tary), both in the present and in the historical perspectit Moreover, it must speak out on matters of national strategy. 's Ibid., p. 182. " Ibid., pp. 163, 166, 179, 181, 212, 219-220. Heretofore, air intelligence (as well as army and navy in- telligence) has confined itself primarily to an evaluation of the military power of foreign nations. The National Security Council has directed the air force to interest itself primarily in intelligence of foreign air forces and has assigned responsi- bility for covering other aspects of national power to the other US intelligence agencies. It has long been an American tradition that the military establishment should remain free from the "taint of politics." As a result, the military has shied away from any contact with political problems. This even reached the point before World War II where few of the regular military establishment exer- cised their constitutional right to vote in elections. This fear of military domination in our national life stems, of course, from our inherited distrust of all forms of tyranny and autocracy. Before the time that military power became inextricably tied to the other forms of national power, perhaps even as late as the First World War, this attitude may have had some validity in our national consciousness. However, Clause- witz would not have subscribed to the complete separation of military thinking from the remainder of national life and activ- ities. He pointed out that war is merely an extension of na- tional, political policy by other means.15 Hitler demonstrated his conviction that war is merely a "mopping-up process" by capitalizing on the gains made by his fifth column. Certainly the Marxists have from the beginning showed the world by word and deed that the line of demarcation between politics and military action is extremely nebulous. It can and probably will be argued that air intelligence should "stick to its knitting" and concentrate on ascertaining the strengths and weaknesses of foreign air forces in the tradi- tional fashion (in which the army is supposed to develop intel- ligence on foreign ground forces; the navy, on foreign naval forces: the air force, on foreign air forces; and the State Depart- ment and CIA, on foreign political and economic strengths and weaknesses). However, as it is air power that will have to carry the brunt of any initial contacts with the enemy, as well a~ continuously to seek out and destroy all aspects of the enemy " Karl von Clausewitz, General, On War (Translation by 0. J. Mattijs Julien). Washington, D. C.: Infantry Journal Press, 1950, p. 16. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 42 CONFIDENTIAL warmaking potential and will to fight, air intelligence must have the capability of advising the Chief of Staff, USAF, where and when to hit the enemy in order to hurt him most. It seems incontrovertible to me that we have reached a place in history where the military establishment, particularly the air force, must concern itself with political problems (as well as the economic and psychosocial problems) - the traditional American feeling in the matter notwithstanding. General d Director of Intelligence, Headquarters USAF, agreed Samfor , on this point, in response to a question asked by the writer, ruuuwulg 111 rowing community of thought that the mili e is a "Th g er effect, tary establishment should get into the fields_ofr " polittical and, 1 Air in- telligence, obviously, must be in the vanguard this new, CONCEPT NUMBER FOUR. Intelligence must take ^a dh In speak- o na mic approach. Soviet Bloc are inadequate, the Task Force Report on Intelli-I ities considered that security measures adopted by, ti A v c gence the Communists have been exceptionally effective, particularly n th A i -------- in compar so it relatively simple for foreign nations to collect vital secrets, The task force admonishes, however: . The information we need, particularly for our Armed Forces, is potentially available. Through con- centration on the prime target we must exert every conceivable and practicable effort to get it. Success in this field depends on greater boldness at the policy level, a willingness to accept certain calculated politi- cal and diplomatic risks, and full use of technological capabilities." Opportunities to increase air intelligence coverage of So; d intenons n capabilities au. ----- a. The increasing of our clandestine operations, and,effo to infiltrate the uULL countries, taking maximum advantage not only of bor Samford, John A., Mai or General, "Objectives for the Use of FO lecture to Army War College, 2 January 1956. 17 Task Force Report, op. cit., p. 69. CONFIDENTIAL 43 crossing techniques on land and by air drop but also neutral shipping and US submarines, particularly in the Arctic Ocean and the Black Sea coastal areas. b. The establishment of contacts with and provision of sup- port to (in return for services rendered) agents from. among known governments in exile, such as those from the Baltic and East European Satellite nations; the known 10,000,000 Chinese living outside China, as minority groups throughout Asia; all known religious organizations, business firms, and govern- mental agencies throughout the Free World having dealings with the Soviet Bloc; all known visitors to Soviet-dominated territory, such as trade union officials, scientists, airline and shipping crewmen, and others; and all defectors from iron cur- tain countries. c. The attempt to bribe, intimidate, subvert, or otherwise cause Soviet and Satellite diplomats, government officials, tech- nicians, or visitors abroad to "double" for us upon their re- turn - or to defect and remain in the West. d. The making of surreptitious photographic penetration flights with high capability aircraft at irregular intervals, to cover peripheral areas. e. The purchase of controlling interest in the most active Western firms having dealings with the Soviet or Satellite na- tions in order to use these firms to collect intelligence informa- tion, spread favorable propaganda, subvert Soviet and Satellite nationals, and otherwise create situations behind the iron and bamboo curtains that would be favorable to the West. f. The employment of such outstanding historians as Alfred J. Toynbee; political scientists, as Professor William M. Mc- Govern and Dr. Robert Strausz-Hupe; geographers, as G. Don- aid Hudson; ethnologists, as Margaret Meade; and authorities on Russia and Communism as Dr. Marc Szeftel and Mr. James Burnham. The individuals named represent only a few of the potential list of qualified consultants; the profound and dttutlcd knowledge of foreign peoples and areas in their re- apcctlve professions that is possessed by people of this stature -mold furnish a wellspring of ideas of inestimable value to air Intelilgence. In addition to enriching the staff with people of " caliber we should hire outstanding representatives in the ?4rrrtising and public relations fields (preferably those having tprcnee in foreign areas), who can assist the factual experts Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 in packaging the ideas we want to use in our "War of Wits" with the Soviets, this struggle for the minds of men. CONCEPT NUMBER FIVE. Intelligence should be used as an offensive weapon, one capable of influencing the outcome o either the cold war or any hot war, peripheral as well as total. Although there are no apparent indications that the Soviet Union, during the next few years, intends to take action of the sort that would surely precipitate another world conflict, we must be always on the alert to the possibility that such a con- flict might arise through miscalculation on their part. The dangers are greatest in the peripheral areas, where Satellite peoples might get out of hand and take action "from which we cannot retreat without disaster; then the chances of keeping war limited are very remote." 18 The difficulty is not in the lack of desire to exercise such restraint, but in the fact that the things we stand to lose are of such great value that there is no chance of limiting phases, of conflict. To have mutual understanding and agreement be- tween enemies is essential if conflict is to be localized. What does this mean to air intelligence? Simply this: we must pro-. duce intelligence on every facet of enemy life. To do this, air,, intelligence should control or at least coordinate all air force agencies that to any degree operate in enemy territory or attack behind enemy lines or perform other than strictly military, operations in areas that may become the scene of battle or areas where, in the cold war, the air forces encounter Com munist influences. CONCEPT NUMBER SIX. Intelligence must be used syst atically. Commanders, policymakers, planners, and opera. tions personnel at all echelons must rely upon, then plan, th act not only upon intelligence but also upon intelligence reconi, mendations - within practical limits of our own capability an feasibility of such recommendations. We have long express as a principle of intelligence the concept that it must supplied to the interested command in time to be of Unfortunately, in intelligence circles there has not been, seems to me, equal emphasis placed upon submission of inte gence to the commander and his staff in such a form and, convincingly expressed that it will receive the prompt attentii CONFIDENTIAL 45 and responsive command action that it warrants. Stressing the need for reducing the margin of error inherent in any human undertaking, General White pointed out the need for educating our planners and our leaders. He said that poor command decisions and inferior or unimaginative staff work would nullify the tremendous effort that has gone into develop- ing an extremely expensive air force. He added: ... Superior employment of air weapons must be based on complete understanding of the nature of air warfare, the political and military context within which the air forces are operating, and a sound but imaginative understanding of targets and weapons.19 There also has been entirely too little emphasis on the con- cept that command plans and action should be based on in- telligence. This has not always been the fault of intelligence. Nevertheless, too often in the air force, particularly, operational plans have been prepared with absolutely no regard for the intelligence estimate of enemy capabilities and intentions that these selfsame plans were designed to counter. In my experi- ence as a staff officer at various echelons of command, there have been few instances in which command war plans, emer- gency plans, or operations plans have actually been geared to the intelligence that gave rise to the necessity for such plans. More often than not, the intelligence annex is merely prepared at the same time as the basic plan and the other annexes and all are stapled together at one time. The proper procedure, and the one that we in intelligence at USAFE (US Air Forces In Europe) were finally able to sell to the planners, should be this. The intelligence estimate of the situation is prepared first, and given to the commander and to all his staff agencies in advance of the planning cycle. The basic plan and all the annexes (including the intelligence annex) are then prepared simultaneously, with a view to countering the threat indicated In the intelligence estimate. I believe this failure to take the intelligence estimate into conhlderation at every stage in the planning cycle in the mili- tary establishment stems by and large from an American pre- White. Thomas D., "The Current Concept of American Military Mtmngt.h," AU Quarterly Review, Vol. VII, Spring 1954 (AWC Cur- rkulum Handout #56-2-B, 22 November 1955). Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 46 CONFIDENTIAL dilection for ignoring in the policymaking cycle available in- telligence regarding the capabilities and intentions of actual or potential enemies. It seems to me that the intelligence family must find some way not only to improve the quality of its product but also to stimulate an acceptance of that product and a willingness to act upon it. The process of making positive recommendations by intelligence for command action would, I believe, materially improve this situation and would lead to a command acceptance of a principle advanced by General Ridgway, when he was Chief of Staff of the US Army. He stressed the fact that the present world situation makes it more important than ever to have com- plete information upon which to base economical deployment and effective employment of army forces, as well as to avoid sur- prise (obviously the same principle applies to all military forces). General Ridgway stated: "Adequate intelligence con- stitutes the fundamental basis for the calculation of risks, the formulation of plans, the development of materiel, the alloca- tions of resources, and the conduct of operation." 20 CONCEPT NUMBER SEVEN. Intelligence must eontinuousl, estimate enemy intentions as well as capabilities and vulnera",, bilities. One of the biggest reasons that commanders at times have made their own estimates, rather than accept those o their intelligence officers, is simply that the intelligence office have been unwilling to "go out on a limb" and estimate enem intentions. Before the early 1930's the "method of intentions' was used by the US Army. It was a method used by the eld von Moltke. Shortly before 1936 the American Army adop the "method of capabilities," which had been the method us by Napoleon.21 Admittedly the "method of intentions" is a difficult one an for the inexperienced intelligence officer, nonhabit forming: cause the probability of error is extremely high. Success f' this method depends not only on an intimate knowledge of th 14 mentality of the opposing commanders as well as the tactii doctrine of the enemy but also upon such intangible things; the physical and mental condition of the opponent, his no reactions, and reasoning processes. On the other hand Farago, op. cit., p. 8. "Command and General Staff School, "Military Intelligence, CONFIDENTIAL 47 "method of capabilities" takes into consideration all lines of action open to the enemy. It does not discard any possible line until the enemy's dispositions are such that, even though he desired to adopt that line, he is physically incapable of doing so. Thus it strives by elimination to reduce the possibility down to one - the only one line of action which the enemy can take. This is the ideal, as far as intelligence is concerned, but it is seldom reached. CONCEPT NUMBER EIGHT. Intelligence is no longer a func- tion of command, except at the higher echelons. All of the services (particularly the air force) have traditionally paid, only lip service to the principle that intelligence is a function of command. This has been amply demonstrated by a lack of provision for suitable intelligence staffing between World War I and World War II and by a demeaning of intelligence func- tions. My reasons for believing that intelligence should no longer be considered a function of command at all echelons are different from either of these. In the first place if an all-out global war should occur, the US intelligence operations should be centrally controlled. Sec- ond, the entire intelligence process cannot reasonably be car- ried out at all echelons; therefore, even in a prolonged period of cold war, air intelligence operations must be, if not actually centrally controlled from Washington, at least concentrated in a small number of locations where the complete intelligence process is directed by one individual. Unquestionably, in the past, commanders of squadrons, groups, wings, even air divi- s4ons and air forces occasionally may have felt a twinge of conscience because they have been unable to see their way clear to carry out all the intelligence functions that manuals said they should, from collection through dissemination. These Individuals may now draw a sigh of relief, as I view it; for in the air force, their primary intelligence function is to dissemi- nate down to the troops air intelligence that has been received from higher echelons. It may be argued that I am hereby cutting the rug out from under the principle I previously expressed - that the intelli- p ncr officer should not be subordinated to other staff officers but should report directly to the commanding officer. On the c mtrary. in these lower units, and even when his recognized CONFIDENTIAL Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL 49 duties are in accord with his actual duties, I still feel that the intelligence officer at every echelon of command should remain responsible only to the commanding officer or the chief of staff, and not to any other staff officer! He must maintain this inde- pendence of other staff considerations in order best to present to his commander the most complete intelligence picture and the most reasonable intelligence recommendations, even though he himself may not have developed either the intelligence esti- mate of the situation or the recommendations based on it. At the major air force command levels there is no question in regard to major staff level standing for the intelligence officer as intelligence should continue to be for his commander a complete function of command, in the traditional sense. At the lower echelons, intelligence would still be a command re- sponsibility, but rather more in the "special staff" tradition than the "general staff" concept. CONCEPT NUMBER NINE. Major headquarters staffs should get out of the operational aspects of intelligence to the maxi- mum extent possible and should confine their attention largely to policymaking and flash or spot estimating functions. This concept is closely related to some of the thinking indicated in the discussion of the preceding concept. Compared with the, present tables of distribution, the intelligence staff of Head relatively small. These staffs, however, would be comprised of highly qualified personnel, representing the maximum Intel primarily policymaking, inspection, liaison, and estimating of the imminence of hostilities and spot estimates, as requir by the commander and his staff. They would exercise st supervision not only over the intelligence activities of all su ordinate units of the command, but also over the collection an production activities of the intelligence centers belonging the command; these centers would perform the operation aspects of the intelligence process for the entire command. CONCEPT NUMBER TEN. Air Intelligence (to include cou ' terintelligence) must keep under continuous review and, the maximum extent possible, must downgrade and publish flies concerning enemy capabilities, activities, and intentions;' What I am proposing is nothing less than declassifying cer- tain carefully selected items of intelligence and counterintelli- gence regarding Soviet activities and providing such informa- tion to the American public on a planned basis. Let the Amer- ican people get this information, but from authoritative sources and not from newspaper columnists. Probably the most violent opposition to this proposal will come from some of my fellow intelligence officers, because tradi- tionally, intelligence has had a moral responsibility to protect its sources, and rightly so. Nevertheless, intelligence files are bulging with information that represents such a conglomera- tion from so many sources that no one source could possibly be harmed by its disclosure. Let us substitute this type of infor- mation for at least some of the detailed data on our own mili- tary establishment that we now hand out so freely. I am confi- dent that the public reaction to this policy would, in general, be very favorable, and that in the long run, the story of air power and the capabilities of the air force to safeguard the security interests of the US can be made synonymous in the minds of the American people. So let's stop giving aid and comfort to our potential enemies and start a program designed to discomfort them on a global talc - by informing and arousing the American public and the rest of the free world with factual knowledge of Soviet ac- tivities and intentions. For example, an article in the Sep- t,-tuber 1955 Reader's Digest discussed the disturbing story of the manner in which the Communists, who had infiltrated the military services and governmental structure of Iran, were pre- rnted from taking over the entire country by the merest ac- cident. As a result of the investigation, it was disclosed that five hundred Iranian officers were implicated in the plot, in- cluding numerous high-ranking individuals in both the Army and the police departments.22 This story, terrifying in its implication for other countries, would. I submit, have had a much stronger impact on public awareness of the Communist threat to the world today had it bat-tt omcially released by a government intelligence agency, rather than by a commercial writer. This is the type of run- J?