STUDIES IN INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010001-1
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
112
Document Creation Date:
December 16, 2016
Document Release Date:
April 20, 2005
Sequence Number:
1
Case Number:
Publication Date:
January 1, 1968
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000300010001-1.pdf | 5.55 MB |
Body:
Approved For Release 2005/05/16 : CIA-RDP78T0394 00300010001-1
SECRET
25X1
STUDIES
in
INTELLIGENCE
VOL. 12 NO. 1 WINTER 1968
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
App ;
05/05/1$~W-RDP EV03194Al( Di010001-1
Rtj[qn
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
This material contains information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Secs. 793 and 794, the transmission or revelation of which
to an unauthorized person is prohibited by law.
GROUP I
Excluded from automatic
downgrading and
declassification
Approved For Release 2005/0&gggiIA-RDP78T03194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may
be written on any theoretical, doctrinal, oper-
ational, or historical aspect of intelligence.
The final responsibility for accepting or re-
jecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion of the Board, the article
makes a contribution to the literature of in-
telligence.
EDITOR
PHILIP K. EDWARDS
EDITORIAL BOARD
SHERMAN KENT, Retiring Chairman
ABBOT E. SMITH, Succeeding
DONALD F. CHAMBERLAIN
E. DREXEL GODFREY, JR.
Additional members of the Board are
drawn from other CIA components.
25X1
25X1
'SECRET
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
CONTRIBUTIONS
Contributions to the Studies or communications to the editors may
come from any member of the intelligence community or, upon in-
vitation, from persons outside. Manuscripts should be submitted
directly to the Editor, Studies in Intelligence, Room 1D .27 Langley
I land need not be coordinated or submitted through chan-
nels. They should be typed in duplicate, double-spaced, the original
on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Articles may be
classified through Secret.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office
dissemination center or the responsible Central Reference Service desk,
71 For back issues and on other questions call the Office of the
Editor,
All copies of each issue beginning Summer 1964 are numbered serially
and subject to recall.
App`Ac~W For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
25X1
CONTENTS
Page
The 1967 Sherman Kent Award .................... faces 1
................
Valediction Sherman Kent 1
Parting reflections from the father of this journal.
CONFIDENTIAL
Interaction in Weapons R&D . .......... David S. Brandwein 13
Frustrating lags in military-scientific intelligence. SECRET
Foretesting a Soviet ABM System ............ Edward Tauss 21
Case for action on new weapon system findings before
details are clear. SECRET
How Three Estimates Went Wrong ...... Willard C. Matthias 27
Misjudgments in NI Es on Goa and Vietnam, and before
the Six Day War. SECRET
Insurgent Counterintelligence ........ Carlos Revilla Arango 39
Modus operandi against government intelligence and se-
curity, focused on Latin America. OFFICIAL USE
Central Intelligence Under Souers ........ Arthur B. Darling 55
Experimentation and growing pains in CIG. CONFIDENTIAL
Intelligence in Recent Public Literature
Ill Told Tales. SECRET/CONFIDENTIAL ................. 75
World War II. OFFICIAL USE ........................ 83
Spy fiction. OFFICIAL USE ........................... 88
Military intelligence. OFFICIAL USE ................... 91
Intelligence and policy. OFFICIAL. USE ................. 97
Miscellaneous. OFFICIAL USE ........................ 104
Cumulated Grouping of Articles ............................ 107
Volumes I through XI. SECRET
SECRET
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Next 1 Page(s) In Document Exempt
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CONFIDENTIAL
25X1
With this issue the Studies bids an offi-
cial farewell to Sherman Kent, who some-
what quixotically founded the journal in
1955 and has been its prime sustainer for a
dozen years. The infusions of his vigor
and polymath good judgment have been so
much the wellspring of its life that it has
reason to tremble a little at this severance.
Yet he has borne himself the wise father,
encouraging spontaneity and initiative,
nudging here and checking there but foster-
ing the independent child; and he has thus
brought it to a stature that can stand the
shock. It can take comfort, too, that he
will not be altogether out of its reach for fatherly advice. This is the
end of an era, but the era's works go on.
Succeeding Chairman Kent on the Studies editorial board, as on his
more history-making Board of National Estimates, is Abbot Li;. Smith,
long his deputy on the latter.
My colleagues on the Board of Editors have asked that I mark my
retirement from the Board with a backward glance at the beginnings
of the Studies in Intelligence and a drawing of some sort of balance
sheet. What follows is, I trust, a minimally autobiographical, but
nevertheless wholly personal appraisal of the journal's accomplishments
and disappointments.
First-about its establishment:
When the National War College convened in January i4)4; after
its Christmas recess, Bernard Brodie gave the morning lecture. His
CONFIDENTIAL
I
Approved For Release 2005/05/16
: CIA-RDP78T03194A000300010001-1
MORI/HRP PAGES 1-11
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Valediction
topic was the Grand Strategy. To the surprise of everyone, and the
disquiet of some, his presentation was not about strategy but about
how few Americans had interested themselves in the study of it.
Citing the case of economics, he noted that a hundred and fifty years
of study had produced from scratch a large library of highly enlighten-
ing literature. What had our military produced in the way of a
literature regarding strategy, the heart of their profession? He
answered this question by referring to Alfred Mahan, whose contribu-
tion to this literature was unique in both senses of the word: out-
standing and lonesome. The speech came to a climax when Mr.
Brodie identified a couple of strategic decisions of World War II
which he held in low esteem and indicated that they might not have
been made if Americans had devoted more time to thinking and
writing about strategy. The moral was pointed and purposefully so:
strategy is your business, why don't you systematize your thinking
about it and perpetuate your reflections in a professional literature?
Sunday Before Christmas
One of the reasons I so vividly remember Mr. Brodie's remarks was
that I realized at the time that everything he was saying about strategy
could be said with equal force about intelligence. I had just com-
pleted almost five years in the business and was poised to begin work
on my book Strategic Intelligence. In the next few months all that I
had suspected regarding the absence of a literature of intelligence I
was pretty well able to prove. Calling upon the library resources of
the National War College and its able reference librarians, I believe
that I read practically every printed document which our military had
issued on the subject of intelligence and a number of typed student
articles from the services' war colleges. There was nothing from the
pen of a civilian intelligence practitioner. The collection was no
better than I had anticipated, and going through it was a pretty shat-
tering experience for an intelligence buff. Clearly the profession ought
to put the talent of a lot of its devotees to the creation of literature
of the trade.
I did nothing much about the matter except for occasional broodings
until one Sunday in December 1953. I had the morning duty in
Mr. Dulles's office and after reading the cables I still had time on
2 Co N pENT L
Approved For Release 2005/05/16: CIA-RDP78T0319F~AQ0000010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Valediction CONFIDENTIAL
my hands. It was then that I wrote the memorandum that follows.
The cover sheet of transmittal looked like this:
(1) My general interest in the "Life."
(2) A sense of disquiet at the realization that Intelligence is a non-
cumulative discipline.
(3) A sense of outrage at the infantile imprecision of the language of
intelligence-I give you the NSCID's for a starter.
(4) A desire to give Uncle Matt a Christmas gift.
At the bottom of the copy I have is written, in Matt Baird's hand:
To OTR Staff and Division Chiefs
re parag. 4-I like to share my Christmas cheer; comments will be acceptable
in return!
SUBJECT: How a major flaw in the intelligence business (its lack of a
serious systematic literature) might be corrected.
1. Intelligence work in the US has become an important professional dis-
cipline.
2. It has developed theory, doctrine, a vocabulary, and a multitude of
techniques.
3. Unlike most other important professional disciplines, it has not developed
a literature worthy of the name.
4. Without a literature intelligence has little or no formal institutional memory.
What institutional memory it does possess exists in (a) fragments of
thousands of memoranda primarily devoted to discrete intelligence opera-
tions, not to the theory and practice of the calling, and in (b) the living
memories of people engaged in intelligence work.
What kind of a way is this to run a railroad? Where would the
sciences and social sciences be, if their students had not systematically
contributed to their literatures?
A literature is the best guarantee that the findings of a discipline
will be cumulative.
A disaster to our unlettered intelligence service such as occurred with
the budgetary cut-backs of 1946-7, or as might occur with an A-bomb
on Washington, could put US intelligence back to the stone age where
it so long dwelled.
'Matthew Baird, then CIA Director of Training
CONFIDENTIAL 3
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Valediction
5. How do you produce a literature?
Some answers.
a. You pay for it. That is, you offer a livelihood to the man who wants
to write a book or an article during the time he requires to do the job.
b. You make sure that the man who wants to write a book or article has
something to say and a reasonable command of the art of verbal
expression.
c. You subsidize his publications. That is, you print at your own expense
what your critics and editors think will advance the discipline.
d. You circulate his publications and encourage comment thereon. You
may wish to publish the best written comment.
Some answers.
a. I would establish on a modest scale an "Institute for Advanced Study of
Intelligence."
h. I would have a Board of Admissions who would both (].) pass on the
suitability of applicants and (2) actually invite likely candidates who
did not apply.
c. I would have no one eligible for admission who had not had a sub-
stantial and varied experience in intelligence work and who was not
capable of systematic thoughtful research, analysis, and writing.
Further I would accept no one who did not have a well-thought-out
project.
d. The project would have to be in the field of intelligence work, overt
and clandestine; not in the substantive findings of intelligence. Ap-
propriate sample projects might be:
(1) Strengths and weaknesses of intelligence dissemination tech-
niques.
(2) An examination of the "third agency" rule.
(3) The theory of indicators.
(4) The intelligence service of country X.
Inadmissible projects would be:
(1) The Red Army
(2) The Trieste situation
(3) The Outlook in Liberia, etc.
e. I would have no faculty as such. I would have a director who would
arrange for occasional meetings with outsiders and who would see to
it that the students spent a few hours per week together in seminars
at which the students would present papers and discuss them.
I. The greatest part of the student's time would be his own to pursue his
project through any means whatever with a view to publishing some-
thing at the end of his fellowship.
Appkved For Release 2005/05/16: CIA-RDP78T03TY4a6IIU30 W0001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A0003000 01-1
Valediction CONFIDENT
g. I would establish a journal-probably a quarterly-which would be
devoted to intelligence theory and doctrine, and the techniques of the
discipline. I would have an editor who fully understood the limits of
his mandate. The journal could be Top Secret; its component articles
could be of any classification or unclassified. The editor would. provide
for the separate publication of "reprints" for separate circulation where
appropriate.
h. Along with the journal I would establish an "Intelligence Series" for
longer works.
7. Some dimensions.
a. As a starter I would have no more than 10 or 12 students.
b. They would receive their regular in-grade pay if they came from the
government; they would receive appropriate compensation if drawn
in from the outside. All would, of course, be fully cleared.
c. They would be expected to be "in residence" at least 50 percent of the
time; that is, at work in study or seminar rooms on the school premises.
d. Although my major interest is in positive intelligence, I would always
aim to have a few security intelligence students around.
e. The duration of the fellowships would normally be one year. If I
found a Mahan of intelligence I would keep him as long as he would
stay.
There are hundreds of details beyond this rough outline. If the idea were
accepted, they could be easily worked out.
What my school must never be is an intelligence equivalent of the higher
service schools. If you feel the need of a model, study Institute for Advanced
Study at Princeton-the Einstein school.
True to his penciled promise, Mr. Baird did discuss the memorandum
with his principal lieutenants in the Office of Training. I can only
surmise, for I was not present, that the founding of an Einstein school
for research in intelligence method, doctrine, and history was put
on a back burner and that my suggestion for the establishment of a
journal was fetched up front over moderate heat. There followed,
for example, a weekend conference at a country retreat sometime dur-
ing 1954 and a good bit of general conversation about a journal-
who should finance it, edit it, supervise it, and so on.
Some time later I was asked to set forth orally my thoughts about
the journal before an Agency gathering with the understanding that
CONFIDENTIAL 5
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CONFIDENTIAL Valediction
the speech would be recorded and transcribed. This procedure was
Mr. Baird's artful way of inducing me to produce, in writing, the first
article of the new journal. When it appeared in print in September
1955 it bore the title "The Need for an Intelligence Literature: Articles
by Sherman Kent and the Editors." My contribution was no more
than an Englished version of the oral presentation, which in turn was
an elaboration of the thoughts touched upon in the first five paragraphs
of my Christmas memo to Matt Baird.
Before the appearance of the first number of the quarterly proper,
there were two other unperiodic issues with a couple of articles each,
the first including Abbot Smith's disquisition on the matter of capa-
bilities in intelligence publications. This gave rise in the second,
oddly enough, to a comment by the British intelligence officer then
representing the British Joint Intelligence Committee in Washington,
Alan Crick. I say oddly, because soon after the journal began to
appear in its present form, the Editors ruled that there should be no
dissemination to friendly foreign services. The main articles in the
last issue in slender format dealt with economic intelligence.
At the initiative of one of Matt Baird's able officers, James Lowe, the
journal became a quarterly with the Fall issue of 1957, and starting
in 1958 under the editorship of Philip Edwards it has come out four
times a year ever since.
Now for the balance sheet: what is there about the journal that we
can regard with pride and happiness and what with regret?
Let me begin with the good ones: our second five years of quarterly
existence has produced a larger number of contributions and a
larger number of good ones than did our first five. In recent times
there have often been many more pages of highly commendable
manuscript than the editors wished to commit to a single number.
It is not exactly that we are being lost in a blizzard of contributions,
but compared to the bleak years of the fifties, we feel that we are
doing very well indeed.
As to the quality, we should have to do no more than to
call the reader's attention to the list of winners of the annual $500
Approved For Release 2005/05/16: CIA-RDP78T0C3 TUSI
TJ~10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Valediction CONFIDENTIAL
prize 2 and advise him to reflect again on what whacking good articles
they were and what a very substantial contribution to the lore of our
profession they made. That the Board has on two occasions been
unable to distinguish between the two or even three best essays and has
accordingly split the award is explicit testimony, at least, of the Boards
awareness that it has just passed through a bumper crop year.
That the Studies has in fact contributed to a richer understanding
of the bones and viscera of the intelligence calling is beyond argu-
ment. We have run dozens of articles on intelligence history, the
range of which can be sampled in those of Arthur Darling on the
early years of CIA, the half dozen on the early struggle between the
Russian revolutionaries and the Tsar's Okhrana, and William Harris's
two on the March 1948 Berlin crisis, in which intelligence played a
pivotal role. None of these articles required a high security classifi-
cation and all of them could have been disseminated widely as long
memos. But who would have sponsored them, reproduced and cir-
culated them if there had been no Studies to serve as a vehicle?
The contribution of the journal to an appreciation of some of the
aspects of intelligence theory and doctrine has been highly significant.
I cite as outstanding examples the succession of articles by W. E. Seidel,
George Ecklund, Clyde C. Wooten, and Julie D. Kerlin clarifying the
proper role of economic intelligence in defense planning, the many
articles that discuss problems of estimative intelligence,3 and the view
from the summit in Richard Helms's "Intelligence in American Society"
1960-Clyde R. Heffter
1961-Albert D. Wheelon and Sidney N. Graybeal (co-authors)
1962-F. M. Begoum
1963-(1) Paul R. Storm
(2) Lt. Col. William Hartness
1964-(1) Andrew J. Twiddy
(2) Theodore H. Tenniswood
(3) Thaxter L. Goodell
1965-John Whitman
1966-James Burke
1967-Henry S. Lowenhaupt
These are compiled conveniently under one cover in the new publication cited
on p. 74 of this issue. But already this is outdated by Jack Zlotnick's "A Theorem
for Prediction" in the last issue of the Studies, Willard Matthias's "How Three
Estimates Went Wrong" in this, and Keith Clark's "Notes on Estimating," Summer
1967.
CONFIDENTIAL 7
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Valediction
Perhaps we have been at our best on intelligence method. Where
else could a wide audience of professionals gain insight into such tech-
niques as those illustrated in Thaxter L. Goodell's piece on cratology,
Paul R. Storm's on Soviet gold, and C. N. Geschwind's comments on
interrogation? Increasingly, as intelligence itself turns more and more
to science, we have featured new scientific methods, from David Brand-
wein's "Telemetry Analysis" three years ago4 to the new infrared re-
connaissance techniques recently explained by R. E. Lawrence and
Harry Woo.
The point is that as one looks back through a cumulative index
(which one should do5) he cannot escape the belief that: the intelli-
gence profession is indeed more professional and more durable
now that it has the beginnings, at least, of this tangible institutional
memory.
Another cheering aspect is inherent in the widening spectrum of
contributors. There is not a major component of CIA which has not
by now produced at least one author and an interesting article.
Furthermore we have had a good number of contributions from intelli-
gence officers not associated with the Agency in any way. One of our
prize winners, Colonel Hartness, four years back, was such a man.
Lastly, we have had a heart-warming reaction from our consumers.
The members of the Board are pretty well convinced that our fan
mail represents a genuine appreciation on the part of scores, perhaps
even hundreds, of readers scattered all over Washington, indeed all
over the world. As old intelligence officers, we are naturally suspicious
of a warm consumer reaction, for well we know how rare it is that
a consumer receiving a piece of substantive intelligence will ever
give anything except a "thank you." To be sure, some of the thanks
are a good bit less fervent than others. But what we have found
particularly pleasant have been the requests from men running small
intelligence units in large and small domestic and overseas commands
asking permission to incorporate this or that article into one of their
publications destined to circulate among their own people.
Probably our nicest fan letter was one which Admiral B. E. Moore,
then of the Cinclant headquarters, wrote to Admiral D. L. McDonald,
the CNO, saying how he had come across our publication and sug-
' See also his article in the current issue.
'See the compilation at the end of this issue.
Approved For Release 2005/05/16: CIA-RDP78T0?QWAMbW10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Valediction CONFIDENTIAL
gesting that the CNO ask that it be sent to a good number of flag
officers serving with major components of the Fleet. As a result we put
some 40 or 50 additional addressees on our distribution list.
A principal cause behind these good things has been our editor,
Philip Edwards, whom we know to be the best in the business.
When you read these words you must realize that he has been over-
come by the Board's exercise of force majeure, and that the paragraph
is appearing in print despite his efforts to kill it. Mr. Edwards
combines his great skill as a critic with a rare talent for writing, a
world of patience, and a great ability to help authors help them-
selves. The journal's successes owe more to him than any other
single person.
Minuses
And now for my regrets. The first has to do with the classification
of the quarterly. The Secret stamp on the outside and what it means
is obvious to all. The most melancholy implication is that it must
be given what we call Class A storage, something none of us has
in his home. Accordingly, one has had to read the journal on business
premises and perhaps in business hours. This means that it has been
competing for attention with urgent professional matters.
When I bespoke my hope for lots of unclassified articles in my first
essay, I was clearly whistling Dixie. What the Board swiftly came
to realize was that unclassified articles by people outside the govern-
ment or the intelligence community were by definition going to be
a great rarity-principally because we were not going to advertise
that we had a vehicle to publish such writings. Even if we had
successfully solicited, we would probably have had to reject most
offerings on the grounds of quality or lack of sophistication. There
are after all very few outsiders who have been able to keep abreast
of the extraordinary developments of the profession from the vantage
point of private life. And not many have chosen to do purely historical
pieces or notes of reminiscence.
On the other hand, the very fact that an insider wrote such and
such and that the Board thought it important enough to publish was
oftentimes the prima facie reason to put some sort of classification
stamp to it. In actual fact, the Board has upon many occasions
felt impelled to question sensitive topics discussed by an author and
even to do a bit of sanitizing to get the contribution by as Secret.
Appro ed'~ForReJease 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Valediction
All this is the long way of saying that, regrettable as is the Secret
classification, it is the very best that can be done. We n re convinced
that there is no way by which our publication can be made into some-
thing which our readers can take home to read in the evening and
which, at the same time, will have a content worthy of their attention.
One reader wrote us a communication suggesting a common-sense
method by which copies of the Studies could be kept out of the safe
for an hour or so after close of business for people who wanted to
stay after work to read them. We thought he had something and
passed the idea along, but nothing came of it.
A second and last regret. No matter that, as noted above, the
quantity of contributions has increased and the quality improved, there
are by no means enough people in our vast community writing articles
and submitting them. The Board of Editors, at each of its weekend
meetings, spends several hours on Saturday night discussing subjects
which would make interesting articles and trying to figure out who
would he the best author to undertake them. Between meetings of
the Board, members put in a good amount of time dunning their
colleagues and acquaintances for an article of this or that :specification.
I should imagine that we receive in finished form one article for about
every ten we ask for. Some of the articles which have finally appeared
have required almost as much suasion or browbeating on the part
of a Board member as they did effort on the part of the composer.
On the other hand, the number of high-quality walk-ins has been low.
There are several reasons why this is so. To start with, the ideal
author or authors for such and such a piece are as a rule overextended
with the primary tasks of their job descriptions and cannot take on an
additional duty. Nor do their supervisors by and large feel able to
lighten their professional burdens for the two or three weeks which
they would have to have to do the article in question.
Not infrequently the right author could be given time, but just does
not want to take it. Maybe he has a quite understandable desire-to
this writer, at least-to avoid the pain of literary composition at all
costs. Maybe also the man or woman whose job keeps driving them
down into the present and forcing them to look into the murk of
the future can be pardoned for an indifferent concern about: that which
is over and done with. And many of the articles which we feel should
be written are essentially historical in nature. Some of these have
an added built-in repulsiveness. For example, who is naturally in-
AppIAved For Release 2005/05/16: CIA-RDP78T0 tK~ bba0001-1
Approved For Release 2005/05/16: CIA-RDP78TO319 11~(~01-1
Valediction
clined to go back over the history of an intelligence blooper? The
fact that such a backward glance could be of immense professional
importance does little to alleviate its essential unattractiveness.
Though the so-called missile gap debate owed but little to the
shortcomings of intelligence, getting an article going on the subject has
so far been impossible. One reason-not the ruling one-has been
a reluctance on the part of knowledgeable analysts to return to the
agonies of our early estimating on the Soviet ICBM force and relive
those days of groping around in the uncertainties of Soviet ability to
build the missiles and the magnitude of the force which the Soviets
would probably wish to deploy.
No such Freudian explanation is applicable to our experience in
getting the article which we published in the autumn of 1966 on
"The Detection of Joe I," the first Soviet nuclear test. This piece, which
recounted one of our country's truly great intelligence successes,
required more effort in terms of false starts and carry-over from
year to year than any other we have printed. Here perhaps the
issues of security and delicacy were important inhibitors. Telling
the story orally in a safe place to an inside group possessed of
every clearance in the book would have been one thing, telling it in
writing at the Secret level for publication to the community at large
quite another. The stupid little mechanical difficulties of the latter
course could and probably did very rapidly build up into a mountainous
barrier.
Whatever the difficulties and however overcome, the Studies in
Intelligence venture has been eminently worth while. The Board's
celebration of its tenth anniversary a year ago presaged, I trust, not
so much a ceremony of self-congratulation for a decade of past per-
formance as an earnest of still other decades of good and useful work
to come.
CONFIDENTIAL 11
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16: CIA-RDP78T03194A000 YM4001-1
No Foreign Dissem
Inevitable and some perhaps remediable
lags in the highest-priority scientific
intelligence.
INTERACTION IN WEAPONS R&D
David S. Brandwein i
Intelligence may be thought of as having two missions in relation
to military planning and weapon system development. The primary
mission is to provide information on the weapon systems of potential
enemies so that counterweapons may be developed. That is, if we
can gather valid and timely intelligence for projections of the capa-
bilities and vulnerabilities of the opponent's military systems, we can
develop weapons capable of penetrating his defense and blunting his
offense. A secondary mission is to furnish information on the :foreign
development of weapon system components which parallel our own
designs. Here, the objective is to take advantage of their R&D to
produce better weapons for ourselves, thus gaining time and reduc-
ing our own development costs.
In what follows I will examine the way these intelligence missions
are accomplished, primarily in the field of strategic attack and defense
systems, and how the results affect U.S. research and development.
I will try to point out the difficulties in generating satisfactory intelli-
gence hypotheses on the basis of thin data, validating them by inde-
pendent checkout on the part of the several analytic groups involved,
and then feeding them back to the R&D community, difficulties which
make the process less than ideally effective. A few illustrative case
histories will show just how it has or has not worked well and suggest
where it might be tinkered with.
Time and Pride
The problem is time. Too much time is usually consumed in gener-.
ating and validating intelligence on weapon R&D to feed it back into
U.S. planning effectively. True, the weapon-counterweapon process is
a sequential one, so that limited time lags in the feedback loop can be
1 Adapted frorn the author's presentation before the September 1966 Intelligence
II
CAE 13
Approves
o'r Release 2005/05/16: CIA-RDP78T03194A00030 60 111 p PAGES 13-20
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Weapons R&D
tolerated. Intelligence output, however, is usually much too late to
cause the initiation of counterweapon developmental programs or to
affect them directly at their initiation. While it may be frustrating
to proponents of so-called interaction analyses, a look at the decision
dates for some of our existing systems proves that almost all strategic
counterweapons reflect recent advances in the state of the art rather
than reaction to a specific opposing system. They are designed ba-
sically against hypothetical threats founded upon broad assumptions
as to the capabilities of the adversary. Intelligence findings are more
likely to be used to refine developmental programs already well under
way, or sometimes as grounds for eliminating alternative lines of devel-
opment previously undertaken to "cover all bets."
