STUDIES IN INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010009-3
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
128
Document Creation Date:
December 16, 2016
Document Release Date:
March 10, 2005
Sequence Number:
9
Case Number:
Publication Date:
January 1, 1970
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000300010009-3.pdf | 8.02 MB |
Body:
Approver Release 2005/04/dR CIA-RDP78T03194A000300010009-3
STUDIES
in
INTELLIGENCE
CENTRAL INTELLIGENCE AGENCY
ARCHIVAL RECORD
PLEASE RETUPN TO
!`diCY ARCHIVES, BLDG. E)ECRET
N! 1548
Approved For Release 2005/04/18 : CIA-RDP7$T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RD 78TO3194A000300010009-3
RET
SECURITY PRECAUTIONS
Materials in the Studies are in general to be reserved to US per-
sonnel holding appropriate clearances. The existence of this journal is
to be treated as information privy to the US official community. All
copies of each issue beginning Summer 1964 are numbered serially and
subject to recall.
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
WARNING
This material contains information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Sees. 793 and 794, the transmission or revelation of which
to an unauthorized person is prohibited by law.
GROUP 1
Excluded from automatic
downgrading and
declassification
Approved For Release 20015/04/18 : CIA-RDP78T03191A000300010009-3
25X1
25X1
25X1
Approved For Release 2005/0ti'&hFIA-RDP78T03194A000300010009-3
I- I
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may
he written on any theoretical, doctrinal, oper-
ational, or historical aspect of intelligence.
The final responsibility for accepting or
rejecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion of the Board, the article
makes a contribution to the literature of in-
telligence.
EDITORIAL BOARD
ABBOT E. SMITH, Chairman
Additional members of the Board are
drawn from other CIA components.
SECRET
Approved For Release 2005/04/18 : CIA-RDP78 03194A000300010009-3
25X1
25X1
25X1
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET
CONTRIBUTIONS
Contributions to the Studies or communications to the editors may
come from any member of the intelligence community or, upon in-
vitation, from persons outside. Manuscripts should be submitted
directly to the Editor, Studies in Intelligence, Room 7E62, Hq.
I I and need not be coordinated or submitted through chan-
nels. They should be typed in duplicate, double-spaced, the original
on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Articles may be
classified through Secret.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office
dissemination center or the responsible Central Reference Service desk,
or back issues and on other questions call the Office of the
Editor,
Approved For Release 20
5/04/18: CIA-RDP78TO31 4A000300010009-3
25X1
25X1
Approved For Release 2005/04/18 ET IA-RDP78TO3194A000300010009-3
CONTENTS
Beaumarchais and the American Revolution .... Streeter Bass 1
French intelligence assists at the birth of the United States.
UNCLASSIFIED
Soviet Deception in the Czechoslovak Crisis ................ 19
A study in perspective. SECRET Cynthia M. Grabo
Rapid Transit in Clandestine Intelligence .................. 35
George H. Montminny
Evolution of a system. SECRET
The Serendipity Effect .................. Dino A. Brugioni 43
On the frontiers of intelligence photography. SECRET
The Agency and the Future .......... Charles D. Cremeans 77
Time, change, and intelligence. CONFIDENTIAL
1: 1
Editorial Notes .......................................... 103
Intelligence in Recent Public Literature .................... 105
CONFIDENTIAL
Approved For Relea
MORI/HRP THIS PAGE
Approved For Release 2005/0z RUTA-RDP78T03194A000300010009-3
25X1
THE 1969 STUDIES IN INTELLIGENCE AWARDS
The tenth annual Studies awards of $200 have been made to I
1there appeared little to choose in point
of significance to the literature of intelligence, and recognition is therefore
extended to all of them.
The Sherman Kent prize was not awarded in 1969.
25X1 Approved For Re
ase 2005/04/18 : CIA-RDP 8T03194A000300010009-3
25X1
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Releas,e 2005/05WJELtIA-ano7QT03194A000300010009-3
THE STUDIES IN INTELLIGENCE
AND SHERMAN KENT AWARDS
An annual award of $500 is offered for the most significant contribu?-
tion to the literature of intelligence submitted for publication in the
Studies. The prize may be divided if the two or more best articles
submitted are judged to be of equal merit, or it may be withheld if
no article is deemed sufficiently outstanding. An additional $500 is available
for other prizes.
Except as may be otherwise announced from year to year, articles on
any subject within the range of the Studies' purview, as defined in its
masthead, will be considered for the awards. They will be judged primarily
on substantive originality and soundness, secondarily on literary qualities.
Members of the Studies editorial board and staff are of course excluded
from the competition.
Awards are normally announced in the first issue (Winter) of each
volume for articles published during the preceding calendar year. The
editorial board will welcome readers' nominations for awards but reserves
to itself exclusive competence in the decision.
Approved For ReleaO
Approved For Release 2005/04/18: CIA-RDP78T03j 4t @g10009-3
French intelligence
assists at the birth
of the United States.
BEAUMARCIIAIS AND THE AMERICAN
REVOLUTION
"The King of England has long done me the honor of hating me. For
my part, I have always done him the justice of despising him. The time
has come to decide which of the two has shown better judgment and on
which side the wind will cause the heads to fall."
It was September, 1775, the King of England was George III, and the
speaker of the bold words was John Wilkes, flamboyant pamphleteer,
demagogue, radical Whig, rabble-rouser, libertarian, and, since the
autumn of 1774, Lord Mayor of London. He was the center of a circle of
the most vociferous of His Majesty's not-so-loyal Opposition and a
lodestone for all those who hated the authoritarianism of George III. He
presided over a series of famous (or infamous, according to the point of
view) "libertarian suppers" which were attended by radical British
Whigs and equally radical Americans of strongly separatist persuasion.
Ile gave vent to this opinion of his and his King's mutual esteem at one
such supper and, on this particular occasion, one of his hearers was a
Frenchman, Pierre August Caron de Beaumarchais, who the next day
included it in an intelligence report he was sending to Versailles.
The King's Agent
This Beaumarchais was a remarkable man. He was well known in
France as a highly popular dramatist, and equally well known even
beyond the borders of France as the author of four pungent pamphlets in
which he had protested an unjust judgment delivered against him by the
infamous "Maupeou Parlement." His origins were humble but his talents
were enormous. Born to a watchmaker in the Rue St. Denis in Paris, he
was by the time he was twenty an accomplished musician, the possessor
of a brilliant wit and debonair personality, and an ingenious watchmaker
who had invented a new escapement mechanism which permitted the
manufacture of very small watches. He had ingratiated himself at the
Approved SFor Release 2005/04/18: CIA-RDP78TO3194A0003000110009-3
MORI/HRP PAGES 1-18
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
UNCLASSIFIED Beaumarchais
court in Versailles, had made a watch for Madame de Pompadour small
enough to fit in a finger ring, and was giving the daughters of Louis XV
music lessons. From this auspicious beginning he had progressed rapidly
into the ranks of the lesser nobility. He was ambitious and he took
advantage of every opportunity. He was trained by the financier Paris-
Duverney in the ways of the business world and, by the time he was
nearing forty, he had amassed a sizable fortune. He had a volatile
temperament which constantly involved him in acrimonious controversy
with prominent members of the nobility, some of whom resented his
rapid rise in the King's favor. His vivid wit and facile pen demolished
some enemies, created others, and made him, in a few short years,
notorious in Paris.
Psychologically, Beaumarchais was an incurable adolescent to whom
life was a continuous drama in which he played a succession of leading
roles. What made him extraordinarily successful was his ability to absorb
with his whole being whatever role he was playing at the moment, to the
exclusion of any other. This delight in role-playing made writing for the
stage the inevitable outlet for his creative urge and it provided as well the
natural means of sublimating his personal frustrations. After several
minor starts and two indifferent successes, he had, in the preceding
la ebruary, gotten a smash hit onto the boards: "The Barber of Seville."
The role Beaumarchais was playing in London in the summer of 1775
was that of secret agent for Louis XVI. He had played the role twice
before--once for the King's grandfather, Louis XV, who was always
getting into scrapes, and once before for Louis XVI. In each case his
mission had been to contact discreetly and neutralize on the best terms
possible a blackmailer who was threatening to publish scurrilous material
on private life among the French royalty. He had been eminently
successful, and now Louis XVI, who had to devote a good deal of time
and effort at the beginning of his reign sniffing out and cleaning up some
of the more noisome messes left behind by his grandfather, had sent him
to London to seek out and negotiate a settlement with a certain
Chevalier d'Eon. This man, himself one of the more colorful figures of a
flamboyant age, had been an agent of Louis XV and he was now hold-
ing the new King up for a comfortable financial settlement. His leverage
was the threat of revealing to the British his secret correspondence with
Louis XV on the possibility of avenging the Bourbon defeat of 1765 by
attacking England across the Channel! Beaumarchais was well known to
Antoine de Sartines, then Lieutenant General of Police, who with the
new Foreign Minister, the Comte de Vergennes, had recommended him
to the King for this assignment.
Approved For Release 2005/04/18: CIA-RDP78T03194AIOWI3MrH 109-3
Approved For.Release 2005/04/18 : CIA-RDP78T011N9 LARPYII?0810009-3
eaum arc ais L I
Beaumarchais, whose delight in role-playing depended on getting
better and better roles in each new production, balked at first. He had
played this part before. But Vergennes won him over by promising him a
new part. A serious crisis was brewing between England and her North
American colonies. This quarrel was spilling over into British domestic
politics. The left-wing Whigs, and the anti-authoritarian party generally,
were becoming more vociferous and were attacking the King in daily
more strident terms. Vergennes needed to know what was going on. The
French ambassador in London, the Due de Guines, was reporting only
what the British government was passing to him in his official capacity
and this was hardly sufficient in the circumstances.
Possessed of one of the subtlest and keenest minds among the
statesmen of his era, Vergennes was a staunch royalist devoted to the
cause of restoring the greatness of the Bourbons. Since he was convinced
that this inevitably meant another trial of arms with England, it was vital
to him to know the nature and extent of Britain's differences with her
colonies and the repercussions in London. He therefore enhanced
Beaumarchais' role as low-level police agent in a blackmail case by
adding to it that of confidential political commentator and international
spy. Beaumarchais undertook the dual role with glee and performed it
admirably. He induced the Chevalier d'Eon to accept a settlement so far
below his expectations that he was thenceforth Beaumarchais' lifelong
bitter enemy, and he kept Vergennes informed in detail by voluminous
reporting on Britain's internal situation and her relations with her
recalcitrant colonies.
Beaumarchais had arrived in London in April, 1775. By the first of
May the news of Lexington and Concord had set London into a turmoil
of speculation and rumor. Lord Rochford, whom Beaumarchais had
known well in Spain some years previously, was still Lord North's
Foreign Minister. He was garrulous by nature and his free tongue kept
Beaumarchais well informed on the government's positions and plans. At
John Wilkes' house, which he frequented for over a year, he came into
close contact with the extreme left wing of the Whigs as well as with
many Americans. He thus had excellent access to both sides of the
question.
The Advocate of Intervention
Foremost among the liberal Americans with whom Beaumarchais
came in contact was Arthur Lee. He met Lee at Wilkes' house and
immediately found him a most congenial companion. He was witty,
impetuous, ambitious, and consumed with a passion for complete
Approve WRelease 2005/04/18 : CIA-RDP78T03194A000300~10009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
UNCLASSIFIED Beaumarchais
separation of the colonies from England. The two spent hours together
discussing the problems of American independence and Beaumarchais
became keenly aware of the depth of the rift between the colonies and
the mother country. He also became imbued with a conviction of the
essential rightness of the American cause. Gradually his reporting
became less objective and more biased in favor of the Americans. By the
autumn of 1775 he had become an outspoken advocate of the American
position and a persistent proponent of the desirability of French
intervention.
Vergennes agreed. But, where Beaumarchais, the volatile idealist, felt
in his heart the necessity for the liberation of a gallant people who ought
to be freed from tyranny, Vergennes, the political realist, felt in his head
that the most direct route to French ascendency in Europe lay in
England's military embroilment on the other side of the Atlantic. In
Beaumarchais' view, there was no reason for France to hesitate to support
the Americans. The more realistic Vergennes, however, saw two impedi-
merits blocking the way. One was the fact that France had not yet
recovered sufficiently, either financially or militarily, from the Seven
Years War to risk war with England for the present; the other was the
character of Louis XVI.
Louis had been brought up to take a rigid view of the Christian
admonition to love one's enemies. He stubbornly refused to take
advantage of England's embarrassment to further his own ends.
Vergennes, Foreign Minister for only about a year, was still cautious
about remonstrating with the King concerning his moral myopia. He
agreed that, if Beaumarchais would write a series of confidential
dispatches, addressed either to him or to Sartines, in which the pro-
American arguments would be pressed with enthusiasm and
persuasiveness, he would see that these reports came to the King's
attention. The fact that they had been submitted by the irrepressible
Beaumarchais would presumably shield Vergennes from any undesirable
consequences which might result if the same sentiments came directly
from one of the King's ministers.
Beaumarchais returned to London and launched a series of
impassioned dispatches imploring the King to abandon his inappropriate
religious scruples and to undertake acts which were in the obvious inter-
est, if not of himself, then surely of his subjects and nation. He contin-
ued his pleadings to Vergennes and the King on America's behalf
ceaselessly throughout the winter and spring of 1775-76. At the same
time he stepped up his activities among the Americans and British lib-
erals to the point where the British authorities began to suspect that the
Approved For Release 2005/04/18: CIA-RDP78T03194AU6626661Fd6?9-3
Approved For Release 2005/04/18 : CIA-RDP78T0$1~ffpy~910009-3
8eaurnarchais
d'Eon affair was not the real reason for his presence in London. A change
of cover seemed to be in order and, at Vergennes' request, the French
government gave him the assignment of purchasing on the London
market Spanish and Portuguese coin, then at a premium in the West
Indies trade.
In the meantime, relations between the colonies and Britain
deteriorated steadily. By the end of 1775 the Americans were irrevocably
engaged in an all-out struggle for complete independence. The
Continental Congress had set up the Committee of Secret
Correspondence, and the Committee had designated Arthur Lee as its
agent in London. Lee and Beaumarchais began serious discussion of the
possibilities for French aid.
The American need was certainly critical. George III had decided to
crush the rebellion with a quick and vigorous effort and, since Britain
was as usual unprepared for war, had hired mercenaries in Germany to
provide the necessary manpower. Most observers on both sides of the
Atlantic doubted that the Americans would be able to deal effectively
with a large expeditionary force of experienced European
troops-especially in view of their lack of artillery and engineers.
Throughout the spring of 1776, Beaumarchais deluged Vergennes and the
King with Lee's pleas for assistance, with his own pleas, and with rea-
soned and impassioned arguments for French interventions. By the end
of March most of the cabinet had been won over. Only Turgot, the Min-
ister of Finance, dissented. A short time thereafter Turgot resigned and
was replaced. It was agreed, however, that the decision should be kept
secret for the time being. Assistance would be given the Americans, but
until the French armed forces were strengthened to the point of being
able to deal effectively with the British in open warfare, France would
be careful to maintain a sufficient semblance of neutrality.
Because of this need for secrecy, Beaurnarchais was not informed of the
decision. He was left in London dealing with Arthur Lee, and a Dr.
Barbeu Dubourg-friend and correspondent of Benjamin Franklin and
translator of Franklin's in France-was picked by the government to be
the intermediary with the Americans. Barbeu Dubourg did not work out
well, however. He was too old, he lacked business acumen, and-naore
serious in a venture of this nature-he was insecure and garrulous.