*+cph A. Mazandi and Edwin Muller, "The Hunch That Saved hon." Reader's Digest, September 1955, pp. 59-60. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 50 CONFIDENTIAL of-the-mill basic intelligence available to the, services which should be released to the public as soon and as fully as is prac- ticable and, in any event, before some sharp news reporter can capitalize it. All air intelligence concepts must be con- CONCEPT ELEVEN . sidered dynamic, kept under constant review, and revised to meet changing world situations. It follows that air intelligence philosophy must be considered in its broadest sense as a con'. ---__ d -1-4oa roelilt an nt sear h for princi t . . a s ing from this process must be changed as new concepts are. General Kuter provides another valid con= In this context , cept for developing an air intelligence policy, although he was, of ai r, it in he in l r g app y -- - -force thinking. "A true air doctrine accepted and exploited ar mili sour o k h _ i - . a er e > 23 a common strategy. We don't, as yet it i n must exploit we h air intelligence policy or doctrine in writing, lI ave an t that last admonition of General Kuter's as ill ado USAF p w the basic air force intelligence policy, it will be only a matter ntil ti .... ....... ...- me u of which the commands may then soundly base their own intel ligence policies. Kuter, op. cit., p. 29. SECRET 51 DEVELOPMENTS IN AIR TARGETING 1. THE MILITARY RESOURCES MODEL The basic objective for air targeting is to present measure- ments of the ability of the enemy to take actions which threaten our national security. These measurements must be presented in such a way as to guide our action against the enemy's strengths. This objective is usually broken down into subobjectives which illustrate clearly its breadth and com- plexity. Expressed in terms of courses of enemy action which are unacceptable to the US, these subobjectives are, in descend- ing order of importance: 1. To deliver atomic weapons against the US, our forces abroad, and our allies. 2. To resist the penetration of his airspace by our air forces. 3. To develop and produce potentially decisive weapons or weapons systems. 4. To conduct large-scale land and naval operations against our forces and our allies. 5. To develop and maintain the economic, political, and psy- chological strengths necessary to support prolonged military operations. With the development of new weapons and weapons systems, however, and the resultant capability of a single aircraft or missile to deliver the equivalent of millions of tons of TNT on one mission, the analysis and presentation of the strengths supporting the first three subobjectives have assumed ever- Increasing importance and urgency. This compression of fire- power in time brings the realization that the decision in future wars may be reached in a matter of hours or days at most. Old problems have been accentuated and many new ones cre- ated by these developments. For example, selection of target rytems to achieve the subobjectives time-phased in the order drown above is no longer sufficient. Analysis must produce rat only a priority of targets within each subobjective and target system, but also an indication of how many of them MORIIHRP PAGES 51-64 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 must be attacked to achieve the objective. Thus analysis by increments in time and space is becoming an essential element in the targeting process. The complexity of these problems and the speed with which they must be solved have led to the introduction of new statis- tical methods and of new machine computing techniques into the targeting analysis process. For example, immediate assessment of the damage and contamination effect of a given attack will be necessary in order to determine the destruction required of succeeding attacks. This involves a continuing evaluation of target priorities and of net offensive strengths throughout an air offensive until a decision is reached. Two- sided war-gaming offers the best possibility for providing the answers needed for this and similar problems. Because of the time element and the great volume of data required by the new, statistical techniques, high-speed electronic computing is By this process hypothetical but highly probable essential . military situations in both peace and war can be examined and by the analyst to guide and evaluate target selections. Only in this way can the total targeting effort truly be said to pr sent measurements of the enemy's strengths in such a way to facilitate action against them. During the last several years it has become increasing apparent that mathematical "Monte Carlo" and "input-ou put" type models offer a new and promising technique for "war'.. ga m-a __ resources for targeting purposes. The rapid advances in th speed and data handling capacity of modern electronic con% i on puters have now made these models feasible for applicat many air targets problems. The purpose of the mathematical models is the selection targets for optimum forestalling of enemy courses of actin s This requires the models to answer the following question order. 1. Present situation a. What is the size and composition of the enemy tart' establishment (military resources)? b. What is the size, composition, and productive abili: of the enemy economy (economic resources) ? c. What levels of military action will these resources sup- port? 2. Mobilization capability a. What would be the size and composition of enemy military resources and economic resources after an all-out mobilization period of x months? b. What levels of military action would these resources support? 3. Evaluation of damage a. For any specified bombing attack what would be the yield and location of all exploding weapons? b. Given these explosions what would be the size and com- position of the post attack military and economic resources (including population)? c. Given the post attack resources what level of enemy military action could be maintained? 4. Recuperation What would be the size and composition of enemy mili- tary and economic resources y months (or days) after the specified attack, taking into account repair, rebuilding, con- version of other facilities, and new construction? For "war-gaming," that is, estimating net offensive capabili- tIes, the above questions must be asked about our own country as well as about the enemy country. The system of mathematical models which would answer these questions is shown schematically in Figure 1. The air battle, the damage, and the contamination models would answer questions 3a and b above. Discussions of these models are planned in subsequent issues. The remaining questions concerning the present, post mobi- lization, post attack, and post recuperation capabilities of the military and the economy are the province of the military re- aources model, which includes economic resources. Procedurally, the military resources models determine the number and size of missions, both offensive and defensive of "Anus types, which each country can carry out in a given span Cd time. This information is fed to the air battle model which to ether with the damage and contamination models deter- Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 DAMAGE MODEL AIR CONTAMINATION MODEL BATTLE MODEL DAMAGE MODEL CONTAMINATION MODEL N mines the military, economic, and population resources re- maining in each country after a period of air battle. The dam- age information is in turn fed back to the military resources model which determines the number, type, and size of missions which each country can carry out after the first phase of air battle. The process is then repeated for later phases of the air battle. If the models can, as is believed possible, answer the ques- tions posed we have an exceedingly powerful tool not only for target selection, but also for estimating the capability of a country to carry out military action now and in the future under various conditions and assumptions. The testing of alternative target systems in the first and succeeding phases can lead to the choice of the optimum target system for any of several different strategic situations. When then, is the military resources model and how is it de- signed to answer the questions put to it? The military resources model is an input-output model. This is a kind of mathematical model about which it has been said, it is much easier to understand what it is expected to do than how it does it. What the military resources model is expected to do is to estimate the capabilities of a military establishment and its supporting economy to carry out military action. The r sential problem of making this estimate is that everything must be considered simultaneously. It Is not enough to know that the capacity of the aeroengine Industry is so many engines per month. One must also know whether there is enough steel (or electric power, copper, petro- 1runt, ball bearings, and so on) to produce these engines while at the same time the tank, gun, shipbuilding, ammunition, and many other key industries (including reconstruction in a post attack period) are also requiring steel. Furthermore, not only ihr direct demand for steel must be considered. The aero- Inc industry consumes not only steel but also aluminum, ciactrlc power, transportation, and many other inputs, the pro- duction of which also requires some steel. In short, to know ttw capabilities of one industry we must account for require- tflcnta of all industries for a vast range of raw materials, labor, akppttal equipment, components, goods in process, transporta- Ucm and communications. Input-output models are a tech- for doing just this. An input-output model shows for Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 MILITARY RESOURCES MODEL MILITARY RESOURCES MODEL Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET 57 each industry (or military activity) the requirements for sup- plies from each other industry.' The military resources model consists of three sub-models or grids; the military grid, the economic grid, and the transpor- tation grid. The economic grid is in turn broken down into geographical regions which are related to each other by the transportation grid. The military resources model can be illustrated schematically. THE MILITARY RESOURCES MODEL ids consists of an inventory of resources an Each of these gr a table of coefficients in the form of inputs required perrus i ono is h n--- - e ec of Output. rur t oe ffi, roducing industries. The table of ll o f p the capacities of a f cients shows material, labor, and capital inputs per unit ne cult.ri m le x f p a or e dustrial output, , bomber a ton of aluminum and tons of aluminum per heavy bomber ii and le , ?~--~ required per unit of military activity; for examp -r+ roe nrinm tnns of arnmur e of airs per nymg hour,11u11~ division month, and so on. Its invent) Lion (by type) per of resources is the number of military units of each kind an' rid haste tio t n g a The transpor their associated equipment. its output units of transportation capacity on a and nomic arid This grid acts as a restraint on both the eco bottleneck or restrf military grid as transportation can be a structure its r ilit y a both in the economy and within the m 1 Studies in Intelligence, Vol. 1, No. 4, "The Role of Inte9rind p. t Loring Allen " , Rober Studies in Economic Intelligence, Without knowing the full complexity of the statistical and computational procedures (which is awe-inspiring) the reader can now visualize the operation of these grids in answering our initial questions. The military grid shows for a given set of military forces the level of combat actions that could be main- tained if the economy provides all the supplies the military re- quires. The coefficients of the military grid determine the re- quirements of the given level of combat actions from the econ- omy. The economic and transportation grids determine how much of these supplies can be forthcoming from the existing inventory of economic resources. At the present time the economic grid of the Soviet Bloc has been largely completed. It has been constructed in two parts - one covering the USSR and European Satellites and the other the Peoples Republic of China. For the European 1i1oc the grid distinguishes 240 producing industries or sectors and their materials, components, capital equipment, and labor inputs. Five test runs have been made and evaluated.2 On the basis of the evaluation of these test runs, application of this grid to certain types of live air targets problems is now be- in:; undertaken. However, a substantial data improvement rrsearch program is going concurrently. `i'hc military grid has been under development for about nine months. It is expected that test runs of this grid will be made in the summer of 1958. The transportation grid has been under development for about six months, and it is expected that test runs of this grid rill be made in the summer of 1958. The construction of this grid is being undertaken on two fronts. The first involves the Er);raphic disaggregation of the economic grids in terms of kcal regions. The second consists of the development of a transportation grid based on these regions. To date, 159 re- gk3n.+ covering the USSR have been designated, outlined, and cod-vd. The transportation net has been divided according to ttwwr regions and the terminals and links within each region cndrd and catalogued. The 159 regions correspond to Soviet C& Uts wherever possible in order to take advantage of the data UsWbuUon of these runs has been made throughout the intelli- L*ncr community. A few copies are still available for interested Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET on production and transportation published by the Russians. The effort to gather Soviet source information for the grid is linked to a concerted effort to gather applicable data, both The enormous complexity of the computations ein wont d in a ca ? - model analysis manes ~ rid for the European Soviet Bloc, for ic g able. In the econom example, there are per unit of output of each of the 240 sectors uirements from each of the other 239 t re q the commodity inpu sectors. This will be further broken down into 159 geograph-3 . - +n ho siMi ltane, th e ,,,......... - ical regions. gnus ously processed theoretically could be of the order nhl m millions 0, x lbu, or about 1111111, +_? tic steps may be involved. Modem eler individual arithme re tronic computers, however, can perform this ----A ivifli which thel - the ompu h es tionary aspect of can file, sort, recall, and manipulate large masses of data These partially routine steps in arriving at intelligence estii n + Tnn,. have a.lwavs beer ch s u w. -- - mates on large areas, time-consuming and cumbersome. For the more difficult an e r with t alytical problems, electronic computers aogr slderii h for mancai inn-r, prgreat many more of the e and holding in juxtaposition a -- --ihla This tee was s menu or the analysi eliminate the human judgm ns , nique does not, by any mea factor.. Rather it is believed that it will prove to be a po e"ri lanners to m~ p nee lli t g e tin assis ing ll tool better judgments, and to be able to make them more rapidly Some of the more specific applications of the military, ted below . sources model to air targets problems are presen i il it es 1. Enemy Capab del can be used to assess The military resources mo capability of the economy of the Soviet Bloc ato mount an a f 111111 tam elements o J tions: under varying Bloc objectives, policies, and assump urces} ilable res o government is constrained to work its ava If it wants a j i ps. within technological relationsh ' The number is actually smaller since many of the coefficielx emember which o ld r zero. Only a machine, however, cou zero. bomber regiment it must provide planes, bombs, crews, air- bases from which to operate, and so on, in specific quantities. If a ton of steel is needed the government must see that steel mill capacity, pig iron, scrap, coal, labor, and so on, are avail- able in the correct amounts. If more steel capacity is needed it must provide the steel, concrete, machinery, and so on, in the right quantities and types to construct a new steel mill. These resource restraints and technological relationships are set out comprehensively and in detail by the military resources model. The ability of the economy to support the mobiliza- tion of desired combinations or "mixes" of air, land, and sea forces can be measured. A typical problem would be a deter- mination of the maximum "balanced" air, land, and sea forces which could be activated in a specified mobilization period with specified stockpiling and capital expansion policies. In addi- tion to measuring the maximum activation of combat units, the economic grid can be used to determine under a variety of illoc policies and objectives the maximum capability to pro- duce specific weapons such as guided missiles and H-bombs at specified times. However, the economic-industrial grid does not take into account any restraints or bottlenecks that might develop within the military structure itself. Therefore, the outputs of the economic grid are fed into the military grid as inputs. The military grid is then used to assess the capability of the Soviet illoc military structure to mount and sustain, during a pre- attack period, elements of military strength fully prepared to rnkage in combat activities required by given strategies. The ability of the military structure to support desired combina- tians or "mixes" of air, land, and sea combat activities can be measured under varying Bloc mobilization objectives, policies, and assumptions. In addition to measuring the maximum r*mbat capabilities that can be sustained, the military model can be used to determine the capability of the military struc- 14at to put into operation specific weapons, such as guided 4*411es. within the available military resources, that is, trained patratnel, missile sites, logistics, and repair facilities. Tic transportation grid would then be used to establish any lttnaportation restraints or bottlenecks which might develop the economy or military structure itself. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET 61 2. Effects Analysis Following their use in pte-attack situations, the three grids of the military resources model can be used to determine the capability of the Bloc economy, military structure, ce,a trans- portation system to re-mount various types eriod after air attacks of different scope k t p ac in the post at and intensity. The analysis can be applied to various time' of time only, d i s o periods after the air attack. In very short per the military and transportation grids ibl y the military, or poss as the answers needed would be the avail, l t ay, o p might come in immediate military structure of the Soviet th e abilities within ir attacks and to sustain ground and naval l e a Bloc to re-cyc action. These answers would be in terms of availabilities of yinP duce fl aircraft, runways, fuel, men, and ammunition to pro ound divisio hours, and the needed inputs to produce gr 4.1- time narin of na it s months and un involved the more industrial and economic resources must be d ht ?,?,,,?b ---- analyzed an In the analyses of recuperation periods of over a fe rces . sou months the economic-industrial grid is heavily drawn upon However, diate post-attack military assessment, as well as long rang t . economic and industrial recuperation assessmen Selection of Air Targets 3 . utstanding advances of the model-comput th e o One of technique is the possibility of rapidly testing a great variety ant tions um , p simulated air targets problems, using various ass O e i . p considering air attacks of varying magnitude and scop of c iet y mum air target systems can be developed for a var pe - cumstanCes as a result ? e capabilities problems and post-attack air target ae ffe t pr -1^11 d3V e) iems (a. and u. auo v sile sites, storage, supply, repair facilities, and industrial f5k 091 itin transportation installations which prove to be lim g -%a and inA o or bottlenecks in pre-attack mobilization enn k t k r p ac at o re-mounting of combat activities in the p -tac come the all 4als-. to actual hot lated problems would, of course, be applied problems. 