With respect to the secondary intelligence objective, our parallel
weapons development program has benefited only to a trivial extent
from intelligence because of the truly crippling effect of the time lag
coupled with a fundamental human barrier-"Thanks, but we are
doing it better." Generally, two systems being developed. in parallel
by two countries, given about equal capabilities in both, are likely to
mature at the same rate. By the time Country A has discovered
that some feature of Country B's system is superior to the correspond-
ing one in its own, it has paid out its development money and concludes
that it cannot make changes. Convincing researchers that someone
else has solved a problem in a better way is not easy; there is fre-
quently the necessity to overcome an inborn chauvinism, or at least
pride of invention, which blunts the feedback mechanism.
Collection Difficulties
The first problem is to collect the intelligence. Ideally, we would
like to know as soon as research and development starts on a new
weapon system. The fact is, however, that information is inadequate
on Soviet military R&D programs and almost totally nonexistent on
Communist Chinese programs. While general information showing
large increases in Soviet technical capability is available, as well as
evidence of an expanding scope of military R&D, specifics are too
fragmentary to allow a precise definition of the future threat. Basic
research can be followed in some detail through analysis of scientific
papers published in the technical journals, but the possible final uses
of the research in terms of weapon systems are many and nonspecific,
and only trends can be detected. The end result is a lack of sufficient
accurate intelligence on R&D projects in their early stages.
14
Approved For Release 2005/05/16: CIA-RDP78T03194A0 388b10001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Weapons R&D SECRET
In the face of these uncertainties, we usually credit the Soviets with
the ability to solve many scientific or technological problems without
specific evidence of this ability. This may often be reasonable; the
Soviets have the advantage of getting much information on Western
advances, and their progress may well parallel ours in many instances.
Nevertheless, there is a tendency to estimate greater Soviet progress
as the West becomes more certain of success in the solution of corre-
sponding scientific problems. Our assessments of the status of specific
R&D programs thus may be uncertain in the near term and increas-
ingly tenuous as estimates are projected into the future. The loss of
lead time for U.S. planning of counterweapon development and an
inability to present unanticipated alternatives to the U.S. R&D commu-
nity is a serious consequence of these perpetual intelligence problems.
Once the adversary has made a decision to capitalize on the results
of basic research and build a specific new weapon system, he goes
underground with the entire process of preliminary design, labora-
tory test, and prototype construction up to flight (or other equivalent
final) test, which is therefore secure from most forms of intelligence
collection. Indeed, a study of the technical literature to see when
reporting on some particular area of basic research suddenly stops
is advocated as a way of learning that a military development pro-
gram has been started in that area. Proving an exclusion theorem
is always a difficult matter, however, and even its proof would hardly
be a clear signal as to exactly what was going on.
In the development of some key weapons the final flight test phase
is open to intelligence collection, but this is likely to take place three
to five years after the start of preliminary design. This is the lag for
long-range ballistic missiles and space systems. ABM systems, on
the other hand, could well be flight-tested over a period of years
without our knowledge.
Analysis, Consensus, Feedback
Let us assume that in spite of these difficulties we have finally
collected a body of raw data on a new weapon system. The next
step, the analysis of the data, is likely to consume a large amount of
time because it is a difficult process. This is particularly true when
the opponent has developed a system fundamentally different from
our home-grown variety. There is generally a lack of background
data for the intelligence findings and a reluctance on the part of
Approved For Release 2005/05/16 : CIA-RDP78T03194A00030001-UV01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Weapons R&D
analysts and consultants to accept the idea that someo:ae else was
able to solve the problem differently from our solution. A short-
circuit sometimes removes this obstacle when actual hardware is
collected, but unfortunately this happens only very rarely, and when it
does it seldom involves a major weapons system.
After the analytic efforts seem to have generated satisfactory hypo-
thetical conclusions, we still need to validate these by having inde-
pendent researchers check them out. The intelligence community
needs to reach a consensus on their validity. Different analysts working
separately on the same data are quite likely to come up with differing
answers, particularly when the data base is thin to begin with. While
we would all probably agree on the desirability of having more than
a single individual or a single group take a crack at the problem, we
would also hope that they communicate with each other at frequent
intervals. I am encouraged by what seems to be a better rapport
nowadays among the various analytical groups in the community and
a greater speed in coming to an agreed conclusion than heretofore.
Even so, the validation process still takes a significant length of time,
in some instances as long or longer than the analysis p:rocess itself.
Now let us engage the problem of feedback. There are many
channels through which this takes place. The CIA and DIA put out
reports and estimates to consumers on a regular basis, many of which
contain details of weapon system developments. These agencies also
routinely brief officials in Defense, NASA, the Bureau of the Budget,
and the White House, along with many other decision-making ele-
ments of the government. There are a number of key members of
the scientific establishment, both industrial and academic, who par-
ticipate in a variety of government-sponsored panels and committees
and receive intelligence briefings in their fields of cognizance. These
people, however, are at the policy and top management: level; it is
likely that little direct intelligence-derived guidance filters through
them to the laboratories.
Security restrictions inhibit wide dissemination of intelligence down
to the scientists and engineers at the design level, but perhaps little is
lost, as the briefings at the policy level are seldom detailed. They are
usually condensed to a point that a consumer would have difficulty
detecting, say, a significant breakthrough in the development of a
subsystem. For instance, we are prone to tell policy-level audiences
that a missile has a particular accuracy but are less likely to tell them
App~6ved For Release 2005/05/16: CIA-RDP78T03194A000?0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Weapons R&D SECRET
why. Finally, even if we could get around the security restrictions
in our contacts with industry, we still need to be circumspect. In
our capitalistic society we lay ourselves open to severe criticism if
we provide information to industry in a way that gives one company
a competitive advantage over others.
Case History: ICBM Guidance
Having reached the end of the process thus still beset with diffi-
culties, I would now like to summarize briefly some case histories
which illustrate them. The first one is of parallel development work
in the United States and the USSR on the same problem, the guidance
system for an ICBM.
Solving this problem is one of the most difficult ingredients of an
ICBM development program. It is clear now that we and the Soviets
started in parallel, in about 1955, and arrived at strikingly different
solutions. The U.S. systems use a simple rocket engine operating at
a fixed thrust but couple with this a very complex guidance system
containing an airborne digital computer. During powered flight the
guidance system continuously computes the proper burnout position
for the rocket so that the warhead will impact acceptably close to
the target. The Soviets, on the other hand, fly their missiles on a pre-
calculated trajectory with a somewhat more elaborate variable-thrust
engine but a very much simpler guidance system having virtually
no on-board computation capability.
Both systems work fine; but we would probably now admit that
the advantages inherent in the Soviet system, simplicity and quick
achievement of satisfactory reliability, would have been very appealing
to us had we considered such a system during the design phase. The
fact is that we did not begin to collect useful flight test data on the
Soviet system until 1959, that we did not really perform enough
analysis work to understand it until 1963, and that the results of this
analysis did not begin to be disseminated outside the intelligence
community until 1965. By this time, of course, the U.S. ICBM guidance
design had long since been completed. It may be said in all candor
that this particular intelligence program had no effect at all on parallel
systems at home.
An interesting sidelight illustrative of our problems is that analysis
of one aspect of the Soviet data showed that whereas all U.S. missiles
use rate gyros or angular accelerometers to keep the control system
SE,UET 17
For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Weapons R&D
stable, the Soviets devised a much simpler system that dispenses with
these fragile and expensive instruments. The analyst whc made this
determination was successful in getting a Soviet-style system in-
corporated into a proposal to NASA for a new launch vehicle-only
to have the feature rejected by that agency with the comment that
although the scheme looked quite feasible, there hadn't been enough
test experience to justify its adoption. The NASA people were not
aware of the fact that the Soviets had been testing it for many years
because they had never received feedback in the detail required and
at the right level in their organization.
An interesting case history in the weapon-counterweapon field is
the intelligence analysis of a large Soviet radar and its effect on the
U.S. program for developing penetration aids. When thought first
turned in the United States to the problem of penetrating Soviet
radar defenses with ICBM warheads, there immediately arose the
question of the operating characteristics of these radars. About the
only contribution intelligence could make were some excellent U-2
photographs taken in 1960 of some very large radars in the Sary
Shagan area which seemed to be logical candidates for the role of
spotting ballistic missiles as ABM targets.
Unfortunately, deriving a radar's characteristics from a photograph
of it is rather difficult. Various analytical groups looking at the same
photos came up with different answers. The consensus seemed to be
that the largest radar-nicknamed Hen House-was the keystone of
the defensive system, and that it would operate in a UHF frequency
band, at about 1,000 MHz; after all, our developers were working
on radars in the 1,000-2,000 MHz region in our equivalent programs
at the time. This was the word that went out to U.S. agencies engaged
in devising penetration schemes.
Then in 1962 the Russians tested some nuclear warheads at high
altitudes in the Sary Shagan region. Nature was kind, and we received
radar signals reflected from the ionized cloud. These included a new
train of signals in the much lower VHF band, which it soon developed
must have come from a very high-power radar in the Sary Shagan
area.
For a long time, however, there was a singular lack of interest in the
peculiarity of these signals. It may be that too many analysts had
Ap -oved For Release 2005/05/16: CIA-RDP78T03194A0 3?6610001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Weapons R&D SECRET
already decided that the Hen House frequency would be much :higher.
It seems they had convinced themselves that there was no merit in
a long-range radar operating at VHF because such a radar would
be blacked out by a nuclear cloud. Nevertheless, analysis efforts did
go forward, and two things became increasingly clear: first, the VHF
signal characteristics were such as to prove that they could have
emanated only from a radar with the physical dimensions and orienta-
tion of Hen House; and second, that our work on nuclear blackout
effects was based on tests in the tropics, whereas the Soviets were
likely to deploy radars such as these in the Arctic, where the black-
out problem was not nearly so severe.2
A final impediment to the fast functioning of the system was the
fact that the validation step took an unconscionably long time. Al-
though by late 1964 most of the various analytical groups had arrived
at the correct solution, there was one that was still unconvinced, and its
opposition prevented the firm feedback of this information to the
R&D community. As a result, another two years went by before
the message got back to the laboratories in an effective way.
We are now finally on the tracks. A serious review of our offensive
capabilities against VHF radars is now under way. A VHF` radar
has been built at White Sands to allow us to see what the Soviet
radars will see. Our own Nike ABM program is at the same time
looking at ways of using VHF radars for our defensive systems.
However, I would not begin to estimate the millions of dollars which
could have been saved by a more speedy functioning of the intelligence
process.
To recapitulate, I have presented so far a rather pessimistic picture
of our capability to influence weapons research and development, and
I have given two examples illustrating how the long times needed to
collect, analyze, validate, and feed back information serve to make
our efforts ineffective. Ideally, this would now be the proper place
to unveil a blueprint for the future, in which clear solutions to these
problems are presented.
I have no such blueprint. I know of no way to collect intelligence
on weapon systems at the early R&D phase except by clandestine deep
'For a more detailed account of this case history see the next following article
in this issue.
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Weapons R&D
penetrations of the adversary's laboratories and design bureaus. Those
responsible for clandestine operations know this as well as we on
the technical side do, and presumably they are doing the best they
can. Similarly, I see no easy way of speeding up the analysis process.
Massive infusions of people or computing machines are not likely to
expedite the process. Key analytic breakthroughs will generally come
from the application of brainpower by a few gifted and dedicated
individuals working at their own pace.
The last two steps in the process, validation and feedback, seem
to me to be the places where we should focus our attention. The
effectiveness of these steps depends wholly on how we structure the
setup so as to allow people to communicate and interact with one
another. Perhaps it is time to take a fresh look at the mechanisms
by which intelligence information is provided to researchers, particu-
larly in the final phases. This, it seems to me, is an area where no new
inventions are required, no multimillion dollar expenditures are called
for, and yet where there is promise both of improving our defensive
and offensive capabilities and of saving millions of dollars.
App6ved For Release 2005/05/16: CIA-RDP78T03194A00 0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
No Foreign Dissem
Snatches of Flint, together with a
few facts and a lot of logic, silhou-
ette an embryo antimissile system.
FORETESTING A SOVIET ABM SYSTEM
Edward Tauss i
The summary presentation of this particular case history in induc-
tive analysis will show how a slim amount of data may give a basis
for determining the general characteristics and net capabilities of a
new Soviet system before the Soviets themselves have a firm prototype
of it. Such an accomplishment would not be noteworthy when U.S.
R&D has already broken trail along the line of development in ques-
tion, but when it is the USSR that is doing the pioneering it is much
more controversial and difficult to foresee the outcome. The advan-
tages of doing so, of course, are that it gives the U.S. developers a
critical lead time in which to take countermeasures and a basis for
objective planning-no small matters in the race toward Armageddon.
Apparent Soviet Anomalies
At first the theory of ICBM interception called for destruction of
the incoming missile as far away as possible, while it was still out-
side the atmosphere. Then the development of chaff and decoys in
increasing numbers and complexity led to a need for waiting until
the atmospheric drag on reentry provided a way to distinguish the
real warhead from the false images. Endo-atmospheric interception
thus became firm U.S. doctrine, absorbing an enormous investment
in the development of terminal defense radars, exotic computers,
new high-performance missiles, and solutions for the complex prob-
lems of reentry physics. For it was natural to assume that the
Soviet defense system would be based on similar endo-atmospheric
reasoning, in fact would be a mirror image of our own. In con-
sequence, U.S. ICBMs were designed to reenter and penetrate the
1 The author, who suffered a fatal heart attack a few weeks after submitting this
manuscript, had devoted most of his last years to the work therein described. His
thesis has aroused considerable dissent in the intelligence community, and reasoned
counterargument is invited.
SECRET 22
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
MORI/HRP PAGES 21-26
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Soviet AEIM System
atmosphere as rapidly as possible, leaving a minimum of time after
target discrimination for the enemy's anti-ballistic-missiles to reach
them.
In the fall of 1961 and 1962, however, the Soviets performed exo-
atmospheric nuclear experiments at their ABM research center near
Sary Shagan. There were never any atmospheric tests there. U.S.
intelligence had been aware of two new research radars, code-named
lien House and Hen Roost, at Sary Shagan, but the first signals from
either were intercepted only when some Hen House pulses were re-
flected from the ionized cloud generated by a nuclear explosion during
these tests.
The intercepted Hen House signals had peculiar characteristics.
Most notably, their carrier frequencies were in the VHF range, a very
low frequency relative to the L and S bands normally used for U.S.
long-range radars. The Soviets had other VHF radars, for example
the newly deployed Tall Kings for early antiaircraft warning; but
the Hen House signals turned out to have much more :information
content than is needed for mere early warning. For ABM use the
low frequency should have serious disadvantages, not only in track-
ing ICBMs but even in their early detection. Theoretically, uncer-
tainties in propagation, both in the lower troposphere near the earth
and in penetrating the ionosphere to the target vehicle, might create
such errors in measurement as were thought to render VHF quite un-
suitable for U.S. tracking applications. Furthermore, it might be
presumed that any nuclear explosion in the radar path would blind
a VHF system.
The longer wavelength does have its own virtues, however. It is
harder to jam or deceive with decoys, and it makes for a cheaper
system. It would maximize the radar cross-section of target U.S.
[CBMs. Such a system would be a natural extrapolation from previ-
ous Soviet radar technology. The logical interpretation of the Sary
Shagan tests was that the Soviets were in fact exploring the feasibility
of a new exo-atmospheric intercept system, using VHF radar, in de-
fiance of our endo-atmospheric doctrine.
Postulated Soviet System
In 1963 the U.S. Army's missile electronic warfare organization at
White Sands, under the stimulation of inductive argument from a
CIA liaison officer (this reporter), became convinced that Soviet re-
searchers had found, or were finding, ways to get around the diffi-
ApRved For Release 2005/05/16: CIA-RDP78T03194A0c% T10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Soviet ABM System SECRET
culties both of exo-atmospheric target discrimination and of VHF
radar in ABM systems. Late that year, at about the same time that
a "probable Hen House" signal from Sary Shagan was first intercepted
via moon bounce,2 an Army contract was signed with Data Dy-
namics, Inc., to study the potential of a broadly-postulated exo-
atmospheric-kill ABM system based on such a radar. The contractor
was given intelligence support from both White Sands and CIA.
The Hen House proved to be a large planar array of emitting ele-
ments scanning electronically and having extremely high transmitted
power. Not only its peak power but also its average power was
extraordinarily high, with a capability for a very high data rate. Such
a radar may be called range-dominant, in that it measures range more
accurately than azimuth or altitude. It had to be assumed that the
Soviets were not trying to develop it for continuous tracking of
ICBMs from the point of detection on the horizon to the point of
interdiction; at high look angles in a wartime nuclear environment
a VHF blackout would be virtually certain. The Hen House would
have to get its position-prediction data quickly at long range, near
the horizon, and that would be the reason for its high power and
data rate.
At maximum range, however, it was calculated that no single
range-dominant radar could determine target positions with suffi-
cient accuracy. Measurements of altitude, in particular, circum-
scribed by the limited vertical dimension of the planar array, could
not be made fine enough. To make the postulated system credible
one had to assume a Soviet solution for this inadequacy, and one solu-
tion might be the operation of several radars from different locations
against the same targets to pinpoint them by the intersection of their
fixes, a sort of continuous triangulation. This would require reliable
instantaneous communication among the several locations, along with
computers to correlate in real time the multiple reception of target-
reflected signals; and the Soviets had in fact installed microwave fa-
cilities at Sary Shagan as though possibly in fulfillment of this need.
A modificaton of the multiple-radar system so conceived would
avoid the obviously inordinate expense of a large number of high-
performance instruments like Hen House: several distant receivers
could be grouped with each Hen House transmitter, all interlocked
by real-time communications. (For experimental purposes the Soviets
'See Frank Eliot's "Moon Bounce Elint" in Studies XI 2, p. 59 if.
SEC ET
R
Approved For Release 2005/05/16: CIA-RDP78TO3194A0003000401-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Soviet ABM System
could use the deployed Tall Kings as receiving sites in order to check
out the feasibility of this idea.) Such a multistatic radar system
would have distinct advantages against the enemy's electronic counter-
measures because of the difficulty of targeting the wide:.y dispersed
receivers. This model of an ABM radar system requires a reasonably
high level of sophistication in processing data for long-range predic-
tion, but one not inconsonant with known Soviet capabilities. The
important thing was that the range-dominant system model could be
simulated and legitimately exercised to investigate its potentials and
general vulnerabilities, even if the Soviets would not in the final
analysis construct it to operate in quite this manner.
From these basic postulates the contractor, who had earlier done
work for the Air Force on the prediction of future positions for orbital
vehicles, developed the technical details and worked out i:he complex
equations for the multistatic system. The mathematical simulations
showed that such a system could have an accuracy in average target
location within one nautical mile. Maximum effective range from
the transmitter could be increased, say from 600 n.m. to more than
1,000 n.m., by forward location of the receivers. Though not in-
vulnerable, the VHF radar was in many ways not so vulnerable as
conventional systems. The enemy would have difficulty in horizon-
to-horizon electronic jamming of a dispersed-receiver system, and
requirements for high jammer power in the VHF frequency region
would exact weight and size penalties. VHF chaff dipoles, to be
effective, would have to be more than 40 inches in length and rela-
tively heavy. The radar might not even register small objects, greatly
easing the problem of target discrimination.
Blackout from nuclear explosions in the radar path could be to
some degree avoided by locating at least the receivers well to the
side of likely ICBM targets. Enemy interference with the radar by
a nuclear detonation at a conjugate point on the earths magnetic
lines of force would not be possible across the Arctic horizon. The
prognosticated degradation of the beam from low-angle anomalies
turned out not to be prohibitive at long range. The powerful VHF
beam may even have the advantage of a "knife edge" effect, curving
over the horizon for useful increases in unambiguous :range. The
USSR seemed to be about ten years ahead of the United States in
developing such a VHF-oriented system, and it was reasonable to as-
App oved For Release 2005/05/16: CIA-RDP78TO3194A0065 6T0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Soviet ABM System SECRET
sume that their optimization of it through experimental development
might be even better than any model we could conceptually imagine.
A partial answer to the problem of discriminating between war-
heads and decoys before reentry could be to design the ABM warhead
to be effective, exo-atmospherically, against whole swarms of incom-
ing targets, say by making its yield large enough to kill ICBMs at
great distances. Was it the Soviet premise that the problem of decoys
is not a serious one if the ABM warhead has a large enough lethal
radius? The intelligence-based postulate of a Soviet system which
encompassed this possibility appeared to have been vindicated on
7 November 1964 by the revelation of the large Soviet Galosh missile,
which appeared capable of carrying a megaton-range warhead to
fire at exo-atmospheric altitudes.
Prospects
Even if the Soviets had withheld the parading of the Galosh, it
had been possible as early as the spring of 1964 to have, in the con-
tracted study, a basis for ignoring the implications of their display,
on 7 November 1963, of the aerodynamically-designed Griffon missile
which did not fit the requirement for a long-range, high-altitude ABM.
By that spring it had been possible to formulate computer sub-
routines by which the contractor could continuously update simulated
long-range Soviet ABM systems on the basis of the latest intelligence
data. In mid-1964 operational and planned U.S. attack models were
"flown" (by the same contractor under different sponsorship) against
the defensive model in mathematical simulation for purposes of net
evaluation.
Such very early postulation and analysis on the basis of scant data,
something of a rarity in the intelligence community, may be viewed
as a likely necessity now, at least in the electronic warfare field, to
provide objective grounds for developmental decisions. In this case,
recognition of the feasibility of an ABM system using VHF radars
established a need for electronic countermeasures in the VHF region
and was followed by formal military requirements for new chaff and
decoys, for high-powered jamming tubes with new long-term fuel and
power supplies, and for horizon-to-horizon antenna pattern develop-
ments. It led the White Sands missile electronic warfare organiza-
tion to build the first VHF measurements radar in the United States.
And the projection of a possible exo-atmospheric, area-kill ABM
system which the Soviets could deploy in conjunction with their de-
App MvC Tor Release 2005/05/16: CIA-RDP78TO3194A000300( 001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET Soviet ABM System
ployment of a "finite deterrent" ICBM system aided in advance recog-
nition of a potential strategic threat against the United States.
The U.S.-USSR R&D contest, hopefully, will get beyond the ABM-
ICBM confrontation. The posture of all military, naval, air, and
space forces will feel the impact of new strategic modes in which
electronic warfare and net evaluations are controlling factors. The
moral of this case history is that countermeasures and counter-
countermeasures must keep pace in real time with the development
of the opponent's threat. In order to achieve this, the intelligence
community must commit itself, as indicated in the accompanying
diagram, to designating the broad parameters of a threat at the earliest
possible time. Research and Development must then use these broad
parameters to initiate immediately the development of generally neces-
sary counter-components and so at least move in the direction of
readiness for the future threat. It is not necessary to foresee just how
the enemy will optimize his developmental designs, to flesh out our
model in ultimate detail, or to obtain community agreement on all
the refinements in order to institute these timely measures.
DEFINE & STUDY
A CREDIBLE
MODEL OF
SYSTEM
RECOGNITION
OF AN
UNANTICIPATED
SYSTEM
EARLY POSTULA-
TIONS ON GROSS
PARAMETERS OF
SYSTEM
INITIATE R&D ON
COUNTERMEASURES
REQUIREMENTS
ApprZ&ed For Release 2005/05/16: CIA-RDP78T03194A000c3??6p6001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET
No Foreign Dissem
Some lessons from case
histories of misjudgment
in the NIEs.
HOW THREE ESTIMATES WENT WRONG
Willard C. Matthias
The procedure by which National Intelligence Estimates are pre-
pared is designed to ensure that those responsible for policy decisions
receive an agreed intelligence judgment (or a carefully delineated dis-
agreement) based upon the best information and most thorough re-
view possible. But the procedures only provide the framework within
which people function, and the estimates are only as good as they are
made by those who operate the machinery.
The Estimative Process
In this machinery the Board of National Estimates plays the most
important managerial and intellectual role. The draft of the estimate
is prepared by the Estimates Staff under the Board's direction; it
is discussed with representatives of the USIB agencies and CIA com-
ponents under the chairmanship of a Board member; and it is pre-
sented by this Board member to the USIB. The Staff member who
prepares the initial draft also plays an important part: he is more
familiar with the information than most Board members are, and if
he is a skillful writer and convincing defender of his views he puts
an ineradicable stamp on the estimate. The Board chairman-par-
ticularly if he has had a long familiarity with the subject and is
temperamentally inclined to play a leading role-will likewise put
a strong stamp on it.
Nevertheless, it is the Board as a corporate entity which bears re-
sponsibility to the DCI for the form and substance of the estimates.
It is his Board, an instrument to formulate his views and to take account
for him of the information and judgments applicable to the subject
in question. While he personally may rely upon some Board mem-
bers more than others, in his official capacity he must have a Board
sufficiently competent and balanced in composition and experience
that he can be confident that all significant aspects of the subject
have been weighed judiciously.
Approved or Release 2005/05/16: CIA-RDP78T03194A000300pJ 1
86H- RP PAGES 27-38
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET Three Estimates
One cannot generalize about the method or technique Board mem-
bers use in arriving at estimative judgments. Each estimative situa-
tion is unique, and the estimator must lean upon a variety of sup-
ports: the amount and persuasiveness of the evidence; the methods of
analysis used by the contributors; the judgment of others in whom he
has special confidence, whether because of their study, experience, or
sharpness of mind; his own background in the subject; and, for want
of a better word, his hunches.