Within a month Vergennes and Sartines, now Minister of the Navy,
decided that Beaumarchais would be a better bet. He was summoned
Ap-PU cA c lease 2005/04/18: CIA-RDP78T03194A0003000 0009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
UNCLASSIFIED Beaumarchais
from London and told to submit immediately a plan for the clandestine
assistance to the American cause.
Beaumarchais proposed that the Spanish and Portuguese coins he had
been buying in London be used for an immediate subsidy to Congress.
One million livres would he the initial amount, half of which would be
sent immediately to America to support the paper money being issued by
Congress and the other half used to buy arms and ammunition in the
Netherlands and other European countries. These purchases would be
handled by a cover firm for which Beaumarchais proposed the name
Roderigue Hortalez et Compagnie.
The French government did not accept this proposal. Direct subsidy in
support of the colonial currency came too close to overt violation of
France's neutrality and France, now committed to a course which would
inevitably lead to war with England, could not afford to spend money
buying arms outside her own borders. There was a better way.
Preparation for war with England meant the complete overhaul of the
French army which had had little attention for years. In particular the
artillery needed modernization. Large numbers of perfectly serviceable
guns had thus become surplus. As a matter of fact, a major of artillery
named 1)u Coudray had already been ordered to call the French arsenals
for guns and other military supplies which were to be made available to
Barbeu Dubourg. Vergennes, Sartines, and St. Germain, the Minister of
War, now saw a way to assist the Americans securely and replenish the
french treasury at the same time. The Hortalez firm would be set up as a
completely "black" operation. It would buy munitions from the French
government on credit, sell them to the Americans, and then reimburse
the government which would thus dispose of its surplus equipment at a
tidy profit.
The government, therefore, informed Beaumarchais that he should
proceed to organize his cover firm. As initial capital he would receive a
loan from the government of one million livres. The other Bourbon
crown, in Madrid, would supply another million. He would then raise
another two million by selling stock to his personal business
acquaintances and friends. The firm's raison d'etre would be trade with
the West Indies. It would purchase from French arsenals such
supplies-guns, powder, muskets, blankets, shoes, clothing-as might be
needed. The firm could pay outright for this materiel or replace it with
equivalent articles. Beaumarchais would charge Congress a reasonable
price for what he was able to deliver and accept payment in tobacco, rice,
indigo, and cotton which he would be able to market in Europe. The firm
would he completely self-supporting. Beyond repayment of the original
Approv4d For Release 2005/04/18: CIA-RDP78T03194 8MbbTM9-3
Ai oarrovvep Fos Release 2005/04/18: CIA-RDP78TQ 1 %%9A@1fi10009-3 a
loan and payment for the purchases from the arsenals, the government
would have no claim on any profits the firm might make. By the same
token, the firm would have to absorb any losses. It would acquire, by
purchase or charter, its own shipping and would deliver its goods to
transfer points in the West Indies where the Americans would pick them
up in exchange for cargos of tobacco, etc. As an added incentive,
Beaumarchais, who still stood under a sentence of "blame" (i.e. loss of
certain civil rights) at the hands of the Maupcou Parlement, was
promised full restoration by the Royal Council.
Beaumarchais, fired with enthusiasm for the American cause and
delighted with his new role, eagerly accepted the arrangement. On June
10, 1776 the Treasury paid him one million livres-in gold coin. With
typical theatricality, he received the money in canvas bags, had it placed
in his carriage, and drove with it to his house. There he called his whole
family together and, with a magician-like gesture, poured out the coins
into a shining golden heap on the floor!
Two months later, on August 11th, he received another million from
the Spanish Ambassador. From a group of French merchants he obtained
a third million and Roderigue Hortalez et Compagnie was in business.
He rented a large building in the Rue du Temple called the Hotel de
Hollande, since it had formerly been the Dutch Embassy. Here he set up
the firm's offices, moved his residence and family into the same building,
and waited for Vergennes to put him in touch with a responsible
American agent.
Enter Silas Deane
In March, 1776 the Committee of Secret Correspondence had named
Silas Deane to be the agent of Congress in Paris. This appointment was
made without the knowledge of Congress since Congress, as Franklin
wryly commented, "consists of too many members to keep secrets."
Deane arrived in Paris on July 5th under cover as a wealthy Bermuda
merchant whose business intent was trade with the Indies. Armed with a
letter of introduction from Franklin, he sought out Barbeu Dubourg and
asked to be taken to Versailles. The old doctor temporized. His relations
with Vergennes had, as we have seen, become somewhat strained and
he was now afraid of losing his importance as an intermediary if Deane
were introduced directly to Vergennes. Relying on his instructions from
Franklin, however, Deane persisted and on July 17th Dubourg finally
took him to Versailles where he had a two hour session with Vergennes.
Gerard de Reyvenal, First Secretary of the Ministry and later the first
French Ambassador to the United States, acted as interpreter. At the end
UNCLASSIFIED 7
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
UNCLASSIFIED Beaumarchais
of the interview Gerard mentioned Beaumarchais to Deane and
immediately thereafter informed Beaumarchais that a secret
representative of the American Congress had arrived.
On July 19th Beaumarchais and Deane met for the first time. They
became fast friends almost immediately and throughout their association
they worked smoothly together as a team. They had no trouble arriving
at mutually satisfactory terms for the delivery of the promised arms and a
firm contract was embodied in an exchange of letters dated July 20th and
22nd. The contract provided that Beaumarchais would make his goods
available to Congress on a one-year credit. Congress was free to pay
either the value of the goods on delivery on the purchase price at the
French arsenals plus insurance, shipping, and commission-whichever it
desired. Payment was to be made in kind: tobacco, indigo, and other
colonial goods, the shipment of which would commence immediately, as
soon as shipping could be found. Deane duly reported these
arrangements to the Committee of Secret Correspondence and awaited
confirmation. Beaumarchais embarked on a whirlwind of activity to
fulfill his end of the bargain.
For the remainder of 1776, Hortalez & Cie. functioned like one of
Beaumarchais' own well-oiled watches. Beaumarchais seemed to he in
Paris, Bordeaux, Nantes, Le Havre, and Marseilles simultaneously. Ships
were purchased or chartered, provisioned, supplied with officers and
crews. The weapons which Du Coudray had culled from the arsenals
began to flow toward the ports. Donatien le Rey de Chaumont, intendant
for supplying clothing to the French army, became one of Beaumarchais'
partners. He gave the firm a credit of one million livres and undertook to
supply enormous amounts of clothing. By the end of the year,
Beaumarchais had collected 200 field pieces, 300,000 muskets, 100 tons
of powder, 3,000 tents, and large amounts of ammunition. He also had a
blanket, a pair of shoes, and two pairs of wool stockings for each of 30,000
men along with such miscellaneous items as buttons, buckles, needles,
thread, pocket knives, and bolts of wool and silk for uniforms. Most of
this material had been collected at Le Havre and was being loaded for
shipment.
There were hitches, of course. For one thing, all this activity could not
possibly escape the notice of British intelligence. Reports regularly
reached Lord Stormont, the British Ambassador, of vast quantities of
martial materials moving on the roads of France, to and through French
ports, bound ostensibly for the French West Indies but in quantities
wholly inappropriate to any reasonable needs in the islands. Stormont
protested often and volubly to Vergennes, who at first professed complete
Approved For Release 2005/04/18: CIA-RDP78T03194AMIA55 IN9-3
AIN%y# . SRelease 2005/04/18: CIA-RDP78T001 8I10009-3
ignorance. Vergennes also pointed out-conservative royalist that he
was-that he would be the last to furnish help to the American
insurgents: after all, revolution was a dangerous thing; a revolution here
inevitably begot a revolution there. Stormont, to whom the already
deteriorating internal French political situation was no secret, seemed
placated for the moment at least. This astute diplomat was, however, by
no means convinced of the innocence of the French government. In the
light of continued reporting from his agents indicating clandestine help
to the Americans, his protests to Vergennes became increasingly insistent
and the government finally felt constrained to issue ordinances against
the smuggling of war supplies.
Beaumarchais soon found himself running afoul of these regulations
and protested vehemently to Vergennes, who instructed him in what it
means to operate "black." He was told that the snags he was
encountering were unfortunate but inevitable. He would have to be more
careful and he was not to embarrass the government by getting caught in
any serious breach of the regulations.
Beaumarchais also began to have trouble with Major Du Coudray. At
first, Du Coudray was invaluable to Deane and Beaumarchais. In
addition to the excellent job he was doing in selecting the arms to be sent
to America, he also proved a valuable assistant to Deane who was
overwhelmed with a flood of volunteers seeking to enlist, or rather to
become officers, in Washington's army. The problem of sorting truly
useful officers from the mass of volunteers was a difficult one for Deane,
who was not accustomed to dealing with Europeans. Du Coudray was
particularly helpful in picking out good artillery officers and it was
decided that a contingent of these should accompany the first shipment
of cannon to America. By November Beaumarchais had three ships
loading at Le Havre: Le Romain, La Seine, and L'Amphitrite. At this
point Du Coudray decided that he had a golden opportunity to advance
his career. He too would go to America and he persuaded Deane to give
him a Major General's commission in the name of Congress. Because of
his energy, efficiency, and cooperative spirit up til then, both
Beaumarchais and Deane felt that they were lucky to obtain his services
for the Colonists. Unfortunately as soon as he had received his
commission, Du Coudray began to behave as if he were in charge of the
whole operation. Ile left Le Havre where the three ships, now fully
loaded, were awaiting only a favorable wind to sail, and went to Paris to
persuade St. Germain to send him to America under his personal orders
and as his personal representative.
UNCLASSIFIED 9
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approv d LAor g e 2005/04/18: CIA-RDP78T03194A000300010009-3
~N I Beaumarchais
Beaumarchais was frantic. The ships had been loaded ostensibly for
the West Indies. But the artillery officers, whiling away their time in the
Le Havre Cafes while waiting for the wind, were openly bragging that
they were going to America. Beaumarchais complained bitterly to
Vergennes. The wind at Le Havre might turn favorable at any time but
the ships could not sail without Du Coudray. Vergennes called on St.
Germain, and Du Coudray was sent packing back to Le Havre.
Beaumarchais followed him to be sure that nothing else went wrong. And
there, after all his efforts at maintaining security, after all his
complaining about security, after all his worry about the noise the
artillery officers were making, it remained for him to commit the most
damaging security breach of all.
In all his activity for Hortalez & Cie., Beaumarchais had used the
pseudonym "M. Durand." On arriving in Le Havre he found that a local
theater company was rehearsing his Barber of Seville. The temptation
was too much for "M. Durand's" theatrical sense, to say nothing of his
vanity. He attended the dress rehearsals, assisted the director, gave
instructions to the actors, and all with such an air of authority that it
didn't much matter what he called himself thereafter. Armed with this
evidence of the involvement of a known confidant of the King and the
Foreign Minister in an obvious traffic in contraband of war, Stormont
stormed in to Vergennes. His representations were so bitter and his
threats to break relations with France so obviously sincere that Vergennes
felt he had no alternative but to prohibit the sailing of the three ships.
His government was not yet ready for a showdown with England and he
chose the prudent course.
When Vergennes' order arrived in Le Havre, Le Romain and La Seine
were still at anchor; L'Amphitrite, with Du Coudray on board, had
already sailed. The incredible Du Coudray, however, managed to make
Vergennes' order effective anyway. When a few days out, being
dissatisfied with his accommodations, he took command of the ship over
the captain's head and brought her back to Lorient on the pretext of
repairing storm damage. He left the ship there and returned to Versailles
in order to resume his efforts to enhance his military prestige.
For another month Beaumarchais' three ships remained in port.
Finally Vergennes decided that things had quieted sufficiently to allow
them to depart-discreetly and by night. Beaumarchais took a gamble.
Instead of sending them, as planned, to the West Indies where their
cargos would he transshipped, he ordered them to make for a mainland
port. His purposes were no doubt several: to confuse the British fleet; to
deliver the supplies as rapidly as possible to Washington's destitute
Appro'J d For Release 2005/04/18: CIA-RDP78T03194 b- dq 9-3
aumar c Release 2005/04/18: CIA-RDP78T0~' 4 8W~ff 10009-3
Awroved Fha-or.s
army; and partly, we must assume, knowing Beaumarchais, to achieve
the maximum dramatic effect with the arrival of his first shipment. He
was lucky. All three vessels eluded the British and arrived safely at
Portsmouth, New Hampshire, in April.
The supplies were delivered to the northern army under Horatio Gates,
and there can be little doubt that they were vital to the success of his
campaign against Burgoyne the following autumn. Vergennes, who had
held off from overt intervention until there should be some clear-cut
indication that the American army could deal successfully with trained
European troops, delayed no longer after the news of Saratoga reached
Paris on December 4th. Thus it could be said that Beaumarchais, whose
constant urging had been instrumental in Vergennes' decision to support
the Americans secretly, had now provided the means to the victory which
brought France completely and overtly to the aid of the infant republic.
Beaumarchais continued to load and dispatch vessels throughout the
summer of 1777. In fact he continued to do so throughout the war,
although after overt French intervention, the importance of his
contribution became relatively minor. His usual route of delivery was
via the West Indies, the transfer points being either Cap Francais in
Haiti, Santo Domingo, or the Dutch island-colony of Statia. The
deliveries in 1777 and early 1778 constituted almost all of the military
goods reaching the Colonies during those critical months. It is perhaps
not too much to say that Beaumarchais and Deane, by their own efforts,
brought the infant United States through the most critical period of its
birth.
The Inspector General
Beaumarchais' assistance to Deane was not limited to the supply of
materiel. The volunteers who flocked to the American Commissioners in
Paris were, as has been noted, something of a problem. Those who came
in the fall of 1776 when the American cause was in perilous straits were
young and eager French officers filled with idealistic enthusiasm for the
birth of freedom in the New World. But many of these idealists became
problems in America. They insisted on high command positions; they
could speak little or no English; and they were unfamiliar with American
conditions as well as the personality and psychology of the American
soldier. Before long, Congress was sending frantic appeals to Paris to hold
down the number of commissions being granted.
In the spring of 1777 the military situation had altered considerably
from that prevailing in late 1776. Washington had succeeded in holding
his army together, and had won at Trenton and Princeton, and Howe
Approved oar Release 2005/04/18 : CIA-RDP78TO3194A00030 1 1 1 0009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
UNCLASSIFIED Beaumarchais
had failed to take Philadelphia. France was beginning to show signs of
serious intent to intervene and all indications pointed to a long war. In
Europe no military events of significance had taken place since the end
of the Seven Years War and unemployed soldiers were everywhere in
evidence. Many offered their services to the Commission in Paris and
Beaumarchais was of invaluable assistance in sorting out the riff-raff
from the competent soldiers.
I [is most spectacular coup was von Steuben. Baron Friedrich Wilhelm
von Steuben had served as a captain of infantry in the Seven Years War.
After the war he had been discharged more or less under a cloud. He tried
to find service in Denmark where St. Germain-later to become Louis
XVI's Minister of War-was reorganizing the army. He failed to find a
suitable post. He became Hofmarschall to the Prince of Hohenzollern-
Hechingen who gave him the title of Baron but could afford him very
little pay. He tried unsuccessfully to achieve a career in the armies of
France and Austria and in the service of the Markgraf of Baden. In the
spring of 1777 he found himself in Paris where he renewed his acquaint-
ance with St. Germain who recommended him to Vergennes for service
in America. Vergennes sent him to Beaumarchais.