4. Feasibility Testing The necessity for balancing the internal flows within the matrix of an input-output model make this type of model par- ticularly suitable for testing the internal consistency of either announced Soviet Bloc plans or of US intelligence estimates of Soviet Bloc military or economic growth patterns. For exam- ple, the internal consistency of either Soviet Bloc plans to mount military strength or US intelligence estimates of Soviet Bloc military growth plans can be tested. Estimates inde- pendently projected for various types of air combat strength can be tested one against the other in order to determine whether or not the total projected strength estimate is internal- ly consistent and whether or not such total strength can be sup- ported by the Soviet Bloc military structure. The economic grid can be used to check production estimates independently arrived at for various military end products to determine whether or not the production pattern so established is eco- nomically feasible. The transportation grid should be of great help in checking estimates of Soviet Bloc transportation pat- terns and capability. 5. Mobilization Indicators The military resources model can be used to establish indi- cators of mobilization build-up. By testing the model under various assumed mobilization conditions certain economic changes as well as changes within the military structure can be Identified as indicators of partial or complete mobilization. Specific changes in the use of resources can be identified as in- dicating specific types of mobilization. 6. Intelligence Collection Indicators In using the military resources model to solve a series of simulated air targets problems, certain areas of economic and military activity will be shown to be of critical significance to Ut capability of the Soviet Bloc to mount and maintain mili- tary strength. These critical sectors are those on which it is mwt Important to obtain accurate, current data for targeting purposes. Thus the priority list of air targets intelligence re- gWroments can be sharpened, and emphasis can be placed on U collection of certain key military and economic data. 7. Inputs for Operational Models The military resources model is to be used to translate any over-all military strategy into requirements upon the Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 economic-industrial, transportation, and military structure for the creation of military formations and military resource ele- ments together with the necessary military supporting activi- ties in both pre- and post-attack situations. Operational models such as the air battle model, currently being tested, serve to indicate these requirements in a realistic manner. The military resources model is designed to provide appropriate inputs for these operational models in the form of units of comp`, bat capability and to reflect the output of operational models in changing requirements upon the military structure. Thus the military resources model can define the maximum levels of combat activity possible within the limitations of the Bloc mill), tary and economic structure at any specified time. 8. Data Requirements The validity of problem solutions provided by the mili resources model is dependent upon the accuracy of the data inputs as well as the logic of the mathematical design of th model. Each of the component parts of the model - the ee nomic grid, the military grid, and the transportation grid has its own data requirements which must be initially asseinn bled and subsequently kept up to date. The economic grid contains a classification of economic ac tivity in the Soviet Bloc in the form of three submatrices o grids; the commodity input grid, the capital input grid, an the capital expansion grid. The data requirements of the co modity input grid or matrix consist of the commodity inpu per unit of production for each of the 240 sectors of the mat These sectors cover most of the commodities produced in Bloc. The data requirements of the capital input matrix c sist of the inputs of capital equipment and labor per unit production of each of these same commodities. The data l u quired by the capital expansion matrix consist of the co, modity and capital inputs necessary to increase available ca ital by one unit: The data described above are in the form technological coefficients which reflect the technological r, tionships currently operating as the economic restraints in desired mobilization or recuperation. by the Soviet Bloc. order to reflect fully the flexibility of the Soviet Bloc econ in meeting mobilization or wartime requirements the data puts must reflect not only production processes currentl; use but also the alternative processes which could be us SECRET 63 break bottlenecks, or stoppages resulting from air attack. Thus the economic grid requires the introduction of all practical alternate input coefficients in order to establish realistic tech- nological restraints. Because production technology changes with the passage of time, these coefficients must be continually scrutinized to insure that they reflect current technology. In addition, changes are necessitated in the classification of com- modities and capital equipment in the light of experience gained in using the model for various types of problems. Those economic sectors which prove to be the most sensitive to mobi- lization or recuperation demands may require a more detailed or disaggregated classification in the model, whereas less vital sectors may be further aggregated. . The running of a simulation on the economic model requires, in addition to the technological coefficients, data on the eco- nomic resources available to the Soviet Bloc for the time period being considered. Thus for each of the 240 commodity groups in the grid, current data on Bloc capacity, inventory, and for- eign trade must be assembled. The data requirements of the military grid of the model parallel those of the economic grid, but pertain to military activities rather than economic activities. As previously men- tioned, the output of the military grid, equivalent to commodity outputs in the economic grid, is in units of frontline activity, for example, flying hours of a specific type of bomber. For each such military activity data on inputs of other military activities as well as inputs of industrial commodities must be determined. In addition, for each unit of military activity the requirements of military capital aggregated in the form of "resource elements" such as airstrips, naval bases, and repair facilities must be determined together with the inputs neces- sary to expand a military "resource element" by one unit. As in the case of the economic grid, input data for alternative Processes of producing a unit of military activity must be Wembled and all coefficients in the grid must be kept in accord 11th the most modern logistical processes used by the Soviet We. In the running of simulations on the military grid, data pf total Soviet Bloc capacity, inventories, and possible incre- t to from foreign trade for each of the military activities in t11t+ grid Should be available for the time period under consid- tton. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 The introduction of transportation factors into. the military- resources model requires an analysis of the Soviet Bloc eco- nomic and military commodity flow structure in terms of geo- graphic regions, thus greatly increasing the data needs. For each region the types and amounts of transportation facilities available must be determined in order to establish the freight- handling capabilities of each region. For example, the analysig of the USSR railroad system, currently underway, requires for, each terminal, link, and region estimates of the terminal motive. power and freight-car handling capacities, rail-link capacities, and regional car-day requirements. In addition to these trans portation data requirements, the Soviet Bloc production and consumption pattern must be established by geographic region.' This task requires the identification of the types and amounts; of economic and military capital facilities, or "resource el ments," available in each region. In addition, the Soviet Bloc "bill of goods," or final demand for military and civilian goods; must be determined by geographic region. The regional con, sumption of goods for military, government, and civilian use as well as the regional consumption of construction materials an producer durables must be estimated. Only when all th data are introduced into the military resources model can th transportation restraints, or "bottlenecks" under specifi mobilization and recuperation conditions be identified. The data problem is formidable, but considerable progr has been made, and new sources of data are being found an exploited. The data requirements for the model-machine tec nique do not represent a marked change from the req ments of traditional methods of analysis. However, the rigo ous analysis made possible by this technique or method simpp; makes existing data deficiencies more apparent. Moreov this technique has the additional advantage of enabling analyst to identify those specific data requirements which,`.'. the most crucial in target analysis by subjecting the data, various types of sensitivity testing, e.g., the variation of co cients, and data aggregations. The model also offers a me, of testing the reliability of coefficients in the light of kno output patterns of past years. It is believed that these va i( testing techniques will contribute to a sharpening of the, ority list of intelligence collection requirements. The headshrinkers' literature is full of remarks about the efforts of mankind to avoid thinking. As a matter of fact, I rather imagine that a very small proportion of the brainpower of the most creative thinker alive is ever devoted to creative thought. In our society a fairly large proportion of this small amount of creative thought is devoted to finding ways to help mankind avoid thinking. Games, alcohol, tranquilizers, TV, and business routine can all be used to help an individual fill 24 hours a day without ever having a creative thought. We like cliches because they help us sound confident without thinking. This does not mean that the average man is idle. On the con- trary, he is probably a very active and useful citizen. As a matter of fact, idleness is generally abhorred because it leaves a vacuum that is an invitation to thought. You and I may be exceptions to this general pattern in some small degree, but I want the reader to recognize that if this taper contains one small original thought, it will be here only as a result of tremendous psychic effort spent in overcoming my own urge not to think, and that if this thought, in its turn, sUmulates any creative thinking in the mind of the reader, it 'will be only over the opposition of your shrewd and dogged sub- conscious which tries so hard to protect you from the rash act of thinking. having drafted this challenge to the reader's subconscious, I now propose that we think about some of the problems of in- telligence. (I almost said "look at some of the problems of in- klligence." This just goes to show you how my subconscious &bhors the sound of the word "think.") To pose the problems thrt I would like us to think about, I want first to go back into a little Intellectual history. Some of the readers will be much more familiar with the events that I am about to describe than 1 am, but here at least is my version. In the early days of the postwar intelligence effort, the at- ktiUon of the intelligence community was focused primarily 'twt the interpretation of surface phenomena. Some of the MORIIHRP PAGES 65-70 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 t issue were almost unbelievably naive. For ex- questions a ample, there was not complete agreement on the general nature of the Soviet Communist system, and there was a great deal of, i the discuss on __ ---and other p eo ple feeling that these were indigenous parties, _ iet annara.tlus. Dur +w S f ov t the th - y ..~-- r - a pie ieeiuir, standards ing this period there was no agreement concerning At one extreme it y. of analysis in the intelligence commun ents without re some people used biased and emotional argum eople eiaimP.1 p guru to system. . that local communist parties were not part of the ,Sovieet+ap her as paratus because C to settle the matter in a court of law. As time went by, how; to acce p ever, the intelligence community more and more came w r -e%nnmirc- gnni d ,?.. the standar ology, and so forth, and attempted to conform to academi ement on standards of thought tended to l V V agre Genera the major problems in intelligence into the realm of facts. iven situation should be interpreted d that a g as agree it w the use of the techniques of economics then the size of tl the situata i n gross national product of a country involved t having great bearin _____+ f ant ac Uilum intuuy on the final analysis of the situation. The intell~i~gen~c Ca munity, therefore, . ?? o estions of the fact were important issues. SO which major qu blood and sweat shed over the numbers f th e emember of us r Soviet planes produced, the size of the gross national prodti f the Chinese rah d the adequacy o of Communist China, an The list could continue ad infinitum. roads . The focusing of the intelligence community on major qi elop th e fie, tions of fact feu to for the establishment or verification of facts. Some of. th ouidb ' am, c I I; techniques, like the factory markings progi hou e erally understood and accepted' throug fiPir1.q involvii hove . -- - Even un this field, phisticated statistical techniques, acceptance of the new m q her techni lete Ot _ od was neither immediate nor comp -a YnPT4~ d analysis in political an aoc.w --~ their wake. At,, gasp g nit y the intelligence commu point, the intelligence community entered a stage which always be with us to some extent. It is the stage in which arguments about fact are caused by the technological gap be- tween the informed and the uninformed analyst. This is a gap that training and experience have narrowed considerably and which probably can be narrowed even further in the future, but it probably will exist to some degree as long as some parts of the intelligence community develop new methods and new ways of thinking and other parts of the intelligence community lag in knowledge and understanding. It is not necessarily a bad phenomenon. It at least means that somebody is out in front and doing some thinking. It keeps the other fellows on their toes. As a result of over 10 years of development, the intelligence community has now reached a high level of sophistication in the application of standard techniques of analysis to intelli- gence problems.' Subsidiary methods such as style of writing and the manner of presentation are excellent. The community seems to have learned how to produce very good answers to intelligence problems without generating an undue amount of Internal friction. All this is cause for considerable pride and satisfaction. As good as we may be, however, we are obviously not good enough. We have just seen a classic example of one of our major outstanding difficulties in the question of US policy to- ward the launching of the Soviet earth satellite. There was no failure of intelligence to report the facts relating to the Soviet satellite program well in advance of the event, and intelligence also pointed out that this event would be of distinct advantage to the Soviet Union in the field of political prestige. Intelli- gence had done the job our customers normally expect of us, and yet in a real sense, the US was caught napping. The US prepared a plan of what to do after the Soviets had launched a Jatellite, but we did not take any action or even decide to take any action before the event. In other words, our planners did fwt fully recognize the magnitude of the blow the Soviet taunching would give to our prestige. It would be very easy for us to sit back smugly and blame the unfortunate consequences On the policymakers, who were adequately informed in advance bnt Who did not take adequate action in advance. Could it be *At we have not yet established adequate confidence in our product in the minds of our consumers? Could it be that the Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 fault still lay with the intelligence community? Could it be that we have not yet devised the proper method of presentation which would permit us to say "damn it, we mean it!" If we are willing to recognize that it is possible for intelli- gence to "fail" even when it is shrewdly accurate and timely we might find further food for thought in looking at the pro lems that we are being shrewdly accurate and timely about: They tend to be problems that have a fairly immediate practical application. No one could object to our tackling such problems When one looks for analysis in depth or in terms of long-te trends, however, we find that it is generally lacking in our for mal publications. The bold analysis, the sharp intuition, th long step ahead, and the provocative ideas are generally foun in informal bull sessions; in "think" pieces that have no tru status; in the internal staff memoranda of ONE, OCI, and so on and in some of the briefs and background material used by th DDI on an ad hoc basis. They are almost never found in thi formal papers put forward by the community for the so guidance of our planners and policymakers. There are strong conservative influences in our present tem of producing intelligence which would tend to resist than in anything involving method and type of analysis, form presentation, and so on. Might we not be at a point of develo ment, however, where we need to make a quantum jump in conduct of intelligence? Is there any way in which intellige can learn to say better "we mean it," "these are the probl that may arise in consequence," "these are the decisions must be decided?" How can we extend our analysis in and depth beyond present dimensions and yet carry with us conservative elements in the intelligence community? There might be changes in organization or in the meth of presentation which might improve our impact on the fo lation and execution of national policy. These things sho be explored, but no such changes could create, by themsel, the change in the intellectual and visceral impact of in gence that we must aim for. The only sure way to con national affairs with greater wisdom is for the responsible organizational substitute for brains. Intelligence is an portant and integral part of the process by which we condo' our national affairs, and intelligence officers, therefore, ha SECRET 69 tremendous responsibility to apply themselves to new ways of thinking which will give us a more brilliant insight into the dynamic world and our constantly changing place in it. The real area in which we must seek improvement, there- fore, is in that related to analysis. Perhaps we must learn to pose a different kind of question to ourselves. Perhaps we need to learn to think on a different time scale. Perhaps we need to develop even more new methods of analysis. Perhaps we need to do some combination of all of these things, and many others as well. There are probably many different ideas that should be ex- amined. Here is a sample of the kind of thing that we might think about. Might it not useful for us to engage systemati- cally in backward analysis from hypothetical cases? For ex- ample, intelligence predicted the launching of the Soviet earth satellite and said that it would have unfortunate consequences. But let us suppose that several years ago we had posed the fol- lowing question: "What would be the impact on the policy situation of the US and on its prestige if the Soviet Union were to accomplish some technological breakthrough which would support a Soviet claim for Soviet supremacy in the field of sci- ence and technology?" If we had had this sort of analysis, it might have been possible for us to point out in a much more meaningful manner the way in which the Soviet missile pro- gram and the development of a Soviet earth satellite might place the Soviet Union in the favorable situation envisaged in our hypothetical analysis. We could pose other similar ques- ttons such as: "What will be the effect on the world political altuatlon when Soviet industrial production equals US indus- trial production?" "What would be the consequences if all of the 'third force' groups backed by the US came to power and 'right wing' parties disappeared?" "What would the world kink like after 20 years of disarmament and `peaceful coex- Utance?"' Analysis of these questions might put a vastly dif- terent light on intermediate developments leading toward the hypothetical situation we have posed for ourselves. There is undoubtedly room for improvement in our work, but Unfortunately as we get better and better, we have more and more justification for continuing to think and do exactly as re h*ae been thinking and doing. This is more and more justi- GtUtiort for not thinking creatively about improvement. We Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 70 SECRET know, however, that there will always remain an important challenge to us in intelligence as long as the US does no act to accommodate itself adequately to world developments What do you think that we should do about it? SECRET 71 ELINT A SCIENTIFIC