By dictionary definition a hunch is a feeling or suspicion not based
upon evidence but upon premonition. 1. do not believe in premoni-
tions, but I admit of the hunch in some sense. It must be compounded
of something-a sense of the logic of a situation, a ring of authenticity
in certain evidence, an uneasiness because some factor in a situation
is unexplained or prima facie unexplainable, a sense of the general
weight of evidence though no individual piece of it is sufficiently per-
suasive, a feeling that some leader or group is likely to act in a certain
way because of emotional or ideological predilections, however ir-
rational or illogical the course. Such factors enter in most Frequently
when there is no solid factual base for conclusions or when the evi-
dence is contradictory. A most notable case of correct hunch oc-
curred in 1962, when Director John McCone kept worrying the pos-
sibility that the Soviets might put strategic missiles into Cuba despite
the absence of reliable evidence to this effect and despite his Board's
judgment that they would not do anything so foolish.
In some ways the estimative job is easier than it was ten or fifteen
years ago. We have, for example, much more and better evidence
on many aspects of Soviet military capabilities than we did then;
collection methods have improved and analytical skills developed.
But there are still many problems which strain the estimator's
capacity. Some which cause the severest trouble are those predicting
likely courses of events (a) in unstable areas or situations of tension,
(b) in situations where the strengths of competing forces appear
evenly balanced or are difficult to assess, and (c) where the evidence
is contradictory, often through deliberate deception. In each of
these types of problems the Board of National Estimates has made
misjudgments in which this estimator has participated. I would
like to describe as best I can recall how three estimates over which
I presided came to render-if not explicitly, at least implicitly-
judgments that were wrong.
Ai*oved For Release 2005/05/16: CIA-RDP78T03194AO 55710001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Three Estimates SECRET
Arab-Israeli Tensions
Estimates of future developments in category a, in situations of
instability or tension, are both the most challenging and the most
discouraging kind. The first reaction is that one is being asked to do
the impossible, yet this kind of task can be the most rewarding if
done successfully (and although I speak here of a failure, it often
is done successfully). Actually, it is impossible to predict the course
of events; but one can describe how the parties involved apparently
think about a situation, how they have so far acted toward it, and
how they might act toward hypothetical changes. The case I have
in mind is that of an estimate entitled "The Arab-Israeli Dispute:
Current Phase," published 13 April 1967.
This estimate was undertaken in the context of an increase in tensions
in the Palestine dispute and in the wake of an Israeli raid on Samu
in Jordan in late 1966 which shook the monarchy in Amman. These
developments raised the question of whether the modus vivendi that
had prevailed between Israel and its Arab neighbors since 1957 was
coming to an end. Most of what the estimate said was right:
a. Rivalries and disputes among the Arabs reduce their chances of doing
anything significant about their quarrel with Israel; these rivalries also create
some danger of precipitating crises from which large-scale Arab-Israeli hos-
tilities could develop.
b. The Israelis seem likely to continue existing policies, including occasional
retaliatory action; they would resort to force on a large scale only if they
felt their security seriously endangered.
c. [The Israelis] could best any one of their neighbors and probably all of
them collectively. Arab cooperation being what it is, Israel probably would
not be obliged to take them on all at once.
d. The Soviet leaders almost certainly view the Arab-Israeli dispute as
promoting their interests. ... But the Soviets do not want an outbreak of
large-scale conflict in the area, since this would carry serious risk of a US-
Soviet confrontation and thus threaten the positions which the Soviets have
already won in the area.
But the estimate had one final conclusion which, though it was
technically correct, conveyed a sense of reassurance and was, in light
of the events of May and June 1967, misleading.
Although periods of increased tension in the Arab-Israeli dispute will occur
from time to time, both sides appear to appreciate that large-scale :military
action involves considerable risk and no assurance of leading to a solution.
In any event, the chances are good that the threat of great power intervention
will prevent an attempt by either side to resolve the problem by military force.
Apprt &S Tor Release 2005/05/16: CIA-RDP78T03194A0003000?&001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET Three Estimates
I say that this last conclusion was technically correct because the
Six Day War was not an attempt to "resolve" the Arab-Israeli problem
by military force. It fits under the rubric of the conclusion (see a
above) that rivalries among the Arabs created the danger of "pre-
cipitating crises from which large-scale Arab-Israeli hostilities could
develop" and that (in d above) "the Soviet leaders almost certainly
view the Arab-Israeli dispute as promoting their interests." A review
of the available information shows that the Soviets had a role in
precipitating the crisis by passing intelligence information about Israeli
plans for a punitive expedition against Syria to the Syrians and
Egyptians. Nasser, who had been accused in the past by his Arab
rivals of hiding behind the skirts of the UN, this time sought to avoid
the charge. His mobilization and the events which followed then
led the Israeli leaders to conclude that their security was "seriously
endangered" (b above). Quite clearly, both the Soviets and the
Egyptians made some miscalculations about the consequences of their
actions.
One can thus exculpate oneself by this kind of textual exegesis.
But there was in the estimate a serious lacuna: we did not sufficiently
treat the possibilities arising out of terrorist activities, border raids,
troop movements, propaganda, political warfare, and the psychological
effects of these in Israel and the Arab world. Had we understood
these better, we should have ended the estimate by noting the danger
that they could lead to an explosion rather than asserting the unlikeli-
hood of a deliberate resort to force.
Why did we make this error? I think we were under two mis-
apprehensions. The first was that we overestimated the Soviets'
good sense, something we have done before (e.g., when The question
was whether they would deploy missiles to Cuba, in 1962). It is,
1 think, a safe judgment that if the Soviets had thought in mid-May
what they knew on 5 June, they would have kept that provocative
intelligence information to themselves. The moral is that how the
Soviets may think about a particular area and what they may do
tactically may not be entirely consistent. We as estimators must
recognize more frequently (as we often do in observing the tactical
moves of governments regarding which we have more complete
knowledge) that specific actions taken by the agents of a government
do not always flow from the general policy objectives or posture of
the leadership.
AppOOved For Release 2005/05/16: CIA-RDP78T03194A009'IT0001-1
Approved For Release 2005/05/16: CIA-RDP78T03194A0003ff401-1
Three Estimates
The other misapprehension, I believe, was a failure to keep up
with dynamic aspects of Near East politics. We did not realize how
much more confident in themselves both the Israelis and Egyptians had
become. We did not therefore realize how much lower was the
threshold of Nasser's readiness to expose himself to danger, and how
much lower was the threshold of Israel's readiness to fight against
creeping threats to its existence. I cannot say whether this was
a failure in intelligence reporting or in analysis; I suspect it was
a bit of both. U.S. personnel abroad are often too much absorbed
in the day-to-day business of their operations to detect a growing
change of mood; analysts in Washington are too often cynically prone
to think their foreign charges are the same feckless (or scheming)
fellows they always were and that nothing much changes. I, for one,
am prepared to be a bit more cynical myself about area specialists.
Prospects in Vietnam
The estimate illustrating misjudgment in category b, when the
strengths of competing forces appear to be evenly balanced or are
difficult to assess, is one which had a long and tortuous 'history.
Initiated in October 1962, it was finally cleared by the USIB only in
April 1963; it was entitled "Prospects in South Vietnam." At that
time Diem was still president of South Vietnam and Madame Nhu
was riding high. The U.S. commitment was still in the form of
advisers and logistical support. The estimate was to assess how things
were going, what problems there were, what the prospects were. I
will not examine here all the conclusions of the paper, but only its
general statements about how the war was going and what the pros-
pects were for South Vietnam in the kind of struggle that was going
on then. I quote from some of the conclusions of the draft finally
approved by the USIB:
a. We believe Communist progress has been blunted and that the situation
is improving. Strengthened South Vietnamese capabilities and effectiveness,
and particularly US involvement, are causing the Viet Cong increased diffi-
culty, although there are as yet no persuasive indications that the Communists
have been grievously hurt.
b. Assuming no great increase in external support to the Viet Cong, changes
and improvements which have occurred during the past year now indicate that
the Viet Cong can be contained militarily. . . . However, we do not believe
that it is possible at this time to project the future of the war with any
confidence. Decisive campaigns have yet to be fought and no quick and easy
end to the war is in sight. .. .
ApprSECRET vr Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET Three Estimates
c. Developments during the last year or two also show some promise of
resolving the political weaknesses, particularly that of insecurity in the country-
side, upon which the insurgency has fed. However, the government's capacity
to translate military success into lasting political stability is questionable.
The estimate thus rang no tocsin. To put it in simpler language:
things are not going to hell; we don't know how it will all come out,
but the South Vietnamese are not doing so badly; Diem is improving,
he might win the military struggle, though even if he does, don't
think the political troubles of South Vietnam will be over. Half a
year later Diem was ousted, and the political and military situation
degenerated to critical proportions by the end of 1964. What made
the estimate so wrong?
In this case the draft originally prepared by the Estimates Staff
was essentially correct, but it was fatally weakened during, the process
of review and coordination. This was a long and painful process for
me as chairman, since I had helped the Staff prepare this draft. Let
me quote some of the original conclusions, c below being the final one:
a. There is no satisfactory objective means of determining hz)w the war is
going. The increased US involvement has apparently enabled the South Viet-
namese regime to check Communist progress and perhaps even to improve the
situation in some areas; however, it is impossible to say whether the tide is
running one way or the other .. .
b. On the South Vietnamese side, new strategic concepts, such as the
fortified hamlet, and shifts in military and security organization, training, and
tactics have strengthened the counter-guerrilla effort. However, very great
weaknesses remain and will be difficult to surmount. Among these are lack
of aggressive and firm leadership at all levels of command, poor morale among
the troops, lack of trust between peasant and soldier, poor tactical use of
available forces, a very inadequate intelligence system, and obvious Com-
munist penetration of the South Vietnamese military organization.
c. The struggle in South Vietnam at best will be protracted and costly.
The Communists are determined to win control, and the South Vietnamese
alone lack the present capacity to prevent their own eventual destruction.
Containment of the Communists and reestablishment of a modicum of security
in the countryside might be possible with great US effort iri the present
political context of South Vietnam, but substantial progress toward Vietnamese
self-dependence cannot occur unless there are radical changes in the methods
and personnel of the South Vietnamese Government. Even should these take
place without mishap, this would only be a beginning; the Communists retain
capabilities and support which will require years of constructive effort to
dissipate.
Some of the process of dilution began in the Board itself. The
Board did not change the main thrust of the paper, or alter essentially
App ived For Release 2005/05/16: CIA-RDP78T03194A006F36T0001-1
Approv For &
2005/05/16 : CIA-RDP78TO3194A000300010001-1
ree s ima es SECRET
the wording of the conclusions cited in a and b above. But it did
eliminate some of the prescient words both from the text and from
the final conclusions cited in c. The final conclusion now read simply:
With US help, the South Vietnamese regime stands a good chance of at
least containing the Communists militarily. However, the modus operandi
of the Diem government, and particularly its measures to prevent the rise
of contenders for political power, have reduced the government's effectiveness,
both politically and militarily. We believe that unless radical changes are
made in these methods of government, there is little hope that the US in-
volvement can be substantially curtailed or that there will be a material and
lasting reduction in the Communist threat.
The serious weakness of this change was that it shifted the emphasis
from the inherent difficulty and long-term character of the problem
(to which Diem contributed) to an indictment of the Diem. regime.
This led us into trouble at the coordination meeting with departmental
representatives.
Some of the military representatives at the coordination meeting had
served in South Vietnam and had been appalled at the South Vietnam-
ese military performance. The emphasis in the paper on political weak-
nesses as a major cause of the military failures quite naturally appealed
to their professional instincts as well as confirmed their own observa-
tions. The indictment of the Diem regime, however, no doubt because
it called into question the existing U.S. policy of working with Diem,
caused the State Department representative to reserve his position
on this aspect of the paper. He also thought the estimate underesti-
mated the prospects for gains through an improved military effort,
although we had gone so far as to say, "With US help, South 'Vietnam
stands a good chance of at least containing the Communists militarily."
Thus the DCI and the USIB members were presented with a paper
which, although the Estimates Board had eliminated reference to the
gloomy long-term prospects, was still a fairly dolorous document.
But it was encumbered with a departmental reservation, and this
obliged the USIB to look at it carefully. The DCI, then John
McCone, was particularly uneasy about it, since it seemed to con-
tradict the more optimistic judgments reached by those in policy
circles who had been sent to Vietnam to make on-the-spot appraisals
and recommendations. He therefore decided to postpone USIB con-
sideration and asked the Board of National Estimates to consult with
some of those who had been on such missions. The Board proceeded
SECRET 33
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Three Estimates
to meet with two high-ranking military officers and two civilians
in key policy-making positions.
None of these four consultations was particularly helpful. The
witnesses seemed reluctant to make a frontal assault on the judg-
ments of the paper but equally reluctant to endorse it. They showed
a general tendency to take issue with a particular sentence purport-
ing to state a fact, rather than an estimative judgment. This or that
was "too pessimistic," but there was no clear line of argument why.
All four held forth some degree of optimism, largely based upon the
belief that things were better than they had been. This indeed may
have been true, but it was not established how badly things had
been going before or how this degree of improvement stood up to
the task, namely to deal with a determined and resourceful op-
ponent who was immeasurably helped by the profound underlying
political weaknesses of South Vietnam. None of the consultants was
attempting to mislead, but the simple fact was that each of them in
some way and to some degree was committed to the existing U.S.
policy, and none of them was intellectually free at that point or in
those circumstances to stand back and look at the situation in its
broadest aspects.
The drafters then returned to their desks and prepared a revised
draft. The Staff members, although increasingly weary of the con-
troversy, were nevertheless much inclined to stick to their guns. I,
however, had become inclined to shade the estimate in a more op-
timistic direction. I began to think that perhaps we had. been too
gloomy; and at the same time I had to get an estimate through to
meet the DCI's new deadline. If we stuck to the original draft, the
DCI and other CIA components might not go along with it; even if
they did, this draft might now evoke still greater departmental dis-
sent than it had the first time (since high-ranking personnel had now
become engaged) ; in short, if we were so rigid that we invited debate
and amendment at the USIB, we might find ourselves with a paper
more offensive to our judgment than one which moved slightly to-
ward a less pessimistic view. What we now wrote, in spite of some
staff objection, embodied approximately the conclusion first cited
above. The estimate rode easily through the USIB with the DCI's
full concurrence.
Even so, this estimate was not calculated to give anyone a sense
of comfort. Indeed, very recently a senior official closely associated
with Vietnamese affairs, who had most likely seen only the finished
AppMved For Release 2005/05/16: CIA-RDP78T03194AO&% OT10001-1
Appr ed For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Three Istimates SECRET
product, remarked that it was too bad policy-makers had not paid
more attention to it. Nevertheless, it did not sound the alarm which
it should have and would have if the first draft conclusions had been
kept intact. A year or so after the date of the estimate, Mr. McCone
openly expressed regret for his own part in weakening what had been
"right the first time."
The lesson provided by this experience is to shun the advice of
those who in one way or another are committed to or responsible for
a particular line of policy. They are no doubt well informed, but it
is also theirs to be hopeful. Above all, their responsibility is to their
policy-making chiefs, and they can hardly be expected to recite before
an intelligence working group information or beliefs which implicitly
or explicitly might suggest that established policy is based upon un-
sound premises. Study of the premises of national policy is the
business of intelligence officers, and it is as unfair to ask the executors
of policy to testify on the soundness of those premises as it is unwise
to accord their views uncritical acceptance.
The Goa Invasion
The estimate that illustrates the difficulty of forecasting in cate-
gory c-when the evidence is contradictory, perhaps because of delib-
erate deception-was not very important in terms of its policy impact;
its conclusion was so equivocal that it provided the warning needed.
It was, however, wrong, and I who chaired it was among those who
thought it wrong at the time. It was a crash estimate, requested on
the morning of December 12, 1961 and approved by the USIB on
the afternoon of the following day, concerning the likelihood of an
Indian attack upon Goa. During the preceding few weeks Indian
troops had been concentrating in the Goa area, public opinion-
especially on the left-was clamoring for action, and a strong mo-
mentum in favor of invasion had developed. Yet the evidence was
conflicting, and it was possible that these activities were designed
purely to apply pressure and to bring about the incorporation of
Goa into India by peaceful means.
We thought that Nehru had not made up his mind and was being
subjected to contradictory pressures. We concluded:
Clearly there is strong evidence pointing to an invasion-the military and
political preparations have gone so far as to be difficult to reverse without
some loss of prestige to the Indian government. Although the Indians perhaps
still hope that their warlike activities will extract concessions from the Por-
SECRET 35
Approved For Release 2005/05/16 : CIA-RDP78T03194A0003000'ID001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET Three Estimates
tuguese, we doubt that the Lisbon Government will move far enough-if at
all-to meet Indian requirements. However, relying chiefly on our judgment
of what Nehru conceives to be India's basic interests and our assessment of his
past behavior, we believe that the chances of a direct military invasion are
still about even.
Five days after this estimate was approved the Indians seized Goa
by military force.
The formulation in the final estimate was close to that of the staff
draft. In a post-invasion memorandum to the Chairman of the Esti-
mates Board, the head of the Near East Staff stated that initially he
and his colleagues had rated the chances as less than even, "relying
mainly on Nehru's restraint in previous crises over Goa and their
estimate of his attitudes, objectives, and ability to control develop-
ments," and that he had learned through informal contacts that the
State Department people went even further, calling the odds "con-
siderably less than even." Nevertheless, impressed by the evidence
of advancing preparations, the Staff was uncertain enough to qualify
the chances as only "slightly less than even."
The Estimates Board members, in their review, agreed generally
with the experts. It was difficult for me, as chairman, to dissent;
but I was impressed more by the evidence of preparations than by
the history of Nehru's political attitudes. The reports from people
who had seen the preparations and talked with the Indians sounded
as if the latter meant business, meant to finish off the Goa affair once
and for all. Argument along these lines succeeded in moving the
Board toward dead center-"The chances of a direct military inva-
sion are still only about even"-and implying that as preparations
continued and the Portuguese failed to give, the chances of invasion
might rise.
The coordination meetings did not help very much. One depart-
mental representative who wanted to raise the odds on invasion
wanted also to add a paragraph about the threat to U.S.-Portuguese
relations and U.S. base rights in the Azores if the Indians went ahead.
It seemed to me that his position derived more from departmental
interest than objective judgment, and this was not acceptable in an
intelligence estimate. We stayed with the Board's "still about even"
formula, and the USIB also agreed to this without dissent.
The day after the estimate was approved, the odds or. an invasion
rose perceptibly in reports from New Delhi. The Army attache said
he believed invasion would "take place very soon."
25X1
SECRET
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Approvedd Forelease 2005/05/16 : CIA-RDP78T03194A000300010001-1
Mee s imates SECRET
I
the country team believed that military action was
imminent unless the Portuguese promptly folded.
The only person who i not seem to thin
an invasion was on was the U.S. ambassador in New Delhi, who
expressed the belief that action was not imminent less than 24 hours
before it began.
The actual invasion gave a sense of vindication to those of us who
had thought it likely, but it also raised the question of why the others
had been wrong. The evidence, though conflicting-the ambassador
no doubt was the victim of some deceit-did include reports with a
decided ring of seriousness. Those who rated the chances of invasion
as even or less than even of course read these reports. They were
relying on Nehru's high-mindedness, and since this did not jibe with
the evidence, they had nowhere to go but to sit on the fence. The
lesson to be derived from this experience is not that one should look
only at the evidence and disregard the doctrines and attitudes of
leaders; that would be folly. It is that one should try to reconcile
the two; in so doing one might perhaps find that, as in the law, there
is more than one line of precedent.
Other Board members could, I am sure, make an analysis of how
estimates in which they participated fell short and similarly draw
lessons from them. In time we could have enough lessons floating
around to keep us tongue-tied. We could fall into the tragic error
of the young man whose aggressive and fast-moving brother killed
himself by wrapping his car around a light pole; the surviving brother,
having taken this lesson to heart and resolved to plod about on foot,
was run over by a truck. Our job is to make estimates; we have to
take the plunge. This does not mean reckless diving, but it does not
mean standing on the end of the diving board helpless with worry
about every conceivable hazard to health and safety.
There is no alternative to regarding each estimative problem as a
new one and applying one's accumulated knowledge and experience
to it. It helps to try to determine why we were right or why we
were wrong and to use these determinations as signposts along the
way, but we must also remember that the specialist who misled us
on one estimate corrected our misapprehensions on another, that the
25X1
SECRET 37
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Three Estimates
political philosophy which a national leader seemed to negate in one
action he might never negate again. The problems we a:re dealing
with are too complex for simple rules or simple "lessons." The magic
words "estimate" or "judgment" are simply the exercise of good sense
in light of everything it is possible to learn or to ponder concerning
any particular matter.
Appved For Release 2005/05/16: CIA-RDP78T03194A00~300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY
The Latin American guerrilla's
protection against government
intelligence and security.
INSURGENT COUNTERINTELLIGENCE
Carlos Revilla Arango
The leaders of an insurgent movement anticipate and counter efforts
by established authority to acquire information about their organization
and activities. The success of the Irish revolutionists must be ascribed
in large part to the operational achievements of their security chief
Michael Collins, who made it his job to know in advance what the
British were going to do, on what information they based their action,
and the identity of their sources. He succeeded in this by gaining
direct, personal access to metropolitan police records. A subject of
his protective interest later wrote:
About a fortnight after my return I received from him, not a copy, but the
original of the report from the police of the districts through which I had
passed. . . . The fact that such an original document should have come into
my hand was an example of the thoroughness with which Collins worked his
intelligence system and enabled the I. R. A. to know what its enemy was
thinking and often what the enemy proposed to do.'
This is counterintelligence activity. The importance of a satisfac-
tory counterintelligence effort is underscored by an instructor of
Castro's Sierra Maestra guerrillas, General Alberto Bayo, who treated
this subject in 23 of the 150 questions and answers he devised for
guerrillas. In his opinion a counterintelligence agent was of greater
value than 50 machineguns: he could work among the security forces
and keep one advised of all their intelligence and plans.2
The insurgent organization's counterintelligence and security pro-
gram must meet not only the threat posed by established governmental
authority but that represented by competitive dissident groups, by the
unilateral interests of third-country sponsors, sympathizers, and foes,
and by disaffected members of its own organization. It must do so
1 Padraic Colum, Ourselves Alone! The Story of Arthur Griffith and the Origin
of the Irish Free State. (New York: Crown Publishers, 1959.) p. 215.
'General Alberto Bayo, 150 Questions for a Guerrilla. Translation from the
Spanish. (Denver: Robert K. Brown, 1963.) pp. 44, 45, 83.
MORI/HRP PAGES 39-53
Appro9SS"F'6?'i IR ~sQ~bt5/05/16: CIA-RDP78TO3194A00030001 @001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
through the acquisition and use of information on the personnel, or-
ganization, modus operandi, assets, plans, and activities of those that
seek to penetrate or compromise it. It must concern itself not only
with an enemy's deliberate efforts but with chance crises of all kinds-
some weak or careless act of an insurgent, an unannounced. curfew or
document check, the compromise of a courier, or a natural disaster.
Gompartmentation
The leaders of an insurgency make every effort to win public recogni-
tion for their cause and objectives. One means they use is to carry
out propaganda activities in large communities. They accept thereby
the threat from urban police and security forces, who attend their
public rallies and get copies of their flysheets and pamphlets. They
anticipate the casualty list which follows from each night's wall-
painting or window-breaking. They sign petitions to parliament
demanding redress of wrongs. They do not seek anonymity, but
are eager to be heard and talked about in the market place. They
even lay claim to the achievements of competitive groups when these
earn public approval. They turn failure to advantage if it can serve
to arouse the sympathy of the people, proclaiming their martyrs to
the cause of freedom.
They do these things because the future success of the insurgency
depends on the establishment of a broad popular base, but there is a
contradiction between the importance of security and this need for
numbers. Mao Tse-tung recognized the paradox but did not resolve
it when he wrote that although closed-door sectarianism was im-
permissible, vigilance against infiltration of the ranks was essential.;
The contradiction is in practice resolved by compartmenting overt
from clandestine activities, though coordinating the steps in each, and
minimizing the possibility of compromise for the secret cadres.
Because of the sensitive organizational knowledge held by an area
coordinator, the fewer people who know his identity, functions, or
business or home address, the better his security and that of the
groups for which he is responsible. "Street" and secret cells are
established in both the city and the countryside. The members of a
street cell do not know the identities of their colleagues in the secret
cell. The members of the secret cell may learn the identities of those
'Mao Tse-tung, Selected Works. (New York: International Publishers, 1954.)
Vol. 2, p. 249.
Ap bved For Release 2005/05/16: CIA-RDPW +J4k(60 f 10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Insurgent Counterintelligence OFFICIAL USE ONLY
whose overt duties get their names into the papers, but the reverse
should not be true. The identity of the secret coordinator is similarly
unknown to the leader of a street cell; each is required to report
separately to a central committee.
As a safeguard against possible compromises among the secret
cadres General Bayo recommended that an urban underground be
divided into cells of no more than three persons. He warned against
having cells of eight to ten men each, some of whom also served as
chiefs of lesser units.4 His proposed figure, however, does not take
into account the security hazard to an organization in which one
of every three persons communicates with higher echelon. Under
this arrangement an urban coordinator must communicate with seven
of every twenty-one persons working under his direction. He can
reduce these heavy communication needs by adopting a cell of seven,
so that he deals with only three persons out of twenty-one.