Beaumarchais liked him, gave him a room in the Hotel de Hollande,
and took him to Deane and Franklin who were impressed with his
credentials but were under strict instructions from Congress about hiring
any more foreign officers. If he would, like Lafayette, consent to serve as
a private and without pay, he could be accepted, otherwise not. Von
Steuben was not in a financial position to permit himself such a luxury.
He renewed his efforts to find a suitable post in Europe but again
without success. August of 1777 found him again in Paris and in even
more desperate straits. Again Beaumarchais took him into the Hotel de
Hollande and racked his brains as to what to do. He came up with a
typically Beaumarchaisian solution. He dressed von Steuben in the
uniform of a Prussian lieutenant general and launched him upon
Parisian society accompanied by an aide and a military secretary-both
paid by Beaumarchais. In due course Deane and Franklin were able to
write Washington: "The gentleman who will have the honor of waiting
on you with this letter is the Baron Steuben, Lieut. Genl. in the King of
Prussia's service." Beaumarchais then lent von Steuben sufficient money
for the trip and sent him off to America in one of his own ships. Later he
sent Steuben's two nephews to join him.
Beaumarchais had no regrets. In December, 1778 he wrote his
correspondent Francy: "Remember me often to my friend M. le Baron de
Steuben. I congratulate myself, from what I hear about him, on having
Approvb2l For Release 2005/04/18 : CIA-RDP78TO3194AOOO2 OOIFODD9-3
Approved For Release 2005/04/18: CIA-RDP78T0 ' C4ARRYPP810009-3
Beaumarchais
given so great an officer to my friends, the free men, and having forced
him, in a way, to follow that noble career. I am not by any means uneasy
about the money I lent him for his voyage. Never did I make an
investment that gave me so much pleasure, for I put a man of honor in
the right place. I hear that he is Inspector General of all American troops.
Bravo! Tell him that his glory is the interest on his money and that I do
not doubt that, on these terms, he will repay me with usury." Von
Steuben's glory turned out to be not only interest but also principal as far
as any repayment to Beaumarchais was concerned. Among the unpaid
bills found in his files after his death was one: "A Steuben, pour avances
faites en particulier pour passer en Amerique, et a ses neveux pour alter le
joindre, 5997 francs, 2 sols, 7 deniers."
The Ineffable Arthur Lee
This debt was not, by any means, the only unpaid bill deriving from
Beaumarchais' assistance to his "friends, the free men." From the
beginning of the operations of Hortalez & Cie., until September 1777, he
sent five million livres worth of goods to America and received nothing
in return. This total lack of performance by his countrymen of the
contract he had made was a source of acute embarrassment to Deane vis-
a-vis Beaumarchais, and to Beaumarchais vis-a-vis his stockholders.
Three times in 1777 Beaumarchais had to appeal to the Foreign Ministry
for aid to avoid bankruptcy and three times Vergennes bailed him out
with loans totalling over a million livres. In September he sent a personal
emissary, Theveneau de Francy, to America to investigate the situation
firsthand and report directly to him.
The reasons for this unfortunate state of affairs were many and
complex. The new nation was in the kind of administrative turmoil which
could only result from an attempt to govern by legislature alone. Until
the ratification of the Constitution in 1789 the only authority was
Congress-a legislative body trying, with a predictable lack of success, to
perform simultaneously legislative, executive, and judiciary functions. It
was government by committee with a vengeance, and it did not work. In
the summer of 1777 Congress was financially and militarily near disaster.
There was no money in the treasury, Howe took Philadelphia and
Congress fled to Lancaster and then to York. Gates won at Saratoga, but
immediately thereafter the "Conway Cabal" plunged the army and
Congress into more confusion than ever. In the circumstances it is
perhaps not too surprising that Deane's appeals on behalf of Hortalez &
Cie. went unheeded.
Appro 6~6_W~lPklease 2005/04/18 : CIA-RDP78TO3194A000300b10009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
UNCLASSIFIED Beaumarchais
But far more damaging to the fortunes of Beaumarchais was the
behavior of Arthur Lee. Following his recall to Paris in May, 1776,
Beaumarchais drastically curtailed his contact with Lee. He did write
him in June that he was preparing to send materiel for "your friend" to
Cap Francais where the "friend" could pick it tip against cargos of
tobacco. However, the arrival of Deane, and Vergennes' demand for
secrecy, put a stop to any further dealing with Lee. In August Lee heard
that Deane had supplanted him as the chief agent of Congress for
soliciting aid in Europe and he rushed to Paris in a fury. He got nowhere.
Neither with Deane who treated him with a distant coldness, nor with
Beaumarchais who was cordial but evasive, nor with Vergennes who
refused to see him. He returned to London and immediately sent
Philadelphia a message to the effect that any supplies shipped to
America by the firm Hortalez & Cie., were really a free gift of the French
crown and that no reimbursement was expected! From then on Lee never
ceased to deliver, in letters and memoranda to his brothers and their
friends in the Lee-Adams faction of Congress, charges that the Hortalez
supplies were gifts, that the Hortalez firm was a blind behind which
Deane and Beaumarchais were engaging in illicit war-profiteering, and
that Congress was the victim of all sorts of undercover machinations at
their hands.
On September 26, 1776, Congress appointed Franklin, Deane, and
Thomas Jefferson Commissioners to try to negotiate a treaty of
recognition with France. Jefferson declined the appointment and Arthur
Lee was named in his place. Franklin arrived in Paris in mid-December,
informed Deane of his new status, and summoned Lee from London.
This was of no help to Beaumarchais whatever. Franklin resented
Beaumarchais' ascendency over his cher bon ami, Barbeu Dubourg, and,
while not actually hostile, was cold and distant. Lee, of course, was still
furious at Deane and Beaumarchais and threw all sorts of impediments
in their way. Deane remained friendly and cooperative but was totally
unable to enlist the other Commissioners in trying to get Congress to
honor its obligation to Hortalez & Cie.
In the midst of this state of affairs, Beaumarchais' agent, Francy,
arrived in America armed with documents intended to prove
Beaumarchais' good faith. He was referred to the newly-created
Committee of Commerce which carefully examined the documents,
decided that they were in order, and agreed to sign a definite contract.
This contract, duly signed, specified in detail how the Hortalez goods
were to be delivered and with equal detail the conditions of payment by
the United States. Francy wrote Beaumarchais that their troubles were
Appro~dd For Release 2005/04/18: CIA-RDP78T03194)dtr0!3 W9-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Beaumarchais UNCLASSIFIED
over. Beaumarchais continued to ship his goods without interruption. But
they both had much to learn about the nature of the American Congress.
This body could still not bring itself to ratify the contract made in its
name by its own committee.
By the end of 1777 the discontent in the army over the commissions
granted to foreign officers by Deane, the confusion over the Hortalez
payments, and the insinuations of Arthur Lee regarding Deane's
competence and honesty culminated in a decision by Congress to recall
Deane and to send John Adams in his place. Deane returned to face
Congress in August, 1778. He felt the atmosphere loaded with
antagonism and responded by showing the worst aspects of his character:
haughtiness, aloofness, disdain. He brooded over his grievances, and the
association with Benedict Arnold which ruined the rest of his life began
at this time.
The controversy in Congress over Deane and Beaumarchais polarized
the Jay-Livingston and Lee-Adams factions into pro- and anti-French
groups-a fact which disturbed the new French Ambassador, Gerard de
Reyvenal. It also disturbed Vergennes and he authorized Gerard to
deliver officially, at a time which he thought most appropriate, a
statement of the true nature of the Hortalez firm to Congress. The storm
of public and private polemic raged throughout the autumn with now
one faction in the ascendency and now the other. The pro-Deane, pro-
French, faction achieved a victory on December 8th when it forced the
resignation of Henry Laurens as President of the Congress and replaced
him with John Jay. A week later Thomas Paine published a blast in
support of Arthur Lee. Finally, in early January, Gerard felt that the time
had come to intervene. He forwarded an official communication to
Congress in which he stated categorically that the supplies sent by
Beaumarchais had been sold to him by the King's Ministry of War and
that he had given his obligation to pay for them. They were not, in any
way, gifts of the King to the Americans.
Congress confessed itself abashed and authorized John Jay to write
Beaumarchais and apologize in its name and to promise fulfillment of
the contracts. With vast relief Beaumarchais received this official
acknowledgement of the justice of his claim from the highest quarter of
the American government and redoubled his efforts to send supplies. But,
then as now, politics was the order of the day in Congress; new problems
arose, new squabbles claimed the attention of the delegates, and
Beaumarchais was again forgotten. No remittances came.
ApIMckl!rl ff4 lease 2005/04/18 : CIA-RDP78TO3194A000300bI 0009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
UNCLASSIFIED Beaumarchais
The War Profiteer
With the recognition of France of the United States on February 6,
1778 and the open outbreak of war with England, the contribution of
Iortalez & Cie. became a drop in the stream of troops and materiel which
poured across the Atlantic. But Beaumarchais was not merely an
adventurer looking for a quick profit. He was an idealist and he
continued to send his cargos even though they were now relatively
insignificant and even though there was no indication that he would ever
be reimbursed. He now undertook new measures to try to put his cover
company on a paying basis.
With the end of France's neutrality her ships became legal targets for
British warships and commerce raiders and soon the prices of sugar and
other products of the French West Indies were sky-rocketing.
Beaumarchais continued to send his supply ships to the United States
but, instead of trying to get cargos from Congress, he ordered them to
return via the West Indies and load sugar. This trade proved extremely
profitable for the first time since its inception, Hortalez & Cie. got itself
out of the red. Georges Lemaitre in his biography, Beaumarchais, gives
the following summary:
`I-rom its foundation in 1776 until its dissolution in 1753, the flnrtalez firm
+?ogaged in business transactions involving over forty-two million livres, a truly
,?norrnous sum in those days. A close study of the balance sheets shows a total of
21,095,515 livres received while in the same period the general outlay was
21,044,191 livres. Thus the profit amounted to 51,3241ivres-or only slightly more
than two-tenths of one percent. In other words, Beaumarchais just managed to
keep his enterprise on an even keel. His gains and losses, however, were very
unevenly distributed. While the firm's private trade account showed an extremely
favorable balance, the account with the United States was deeply in the red.
Would the United States ever pay their debt? If they did, Beaumarchais would be
u very rich man. If they did not, he would just about break even."
So in the end, Beaumarchais did become something of a war-profiteer,
although hardly in the sense nor to the extent that Arthur Lee had
claimed.
In 1783, as part of the negotiations for a loan by the French
government to the United States, a determination was made by the
American Consul General in Paris, Barclay, that the sum recommended
by Deane in 1780 was substantially correct. However, a suspicion arose
in Congress that Beaumarchais had been dishonest in that he had
apparently received one million livres from the French government as
initial capital without telling anybody. The idea that this might have
Approved For Release 2005/04/18: CIA-RDP78T0319419,O o1W. 9-3
Appproved For.Release 2005/04/18: CIA-RDP78T03~,~-Ryy1f10009-3
Beaumarchais
been a loan that he was expected to repay seems not to have occurred to
Congress; in any case, payment was again deferred.
In 1787 Beaumarchais wrote Congress in stinging terms reminding it
of its obligations. Congress responded by appointing, of all people,
Arthur Lee to examine Beaumarchais' claims. Lee explored the matter
and came up with a stunner: Congress did not owe Beaumarchais
anything at all. Rather, Beaumarchais owed Congress 1,800,000 livres!
In 1793 Congress, impelled by some sort of guilty urge, gave Alexander
Hamilton the task of once more evaluating Bcaumarchais' claim.
Hamilton's results showed that America owed Beaumarchais 2,280,000
francs. Further investigation, however, revealed that what had been a
suspicion in 1780 was actually a fact: Beaumarchais had indeed received
one million livres as initial capital from the French treasury. Again., no
one bothered to point out that this was a loan. Congress decided that,
since Beaumarchais had received one million from the King, this should
be deducted from the amount Hamilton showed as due him. They further
decided that Beaumarchais owed the United States interest on this
million since it was, in effect, a gift to the United States and
Beaumarchais had held it all this time. Congress further decided that the
interest due it on the one million approximately equalled 1,280,000
francs-the amount still due Beaurnarchais-and that, therefore,
Beaumarchais and the United States were quits!
On April 10, 1795 Beaumarchais made a final effort. He wrote the
American people at large: "Americans, I have served you with
indefatigable zeal and I have received, throughout my life, only
bitterness as a reward for my services. I die your creditor. Allow me
therefore, now that I am dying, to bequeath you my daughter, that you
may endow her with a portion of what you owe me...." His last appeal
went, of course, unanswered.
A footnote of Lemaitre sums up the ending succinctly:
"America's debt to Bcaumarchais was finally settled, after protracted and
complicated negotiations, in 1835. That year, Congress gave Bcaumarchais' heirs
the choice of accepting 800,000 francs as full settlement of the claim or getting
nothing at all. The heirs took the 800,000 francs."
Ap0-r"6'6A WFrl lease 2005/04/18: CIA-RDP78T03194A000300W1 0009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
UNCLASSIFIED Beaumarchais
Bibliography
1. AUGUR, Helen, The Secret War of Independence, New York and
Boston, 1955
2. COX, Cynthia, The Real Figaro, London, 1962
3. KITE, Elizabeth S., Beaumarchais and the War of American
Independence, Boston, 1918
4. LEMAITRE, Georges, Beaumarchais, New York, 1949
5. I'OI,LIT'ZER, Marcel, Beaumarchais, Le Pere de Figaro, Paris, 1957
6. RIVERS, John, Figaro: The Life of Beaumarchais, New York, 1922
7. BUSKIN, Ariane, Spy for Liberty, New York, 1965
Appro+Ad For Release 2005/04/18: CIA-RDP78T03194A @OOA99Q1 lO09-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194AO00300010009-3
SEUT
No Foreign Dissem
A study in perspective.
SOVIET DECEPTION IN THE CZECHOSLOVAK
CRISIS
Cynthia M. Grabo
The various postmortems and retrospective analyses of the Soviet
invasion of Czechoslovakia in August 1968 have revealed a considerable
amount of disagreement among analysts concerning the deception
measures taken by the Soviet Union during that summer. Some analysts
believe that the USSR conducted a deliberate and fairly successful
political and military deception campaign at least from mid-July onward
(that is, from the start of major mobilization and deployment of the
invasion forces), which was intended to conceal the scale and purpose of
the military movements, and to deceive the Czechoslovaks and others
into believing that there would not be an invasion. On the other hand,
there are analysts who believe that the USSR did not engage in any
significant deception effort, and that if we or the Czechoslovaks were
misled at all it was a result of wishful thinking or self-deception. Aside
from those relatively few specialists who have examined all the evidence
in detail, most of us probably have a very inexact understanding of this
question and why there should be a difference of opinion in retrospect.
This article does not purport to provide a definitive solution. It is
intended rather to outline the problem and the evidence available and to
draw some tentative conclusions. Perhaps more usefully, it also attempts
to put the episode into perspective in relation to what we know of the
USSR's doctrine and past practice with respect to deception, and to
suggest what the USSR might be able to do to deceive us on another
occasion. In short, there are some lessons to be learned from our
experience during the summer of 1968.
Types of Deception
There are various kinds of measures which a nation bent on initiating
surprise military operations can undertake in an effort to conceal its
intentions. In all cases, standard security precautions would be taken.