INTELLIGENCE SYSTEM. Charles A. Kroger, Jr. During the initial phases of the Battle of Britain a German bomber, relatively safe under cover of darkness, flew over the blacked-out landscape heading for London. At a specific mo- ment the bomber dropped its bombs, which accurately hit their target, and another successful German Luftwaffe attack was history. Electronic advancements by the Germans made this possible. British interception and analysis of this new elec- tronic bombing device countered the Germans' success and continued to render less effective every subsequent electronic advantage the Germans. developed. In a parallel manner the Germans developed a highly effective electronic intelligence rdiort directed against the Allied raids originating from Britain. This phase of electronic intelligence, utilizing electronic means to determine enemy electronic capabilities, began in England just before World War II and has been an ever increasing effort which today is called ELINT. ELINT is a coined word for the process of electronic intercept and analysis or electronic intelligence - a process about which rrry little has been written. The intelligence officer, unless he Is In the electronics field himself, has had little contact with FLINT. By directive ELINT is defined as: "the collection (observation and recording), and the technical processing for later intelligence purposes, of information on foreign, non- communications, electromagnetic radiations emanating from Other than atomic detonation sources." In simple terms, LLINT is the detection and analysis of radiations from foreign *kctronic devices for the purpose of extracting information of talus to intelligence. Jtut as a flashlight radiates a beam of light observable to the human eye, electronic devices emit or radiate nonvisible, non- wdible radiations which are detectable and recordable, using Ikttronlc devices just as the human ear hears sound. This ptfon or collection of enemy radiations is the first stage '6 RUNT. lbe formal definition restricts ELINT to "noncommunica- Oft radiations other than atomic detonation MORIIHRP PAGES 71-83 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 sources" This means that ELINT is responsible for all radia- tions except those used in voice or other communications cCch a d those resulting from legraph an s radio or te hat other kind of radiations are there? To name a few with What missiles and mis f rom adiations which ELINT deals, there are r adiations from d r sile guidance devices,on el tronic devices tories and field testing stations working ' irc ra t g fir d cr a radar, navigational aids, antiaircraft an for later intelligence purposes" means in g ical process "Techn subjecting the collected ELINT raw data, u r1pi sual a 11 d y in the fso by of beeps on a mdr.ilr- u - equipment p ic euipment. This eq p p t x elec ron use of comple to see on an oscilloscope, to ith his ears , t to hear w the analys measure very accurately, to photograph, to compare with __---4--A ~imnai in as mano ti at g -- standards and to inves ways as are necessary to identify the characteristics of th nrnopSSlnP'" is complete foreign device. vv uric u- ass to the intelligence analyst d t can l p ys al ana the technic tailed information on the location and capabilities of the Pori The int o-- ---- eign device. this information with other knowledge to estimate the over- For a technical look at what ELINT really is let +usttuurn in a ht i ,v ew , t, -w - g magnetic energy, like l in length and form a spectrum. We are all familiar with 6 iinving ing n g l rainbow with ILS coors ra viola' millimicrons in length (400 million megacycles/sec); e meM (800 millio th leng with waves of 385 millimicrons in -4- nr +In dl his cycles sec). p -~ netic spectrum. The radio portion of this electromagne ,?no+innc and multi d ctrum is use spe , ...-._ weapons use radio wa y the militar tl y Curren weapons. varying from a few thousand cycles (waves per second) up, n waves per sewn' billi o ndred 100 kilomegacycles (one hu _ :4: of the radio di ng The following r all electromagnetic in the ove color spectrums e bands an expansion of the radio spectrum showing t di e. a different soviet electronic devices ra Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 For a specific example of how ELINT works, let us take a simplified look at Soviet radar. Soviet radar devices radiate electronic impulses at certain frequencies and in definite beams searching the sky for long distances and great altitudes for any object that may be present. When these impulses strike an object they bounce off and return to a ground or airborne re- ceiver which calculates the length of time between emission and reception and the strength of the signal received. From this, the Soviet radar operator can generally tell the size, speed, direction, altitude, and other pertinent information about the unseen object. Our Strategic Air Command, with its retalia- tory mission, urgently requires every possible bit of information on Soviet radars - particularly on their location and capa- bility. This is where ELINT goes to work. By, intercepting, amplifying, recording and analyzing an enemy radar signal or pulse, we can learn all about it. By studying the type of radi- ation, its modulation (AM, FM, pulse) its pulse repetition rate, pulse duration, pulse shape, its radio frequency (position on the electronic spectrum), its antenna pattern characteristics, and so on, we can identify the radar, compare it with known information, ascertain its range, location, use, and other essen- tial information required to evaluate its capability as a radar and its susceptibility to countermeasures. This same process of ELINT pertains to any and all enemy electronic devices including airborne intercept devices used by guided missiles, guided missile launchers, fighter aircraft, long- range and short-range navigational aids, ground controlled in- tercept height finders, anti-aircraft and aircraft fire control radar, blind bombing devices, electronic radiations emanating from scientific laboratories or production plants, and so on. What do these radiated signals sound like? Frankly they sound like noise or radio static during a thunder storm-in fact, before the more euphonious term of ELINT was coined, the British called it "Noise Listening" and, during World War II, had a "Noise Listening Bureau." Although ELINT is a very complex field - constantly looking beyond present knowledge of electronics to fulfill its role of pro- viding timely information on new foreign electronic develop- ments, it need not be pushed aside as too complicated to be understood. Because of its complexity, some members of the intelligence community are inclined to throw up their hands Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 and ignore this potential tool. However, FLINT is not too difficult to comprehend or use, nor is it an end in itself, but it can contribute essential, accurate information to the intelli- gence process. Scientific intelligence and, in particular, ELINT, or electronic intelligence, had its start in England immediately before World War II. Early in 1939 the British Committee for the Scientific Study of Air Defense first drew attention to Britain's ignorance of new German weapons. One scientist, Dr. R. V. Jones, was appointed to look into the matter. Before he even started his task the war broke out and in June 1940, Dr. Jones, after con- siderable study, concluded that the Germans had developed a radio beam by which their bombers could operate over England regardless of weather, darkness, or cloud cover and still be most accurate in their blind bombing. This beam, just a little more than one-half mile wide, passed directly over London. Based on Dr. Jones' conclusion, steps were immediately taken to find any possible countermeasures. A Royal Air Force search air- craft was outfitted and it accomplished its mission of looking for and detecting this German beam. Technical analysis of this information provided the radio frequency and other char- acteristics of the beam, thus permitting the British to jam it and render. it ineffective. Henceforth, many bombs intended for London fell harmlessly on the open countryside. This in- terception and analysis of an enemy electronic radiation (later known as Knicklbein) was the birth of present day ELINT. The Germans altered their beam system and soon began using a better system utilizing intersecting beams referred to as the "X" apparatus, which provided greater accuracy. These beams were at a different frequency than Kriicklbein, requiring new search and analysis before the British solved this new threat and took countermeasures. With the "X" apparatus, the bomber flew along an electronic beam while its position along the beam was observed from a German radar station on the continent. When the bomber was over the target, it was told to drop its bombs. By now Britain's ELINT capability of inter- cepting and analyzing this electronic information was quite effective and continued to grow in scope and importance throughout the war. During World War II the US made extensive use of electronic intercept devices in both the Pacific and European Theatres of SECRET 75 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET Operation. Special USAF and Navy planes equipped with ELINT receivers ferreted out the secrets of German and Jap- anese antiaircraft radar and aircraft warning devices. From the use of such planes the word "ferret" was coined, a term Presently applied to aircraft equipped to investigate enemy electronic radiations. Among the most deadly weapons di- rected against the Eighth Air Force were the German antiair- craft guns which were equipped with extremely accurate radar directors known as "Wurzbergs." The close formations of American aircraft made a juicy target for the more than 16,000 German antiaircraft guns. By use of radar intercept equip- ment (ELINT equipment) information was obtained which per- mitted the use of jamming devices, and thus the one-billion dollar investment of the Germans in their Wurzberg radars was literally ruined by the countermeasures made possible through ELINT. Knowing we had this capability, the Germans began a frantic search for non-jammable radar equipment, but the war was over before they succeeded. Following World War II there was a period in which interest in ELINT, as in many wartime activities, tapered off. Some effort continued but the real push to provide intelligence on electronic advancements in other countries was not initiated until the USSR clamped down its Iron Curtain. Since that time, the collection and analysis of electronic signals radiating behind the Curtain has been the constant goal of ELINT. Since the birth of ELINT in 1940 the effort has grown in size, cost. importance, complexity, coverage, and capability, and, like most scientific efforts, is making yesterday's limits, today's capabilities. Electronic intercept, to use one connotation of ELINT, pro- vides factual information. Unlike the collection of much in- telligence information where we are forced to rely on word of mouth, memory, or integrity of source, electronic radiations are intercepted and recorded by machine. If a signal is being radi- ated it can be recorded and later reported accurately even by someone who doesn't understand all that he is doing. Because of this factual nature, ELINT has provided substantiation of many intelligence estimates based on other intelligence processes. During World War II, Air Force B-24 aircraft and radar- equipped Navy Catalina aircraft were assigned the job of locat- ing enemy radar in the Pacific. They spotted and pinpointed Japanese air warning sets scattered all the way from the Solo- mons to the China coast. A few days before the Leyte landing in October 1944 one of the ferrets discovered a new Japanese radar on Suluan Island at the mouth of the Leyte gulf. As this radar commanded the approaches to the Leyte coast line it was necessary to eliminate it and this was done on a com- mando raid by the US Rangers. Currently, ELINT is providing the Strategic Air Command with the intelligence it requires on the location and range of Soviet radar. Through ELINT, information is acquired on the method, capability, and limitations of Soviet long-range navi- gation systems upon which their atomic bombers rely. Soviet missile tests are monitored by ELINT and the point may soon be reached where, by interception and analysis of the telemeter- ing signal from Soviet missiles, we will acquire missile per- formance data vital to our National Intelligence Estimates. (Telemetering is the electronic system used in missile testing which records, codes, and transmits to ground test stations such things as missile speed, flight path, guidance, skin tempera- tures, and other behavior characteristics of the missile in flight.) Since early in World War II the Army, Navy, and Air Force each have expended varying degrees of effort on ELINT, and in 1952 the Central Intelligence Agency entered the ELINT field. Although much of this individual endeavor was valuable, in 1954 better organization was given to ELINT -organization on a national level. The lack of proper dissemination of val- uable intelligence produced by one organization but not always readily available to the others in the community was noted as a serious problem. When this situation came to the attention of the National Security Council a study was made, and National Security Council intelligence Directive No. 17, entitled Elec- tronic Intelligence (ELINT) was issued (in May 1955). NSCID-17 established the first national policy for ELINT and it is still the basic authority for the national ELINT program. It directed that: a. The US Communications Intelligence Board (USCIB) shall be the national policy body for ELINT. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET b. The Department of Defense and the Central In- telligence Agency shall be responsible for their respec- tive ELINT collection activities. c. The technical processing of all ELINT shall be accomplished in a jointly-staffed center administered by the Department of Defense. d. All data collected by the collection agencies shall be made available to the National Technical Process- ing Center (NTPC). e. The NTPC shall effect the fullest and most expe- ditious processing possible and furnish the results to the interested agencies. The present national organization for ELINT is rather com- plex, with many interlocking organizations and many formal and informal coordinating committees. The important con- sideration is that each of the services and CIA is free to run its own collection operations designed to furnish information it alone requires, but is expected to submit all collected data to the NTPC subject only to the minimum delays necessitated by prior exploitation for urgent tactical or operational purposes. One can immediately see the strong vertical organization for ELINT within each major component. It should also be appre- ciated that much horizontal collaboration is being accom- plished by joint participation in such organizations as the NTPC and AFOIN-Z in an effort to coordinate individual activi- ties into a national ELINT program. In October 1953 a study was made of ELINT in CIA. This resulted in the appointment of an Agency ELINT staff officer and in the preparation of an Agency ELINT program which the Director of Central Intelligence approved on 29 May 1954. Within the Agency ELINT is organized generally as follows. The Office of Scientific Intelligence develops targets and requirements for ELINT collection, furnishes scientific and technical guidance to Agency collectors, and performs the tech- nical analysis and collation of ELINT with all source material in the production of scientific intelligence. The Clandestine Services conducts a continuing review of the potential and capabilities for covert ELINT collection, implements specific clandestine activity in response to approved ELINT require- ments, and coordinates US ELINT clandestine activities with foreign governments. The Office of Communications arranges for research, development, and procurement of ELINT equip- ment as required to support clandestine ELINT collection. The CIA ELINT Staff Officer advises the Deputy Director of Central Intelligence and appropriate operating components on the formulation, implementation, and coordination of ELINT plans, policies, and programs. On the national level, much work has gone into summarizing what each organization requires in the way of information on enemy electronic developments. This sizeable task has re- sulted in a formal statement of the currently definable Specific ELINT Collection Requirements (SPECOR). This collection guide is based on the priority of the National Intelligence Ob- jectives. It has been disseminated throughout the services and CIA field units for guidance as to what information the intelli- gence community requires and in what priority. To realize the need for an adequate requirements system, consider that the ideal ELINT system is one capable of collect- ing all s bgnals of interest and extracting all of the useful infor- mation from each signal. This is neither possible nor prac- ticable, however. The questions of just what signals are of interest and just what information about them is needed must be answered in the light of the gaps in our intelligence. Thus, as in other branches of technical intelligence, ELINT is faced with the problem of relating scientific techniques to intelli- gence problems. In general, ELINT targets fall into two major categories. The Army, Navy, and Air Force, charged with the military de- fense of our country, are primarily concerned with the location and capability of all enemy radar on a current basis. This is referred to as the Radar Order of Battle (ROB). The Air Force, for instance, must know where the heavy concentrations of enemy radar are so that its planes can either skirt the area or take proper countermeasures. The largest portion of inter- cepted enemy electronic information falls into this category of maintaining an adequate radar order of battle. CIA, on the other hand, is primarily interested in scientific break-through, or in not being surprised by new enemy electronic develop- Approved For Release 2005/03/15 : CIA-RDP78TO3194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 ments. This means that most ELINT effort is directed toward the interception and analysis of new and unusual electronic signals. Naturally in the course of searching for new and un- usual signals, much order of battle information is received. This serves, in addition to supplementing the services opera- tions, as a basis of comparison to determine what is new and unusual. The ELINT objectives of first priority to CIA relate to those signals which have yet to be intercepted or for which the radiating source has yet to be seen. Specifically, the targets are as follows: a. Those non-communication signals which are, or are suspected to be, associated with the Soviet or Satellite ability to deliver atomic or other weapons of destruction - that is, guidance or telemetry signals associated with missiles, airborne navigation, and bombing systems. b. Those non-communication signals which are or are suspected to be associated with the Soviet or Satel- lite ability to defend their countries against the deliv- ery of atomic or other weapons of destruction -that is, early warning, ground-control intercept, gap-filling radars, surface-to-air weapons systems, airborne weap- ons systems, ground surveillance systems, jammers, and so forth. c. Those signals occupying an unusual portion of the radio frequency spectrum not normally associated with Soviet or Satellite equipment. The equipment involved in ELINT is elaborate and com- plex. To make matters worse, the higher up the frequency spectrum you go the shorter your intercept range becomes, and the present trend toward higher frequencies means that ELINT equipment must get closer to the target or be designed with greater ranges, both of which approach the impossible. ELINT equipment falls into two main catagories: collection equipment (airborne, maritime, fixed station, or agent-carried) and analysis equipment (used on the ground to reproduce, readout, and analyze the collected information). Basically, the major components of an ELINT collection system are the antenna, receiver, recorder, direction finder, and analyzer. The antenna corresponds to the human ear. It is that com- ponent which first detects a signal. It is, of course, desirable that the antenna be very sensitive or, as we say in ELINT, have high antenna gain. This permits the maximum intercept range. The ideal antenna system would have the following characteristics: a. a continuous and fixed broad area coverage, b. very broad electronic spectrum coverage, c. very high gain, d. inherent capability for giving directional in- formation. These requirements are not all compatible. In practice it is necessary to compromise in order to gain a workable system. The decision as to which of the desirable characteristics can be safely compromised, and to what extent, is based on the fre- quency range of interest and also on the specific ELINT target under consideration. For instance, broad area coverage may be obtained by either of two means - a broad beam antenna fixed in space or a narrow beam, scanning antenna. The first method demands a sacrifice in gain. The second limits the time coverage of any part of the total area. Following receipt of the signal by the antenna it is passed to a receiver. The function of the receiver is to convert trans- mitted information available at the antenna into a form that can be measured and recorded. Basically two general types of receivers are in use today - the superheterodyne and the crystal video. The operating characteristics of each receiver may be outlined as follows: Superheterodyne - slow scan. a. inherently high sensitivity, b. good frequency resolution, Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET c. prohibitively long search time in many cases. Crystal video -wide open. a. low sensitivity reducing maximum probable range, b. frequency resolution problems, c. search time considerably less than the super- heterodyne. From the receiver the signal goes next to the recorder where the.0"al is c,+_-3 ___ _ .. . on main reasons for recording signals.