For field guerrilla units General Bayo proposed no more than ten
to twenty men per cell: "The smaller the number, the greater the
mobility." s These figures are particularly applicable to the Andean
regions of South America. A larger group would find it difficult to
conceal its members for any useful length of time from the gossips of
the Indian communities. The guerrilla chief would have difficulty
controlling his group. And forage is scarce and the Indians poor.
Topography determines the size of field units in the Peruvian sierra.
Security with Recruits
In the field, in order to preserve the security of guerrilla camps,
the initial training-assessment of guerrilla volunteers is usually carried
out by street-type units which operate under the guise of sports clubs.
Yet the security of these units is critical. It is difficult to conceal
the absence of young men from their villages or fields for any extended
period of time. Their lack of discipline, their status as weekend war-
riors, and the possibilities of dissatisfaction or defection are matters
of great concern. Therefore instructors are brought to the training
camps from the cities or from another country to work under aliases
with students whose true names they do not know. Classes are held
at night in areas remote from main settlements. The students are
kept for one or two hours at the most, or only for as many minutes
`Ibid., p. 45.
'Ibid., p. 20.
Appr 9 4 F9694'1605/05/16: CIA-RDP78TO3194A0003000fd001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
as they might spend away from their own villages visiting friends.
The stated purpose of the instruction is training in guerrilla warfare,
but at this stage the main aim is assessment of the student.
The urgent task of a training cell coordinator is to satisfy himself
about the reliability and personal security of a volunteer, He tries to
learn as much as possible' about the man during the few hours he has
him under observation. Might he really be working for the govern-
ment? In any case can one trust him with secrets? With money-
or the lives of others? What is his motivation?
The coordinator's assessment constitutes the first line of defense
against police penetration of the insurgent organization. And if the
police manage to penetrate his training group they will encounter
many safeguards set up to limit damage to the movement.
In advance of the training-assessment, investigation and surveillance
are essential for checking the bona fides of volunteers. For this work
the organization selects individuals who have or can build a suitable
cover. They may work under the cover of beggars or in the guise
of persons seeking employment. The investigator asking questions
about the candidate may do so under the pretext of collecting a debt
or of selling goods or services to homes in the neighborhood.
In a typical case an investigator who has the job of checking a
volunteer's background will first find out where he lives and talk to
shopkeepers in the immediate neighborhood, corner news vendors,
barbers, and coffee boys in nearby cafes. He tries to elicit com-
ments that point to lines for further investigation: "The police often
talked to him, though his mother says he has been in no trouble."
"He applied for a government job and then went away." "He owed
me much money and ran off." Then the investigator will report to
his superiors and intensify his inquiry. His search for information
is no less thorough and frequently more so than that of government
investigators. The insurgent organization has more at stake.
Communications Security
Communications are the most sensitive element in any secret ac-
tivity. If an adversary gains control over one of the links in a com-
munications net it can monitor or exploit a group's transmissions,
rendering the work of the group hazardous or useless and collecting
leads for further penetrations. For this reason an insurgent organiza-
tion must have arrangements whereby funds, material, instructions,
AppAdved For Release 2005/05/16: CIA-RDPnMtJAdp 03?0,'40001-1
Approved For Release 200(05/16: CIA-RDP78T8~3F11UA0q9,108fRGp1-1
Insurgent Counterintelligence
and reports can be passed among its members with a high level of
security. It may use personal contact, mail, telephone, telegraph,
newspaper advertisements, couriers, drops, and signs or signals con-
cealed from the general public, but it observes the principles of
communication which are gospel to illegal groups throughout the
world.
It uses codes and cover names in both oral and written comimunica-
tions. It conceals the identities and missions of its couriers from
echelons which have no need to know them. The couriers use a
cover which fits their background and skills. They set up alternative
meeting sites in any plan for contact, and they give signals to indicate
an absence of danger before going ahead with a meeting. Similarly,
the organization may transmit a broader warning to its people by
simply refraining from an otherwise indicated action. It may direct
that compromising materials be passed by means of drops even when
it has authorized a personal contact between the members in question.
Or it may order that personal meetings be held to a minimum even
when the participants have plausible social or business reasons to
meet: what seem good ostensible reasons to them may not be readily
apparent to a police observer.
The significance of these precautions should be evident. Unless
the police get the details of a prisoner's safety signal, he can, when
they release him under their concealed control, warn an approaching
colleague of danger just by taking no action to indicate its absence.
Or if the police do not learn in time about a prisoner's next regularly
scheduled meeting, his failure to make it will warn his headquarters
of trouble. Or failure of a scheduled safety check which requires his
presence at a specified place and time for observation by insurgent
surveillants may give the warning.
Insurgents generally avoid the use of the mails for sensitive com-
munications. They may send innocuous messages by telephone or
telegraph to signal the safe arrival of a member or to request a per-
sonal contact, but they prefer to keep in touch by courier. A courier
can see his contact, satisfy himself that the man is not in. custody,
conduct a countersurveillance to ensure that he is "clean," assess his
behavior for the enlightenment of the leaders, and give instructions
orally in more detail than a letter can.
The insurgents often use drops for the transmission of funds, in-
structions, or material. These drops need not have a KGB sophistica-
tion if they serve to conceal the act of communication. They may be
OFFICIAL USE ONLY 43
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Ap roved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
a hole in a tree, a hollow under a stone, or a crevice in a wall. Or a
fruit jar buried in a field, a flower vase in a cemetery, or a. kilometer
marker on a desert road. They need only to be places to which both
parties have normal access and can devise acceptable cover stories
to approach.
Names and Identities
It is a common practice for members of illegal groups to use war
names to help conceal their true identities from colleagues and ul-
timately from security forces. Peruvian security police must have
spent long hours in their analysis of a message they found among the
personal effects of a prisoner:
Tell D-1 that B-145 will arrive tomorrow morning at 12 noon en Canadian
Pacific. Tell him to alert Grity, Malla, Maruja, Pasch, Hilda that all is well."
The war name is used in secret oral and written communications-
in messages, in discussions at cell meetings or around campfires, some-
times in formal reports in place of numbers. It should not be on
personal documents or in pocket litter. If compromised, it is changed.
A war name may or may not match the sex of its bearer. It should
not link a man to a trade or a region. It may be a full name-Jose
Armand Dubois-or simply Armand. It may be "Saxon" only if its
bearer is not from Saxony; "Quasimodo" if he is not a hunchback;
"Stupid" if he is not.
A change of war names creates problems for the police. They can
learn of one name through penetration of enemy communications
or from careless talk by members of the insurgency, record it, and
begin to build a profile of the bearer. But a change vitiates these
records. It leads to inaccurate estimates of insurgent strength or,
more seriously, to confusion of identities. The police find themselves
wondering if Jose has replaced Juan as the leader of a unit, or
indeed whether Juan was ever the leader, or if Jose and Juan are pos-
sibly identical. From this uncertainty the insurgents gain a measure
of security.
The insurgent organization, for its part, makes every effort to iden-
tify individual police officers, police informants, and hostile installa-
tions. It prepares lists of such individuals and installations and briefs
its couriers and action units to avoid them. It avoids putting a safe-
site in the area of a police or security establishment. It directs a
Correo (Lima, Peru), 9 January 1964, p. 2.
Approved For Release 2005/05/16: CIA-RgfR&iiY i&0 b'6010001-1
Approved For Release 2005/05/16: CIA-RDP77TAJ'~JeA8ff38S11O001-1
Insurgent Counterintelligence V
threatened unit to move to a place more remote from such an establish-
ment. A courier is given the physical description of a security official
operating on his route so that if he is caught he knows whether he is
in the hands of security personnel or less dangerous adversaries.
Controls over Cadres
The insurgent organization usually imposes travel restrictions on its
cadres and couriers. It warns them against carrying documents which
conflict with agreed cover stories. It emphasizes the value of story-
confirming pocket litter, such as a letter from the family requesting
that their son return home (a usual explanation for travel) or match
boxes from a hotel where the traveller claims to have stayed. It
finances small purchases of hardware or food from the town in which
he claims past residence, or of materials related to his professed
occupation, and has him carry the receipts for these purchases.
The organization creates a system whereby one member of a cell
or guerrilla unit is responsible for knowing the whereabouts of a col-
league at all times. On occasion it checks the whereabouts of some
particular member. It may send a coded telegram directing him to
report to a specified address. It may telephone his residence from
a pay booth to see whether he is home. It may send a courier, if he
lives in a distant province, with an order that he report to the capital
city. If he is absent from his assigned post without cause, the leaders
order an investigation.
In an insurgency the problems of control are intrinsic, far surpassing
those encountered by the government in its secret work. It is part
of the secret insurgent's business to know how to cover unauthorized
or illegal ventures with plausible explanations. Before he opens his
door to step forth on a secret action he has readied multiple cover
arrangements. (He is going to buy bread or pay an account at the
cafe. But on the way he passes an old wall, and if there is a sign
on it he must service a drop a block from the town plaza. The way
to this drop is fortunately also the way to an old friend's house, so he
is covered at every point.) He lives in a world of security arrange-
ments and survives by observing them. If the police recruit him, he
has only changed sponsors, not this security way of life. The in-
surgent leaders have a constant concern over this possibility-. They
cannot object to a suspect's covering his movements and engaging
in practices they have taught him to be essential to good security.
45
Appro\,Qhese 10/05/16 : CIA-RDP78T03194A000300010001-1
AppraF ICd IAI Release 2005/05/16 :CIA-RDP78T03194A000300010001-1 USE ONLY Insurgent Counterintelligence
They must therefore refine their controls and devise tests to assess
his reliability.
Some tests are simple. The leaders may give Jose letters to mail
to Alberto. By instruction Alberto returns these unopened. Had
Jose opened the letters? They may direct Jose to service a drop con-
taining a specified sum of money. Jose finds in the drop a sum
far in excess of what he was told to expect. Does he turn it all over,
or only the specified sum? They may order Jose to take a trip. Dur-
ing his absence a team searches his house or room for any records
he may have kept in violation of secrecy rules. It also assesses his
household possessions against his known income. If it finds nothing
it may leave some clear evidence of its search. Does Jose report a
suspicion that his quarters were searched in his absence?
The leaders may write Jose a letter as though from the security
police and ask his cooperation. They include a sum cf money as
evidence of good faith and give instructions for future contact. Does
Jose report this attempt at recruitment? Does he hand over the
letter and the right amount of money? They may place him under
carefully concealed surveillance for a period of time and then ask
him to submit a written report on his activities and contacts during
that time. What items does his report omit? They may brief him
on an impending violent action against the government and then
surveil its site. Have the police been warned? 7
The courage, patience, and altertness of members can he tested by
other devices. But the all-important thing is reliability and honesty.
In a sense, with this need to he sure of the full loyalty of its people,
the insurgent organization thrives on suspicion. Yet the pressure of
its controls breeds discontent among members. When malcontents or
traitors are uncovered, the leaders reemphasize the rules of conduct
and establish new levels of severity which further disgruntle the
membership. At the same time, however, these restrictions and con-
trols do make the life of an agent who penetrates the group both
difficult and hazardous, and his case officer must have a thorough
knowledge of the protective tactics used by the dissident leaders.
'These techniques and many other aspects of insurgent modus operandi herein
cited are described in Andrew T. Molnar, et. al., Undergrounds in Insurgent, Revo-
lutionary, and Resistance Warfare. (Special Operations Research Office, The
American University, Washington, D. C., 1963.) pp. 33-34 et passim.
46
Approved For Release 2005/05/16: CIA-RD *9 ?0 6'10001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Insurgent Counterintelligence OFFICIAL USE ONLY
The Uninvited
The insurgent takes measures to guard his camp or cell against
those who come uninvited to the door. He extends a cautious wel-
come to any newcomer and examines the man's credentials with care.
In the world of counterintelligence no one assumes he knows whom
he is dealing with.
When camp outguards intercept a newcomer they follow a pre-
arranged reception plan. They usually take him to a site removed
from the main camp. They get his full name, address, occupation,
the route by which he came, the identity of anyone who may have
directed him to the camp, and the whereabouts of his family. They
ask who knew of his intention to come. They ask what his friends,
family, or employer think he is doing now.
The camp chief checks the man's biographic data against the
knowledge possessed by members of his command. If he claims to
be a fisherman from a particular village, and if there is a guerrilla
in the camp who knows the people and principal officials of that
village, the story can be readily checked. If he claims to have walked
there by a particular route, his shoes are checked against that claim.
If he says he was directed there by a friend sympathetic to the move-
ment, the friend's identity will be checked by investigative personnel
in the place concerned.
Clothing is given the newcomer in exchange for what he wore
when he came. Guards check the latter for labels, quality, markings,
wear, and travel stain as evidence to support or refute his story. They
check letters, identity or voter registration cards, matchbooks, and
cigarettes. They may check his health and appearance against their
estimate ,of the wear and tear of his professed occupation and recent
experience. The guards who live with him at the processing camp
make every effort to get him to talk freely. They talk about the area
he came from, question him concerning his likes and dislikes, and
comment on true and notional personalities in his home village.. Does
he truly know the mayor of the village? Does he also know one
Senor Gasco de Barmas--a creature of their imagination? Has he
really been in that small bar to the right of the alley of women?
Conversely, the guards avoid talking about the number, equipment,
supplies, plans, activities, or true identities of the guerrillas. They
use their war names in conversation. They do not discuss other
members of the group, their comings and goings, or their problems.
Appro& cfl k2ggis@ t5/05/16: CIA-RDP78T03194A00030001dV01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
The camp chief sends the details of the newcomer's story to an area
coordinator for investigation. If no information is turned up to refute
the story he may then direct him to report to a training camp. When
the man is gone he moves his command to another site, since its loca-
tion had become known to a person of unproved reliability.
If the area coordinator concludes from his investigation that there
is reason to doubt the volunteer's bona fides, he may order the camp
chief simply to desert the suspect as he moves his group to the other
site. Or put him in charge of a remote, unused camp site and leave
him there. This is a very good thing to do. If the boy works for the
police he has no contact with them now and we can move freely
out of the area. The boy guards an old camp of straw- huts and
latrines. He believes that we will return and take him with us. But
the camp is very far away from any village. He dares not leave to
make contact with the police because who knows when we might
return? So he sits out the days. Or the area coordinator may, finally,
direct that the suspect be escorted to a point near the city, where he
can be tricked into an overseas trip for "training," i.e., interrogation
under control.
A camp chief must be concerned about the presence in his area
of any competitive groups of dissidents. He remembers that Fidel
Castro, as dictator, had some success in establishing state-controlled
guerrilla groups which served as magnets to draw the discontented,
the dissident, or the disillusioned to their graves. Or he remembers
groups which volunteered to join his own but then brought problems
of command which he could not control. If he discovers that he has
a genuinely competitive though friendly group as a neighbor, his
worries are not less. It may not have good security, may not be
careful in assessing its membership. He cannot afford to be caught
in a counterinsurgency sweep even though he may not be its target.
Once, said the boy, some fishermen gave me a ride in their boat.
did not know they were smugglers. The police caught is all-but
it was me they tortured.
A camp chief must beware of hunters or zoologists who roam his
area. They may report his presence to the police. He must also
beware of the local peasants' penchant for gossip; the civil guard has
long ears. At the same time he must keep the peasants' favor, since
he cannot survive their enmity. In anticipation of the eventualities
lie readies alternative camp sites for use by his group. At a time of
ApW$oved For Release 2005/05/16: CIA-RDF SAID006W10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Insurgent Counterintelligence OFFICIAL USE ONLY
danger he may move his people to one of these or, with central com-
mittee approval, disband the force and direct its members to fade
into the cities and villages.
The Counterintelligence Organization
The guerrilla chief and the area coordinator have prime responsi-
bility for the counterintelligence effort. General Bayo felt so strongly
about the contribution of counterintelligence to the revolutionary
movement that he recommended the second in command be put in
charge of it. The counterintelligence organization is responsible for
the security of the movement's personnel, assets, and activities. It
acquires sources to report on hostile security organizations and com-
petitive groups, maintains appropriate records, and isolates and in-
terrogates hostile agents. Ordinary members of the movement know
that it has a counterintelligence capability, but not what assets are
involved; the counterintelligence personnel are concealed from the
rank and file.
The counterintelligence program usually includes periodic lectures
on security discipline, spot surveillance of personnel, and provocative
tests of loyalty. An effective program which can strengthen the
group as a whole provides for each cell to appoint one of its members
secretary for discipline. This member is charged with enforcing
the .decrees of the central committee and maintaining an acceptable
level of security. He gives lectures, ensures the security of cell
meetings, reports secrecy violations to the cell chief for transmittal
to higher echelon, and carries out other security and counterintelli-
gence tasks as assigned by the central committee.
The Tainted
The insurgent organization also safeguards its security by taking
prompt and effective action against suspect members and newly re-
leased prisoners. When a member is arrested it orders his immediate
colleagues into hiding. It seals off the activities in which he was in-
volved, changes communication systems known to him, and sends
his family to a safesite. After taking these immediate protective
measures it analyzes the circumstances of his arrest. It investigates
anyone who might for some reason have reported him to the police.
It questions his wife to assess her attitude toward him. It may, if
time permits and a preliminary analysis does not warn against it,
search his home and examine his personal effects to satisfy itself
ApproQVQ& a sP 5/05/16: CIA-RDP78T03194A000300010~1-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
that no record of his activities is there. If his knowledge includes
matters of an unusually sensitive nature, it may take action to deny
the government the advantage of it-a smash-and-grab raid, or pre-
ventive executive action against the prisoner himself.
Each member of an insurgency is instructed in advance on what
steps he should take on release from prison. He should make no
written or oral contact with his group but proceed to a designated
point at a time set for this purpose. If countersurveilh.nce shows
no hostile coverage of the former prisoner, the counterintelligence unit
will pick him up and take him to a rendezvous from which a second
group will transport him to a safesite for interrogation. This pattern
of countersurveillance and reacquisition is standard procedure. The
safeguards are obvious.
At the safesite counterintelligence specialists question their colleague
in detail. When and where was he arrested? Who were the arrest-
ing officers? What charges did they levy against him? Was any-
one arrested with him? Where was he taken? What questions were
asked? Was he shown photographs of individuals to identify? Whom
did he identify? Was he given maps on which to pinpoint facilities?
What safesites or communications did he reveal? Was he asked
to cooperate with the police? What did the police promise him?
Was he forced to cooperate? (A man can be brave but need not be
foolish, they tell him. If he was forced to talk, they know he did
so from prudence and not from fear or greed.) But what did they
promise him? Where was he jailed? How does he know? What
were the names of his guards? How does he know? Was he in-
deed tortured? Did he have a cell mate? What was his name?
O id they engage in conversation? What was said? Now, where
did he go upon release? Whom did he talk to? What did he tell
the neighbors? Whom did he try to contact? How?
It is important to know what the charges were against the member
and who his jailor was. If the charge is black market dealing and
the arresting authority the financial police, the insurgent group's
problems may be less serious than they might have been. Although
a member who deals in the black market for personal gain is not
one to be trusted. financial police do not generally have the same
level of competence as the security forces. Their interests do not
usually impinge on the very security of the state and they are not
skilled interrogators-and only determined and experienced officers
can get critical information from members of a well-run insurgency.
Ap 11oved For Release 2005/05/16: CIA-RD t94)M QQ'Q10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Insurgent Counterintelligence OFFICIAL USE ONLY
It is also important that the group know what its colleague may
have revealed of its interests. Unless he is part of the central com-
mittee, a member does not usually know how sensitive each item of
information he possesses is. He may, like Ito Ritsu, whose red-herring
revelation ultimately led the Japanese police to Richard Sorge, give
his captors the name of a person whom he believes is expendable.
If the dissident movement believes its colleague behaved correctly,
it will order him to return home and lie low for a period of time. It
may permit his family to rejoin him, since that would be normal.
It will direct him to cease all contact with the movement until in-
formed to the contrary, and it alerts its membership to this effect.
It then checks the details of his story through various counterintelli-
gence assets. If it comes to believe that the man has turned against
the movement, it may redouble him, turning him back against the
police, or order him to leave the country illegally and go to Cuba
for "his own security," i.e. liquidation.
General Bayo recommends the execution of traitors in these cir-
cumstances. Although this worked in Castro's insurgency it is not
always the end of the victim's influence. An execution in the home
country leaves emotional scars and memories which return to haunt
the executioner. But death by accident in another country, while
on a mission for the movement, provides inspiration for those who
remain behind. Counterintelligence disposes of a threat and gains
a hero.
Instead of by killing, a police agent may be blocked by provoca-
tion. Once we learned that a shopkeeper in our city worked as an in-
formant for the police. We decided to destroy him But how? To
kill was easy. But the police would investigate. They would, of
course, know why he was killed. Some of our people would be picked
up as suspects. They would be hurt. They were brave, but they
might talk. It would be a mistake. We thought of other things.
One of us thought of something that was very good. The informer
was a good family man. A bad person, but a good family man. He
had one child, a four-year-old girl. She had white hair and blue eyes.
He loved her very much. We often saw him buy her ice cream, and
then they would walk home together. We bought a doll that had
blue eyes and white hair. We dressed it in white. It was very beauti-
ful. We crushed its head with a rock and put it on the doorstep
of his house and rang the bell. We ran off and into a building from
where we could watch. He came to the door. At first he looked
Appro9~Slpd' IR ~sQ~b~5/05/16: CIA-RDP78TO3194A000300016 01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Insurgent Counterintelligence
around, I think a little afraid. And then he saw the doll. He shut
the door very quickly. The next day he left with his wife and child
for the capital. He did not return. He did not pay his servants;
they were very angry. The police arrested no one.
The insurgency makes every effort to place its informants as serv-
ants in the homes of police officers, in police clubs, or with other
hostile personalities. The value of such plants is evident. They can
get useful information from dinner conversations or by answering the
telephone in the absence of their master or by monitoring his mail.
The movement also uses money or persuasion to acquire informants
in opposition political groups or security organizations. Since the
conditions which give rise to the insurgency also affect the living
standards and hopes of the noncommitted, opportunities for recruit-
ment of sources in hostile groups are many. A little money, a little
uncertainty, a little fear-and we find friends. We. even make friends
in prison. If I am detained I am authorized to offer so many dollars
to my guard. If he doubts the validity of this offer, because I seem
poor and dirty, I let him see a part of the sum. Not from me, but
from the committee. That the committee can offer such a sum, small
to us but great to him, makes an impression. He leaves the question
open and an open mind for the future. We do not press. The next
time he has more trust.
You see, we build trust in people. Only the police destroy; we
build. Soon this guard, because he likes money, and because he
has learned to respect our work, and maybe because he fears us just
a little bit, is cooperative. He passes information which may or may
not be important. What is important is the fact that he passes it.
To know that your family will be permitted to visit you in prison is
not a great thing, for example. But the fact that the guard tells you
this is important. He has taken a step, a first step.
Penetration of competitive political groups is not a major problem.
Since these are aiming in part at the same goals, an organization which
has contacts abroad and funds at hand finds congenial spirits among
such competitors. An aggressive leadership, a record of publicly ac-
knowledged accomplishment, or a known plan for the future often
suffices to ease the conscience of selected competitors who cooperate,
telling themselves that the means to an end are not important.
App*ved For Release 2005/05/16: CIA-RDP Q*4M??0MY10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Insurgent Counterintelligence OFFICIAL USE ONLY
Thus the insurgent organization takes certain protective measures
to counter the espionage and disruptive efforts of opposing forces.
These measures are designed to conceal its organization, plans, per-
sonnel, assets, and activities from hostile penetration. Since, how-
ever, defensive measures cannot by themselves ensure security, it
assigns counterintelligence personnel the task of learning about the
plans, personnel, operations, assets, and organization of its adversaries.
These counter-efforts are often the first significant contact between
the contending forces. They precede open skirmishes in the field;
they are a prelude to any war for national liberation. On this plane,
and at this time, the fate of the opposing factions is often decided.
ApprovQIS'P6'? P,M?gas9 fl65/05/16: CIA-RDP78T03194A00030001( 1-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL
No Foreign Dissem
The fleshing out and some
wobbly first steps as CIG.
CENTRAL INTELLIGENCE UNDER SOUERS
Arthur B. Darling i
The first Director of Central Intelligence was well aware of the
latent power bestowed on this office by the President's Directive of
January 22, 1946. Admiral Souers wished to see the functions of
the Director mature under the guidance of the departmental secre-
taries and the personal representative of the President who constituted
the National Intelligence Authority. But he also knew that many
in the Army, the Navy, and the Department of State were still re-
sisting every thought of a central intelligence organization which
might overpower their own intelligence agencies. The Authority, the
Director, and the Central Intelligence Group were bolstered by no
supporting legislation from the Congress. They rested only upon this
Directive by the President to the Secretaries of State, War, and the
Navy. And the President's legal authority to issue the Directive was,
with the expiration of his wartime powers, at best questionable. Souers
appreciated that this was no time to foster misgiving or animosity.
No rough waters should be raised as Congress approached a reorgani-
zation of the national military establishment in which the central in-
telligence system would have a part.