These, of course, may involve a variety of means to prevent outsiders or
potential enemies from observing or otherwise detecting that military
ApV ell For Release 2005/04/18 : CIA-RDP78TO3194A000306810009-3
MORI/HRP PAGES 19-34
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
SECRET Soviet Deception
movements or logistic buildups are in progress, or at least to conceal the
full extent of the buildup, the units involved, etc. It is important to
understand, however, that such measures to achieve military secrecy do
not in themselves constitute an active deception effort, particularly in
nations which practice rigid military security as a matter of course, and
the sophisticated analyst will take care to distinguish the true deception
effort from conventional security measures. Nonetheless, the line
between deception and security is a narrow one; the two are often
confused, and an effective security program can do much to deceive the
intended victim even if no other measures are undertaken. Soviet security
measures therefore will be considered in this article.
The roost common and easiest to carry out of all types of deception, a
political deception program may involve a variety of measures. The
simplest of course is the direct falsehood. Through diplomatic channels,
public statements or by other means, the nation bent on military
aggression or some other venture it wishes to conceal merely states that it
has no such intention and that all such charges are false. Although such
tactics are by no means unheard of, particularly when the stakes are very
high, many nations will seek insofar as possible to avoid the direct lie in
favor of some type of indirect or slightly more subtle deception. Thus,
even in the Cuban missile crisis, in which Soviet spokesmen unques-
tionably directly misinformed the President of the United States,
an examination of public Soviet statements shows that nearly all of them
were indirect rather than absolute falsehoods. The USSR as a rule did not
Ilatly deny that it was putting IRBMs and MRBMs into Cuba. Rather it
said that all weapons being sent to Cuba were "designed exclusively for
defensive purposes," or that there was "no need" for the USSR to deploy
its missiles to any other country, etc. This type of statement, although
extremely misleading, is not totally untrue and thus permits the pre-
varicator to maintain some degree of credibility if or after he has been
caught in the act.
Among the more subtle means of political deception is the effort to
mislead by implying that the situation is not serious, that the nation does
not consider its vital interests at stake or that its relations with the
intended victim are really pretty good. Ordinarily such a deception effort
will be maintained only over a relatively short period, usually no more
than a few weeks, although in some cases it may last for several months.
Generally, it will involve the downplaying of the situation in propaganda
and diplomacy after political means at solution have failed and a
decision has been reached to conduct a surprise attack or at least to
prepare military forces for such attack. This type of situation may be
Approxkl For Release 2005/04/18: CIA-RDP78T03194A0003011C1BB-09-3
Apsprgve~l For Release 2005/04/18 :CIA-RDP78T03194A0~A~Ot9g910009-3
net eception
marked by quite a sudden change in the tone and volume of propaganda,
particularly for foreign consumption, in an effort to lull suspicions.
Dictatorships, including the Soviet Union, are usually masters of this
type of political deception; their complete control of the press and secrecy
of the decision-making process make it relatively easy for them. For
example, in the weeks and even months before the Soviet attack on
Japanese forces in Manchuria in August 1945, the USSR undertook to
ease political tensions with Japan and to be "almost cordial" to the
Japanese Ambassador, as all the while it was building up its military
forces in the Far East for the attack.
Another facet of this type of political deception is to offer to enter into
negotiations in an ostensible effort to solve the matter at issue, when
there is actually no intention of reaching an agreement. The Soviet
Union also has been known to use this tactic. On the evening of 3
November 1956, less than 12 hours before Soviet forces struck throughout
Hungary to suppress the revolt, Soviet officers began negotiations in
Budapest with Hungarian defense officials on Soviet "troop
withdrawal." (The growing Chinese Communist concern with Soviet
intentions in late 1969 is said to have been attributable in part to
Peking's fear that the USSR had proposed the border talks as a deception
measure prior to attack.)
In the interests of preserving secrecy as to its real intentions, a nation
bent on surprise action also may attempt to deceive (or at least not
inform) its allies of its plans. There is reason to believe, for example, that
the USSR informed only the top leaders of the Warsaw Pact countries,
and probably belatedly at that, of its plans in Cuba in 1962. It almost
certainly did riot make its intentions known to the non-ruling Communist
parties. As is well-known, the reluctance by the US to believe that Great
Britain was preparing for attack against Egypt in 1956 was based in large
part on a confidence that one of our closest allies would not undertake
such action without informing us first.
We have coined the term "political-military deception" to denote a
type of attempted military deception which is carried out solely by
putting out false statements about the nature, scale, or purpose of a
military buildup. It is in effect a political deception effort designed to
camouflage or conceal the real intention behind the military buildup by
attributing it to something else. This type of deception, to be
distinguished from true military deception described below, proceeds
from the premise that since the enemy is likely to detect the military
movements, it is therefore desirable to offer him some seemingly
plausible explanation, other than planned aggression, for the activity.
Approved For Release 2005/04/18: CIA-RDP78T03194A00030d 10009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Soviet Deception
The most usual explanation is that the troops are "on maneuvers." It
may also he possible, on occasion, to find some other pretext for troop
movements, such as alleged internal disturbances in a border area. US
intelligence has long recognized that the Soviet Union would probably
seek to mask preparations for aggression under the guise of maneuvers.
Similarly, the USSR and its Warsaw Pact allies are extremely suspicious
of major NATO exercises as potential covers for attack.
True military deception, as opposed to the various means described
above, is the most difficult and complex of all types of deception to
orchestrate, at least on a large scale. It is most commonly used when
hostilities are already in progress, when it may be used with other
deception measures to disguise the scale of a buildup, the date or place of
attack, and/or to lead the enemy to believe that an attack is planned in
one area when in fact it is not. It involves such techniques as permitting
seemingly valid, but actually false, military orders to fall into the hands
of the intended victim; the sending of invalid military messages in the
clear or in easily read ciphers, or the maintenance of completely spurious
radio nets; assignments of false designations to military units; setting up
of dummy aircraft or other equipment to suggest that units have not left
home stations; sending out false "defectors" with erroneous but plausible
reports, etc. Measures of this type call for very sophisticated and highly
coordinated planning, since the chance that an obvious slip would he
detected is great, and detection might betray the whole plan. Such
measures can, however, be highly effective in tactical situations in
leading the enemy to misdeploy his forces or to misjudge the timing or
area of the main thrust. Obviously, such tactics have a more limited use
when one is trying to conceal that an attack is planned at all.
The planting of false reports, through established intelligence channels
or the diplomatic service, may be used as a part of the political or
military deception methods described above. A military attache is a
useful channel for putting out a seemingly plausible explanation or
disclaimer concerning a troop buildup, as is a diplomat to provide a false
political story. These channels, along with the professional clandestine
services, also may be used simply to flood the market with a mass of
conflicting stories and reports. Particularly when reports are sensational
but otherwise appear to have some authenticity, they can he a
tremendous distraction. If the volume of such planted disinformation is
large enough, the analytical system can be so overwhelmed by it that the
truly reliable or useful intelligence may become lost in the mill. It is
difficult to overestimate the damage that this type of deception can do to
the process of assessing and evaluating information in a crisis situation.
Approv`lsd For Release 2005/04/18: CIA-RDP78TO3194A00030 M09-3
mit"eFF99tJ (ease 2005/04/18 : CIA-RDP78T03194A0 3P@Q10009-3
Aw
Actual Soviet Security and Deception Measures in the Summer of 1968
With this brief background, we shall attempt to analyze what the
USSR did and did not seek to do in the way of deception prior to the
invasion of Czechoslovakia. This requires that we also attempt to
determine whom it may have wished to deceive-the Czechoslovaks, the
US and NATO, or others, including other Communist parties.
The USSR's objective in Czechoslovakia was to reverse the course
toward liberalization and to restore orthodox Communist Party control
there. Insofar as possible, the USSR wished to achieve these aims through
the Communist apparatus in Czechoslovakia rather than by overt
military intervention. The objective was not to carry out a surprise
military operation, which was only the final means to the end. The USSR
and its Warsaw Pact allies decided on massive military invasion only
after a series of lesser political and military steps had not been successful.
It is thus obvious that the amount of deception which the USSR could
usefully employ against Czechoslovakia was limited. In order to induce
the Dubcek regime to comply with its wishes, the USSR clearly had to
insure that its political pressures were such that Czechoslovakia would
have no doubts concerning the seriousness of Soviet intent. To lend
added weight to the political effort, it was also desirable that
Czechoslovakia recognize the possibility of Soviet military action-and
indeed the first device used by the USSR to attempt to put troops into
Czechoslovakia was simply to request that Soviet units be stationed
there.
So far as the West was concerned, it was not in the USSR's interests to
attempt to mislead us unduly concerning its military movements lest
these be misinterpreted as a threat to NATO. And the future support of
other Communist parties was of importance to the USSR; it wished these
parties to understand its concern with and actions toward
Czechoslovakia. To deceive them unnecessarily would be counter-
productive.
Military Security Measures
As everyone knows, Soviet military security is extremely tight. As a
matter of normal practice, the USSR never identifies an active military
unit by its true designator in the open press, and never reports a buildup
of its military forces anywhere (except temporarily for exercises). Moscow
has occasionally reported a reduction of forces, although not necessarily
accurately, when it has seemed politically expedient to do so. It usually
identifies by position only a small group of top-ranking commanders, and
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Soviet Deception
the names and locations of its military districts, groups of forces, and
other major commands such as the fleets. It may or may not report the
whereabouts of top military officials, including the Minister of Defense,
as it chooses. It nearly always denies travel in the USSR to US and other
Western military attaches (and sometimes to all diplomats and tourists as
well) to any area in which significant military movements are under way;
it is most unusual for any Westerner to see a unit redeployment. The
same security restriction is carried out in East Germany by imposing
restricted areas, some permanent and some temporary, on the three
Allied Military Liaison Missions.
A review of the military security measures taken by the USSR from
early May (when the first deployments to the Czechoslovak border were
made) up to the date of the invasion on 20-21 August leads to the
conclusion that the steps taken were about normal for the USSR. Security
was not relaxed (at least not intentionally-there were a few slips), but
neither was it drastically tightened. There was no announcement of the
early May deployments in the Carpathian Military District, Poland, and
East Germany, and no announcement that a partial mobilization had
been carried out to bring these units up to strength where needed (we
learned this after the invasion from a defector). Throughout the summer,
the USSR denied most travel by military observers to areas of the Soviet
Union where the buildup had occurred, and in East Germany a
"temporary" restricted area was continuously reimposed throughout the
summer in the southern area near the Czechoslovak border. At least one
unusual security measure was taken in East Germany: in early August an
unprecedented ban on travel by virtually all foreigners was imposed in
the area of the military buildup along the Czechoslovak border.
In Poland, however, which was to be the major line of communication
for support of the invasion, there was only the most minor effort on
perhaps two occasions during the summer to restrict movements of
attaches, diplomats, tourists and newsmen. Only the actual
encampments of Soviet forces were ever placed off limits. There were any
number of observations by Western sources of the Soviet troops along the
Czechoslovak border, and the start of the massive movement into Poland
in late July of troops from the Baltic and Belorussian Military Districts
was fortuitously witnessed and promptly reported to the US Embassy by
several US tourists and other travelers. Why this contrast with the
security measures in the USSR and East Germany? Did the Soviets want
us to learn about movements in Poland but not elsewhere? A more likely
explanation is that Poland traditionally does not impose major
restrictions on travelers, and that it either was not prepared to or did not
Appro'Ml For Release 2005/04/18: CIA-RDP78T03194A0003c W'D9-3
ApcsgYp9,Fc2, ease 2005/04/18: CIA-RDP78T03194A0%( t 10009-3
wish to do so in the summer of 1968, particularly at the height of the
tourist season. Presumably the Soviets made no major issue over this
policy (although we do not know this for certain), but it would appear
unlikely that they really wanted us to learn about their troop movements.
We would judge that they would have preferred secrecy (there was a
report that the Poles had a public announcement ready in late July that
Soviet troops were entering the country, but never issued it), but that
secrecy was not considered of overriding importance.
In Hungary, the other area of pre-invasion deployments, partial but
not complete restrictions were imposed on attache movements. Western
attaches did observe the major deployments of Soviet units from their
garrisons toward the Czechoslovak border in late July.
Political Deception Measures
The USSR, from at least the time of the Dresden conference in late
March, repeatedly and progressively made it evident that it was most
gravely concerned with the course of events in Czechoslovakia. All
indications are that it used virtually every political device at its
command to bring pressure on the Dubcek regime to reverse the trend
toward liberalization. Thus it is evident that there was no political
deception in the strategic sense, no attempt by the Soviets to play down
the importance of the issues. And this message also came through loud
and clear to us.
More difficult and controversial is the question whether the USSR was
engaged in a political deception effort at the Cierna and Bratislava
conferences and in the succeeding days prior to the invasion. The theory
that the conferences were deception, convened at Soviet insistence to
mislead the Czechoslovaks and to gain time for the continuing military
buildup, rests largely on a presumption that the Soviet leadership took a
final decision in mid-July that any further political effort was useless and
that the only recourse was military invasion, that all developments from
that time forward were in preparation for that invasion, and that the
timing was determined solely by when the military forces were ready.
This hypothesis assumes that the Soviet leaders went through the motions
at Cierna and Bratislava only for political effect; they had already
decided to invade as soon as all military preparations were complete; and
that they concealed such an intention from the Dubcek regime.
A review of the military evidence alone yields much to support this
hypothesis, and a quite plausible case can be made that the date for the
invasion (or at least the date when the forces would be ready) was set well
in advance. The chain of military preparations from about 20 July
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Soviet Deception
onward appears almost unbroken, and a final review and inspection of
the deployed forces was apparently completed by the Soviet high
command on about 16 August (their visits to the forward area between
13-16 August were announced by the Communist press). It may be
conjectured that Marshal Grechko then returned to Moscow, informed
the political leadership that all was ready, whereupon the final military
orders were issued and the invasion proceeded on schedule.
The political evidence, however, is not so readily explained. From
what we know of the Cierna conference, it appears that the USSR was
compelled to expend a tremendous effort to get the Czechoslovak
leadership to hold the talks at all (finally agreeing to the border town as
the site after other proposed sites had been rejected), that a great deal of
hard bargaining went on at the talks, and that an agreement of sorts was
reached whereby Czechoslovakia undertook to carry out certain
measures to strengthen Party control and its relations with the Warsaw
Pact. A case therefore can be made, also with considerable plausibility,
that the talks were a genuine, albeit desperate, effort by the USSR to
reach some sort of political accommodation so that the invasion would
not be necessary. The reduction in Soviet polemics which followed the
talks was then part of the agreement, not just a deception to lull
Czechoslovak suspicions.
If this is correct, one cannot view the Cierna and Bratislava talks as
pure political deception. This, however, does not resolve the question of
what the Soviets actually told the Czechoslovaks and whether or not they
misled them-by omission, direct statements, half truths or
innuendoes-concerning their military buildup and intentions.
Unfortunately, on this crucial question, our evidence is far from
adequate. The contention, which appears logical to us-that the USSR
should have given Dubcek some unequivocal warning that Warsaw Pact
forces were prepared to invade unless he complied with the terms of the
agreements-may or may not be valid. It was reported in Budapest
following the invasion that the purpose of Kadar's meeting with Dubcek
on 16 August was to warn him that the USSR would invade unless its
demands were fulfilled, and it has been implied that others also warned
Dubcek of this. Charges have been made that Dubeek withheld from his
colleagues some of' the communications which he received from the
Soviet Union, including a letter from Brezhnev on 16 August and a letter
From the Politburo of the CPSU to the Czechoslovak Party on 17 August,
which in the view of Dubcek's opponents allegedly provided some
warning of impending Soviet action. Dubcek, on the other hand, is
reported to have denied to the Czechoslovak Central Committee plenum
Approl For Release 2005/04/18 : CIA-RDP78T03194A00030 1 T09-3
Approved For Release 2005/04/18 : CIA-RDP78T03194Ag~~J010009-3
Soviet Deception
in September 1969 that Kadar had mentioned possible imminent
intervention, or that the letters from Brezhnev and the CPSU contained
warnings of impending armed action. Although Dubcek was of course
attempting to justify his actions and his statements therefore are suspect,
there is some evidence to support his denials. We do not know the content
of the Brezhnev letter, but we do have the reported text of the CPSU
letter of 17 August. While it called for immediate action to implement
the Cierna agreements and said that delays in this matter" are extremely
dangerous," there was no threat of military action in the letter. Also, it
must be noted that Soviet public commentaries were notably devoid of
saber-rattling and statements or even direct hints that massive Soviet
forces were capable of overrunning Czechoslovakia at any time.