^rA permanent record of the' signal is required for future analysis and for records, and on signals of h s ort duration or higher complexity the operator may not have enough time or capability to evaluate the signal parameters before the transmission is ended. Direction-finding equipment is sometimes utilized during the interception of the signal. It displays incoming signals on an oscilloscope or other azimuth-reading device giving the direc- tion of the arrival of the signal. Analyzers in the ELINT collection system are sometimes used during interception to provide a preliminary observation of the type of modulation and to measure the repetition rate, dura- tion, and general shape of signal pulses. Signals are usually presented by a cathode ray tube (similar to a television screen), which provides a moving picture of the shape, size, and nature of the incoming signal pulse or wave form. The pictures are usually photographed as a permanent record. It should be pointed out that ELINT collection devices need not be huge in size, as are those used in ground, sea, and some airborne operations. Quite to the contrary, considerable use is made of miniature equipment no larger than a book. ELINT collection equipment is usually designed for the specific situation in- volved, whether it be a 60-foot parabolic antenna on the ground or a tiny, unassuming, hand-carried package. The major components of an ELINT analysis system vary greatly with the purpose of the analysis. Order-of-battle analysis is often done automatically by IBM-type equipment. The analysis that CIA performs is not for order of battle but is to identify new and unusual signals. For this, man-operated equipment is required and an analysis position contains at least . rAPE IRON RECONOEP ATION ON SEW.- PECTRON ND SPACENEET- SIGNS EIGN REAN.IOTN D ROTATION AND/OR NOD E the following fundamental equipment: a tape transport used for duplicating or monitoring; a counter that measures and illustrates the modulation frequency; an ink-on-paper recorder to draw a continuous trace of the signal amplitude; an oscil- loscope, which permits observation of the wave form; a vibra- lizer to display modulation frequency components versus time; filters to separate signals; a rapid-advance movie camera; and a host of other equipment to permit the analyst to scan great volumes of tape and film to separate that minute portion which, upon detailed analysis, may prove to be a new electronic devel- opment. It is hoped that this basic discussion of ELINT will provide a general concept of this complex scientific intelligence process. It should be realized that in the interest of readability many points have been simplified and technical details omitted so as not to confuse the non-technical reader. If one considers that one-third of the cost of a modern fighter aircraft goes for electronic equipment and that most of the electronic devices which make up this equipment radiate sig- nals, then one begins to understand how much there is to learn of Soviet capabilities by examining their use of electronics. This also applies to ground and sea weapons, including missiles. Recent news reports of Soviet developments in the scientific field demonstrate how heavily the Russians are relying on elec- tronics and how advanced their development is. The Soviet earth satellites with their radiated signals are a responsibility of ELINT. ELINT must continue to intercept and to analyze Soviet electromagnetic emissions preferably in the research and development stages in order to keep abreast of Soviet electronic advancements and to attempt to predict future capabilities. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approv 'or Release 2005/03/15: CIA-M30fi Th 000100020001-2 85 REPORT ON HUNGARIAN REFUGEES Guy E. Coriden The Hungarian Revolution of October 1956 provided an un- precedented opportunity for the collection of intelligence on a Soviet Bloc country. Each of the many facets of intelligence activity played its role. Every known Free World and Bloc intelligence organization was involved. Every Hungarian refugee who could toddle was a potential target for an intelli- gence-minded group. It is obviously impossible, therefore, to claim with good conscience to tell the "intelligence story" of the Hungarian Revolution. It is also impossible to get the many participants to agree on which of the many efforts was the most fruitful. This, then, will be the account of one activity - the collection of the intelligence information and material from the Hungarians who were admitted to the US. Other operations will be mentioned only as they are considered ix-rtinent. Because the opportunity was unique, certain adap- tations in intelligence collection methods were required to take lull advantage of it. The object was to extract the maximum anwunt of intelligence at a minimum cost while still. abiding by decent rules of human conduct. As the methods used were lit-cessarily determined by the processing and resettlement pro- erdcurs as well as by the official US Government attitude to- ward intelligence exploitation, it might be well to begin with a brief historical background. 'I'hc story of the revolution has been told many times, prob- ably best by the UN in its massive report. The outbreak took place on 23 October 1956, and in the months following, it is ratlrnated that 188,000 Hungarians found refuge in Austria and 18.000 in Yugoslavia. As of 1 September 1957, approximately 35.000 of these refugees had accepted asylum in the US. In early November 1956, when it became apparent that a num"ive influx of Hungarians was going to have to be resettled, It wu4 decided that Camp Kilmer, New Jersey, would be the prOcessing center for all of the refugees. Because the iinstalla- lton was an Army camp, the Army was charged with the initial Iftlxonsibility for coordinating the resettlement effort and pro- tiding all of the housekeeping services. On 12 December 1956, MORI/HRP PAGES CONFIDENTIAL 85-93 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL CONFIDENTIAL 87 however, the President appointed a civilian Committee for. Tracey F. Voorhees. This Committee has coordinated all activ-' utilized the services of more than 20 volunteer and govern- mon4.,1 ., .. November 1956 until early May 1957, when Camp Kilmer was' Military Sea Transport Service (MSTS)~ocean voyages, and 133 fli ghts chartered by the Intergovernmental Committee for, and Naturalization and the Public Health Service performed the functions necessary for admitting aliens to the US, and various charitable-religious agencies arranged for most of the resettlements. Part of the job of fitting the individual's skills' to available employment opportunities was performed by the, The processing and resettlement was handled with an amazing, degree of efficiency, and the sympathetic attitude of the Amen-. can peo le was s t i p o sus a ned that by early May it was possible to close Camp Kilmer. About 32,000 of the refugees had been dispersed to various parts of the country, and those remaining Lest the cursory nature of this account convey they idea that this was a simple and smooth process, remember that the operation involved the complete transplanting to the US of a large number of participants in a violent revolution who h d a lost most of their possessions and who had little or no knowl- edge of the English language. Only 6,500 of these could come' under any available immigration quota. The rest were ad- mitted under the Attorney General's discretionary authority, and the rules were established and changed several times. Indeed, methods and procedures were developed, abandoned, and reinstituted many times in the early days of the operation. Also the prevailing attitudes, both official and public, changed appreciably over the months. In the early days the primary concern was to provide a humanitarian welcome for the vic- timized Hungarian people. Every effort was made to avoid 1;A incidents which might cause unfavorable comment. This atti- tude was motivated by a genuine sympathy and admiration for the Hungarians and a determination to take full advantage of CONFIDENTIAL the propaganda opportunity against the Soviet Bloc. As the spotlight of international interest turned elsewhere, concern for internal security and the collection of material bearing on motivations came to the fore. A few statistics may help to give some idea of the scope of both the intelligence collection problem and the opportunities. Hungary is a nation with a population roughly equal to that of Pennsylvania and a land area just slightly smaller than that of Indiana. About 65 percent of the population was consid- ered to be rural, and 16 percent was concentrated in Budapest and its environs. The 188,000 people who fled the country during the great exodus represented about 2 percent of the population. No age distribution is readily available for pre- revolutionary Hungary, but 83 percent of the refugees received into the US were under 40 years of age, and approximately 64 percent of them were males. This is certainly not a typical slice from an old country in a near postwar period. Also despite the fact that Hungary is predominately rural, less than 1 percent of the group coming to the US admitted to being engaged in agricultural enterprises. This is probably easily explained on two counts: first, the land owners, even collective farmers, are less likely to leave than the landless; and second, those of rural background, faced with new opportunities and feeling that they have little prospect of owning land in the new country, are likely to follow the prevailing trend toward city occupations, even to the extent of falsifying their background statements. Another survey of the refugees who were over 16 years of age (excluding housewives) revealed that the average education of the group coming to the US was almost 10 years. The fact that the refugees were young, well educated, male, and engaged primarily in nonagricultural enterprises is a happy one when we think of the group both as a national asset and as a positive foreign intelligence target. The addi- tional fact that this predominately urban group formed about 1 percent of the total population of a small agricultural country should mean that not only every trade and industry but every major enterprise should be represented by a delegate in the US group. It is well recognized that a certain number of the Hun- garians probably succumbed to the human tendency to exag- gerate and alter their backgrounds, but it is believed that the distortion is not significant for our purposes. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL In November 1956 the intelligence community faced the pro lem of exploiting the Hungarians without the benefit of even: the crude statistics presented in this article. The known fac were that tens of thousands of Hungarians were crossing th border to seek refuge in the Free World. Some were sincere patriots who had jeopardized their lives for their country in., the revolution; some were opportunists seeking economic betterment; and some were intelligence agents with missions, to collect intelligence, to establish nets or to report on they activities of Hungarians in the first two categories. Austria found its border area inundated with the Hungarians an could not screen them thoroughly with the resources at its dis-,,, posal. At the same time the Austrian government did note .7' wish to provoke the Soviet Union by allowing other Western nations to set up obvious intelligence procedures as a first step in the resettlement process. A number of the refugees were willing and even anxious to impart information of value to the Western powers, both for patriotic reasons and in order to secure more favorable treatment. The more enterprising of these found their way to one or another of the overt US or UK, missions operating in Austria. Reports coming back from these missions were the first indications of the high caliber, intelligence-wise, of the refugee horde. It was impossible to begin the problem of cataloguing the intelligence assets in Austria, so the next best thing seemed to be an attack on the same problem in the US. The NSCID #7 Committee has the. responsibility for domestic exploitation. It was now faced with . the problem of exploiting a large, but indefinite number of sources without any prospect of additional manpower to meet the vastly increased workload. In casting about for a solution to such an undertaking, the training cadre of the Armed Services Prisoner Intelligence Com- mittee (ASPIC) seemed best fitted for the mission in terms of qualifications and availability. This was an Army-Navy-Air Force-CIA unit which, in time of war, could be expanded to deal with certain aspects of the prisoner interrogation problem. At the time of the Hungarian eruption it consisted of a group of intelligence language experts furnished by the Army and Air Force as a basic cadre. Under the auspices of the NSCID #7 committee, advanced units of ASPIC were sent to Camp Kilmer in December to establish a process for assessing the intelligence CONFIDENTIAL Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL value of the refugees, in preparation for a full exploitation. At this time the prevailing sentiment among those responsible for ,'Operation Mercy" was a desire to extend undiluted Western hospitality to the Hungarians. At this early stage there was an attitude of mild horror toward any intelligence activity. The advanced unit found it necessary, therefore, to act under a cover - the Historical and Statistical Survey Team (HSS). The activity of the unit was restricted to obtaining background information on the individual Hungarians and collecting such documents and possessions as could be pried loose without cre- .ating a furor. Through its own efforts and with the coopera- tion of the authorities who were processing the Hungarians, HSS was given ready access to the information which was avail- able to all processing authorities. This information generally consisted of name, place of birth, former occupation, military service, and, in some cases, education and language capabil- ities. Because of language difficulties and a normal human desire to describe one's background in the best light, the educa- tion and occupation data were of limited value. With the per- mission of the authorities a certain number of the refugees were selected for extended interviews. Here again the prevail- ing sentiment toward humanitarianism, the complications of processing the many homeless, confused people in a humane and overt way presented an amazing number of difficulties for the surveying teams. Refugees were difficult to locate, suspi- cious, or overly garrulous. The intelligence operation was at the low end of the priority scale at the camp. There was incle- ment weather, a complicated system of drawing meal tickets, and the usual spate of unsettling rumors. Methods were de- veloped by HSS on one day, altered the next, and discarded on the third day - all in response to the changing conditions and reactions. On the basis of the original inadequate informa- tion, about 6,000 refugees were selected for their intelligence potential and were asked to submit to an initial interview. Of these, about 3,600 complied with the request, and slightly more than 2,000 proved to have sufficient potential to justify record- ing a Preliminary Interrogation Report (PIR). These ranged from scientists or ministerial officials with detailed knowledge of intra-Bloc operations to private soldiers with knowledge of troop and supply locations in one limited area. CONFIDENTIAL Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL CONFIDENTIAL , 91 After it became apparent that the refugee flow was no longe the primary news topic in the count it r Y, was decided that ar effort would be made to c arry collection effort at Cam on a more intensive intelligenc Kil p mer. This decision was based OA the fact that an refugees before operation carried on there would catch the they became involved in the i ' roblems of ad' ng to living conditions in their n o Just ew envir entail much smaller cost to the US i ce ser i es W ntelligen v c ye fact that an individual's memory of a situation does not ' prove with the passage of time wa l s a so ar decision, Primary factor in this There was, of course, much th securing full ought given to the method cooperation of for th e refugees within the framework of the humanitarian effort. The refugees were usually { and eager to impart all possible inform ti a on. The ommon common sense things were generally mo t s efficacious in cooperation. An interviewer competent in the refugee's fjeldJ generally established satisfactor y rapport rapidly. Cordialicreature comforts, and a symbol f U "i o S Government oificialdom'il . For instance, invitations car were looking helpful stamp secured far bett large t er results han those merely stating that the US desired that the refugee report to a par- ticular building. The air of uncertainty fwas also The refugees who were contacted soo n to work with than a those who w ere around long enough to learn that they were safe and could extract favors in return for serv- ices or information. When the refugee reached his destination and was integrated in a com munity, protective relatives and friends frequently became a barrier or encouraged a suspicious attitude. Simply stated, the refugee, like a bewildered child in an unfamiliar situation, responds best to a friendly, solid person who understands him. As he becomes wise to the way of the new world these psychological factors favoring coopera tion disappear. Then each case takes on more individuality and the treatment which has placed the refugee in this specific situation is the important thing to look into for any needed !ever to cooperation. It was decided that to take advantage of the situation the intensive intelligence exploitations should be carried out by a second interagency group with the cover name of US Sociolog- ical and Technical Research Unit (USSTRU). This unit was CONFIDENTIAL activated on 10 January 1957. While maintaining some sem- blance of separate operations, HSS and USSTRU cooperated fully; and when conditions permitted, sources were shuttled from one to the other. About ninety different individuals from CIA, comparable numbers from the Army and the Air Force, and a few from Navy and State participated in the USSTRU operation. No large portion of the group was there at any one time - the ceiling at the peak of the operations was about 60 persons from all participating agencies. Because in the case of USSTRU the most effective collection could be done by analysts and intelligence officers having knowledge of the particular areas covered and gaps to be filled, specialists from all parts of the intelligence community were rotated to Camp Kilmer for time periods varying from a few days to sever- al weeks. Members of both intelligence units operated with a degree of dedication comparable to that shown by the people engaged in the processing and settling of Hungarians. For most of the period the work week consisted of seven 12- to 14- hour days. Although the constant flow of experts through the intelli- gence operating units provided the best qualified interviewers, they also created continuing problems. The light cover re- quired a certain degree of caution which was difficult to main- tain under the circumstances. This mass participation meth- od, however, had the added advantage of acquainting the whole intelligence community with the potential of the Hungarian refugees and the problems involved in exploiting this potential. Many of the large number of analysts involved were given their first experience in interviewing a source through the use of an interpreter and in reporting on information in which they were not expert. We have introduced the problem of interpreters, and this might be the place to say that early in the game two language factors came to light: (a) the intelligence community probably has fewer language specialists in Hungarian than in any other but the most exotic Eastern and Near Eastern lan- guages, and (b) the Hungarians have a lower coefficient of sec- ond-language competence than any other civilized population except Americans. The shortage of competent Hungarian translators was a limiting factor in the size of the operation throughout its existence. Those who did come forward were used for long periods of time and were released only with great Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL CONFIDENTIAL reluctance. Des it p e this s serious handicap, inception to its demise 1 May, USSTRU, produced about 1,5QOrint reports Hence menu with covering all fields of interest . a ccom of docu possible f and nd other articles ? uture operational Usefuln b~ __ ee i p n for the Hungari by CIA, under its responsibility for ans was undertaken the exploitation sources in the US. Because man he of all Priva available fo y of the sources r any sort of an sources were not their interviews shortened interview at the camp, many had' because qualified experts resettlement opportunities ati, nd" et was were not available in all fields at sot necessary to compile full 2af hat th records on the sour ey might be located at a later date confusion i h . n erently attending the whole pro Because of the compiling the records involved scoop- Of gram the job of opaper not only from the ing up all available piles from all of the a intelligence components but also agencies gram participatin i T t g . n he resettlement pro- hen followed many hours of c mg, discarding and recordi ?