Admiral Souers' immediate objective was to get the CIG estab-
lished and in operation as a small body of experts drawn propor-
tionately from the departments and serving the departments under
supervision and control of the department heads in the National In-
telligence Authority. The power inherent in the DCI's duties and re-
sponsibilities should wait until later for development. Moreover,
Souers did not accept Donovan's principle that the DCI should ever
be independent of the departmental secretaries, equal if not superior
to them, and responsible directly to the President .2 He believed that
1 Adapted from a history of the Central Intelligence Agency prepared by the
author in 1953. For preceding installments see Studies VIII 3, p. 55 if, and X 2,
p. 1 if.
' See the author's "The Birth of Central Intelligence," Studies X 2, p. 2, for a
summary statement of Donovan's concepts.
Appr P TJk6se 2005/05/16: CIA-RDP78TO3194A0003000f(6001-1
MORI/HRP PAGES 55-74
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
such independence would not place the Director close to the Presi-
dent, but would tend in fact to isolate him from the President. An
independent DCI would discover that often he and his agency were
shut off from the President by the interests and representations of the
departments. Through their prestige and functions they were likely
to have greater power, at least of obstruction.
As a practical matter, in politics and the science of government,
such an extraordinary officer as the DCI needed, in Souers' view, the
company of other officials. On occasion he might find their opposi-
tion almost as useful as their assent. His position might become
clearer and stronger, at least it would command attention, because
it had to be formally opposed. An independent Director of eminence
and exceptional force might realize Donovan's concept, by-passing
the departments to deal directly with the President, regardless of
obstruction. But even such a Director would have to keep ever-
lastingly at it, and he would always have a hidden war on his hands.
The time for a DCI with those attributes was not at the start of the
new organization in February 1946. It might not survive the battle.
A Cooperative Formed
It was Admiral Souers' nature to remove issues rather than to create
them. And like Eberstadt, he was mindful of the benefits which might
be obtained from "parallel, competitive, and sometimes conflicting
efforts." 3 According to the President's Directive, which he himself
had shared in writing, the persons assigned from the departments
were "collectively" to form the Central Intelligence Group. His draft
on February 4 of the first directive to himself from the National In-
telligence Authority, therefore, declared that CIG should be or-
ganized and operated as "a cooperative interdepartmental activity."
There should be in it "adequate and equitable participation" by the
State, War, and Navy Departments and by other agencies as approved
by the Authority. The Army Air Forces should have representation
on the same basis as Army and Navy; there was likely soon to be a
Department of Air.
Those in the Bureau of the Budget and the Department of justice
who watched legalities were uneasy about the dubious validity of
the President's Directive. The draft of an executive order, approved
' From Eberstadt's study for Forrestal of the proposed merger of the War and
Navy departments. Souers had written the military intelligence section of this
report. See ibid., p. 10.
Appr Wed For Release 2005/05/16: CIA-RDP78TO313MNMBW640001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CIG Under Souers CONFIDENTIAL
by Acting Attorney General J. Howard McGrath, was ready in Feb-
ruary to replace the Directive. The view of the National Intelligence
Authority was that no impediment had so far been encountered in
carrying out the Directive, but there was no objection to having an
executive order as well, if its effect were to "confirm and formalize"
the status of the Authority and the CIG as a "cooperative interdepart-
mental activity, rather than a new or independent agency requiring
legislation for its existence."
The questionable rationale for regarding it as a joint activity rather
than an agency rested on the fact that personnel and funds were to be
contributed by the participating departments. It should be noted,
however, that administrative chaos would have been the result of
trying to administer it on a joint basis. The departmental secre-
taries therefore had to empower the Director of Central Intelligence
to exercise the same authorities over the funds made available to him
as they themselves could exercise. Thus the effect was to create
an operating agency.
Further discussion and study of the question continued through the
spring. By May 23rd all parties were willing to accept the above
rationale and let the Directive stand for the time being. No one in
the Executive Branch was going to raise the issue publicly and
formally; and the Comptroller General, who could have done so,
agreed with the need for the organization and was willing to let it
proceed until legislation could be obtained. Until superseded the
following year by the Central Intelligence Agency, established by act
of Congress, CIG therefore rested upon the President's authority under
the Constitution, with no particular reference to his war power, in
the face of a statute that prohibited the establishment of an operating
agency except by legislation.
To satisfy President Truman's wish that CIG should bring all in-
telligence activities into coordination and harmony, the first NIA
directive constituted of the departmental intelligence chiefs an In-
telligence Advisory Board, and Admiral Souers planned to keep its
composition flexible. Its membership, in addition to the chief in-
telligence officers from the Departments of State, War, and the Navy
and the Army Air Forces, should include representatives from other
agencies of the government at the Director's invitation. This gave
room for the Federal Bureau of Investigation, for example, to have a
representative present on questions of internal security or the collec-
tion of intelligence in Latin America.
Approved or F eTease 2005/05/16 : CIA-RDP78T03194A000300 0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
Having the same purpose of coordination in mind, Admiral Souers
preferred in the beginning to name ad hoc committees to study and
report on specific problems of interdepartmental concern. The com-
mittee members would represent the permanent departmental mem-
bers of the Intelligence Advisory Board, with a chairman drawn from
CIG to act as "coordinator." In theory this procedure promised the
greatest cooperation and harmony possible. The practical difficulty
of obtaining the representatives from the departments to man the
ad hoc committees and to accomplish their work in time, however,
was discouraging. Sowers soon turned to his Central Planning Staff
to handle such problems.
It was going to be none too easy to apportion out CIG appointments
among the departments and secure persons both competent and in-
clined to enter the central intelligence service. But Admiral Souers
did not find it hard to fill his top positions. Kingman Douglass, who
had been a representative of the Air Forces at the Air Ministry in
London and knew much about the British system, became Assistant
Director and Acting Deputy Director. Captain William B. Goggins
came with intelligence experience from the Navy to head the Central
Planning Staff. In April Souers would appoint Colonel Louis J. Fortier
Assistant Director and Acting Chief of Operational Services. He had
served on the Joint Intelligence Staff for the Army and had just
finished chairing a study of the clandestine operational assets left
by the OSS and now held in escrow in the War Department as its
Strategic Services Unit.4
Souers obtained James S. Lay, Jr., from the State Department to
be Secretary of the Authority and of the Intelligence Advisory Board.
Lay had been Secretary to the joint Intelligence Committee of the
Joint Chiefs of Staff. Ludwell L. Montague also came from State
to head the Central Reports Staff. He had been Secretary of the
Joint Army-Navy Intelligence Committee in the fall of 1941, then
Secretary of the Joint Intelligence Committee of the Joint Chiefs of
Staff and a senior Army member of its joint Intelligence Staff through-
out the war. Both Lay and Montague had participated in the dis-
cussions which had contributed, along with Donovan's "principles"
and Magruder's thinking, to the eventual formulation of the Presi-
dent's Directive. They had been chosen by Alfred McCormack for
'In July, after General Hoyt Vandenberg took over as DCI, both Douglass and
Goggins were transferred to positions under Fortier's successor, Colonel Donald H.
Galloway.
Appro d For Release 2005/05/16: CIA-RDP78T0319ZQbW11 bU1 01-1
Approv"SQr Release 2005/05/16: CIA-RDP78TO3194A000300010001-1
n er ouers CONFIDENTIAL
his prospective central intelligence system under the State Depart-
ment.6 Both were expert in the work which the new CIG was to
undertake and qualified to aid Souers immediately, as they did, in
writing the directives of the National Intelligence Authority. CIG
had begun to take form on January 25.
Operational Information
The draft of the first directive to Souers in February followed the
general design of the President's Directive of January 22.6 But there
was one clause in the draft so filled with past controversy and indica-
tive of more to come that it did not appear in the directive as finally
adopted by the NIA. Article 7 of the draft submitted by Admiral
Souers stipulated that the DCI should have "all necessary facilities,
intelligence, and information in the possession of our respective de-
partments, including necessary information as to policies, plans,
actions, capabilities, and intentions of the United States with reference
to foreign countries." At Souers' own suggestion, the clause con-
cerning the capabilities and intentions of the United States was stricken
from the draft in the first meeting of the NIA on February 5, 1946.
There was no explanation in the minutes, but one can reconstruct
the reasons.
It is easy to presume that those who had been so reluctant to
give the Office of Strategic Services and its Research and Analysis
.Branch access to strategic information 7 were no more willing now to
supply to the new DCI knowledge of their own capabilities and
intentions. And at the first intimation that the specific inclusion of
this provision might stir resistance in the armed services over their
right to withhold "operational" matters, Admiral Souers preferred to
remove the statement with no argument. The beginning of the CIG
was precarious enough without inviting trouble that could be post-
poned. According to Souers, the Army and the Navy both under-
stood that he was entitled by the President's Directive to have all
intelligence in their possession. From their point of view, he said,
information about "policies, plans, actions, capabilities, and intentions
of the United States" was not intelligence. In their thinking, the new
'For McCormack's plan, as opposed to that for an independent or at least
interdepartmental central intelligence, see "The Birth of Central Intelligence,"
Studies X 2, pp. 6-10.
For a resume of the Directive's provisions see ibid., pp. 17-19.
See the author's "Origins of Central Intelligence," Studies VIII 3, pp. 62-65.
CONFIDENTIAL
Approved For Release 2005/05/16 : CIA-RDP78T03194A00030001a801-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
Central Intelligence Group was expected to purvey all its knowledge
to the departments, but the reverse was not entirely true, particularly
with respect to "operational" information.
Close examination of Article 7 as issued in final form by the NIA
nevertheless reveals that the Authority gave to the DCI the right
to have "as required in the performance" of his authorized mission,
"all necessary facilities, intelligence, and information" in the posses-
sion of the departments. This distinguished "intelligence" from "in-
formation" but applied to both the unequivocal "all," modified only
by the requirements of the CIG mission. That mission, as stated in
Article 2 of the directive, included furnishing "strategic and national
policy intelligence to the President and the State, War, and Navy
Departments." And knowledge of the nation's own capabilities enters
into the intelligence which is necessary to determine the policy for
maintaining the nation's security. The requirement of an effective
national estimate is that it shall be compounded from all facts to be
had from every available source.
Dissents
Article 3 of the first directive to Souers stipulated that 'all recom-
mendations" of the DCI should be referred to the Intelligence Advisory
Board "for concurrence or comment" prior to submission to the Au-
thority. If a member of the IAB did not concur, the Director was to
submit with his recommendation the member's explanation of his non-
concurrence. Only if the IAB approved the Director's recommenda-
tion unanimously might he put it into effect without action by the
Authority.
The Lovett Committee 8 had proposed such a procedure for national
estimates to safeguard the interests of the departmental intelligence
services as they came under the coordinating power of the central
intelligence organization. William H. Jackson's letter to Secretary
Forrestal contained a similar provision." But this stipulation, which
eventually became established practice in estimating, was to be, in
its application to "recommendations," the center of controversy be-
'Set up in the War Department on October 22, 1945, to study the diverse pro-
posals for centralizing intelligence. Its report did much to crystalize interdepart-
mental thinking and led directly to the President's Directive of 22 January. See
"The Birth of Central Intelligence," Studies X 2, pp. 8, 12-14.
9Ibid., pp. 12-13.
App ved For Release 2005/05/16: CIA-RDP78T0~4~OOD300010001-1
Approved For Release 2005/05/16 : CIA-RDP78T031 C
CIG Under Souers ~El11R001-1
tween subsequent DCIs and the IAB over the administration of the
CIG and its successor CIA. The chiefs of departmental intelligence
used it to try to make themselves the governing board of the "coopera-
tive interdepartmental activity." If they had their wish, it was not to
be an independent agency.
Secretary Byrnes, just returned from London, presided over the
first meeting of the NIA on February 5, 1946. Byrnes wished to make
it clear at once that the Department of State was responsible for report-
ing to the President on matters of foreign policy. And this included
performing the service that the President himself had expressly desig-
nated the first duty of the new CIG: Instead of the piles of cables,
dispatches, and reports on his desk, President Truman wanted a daily
summary that was comprehensive. He wished to be rid of the
mass of papers, and yet to be certain that nothing significant had
been left out.
Admiral Souers endeavored to reassure Secretary Byrnes that the
President expected the DCI only to have the cables and dispatches
digested; there was no intention that the information should be inter-
preted to advise the President on matters of foreign policy. The Sec-
retary nevertheless pressed the point that it was his function to supply
the President with information upon which to base his conclusions.
Admiral Leahy entered the discussion as the personal representative of
the President; information from all three departments, he said, should
be summarized in order to keep the President currently informed.
Byrnes replied that Admiral Souers would not be representing the
viewpoint of any of the departments; any man assigned to GIG from a
department would be responsible to the DCI.
Secretary Byrnes felt so strongly about the matter that he appealed
to the President personally on behalf of the Department of State.
According to the recollection of Admiral Souers, his argument ran
along the line that a digest of incoming dispatches was not intelligence
within the jurisdiction of the CIG. President Truman said it might
not be generally considered intelligence, but it was information which
he needed and therefore it was intelligence to him. It was agreed in
the end that the CIG daily summaries should be "factual statements."
The Department of State prepared its own digest, so the President
had two summaries on his desk. From his point of view, that was at
least some improvement.
CONFIDENTIAL 61
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL C1G Under Souers
Central Planning, March-June 1946
The Central Planning Staff, drawn from the department;, was to be
sensitive to the interests of them all. It should assist the Director in
preparing recommendations with regard to policies and objectives for
the whole "national intelligence mission," according to the second
NIA directive of February 8. Admiral Souers advised Captain Goggins
on March 4 that "as a general rule, the Staff should take the active
leadership in arranging and conducting interdepartmental studies."
One of its members should participate and act as coordinator in all
meetings concerning foreign intelligence related to the national security.
As the use of ad hoc interdepartmental committees proved difficult,
the Central Planning Staff was soon loaded with orders for investigation
and report upon a variety of subjects that were intricate and sweeping.
The Staff had a hand in preparing the executive order which was
intended but not used to confirm the President's Directive. On March
21 it undertook a broad survey of all clandestine collection of foreign
intelligence. On March 28 it received instruction to make a survey
of the coverage of the foreign-language press in the United States.
The next day it was assigned an interim survey of the collection of
intelligence in China. On April 20 it was directed to examine the Joint
Intelligence Study Publishing Board of the Joint Intelligence Com-
mittee and determine whether there should be a change in its super-
vision and control.
The Central Planning Staff inherited a share in the steady of the
Foreign Broadcast Intelligence Service which the Federal Communi-
cations Commission had organized to monitor foreign news and propa-
ganda. The Service had been taken over by the War Department on
the preceding December 30 for the remainder of the fiscal year, and the
War Department wished to have it placed in the new central intelli-
gence organization. But Souers was not eager to expand the opera-
tional services of the Central Intelligence Group. On the basis of an
ad hoc committee's report he had recommended on April 26 that the
War Department continue to operate the Service with a new organiza-
tion, that is with personnel thoroughly screened for security. The War
Department had demurred, May 8, on the ground that the State Depart-
ment was the chief user of this "predominantly non-military intelli-
gence function." The matter was discussed the next day by the IAB.
It was at this point that members of the Central Planning Staff were
directed to consult with representatives of the Assistant Chief of Staff
Approved For Release 2005/05/16: CIA-RDP78T0 % RO 10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CIG Under Souers CONFIDENTIAL
(G-2) and the Special Assistant to the Secretary of State. The result
was that the latter, now William L. Langer in place of Alfred Mc-
Cormack, agreed on behalf of the Department of State that it should
support the FBIS budget, while the War Department continued to
operate the Service, at least during fiscal year 1947. (This working
arrangement was later superseded; eventually the opinion prevailed
that CIG should take over the function as one of common concern.)
On May 31 the Central Planning Staff was directed to make an in-
formal survey of the intelligence available in the United States from
colleges, foundations, libraries, individuals, business concerns, and
other non-government sources. On June 4 it received instructions to
study explicitly the exploitation of American businesses with connec-
tions abroad. On June 6 it was told to look into the problems of
psychological warfare. And on June 7 it was called upon to make
an interim survey of the adequacy of intelligence facilities related to
the national security.
The Central Planning Staff set for itself on the one hand the tre-
mendous chore of elaborating a "complete framework of a system of
interdepartmental intelligence coordination" to be contained in a series
of studies for the DCI. Subjects would include the "essential ele-
ments of information" in a national system and the coordination of
counterintelligence with security, of intelligence research with collec-
tion of information, etc., by means of a coordinating board, a scien-
tific committee, and other interagency committees on military, eco-
nomic, political, and geographical matters. At the other extreme it
made an office space survey of the Central Reports Staff, allotting 90
sq. ft. per person to it.
The Defense Project
In the meantime a substantive interdepartmental project was being
organized. Colonel J. R. Lovell of the Military Intelligence Service
proposed on March 4 a plan for producing "the highest possible quality
of intelligence on the USSR in the shortest possible time." The in-
telligence services of the Army, Navy, Air Forces, and State Depart-
ment should have equal representation on the planning and working
committees of this endeavor, soon to be known as the Defense Project.
It should be subject to CIG coordination. Admiral Souers accepted
the offer at once.
A Planning Committee drew up a proposal which on May 9 was
incorporated into a CIG directive unanimously approved by the .IAB.
Approvne-c1FF~ oFPAlase 2005/05/16: CIA-RDP78T03194A0003000fM01-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CONFIDENTIAL CIG Under Souers
The Planning Committee should choose its own chairman and secre-
tary. A coordinator from CIG should meet with the committee when
appropriate; in case of disagreement within the committee he would
submit the question to the DCI for decision. This DCI responsibility,
however, was more fearsome in prospect than in fact. It would be
some time before there could be any great decisions possible. The
evidence had first to be accumulated.
It was the Working Committee, under the chairmanship of the sec-
retary of the Planning Committee, with the CIG coordinator acting
in advisory capacity, that had the first and most important job. It
was to compile a veritable encyclopedia of "all types of factual strategic
intelligence on the USSR." From this Strategic Intelligence Digest
the member agencies would individually prepare Strategic Intelligence
Estimates as required to meet their own needs or when requested by
the DCI. Whenever "the national interest" required it, the CIG too
could prepare estimates from the Strategic Intelligence Digest. But
there was no attempt to establish here a single national intelligence
estimate which should govern the thinking of all agencies concerned.
The CIG Central Reports Staff was still too small to undertake this
extraordinary project, but it would not have been assigned it anyway.
The plan originated in the Military Intelligence Service. Its military
advocates looked to CIG for a coordinator and for editorial assistance
on the Working Committee, but they considered it primarily their
own affair. CIG had still to establish its right to means oil its own for
procuring and processing the raw materials of intelligence. Its cen-
tral facilities had yet to become so useful to the departments that their
intelligence officers would rely on it for services of common concern.
The first task of the Working Committee was to review the papers
of the Joint Intelligence Staff on the Soviet Union. This took a couple
of months. By June 4, however, an outline had been made and alloca-
tions of the work planned. The use of task forces, interdepartmental
committees, was rejected on grounds of security; an agency's files
would have to be opened to persons not under its control. Instead,
the work was assigned by subject to particular agencies, sometimes
illogically. For example, the Military Intelligence Service was charged
at first with preparing certain economic and political data. Later
the plan was revised so that the greater portion of the political
material was allotted to the State Department.
Colonel Lovell's expectations were not met; the project could not be
finished by September. It was far from complete in December when
Appr6Wed For Release 2005/05/16: CIA-RDP78T031 ?$WMb001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CIG Under Souers CONFIDENTIAL
work was stopped pending the decision of an interdepartmental com-
mittee on a program of National Intelligence Surveys to take the place
of the Joint Army-Navy Intelligence Studies. This program changed
CIG's attitude toward the Defense Project; it was no longer merely
a question of coordination. Though the most important, this Digest
would be only one of several surveys to be produced by CIG/CIA.
When resumed in April 1947, the project was still an interdepartmental
activity, but it was no longer centered in the Pentagon as a major
interest of the Military Intelligence Service. The official date of pub-
lication for the Strategic Intelligence Digest was March 1, 1948, but
it was nearer the beginning of 1949 before all three bulky volumes
were complete.
Reports and Estimates
By direction of the National Intelligence Authority on February
8, a Central Reports Staff was to assist the Director in correlating and
evaluating intelligence related to the national security and in dis-
seminating within the government the resultant "strategic and national
policy intelligence." Admiral Souers followed the directive with an
administrative order dated March 4, though the Staff had already gone
to work during February and had produced the first Daily Summary
for the President. There were in what was then called the Current
Section seventeen persons seconded from the Departments of State,
War, and the Navy. They were established in the Pentagon under
L. L. Montague, with the expectation that they would be joined
shortly by other persons assigned from the departments to form an
Estimates Section or Branch.
The purpose from the start was to have the CIG take over the major
function of producing the strategic estimates for the formulation of
national policy, as Donovan had proposed. But it was not yet de-
cided that CIG should have a division comparable to the old OSS
Research and Analysis Branch. There was doubt that it ought to en-
gage in initial research. Many believed that it would do well to remain
a small and compact body which should receive from the several
departmental agencies the materials of intelligence and produce from
them the "strategic and national policy intelligence" for the policy
makers. The Department of State was still uncertain whether it
should continue its own Office of Research and Intelligence as Mc-
Cormack had expected to have it when he hoped to retain there the
function of making intelligence estimates for the policy makers.
Approv& it A 2005/05/16: CIA-RDP78TO3194A000300010U 1-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CONFIDENTIAL CIG Under Souers
Now on March 4 Admiral Souers' administrative order, prepared
by Montague, elaborated the organization and functions of the Central
Reports Staff. There was in this administrative order a provision
embodying ideas which are still of interest for the production of na-
tional intelligence estimates. As Montague wished to have the Staff
constructed at that time, there should be four Assistants delegated to
him, as Chief, by the permanent members of the IAB. Their distinc-
tion from other persons furnished by the departments for the Staff
was to be that they should not be responsible to the DCI but to their
parent agencies, although serving full time with the Staff. The pur-
pose was to have the Assistants represent in the Staff the interests of
their respective departments and also to represent the Central Reports
Staff in its relations with those agencies. Montague had acquired
these ideas from his experiences as representative of the Army on the
Senior Team of the Joint Intelligence Staff.
The Assistants would aid in directing the work of the Staff, review
all its reports and estimates, make recommendations on the dissemina-
tion of them, reconcile conflicting departmental estimates when pos-
sible, and otherwise formulate dissents for their principals on the IAB.
Thus Sowers and Montague hoped to establish a panel of intelligence
experts drawn from the departments who would continue to under-
stand and represent the interests of those departments but at the same
time through their continuous work in the Reports Staff would be-
come experts too in the business of central intelligence and the pro-
duction of national estimates.
The benefits to accrue from the continuity and momentum which
might be gained from such an estimating board were left unknown.
The ideas were put on paper but were not tested. Difficulties in
obtaining personnel and in meeting other more pressing demands in
the new central intelligence organization prevented the establishment
of such a board.
Within a month of its formal activation, the Central Reports Staff
entered another phase of its development. Montague proposed on
April 1 a revision of the administrative order to make possible two
things. First, experience with the allotment of personnel by the De-
partments of State, War, and the Navy demonstrated that there should
be more flexibility within the proportions agreed among the depart-
ments. The right persons for particular positions were not to be had
according to any predetermined ratio. The difficulty grew worse with
the necessity of apportioning within each grade. Navy captains, Army
Af6roved For Release 2005/05/16: CIA-RDP78T@ 9# (Mj 010001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CIG Under Souers CONFIDENTIAL
colonels, and civilian "P-8's" were not equally available in number or
competence. The principle of proportion could be maintained, but
deviations should be permitted so long as there was no substantial
change in the budgetary obligations of the departments.
We should note at this point the predicament of CIG as a whole
with respect to personnel. The departments had been directed by
the President to assign personnel to CIG. To make the general state-
ment that they minimized the obligation to supply able persons, as
soon as possible, is doubtless to do injustice in some cases, perhaps
many. A reading of correspondence on this matter from the spring
of 1946, however, and conversations with some who were present and
responsible for recruitment at the time, lead to the conclusion that
there were many recommendations for office in CIG that were not bona
fide nominations. Some nominees were not really available because
they were headed toward more important positions in their own serv-
ices and could not remain long in CIG if they came at all. Six months
was often the limit. Some appeared on the lists because they had
become surplus-good fellows, but with no future in the service to
which they had given so much of their lives. The name of the best
man available was often left off because he was wanted where he was.
It was neither easy nor desirable to select the personnel of the new
CIG staffs, branches, and sections from such lists. Admiral Souers
and his successor, General Vandenberg, were not able to do much
about solving this problem so long as they were obliged to request
referrals from the departments and hope for the best. Whether or
not they minimized their responsibility, the departments failed to pro-
vide adequate personnel for CIG. Why General Vandenberg sought
an independent budget and the right to hire and fire his own per-
sonnel is clear.
The second change in the Central Reports Staff was intended to pro-
vide it with area specialists as it set up its Estimates Branch. The
Estimates Branch itself was not to have geographical segments, but the
plan was to have five such sections supporting it-Western Europe-
Africa, Eastern Europe-USSR, Middle East-India, Far East-Pacific,
and Western Hemisphere. The staff of each section would be appor-
tioned by grade and among the departments.
The Central Planning Staff objected to so early a rewrite of the
administrative order to effect these changes and formally disapproved
the plan. There ensued a test of strength between the two Staffs
which Central Planning lost. It was discharged from further con-
2005/05/16 : CIA-RDP78T03194A00030001 dff01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
sideration of the proposal, and the principle was established that the
chiefs of the component parts of CIG should be responsible for the
organization and administration of their respective domains as they
deemed fit.