In short, we lack sufficient evidence to make a firm judgment whether
or not the Soviets directly threatened Dubcek and his colleagues with
invasion and if so how convincing this was to the Czechoslovaks.
Similarly, we do not really know whether most of the Czechoslovak
leadership was as surprised by the final military action on the night of 20
August as it has appeared. It is probable that those who really had
understood the Soviet position did expect invasion sooner or later. They
may have been tactically, but not necessarily strategically, surprised. On
the other hand, those who did not understand the USSR's attitude and
tactics-foremost of whom was probably Dubcek himself-may have
been impervious to any kind of warning and hence genuinely surprised.
It is not unlikely that many Czechoslovaks, like ourselves, were the
victims of a good bit of wishful thinking-they just could not believe that
the Soviets would invade.
There is another type of Soviet political deception against the Dubcek
regime, which was quite likely considerable although we know little
about it. This would have involved an attempt to subvert the regime from
within using pro-Soviet elements in the Czechoslovak Party, the security
services and the armed forces. According to General Sejna, the
Czechoslovak party and governmental machinery was so well controlled
by the Soviets during the Novotny era that virtually nothing went on
without Moscow's knowledge and usually prior consent. Although there is
little direct evidence, there is some reason to suspect that the USSR
hoped in the spring to carry out some type of coup within the Party
whereby the conservative element would take over from Dubcek, but that
it was unable to effect this. We may be almost certain that the USSR
subsequently tried any number of devices, without success, to undermine
Dubcek's position and to promote the conservatives. On the night of the
invasion the USSR clearly had expected an overthrow of Dubcek and the
ApeTd For Release 2005/04/18: CIA-RDP78T03194A00030b310009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Soviet Deception
installation of a new conservative leadership, but again the plan failed. It
has been suggested that one reason for this failure was that most of the
conservatives were not apprised of the timing of the invasion and
therefore were not ready to act. If this is so, the argument that the USSR
did not directly forewarn the Czechoslovaks-other than those agents
actually involved in the operation-gains considerable weight.
i n sum, the evidence which we have concerning Soviet political
deception of the Dubcek regime is certainly incomplete and in some
important respects inconclusive. These uncertainties, however, apply
more to the USSR's techniques than to any attempt to conceal its
objectives. On the fundamental issue, the USSR's intent to restore
orthodox Party control, there is no good reason to suspect that the USSR
ever sought to deceive the Czechoslovaks.
With regard to the West, and particularly the US, there is little
indication that the USSR conducted any long-term or elaborate political
deception effort-certainly nothing remotely comparable to what it
undertook in the Cuban missile buildup. But, since its objectives in
Czechoslovakia could hardly be kept secret from us as well, there was
comparatively little room for any deception. There may be some basis,
however, for believing that in the few days prior to the invasion the USSR
sought to lull US suspicions by reaching an agreement to open talks soon
on strategic arms limitation. Exactly what happened will have to be
revealed by a policy-level official of President Johnson's administration.
According to an article in the Washington Post on 23 August 1968, a
meeting between President Johnson and Premier Kosygin to discuss
strategic arms limitation was to have been announced by the White
House on the morning of 21 August. The article also noted that on the
evening of 20 August, while Ambassador Dobrynin was at the White
House informing President Johnson of the invasion of Czechoslovakia,
Secretary of State Rusk was telling the Democratic Platform Committee
in Washington that "we anticipate early and important talks with the
Soviet Union on the limitation and reduction of offensive and defensive
strategic missiles."
A final note is in order on the CPSU's conversations with and
communications to non-ruling Communist parties. A substantial body of
evidence is available that the USSR did not attempt to deceive these
parties but in fact took steps to inform them between about 15 and 20
July that it might have to take drastic action, including invasion, to
control the situation. While we have little information on any subsequent
communications, the evidence is that these parties were forewarned
about a month before the invasion to prepare their membership for this
Approv~g For Release 2005/04/18: CIA-RDP78T03194A000309OT9-3
Agrovtel For Release 2005/04/18 : CIA-RDP78T03194Ap10009-3
vie eceptson _kQ
contingency and that few if any of them were surprised. Many were
dismayed by the final action, but not surprised.
Political-Military Deception Measures
We shall now examine the nature and possible intent of the various
public statements made by the USSR relating to the buildup of its forces
against Czechoslovakia. As we have noted, consistent with its security
doctrine the USSR never announced that it was deploying any units to
the Czechoslovak border. Following the initial deployments in early
May, however, it prevailed upon Czechoslovakia, after considerable
pressure, to announce that Warsaw Pact exercises would be held in June
in Czechoslovakia and Poland. This "agreement" provided the pretext
for the subsequent introduction of Soviet forces into Czechoslovakia
under the guise of conducting Pact exercise "Sumava," which was held,
according to announcements, during the last ten days of June. The
announcement may also have been intended to provide a pretext for the
presence in Poland of the troops from the Carpathian Military District
which were introduced in early May, and whose movement had been
reported in the Western press. Although "Sumava" was concluded on 30
June, TASS immediately retracted its announcement of the termination,
and a series of subsequent statements from Prague made it evident both
that the USSR had introduced much larger forces than originally
announced and was seeking to keep them there. This was the first of the
USSR's efforts, and a transparently evident deception, to bring military
pressure on Czechoslovakia under the guise of "exercises."
On 23 July, the USSR announced that rear services exercises would. be
held in the western USSR until 10 August, would cover an area from
Latvia to the Ukraine and would involve the recall of reservists,
requisitioning of transport from the civilian economy and demothballing
of military equipment. Subsequent announcements outlined a scenario of
the "exercises," repeatedly described them as very large-scale, and stated
on 30 July that the exercises were being extended into Poland and East
Germany. The USSR also announced that a large antiaircraft defense
exercise was conducted in the USSR from 25-31 July. On 10 August, a
Soviet announcement implied that the rear services exercises had
terminated, but no announcement was made that any of the recalled
reservists or requisitioned transport were being released. Concurrent with
the start of the announced rear services "exercise," the USSR began the
major buildup of additional forces along the Czechoslovak border. By 31
July it was evident that substantial forces in East Germany had deployed
to the Czechoslovak border, that the bulk of Soviet troops in Hungary
Approved For Release 2005/04/18: CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
SECRET Soviet Deception
had moved into positions near the Czechoslovak border, and that large
numbers of additional Soviet troops, both combat and rear services, were
moving into Poland from the Baltic and Belorussian Military Districts. It
was indisputably clear that a major deployment of forces was in progress.
It was less clear at the time whether exercises were also under way,
although there was no discernible indication that any of the deployed
forces were engaged in exercises.
What was the purpose of the announcements? Were they intended to
provide some ostensibly plausible reason for the forward deployments of
forces and supply columns? To lead us to believe that the only
mobilization was in the rear services? To deceive us and the Czecho-
slovaks as to the real purpose, or primarily to put more pressure on the
l)uhcek regime?
Much of the disagreement concerning Soviet deception is over this
issue. It has been argued, and with considerable reason, that the
Czechoslovaks (who would be familiar with Soviet deception tactics and
who already would have known the Pact training schedule for the year)
could not have been so naive as to believe that an exercise was under
way. Therefore, it is maintained, the primary purpose of the
announcements was to put more pressure on Czechoslovakia, to warn but
not to deceive. Perhaps so. We do not know how the Czechoslovaks
interpreted the announcements.
But what about the West? Were the announcements intended to
deceive us and NATO, or at least to confuse? To most observers, it would
seem that they were, and that in fact many were deceived. To judge from
current intelligence coverage at the time, it would appear that a majority
of analysts were reluctant to say that these were not exercises, or to draw
the conclusion that the only thing which was in progress was a
mobilization and deployment. Only a minority probably firmly believed
the latter at the time. And it may be noted that, even in retrospect, some
analyses have persisted in referring to the "exercises."
At the same time, however, the Soviet announcements provided us the
clearest indication which we had that a mobilization was actually in
progress. If they left unclear the extent of it, and whether combat as well
as rear services units were involved, they did serve to warn us, even
before the military movements became evident, that an extraordinary
Soviet military effort was under way. Thus the Soviet statements, if
intended to deceive, also were an asset both to analysts and collectors.
Active Military Deception Measures
There is reason to believe that the USSR engaged in some active
military deception against Czechoslovakia at least as early as June when
Approv$4l For Release 2005/04/18: CIA-RDP78T03194A000306b bb9-3
Ap roveg For Release 2005/04/18 : CIA-RDP78T03194A0~Q 9 .10009-3
ov~et eception
it began moving forces into that country ostensibly for exercise
"Sumava." Numerous Czechoslovak statements both then and later
suggest that the Soviets brought in much larger forces than the
Czechoslovaks had agreed to, and possibly attempted to conceal the
identity and size of these forces as well. Because there was so little
Western observation of these movements, it has been suspected that the
USSR moved forces covertly at night, or in small contingents over
secondary roads to conceal the extent of this peaceful invasion during
June. This may be partially true, particularly of the first elements which
were introduced. A Soviet defector from a regiment which entered
Czechoslovakia from the Carpathian Military District at the start of the
exercise has stated, however, that his unit moved on main roads with no
unusual attempt at concealment, although it did travel at night.
We are not sure whether the USSR finally agreed to withdraw its forces
from Czechoslovakia during July (the withdrawal was not finally
completed until 3 August) as part of a deception plan in connection with
the buildup of the invasion forces, or because it really saw no practicable
alternative at the time. Similarly, we know relatively little about any
deception measures which may have been taken before the invasion to
mislead the Czechoslovaks as to its timing. The USSR did employ some
active deception against the Czechoslovaks during the invasion, perhaps
more than we know. The best-known example was the flight into Prague
shortly before the invasion of ostensibly civil aircraft carrying the
military personnel who seized the Prague control tower to vector in the
military transports. It is likely that other measures also were employed.
For the most part, however, the USSR appears to have relied on security
and speed of movement to insure tactical surprise.
So far as the West and NATO are concerned, there is virtually no
indication that the USSR attempted any active military deception
measures designed to mislead us as to the scale, location or purpose of the
military buildup or the possible timing of the invasion. The Soviet
military leadership had ample time to plan and complete its military
buildup, and presumably could have undertaken a more elaborate and
sophisticated deception effort than it in fact did. Such a plan would
logically have been put into effect as soon as the major military
deployments were begun in late July. The argument has been advanced
that, if Soviet leaders did not decide to invade until mid-August, they
had little time to devise and carry out any active deception measures.
This argument appears both unconvincing and unrealistic. It presumes
that the Soviet political leadership had not taken any fundamental
decisions on possible military action until a few days before the invasion.
ApoFd For Release 2005/04/18 : CIA-RDP78T03194A000300al0009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
SECRET Soviet Deception
A far more realistic assessment is that the Soviet leadership in mid-July
initiated the massive military buildup because it then believed that a
solution by political means was unlikely and that the probabilities were
that military invasion would be required to bring the situation under
control. Or, to put it another way, the Soviet leadership reached the basic
decision in mid-July to carry out an invasion unless a political solution
could be reached, but deferred a final decision on whether military
action would inevitably be required and hence also a decision on its
timing.
Apart from this, however, it is in large part irrelevant to the military
deception program just when the political leadership reached the final
decision to invade, since the military leaders clearly were directed in mid-
July to make all necessary preparations as if invasion were to be carried
out, and they did so. Active deception measures would have been an
integral part of the military preparations, not something reserved for the
last few days.
The apparent lack of major military deception measures may indicate
that the USSR saw no need for them against the Czechoslovak forces or
did not wish to reveal its more sophisticated war plans and capabilities.
It would be optimistic to suppose that more elaborate deception efforts
would not be employed in event of attack against the West.
Confusion and Disinformation Measures
Possibly the most conspicuous missing element in the picture was the
almost total absence of deliberately planted false reports by the Soviet
intelligence services, whose disinformation capabilities are well
recognized. There was almost no apparent effort to distract and confuse
us with this type of material. Again the USSR may have seen no need for
this type of effort in the circumstances. It may have preferred not to
release a flood of misleading reports which might cause alarm in the
West and raise suspicions that the Soviet buildup might be directed at
some nation other than Czechoslovakia. Indeed, one of the most notable
features of the entire Soviet military and political effort in the summer of
1968 is that it was so clearly directed at Czechoslovakia that there was no
cause for any undue alarm in the West, despite the scale of the military
buildup. It appears likely that this was a consequence of a deliberate
decision by the USSR to keep the temperature in Europe as low as
possible.
Approd For Release 2005/04/18: CIA-RDP78T03194A000361VDT09-3
Apgv e Ife eptio elease 2005/04/18 : CIA-RDP78T03194A X010009-3
Implications of the Soviet Effort
The predilection of Soviet leaders for secrecy, security, and surprise
makes it almost impossible to conceive that they could have carried out
an operation such as the invasion of Czechoslovakia without employing
some of their traditional deception tactics. So deeply ingrained is the
concept of deception that there is reason to suspect that the USSR has
sometimes employed such tactics when there was no evident political or
military necessity to do so. In the case of the invasion of Czechoslovakia,
it was probably also very important to the Soviets that the actual timing
of the invasion and the details of the military plans be concealed in order
to achieve tactical surprise and reduce the likelihood of any
Czechoslovak resistance and loss of life on both sides.
The scope of actual deception measures employed by the USSR was
probably far less than might be expected under other circumstances. The
security measures were less than we would normally expect to see during
a major redeployment, and the buildup was quite evident to us, and
presumably to the Czechoslovaks as well. The amount of political
deception, although somewhat debatable as regards Czechoslovakia,
does not appear to have been very extensive or elaborate. There seems to
have been very little active military deception, except possibly during the
actual invasion phase. We were spared a disinformation effort by the
KGB. About the only significant Soviet effort at deception, at least as far
as the West was concerned, appears to have been the attempt to portray
the logistic buildup and troop deployments as "exercises," and even here
some observers suspect that the USSR never expected us to be deceived.
This effort certainly would have been more effective had it been
accompanied by drastic security measures to deny US observation of the
troop movements and logistic preparations in Eastern Europe. In short,
the situation was unusual and should not be regarded as a typical Soviet
performance or as an illustration of what the USSR could do in
circumstances calling for maximum security and surprise-particularly
in an attack against the West.
Even the limited Soviet deception effort, however, serves as a useful
reminder that we should always be watchful for the possibility of
deception, and that we must continually look behind what the enemy
says to what he is actually doing. This becomes even more essential when
it is evident that a crisis situation exists in which the use of deception
should be anticipated. The fact that any US analysts were taken in by the
Soviet announcements on "exercises" is cause for considerable concern
that intelligence analysts also might fail to recognize a deception effort
SECRET 33
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
SECRET Soviet Deception
when it might he vital to US security to detect it. Our experience in the
invasion of Czechoslovakia has reinforced the opinion long held by
warning analysts that the US, at both its intelligence and policy levels, is
extremely vulnerable to deception. The intelligence community has
profited greatly in other respects from the Soviet invasion, which
provided us with valuable data on Soviet mobilization, logistics, and
operational concepts. It is to be hoped that the lessons learned with
regard to deception will also be the subject of further study. Perhaps
there should he more provision in the intelligence schools and in
publications such as this journal for study and analysis of this kind of
problem.