~ng J ng, sort. requestin the gaps. The resulting compilation pof of great data use o ?Y to all components of the ' proved not ;A on a n intelligen ce umber of occasions, to other but, also utilizing these records and its complete Govern me ldt foagencies. rce, supple mented by Aii Force and Army units, 3,000 reports Icy 1 September and has CIA more t come. This part of the collection operation faced many y Of the e. This encountered at Camp Kilmer, with som w edc~~ e ne Ones dd Principal among these was the fact that the finding themselves free to move about Harians, locations with amazing frequency as they pleased, changed ing in many cases to tom and rapidity without bother- comply with th re i qu re that aliens register e US regulations which changes of address with the Bureau of Immigration and Naturalization_ the disillusioning experience of tracin Many field collectors had believed to have potential for ving a Hungarian refugee only to find after knocking Considerably overstated his experience and qualifications. The total result of the effort seemed whelming majority of the gaps in intelli n that the over- prerevolutionary Hungary were filled. When the Con analysts are able to collate and digest the mountain of ~ignfore O C NFIDENTIAL oration resulting from the program, the records and facilities available should enable the collectors to fill all but a minuscule number of gaps. In addition the many intelligence officers who participated in the interviewing gained not only experience in the techniques involved but also a certain area familiarity. It would be impossible for an interested, informed person to talk to about forty or fifty Hungarians from all walks of life for a total of about 200 hours without acquiring a useful knowl- edge of the country and the people. When you add the thou- sands of reports and items to the training and area familiariza- tion and divide it by the cost (Army food and quarters were provided, and no additional personnel were hired) you find that the intelligence community has made a bargain purchase. The Hungarian exploitation effort, American domestic style, will be a source of example and anecdote for some time to come. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For R 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET 95 PAPER MILLS AND FABRICATION Stephen M. Arness The paper mill and fabrication problem has appeared in many forms including outright fabrication, the sale of pseudo- intelligence, false confirmation, and multiple distribution of both valid and false information, as well as organized decep- tion. by foreign governments. US intelligence agencies as well as all Free World intelligence agencies have been flooded with such information. It was esti- mated in 1952 that more than half of all the material received on several countries of greatest intelligence interest fell into these categories. US estimates were thus endangered and American intelligence efforts have been needlessly dissipated. Multiple dissemination by paper mills operated by exiles from the Soviet Bloc cuts particularly deeply into the professional manpower resources of all agencies. Working independently of each other, American intelligence agencies were slow in de- veloping a mechanism for benefiting methodically from their common experience in order to remedy this situation. Paper mills are defined as intelligence sources whose chief aim is the maximum dissemination of their product. Their purpose is usually to promote special emigre-political causes while incidentally financing emigre-political organizations. The information thus conveyed consists of a mixture of valid information, overt material, propaganda, and fabrication. Its bulk, form, and obscure origin frequently preclude successful analysis and evaluation. Fabricators are individuals or groups who, without genuine agent resources, invent their information or inflate it on the basis of overt news for personal gain or a political purpose. The line between the two categories, in many cases, is diffi- cult to draw. Competent fabrication has defied recognition on the part of analysts and evaluators. Well-planned deception or provoca- tion is apt to prove undetectable by analytical processes. It cannot be assumed, therefore, that more than a fraction of the number of actually existing cases in these categories have been identified. The established professional competence of the SECRET MORI/HRP PAGES 95-102 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Soviet intelligence services coupled with their known r pation with deception aprovocation - "disinformatione ti forcibly deception and n ;! or, as p c it, Mills and fabricators represent) to he USaintellig they intelligence c term eom-r munity. This essay is primarily intended to call attention to the nature of this danger and to suggest the necessity of remedial action which may in time make the deception weapon less? effective in the hands of the adversary and reduce his oppor- tunity for employing it. US intelligence-gathering agencies have spared neither Power power nor funds to close the gap man- requirements and their knowledge of the SoetiBloc orGmraotips of exiles from all target coun ____ 4-1.:- . . tries reco ni t g ze ha personal advantage. Their i t l t v al n e ligence represen at s well aware of the multiplicit ve were f y o accepting American agencies uncritically all information offered a d , n even outbidding another for intelligence sources Moreover, their own exp ence often proved to them that A. e ri- m i er can agencies did not fully coordinate their efforts, nor effectively c fraud. ooperate to expose Satellite politicians in exile knew that they could not return to power in their homelands Western except in the wake of war and victory. The liberal by Western monetary remuneration offered agenci es for information from behind the Iron Curtain offered ffered them a ready-made opportunity to remain alive and to preserve a Political organization b Ong alleged intelligence. Careful operational analysis d m- onstrated that few, if any, emigre organizations had valid and unique intelligence assets; they lacked primarily the technical communications and documentation facilities for continuous contact with the homeland. Despite this, the unfortunate fiction persisted that such organizations had undefined special means of obtaining intelligence. In many cases exile leaders neither understood nor respected the basic preiiiise of TT o Policy theacked. "S Policy not to engage in war unless att Their "intelligence" production, true, embroidered, or false, was inevitably used to influence US policy in the direc- tion of hostility to the Soviet Bloc and to satisfy the ambitions of political pressure groups. SECRET To state the obvious: each exile group, as each sovereign country, used the weapons at its command in its self-interest, enlightened or otherwise. Emigre groups considered intelli- gence production a weapon to be so used. Yet the record of US dealings with them shows that in case after case it ignored the fact that the satisfaction of US intelligence needs was clearly secondary to their own political interests. One effect of the cry-wolf policy on the part of the emigres and the recognition of their efforts to mislead is that one of their reports may be ignored. Immediately after the war, several exile groups had man- power assets behind the Iron Curtain. Hasty, uncoordinated, and totally insecure operational use of these assets by both emigre groups and Free World intelligence agencies permitted the Communist security services to identify and destroy or to use them. Initial failure in the West to recognize the ruth- lessness and efficacy of the Soviet-type police state contributed to this process which, generally speaking, was completed by 1950. In view of this, it became apparent that nothing could be achieved by further uncontrolled subsidies to exile groups. Assertion of operational control by US intelligence officers through financial or other means, it could be expected, would normally be resented and sabotaged by such groups as it would strike at the roots of their political purposes. Generally, it was found advisable not to deal exclusively with the political leadership, but to take advantage of dissidence within the groups and to make it plain that intelligence production on our terms was valued more highly than the leaders' political coop- eration. The leaders, finding personal control of their groups effectively endangered, then were apt to come to terms. This strategy was followed increasingly in those operations involving Satellite exile groups with which CIA had contact. However, unless all intelligence agencies also recognize these principles and effectively suppress extraneous, uncoordinated aid to these groups, the uncontrolled information-peddling pattern will certainly persist or recur. The fact that substantial funds for intelligence procurement have been available to numerous agencies may actually be a handicap. Exile groups and individual intelligence peddlers Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 SECRET 99 The Communist concept of intelligence operations, patterned on the Soviet model, embraces a much broader field than does the Anglo-American. Far from being limited to seeking infor- mation through clandestine operations, it includes within the scope of "state security" a great variety of tasks designed to maintain the Communist Party in power and suppress all op- position. This means that all activity which can be construed as even critical of the state becomes a priority intelligence tar- get. The Communist security services accordingly make every ef- fort to penetrate and control emigre movements abroad which may endanger their regime. This is not a difficult task. Emigre groups have operated openly in the West with little regard for security, and normally have admitted as members anyone who voices his anti-Communism strongly enough to be heard and who cannot be positively identified as a Communist agent. These two facts - that penetration and control of the opposi- tion abroad are among the most important Soviet and Satel- lite intelligence tasks, and that they are so easily accom- plished - lead to the assumption that emigre groups can keep only few secrets from the Soviet and Satellite governments, and that Soviet and Satellite agents may be high in the coun- cils of such organizations. There can be no reasonable doubt, furthermore, that Soviet and Satellite intelligence services have had the same easy access to the bulk of the emigre "intelligence" product as we do. It follows that Soviet intelligence analysts are apt to have a grasp of the extent of US information on the Soviet Bloc procured from such sources. They are thus able to base their deception planning on a thorough knowledge both of US intelligence pro- curement methods through exile groups and of much of the information in US hands against which deception is likely to be checked. The lengths to which the Soviet Government will go in keep- ing track of emigre activities can best be illustrated by an historic case. During the nineteen twenties and thirties, in France, Soviet Intelligence obtained control of the Ligne In- terieure, an "elite secret group" within the strongest Russian emigre organization of the day, the General Russian Military Union (ROVS). The Ligne Interieure had been designed by the ROVS for the centralization and political control of Rus- assume that cost is no object to US intelligence personnel. Innumerable instances are on record in which payment for; both good and bad information was wholly out of proportion to its true value. US financial liberality and competitive bidding among agencies has led to inflation in the intelligence; market. Quality intelligence is seldom to be found in pieces of paper upon which a peddler has placed a price tag. Virtually all outright fabrication cases can be attributed pri- marily to disregard for factors such as the following: a. Control of agents should include their direct financial dependence upon the intelligence officers handling them. b. Salaries of agents and sub-agents should be based upon sound estimates of actual living costs in indigenous terms, and exceed these only moderately. Excessive personal com- pensation, particularly when it is used to encourage volume , of production, is a common cause of padding and fabrication.: c. A portion of the agents' earnings should be withheld in. special blocked accounts until their services are satisfactorily completed. d. Unless the use of funds available to agents for opera- tional expenditures is closely controlled, security breaches or the purchase of embroidered and fabricated material will result. e. Subsidies to foreign intelligence services and groups must be carefully watched to prevent financing by them of recognized paper mill operators and fabricators. US intelligence agencies abroad have reacted in various ways to the problem of uncoordinated spending on intelligence pro- curement, provided they were aware of it. Local coordination on a varying scale has taken place spontaneously in some areas. In the past some CIA field stations, concentrating their avail- able manpower on procuring good information, paid no atten- tion to US competitors in the field; others treated the problem as one of counterespionage. For the most part, however, efforts have been made to establish the origin of all information from the area, regardless of the agency purchasing it. In some in-' stances the attendant waste of professional manpower overseas has been prodigious. It is estimated, for example, that one- third of CIA's intelligence officers in Austria were committed during June 1951 to the detection and neutralization of fabri- cators and paper mills. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 100 SECRET sian emigre groups, especially those of military usefulness., This aim naturally appealed to most White Russian emigres; however, since the Ligne Interieure was under Soviet control, it simultaneously served the purpose of making virtually the whole White Russian emigration subject to Soviet inspection;` and manipulation. In 1935 this Soviet control was exposed:;" when the head of the Ligne Interieure, the Soviet agent Gen- eral Skoblin, was discovered to have organized the kidnapping of General Yevgeni Miller, then head of the ROVS. His inten- tion had been to replace Miller with a Soviet-controlled substi- tute. In subsequent investigations the background of the So- viet conspiracy outlined above was uncovered in detail. These considerations should not lead to an automatic as- sumption that information received from emigre groups is planned Soviet deception or provocation. In most cases there is no substantial evidence that the originators of fabrication were, or are, agents of the Soviets, that the material has been supplied to them by Soviet intelligence, or that it constitutes Soviet deception. On the other hand, it is known that the Soviets are masters of deception and provocation and are will- ing to accept extraordinary sacrifices in terms of true informa- tion passed, in order to make deception stick at the proper mo- ment. This leads to the conclusion that the Soviets may be using the present to digest their information and to develop potential deception channels and materials, reserving decep- ' tion operations for moments and circumstances of their own :- choosing. The theory that analysts in Washington are in a position to detect deception or fabrication rests on the assumption that they have verified material at hand against which they can measure their reports. Under the pressure of the volume of invalid material they must process, with little verified "control" material to go by, evaluators must rely on their personal skill and instinct. Their judgment is thus increasingly subject to human error. On the whole, analysis alone, whether on a high or low level in US intelligence, has been unable to break fabrica- or deception cases except when the material lacked quality. tion Evaluators are handicapped not only by their ignorance of the operational circumstances under which the information is pro- cured, but by the amount of processing and re-processing to which it is subjected before it reaches them. Translations, SECRET 101 revisions, and summaries of spurious information frequently eliminate the flaws which might allow an analyst to detect a fraud in the original. It is the lesson of experience that fab- rication and multiple false confirmation can be detected only by the method of operational investigation of the source and transmission channels, combined with reports analysis. There can be no doubt that the Soviets are fully capable of planting information in our intelligence channels which has all the earmarks of being genuine. Only by careful scrutiny and cross-checking of the channels through which such deception material has been forwarded can the danger be reduced. Unfortunately the following doctrines, which are fallacious and detrimental to the US intelligence effort, are still wide- spread among intelligence personnel: a. That intelligence agents of all nationalities are entitled to keep secret from their US intelligence officers the iden- tities, antecedents, methods of operation, and means of access to information produced, of their subsources. b. That it is the mission of intelligence officers in the field to procure information without a determined attempt to ascertain its origin, leaving it to the experts in Washington to judge its validity. c. That overseas sources are in danger of compromise if identities are revealed to other agencies of the US Govern- ment which were established, trained, and equipped to pro- tect such information properly. The last mentioned concept fostered resistance among intel- ligence officers of various government agencies which prevented a long overdue exchange of information on fabricators and paper mills. As a result, an excessive amount of professional manpower had to be devoted to costly overseas investigation, where simple headquarters coordination of suspect sources would have revealed duplication or fraud. The steady concentration of US intelligence agencies on mili- tary targets in the Soviet Bloc, and the relatively small influx after 1946 of knowledgeable new sources, have tended to solidify the intelligence market. Since 1946, in many areas, agencies of the Government have been dealing with identical intelligence sources. This makes a systematic program of centralized reg- istration of sources both necessary and profitable. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Editor's Note The views developed in this paper were first expressed early 1952 when the menace to the intelligence community pre" sented by paper peddlers of various types was at its height. Since then steps taken under the authority of the IAC give; promise of achieving a coordinated solution to this problem by the US intelligence community. UNCLASSIFIED LOST ORDER, LOST CAUSE Millican, Robert M. Gelman, and Thomas A. Stanhope C Bogie The month of September North. began T South, having repeat- edly Civil War for edly proved its superiority on the field of battle, was demon- strating a spirit of resistance which boded at least an ultimate stalemate and the separation of the former United States into two rival nations. Before thebemonth September ended, the eventual defeat of the in August, Robert E. Lee had smashed and routed the Fed- eral under John Pope at the Second Batte of of hrnmentll leaving Henry a a legacy gacy hysteria to the appointed Federal general-in-chief in corn- W gallck, the recently app the suddenness mand of all army operations, was stunned by and magnitude of the defeat. Edwin M. Stanton, Secretary of War, was busy with nervous preparations for the fall of Wash- ington. To prevent arms and ammunition from falling into the hands of the enemy, he gave orders toship teape arsenalweto New York. In the War Department, important placed in bundles which could be carried by men on foot or on horseback. Gunboats were ordered to stand by on the Potomac River, and a steamer was held in readiness to evacuate Presi- dent Abraham Lincoln and his Cabinet. Other areas of the United States, although not under the guns of Lee's army, were no less apprehensive than the canr an In eastern Pennsylvania, Governor Andrew Gregg begged President Lincoln for a minimum of 80,000 troops to defend Philadelphia against the 120,000 to 190,000 rebels which he believed were being massed in Maryland for an invasion of Pennsylvania. In western Pennsylvania, there were fears that Braxton Bragg somehow was going to take his western Con- across impassable mountains to join with Lee. federate army In Maryland, where inemories of the April 1861 riots in Balti- more against Federal soldiers were still Clear d bitter, there was widespread apprehension of a rebel uprising the loss of the state and the isolation of Washington. 1important places in the eastern united States mentioned in the text are shown on the accompanping map. UNCLASSIFIED Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 104 UNCLASSIFIED In New York and Indiana, potential Copperhead plots and sabotage terrorized b th i o offic al and public opinion. Confed= erate armies in Kentucky unde B r ragg had taken Lexington and were threatening Louisvill e and Cincinnati, where martial' law was proclaimed I . n each of these places the citizens dug trenches and slept in terror h w en they did not actually flee to the countryside. A third majo C r onfederate army under Earl enm omh __ in con d k re rr , up additional nightmares for the frightened, who visualized this army sweep.. ing through or around Ulysses S. Grant and eventually over= running the western ~,- - -. f Among the European powers, sentiment was building toward mediation in the war and recognition of the Confederacy, if not toward actual intervention on its behalf. The British were provoked to these attitudes by the shortage of cotton for their textile mills, resulting in unemployment and deprivation for hundreds of thousands of workers; by a preference of the Brit- ish nobility for the aristocratic, Anglo-Saxon South over the heterogeneous, "mongrelized" North; by the desire of the British Government to see two rival pygmies instead of a single united giant on the Ca di na an frontier; and by general national anger toward supposedly hostile Northern actions such as the blockade and the removal by a Yankee warship of two Con- federate agents from a British mail steamer, the Trent. Subtle propaganda by Confederate agents in Great Britain provided a catalyst for these sentiments, and the rout of the Federal troops at Second Bull Run fired the retort. Recognition of the Con- federacy by Her Majesty's Government and a negotiated peace .on the. basis of Southern independence loomed as a startling reality to the North in the shambles of its defeated army. Britain would have been followed by Napoleon III of France, who had the assurance of Confederate support and eventual recognition of any French conquests in Mexico in return for his recognition of the Confederacy-which had, in effect, al- ready repudiated the Monroe Doctrine. The South responded to news of the great victory at Second Bull Run with a demand that the war now be carried into Yankee territory. Newspapers in every Southern city spoke for their readers when they clamored for an immediate invasion of the North. Sentiments similar to those stirring the average Southern citizen also motivated the leaders of the Confederacy. UNCLASSIFIED 11 L ' e DaDH. 1OERICKffi'jRG CbMelbrsnik I RRICHMOND na YORK 00 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 1 Approved Foase 2005/03/15: CIA-RDP78T039-4A0M0020001-2 Lee agreed that Southern military success had put the Con- federacy in a position to state its political objectives leading to an honorable peace, but he still felt that one more victory over the Federal troops -- and this one a victory north of the Potomac - would so clearly prove the strength of the Con- federate position that the North must accede to any demand for peace. Such a victory might well affect the coming Con- gressional elections in the North as well as influence the waver- ing British and French Governments to recognize Southern in- dependence. An offer of peace after a great victory would be considered a magnanimous gesture by a victorious power rather than a sign of weakness by a frightened bureaucracy. To achieve these political ends, Lee had to gain another bat- tlefield victory over the Federals, and a major objective of an invasion of the North was therefore the Federal. Army of the Potomac itself. By taking the initiative, Lee could draw his opponents, far less skillful than he, whoever they might be, into a war of maneuver in which he could win on a field and at a time of his choosing. As another major objective of his in- vasion, Lee also intended to seize or to destroy the Pennsylvania Railroad bridge over the Susquehanna River at Harrisburg, Pennsylvania. The seizure or the destruction of this bridge would sever the connecting artery between Washington and the \Vest. The only other through connection to the West was at the periphery by way of the Hudson River and the Great Lakes. Lee had the capability of attaining his objectives. With a victorious, battle-tested army under successful veteran com- inanders, Lee would be able to defeat the Federals if he were permitted to select the terms of reference for the battle as he already had done at Second Bull Run and was to do again later at Fredericksburg and Chancellorsville. Lee also would be able to destroy the railroad bridge at Harrisburg if he reached it without having drawn the Federals into battle or to seize the bridge if he reached it after a victorious battle. Although his army was relatively small, Lee divided it into several parts, with the Federal garrisons at Harpers Ferry and Martinsburg in the Shenandoah Valley as targets for three units. Two other units were to proceed toward Boonsboro and Hagerstown. In his Special Orders 191 of 9 September 1862, Lee drew up his order of march and made his troop dispositions. Each of the key commanders mentioned in the order was sent Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 UNCLASSIFIED a copy of the order. James ("Pete") Longstreet carefully re his copy and chewed it -- "as some persons use a little cut tobarrn 11 ini- r yr- ,,--- pine d - .~ copy to the Inside of hid jacket. Thomas J. ("Stonewall") Jackson meticulously burned his copy. There was a certain confusion in Jackson's mind as td whether Daniel T-T.- ., rn:,, __ s s w Vol under his command 0 directly under Lee. To be certain that Hill received a copy o1 Special Orders 191 (the Arm f N y o orthern Viii h rgnaad not yet, een n divided into } corps), Jackson, in his own hand, sent Hill a considering Hill no longer under Jackson but idirectly yonder; himself also sent Hill , a copy Hillli . camed that he never re- ceived this co py On Saturday, 13 September, the hastily reorganized Federal: Army of the Pn+rt- --3-- - -L Clellan moved into Frederick and set u ca p mp on the outskt irs of the town. Colonel Silas Colgrove, the commander of the 27th Indiana V l t o un eers Third Bid ,rgae, First Division, Twelfth Army Corps, ordered his men to stack arms in the same area which had revi l p ous mand of y beenHilloccupied by the men under the com- DanielHarvey . While resting in this area, Private Barton W. Mitchell and Sergeant John M. Bloss, both of the 27th Indiana, found a copy of Lee's Special Orders 191 i n a paperd wrappe around three cigars. The order was authenticated by Colonel Samuel E. Pitman, First Division Adjutant-General, who recognized the signature of Lee's Assistant Adjutant-General as that of Colonel Robert H. Chilton, with whom Pitman had served in Detroit. The order then was brought to McClellan, who set off to destroy Lee in detail. McClellan, dilatory by nature and convinced by his faulty intelligence that Lee had an army about 50 percent larger than the Army of the P t o omac was nt likl t ,oeyo have attacked Lee. Even with Lee's orders before him - orders dividing Lee's army - McClellan inched cautiously forward. Lee, informed of the loss of the copy of Special Orders 191 that he had sent to Daniel Harvey Hill, did his best to reassem- ble quickly his scattered units to present a united front to the Federals, and on Wednesday, 17 September 1862, the Battle of Antietam took place. Lee, forced to fight on the defensive for UNCLASSIFIED the first time during the war and incapable of maneuver, was able to stop the Federal attack only with great difficulty. On 19 September, Lee withdrew into Virginia, and the North was free of the invader. The railroad bridge at Harrisburg was not cut, and the North was able to maintain its fundamental east-west link. Mary- land, eager to follow a winner, not only did not secede but even went so far as to increase its effort on behalf of the Union. With Maryland remaining loyal, Washington was neither sur- rounded nor isolated, and its Fifth Column remained nervously underground. The fear of invasion among Northern states proved to be groundless, and the governors of these states rather than demanding troops from Washington to defend themselves, provided troops, albeit reluctantly, to the Union army. With substantial reinforcements from the eastern states available, the Union was able to send Western recruits to Don Carlos Buell and Grant to exploit their victories at Perryville, Kentucky, and at Corinth, Mississippi. The Copperhead movement, which needed the impetus that a Southern victory north of the Potomac could give, never re- ceived this impetus and gradually lost strength as the war progressed. Even at the polls this movement proved to be weak as Lincoln's Republicans swept the Congressional elections of 1862 to remain in power. Lincoln, who had resolved upon the Emancipation Proclama- tion as a military, political, and psychological measure neces- sary to insure the ultimate conquest of the Confederacy by the Union, leaped upon Antietam as the victory which he needed to give meaning to the Proclamation. Even though the Procla- mation was a political gesture, in-victory it seemed more ideal- istic -and realistic - than if it had followed a defeat on Northern territory. After a Union defeat the Proclamation would have seemed to be nothing more than the empty oratory of a beaten demagogue rather than the noble gesture of a con- fident leader. The recognition which the South had expected from abroad was contingent upon a Confederate victory, and the Southern retreat from Maryland could hardly be construed as a victory even by the Confederacy's most sanguine European supporters. The retreat, in turn, led to second thoughts; second thoughts, to inaction; inaction, to continued nonrecognition -right Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 108 UNCLASSIFIED through to the end of the war. Lincoln's Emancipation Pr y lamation, moreover, swayed foreign public opinion to the Nort hi h w c now seemed to stand for the oppressed rather than the oppressor of a popular revolt. Finally, Southern hopes which had been raised to the hei h g t, with the victory at Second Bull Run and with the transfer o: frustration in less than three weeks. Although the spirit a th e South was as reoltft Ati sue aernetam as before, a gnawin d b ou t now marchedid bidith t sey se whis spirit. Lee unequivocably blamed the failure of the invasion o Maryland on the lost order. He defended the division of his army, pointing out the need to eliminate the threats to his ticularly, Harpers Ferry. In addition, Jackson's investment of clothing, and weapons which were some of the objectives of the invasion. At the very least, if McClellan had not obtained a copy of Lee's orders, Lee could have reunited his army lone have re-equipped it with some of the hoard from Harpers Ferry and given his 10,000 or more stragglers time to rejoin his army. Thus refurbished, Lee could have gone on to Harrisburg, de-, t s royed the bridge, and sought out McClellan.2 The Confederates held Harpers Ferry and had destroyed much of the Baltimore and Ohio Railroad, an important east'; west link. Destruction of the railroad bridge at Harrisburg!' _ _-_ -_ _ . I t Would have nn+ th west e eas B t al imore and rnualhi E ,aepa.ven if Lee had subsequently b d f een e eated by McClellt an -a mos unlikely event on the basis of previous encounters between these generals - many months would have elapsed before the rail connection over the Susquehanna River could have been re-established. Recon- struction of the bridge from the heights over the river would have been, at the very least, a major engineering achievement. The cumulative effects of a victory by Lee over McClellan in Maryland would have been devastating to the North. Lee could have moved on to Harrisburg and with his headquarters s Courses of action open to Lee if McClellan had not gained posses- sion of Special Orders 191 are shown on the map. Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 UNCLASSIFIED 109 Approved lease 2005/03/15 : CIA-RDP78T03194A000100020001-2 in the capital of Pennsylvania, astride the rail lines to Phila- delphia, Baltimore, and Washington, would have menaced all three of these terrified metropolises. During Lee's second in- vasion of the North in 1863, Richard S. Ewell approached within three miles of Harrisburg before he was called back because of the chance encounter at Gettysburg. The panic of the Penn- sylvania countryside at that time is a slight indication of what Confederate headquarters at Harrisburg might have caused - especially if Confederate cavalry under James E. B. ("Jeb") Stuart had been permitted to raid in the direction of Phila- delphia and even New York. If Lee had chosen to commit himself early rather than to wage psychological warfare against the three cities simultane- ously, he might have marched directly from a victorious battle- field against Baltimore or Washington. The very Maryland farmers who watched impassively as Lee's half-starved tatter- demalions poured across the Potomac might conservatively have estimated that a victory by Lee on Maryland soil looked dangerously like the beginning of the end of the war on Southern terms. The number of recruits whom Lee might have picked up in Maryland, under the band.-wagon steam- roller, would have increased sharply, thus augmenting even more an army in which straggling had suddenly disappeared. The strong secessionist tendencies indicated by Baltimore in April 1861 might have opened that city to Lee in 1862, per- mitting his entry against bare token resistance.. Washington, thus isolated by a secessionist Maryland and itself swarming with a devious, opportunistic Fifth Column, could hardly have remained the capital. Previously prepared evacuation plans might have moved the Government to Phila- delphia or New York while Jefferson Davis, President of the Confederacy, graciously doling out merciful terms to a stunned city, rode triumphantly down Pennsylvania Avenue. Recog- nition, but no longer intervention, would have been inevitable. A triumphant South would have scorned intervention. While Lee campaigned in the North, 20,000 recruits were assembled in Richmond for his army. A victorious Lee, gath- ering volunteers in Maryland, would hardly have needed these recruits. Bragg, however, pressing on Buell in Kentucky, could have used the recruits, and such reinforcements might well Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 UNCLASSIFIED UNCLASSIFIED have balanced the numbers in Bragg's favorgivinhim t , g ht opportunity of making good his intention to install a Confect: erate governor at Frankfort, the capital of Kentucky. The Federals in the West would have had to withdraw troops from wherever th ey were available to relieve Buell, thus taking _ pressure off Van Dorn i n for his part, then would have been free toy attain Vwhatever ;P~Emperor Maximilian of Mexico. In the struggle to get the French army out of North America and Maximilian off his throne, this government had the use of an intelligence enterprise which, though conducted on a small scale, turned out to be very effective. Up to the last weeks this intelligence operation consisted of competent reporting on the part of espionage agents and diplomatic representatives; but when a crisis developed at that point, these sources were silent, and it was a cablegram from Napoleon to his commanders in Mexico that yielded the information needed by the nation's leaders. As an intelligence coup the interception and reading of this message were hardly spectacular, for it passed over fifteen hundred miles of telegraph wire accessible to United States forces and, contrary to later assertions that it had to be de- ciphered, it appears to have been sent in the clear. Neverthe- less, the event was an outstanding one in the history of United States intelligence operations, not simply because it represented a beginning in a new field but also because the message in question was of crucial importance. State of the Union, 1861-65 The crisis in which America's intelligence capability as- serted itself did not come until after the nation had spent five anxious years watching the European threat develop. Napoleon had sent an army to Mexico late in 1861, assertedly to compel the payment of huge debts owed by the government of Mexico. His object, however, was not simply a financial one: a new commander whom he sent to Mexico in 1863 re- ceived instructions (which leaked into the press) to the effect that the Emperor's purpose was to establish a Mexican govern- ment strong enough to limit "the growth and prestige of the United States." 3 At a time when the American Union ap- peared to be breaking up under pressure from its southern half, such a statement meant to American readers that Napoleon had no intention of stopping at the Rio Grande. J. Fred Rippy, The United States and Mexico (New York, 1926), p. 261, citing Genaro y Carlos Pereya Garcia, Documentos ineditos o muy raros para la historia de Mejico (20 vols., Mexico City, 1903), XIV, pp. 8-20. 82 CONFIDENTIAL A Cable From Napoleon CONFIDENTIAL In June 1863 French arms swept the Liberal government of President Benito Juarez from Mexico..City= and, inAhe-su of 1864 Napoleon installed the Archduke Ferdinand Maximilian, thirty-two-year-old brother of Emperor Franz Joseph of Aus- tria, on the new throne of Mexico. During this period the Northern people, their belligerence aroused by the Southern rebellion, were clamoring for action against France - action that might well bring disaster upon them. Aggressive be- havior by the United States might give Napoleon the popular support he needed to join hands with the Confederacy in a declaration of war, a development that could provide Seces- sion with enough extra strength to prevail. While the Civil War lasted, Congress and the public were held in check largely through the prestige and political skill of the Federal Secretary of State, William H. Seward. But when the War was over - by which time the government had reason to believe that Napoleon had become disenchanted with his puppets in Mexico - Seward was ready to turn his people's aggressive demeanor to advantage, and he warned Napoleon that their will would sooner or later prevail. Before this state- ment reached Paris, however, the United States Minister there, John Bigelow, who had been mirroring Seward's new firmness for some months, had in September 1865 obtained a tentative statement from the French that they intended to withdraw from Mexico.4 While Bigelow was shaking an admonitory finger at the French Ministry of Foreign Affairs, an American military fist was being displayed before the French along the Rio Grande. Promptly upon the silencing of Confederate guns, General Grant sent Philip Sheridan, second only to William T. Sherman in the esteem of the General-in-Chief, to the command of the Department of the Gulf, with headquarters at New Orleans. A considerable force was posted along the Mexican frontier and designated an "army of observation." 