Espionage and Counterespionage
The remnants of the clandestine parts of OSS were being held in
a Strategic Services Unit in the War Department. By Executive Order
9621 of September 20, 1945, the Secretary of War was to discontinue
any of its activities whenever he deemed this compatib:!e with the
national interest and was to wind up all affairs related thereto. The
policy under this Order was to maintain those intelligence functions
which would be required permanently in peacetime, such as espionage
and counterintelligence, and to release personnel from other activities,
such as sabotage and black propaganda, for which no peacetime need
was seen and close them out. General John Magruder, the SSU chief,
kept at this task of liquidation through the fall of 1945 and into Janu-
ary, until the number of military and civilian personnel had fallen
from over 9,000 to nearly 3,000.
On January 29, 1946, the Secretary of War directed that the Strategic
Services Unit should be closed by June 30. The SSU records, along
with those of the OSS, transferred to the Office of the Secretary of
War by the Executive Order, were "placed under the operational
control of the Director of Central Intelligence." Title to these records
remained to be settled later.
General Magruder strove to make clear that the assets of the Strategic
Services Unit were indispensable for the procurement of intelligence in
peacetime. In a memorandum of January 15 he detailed the irrepar-
able loss that abandonment of the Unit's properties, plans, and person-
nel would entail. Its Secret Intelligence Branch, he said, had stations
in seven countries through the Near East and four in North Africa
that were already converted to peacetime work. There were con-
tinuing activities with the military commands in Germany, Austria,
China, and Southeast Asia.10 Plans were being completed for opera-
tions in the Far East, and studies were in progress elsewhere. Se-
lected persons from the old covert action branches had been trans-
ferred into the Secret Intelligence Branch to be ready for the future.
'? The military commands in Southeast Asia actually terminated on V-J Day.
One or two SSU men were left in the area.
Apived For Release 2005/05/16: CIA-RDP78T0 @ 6b9b640001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CIG Under Souers CONFIDENTIAL
The Counterintelligence Branch, X-2, had some 400,000 dossiers on
individuals. It was still at work against the operations of foreign in-
telligence services and secret organizations. This work was done in
close liaison with other American agencies, and in military areas in
cooperation with the Counter Intelligence Corps of the Army.. The
two Branches were supported by components for communications
(though reduced), technical services, special funds, a training pro-
gram, and other elements of the old OSS still in operation.
As the new Central Intelligence Group got under way, General
Magruder sent a memorandum to the Secretary of War on February
4, 1948, answering criticisms of the SSU and recommending immedi-
ate action by the National Intelligence Authority to appraise its value.
Again on February 14 he urged that the Authority place the Unit under
the Director of Central Intelligence and set a date for transferring
all its assets. Had this been the only idea abroad in Washington,
there should have been no further delay. But there was more than
one opinion on the matter.
At a meeting held in the War Department on February 8, repre-
sentatives of the intelligence services were still discussing which facili-
ties and functions of the SSU should be kept, and which of these should
be operated by CIG and which by the departments or other existing
agencies. There was question whether the whole SSU belonged at
the center of the national intelligence system. There was strong
doubt that CIG should have exclusive collection of foreign intelligence
by clandestine means, as Magruder was advocating. It was agreed
in this meeting that "an authoritative group" should make a study and
that prompt decisions should be reached. On February 19, 1946,
therefore, Admiral Souers, with the concurrence of the IAB, estab-
lished an interdepartmental committee to study the SSU problem.
The interdepartmental committee, with Colonel Fortier as chairman,
met continuously until March 13. It listened to General Magruder
and his principal subordinates, inspected files, obtained opinions on
the value of the Unit from agencies which used its product, and heard
testimony from ranking officers with OSS service overseas. The mem-
bers made individual studies of the SSU branches and divisions.
The Fortier Committee heard that the bulk of the information for
intelligence purposes came from friendly governments. A large
amount of material, such as commercial and other economic statistics,
was obtained from activities other than secret collection. This testi-
mony supported the opinion that the SSU should not be taken over
Approdfe9lPl9PAb1;fie 2005/05/16: CIA-RDP78T03194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
whole by CIG. Another reservation frequently expressed in the in-
vestigation was that the SSU personnel had not been adequately
screened, especially in the light of changes from wartime conditions
and the new threat from the East.
The conclusions of the Committee were nevertheless in favor of
saving the SSU structure. It was a "going concern" for operations in
the field. It should be "properly and closely supervised, pruned and
rebuilt," and placed under the CIG. The Committee proposed that
the Secretary of State, the Director of the Federal Bureau of Investi-
gation, and the Director of Central Intelligence should reconsider
the existing division of "analogous functions" on a geographic basis-
the FBI doing in the western hemisphere what SSU was doing in the
eastern.
The Committee suggested that the SSU as subordinated to CIG
should concentrate on the current activities of the Soviet Union and
its Satellites. Plans should be made to penetrate key institutions in
support of possible U.S. military operations. Liaison with the in-
telligence agencies of other countries should be developed for the
same p.....
ose
Liquidation should continue substantially as proposed by General
Magruder. But at the same time such personnel and facilities as the
DCI wished to have should be transferred to CIG on terms of new
employment. Until CIG should have an independent budget and
funds of its own, the War Department should continue to supply the
amounts needed.
The Fortier Committee also proposed that there should be closer
coordination of the SSU with research and analysis activities. The
OSS Research and Analysis Branch, which had been transferred to
the State Department, was "closely geared to the secret intelligence
branches as their chief customer and their chief guide" in the selec-
tion of sources and the evaluation of intelligence. Their files were
interrelated, and their activities interwoven.
Following the report of the Fortier Committee and agreement be-
tween Admiral Sowers and Secretary of War Patterson, the National
Intelligence Authority issued a directive on April 2, 19413, that the
DCI take over the administration of the SSU pending final liquidation,
which would be delayed another fiscal year, through June 1947. The
Apm
pT-oved For Release 2005/05/16: CIA-RDP78T00041010MIKIM10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CIG Under Souers CONFIDENTIAL
DCI (represented by his Acting Chief of Operational Services, Colonel
Fortier) would determine which funds, personnel, and facilities of
the Unit were required in CIG. Secretary Patterson reserved the right
to determine what portion of the funds, personnel, and facilities could
be made available.
These provisions, rather than a simple executive order, were :legally
necessary to avoid shifting the SSU en masse from the War Depart-
ment to CIG, in the way the OSS Research and Analysis Branch had
been placed in State. It was necessary in dealing with personnel to
bring to an end the appointment of everybody in SSU and give new
appointments to those who were wanted in CIG. Otherwise seniori-
ties, preference for veterans, and the whole intricate mechanism for
Civil Service reductions in force would have prevented a satisfactory
screening of personnel for security and suitability for peacetime clan-
destine activities.
The plans, records, and properties of the Unit were to be handled
differently. There were funds, such as rupees in India, that were not
to be turned back to the Treasury but retained like a stockpile for
future use. There were physical properties which could be trans-
ferred to other agencies but which should be available first to CIG.
The equipment, techniques, codes, and other facilities of communica-
tion came through intact. The legal question of title-the Economy
Act of 1933 prevented the transfer of property without reimburse-
ment-was bypassed in assigning control and use of the assets to GIG.
Later, the National Security Act of 1947 would transfer the "personnel,
property, and records" of CIG to the Central Intelligence Agency.
Oversight
After accepting Admiral Souers' program for the SSU on April 2,
1946, the National Intelligence Authority did not meet again formally
until July 17, when it conferred with General Vandenberg about his
reorganization of the CIG. It was content to rely upon the Intelligence
Advisory Board and Admiral Souers, personal choice of President: Tru-
man, to establish and activate the new central intelligence organization
as a "cooperative interdepartmental activity."
The IAB too held but occasional and desultory meetings. It dis-
cussed on February 4 the proposed policies and procedures governing
the CIG but made no important comment. On March 26 the plan for
liquidating the SSU interested but did not excite it. The men who
composed it had made their decisions elsewhere. This session did
CONFIDENTIAL
Approved For elease 2005/05/16 : CIA-RDP78T03194A000300071b001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
touch upon one pregnant problem. General Vandenberg, representing
the Army, remarked that applications were coming in from persons who
wished to be secret agents abroad. Admiral Souers preferred not to
confuse the existing operations of the SSU with the permanent clan-
destine program. Until the latter was established, therefore, he
thought the individual agencies should continue their own operations.
He agreed with Vandenberg, however, that eventually "all such op-
erations should be under a single directing head." Here was one
opinion giving promise of more lively meetings of the IAB.
At the third IAB meeting, on April 8 with Kingman Douglass in
the chair as Acting DCI, Alfred McCormack reported that the Bureau
of the Budget had reduced the amount requested by the Secretary of
State for intelligence activity in 1947 and there was uncertainty in
the Department whether to continue its work in research and analysis.
Admiral Inglis for the Navy and General Vandenberg for the Army both
favored transferring the function from the Department to CIG if the
Department did not wish to retain it. Here was another promise of
things to come. Some two weeks later, as Secretary Byrnes issued an
order dispersing State's intelligence research among its geographical
divisions, McCormack resigned, and within four months there was
an Office of Research and Evaluation in CIG.
The last meeting of the IAB before the end of Admiral Souers'
tenure came on May 9. There was discussion of the request from
General Vandenberg that State take over the Foreign Broadcast In-
telligence Service, and the matter was referred, as we noted above,
to the Central Planning Staff. The IAB listened to the plan for
the Defense Project but made no suggestions worth mention. Again,
the intelligence officers present had done their deciding elsewhere.
Then they considered methods of clearing personnel for duty with
CIG. The suggestion of Admiral Inglis that there should be an in-
terdepartmental screening committee for the purpose (lid not meet
approval, and each department was held responsible for clearing
the persons it assigned to CIG. The CIG security officer would have
the right of review, and final decision would rest with the DCI. (This
method did not prove satisfactory; the directive was :rescinded on
October 4, 1946, and CIG undertook full responsibility for clearing
its personnel.)
There was one more meeting of the Intelligence Advisory Board
with Admiral Souers in the chair as General Vandenberg became
Director of Central Intelligence on June 10, 1946. Souers expressed
Appr0ed For Release 2005/05/16: CIA-RDP78T031?9Tdk001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CIG Under Souers CONFIDENTIAL
his appreciation of the unstinted cooperation he had received. He
took "great satisfaction" in turning his duties over to General Vanden-
berg. As he reminisced in 1952, there was no doubt in his mind that
he did. He had been reluctant to take the office. He had sought
others for it in. his place at the start. He had recommended a suc-
cessor for his public appeal and personal attributes.
The first Director of Central Intelligence left a progress report,
dated June 7, 1946, to summarize his administration and point to
the immediate needs of his successor. Responsible officers in the
departments had cooperated wholeheartedly in meeting his requests
for personnel, he said, but the process had been slow because of
demobilization in the armed forces and CIG's very specific require-
ments. He had given priority to the Central Planning Staff as a
necessary "prelude to accomplishment." Concentration now ,should
be upon the Central Reports Staff.
The primary CIG function was to prepare and distribute "definitive
estimates" on the capabilities and intentions of foreign countries.
Since it required the best qualified personnel, it had been slow in
filling the complement of the Reports Staff. This had delayed too
the solution of the relationship to be established with the departments,
the State-War-Navy Coordinating Committee, the Joint Chiefs of
Staff, and other agencies in regard to the production of such "national
policy intelligence." Listing the interdepartmental problems which
the Central Planning Staff had undertaken to solve or study, Souers
stressed in particular the CIG function of supporting the budgets
for departmental intelligence. "Coordinated representation to the
Bureau of the Budget and the Congress," he said, promised to be
"one of the more effective means for guarding against arbitrary de-
pletion of intelligence sources at the expense of national security."
It was an interesting suggestion, leading far into the future of the
national intelligence system. But it was not one to have smooth
sailing.
The final paragraphs of Admiral Souers' progress report came to
vigorous conclusions for benefit of General Vandenberg. CIE's re-
lationship with the National Intelligence Authority and the Intelli-
gence Advisory Board was sound. But CIG was suffering from the
departments' inability to give it the personnel and facilities it must
have. It could recruit no personnel from civilian life. Without
enabling legislation, it could make no contracts for essential services.
It was now ready to monitor foreign broadcasts, collect foreign iritelli-
CONFIDENfAL
Approved or Release 2005/05/16 : CIA-RDP78T03194A000300Q7?0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL CIG Under Souers
gence by clandestine methods, produce studies of foreign countries,
establish a central register of information, and do basic research and
analysis in economics, geography, sociology, and other subjects of
common concern. The National Intelligence Authority and its Central
Intelligence Group should have "enabling legislation and an inde-
pendent budget" as soon as possible, either as part of a new national
defense organization or as a separate agency.
Textbook on Estimates
A volume entitled National Intelligence Estimates has been issued
by the Intelligence Production Faculty of CIA's Office of Training.
A ten-page exposition of the national estimating setup and process is
therein followed by a compilation of Studies articles about estimating
and estimates, to which have been added Fred Greene's and Roberta
Wohlstetter's reviews of the Cuban missile crisis. The text of perti-
nent directives, a list of USIB committees, and the NIE subject codes
are given in appendices. The over-all classification is Secret.
Appr9Xed For Release 2005/05/16: CIA-RDP78T0313T*001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
SECRET
No Foreign Dissem
INTELLIGENCE IN RECENT PUBLIC LITERATURE
Ill Told Tales
SPION VOOR NATO. By Evert Reydon. (Amsterdam: Polak & van
Gennep. 1967. 330 pp. f8.50.)
Evert Reydon, an engineering officer in the Dutch merchant marine,
was recruited by the Dutch Foreign Intelligence Service in 1957.
From then until 1961 the Dutch Service, in conjunction with MI-6,
used him primarily as an observation and Elint collection agent in
Soviet ports at which his ship called. In July 1961 he and a merchant
marine colleague were sent as legal travelers by automobile on an
observation mission to the USSR. As they attempted to leave the
country, on 20 August, they were arrested by the KGB. In October
they were tried, found guilty of espionage for NATO, and sentenced
to 13 years in prison. In November 1963, after considerable behind-
the-scenes negotiations, they were released and returned to The Nether-
lands. Reydon's colleague, who had stood up nobly during his trial,
telling the court he was proud of his services to his country and the
West-something Reydon did not do-suffered a nervous breakdown
soon after his return and has been in a Dutch mental institution ever
since. Reydon found on his return that Dutch shipping companies,
most of which do business with the Bloc, would not rehire him. With
official help he bought a gas station but failed to make a go of it; he
was a taxi driver at the time he wrote this purported autobiography.
The publication of the book in May 1967 created quite a stir in the
Dutch press and was even noted by the Soviets in their domestic broad-
casts. This was understandable; Reydon was the first Dutchman to
have written about his espionage exploits for his country and her
allies since World War II. But except for recounting the disclosures
made at his Moscow trial, he offers the reader a story with little rela-
tion to his actual activities. The following caveat, which, in small
print on the inside of the face plate, is calculated to be missed by most
readers, betrays the real tone of the book: "All the situations and most
of the persons described in this book live only in the imagination of the
writer, and hopefully will live only in the imagination of the reader."
The book is divided into three sections. The first details Reydon's
youth, his entering the Dutch merchant marine, and his recruitment
Approv??Release 2005/05/16 : CIA-RDP78T03194A0003000 M$~RI%HRP PAGES 75-76
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET Recent Books: Dutch
and training as a "NATO spy" in The Netherlands, the UK, and France;
the second tells of purported espionage activities, primarily for the
British, in the Middle East, where he claims he was employed under
a BOAC cover; and the third covers his training, dispatch, f=ancied ex-
ploits, capture, interrogation, trial, and imprisonment in the USSR.
He claims he dealt with George Blake in the Middle East and met
Gary Powers, Greville Wynne, and others in his Soviet prison. The
book is filled with his adventures with women of various no.tionalities,
including an American college girl in the Middle East.
Facts are lost in fantasy, with great self-damage to the author, for
he had served his country and the West well. By making himself
a junior James Bond he may have boosted the sale of his book, but
this cheap, flamboyant story can only degrade his real contribution.
THE BROKEN SEAL: The Story of "Operation Magic" and the Pearl
Harbor Disaster. By Ladislas Farago. (New York: Random House.
1967. 439 pp. $6.95.)
It was perhaps inevitable that Ladislas Farago, veteran ;;ginner of
espionage and other yarns, would sooner or later turn his attention to
Pearl Harbor. In The Broken Seal he has brought forth an untidy
compilation covering the whole interbellum period, much of it ir-
relevant to the problem of the Pearl disaster, all of it put together with
approximately the care and perception we have come to expect in a
routine espionage potboiler.
The book is based on extensive research, however, and it claims a
big purpose-to answer the question "Since we possessed this fantastic
source of intelligence [the Magics] . . . why did we fail to anticipate
the blow?" It had seemed unlikely that anyone would try to improve
on Roberta Wohlstetter's answers to this question (in Pearl Harbor:
Warning and Decision; 1962). Evidently Farago was emboldened to
try by the knowledge that there were several stockpiles of source ma-
terial that had not been exploited. These new materials made his
book, but they also unmade it; they seduced him into admitting stories
Ap7j6roved For Release 2005/05/16: CIA-RDP78T03194A010001-1
MORI/HRP PAGES 76-82
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Recent Books: Pearl CONFIDENTIAL
unrelated or only vaguely related to his stated object, to the point
where he seems to have forgotten that object. The Broken Seal is
essentially not the analysis he promises but a long, shallow narrative;
it makes several additions to the fund of information on the intelli-
gence background of Pearl Harbor, but does so without improving
our understanding of the surprise.
Farago's biggest such addition-a real eyebrow-raiser-is his story
of how the Japanese in the spring of 1941 came to suspect that we
were reading their diplomatic traffic. He reports that Under Sec-
retary of State Sumner Welles, in attempting to convince the Soviet
ambassador that the Germans were going to attack the USSR, showed
him telegrams to this effect which the Japanese ambassador in Berlin
had sent. This revelation then leaked to the Germans through an
agent of theirs in the Soviet embassy in Washington, whence it passed
to Berlin and on to Tokyo.
Japanese suspicions of the safety of their cipher systems appeared in
messages that we read. The ciphers remained unchanged, but the
Magic custodians, not knowing how the leak had happened, reacted
with their near-boycott of the White House, where a couple of acci-
dental mishandlings of Magics had occurred. The Magic service to the
White House was not resumed until months had passed, and then
only at the President's insistence.
What Farago has contributed here is not simply an explanation of
the military men's caution (which has been explained-with caustic
comment-in practically every Pearl Harbor account), but a revelation
that the leak was not where their suspicions pointed. This part of the
story does not lack for detail, but it does for documentation; it is at-
tributed to anonymous sources.
Another major finding of the author's is that the Japanese decision
to attack Hawaii was influenced by indiscreet revelations of U.S. mili-
tary information by Postmaster General Walker, the President's repre-
sentative in the "John Doe" negotiations that were conducted in 1941
outside regular diplomatic channels. Like most of Farago's theses,
however, this one loses something in the presentation-and if it is an
intelligence story it is a story about Japanese intelligence, not U.S.
intelligence that could have warned us.
The most persistent of Farago's theses is the failure of the Magic
producers and their customers to recognize the warning value in-
herent in the traffic of the Japanese espionage agents in Hawaii. But
his chief example of this supposed blundering is the message available
Appro qUP 1TJhe 2005/05/16: CIA-RDP78T03194A000300010R1-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Recent Books: Pearl
on December 6 that revealed a proposed shore-to-ship communication
system so clumsy as to invite the belief that whatever it was the Japs
had afoot in Hawaii, it was surely frivolous. His explanation of the
G-2 and ONI failure to appreciate the importance of these messages
is that because they bore diplomatic addresses and signatures, their
military significance was not evident. Here Farago has added em-
phasis, but not persuasiveness, to the testimony on this point in the
Pearl Harbor hearings.
One story clearly pertinent to Farago's announced purpose con-
cerns the inability of G-2's Colonel Bratton to get an audience for the
implications of the Japanese code-destruction message that reached
the Washington embassy December 3. This failure the author at-
tributes to Bratton's misfortune in having stirred up the High Com-
mand during the previous week with his conviction that the Japa-
nese would open the war on the weekend of November 29.30. What
Farago contributes in this case is new appreciation of old information-
and evidently some overplaying.
Because he indicates that his sources included participants in the
Pearl Harbor cryptologic events, the reader's expectations rise when
he begins his chapter on "How the Japanese Fleet Was `Last"' by our
interceptors before and during its voyage to Hawaii. But this account
is half-hearted-short and unsatisfying-and obviously garbled (for
example, what presents itself to Farago's mind as radio camouflage looks
like no more than ordinary radio security). This reader, led to ex-
pect an account of successful communications deception, was surprised
to turn the page and learn that our interceptors realized, and reported,
that they had lost the target fleet. That being the case, the loss was
in itself an important piece of intelligence, which fact Farago does not
appear to notice.
He implies that the Purple cryptosystem may have been used for
deception, but later we find that the only deception in these communi-
cations that he is really prepared to accept is Tokyo's deception of its
ambassadors in Washington. This seems a correct analysis-but we
have been led up and down several confusing layers of dissimulation
to arrive at a point long recognized as absolutely basic to the whole
story of the disaster: Nomura and Kurusu were being told as little
as possible; their instructions from Tokyo could never have revealed
to us where the blow would fall.
Farago's conclusion on the question whether a "winds code execute"
message was ever intercepted is simply that this remains an unsolved
Ap S$oved For Release 2005/05/16: CIA-RDP78T0G4 4I IO tlG0.10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Pearl CONFIDENTIAL
puzzle. But he found, in the files seized by the FBI at the Honolulu
consulate, a decrypted telegram whose text ("Relations strained be-
tween Japan and the United States and Britain") is similar to the mean-
ings assigned to two of the looked-for broadcast phrases. This sug-
gests that Tokyo sent telegrams in lieu of a broadcast that might be
missed by some outposts-in other words, that the winds code scheme
was left unused, presumably because it was never more than a pre-
caution against the closing of the commercial radio circuits, and these
remained open. But Farago, overlooking this plausible but undra-
matic conclusion, chooses to view the telegram as evidence support-
ing in some measure those who contended that there was an execute
broadcast message.
One of The Broken Seal's main contributions, and it is no mean
one, is its wealth of background on the Japanese preparations for war,
especially their intelligence preparations-and especially Yamamoto's
long-shot effort to sell his plan to attack Hawaii. This story, how-
ever, scarcely bears on the subject of our intelligence-unless Farago
means to suggest that if we had had a Richard Sorge in Tokyo we
might have learned these secrets, which were of course held within
a very small circle.
In dealing with the history of cryptologic operations Farago ac-
quired just enough information, and possessed just enough technical
knowledge, to entangle himself in a series of stories which are un-
satisfying at best (e.g., the account of the "loss" of the Japanese! fleet)
and badly misleading at worst. Some of his blunders require no
special knowledge to detect, as when he labels as "Magic's finest
hour" the report by a Navy cryptologist (August 1941) that Japan
was not going to attack Russia but instead would make her major move
to the south. Other errors are of a kind visible only to participants
in the cryptologic events of the time, but these are massive ones--long
accounts of cryptanalytic operations which Farago renders (a good
word, renders) in such a way as to make them only barely recognizable
to actual participants in the events, some of whom were interviewed
for the purpose of this review. Perhaps the key to Farago the cryp-
tologist is his repeated references to "encoded cipher." The crypto-
system he refers to in each case is enciphered code-but there's quite
a difference. Even a layman, if he stops to think, will see that if the
Japanese had communicated by anything so cumbersome as encoded
cipher (as Farago conceives it), Admiral Nagumo might still be lurk-
Appr9Qe 66se 2005/05/16: CIA-RDP78T03194A0003000f6b01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
CONFIDENTIAL Recent Books: Pearl
ing in the western Pacific waiting for the communicators to finish de-
crypting his orders to sail against Pearl.
This complaint is no mere technicality; Farago's blundering signals
a warning that as cryptologic and intelligence history The Broken Seal
is altogether unreliable because the author went far beyond his depth.
For the general reader the cryptologic matters pertinent to Farago's
stated theme could be treated adequately at a completely nontechnical
level; that he elected to do otherwise must be attributed to a belief
that any reference to cryptology, however obscure or confused, lends
a certain aura of mystery that can only further the sale of books.
This is the most research-oriented of Farago's opuses, but the
practiced spinner of popular spy stories still comes through. We
do not read far before we encounter the inevitable Nip agent
peering quizzically through thick-lens spectacles, bowing, hissing, and
emitting mysterious frozen smiles. Even earlier comes that other
stereotype, the U.S. diplomat wearing morning coat and affected man-
nerisms. Cryptanalysis, it seems, is the province of persons for whom
there was no adequate one-word label until kook entered the language.
On the attache circuit intelligence is obtained "by a judicious mixing
of sensitive topics and powerful cocktails." A fair sample of Farago's
idea of cryptologic "in" lingo is "the message that emerged from the
crypt." In his sentence "the strain became arrant" (during those
months of brain-breaking work on the Purple solution) we detect
the presence of Roget close by the author's side.