ApproiMd For Release 2005/04/18: CIA-RDP78T03194A0003 09-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A0RP29 910009-3
Evolution of a system.
RAPID TRANSIT IN CLANDESTINE INTELLIGENCE
Substance, security, presentation, authentication, speed-these are the
watchwords in the handling of clandestine intelligence information
reports. Substance, of course, is the sine qua non in all forms of reporting.
Security, always important, is a peculiarly vexatious problem in
reporting from clandestine sources. Presentation is the packaging of the
information in a clear, concise, readable, usable form. Authentication
tells the reader, within operational security limits, what is known or
believed about the authenticity of the information. And speed is-speed.
Each of these words stands for a value, a problem, and a goal. In the
past twenty years the Clandestine Service of CIA has taken many steps to
get better information, to protect sources, to improve presentation and
authentication, and to accelerate transmission from collector to
consumer.
The problems are inextricably interwoven. Obviously they involve
some inherent conflicts: speed vs. presentation, authentication vs.
security. Since none of the values can acceptably be sacrificed, they must
somehow be harmonized or compromised. But conflict, with its corollary
compromise, is not the whole story. Measures taken to promote one value
have redounded surprisingly to the benefit of another. In particular,
actions taken for the sake of speed have yielded unexpected dividends in
appearance, organization, and clarity.
This paper focuses on the story of speed-how it has been achieved,
and what some of its by-products have been.
In the forties and early fifties Washington was a daytime intelligence
production arena. The hot intelligence was digested during the daylight
hours, and the summaries went to policy-makers at the end of the clay.
With the creation of round-the-clock analytical facilities, this began to
change. During the Korean war, current intelligence officers began the
practice of drifting into their respective agencies well before dawn., in
order to be ready early with up-to-the-minute briefings. The community
was like a city which has grown large enough for a morning paper as well
as an evening edition. It has never been the same again.
Ap~Mg~ For Release 2005/04/18: CIA-RDP78TO3194A000300 10009-3
MORI/HRP PAGES 35-42
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Rapid Transit
These changes in Washington reached out and affected the movement
of clandestine intelligence information from the field. From its
beginnings, the Clandestine Service had had a serious problem in
moving information rapidly from field station to consumer. The problem
was rooted not only in human fallibility but in the very nature of
clandestinity. The identities of sources must be zealously protected, yet
the reader must be given an adequate idea of their access, qualifications,
and reliability. To make possible the discharge of these obligations,
cabled intelligence was often interlarded with operational and
semioperational information requiring thorough sifting by the
II eadquarters desk. In the matter of presentation, Headquarters reports
officers sat in judgment on the field collector-interpreting, rewriting,
converting what was merely a "cable" into something that could
properly be called a "report." If they sometimes overdid the
interpretation, annotation, and editing, that was an inescapable hazard
of the system. All this took time.
For some years it was thought that the only alternative to this method
was that of the Foreign Service, whose field reports went directly to
Washington consumers without prior review by the Department of State.
This alternative was considered impracticable for the Clandestine
Service, primarily because a Headquarters review was deemed essential
on security grounds and also because field stations, knowing their cables
would he rewritten, often did not attempt to turn out a finished product.
At its worst this practice developed into a vicious circle: sloppiness in the
field provoked fussiness at Headquarters, and vice versa. At its best, it
enabled the field to concentrate on operating without editorial
distraction.
Under the pressures of the fifties, a program was adopted which
greatly reduced reporting time from agent to consumer. Its essence was to
reduce drastically the time spent in Headquarters review and
"processing," and to make this reduction possible by improving the
quality and presentability of field reporting. This last was done partly by
training and exhortation, but primarily by means of a device which
became known as the "INTEL format cable."
The INTEL Format Cable
There was nothing particularly mysterious or complicated about the
"INTEL, format cable." INTEL format was nothing more than a
standard format which separated operational data from intelligence and
which contained mandatory entries in sequence: the country the report
dealt with; the date of the information; the subject; the place and date
Appro4d For Release 2005/04/18 : CIA-RDP78T03194A0003 R f09-3
Apipjm.ESrtRelease 2005/04/18 : CIA-RDP78T03194A0Q@4Q@@10009-3
the information was acquired; the field report symbol and report
number; the source authentication statement; the text of the message;
and finally a record of the field dissemination given the report. At the top
and bottom of the intelligence portion it was necessary to insert
classification and controls. These required entries insured that all
essential elements enabling Headquarters to pass rapid judgment on the
information would always be present. It guaranteed that cabled
intelligence would be received in Headquarters in something
approximating disseminable form.
In a short time the station-to-consumer span was reduced from days to
hours-an average of thirty-six hours. This was better but still not good
enough. Fortunately, the state of the communications art improved but
there were still unacceptable delays-about eighteen hours time-in the
action divisions while specialists edited, checked references, added
Headquarters comments, and sometimes rewrote the whole report.
The INTEL format, instituted in October 1957, was the first major
breakthrough in the search for speed and paved the way for a serious
attack on the problem of too much time between case officer and
consumer.
Proposal for a Clandestine Service Intelligence Watch
On March 4, 1959 a proposal was approved for the establishment of a
team of Intelligence Watch Officers who would work around the clock
and would be responsible for the immediate processing and the fastest
possible dissemination of the more urgent intelligence cables. Initially
this group would consist of a Chief, an intelligence and administrative
assistant, and six Watch Officers, and would act only during non-duty
hours. The hope was expressed that after a period of trial the hours might
be extended and the unit might be able to handle an increasing number
of intelligence cables. The original proposal recommended that the
Intelligence Watch (IW) should handle cables bearing the precedence
IMMEDIATE and PRIORITY, and, where time permitted, selected
routine cables.
The centralization of Washington dissemination of cabled field
intelligence in a small group of officers who could not be experts on every
country required a further improvement in the caliber of field reporting.
The Office of Training included solid blocks of reports instruction in
operational courses, and a new course in Intelligence Reporting, Reports
and Requirements was established. To date there have been more than
eighty runnings of this latter course, and more than six hundred persons
have been trained in it.
SECRET 37
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Rapid Transit
There was an understandable reluctance on the part of the area
Divisions to accept the principle that a group of officers, centrally located
and not attached to a specific Division, could master the intricacies of
reporting from all corners of the globe. But the Deputy Director for Plans
had approved the establishment of the Intelligence Watch, and all
concerned realized that the need for speed was paramount even if in the
early stages the quality of the product might suffer.
At midnight on February 5, 1960, IW went into operation fully staffed.
Organizationally, it was a branch within the Foreign Intelligence Staff,
but its duties were to he much more in the nature of a service of common
concern, than those of a Staff element. Its principal responsibility was to
:wt after hours in behalf of the responsible area division in disseminating
cabled intelligence information to the Washington Intelligence
community. The men chosen to serve in IW were experienced operations
Officers, but none was selected solely on the basis of area specialization,
since each in the course of his duties would have to handle intelligence
cables from any and all areas.
After two months of after-hours operation, approval was given for the
full-time operation of the Watch' around the clock. On May 2, 1960 the
Clandestine Service Intelligence Watch assumed total responsibility for
the screening of all cables received in INTEL format.
Relationship oj" IW with Signal Center and Cable Secretariat
The handling and rapid processing of cabled field intelligence at
I leadquarters is a cooperative venture. The first point of entry for cabled
intelligence is, of course, the Signal Center which rapidly passes a mat to
the Cable Secretariat. The Cable Secretary, responsible for internal CIA
distribution of all cables, is in a position to discharge his obligations
quickly by determining distribution, reproducing copies and slotting
them for Divisions and Staffs. However, in recognition of the
responsibility of the Clandestine Service to effect prompt external
dissemination of the intelligence which it collects to those officials of the
government who have a need to know, the Cable Secretariat defers
processing of INTEL cables till they have been reviewed by IW.
Physically located within the confines of the Cable Secretariat but
actually an element of the Clandestine Service, the Intelligence Watch
'I'hc Clandestine Service Intelligence Watch is not to be confused with the Operations
Center, frequently referred to as "The CIA Watch," nor the Clandestine Service Duty
Office which is physically located in the Center. See "Studies in Intelligence," Vol. 12, No.
4, Fall 1968, "View from the Hot Shop," pp 39-45.
Appro4id For Release 2005/04/18: CIA-RDP78T03194A00036Wfk 09-3
Apprgygd For Release 2005/04/18: CIA-RDP78T03194ARPH9010009-3
Kapid I ransit
receives the cable and examines it as a candidate for rapid dissemination
to the intelligence Community.
Responsibilities of the Intelligence Watch
The Watch Officer can do one of two things. He can disseminate the
information, identified for community reference as a "TDCS" (Telegram
Dissemination, Clandestine Service); or he can refer the cable to the
responsible area division within the Clandestine Service for a decision as
to whether, and how, the information should be disseminated to the
Intelligence Community. He cannot kill the report. He cannot decide
that the information is not worth a Headquarters dissemination. He can
and must in many cases decide that the information will not be
disseminated outside the Agency by IW. If he reaches the latter
conclusion he takes care of a few clerical details and returns the cable to
the Cable Secretariat. This action must be taken promptly in order to
enable the Cable Secretary to fulfill his responsibilities for the rapid
dissemination of cabled information within the Agency. If the IW Officer
decides that he should not disseminate the information as a TDCS, it is
still made available promptly to the CIA Operations Center as a cable.
This action enables the analytical side of the Agency to have quick access
to the information. Should it feel strongly that the information needs to
be disseminated in spite of certain problems with it, a call from the
Senior Duty Officer to IW will re-start the dissemination machinery. In
such a case the Watch Officer will call in an area division Reports Officer
after hours, or call him at his desk during normal working hours. It may
be that the entire report will have to be rewritten, or that with minor
changes the information can be made available quickly to the
Intelligence Community.
The decision to disseminate or refer is not reached blindly. The Watch
Officer has certain "supplementary data" which accompany the
intelligence portion of the cable before him. These data might give a clue
which will assist his judgment. He also has a safe full of source cards,
provided by the area division, which tell him quite a bit about the source
and which give him a disseminable source description. He checks what
the field station says about the source in the authentication statement
and compares that with what the division has provided on the source
card. If the field source authentication statement is too vague or too
revealing he will probably change it to conform with what the division
has supplied. If in doubt he will consult the responsible division. The
source description should include a basic designation of the individual,
show his access to the information, and testify as to his reliability. On the
Approved For Release 2005/04/18 : CIA-RDP78T03194A00030 010009-3
Approve 9
Approve %felease 2005/04/18 : CIA-RDP78TO3194AO0R0 300 010009-3 nsit
other hand, it must not be so specific that there is grave risk of
pinpointing the source.
What has just been described is the procedure followed on the large
majority of INTEL cables. There are, however, occasions-usually
involving exceptional source sensitivity or delicate policy
implications-when considerations not obvious to IM may necessitate
referral to, or at least consultation with, the responsible area division. For
these situations the field station has at its disposition an indicator which
requires I W to consult the division before taking action.
Advantages to the Intelligence Community
The presence of responsible senior officers on duty in IW has enabled
the Clandestine Service to be in touch with other twenty-four hour
components on dissemination matters at all times. There are other
specific advantages which accrue to the Agency and to the intelligence
Community because the doors of IW never close. These include the
clearance function, electrical transmission of high precedence traffic to
the White House, State Department, Department of Defense and other
agencies, and conversion of extremely important and timely information
into a CRITIC report.
Since the Central Intelligence Bulletin and the DIA Intsum must
contain up-to-the-minute information they go to press before dawn.
During the night I W is able to grant clearances for the use of Clandestine
Service information in these publications in a manner denied by the
controls.
During fast-moving situations such as the Arab-Israeli June War, the
Viet Cong Tet Offensive, or a Presidential trip, IW in its strategic
location close to the Cable Secretariat and the Signal Center was able to
effect electrical relays of high precedence traffic to key government
agencies in a matter of minutes.
Similarly, there have been occasions when 1W, recognizing the
urgency of information which should have been, but had not been,
slugged CRITIC by the field station, converted the message to a CRITIC
and sent it electrically to NSA which controls the CRITICOM network.
Within the Clandestine Service the activities of IW have removed a
heavy burden from the shoulders of the Divisional Reports Officers. Since
four out of five intelligence cables are disseminated to the community by
1W, these Reports Officers are enabled to devote more time and attention
to professional guidance of field collection efforts.
ApproA For Release 2005/04/18: CIA-RDP78T03194A000300TF9-3
Ap apvcpAgnsrtRelease 2005/04/18 : CIA-RDP78T03194A0Q Q@Q10009-3
The Watch Officer
Of all the assets found in IW to assist in the proper handling of cabled
field intelligence, none is more important than the informed judgment of
experienced officers. Although the volume of cabled traffic received in
IW has doubled since 1961, the job has been done by increasing the staff
by only two officers. The background and training of these officers
instinctively come to their assistance. The Watch Officer's sense of
security tells him that a source description is too revealing. His
knowledge that information must be used by analysts and policy-makers
lets him know that another description is too bland and unenlightening.
His sense of urgency tells him when information is of such a critical
nature that it must be relayed electrically, or that a Division officer must
be called regardless of the hour.
Although none of the officers was chosen as an area specialist, the
current staff includes men who have served on all continents in eighteen
countries.
For a man of mature years with the outgoing personality usually
associated with an operations officer, assignment to the chair-borne life
of a Watch Officer comes as a bit of a shock, yet most officers have found
the adjustment not too difficult to make. IW gives the Watch Officer a
picture window on the world where he formerly gazed through a narrow
port hole. In a matter of weeks the rotating shifts which often involve
daytime sleeping along with the night work, become a matter of routine.
One newly assigned Watch Officer, after finishing his first stint on the
midnight shift, reported that on arrival at home at 0830 his wife asked
what he would have for breakfast. To this he replied scornfully,
"Breakfast!!!!, my day is done. I want a martini."
The work of the Watch Officer is confining and many officers have
reported that their friends in the Agency think they are still overseas since
they seem to have dropped out of circulation in the Washington area.
The swing shift keeps an officer away from many a cocktail party. It also
gets him out of attending a PTA meeting or of getting trapped into
becoming scout master. The eyestrain is severe and so is the strain on the
back. But there are bright spots in the working day. These are usually
caused by sun spots or other activities of the gremlins and grohms. The
motto of the Watch Officer is, "We never make mistakes, but those errors
do creep in." It behooves him to catch these errors because many of the
garbles result in unprintable language. Here are a few printable
examples:
"He was awarded the Lenin Peach Prize."
In Laos "Sex Battalions were observed."
ApproveEd For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Rapid Transit
In Africa "A courier was carrying a dipsomanic pouch."
I n Pakistan "An attempt will be made to obtain a Haneas Morpus
writ for Bhutto."
"The Saigon government has a dipity prime minister."
"The Mekong jungle area contained 2000 Bribesmen."
A report from Yemen referred to "The Gulp of Yemen."
A Middle East report described a local rogue as "The Scarlet
i'umpernickl."
A report on the United Nations referred to" The Untied Nations."
in Pakistan an airport has a rumway.
A report from Sierra Leone said that "A female police corporal
retired for misbehavior has now been rehired."