4 Rippy, op. cit., pp. 264-65 and 269-72; Seward to Bigelow, September 21, 1865. All diplomatic correspondence sent or received by United States officials that is cited herein will be found in the Papers Re- lating to Foreign Affairs Accompanying the Annual Message of the President to the First Session, Thirty-Ninth Congress (covering the year 1865), Second Session, Thirty-Ninth Congress (1866), and Second Session, Fortieth Congress (1867-68). Approved For Release 2005/03/15 : CIA-RDP78TO3194AO00100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL A Cable From Napoleon Sheridan and Intelligence 1 _ '-T_ he possessor of a-reputa- tion as a gamecock, adhered strongly to an opinion prevalent in the Army that a little forceful military action now would save a full-scale war later. The audacious statesman who was directing foreign policy at Washington was, to Sheridan, "slow and poky," and the general found ways of giving considerable covert aid to the Juarez government, then leading a nomadic existence in the north of Mexico.5 Sheridan and Seward, though the policy of each was anathema to the other, made an effective combination. One of the ways in which Sheridan could exercise his relent- less energy against the Imperialists without flouting Seward's policy was in collecting intelligence on what was going on below the border. There was an interregnum at the United States Legation in Mexico City, and all the official news reaching Washington from below the Rio Grande was that supplied by the Juarist Minister to the United States, Matias Romero, a scarcely unbiased source if a prolific one.6 Sheridan quickly undertook to fill the gap. This task must have been decidedly to the general's taste, for he had been one of the most intelligence-conscious commanders in the Civil War .7 He had achieved something of an innovation in organizing intelligence activities when, during his 1864 campaign in the Shenandoah Valley, he established a group of intelligence operatives under military control. His previous sources of information, local citizens and Confederate deserters, had both proved unreliable. "Sheridan's Scouts" were a mili- tary organization in a day when it was customary to have civilians perform most of the intelligence-gathering tasks other ' John M. Schofield, Forty-Six Years in the Army (New York, 1897), p. 381; Philip H. Sheridan, Personal Memoirs (2 vols., New York, 1888), II, pp. 215-19; Percy F. Martin, Maximilian in Mexico (London, 1914), p. 432. ? Dozens of examples of this intelligence will be found in the Romero- to-Seward correspondence in the Papers Relating to Foreign Affairs described in footnote 4. T When a division commander in 1862-63, Sheridan had exercised an initiative in intelligence collection that was more likely to be found in an army commander. His Memoirs reveal a constantly high in- terest in intelligence activities. 84 CONFIDENTIAL A Cable From Napoleon CONFIDENTIAL than battle-zone reconnaissance. After the war, Major Henry Harrison Young, the- Scouts- comet- tinder; --of west men went to the Gulf Department with Sheridan. Sheridan also, in common with numerous other commanders North and South, had an acquaintance with communications intelligence as it was produced in the field command of that day. By the time the Civil War was well advanced, Signal Corpsmen in every theater had learned how to solve the enemy's visual-signaling alphabets, and they derived much information for the commanders by keeping their field glasses trained on enemy signal stations s There was not likely to be any op- portunity for such methods along the Rio Grande, however, and no more likely was the possibility of tapping telegraph lines carrying useful information. Young and his four men were dispatched to important points in northern Mexico to report on movements of the Imperial forces and the various projects of ex-Confederates who were joining Maximilian's forces and attempting to establish colonies under his flags Judged by the accuracy of the reports reach- ing Sheridan and the strong tendency of the Southerners' projects to abort after coming under his notice, the work of these five men was most effective.'0 1866, Year of Telegrams and Tension The critical question -whether the French would tire of their venture and withdraw - was, however, one to which no intelligence service could divine an answer, for the French for a long time did not know the answer themselves. In 1865 Marshal Frangois Achille Bazaine, now Napoleon's commander in Mexico, was informed by the Minister of War that he must bring the army home, and at about the same time he received I War of the Rebellion: Official Records of the Union and Confed- erate Armies (Washington, 1884-1901) contains hundreds of deci- pherments resulting from such interceptions, chiefly in the oper- ations of 1863-65 in Tennessee and Georgia, the operations along the South Carolina coast beginning in 1863, and the Richmond- Petersburg siege of 1864-65. ? Sheridan, op. cit., II, p. 214. 10 See, for example, intelligence reports sent by Sheridan to Grant, March 27, May 7, June 24, July 3 and 13,1866. All Army correspond- ence cited hereafter in this article will be found in the United States National Archives, except where otherwise indicated. CONFIDENTIAL 85 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL A Cable From Napoleon word to the opposite effect from the Emperor himself." Na- e, by vhich-thhle latter .accepted - the throne of Mexico contained a secret clause providing that French military forces to the number of 20,000 were to remain in Mexico until November 1867.12 As events were to prove, however, this compact was less likely to determine Napoleon's course of action than were the pressures on him represented by the United States' vigorous diplomacy and the rising mili- tary power of Prussia. In April 1866 Minister Bigelow succeeded in pinning Na- poleon down to a definite understanding, to the effect that the 28,000 French soldiers in Mexico would be brought home in three detachments, leaving in November 1866 and March and November 1867. Seward's reply to this promise was char- acteristic of his tone at this time: dwelling only briefly on the diplomatic niceties, he suggested that the remaining period of occupation be shortened if possible. The Secretary was in high feather; in the same month a protest by him induced the Aus- trian government to abandon an effort to send substantial reinforcements to the small Austrian force in Maximilian's army .l3 In June Maximilian received a studiously insolent letter from Napoleon containing the stunning announcement that the French would withdraw. Attention now focused on whether he would attempt to hold his throne without French arms. The unhappy sovereign reacted first by dispatching his Em- press, twenty-six-year-old Carlota, to Paris in a vain attempt to change Napoleon's mind. He soon decided to abdicate, then determined to remain on his throne, then wavered for many weeks between abdicating and remaining 14 Napoleon meanwhile had to contend not only with his pro- teg6's indecision but with some apparent recalcitrance on the u Philip Guedalla, The Two Marshals (London, 1943) p. 130. "Ibid., p. 112. "Seward to de Montholon, April 25, 1866; Seward to J. Lothrop Motley (United States Minister to Austria), April 6, 16, 30, May 3, 30, 1866; Motley to Seward, April 6, May 1, 6, 15, 21, 1866; James M. Callahan, American Foreign Policy in Mexican Relations (New York, 1932), p. 235. "Martin, op. cit., pp. 266-267 and 272-273. 86 CONFIDENTIAL A Cable From Napoleon CONFIDENTIAL part of Bazaine, who was variously suspected of having a secret agreement with Maan '~`uprt, of being secretly in league with the Mexican Liberals, of profit- ing financially from his official position, and of having hopes of succeeding Maximilian. (There is evidence to support all these suspicions.) 16 Soon Napoleon realized he had made a bad bargain with the United States; to attempt to bring the army home in three parts would risk the annihilation of the last third. Early in the autumn of 1866 the Emperor sent his military aide, General Castelnau, to Mexico with instructions to have the army ready to leave in one shipment in March, and to supersede Bazaine if necessary. Thus the evacuation was to begin four months later than Napoleon had promised, but to end eight months earlier.16 No word of this important about-face was, however, promptly passed to the United States government. At the beginning of November - supposedly the month for the first shipment - the best information this country's leaders possessed was a strong indication that Napoleon intended to rid himself of Maximilian. This was contained in a letter written to Maximilian by a con- fidential agent whom he had sent to Europe; it showed the failure of Carlota's visit to Napoleon. Somewhere between its point of origin, Brussels, and its destination, the office of Maxi- milian's consul in New York, it had fallen into the hands of a Juarist agent 17 Soon after Minister Romero placed it in Seward's hands, Napoleon's new Foreign Minister, the Marquis de Moustier, wrote his Minister in Washington, de Montholon, that the evacuation timetable was raising serious difficulties but that in no case would the November 1867 deadline for its Castelnau to Napoleon, December 8, 1866,' quoted in Georges A..M. Girard, La Vie et les souvenirs du General Castelnau (Paris, 1930), pp. 112-124; Marcus Otterbourg (United States charge d'affaires in Mexico) to Seward, December 29, 1866; Martin, op. cit., pp. 298-99; Lewis D. Campbell (United States Minister to Mexico) to Seward, November 21, 1866. "De Moustier (Foreign Minister) to de Montholon (Minister 2the United States), October 16, 1866, in Foreign Affairs; Bigelow Seward, November 8, 1866; Martin, op. cit., pp. 56-57; Guedalla, op. cit., p. 133; Girard, op. cit., p. 122. "Romero to Seward, October 10, 1866; New York Tribune, January 4, 1867. CONFIDENTIAL Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 A Cable From Napoleon A Cable From Napoleon CONFIDENTIAL Cruz, to find the French leaving and Juarez resuming the reins of government: ills loo ea o ex=aenaor Lewis D. Campbell, newly appointed Minister to Mexico, and General William T. Sherman, sent with Campbell to give the mission prestige, to advise Juarez in regard to the many military prob- lems that would be plaguing him, 21 and possibly to arrange for the use of small numbers of United States troops to assist the Liberal regime by temporarily occupying certain island forts.22 Evidence was accumulating that Maximilian and his Eu- ropean troops would soon be gone from Mexico, 23 but it stood no chance of general acceptance in Washington. Such was the degree of trust now accorded Louis Napoleon that his promise to evacuate Mexico would be believed on the day when the last French soldier took ship at Vera Cruz. At this juncture Sheridan's headquarters came into posses- sion of a copy of a coded telegram to Napoleon from Bazaine and Castelnau. The message had left Mexico City by courier on December 3 and had been delivered to the French Consulate at New Orleans, from where it was telegraphed to Paris on the 9th. As will be explained below, there is every reason to believe that this message went unread by United States cryptogra- phers. The possession of its contents would have been of great value, for the message (as translated from the version given by Castelnau's biographer) said: completion be exceeded."' This note should have reached Sew- ard in early November (1866), but if it did, itss, strong:.hint not here would be no partial evacuation in that month was apparently lost on him. When the French felt able to promise complete withdrawal in March, de Moustier revealed to Bigelow the abandonment of the three-stage plan. So alarmed was Bigelow by the pros- pect of a -major outbreak of anti-French feeling in America that he refrained from sending the news to Seward until he had heard it from the Emperor himself, whom he saw on November 7. The November shipment had been cancelled for reasons purely military, the Emperor said, showing surprise that the United States had not known of the change. The order had been telegraphed to Bazaine and had been sent in the clear in order that "no secret might be made of its tenor in the United States." 19 Undoubtedly the Emperor was perfectly sincere in implying that he expected the United States govern- ment to make itself a tacit "information addressee" on tele- grams of foreign governments reaching its territory. Receiving Bigelow's report of this interview, Seward struck off a peremptory cablegram to Paris: the United States "can not acquiesce," he declared. The 774 words of this message un- folded before Bigelow on November 26 and 27, their transmis- sion having cost the State Department some $13,000. On De- cember 3 Bigelow telegraphed the Foreign Minister's assurance that military considerations alone were responsible for the change of plans and his promise, somewhat more definite than the previous one, that the French "corps of occupation is to embark in the month of March next." 20 So strongly had this government relied on Napoleon's original promise that President Johnson had dispatched an important diplomatic mission to Mexico (republican Mexico, that is) - a mission that was already at sea, expecting, on arrival at Vera De Moustier to de Montholon, October 16, loc. cit. Bigelow to Seward, November 8, 1866. "Seward to Bigelow, November 23, 1866; Dexter Perkins, The Monroe Doctrine, 1826-1867 (Baltimore, 1933), p. 534; Bigelow to Seward, December 3, 1866. 88 CONFIDENTIAL Seward's instructions to Campbell, dated October 25, 1866, are per- haps the most impressive of the numerous masterful documents produced by the Secretary in the Mexican, affair. Grant was the President's first selection as the military member of the mission and was excused only after a number of urgent requests. Cor- respondence relating to the inception of the Sherman-Campbell mission includes: Andrew Johnson to E. M. Stanton, October 26 and 30; Grant to Sherman (at St. Louis), October 20 and 22; Grant to Johnson, October 20 and 21, and Grant to Stanton, October 27. " Sherman to Grant, November 3, 1866 (Sherman MSS, Library of Congress) ; Grant to Sheridan, November 4, 1866. Sheridan was directed to "comply with any request as to location of troops in your department that Lt. Gen. Sherman ... may make." Campbell to Seward, November 21, 1866; unaddressed, unsigned military intelligence report dated at Washington, November 18. CONFIDENTIAL 89 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL A Cable From Napoleon A Cable From Napoleon CONFIDENTIAL New Orleans, 9 Dec 1866 To Eiis Majesty the Emperor Napoleon-at Paris. Mexico, 3rd December. Emperor Maximilian appears to wish to remain in Mexico, but we must not count on it. Since the evac- uation is to be completed in March, it is urgent that the transports arrive. We think that the foreign regi- ment must also be embarked. As for the French of- ficers and soldiers attached to the Mexican Corps, can they be allowed the option of returning? The country is restless. The Campbell and Sherman mission, which arrived off Vera Cruz on November 29 and left December 3, seems disposed to a peaceful solu- tion. Nevertheless it gives moral support to the Juar- ists through the statement of the Federal government. Marshal Bazaine and General Castelnau 24 As December wore on, rumblings from Capitol Hill indicated that Congress - the same Congress that was even then mov- ing to impeach President Johnson - might attempt to take the management of the entire affair out of the Administration's hands. Word arrived from Bigelow that transports to bring the army home were ready to sail from French ports, but that information would by no means be convincing enough to reas- sure Washington. And that word was the last to be heard from Bigelow, as competent a reporter as he was a diplomatist. He was relieved as Minister by John Adams Dix, ex-senator, ex- general, who did not manage to turn his hand to report-writing until mid-February, after the crisis was past.25 Similarly, nothing that would clarify the situation was com- ing out of Mexico. General Grant received a report from Sher- man, at Vera Cruz, containing two items of intelligence, highly significant and completely contradictory: two ships, waiting at Vera Cruz to take Maximilian home, had been loaded with tremendous quantities of royal baggage; and the Emperor had just issued a proclamation to the Mexican people announcing "Girard, op. cit., pp. 117-18. sc New York Herald, December 7, 1866, p. 4, col. 3; Bigelow to Seward, November 30, 1866; Morgan Dix, Memoirs of John Adams Dix (2 vols., New York, 1883), II, 150; Dix to Seward, December 24, 1866. 90 CONFIDENTIAL Tiff WESTERN UNION TELEGRAPH COMPANY. Ae~ 1 k,Y u19 THE WESTERN UNION TELEGRAPH COMPANY. First and last pages of the five-page message to Napoleon III from his commanders in Mexico, reporting on the situation there and asking instructions concerning the evacuation of the European forces. The French clear-text version, as repeated by General Castelnau in a letter to Napoleon on December 8, 1866 (and quoted by Castelnau's biographer), reads: L'empereur Maximilian parait vbuloir rester au Mexique, mais on ne peut y compter. L'evacuation devant titre terminee en mars, it est urgent que les transports arrivent. Nous pensons que le regiment etranger doit titre aussi embarque. Quant aux offi- ciers et soldats frangais detaches au. corps mexlcains, peut-on leur laisser la faculte de revenir? Le pays est inquiet. La mission Campbell et Sherman arrivee devant Vera Cruz le 29 novembre et partie le 3 de- cembre semble disposee a une solution pacifique. Elle n'en donne pas moins un appui moral aux Juaristes par la declaration du gouvernement federal. CONFIDENTIAL 91 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 Approved For Release 2005/03/15 : CIA-RDP78T03194A000100020001-2 CONFIDENTIAL A Cable From Napoleon his intention to remain. Sherman and Campbell were facng a dilemma, in that they could not reach Juarez without cross- ' ; t rrifc held by the Imperialists, with whom they were supposed to have nothing to do. Sherman invited Grant to instruct him to go to Mexico City to see Bazaine, who, he was sure, would tell him the truth about French intentions, but nothing came of this suggestion. Wrote the general of the colorful pen and the fervid dislike of politics: "I am as anxious to find Juarez as Japhet was to find his father, that I may dis- pose of this mission." 26 Tension mounted in Washington early in January as the Senate prepared for a debate on the Mexican question, and a wide variety of reports circulated, the most ominous being that half of the French forces were to remain in Mexico through the summer, and that Assistant Secretary of State Frederick W. Seward, who had sailed mysteriously from Annapolis on Christ- mas day, was on his way to see Napoleon. (He was en route to the West Indies on one of his father's projects for the pur- chase of territory.) 27 But on January 12, before the Senate got around to the Mexican question, the War Department re- ceived a message from Sheridan at New Orleans transmitting the following telegram: French Consul New Orleans Paris Jany 10th for General Cast[elnau] at Mexico. Received your dispatch of the ninth December. Do not compel the Emperor to abdicate, but do not delay the departure of the troops; bring back all those who will not remain there. Most of the fleet has left. NAPOLEON. "Sherman to Grant, December 1 and 7, 1866. Sherman, despite his reputation for hard-headedness, was not one of those who favored military action by the United States in Mexico. He wrote Grant, "I feel as bitter as you do about this meddling of Napoleon, but we can bide our time and not punish ourselves by picking up a burden [the French] can't afford to carry." 21 New York Herald, January 3, 1867; New York Evening Post, January 8, 1867; Frederick W. Seward, Reminiscences of a War-time States- man and Diplomat (New York and London, 1916), pp. 348-55. Seward's project, a very closely kept secret, was the acquisition of a harbor in San Domingo. A treaty was later concluded but buried by the Senate. 92 CONFIDENTIAL A Cable From Napoleon ' - Gttti c w a~ `7"~ Yiiw 5mc: glilii,q fdgn,Y. u/Fruaa,/~m.~1~.~ . ,mot ~,? ,, d4 %,ts &~. 4- ahx-