But his offenses are against more than fact and style. His docu-
mentation, though lengthy, is generalized and slippery, with some key
passages left undocumented (evidently not because of any desire to
shun attribution to anonymous informants, for there are several in-
stances of this). Another form of carelessness, constantly repeated, is
the burial of significant narrative points in footnotes-which leaves us
uncertain as to the author's view of their significance. The most setious
violation of good practice, however, is the use of selective hindsight;
the whole narrative, so far as it bears on the announced subject, focuses
on Hawaii and on the pieces of intelligence that could have alerted
us, to the exclusion of the pieces that drew attention elsewhere.
Avoidance of this way of reading history was the essence of Mrs.
Wohlstetter's study; Farago realized he was setting an easier dis-
cipline for himself, but his awareness does not save him.
This much derogation of a veteran author's big opus has to have
a point, and it is this. The flaws in his treatment of his material are
Appr9yed For Release 2005/05/16: CIA-RDP78T031Q0WD 01* A0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Pearl CONFIDENTIAL
no less than tragic; for if a major addition to the Pearl Harbor litera-
ture is possible at this time, Farago's material should have produced
such an addition. As a piece of research The Broken Seal is monu-
mental. Earlier authors must be devastatingly embarrassed at the
amount of unused material he turned up in that out-of-the-way deposi-
tory, the Library of Congress, which has harbored a stockpile of micro-
filmed Japanese Foreign Office documents for now these two decades.
His other documentary sources-in Hawaii, Japan, even Germany-
also contain numerous surprises; equally surprising is the amount
of hitherto obscure material he found in published sources. Farago
has given us all a lesson in Pearl Harbor bibliography.
What may be only a minor tragedy for scholarship generally is a
more serious one for the intelligence community, which must now sit
back and watch a new spate of Pearl Harbor studies come out, touched
off by Farago's discoveries. Some of these will be improvements,
where they mine Farago's documentary sources carefully and stick
to the rules of the game. But it is likely that all of them will be
dependent on The Broken Seal itself for the long stretches of inside
information Farago got from private sources; thus they will perpetuate
and magnify his extensive distortions and errors. It is becoming in-
creasingly clear that if we want a straight story going beyond Mrs.
Wohlstetter's-and that is surely a reasonable want-it is going to
have to be produced by intelligence professionals. This is true
not only because of the unlikelihood of getting an adequate "outside"
study but also because a really complete study involves information
still classified. Much of it does not even exist on paper; it consists of
the recollections of cryptanalysts, translators, and other participants
in the intelligence events.
This is not the place to write a prospectus for such a study, but a
few descriptive or prescriptive points may be suggested. For one, the
participants' recollections, wanted for their answers to the present-
day intelligence officer's questions, happen also to make the story
several times as interesting as anything written on Pearl Harbor to
date. For another, the coverage of events before, say, 1939 need be
of only the briefest and most prefatory character, if only to avoid
burying the story under its own weight as Farago tends to do. For
a third, although only the cryptanalysts can explain some of the ins
and outs of the intelligence events, it does not have to be, and should
not be, a heavily technical story.
Approvedol~Pe Blase 2005/05/16 :CIA-RDP78T03194A000300010D01-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
CONFIDENTIAL Recent Books: Pearl
Meanwhile, The Broken Seal is with us. Now that this much-
heralded book is to hand, we have two recommendations for anyone
who wants to bone up on Pearl Harbor: (1) Read Farago's bibliogra-
phy and source notes. (2) Re-read Wohlstetter.
AplBlibved For Release 2005/05/16: CIA-RDP78T0= F b9a0001-1
Approved For Release 2005/05/16: CIA-RDP78Jf~9AC4W30%J?01-1
ADVENTURE IN DIPLOMACY. By Kenneth Pendar. (London:
Cassell. 1966. 382 pp. 42/-.)
Early in 1941, an agreement was negotiated between Robert Murphy
for the United States and General Weygand for the Vichy government.
Under its terms we undertook to ship certain specified commodities
for the benefit of the civilian population in French North Africa, and
the French agreed to accept American observers to see that the supplies
were used for the designated purposes and not reexported. ]Pendar
was one of the U.S. "control officers," and this book stems from his
sojourn in Morocco and Algeria from June 1941 to July 1943.
The assignment provided both an opportunity and a cover for travel
throughout the area and the collection of information and impressions
concerning the attitudes of French and Arabs and the degree of Ger-
man influence. Increasingly, it came to involve the clandestine gather-
ing of military information in preparation for the Allied landings in
November 1942.
The account of these activities, however, takes up only the first
hundred or so pages of this book. It is a good picture of the field of
play: the heritage of Lyautey, the nature of the French protectorate
and the Frenchmen who served it, the stresses of conflicting loyalties
to which French officers were subjected, the characteristics of the
Moroccans and Algerians themselves. Pendar, who before long was
appointed vice-consul at Marrakesh, came to be a good friend of the
legendary El Glaoui. But there is not very much specific detail about
the strictly intelligence aspects of the work of Pendar and his col-
leagues.
This is by design, not accident, as is shown by the book's subtitle,
The Emergence of General de Gaulle in North Africa. The last hun-
dred pages of text, and thirty-four appendices which run to another
hundred-odd pages, are largely given over to a persuasive exposition
of Pendar's thesis that de Gaulle was from the start far more intent
on securing his own political role in postwar France than in making
a military contribution to the winning of the war. Jean Monnet
emerges as a subsidiary villain who, as a self-appointed adviser to
General Giraud, effectively delivered that political innocent into de
Gaull.e's power.
Appro9S&lF6 IRb ~s9Nb'5/05/16: CIA-RDP78TO3194A000300010001-1
MORI/HRP PAGES 83-84
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: WW 11
In 1967 none of this is particularly novel. In fact, the publishing
history of the book may at this stage be more interesting than its con-
tent. It was originally brought out in 1945 in a small U.S. edition.
A larger edition was published in France in 1948. Now comes the
English edition, using the original text with only very minor changes
and a fair number of footnote references, mostly to such later material
as Murphy's own account of the same period in Diplomat among War-
riors. But about half of the documentary appendices are new since
the first edition, as well as a Prologue and an Epilogue in which Pendar
reiterates his disillusionment with de Gaulle. He can probably look
for a more responsive readership now than in 1945.
James Cooley
MORI/HRP PAGE9
MY OWN RIVER KWAI. By Pierre Boulle. Translated from the
French by Xan Fielding. (New York: Vanguard Press. 1967.
214 pp. $5.95.)
The outbreak of World War II found Pierre Boulle on a rubber
plantation some 50 miles from Kuala Lumpur. Other Frenchmen,
as well as Danes, Britons, and Americans, were in Malaya as planta-
tion managers and employees at the time. Like Boulle, most of them
tried to get into the war action in some form. Some went into mili-
tary organizations; a number were associated with British and Ameri-
can quasi-military intelligence groups in the area.
After reporting via Singapore to Indochina for mobilization, Boulle
began a series of frustrations and hardships that lasted for over four
years, two of them spent in prison. His friends from Malaya were
part of a group that identified with the Free French movement and
so found themselves in opposition to the French colonial establish-
ment and frequently treated as traitors.
The story of Boulle's adventures in traveling to Indochina, then back
to Singapore, then into Burma, and from there up into Yunnan in
southern China makes up the early part of this book. He then moved
into northeastern Thailand and finally into Indochina where, after a
horrendous trip via rivers and rapids, he fell into the hands of the
Vichy-oriented French establishment. He was condemned and spent
two years in prisons, sometimes in solitary confinement and sometimes
shackled in circumstances that clearly formed a basis for some of the
ved For Release 2005/05/16: CIA-RDP%ff t9444Wf 09NbM0001-1
Approved For Release 2005/05/16: CIA-RDP78TO3194A00 30 01-1
Recent Books: WW II OFFICIAL I E L
fictional incidents related in his well-known "Bridge Over the River
Kwai."
There is not a great deal about intelligence in this book, but it does
picture the process of gaining information from tribal groups in the
Indochina, Chinese border, and Thai areas. The Westerner's exaspera-
tion with the tribal social protocol through which he has to work, deal-
ing with village head men, chance couriers, porters, and guides, is
clearly reflected in the incidents of Boulle's journey. Withal, however,
he tells the story without complaint and with some understated humor.
It is interesting to remember, with respect to intelligence work, that of
the previously mentioned plantation managers and experts there were
a number who, trading on their experience with ethnic groups and
knowledge of how to handle them, contributed a great deal to British
and American intelligence activities in that part of the world through-
out the years 1943-45. This reviewer recalls in particular one man-
ager who knew the Malaya countryside well from traversing most of
it in his peacetime duties. After the Japanese occupied the Southeast
Asia peninsula down to Singapore, this man regularly flew on day-long
trips, belly down in a B-24 bomber, scanning the roads and bridges
to check on their state of maintenance and to spot vulnerabilities and
other information needed at CBI and SEAC headquarters, as well as
by British and American clandestine elements.
Shortly after returning to Malaya at the end of the war, either
through distaste for the problems of reconstruction in Malaya or be-
cause there was at work in him the ferment of creative expression,
Boulle took account of his assets, threw up all his Malayan plantation
experience and future, and returned to France to begin a career as
a writer of fiction. This particular book, he admits in an introduction,
was undertaken out of some irritation at frequently being asked what
background he had for writing The Bridge Over the River Kwai.
While the setting of the book that became the famous motion picture
was geographically well to the west of his own area and the incidents
in it were based on prison experiences that were not his, still the river
and jungle terrain of that part of Southeast Asia is sufficiently uniform
and the true hardship conditions of his own confinement sufficiently
similar to those that obtained in Thailand and Burma to give the
novel authenticity. If the author really needed justification, My Own
River Kwai does the job.
John R. Ohleger
ApproOff ke1 sP5/05/16: CIA-RDP78T03194A000300010DD1-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY
Spy Fiction
THE MAN FROM MOSCOW. By Greville Wynne. (London:
Hutchinson. 1967. 222 pp. $4.20.)
When one writes of Greville Wynne, one must put first things first.
The first thing is that Mr. Wynne, when confronted with a great chal-
lenge and a grave threat not only to his livelihood but to life, responded
with courage and intelligence. Nothing he has said or done since
meeting that challenge can detract from the honor due hint-not even
this book.
When reading it, I had to keep reminding myself of that first thing
because, unfortunately, Wynne has not written a closely factual ac-
count of his involvement in the Penkovskiy case, one which could have
been the authentic statement of a man who was in his own way a hero
of our time. Instead he has chosen to record his fantasies of Greville
Wynne as James Bond to a degree which largely vitiates the factual
material his book includes,
Wynne in reality had something in common with the seedy little
men in Eric Ambler novels who suddenly find themselves thrust upon
the stage of history in some dark scene of international intrigue.
The fundamental difference between him and Ambler's antiheroes is
that Wynne met the challenge and ultimately emerged from the dif-
ficult situation with dignity and respect. That story could have made
a very moving book. Instead, we have a novel about 008/ being set
on the trail of Penkovskiy in 1955 and gradually circling closer and
i.qoser to his target until the day-that London had foreseen from
the beginning-when Penkovskiy turns to Wynne and confides to
him not only his intentions to serve as a British spy, but his first photos
Of classified Soviet documents. Wynne depicts himself as a carefully
selected and long-trained British undercover agent whose career in
intelligence goes back to the beginning of the Second World War.
The true Wynne, the indifferently successful salesman with a limited
education and no serious experience in the kind of undertaking in
which he found himself involved, is a much more sympathetic man
and his role in the Penkovskiy operation much more deserving of our
admiration.
Wynne describes at length how he foiled the interrogators who
pressed him for months to confess all the details he knew of the
MORI/HRPAi~t86 ;ES~ 86 For Release 2005/05/16: CIA-RD1190Qt4610001-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
Recent Books: Fiction OFFICIAL USE ONLY
Penkovskiy case. He also tells stories of involvement in other intel-
ligence operations, information which he managed to conceal from
the Soviets to the very end. Unfortunately, neither as a record of
what happened nor as a guide to defense against interrogation is
Wynne's account very useful. There is not much point in going into
the various absurdities of the story of his interrogation and imprison-
ment as he relates it here. In view of the arrest and confession of
Penkovskiy and the evidence accumulated during the investigation
prior to his arrest, Wynne's confessing to his own role with relatively
little reticence is certainly understandable and would have made a
more moving story than the months of clever repartee between him
and his various Soviet adversaries in the Lubyanka.
The same absence of fact irretrievably mars his account of the
Penkovskiy operation. I hope this book is not widely circulated
among potential Soviet spies, or at least not believed by them if it is.
Wynne's romantic and highly fictionalized view of intelligence: trade-
craft is characterized by a neglect for the most ordinary security pre-
cautions and compartmentation on the part of the British and Ameri-
can services that would appall anybody with experience in clan-
destine operations. Wynne naively describes these things with pre-
cisely the opposite intent. In his imaginings he has used James Bond
rather than reality as his guide. For example, he portrays the de-
briefing of Penkovskiy in London as conducted in an "operations
center [where] . . . in place of the prim bedroom furniture, were
installed typewriters, tape-recorders, coding machines, radio equip-
ment, a private line to Washington, and a projector for slides and
films. Stenographers, typists and interpreters in case of technical
language difficulties. A doctor with stethoscope, syringe, and pep
pills to keep Alex awake and alert; during his whole stay in Lon-
don he never had more than three hours' sleep a night. And
relays of British and American Intelligence officers to question, ques-
tion, question."
Wynne also tells how American and British intelligence services
rounded up from Britain and America a host of twenty Soviet defectors
and introduced them to Penkovskiy to assure him that former Soviet
citizens can succeed in life in the West. Wynne says "the effect on
Alex was electrical." If Penkovskiy had really been confronted with
a room full of twenty defectors, the effect would almost certainly
have been fatal.
ApproR~eFc19 F a 05/05/16: CIA-RDP78T03194A00030004$b01-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Fiction
The whole story is skewed by Wynne's placing himself at the center
of the operation when, in fact, both Penkovskiy and his British and
American colleagues looked upon Wynne as a vehicle of opportunity
for communication. That role was, as Wynne's subsequent experi-
ence proved, as dangerous and in its own way as demanding as that
of anyone involved, with the sole exception of Penkovskiy. It could
have been told well and truthfully and the library of books on intelli-
gence operations would have been enriched thereby. But Wynne
chose to cast himself in the role of Penkovskiy's closest friend and
confidant, as a trained intelligence officer who in many ways directed
the operation, and as a man skilled and educated to fit the public
conception of the master spy. Being in truth none of these things, he
has written a hollow and unrewarding narrative.
And yet in writing of Greville Wynne, one must also say last things
last. Who can say, without having undergone what Wynne experi-
enced, how he himself would conceive of his own role and how he
would go about exploiting it once he had managed to endure the
mental and physical stress of being the courier, of being subjected to
interrogation and trial, and finally of imprisonment?
Wayne Lambridges
TOPAZ. By Leon Uris. (New York: McGraw-Hill. 19?7. 341 pp.
$5.95.)
Two interesting intelligence cases are recounted in Topaz. One
begins with the defection of a Soviet operative and ends with the
discovery of a French officer spying for the Russians in an inter-
allied headquarters. The other describes how an agent of the French
service observed a Soviet missile being moved along the streets of
Havana and how his report triggered the final steps to the confronta-
tion. What is more, these stories are placed in the context of decision-
making at the national level, in both the United States and France.
A good deal is said about the immensely delicate situation which arises
between two Western governments when one is known to have been
penetrated by the Soviets. There is also some well-informed writing
about the way in which Soviet disinformation operations are carried
out at the highest levels in the Western alliance.
These promising ingredients, however, are ground into a crowded
and overly emotional novel. French hostility to the United States is
Appreved For Release 2005/05/16: CIA-RDP 1AI4AMVA6Y0001-1
MORI/HRP PAGES 88-89
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Fiction OFFICIAL USE ONLY
the subject matter of the main plot, with the chief of French opera-
tions in Washington billed as a tragic hero. As the story moves
toward its catastrophe this worthy returns to Paris burdened with the
unwelcome news of a Soviet penetration at the top of his government.
He also carries with him the knowledge that he has helped the
Americans-a serious offense-by giving them the missile report.
There, at headquarters, in an atmosphere laden with deceit and ten-
sion, he spends his last days in the service of his country.
Some years ago this kind of story might have been cast against the
background of the cold war. Here Soviet espionage and a Cuban
missile crisis are but props in dramatizing the gradual disaffection
of a senior French officer. The inside view of a malevolent foreign
service is not to be had in Moscow or East Berlin but in Paris. This
is not just innocent fun; Uris evidently let himself go writing about
the French.
At the popular level, Topaz has all the paraphernalia of a spy
thriller. There is a love story, some sex, and a little sadism, all acted
out by foreigners. The American operators are tight-lipped, ded-
icated, and competent, their tradecraft crisp and their operations
sound. It is a simple world of the good and bad, peopled with black-
and-white characters whose doings have little meaning beyond the
most obvious.
For the reader who is looking for adult fare, Topaz must stand,
then, on the appeal of the spy cases it incorporates. On this basis it
does quite well. The stories have an authentic ring. They merit
the reader's attention; and the rest of the book can be easily skimmed.
L'ACTUELLE GUERRE SECRETE (The Secret War Today). By
Pierre Nord (pseud.) and Jacques Bergier. (Paris: Editions
Planete. 1967. 254 pp. 17 frs.)
The most that can be said of this interestingly organized and well
illustrated volume is that it reveals a painstaking perusal of the con-
temporary press and a soaring imagination. One utterly delightful
paragraph will show something of the spirit of the book:
The Chiefs of the CIA, in the luxury and calm of their offices, in bedroom
slippers and suspenders-which is how they like to dress when taking their
Appr99iWIJr k9feaRVi'605/05/16 : CIA-RDP78TO3194A0003000?8001-1
MORI/HRP PAGES 89-90
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Fiction
ease-can exploit the work of the satellites such as Midas II which detects
missiles. This enables them to count the number of intercontinental missiles
the Russians have in stock at Sverdlovsk . . . and listen to the count-down
of Luna No. Y. at Kapustin Yar in deepest Russia ... .
It is a little bit premature to say that [CIA] is listening to the most intimate
discussions held in the Kremlin-as in 1955 it listened to the telephone con-
versations between East German authorities, natives as wel'. as occupiers,
thanks to a tunnel which led right into the transmission center in East Berlin.
We are treated to the inevitable bit of French hauteur in. the political
realm, it being well known that all Americans-in rerum nature-are
political cretins. Messrs. Dulles and McCone "were politically fre-
quently wrong." And "the CIA has done a great deal on the technical
side in the secret war . . . The CIA is a machine perfectly adapted to
scientific war . . . but politically it is weak."
With respect to other agencies: "to become a member of the famous
FBI, a G-man, one does not have to be a fine marksman or a judo
expert-but one must absolutely be an expert accountant."
The book is not pointedly anti-American. It is like any French
book on America. All Frenchmen know from birth that the American
intellect ends at the flat end of a screw driver and that the world
would be happier if the Quai d'Orsay were to run the Department of
State. As for its contribution of information, it has nothing to tell
a dutiful reader of Ramparts.
ApprMed For Release 2005/05/16: CIA-RDP70TOKOI9f AOU3091T0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY
Military Intelligence
DER DEUTSCHE GEHEIMDIENST: Geschichte der Militiirischen
Abwehr. By Gert Buchheit. (Munchen: List Verlag. 1966.
494 pp. DM 29.80.)
It may be that intelligence organizations are the most hazard-
ridden of all possible subjects for historical description. Outsiders
are strongly tempted to write sensational exposes, insiders to produce
whitewashes and glorifications. Sources are often mainly the per-
sonal recollections of two or three individuals with strong prejudices
about the organization and with personal interests to defend. Their
memories are sometimes extended with a few documentary scraps,
but the files of the organization usually remain closed-a state of
affairs which, however excellent for security, poses a major obstacle
to serious historical study, Good history seems to require a sub-
stantial volume of hard evidence worked over by a number of inde-
pendent investigators who criticize each other and name their sources.
If any secret services can be treated seriously in public print, it
should be those of the Third Reich. Here the files-to the extent
that they have escaped destruction-are largely open, and officers
of the several organizations still survive in some numbers, so that
their accounts can be questioned and compared. Much has already
been published on the Nazi state and the Wehrmacht, and some of
it treating subjects close to intelligence has been of high quality.
Dr. Buchheit now makes the first serious attempt at a comprehensive
study of the Abwehr itself; be covers a span from 1912 to 1945. Al-
though he succumbs to some of the hazards, he has made a real
contribution.
An ex-Wehrmacht officer with some intelligence experience, Buch-
heit has also written books on Hitler and on General Ludwig Beck,
to some extent glossing over the latter's less admirable characteristics.
In the work under review here he was encouraged and assisted by
Col. Otto Wagner, who has become a leader of the Abwehr veterans,
so that the book might be considered a sort of authorized history
of the organization. It has an official history's virtues and faults.
Almost invariably the Abwehr and its chief, Admiral Wilhelm Canaris,
emerge as effective, upstanding, loyal to the Fatherland, and un-
stained by Hitlerite crime. (Since the work of this company of
ApprovWP +el use'NX/05/16: CIA-RDP78T03194A0003 MOR%HRP PAGES 91-93
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Military
honorable gentlemen is contrasted with the misdeeds of the Sicher-
heitsdienst, perhaps someone will undertake a rebuttal on behalf of
that organization.) In one area familiar to this reviewer, Buchheit
plays down the role of the pre-Hitler Abwehr in some activities which
might seem less creditable today-protecting the security of the
Reichswehr's illegal rearmament preparations, or spying on politicians
and diplomats for General Kurt von Schleicher. More generally,
given the documentary material available in German and American
archives, much of which he used, he might have made a more detailed
analysis of selected Abwehr operations.
Two of the author's themes may especially interest readers of this
journal. One is the problem the Germans faced in intelligence col-
lection and counterintelligence defense on the Russian front. Before
hostilities began, the military attache in Moscow told Canaris that
it would be easier for an Arab wearing a flowing white burnoose to
pass through Berlin unnoticed than for a foreign agent to escape
notice in Soviet Russia. After 22 June 1941 the mass executions by
the SS Einsatzgruppen ensured the hostility of the people, prejudic-
ing intelligence as well as operations. Soviet partisan bands were
rapidly mobilized and expanded under long-standing plans, harassing
the German rear and sending intelligence to the Red Army; the reader
will see the resemblances between these partisans and today's Viet
Cong. The French underground also became much more active
after the Russians were engaged. Buchheit makes no boner about the
superiority of Soviet intelligence, claiming only that the Abwehr
managed to mount a serious opposition. He says that the Abwehr suc-
ceeded in recognizing 50,000 out of 130,000 Soviet agents and "mak-
ing 20,000 harmless" (not necessarily executing all these; many were
turned and played back). German intelligence units on the front
lost 30% of their strength to enemy attack.
The other theme, one running through the whole book, is the in-
telligence officer's problem of honesty and honor when his objective
reports are considered "defeatist" at a high level, or when he is made
a witness to or an unwilling participant in inhuman acts. What is
he to do when protests go unheard? In early 1940 one high Abwehr
officer, General Hans Oster, deliberately gave information on impend-
ing German attacks to the Dutch, hoping to frustrate Hitler's plan.
lie also conspired with other generals against Hitler. Canaris did
not go this far, but he did work to discourage a German attack on
Gibraltar, and he warned the Swiss that Hitler intended to overrun
Ai ?roved For Release 2005/05/16: CIA-RD 1Il IM.9 !'i60MID010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Military OFFICIAL USE ONLY
their country. Such extreme actions could only be justified under
and against a Hitler. But on a more ordinary level, we are con-
stantly reminded that any intelligence officer in any service sometimes
has a duty to speak unwelcome truths. The Abwehr, at least as
Buchheit describes it, had a good record for such Zivilcourage.
J. L. Lilienfeld
THE MILITARY ATTACHE. By Alfred Vagts. (Princeton: Prince-
ton University Press. 1967. 408 pp. $10.00.)
This is a good book. It is well documented; it is interesting; it is,
at times, humorous. Additionally, it accomplishes what it intends
to accomplish, i.e., to give the reader a history of the service attache
post-as used by many countries-and to show the various fields of
activity in which attaches have engaged.
Professor Vagts has apparently elected to delve into this aspect of
his continued field of interest, the history of militarism, with little
updating as to source material. He mentions a few New York; Times
articles from the early 1960's, but of approximately 50 books and
lengthy documents comprising his bibliography only one has been
published in the past ten years. That one is the revised edition (1959)
of his own A History of Militarism. Also, to the best of my recollec-
tion, none of his illustrative examples involve either an air attache
or a marine attache. It is true, however, that his well-selected quota-
tions and incidents, though devoted to army or navy instances, make
his point for all the military services.
With respect to intelligence in particular, there is little that is in-
structive in "Part I: Historical Outline." This first section does include,
however, many not-so-well-known items for one's storehouse of anec-
dotes-from the caning of a Roman army officer by an ambassador in
the camp of Syphax (so as to protect the officer-spy's cover as a slave
of the ambassador) to the freeing of a U.S. male attache for field
duty in 1944 by the appointment of a WAC major as assistant mili-
tary attache in London.
Part II, which occupies about sixty percent of the book, is of more
interest from an intelligence viewpoint. Surprisingly, though, there
is much more on intelligence in its Chapter 17, which deals with
"Service Attaches and the Alliances"-in two sections, before and
Appro RM?AsP%5/05/16: CIA-RDP78TO3194A000300010%1-1
MORI/HRP PAGES 93-94
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Military
after 1918-than in those with the more likely intelligence titles of
"The Attache as Observer" and "Spying Attaches and Diplomacy."