Paris has a source with expensive far eastern experience.
Rumors are ripe.
Finally, in the spirit of George Washington's farewell address, to show
that we do not wish to get involved in foreign entanglements there is the
report with the slightly garbled control "No Foreign Kissem."
ApproQd For Release 2005/04/18: CIA-RDP78T03194A0003k' J09-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET
No Foreign Dissem
On the frontiers of
intelligence photography.
Although the word serendipity is coming to have various meanings to
people engaged in such diverse occupations as music and medicine, its
present dictionary-limited meaning ("an apparent attribute for making
fortunate discoveries accidentally") is applicable in an exciting sense to
photo interpreters engaged in producing intelligence. These PI's, who are
for the most part highly trained and skilled in interpretation related to
weaponry, daily demonstrate an uncanny talent for discovering
important information accidentally. That is, the discoveries are
accidental in the sense of being unsought and not necessarily related to
prime intelligence objectives.
Interpretation of aerial photography is often hampered by the
presence of clouds, snow, shadows, haze, darkness, or obliquity, not to
mention equipment failure. On. the other hand, there are missions when
all equipment works, the weather is ideal, and the resulting photography
is nearly perfect for interpretation. There are also times when optimum
conditions occur as if by accident to produce bonus intelligence not
anticipated. In still other instances, the result unaccountably exceeds
that which the designed characteristics of the camera system are
supposed to produce. There are yet other times when the information
obtained is not of specific interest to the intelligence community but
is of great interest to other branches of the government or of
society in general. Arthur C. Lundahl, Director of the National
Photographic Interpretation Center (NPIC) has termed this the
"serendipity effect."
The justification for what are called overhead reconnaissance missions
is, of course, the gathering of intelligence. Here, however, I want to
emphasize that through serendipity we have provided bonus information
which has proved to have great value in such diverse fields as geology,
hydrology, meteorology, oceanography, agriculture, and forestry. A great
quantity and variety of data is obtained in each photographic mission.
The information acquired for intelligence purposes alone often falls into
several groupings. Missions are normally flown to satisfy intelligence
A~~Wved For Release 2005/04/18 : CIA-RDP78TO3194A00030IM10009-3
MORI/HRP PAGES 43-75
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
needs, but there are also empirical byproducts of the latter. Data
obtained for military mapping purposes are perhaps the easiest to
understand. All other information derived from aerial photography may
be grouped into a gigantic basket labeled "peaceful uses." The
categories involved are not well-defined, and are subject to change
without notice. Innovations in photographic systems or techniques of
exploitation can and do alter categories, or cause a given subject to
subsist simultaneously in several categories of reference. For example, if
an accurate system of crop forecasting by means of aerial photography
could be developed, the result would fall into both the "peaceful uses"
and the "intelligence" groupings, since it would be a valuable tool riot
only to the economic intelligence analyst but to the agriculturalist as
well. All of which is to say that the serendipity effect is important, and
that its consequences deserve serious study.
This is beginning to happen. An important effect of discoveries of the
various uses of photography is that various scientific disciplines are
conducting discussions. This discourse has resulted in close cooperation
between the intelligence and the "peaceful uses" groupings, thereby
enabling the various "peaceful users" to reap the benefits of techniques,
experience, and equipment developed at NPIC.
The revolutionary breakthroughs in aerial reconnaissance and
photographic interpretation in the past 20 years, have produced a host of
serendipity effects. The increase in speed and altitude of photo-taking
vehicles has made it possible to survey larger and larger areas. Advances
in the design and manufacture of optics and in the chemistry of film have
permitted the use of cameras with longer focal lengths, resulting in better
resolution as well as greater loads of film per reconnaissance mission.
Improvement in processing and viewing equipment has enabled the
extraction of more information from the images captured in each
exposure. Most importantly, personnel engaged in this work have gained
extensive experience and skill, with the result that more and more
serendipity effects are being recognized and exploited.
The route between recognition and exploitation of the serendipity
effect can be long and sometimes arduous. First, there must be vision to
recognize serendipity effects; then there must be support and
encouragement, and finally there must be leadership and management
to exploit the effects. We all know that in the vast vineyard of
intelligence there are more tasks than we can dispose of in the normal
(lay's work. It often happens in PI work that a supervisor is called upon to
look over an interpreter's shoulder and observe some new phenomenon.
Success or failure in discovering a new "effect" is often determined at
Approv44l For Release 2005/04/18: CIA-RDP78T03194A0003066i 9-3
ArovreedFor Release 2005/04/18: CIA-RDP78T03194A0 3p10009-3
n ipiy
such moments of creative insight. Knowing this, and recognizing that
NPIC does not have a charter for "peaceful uses" work, NPIC has
nevertheless encouraged all hands to report their findings which, in turn,
can be discussed with other agencies and organizations.
The following pages will demonstrate some of the ways in which the
serendipity aspects of photographic interpretation have affected
intelligence as well as other fields of activity. We will examine some of
the recent advances in photographic interpretation techniques and
equipment as well as in other sensory systems discussed, and discuss the
effects they have had on the requirements of the user community.
Synoptic Observation
In photographic interpretation, synoptic observation-the observation
of all parts of a large area simultaneously-is necessary for the analysis of
situations that fluctuate over time, such as an order of battle or traffic
patterns. Heretofore, such analysis could at best produce only an
estimate derived from the coverage from several missions (and times),
postulating assumptions as to how a situation would change in the
intervals of coverage, and by extrapolating from the analysis of the
covered areas to account for the areas not covered. Now, however, the
speed of the SR-71 reconnaissance aircraft provides near-synoptic
observations of large areas. Several flights of the SR-71 can furnish
information that previously required many missions to supply.
Prior to the flight of the first SR-71 missions in 1967, for example, the
North Vietnamese had constructed almost 200 surface-to-air missile
(SAM) sites. After the first site was identified in April 1965, the North
Vietnamese began to play a kind of shell game, moving the missiles and
launchers from site to site. Each low-level reconnaissance mission
covered only some 10 sites, of which two or three were occupied. This
partial coverage combined with the shuffling of SAM equipment made a
total equipment inventory impossible. Estimates of the North
Vietnamese inventory of SAM equipment were based on sampling
techniques (counting the times the observed sites were occupied
combined with the times and places missiles were fired at our
reconnaissance craft) and on logic (postulating the number of SAM sites
that would be required to defend an area of targets adequately).
The first clear photography from an SR-71 mission covered the major
portion of North Vietnam and revealed 133 SAM sites, of which 20 were
occupied. A later SR-71 mission revealed that 29 sites contained SAM
equipment. Since that time, the North Vietnam SAM pattern has been
shifted from time to time, but the number of occupied sites has remained
4
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
essentially the same, and most of the occupied sites have consistently
been defending the Hanoi-Haiphong area. This synoptic look at the
North Vietnamese SAM defense system thus has enabled photographic
interpreters to make an accurate count of SAM equipment. Their
findings are no longer estimates, but more and more hard fact.
The synoptic capability of the new systems, however, is not the only
consideration affecting our chances of obtaining serendipity effects. We
will now look at some of the other circumstances, some technical, some
natural or physical, bearing on the problem.
I)ate and Time of* Exposure
The optimum yield of photographic intelligence is derived from
photographic missions flown in the springtime after snow has melted and
before leaves have appeared on trees, and at or near noon when there is
little or no shadow. This timing is not always possible in intelligence
operations because missions must be conducted throughout the year.
However, certain advantages may be obtained from missions flown at
other seasons of the year, or days of the week, or times of day. Moreover,
there are conditions when it is not advantageous to fly a mission at the
normally ideal times of noon and in spring. For example, during a typical
day in the tropics, clouds build up in the morning to release rainfall at
noon. In China, spring is the monsoon period and clouds cover the land
mass for weeks at a time.
Missions in winter when snow is on the ground often provide unique
insights in interpretation. By observing snow melt on buildings
(buildings that are heated), an interpreter can readily identify areas of
habitation and work. Further, by noting areas where the snow has been
removed or plowed, the importance of a facility can often he established.
Snow also aids in the identification of camouflaged areas. Snow
obliterates painted disruptive patterns (Figure 1) and highlights those
areas where camouflage netting (Figure 2) or plastic sheathing is
employed.
Tall, very slender structures, such as communication towers and
electronic installations, are difficult to discern in the absence of shadow,
but on photography taken in early morning or late afternoon they cast
long shadows which allow their identification and measurement. They
are easily identified on winter photography in which snow and low sun
angles cause long shadows and produce high contrast of black shadow on
smooth white backgrounds.
I'lu tography from missions flown in the spring over permafrost areas
reveals buildings under construction, thereby yielding details of the
Appro4d For Release 2005/04/18: CIA-RDP78T03194A00039-3
Approved For Release 2005/04/18: CIA-RDP78T03194A00.0390010009-3
Serendipity
i,.It w I Now You `Iee It, Now You Don't. The cisruptive pattern I sting
e'er in July ore concealed b',' ,now in January at the Ladebu' Sam
',uppoi t facility, Eo st Germany.
Apo 6v d For Release 2005/04/18 : CIA-RDP78T03194A000300110009-3
Appro dRE r Release 2005/04/18 : CIA-RDP78T03194A0g0300U10009-3
e re
Figure 2. Like a Sore Thumb. This missile site was effectively camouflaged
by netting until snow starkly revealed the surface-to-air missile on its
launcher
buildings' interiors, while coverage in the fall will reveal completed
buildings or the results of the year's construction activity.
The best military order of battle information is normally obtained on
Sunday morning when most military equipment is in garrison, parked or
stowed. A count of private planes can best be obtained on weekdays
rather than weekends, because private planes are more frequently flown
on weekends.
Iron and steel plants in normal operation are nearly always partially
obscured by smoke, steam, and dust. The best time, therefore, to
photograph such a plant is during a strike or when the plant is shut down
for renovation or repair.
The movement of the tide can have a direct effect on what is seen or is
not seen on photography. For example, a photograph taken at high tide
of a boat repair facility in Hatou, North Vietnam, reveals two patrol boat
combatants under repair. The exact number of boats the facility can
handle cannot be determined from that photograph. However,
photography taken at low tide reveals eight boat cradles (Figure 3).
48
Approved For Release 2005/04/18: CIA-RDP78T03194A00030T009-3
Apprpy&O;Fpr Release 2005/04/18: CIA-RDP78T03194AOM3100010009-3
Figure 3. Time and Tide. On the upper, two motor torpedo boats are seen at
high tide at this boat repair facility in North Vietnam. On the lower, low tide
reveals that the facility has a total of eight cradles for repair purposes.
SECRET 49
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Appro ffec Release 2005/04/18 : n%1 09-3
a o
Approved For Release 2005/04/18: CIA-RDP78T03194A00030bb?6609-3
A proved, For Release 2005/04/18: CIA-RDP78T03194A30~010009-3
,erendipity
Ap r~&66 For Release 2005/04/18: CIA-RDP78T03194A000306 110009-3
ApproN~gq - Release 2005/04/18 : CIA-RDP78T03194A0Q0300Q1Q009-3
eren ipity
Instant of Exposure
The instant of exposure is that fraction of time when the shutter clicked
or film moved to record an event on photography. If the event lasted long
enough to be recorded on several frames of photography, then
photogrammetric calculations taking account of elapsed time can yield
technical data on the event that often is not obtainable from other
sources. It may happen, moreover, that the reconnaisance vehicle is over
a target at a particularly opportune time, or its very presence may elicit a
reaction that its cameras catch on film.
Thus, attempts by the North Vietnamese to bring down US
reconnaisance vehicles have provided unique information on the SA-2
missile system. Detailed studies of SA-2s in flight and their subsequent
bursts have provided information on the type of explosion, number and
speed of fragments, and warhead arming. This information has been
used by the military to determine the probable size of the SA-2's lethal
area (Figures 4 and 5). Trails of missiles fired at reconnaissance vehicles
have been analyzed and have provided information on the SA-2's flight
characteristics and performance. Limitations on its turn and climb
characteristics have been noted, and this, along with other information,
has made it possible to devise evasion maneuvers.
Periodic Coverage
Periodic coverage is a valuable tool in intelligence operations and
countless examples could be cited where it has solved intelligence
problems. Its full potential in the "peaceful uses" arena, however, has
not been realized or exploited. Normally one thinks of periodic coverage
as extending over a period of days, but it could just as well occur at
various hours of a single day.
Pi's of the British Joint Air Reconnaissance Intelligence Center
(JARIC), who are exchanging their techniques and experiences with
NPIC personnel, have noted many serendipitous effects on RAF
photography flown over Africa and Asia. Their photography of wildlife in
Africa at different times on a single day illustrates the potential
usefulness of periodic coverage.
The British were called upon by one of their former African colonies to
produce a series of large-scale maps on areas of potential mineral
resources. The contract stipulated that the British were to aid in training
to conduct the necessary photographic missions, the photogrammetric
efforts, the map compilations, and production efforts. To demonstrate
that in each geographic area there is an optimum time of day and season
52
Approved For Release 2005/04/18 : CIA-RDP78T03194A0003VMbT009-3
App veddpFor Release 2005/04/18 :CIA-RDP78T03194A0 910009-3 ity
for conducting photographic mapping missions because of the effects of
weather, shadows, foliage, and other variables, the British overflew a
prescribed area every hour on the hour from shortly after daybreak until
dusk.
Upon seeing the processed films, the host officials were duly impressed
with the problems of shadows, clouds, and the like. The British officer in
charge happened to have a degree in zoology, and was astonished at the
catalogue of detail on wildlife that was found in the photography. He
could inventory not only the wildlife, but could do it by age and sex. He
could determine the ranging of various species, the plant life that
supported them, their feeding and watering times, their nursing and rest
periods, and the relationship of one species with others. He was able to
observe several rare species of antelope and to observe elephant poachers
in action.
The British officer filed a preliminary report on his findings, which was
duly filed in Britain, suggesting among other things that such a study
based on photography could allow naturalists to select the time and place
to trap, snare, or tranquilize wildlife prior to their removal to safe havens
in the event man wished to use the land inhabited by animals for other
purposes. Had his findings and recommendations been heeded, the
wildlife tragedy of gigantic proportions that occurred in Rhodesia in
1958-60 might have been averted.
There, it will be recalled, after completion of the Kariba dam on the
mighty Zambesi River, a lake some 110 miles long formed behind it.
Although the tribesmen who lived in the valleys were moved to higher
ground, no consideration was given to the wildlife in what once was one
of the world's richest game sanctuaries. As the seasonal floodwater hit the
dam and the water level began to rise, hundreds of hills became islands,
crowded with hungry and panic-stricken beasts.
When naturalists of the world learned that thousands of animals were
doomed to starve or drown in a dammed-up lake, they censured the
Rhodesian Government for its lack of concern for the animals. The
Southern Rhodesians responded by sending three game wardens and
eight native trackers to rescue the starving and dying animals. The
Northern Rhodesian government sent one game warden who, upon
seeing the conditions of the animals, slaughtered them at random.
Although the Rhodesian government and the Royal Society for
Prevention of Cruelty to Animals continued their feeble rescue effort for
several months, only a tiny fraction of the valley wildlife was saved.
Approved For Release 2005/04/18: CIA-RDP78TO3194A000300 0009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
Increased Altitude
As the operating altitude of photographic vehicles has increased, the
amount of land area that can be covered by a single exposure has also
significantly increased, thus making it possible to observe larger ground
patterns. As a result, military mapping and charting organizations have
developed more efficient means of map compilation and production. The
larger areas observed require fewer controls and the tedious process of
making print mosaics is reduced to a minimum.