This is not a book to be read through at one sitting. There is an
unexpected number of footnotes (1,040 of them), and these sometimes
prove more revealing than the text proper. But even reading a bit
at a time, one cannot avoid the cumulative thrust of the historical
incidents which the author brings in again and again to show the
conflicts that civilian-military relationships create for attaches from
most nations at the various world embassies. Vagts' quote from an
instruction issued in Germany
Since no mission can pursue two policies in its relations with a foreign state,
every report of a military attache must be submitted to the Ambassador.
highlights an attache problem of 1891-and of years before, and since.
Several attaches-designate of my acquaintance have now read The
Military Attache'. They were distracted by its multitude of footnotes
and disappointed by its almost total lack of reference to the past
decade. If neither of these peculiarities will unduly affect you, you
will probably find in it a good deal to enjoy, stretching the reading
out over a period of time.
THE AMERICAN INTELLIGENCE COMMUNITY. By Monro
MacCloskey, Brigadier General, USAF (ret.). (New York: Richards
Rosen Press. 1967. 190 pp. $3.78.)
This inept concoction will not do at all.
Not that the book does great harm. It bears no malice, grinds
no axes, and seems to have no deeper purpose than to turn an honest
dollar. Its intended audience is no more exalted than, say, the reserve
lieutenant who needs to eke out a point toward retirement by boning
up on the book for a talk on intelligence to a meeting of his reserve
unit. But it is a thoroughly unsatisfactory job. The reason for
reviewing such a book here is twofold: to lessen the chance that,
given the importance of the subject and the impressive military
background of the author, some training establishment will put it on a
list of required or recommended reading; and to discourage other
amateur researchers from undertaking a subject so far beyond them.
Apefloved For Release 2005/05/16: CIA-RDFOMMM U4XM03O W'10001-1
MORI/HRP PAGES 94-96
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Military OFFICIAL USE ONLY
The book is apparently the eighth title in its publisher's "Military
Research Series," of which the other seven entries were also by Gen.
MacCloskey. But military research is exactly what it is not. The
lieutenant boning up for his point could compile a more accurate and
useful treatment of the subject by browsing for a few hours in any
reasonably good public library. He would be spared having to
accept misinformation like this on the say-so of a retired general officer
with some intelligence experience:
The (US Intelligence] Board meets at least once a week at CIA headquarters
to weigh the input from the operating agencies and to prepare a compre-
hensive summary of secret information known as the National Intelligence
Estimate. This report is sent to the President weekly and provides him with
an excellent compendium of events and trends world-wide. In addition to
the weekly presentations, about twenty-five special reports are prepared each
year. ... The work of the Board is performed by about fifty special com-
mittees. . . . (p. 58)
Those are four of the sixteen sentences on USIB, which take up rather
less space than the author gives to a passage about diplomatic immu-
nity quoted from a training manual for defense attaches. On the other
hand, he does give to USIB a little more space than to Mata what's-her-
name, whose career he recounts in a couple of dozen lines that end
with an erroneous date and a fearless judgment:
... executed by a firing squad on October 15, 1916. Though much famed
in fiction and motion pictures, her actual accomplishments in espionage would
hardly be worthy of a footnote in military intelligence history. (p. 31)
In point of fact, the author treats his whole large subject as unworthy
of footnotes. The book has none of the elementary apparatus of
scholarship which any serious reader has a right to expect, and which
indeed the title of the series promises. No citation of authority how-
ever flimsy, except the two acts of Congress quoted in appendices and
a training manual or two; no bibliography however fragmentary; not
even an index. The level of research is exposed most cruelly in the
chapter on the defense attache system, which is the field of intelligence
the author knows best:
In late 1966, there were 168 Air Force officers and 260 enlisted airmen
assigned to Defense attache offices. Strengths of the Army and Navy attache
offices may be assumed to be roughly the same. (p. 113)
But what is most damaging is not the author's laziness, it is his
total want of discrimination, judgment, ability to evaluate evidence.
ApprovQ@ VAe d0,W/05/16: CIA-RDP78TO3194A000300010881-1
Approved For Release 2005/05/16 : CIA-RDP78T03194A000300010001-1
OFFICIAL USE ONLY Recent Soaks: Military
He read somewhere, no telling where, that Bismarck owed his quick
successes over Austria in 1866 and France in 1870 to the clandestine
operations of "the notorious Prussian spymaster, Wilhelm Stieber."
So that goes into the chapter on "historical background" (p. 27), along
with Christopher Marlowe and Mata Hari. Then he read somewhere
else that Bismarck owed those same quick successes largely to "the
volume and accuracy of the intelligence information furnished by
attaches." So that goes into the chapter on attaches. (p. 106).
In short, this is a thing of shreds and patches; one of those books
which string together threadbare assertions, unverified, unquestioned,
unrelated to the subject at hand, often pointless, scavenged from other
incompetent secondary sources which acquired the same shoddy goods
the same way. How many times have you read the flat assertion that
in 1929 Secretary Stimson said. "Gentlemen do not read each other's
mail?" Dozens. But have you ever seen one of these hacks make
even the feeblest effort to document that assertion? I never have.
Here is one more publication on that low level of research and analysis.
Hugh T. Cunningham
A~~roved For Release 2005/05/16: CIA-RDOF81MAt98 SOLO f 10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USIE ONLY
Intelligence and Policy
THE ESPIONAGE ESTABLISHMENT. By David Wise and. Thomas
B. Ross. (New York: Random House. 1967. 308 pp. $6.95.)
In this new book the authors have undertaken an ambitious forward
step in exploitation of the groundwork laid in their earlier one. Where
The Invisible Government capitalized on the dramatic effect of expo-
sure, The Espionage Establishment represents a more serious and in
many respects a more effective resort to analysis. This will offer little
satisfaction to the professional intelligence officer who, taking his
business seriously, strives to retain a general sense of proportion with
respect to the nature and purpose of his endeavor. Messrs. Wise
and Ross frankly deplore its nature, although they will concede with
some reluctance that it probably cannot be dispensed with in today's
world.
The concept of the intelligence community as a source of secret
power threatening the freedom it is designed to defend remains the
authors' basic premise, but they have now widened the arena. Focus-
ing first on the intelligence services of the four major powers, they
lay great stress on the institutional features of espionage. They depict
the parallel roles played by the major services in their respective
countries. That done, they launch a new thesis which in effect
comprises the main thrust of the book. The espionage revolution, as
Ross and Wise term it, is predicated upon the mushroom growth of
vast espionage "establishments" following World War II, and on the
inevitability of open and spectacular collision between them. Out
of this collision Ross and Wise see emerging a new set of rules
governing international espionage, unwritten but understood, which
taken as a whole represent a new, permissive way of looking at the spy
business on the part of governments and people.
The authors naturally view this phenomenon with considerable
alarm. Reader reaction to it is likely to vary according to attitudes
developed prior to perusal of the book. Viewed charitably and with
appropriate concession to the authors' premises, The Espionage Estab-
lishment stands up under scrutiny as a better than average specimen
of its genre. It is superior in almost every respect to The Invisible
Government. The writing is good journalese, and the narrative flows
smoothly with only moderate exploitation of the sensational potential
Approve OdFFFolRele -se Mobl/05/16: CIA-RDP78TO3194A000300010831-1
MORI/HRP PAGES 97-100
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Policy
of the subject matter. While the cut-and-paste-approach is not en-
tirely disguised, there is reasonable coherence and sustained momen-
tum.
Good marks are also in order for the authors' treatment of the Soviet
intelligence system. Drawing largely on factual data that have been
in the public domain for some time, they have compiled an accurate
and readable account of a subject that should fascinate but rarely
does. The espionage cases they feature are all Soviet operations
targeted at the United States except for the Stashynsky assassination
and the mustard gas attack on West German electronics expert
Schwirkmann. Soviet "illegal" operations are handled extremely well.
With allowance for inaccuracies discernible to few outside of pro-
fessional circles, this is probably the most lucid exposition of the
subject currently available to the layman.
Her Britannic Majesty's intelligence and security services are treated
shabbily in what is certainly the most objectionable portion of the
book. The detailed exposure of MI-5 and MI-6 exceeds by far any-
thing previously in print. Undoubtedly Messrs. Ross and Wise have
exploited information long available to the British press which it
could not print in the face of the D-notice system backed by the Official
Secrets Acts. The extent and significance of damage thus inflicted on
our British counterparts can better be judged by them. The authors
would certainly argue-as they did in the case of The Invisible Govern-
ment-that all they have done by cooperating with British journalists
to circumvent British security procedures was designed simply to tell
the public what it had a right to know. British Intelligence, they
would contend, once it recovers from the shock, can go on to greater
glory under the new ground rules.
The chapter on Chinese Communist Intelligence has a dogmatic
ring of authority, but it falls flat upon scrutiny. Its dramatic case
for Kang Sheng as the leading light of the Chinese intelligence service
cannot be authenticated. A number of factual inaccuracies and
much dated information mark the sections dealing with the service's
organization and distribution of responsibilities. On the :Plus side,
the authors present a reasonably accurate picture of the intelligence
role of Peking's embassies and trade missions. For reasons difficult
to explain, they occasionally resort to such dubious generalizations as
"in the rest of Asia, and in Australia as well, the KGB has become so
bogged down in counterintelligence operations against the Chinese
Ap l-oved For Release 2005/05/16: CIA-RD Brq*gvAi0 "o10001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Policy OFFICIAL USE ONLY
that its subversive activities had practically come to a standstill."
Overt sources-Time magazine and other periodicals-would account
for most of the material included in the chapter.
The "establishment" motif is played for all it is worth in the chapter
on the United States. Ross and Wise appreciate the existence and
scope of the rest of the intelligence community, but in their 44 pages
devoted to the subject, CIA-clearly a source of better copy-receives
their total attention. Names are named, some of them for the ump-
teenth time, all designed to reflect the Agency's intimate partnership
in the select circle of public figures presumed to be in control of
national policy. For background and color, all the old tales from
the cocktail circuit are trotted out and replayed in apparent seriousness.
A sense of humor, which the authors clearly lack, might have added
some badly needed perspective and served to offset the superficiality of
their approach.
In their search for novelty Ross and Wise have now "discovered"
the CIA Domestic Operations Division, They make a good deal of
it, and go to some pains to question the legality of the activity centered
on 1750 Pennsylvania Avenue. The net effect of the effort is to cast
a hazy shadow over it all, without ever really coming to grips with the
issue. Specific data relating to Agency personnel and operations are
taken from public sources. In this sense they do no particular damage.
The net effect, nevertheless, is bad. The citizen reader in his :inno-
cence, scanning these pages uncritically, will probably find what he
bargained for at the counter-a bit of sex, a touch of murder, a power-
ful agency relentlessly expanding, its soiled cloak and dagger only
half concealed by its Madison Avenue style. Some of this is lain
nonsense. Some of it is patently irresponsible. Regrettably, the
specifics will escape rebuttal and the authors enjoy the last word.
When all is said and done, it is obvious that although Ross and
Wise have widened the scope of their interests to encompass the
intelligence services of the other world powers, they have done so only
as a tour de force. CIA and all its works and pomps are their real
concern. The main arguments of The Invisible Government echo
again and again through these pages. They insist that the President,
despite protestations to the contrary, is not informed of many of the
Agency's important activities. To support this they cite President
Johnson's statement last February that he was "totally unaware"
ApproveCci o* r-USE ON
Kelease'1005/05/16: CIA-RDP78TO3194A0003008?0001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Policy
of the Agency's involvement with the National Student Association.
They dismiss the various forms of control over the Agency, including
congressional supervision, as inadequate. Congress, they contend,
has virtually abdicated its responsibility to act as a check on the vast
hidden power of "the invisible government." They hold further, in
reviewing the NSA "scandal," that the Special Group and the Agency
violated the spirit, if not the letter, of the Agency's charter. They
conclude by urging that the "obsolete" machinery for control of the
Agency be replaced by a visible and credible guardian, thus assuring
the public that the secret instruments of government are the servants
and not the masters of the national will.
It is difficult to debate the Ross-Wise thesis, in part because they
dismiss one's premises out of hand, and in part because of their re-
luctance to accept at face value anything reflecting favorably on CIA.
Their elaboration on the new role of espionage in world affairs,
although contrived and specious, is not uninteresting. It will certainly
help to sell the book. Few readers can fail to react to the exhortation
that espionage per se is a potential threat to world peace, "infinitely
more dangerous" now than ever before. Few can but be impressed
by the authors' assurance that espionage today creates a:n atmosphere
in which the veracity of government is questioned even when it is
telling the truth. The credibility gap, according to Messrs. Ross and
Wise, arose out of the Government's need to hide and protect its
espionage activity. When they argue that the Government has no
right to lie, few would disagree. Concomitantly, they seem to imply
that the Government has no right ever to remain silent. The Press,
by the same token, must ferret out the truth and force the Government
to confirm its impressions.
Ross and Wise allude frequently to the "literature of intelligence."
In it they see the lamentable extent to which espionage has permeated
the consciousness of modern society. They deplore the genie's escape
from the bottle. Oh, for a return to a quieter agel There is a tongue-
in-check quality to all of this. The genie has, after all, brought zest
to the new journalism, and nobody knows it better than Messrs. Ross
and Wise.
Apprd' &%1 For Release 2005/05/16: CIA-RDP76qb9J4 C9W001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Policy OFFICIAL USE ONLY
COMPETITIVE INTERFERENCE and Twentieth Century Diplo-
macy. By Richard W. Cottam. (University of Pittsburgh Press.
1967. 243 pp. $5.95.)
The core of this book is the development of an "ideal type model"
for foreign policy planning and its illustration in application to U.S.
policy in Iran. The model comprises a statement of objectives, ex-
plicit and detailed analysis of the situation and trends, formulation
of a strategy for changing these trends in favor of our objectives, and
selection, through an elaborate system of probes,. of tactical steps
in pursuit of the strategy. In Iran, for example-to simplify radi-
cally-one of our objectives is a stable non-communist government,
one of the trends is toward a concentration of power in the hands of
one man who :might be assassinated, so part of our strategy should
be to gradually broaden the base of the government, using our overt
leverage and covert assets in specified tactical moves to that end.
Intelligence comes into this not to make the required situational
analysis-Professor Cottam despairs of the "bureaucracy's" ever doing
such a careful and explicit job or being objective about it, and he would
have scholars do it for the benefit of congressional critics of administra-
tion policy-but by way of CIA's "other duties and functions," for
covert political action. It is artificial and old-fashioned, he says, to
shrink from this kind of meddling in other countries' internal affairs;
competitive interference is the very essence of foreign policy in the
nuclear age. But it should be done early, continuously, and unob-
trusively, instead of waiting until unfavorable trends have taken their
course and then having to do a crude thing like unseating Mossadeq.
CIA should therefore not be thought of as merely a supportive arm
of foreign policy, an instrument to be resorted to in crisis, but inte-
grated functionally into all stages of policy formulation and execution.
The new interdepartmental committees are a step in the right direction.
Like most books on foreign policy, this one virtually ignores the
role of intelligence proper, in planning and decision. Otherwise its
argument is logical, closely reasoned, and concretely illustrated, though
not phrased for easy reading. One suspects, however, that the "ideal
type model" is all too ideal ever to be put into practice.
ApproQW WkdY2 rse0W5/05/16: CIA-RDP78T03194A0003%fg101 b PAGE 101
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recenf Books: Policy
WHITE TIE AND DAGGER. By Andrew Tully. (New York:
William Morrow. 1967, 257 pp. $5.95.)
If this latest "inside story"-of diplomacy-is not a potboiler, it has
all the disarming characteristics of one. Spy stories and diplomatic
scandals from the Profumo affair to the Cuban missile crisis-in which
latter it appears that the Briton Ormsby-Gore had the hidden guiding
role-are dressed in inimitable graphic detail and verbatim quotations
of the author's imagining and strung tenuously on a provocative theme
addressed in the last chapter, "Is Embassy Row Obsolete?" This
chapter offers food for pondering in a belief attributed to Dean Rusk
that international "tensions will decrease if international relations can
be kept in the background."
In pursuit of this line Mr. Tully actually appears to have run out of
material when he had only about half enough pages for a book, so
he introduces a section on lobbying, a chapter each on Red China's
effort to influence Washington, on the Formosa lobby, and on Julius
Klein and sundry lobbyists; and then, since that added only about
forty pages, comes a section on ambassadors of history at the threshold
of U.S. wars-,Serurier in 1812, Lord Lyons in 1861, Von Bernstorff in
1915-16, and Nomura-Kurusu in 1941. But this cold outline gives no
idea of the high humour with which the author writes. Let him speak
for himself, as he describes the practical joke of a "bibulous British
diplomat" on a Soviet minister counselor:
"It's not Johnson at all, you know," he told Zinchuk. "He was assassinated
(luring the campaign, but they kept it quiet and elected a double. It was
quite easy, with Goldwater running on the Republican ticket." Zinchuk, one
of the more urbane Soviet diplomats, tore himself away as soon as it seemed
safe, convinced the Englishman was mad. But the British envoy later
reported he had checked with "an intelligence bloke" and discovered that
Moscow was making discreet inquiries about a reported "accident" to
Johnson during the 1964 campaign.
Anthony Quibble
CHALLENGES. By James B. Donovan. (New York: Atheneum.
1967. 155 pp. $4.50.)
The purpose of this book appears to be to demonstrate the author's
versatility. It is a collection of rather short talks or papers which
he has delivered at one time or another., each concentratir.g on some
Ap ved For Release 2005/05/16: CIA-RDF?CT @9 0JW 910001-1
MORI/HRP PAGES
102-103
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Policy OFFICIAL USE ONLY
experience he has had or some role he has played. These do have
a wide range: war crimes trials; his defense of unpopular clients, as
of Colonel Abel; the Cuban prisoner exchange after the Bay of Pigs;
and a number of different episodes from his work with the public
schools in New York. Only one section, entitled "World Power and
Strategic Intelligence," has to do with intelligence. It is a rather simple
outline of what the function is and how important it is in the modern
world, with emphasis on the role of the Central Intelligence Agency.
While it is nice to have such kind words appear in print, the discussion
offers nothing instructive for intelligence officers, being probably well
suited to the audience to which it was delivered at the Lake Placid
Club in New York.
ApprRFS Ir IU agA1605/05/16: CIA-RDP78TO3194A000300d%001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY
THE YOUNG STALIN. By Edward Ellis Smith. (New York:
Farrar, Straus, and Giroux. 1967. 470 pp. $8,50.)
This book is built around the thesis that Stalin was an Okhrana agent
throughout his prerevolutionary career, and all the evidence pre-
sented-the product of a very substantial research effort:-is shaped
to fit this view. The results are sometimes persuasive but frequently
awkward and incredible, even to a reader who was originally pre-
disposed toward the author's thesis.
For Mr. Smith tries too hard. All too often, when evidence is
either lacking or completely ambiguous, he constructs a highly specula-
tive and improbable hypothesis which he later alludes to as established
fact. (His depiction of Stalin's supposed conspiratorial relationship
in 1913 with the Bolshevik leader and known Okhrana agent Ramon
Malinovsky-at a time when by Smith's own showing Stalin was in
very bad odor with the Okhrana-is an example of such a hypothesis.)
More than once he sets forth an impressive generalization which he
himself subsequently undermines, apparently unwittingly: thus he
attaches (p. 59) tremendous sinister significance to the fact that
Stalin "alone" escaped arrest in the Okhrana raids in Tiflis in March
1901 but three pages later alludes in passing to a more important
Georgian revolutionary, Ketskhoveli, who had similarly escaped. This
overenthusiastic approach to the facts creates unnecessary distrust
in the reader and weakens confidence in some conclusions which may
nevertheless be correct.
The author does best in the first third of his narrative: although he
does not prove his thesis, there seems nothing inherently impossible
and much that is reasonable in his suggestion that Dzhugashvili may
have been tapped by the Okhrana as a low-level agent shortly after
his expulsion from the Tiflis seminary in 1899, that he systematically
informed on comrades in party organizations in Tiflis, Baku, and Batum
over the next few years, that he acquired a highly unsavory reputation
among the Social Democrats of each city in turn, that he was finally
arrested for cover purposes in 1902 when revolutionary suspicions
about him were about to boil over, and that the Okhrana furnished
Apprt1 d For Release 2005/05/16: CIA-RDP7@f6tAII4AW?@3 416001-1
MORI/HRP PAGES 104-105
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Recent Books: Miscellaneous OFFICIAL USE ONLY
the otherwise invisible means of support for the family he acquired
after 1904.
It is after this that Smith begins increasingly to strain the evidence.
He insists that the Okhrana was behind Stalin's masterminding of the
particularly bloody and ill-fated Yerevan Square robbery in Tiflis in
June 1907, although he is not consistent enough even to examine the
question of whether the Okhrana endorsed all the other Caucasus
"expropriations" Stalin is believed to have planned for the Bolsheviks
in 1906 and 1907. These operations were congenial work for Stalin,
and it was through them that he first acquired importance in Lenin's
eyes-surely sufficient motivation in itself for performing them. From
here on the effort to explain Stalin's behavior in terms of supposed
Okhrana operations becomes ludicrous in the light of what both the
Okhrana and Stalin actually did. The Okhrana arrested Stalin five
times in the nine years between March 1908 and the February Revolu-
tion, and it left :him at large a total of 3 months in 1908, 6 months in
1909, 3 months in 1910, 2 months in 1911, 6 months in 1912, 2 months in
1913, and not at all in 1914, 1915, or 1916. In September 1911 Stalin
had barely been in St. Petersburg two days before he was picked
up again and sent back to his term in exile. This seems to go well
beyond any conceivable requirements of cover. For Stalin's part,
when he was helping to run Pravda in St. Petersburg late in 1912 he took
a temporarily conciliatory line toward the Mensheviks-which, as
Smith admits, was precisely the opposite of what was wanted by both
the Okhrana and Lenin.
Smith recognizes that Stalin was not at all under Okhrana control by
1912, yet stubbornly insists (p. 202) that he must have continued to
have a regular contact in the Department of Police in St. Petersburg
to whom he supposedly could plan to denounce Roman Malinovsky
for disloyalty to the Okhrana. One of the weakest aspects of the
book is the failure to consider carefully when such links must have
disappeared, at what point Stalin must have decided to opt for the
Bolsheviks rather than the police. The evidence provided in the
book itself suggests strongly that this occurred much earlier than
the author is willing to admit, and that if Stalin had once had a foot
in the Okhrana camp it was probably withdrawn by 1907 or 1.908.
Harry Gelman
Approoved For Rereasse 005/05/16: CIA-RDP78T03194A0003000'ID001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
OFFICIAL USE ONLY Recent Books: Miscellaneous
ENCYCLOPEDIA OF WORLD ESPIONAGE. By As^ye Hashavia.
In Hebrew. (Tel Aviv: Ledory Publishing House. 1967. 339 pp.)
This is the title printed in English on one of the flyleaves. The
actual Hebrew title translates as follows: "Espionage: Encyclopedia
of Espionage and Spies." It covers the ambitious effort to present
in one volume of 48 chapters a historical review of the development
of espionage and a description of the structure of intelligence services
in the West, of present-day political and economic intelligence, and of
the essence of cryptology, secret writing, listening devices, and wire
tapping, as well as summaries of some famous spy cases.
Obviously, with such a wide range of topics, the author could give
no more than snatches of tradecraft and some briefest synopses of
case history. But he is not interested in a serious analysis anyway.
He is writing not for the professional but for the layman, and more
specifically for youthful readers attracted to the glamor of cloak-and-
dagger activities. (Two previous books under his name, possibly a
pseudonym, deal with exploration and discovery.) For this audience
he does very well. He writes in a light, entertaining tone which makes
for easy reading, treats the actors in the case histories sympathetically,
on the whole, and invests their exploits with an aura of romance.
The book begins, predictably, with the reconnaissance party Moses
sent into the Promised Land and Joshua's mission to Jericho; it ends
with the U-2 flight of Francis Powers. From U.S. history come
also the stories of Benedict Arnold, the Civil War nurse Emma
Edmonds, OSS's Dr. Stanley Lovell and his unconventional gadgets,
and Yoshikawa, "Hero of Pearl Harbor." Alongside these are ranged
the internationally famous spy stories of Mata Hari and her daughter,
"Cicero," Klaus Fuchs, Eric Erickson, Lonsdale, and others.
Of especially Jewish interest are the case histories of the Dreyfus
affair, the Nili spy net in Turkish Palestine during Word War I, the
Israeli spy Ali Cohen, caught and executed in Syria, and Frances
Hagen, the U.S. pro-Arab female spy caught and sentenced in Israel.
There are no revelations about Israeli intelligence, :however; the
author's principal source appears to have been the prolific writings
of Kurt D. Singer, whom he specifically mentions in several places.
Marvin J. Heiberg
ApprdQad For Release 2005/05/16: CIA-RDP76MgWkfff%(QbN 001-1
MORI/HRP PAGE 106
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Next 15 Page(s) In Document Exempt
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
Approved For Release 2005/05/16 : CIA-RDP78TO3194A000300010001-1
SECRET
25X1
Approved For Release 2005/058'BCRQA-RDP78T03194A000300010001-1