Experts have said that to open new lands for development. for mineral
exploration, land cultivation, water resources, and so on, topographic
maps at the scale of 1:100,000 are needed. A recent survey by the United
Nations revealed, however, that only 15 to 20 percent of the world has
been mapped at this scale. Present mapping methods used by civilian
organizations are much too slow, cumbersome, and expensive. At the
present rate of progress, the gigantic task of mapping the remaining 75 to
80 percent of the world at this scale would require 100 to 150 years. This
estimate does not consider the revisions that will be necessary to update
previously produced maps.
In less than 30 years, the world's population will double, and experts
generally agree that urbanization will occur faster than the world can be
mapped. It can be readily seen that the present cartographic effort is
much too slow. Yet, by increasing the altitude of the photo taking vehicle,
by improving the resolution of the system, and by using more modern
automated techniques, map and chart production can be speeded up and
this cartographic backlog substantially reduced.
The U-2 camera systems were designed for intelligence purposes, i.e.,
to achieve maximum coverage (horizon to horizon) and continuous
coverage over the entire flight track. The cameras were also designed to
use thin base film and permit complete stereoscopic overlap. These
cameras were of a unique configuration, and the resultant photography
presented horrendous problems of rectification, mosaicing, and
computation required for map and chart production.
In late 1959, a requirement for reliable topographic maps at
1:1,(x)0,000 and 1:500,000 scale of selected areas along and north of the
Tibet-India border was levied on NPIC, the Cartographic Division of the
then called Office of Research and Reports (ORR), at CIA and the
Aeronautical Chart and Information Center (ACIC). The requirement
called for four maps to be produced covering an area of 65,000 square
miles with shaded relief delineating the topography, spot elevations,
hydrography, roads, bridges, and place names. Existing maps of these
areas were incomplete, unreliable, and badly out of date. They proved to
Appro5did For Release 2005/04/18: CIA-RDP78T03194A0003aMIOffJ09-3
Approved For Release 2005/04/18 : CIA-RDP78T03194AY@@9~P9010009-3
erendipity
contain gross errors, and there was little or no geodetic control. By
combining the talents of the Center, the Cartographic Division, and
ACIC, the four 1:1,000,000 maps were completed in a period of four
months, a job which normally would have required one to two years.
Based on this effort, which employed some of the best talents in the
US Government in photogrammetry, cartography, geodesy, and
photographic science, recommendations were soon made for new
methods, techniques, and equipment to exploit U-2 photography to
produce much-needed maps and charts of denied areas. The traditional
instruments and methods used in map compilation, including field
surveys to establish geodetic control, elevations, and accuracy checks,
could not be applied to this type of photography. Many new methods and
techniques were developed and tested. Rigorous demands for both
accuracy (essential in targeting) and speed (maps were also needed of
vast areas in the USSR and China) inspired a major effort. As in many
crisis situations, when the best talent is assembled and all-out effort put
forth, technological advances occur in rapid succession that would
normally take many years to evolve.
Probably the greatest assist came from the computer. NPIC was one of
the first government agencies to utilize a computer (an ALWAC III-E
vacuum tube first-generation computer) for computation and data
processing services for photographic intelligence exploitation. From this
initial experience, photogrammetric equipment was designed that
revolutionized the exploitation of metrical intelligence from
reconnaissance photography and permitted mass production of reliable
maps and charts of denied areas.
Advances in equipment and techniques in map making resulting from
these early efforts have greatly reduced map and chart production time.
Instruments such as UNIMACE (Universal Automatic Map Compilation
Equipment), developed by the US Army Topographic Command,
produce orthophotos and topographic contour maps from stereo photos.
The photographs are scanned electronically and the conjugated images
are correlated. Ground positions are determined by a computer and
photographically printed in their true position. Other instruments are
being developed which promise even greater speed and efficiency.
The capabilities of some collection systems being studied go far
beyond the talent and money presently available to exploit them
completely. For example, it is well within present capabilities to produce
"time lapse" or "cyclical" charts to show snow cover and melt, ice flows,
river flows and floods, crop planting and harvest, and urban changes. It
is now possible to view the traffic problems on the Eastern seaboard of
ApproveTd For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
the US in a near-synoptic manner. It is within the realm of possibility to
prepare new types of graphics utilizing time lapse methods to show the
movement of automobiles to and from metropolitan areas during work
periods. Hundreds of other such ideas have been proposed. What the
future will bring is open to the imagination, but one thing is certain-we
have just begun to explore the possibilities.
Sun glint is a word not recorded in ordinary dictionaries, but it can
mean a great deal to a photo interpreter. Sun glint is the term photo
interpreters give the phenomenon which occurs when sunlight or other
light strikes a surface or object at such an angle that the surface or object
takes on a new perspective. For example, sunlight striking a body of
water at a relatively low angle gives the water a mirrorlike quality and
mapping and charting becomes easier because the lines of the banks
become more clearly delineated.
From an intelligence viewpoint, serendipity effects from sun glint have
provided valuable information, for sun glint can make possible the
identification of objects far smaller than would normally he visible on
photography from a given system. Sun glint aided our photo interpreters
in tracing a telephone line being constructed in Laos by the North
Vietnamese to support their infiltrating troops (Figure 6). In this case,
evert the thin telephone wires and the insulators on the cross arms
become visible because of this phenomena.
Similarly, sun glint made possible the detection of the so-called cable
bridges in North Vietnam. In order to avoid new bombing of their
bridges, the North Vietnamese replaced bombed out decks with cables
which were covered at night with planking so they could carry traffic
(Figure 7). Before dawn, the planking was removed and the bridge once
again appeared destroyed.
Early morning or late evening sun reflecting off canvas or metal parts
have often revealed ships or other objects carefully hidden to avoid
detection (Figure 8).
Effect of Winds
Data on bottom contours under shallow waters, beach and river
erosion, and harbor siltation are difficult to obtain. For the past nine
years, the US Coast and Geodetic Survey has used color film in high-
resolution cameras for water penetration in its shoreline mapping
projects. Color and advanced photogrammetric techniques have
Approve'd1 For Release 2005/04/18: CIA-RDP78T03194A00030804 9-3
A proveed . or Release 2005/04/18 : CIA-RDP78T03194AOQ3010009-3
rendrpr y
Figure 6. Streak of Light. A telephone wire reflecting the sun gives (away
yet another secret. Seeing a telephone wire is well beyond the design (ripa -
bilities of camera system.
EGRET 57
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Appro PVT Release 2005/04/18 : CIA-RDP78T03194A00 300010009-3
~dpify
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300Mbb09-3
Approved For Release 2005/04/18: CIA-RDPMT03194AgqQj-~
U ::qO10009-3
,,erendiptty
t iqure $. tarty in the Morning, Early in the Evening. Low sun r,-ogles
cause reflections which permit identification of North Vietnamese patrol
boats hidden along streams north of Haiphong.
Apj 6 For Release 2005/04/18: CIA-RDP78T03194A00030d '10009-3
Appro,~V1 r- Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Serendipity
permitted the portrayal of bottom features in many areas to depths of 20
Feet. Color work, however, is tricky. Sun angle, clouds, turbulence, and
haze can all affect results drastically. Color photography missions are
normally flown at low or medium altitudes only under nearly ideal
conditions. Even under ideal conditions, it is often difficult to determine
the hydrography of certain areas because of the presence and motion of
kelp and other subsurface sea plants.
The U-2's and SR-71's, however, can often fly high above areas
experiencing gale winds. Consequently, the Center has noted a
serendipitous effect recently that may aid in shoreline mapping projects.
Flying over denied areas, we noted that high winds blowing across rivers
and lakes exposed areas normally inundated. This, of course, permits
better definition of islands, sand bars, and vegetation. High winds
blowing away from shore at low tide have exposed as much as a mile of
ocean shoreline. The kelp and other sea plants normally extended and
moving are then prostrate, permitting detailed hydrography.
Perhaps hydrology studies could be aided and expedited by flying the
U-2's or SR-71's with both color and black and white film over shoreline
areas when gale-force winds are blowing at the surface. The resultant
photography could then be correlated with existing photography, maps,
charts, and hydrographic data to yield more accurate presentations than
in many instances presently exist.
Sensor Discoveries
In January-February 1963, the Center and the US Geological Survey
combined forces for an aerial infrared survey' of Hawaii. The Center's
interest was to determine whether the system could detect heat emitting
sources in caves. We hoped to use such a system in the reconnaissance of
Cuba where, after the 1962 missile crisis, reports persisted that missiles
had been hidden in caves scattered throughout the island.
The study of caves yielded some information, but none applicable to
the missile/cave storage problem. The US Geological Survey wanted to
study thermal patterns and structural features of active and inactive
volcanoes. The infrared study of the active volcano Kilauea revealed the
relative intensity of the thermal features of the caldera. Many of the
anomalies present were correlated with the visible steaming and transfer
of heat to the surface from subterranean sources. More important,
however, the infrared missions allowed scientists to "take the
'Infrared photography employs materials sensitive to the rays lying just beyond the red
end of the visible spectrum.
Approved For Release 2005/04/18: CIA-RDP78T03194A0003bb 609-3
Approved For Release 2005/04/18 : CIA-RDP78T03194AO01010009-3
Serendipity
temperature" (energy emission) of a volcano through successive days of
coverage and to determine if the volcano was "running a fever."
Continued increases in temperatures of the volcano were noted and this
data gave more accurate warnings of impending eruptions than previous
methods.2
The new Icelandic volcano "Surtsey,"3 which exploded out of the sea
in 1963, was monitored from its inception with the IR techniques
developed in Hawaii with outstanding results.
While scanning the infrared imagery for caves near the Hawaiian
coastline, large images of pronouncedly cool areas adjacent to the shores
were observed. IR imagery interpreters soon recognized the significance
of these areas as discharges of cool, fresh ground water into the sea. This
discovery led to an order for an IR aerial survey of the entire coastline of
Hawaii. Infrared interpretation revealed 219 shore areas that had
varying degrees of seepage of fresh water into the sea. The greatest area
of ground water discharge was discovered at the outlet of Waiahea Pond,
where more than 100 million gallons of fresh water per day flowed into
Hilo Bay (Figure 9). The discovery of these sources of water was
significant since 13 billion gallons of rain fell on Hawaii every day
during the survey but only three percent of this rainfall was retained by
the land. The remainder seeped rapidly through porous soils into the sea.
Little was known as to how, when, or where this valuable source of water
flowed to the sea.
The results of this survey, along with a map pinpointing the locations
of the underground sources of water, were published by the US
Geological Survey.`
As a result of the survey, wells were drilled and water found in several
remote and previously uninhabited areas, and construction of
communities commenced.
Considering that five percent of the world's fresh water runoff is under
the seas, and therefore goes to waste, this discovery could go a long way
in alleviating water shortages in water-hungary coastal areas. The
infrared method of seeking fresh water in such areas is fast becoming a
standard practice. The benefits derived from the Hawaiian coastline
'W. A. Fischer, R. A. Mokham, F. Polcyn, G. A. Landis. "Infrared Surveys of Hawaiian
Volcanoes." Science Magazine, November 6, 1964, pp. 733-742.
'United States Department of the Interior, Geological Survey, "Infrared Techniques
Help Probe Surtsey's Fiery Mantle." Feature Material Release, July 30, 1967.
"William A. Fischer, Dan A. Davis, and Theresa M. Sousa, Department of the Interior.
"Fresh Water Springs of Hawaii from Infrared Images." Washington, U.S. Geological
Survey, 1966. (Hydrological Investigations Atlas HA-218)
App?M For Release 2005/04/18: CIA-RDP78TO3194A000300610009-3
Approyf.KAW Release 2005/04/18: CIA-RDP78T03194A00 300010.009-3
endipity
0 0
-O 0 N
C
o s 3
a)
O
a)
0 0
a) O
U a)
s
o 0
0' 0)
62
d For Release 2005/04/18: CIA-RDP78T03194A00036l609-3
Approve
Approved For Release 2005/04/18: CIA-RDP78T03194A0g~N.10009-3
Serendipity
survey alone has paid for the cost of the infrared experiment several
hundred times over.
Aerial photography, a by-product of the intelligence effort, is being
used to monitor other changes in the environment. Much has been
written about the pollution of our streams, rivers, and lakes by foreign
substances such as sewage, refuse, detergents, and silt. An even greater
threat, "thermal pollution," is emerging. Either willfully or
inadvertently, man is changing the water/heat balance of our
waterways. The increase in the use of fresh water sources for industrial
cooling presents a real threat to fish and other organisms. Fish, which are
cold blooded animals, are unable to regulate their body temperature and
are particularly sensitive to changes in their thermal environment. Each
one is conditioned to the temperature of the water in which it lives and
cannot adjust to the shock of an abrupt change in temperature. If the
temperature of the water increases excessively, the fish will die. The
aquatic ecosystem generally is even more sensitive to temperature than
the individual fish. Fish depend on a food chain system involving smaller
fish, invertebrates, plants, and dissolved nutrients. Any change in the
heat environment will seriously affect the proliferation of any link in the
chain which in turn, can affect the harvest of fish.
The principal contributor of "thermal pollution" is at present the
electric power industry. The present rate of heat discharge is now critical
only in certain areas, but ecologists are showing great concern about the
planned tenfold increase in electric power production in the near future.
Most of the proposed plants will use water from rivers and lakes as
coolants. The ecologists will use IR to monitor thermal pollution. This
tool, as we have seen, was originally developed for intelligence purposes.
It was assumed prior to the existence of infrared imagery that the
heated effluent from power plants was quickly dissipated and that its
damage to aquatic life was therefore slight. Even though the resolving
power of the early IR systems was poor, the large effluent plumes shown
to ecologists sent them scurrying to check their "ground truth" data. The
infrared data was correct and much of the "ground truth" data proved
inadequate, poorly collected, or erroneous (Figure 10). Those who
experimented with IR systems in the early days raised the possibility that
two thermal power plants discharging effluents on opposite banks of the
river could create a "thermal barrier" keeping fish and other river or sea
life from reaching their spawning or feeding grounds. These and many
more finds regarding thermal effluents have been passed to the US
ApP&vR&J For Release 2005/04/18 : CIA-RDP78T03194A00030*10009-3
Approv!q{ Qm Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
i~ndipity
U
m
>
l1
(I)
L.
i1
C)
Z.1
C
O
))
a
L a
a
a)
_C
c N
r
a)
a)
C) 0
a)
U)
-
;
S7
r) .I)
C)
a
U
E
tS
~ a)
C)
i) N
a .
a
1:
Qj a
C2
O
S
a ?ci 3 a
o c:
a
O o
is n, a
o p a a)
T
(
C)) > 6
u: 3
64
Approved For Release 2005/04/18 : CIA-RDP78TO3194A00036 V009-3
Approved For Release 2005/04/18: CIA-RDP78TO3194A0Y~J29 910009-3
erendipity
Geological Survey's Water Resources Division. Prototype work performed
by the military services and the CIA for reconnaissance purposes is now a
valuable monitor for the temperature of our streams, lakes, rivers, and
oceans.
Clouds and Weather
"An opportunist," said philosopher Elbert Hubbard, "is a man who
takes the lemons fate has handed him and opens up a lemonade stand."
The lemons of aerial photographic exploitation are clouds.
In the early days of aerial photographic exploitation, that which
obscured the target area, such as heavy clouds, haze, darkness, was often
removed from the original negative prior to duplication in quantity for
dissemination.
In the 1955-1957 period, the U-2's were flying a number of test
missions within the continental limits of the United States and in Europe.
Photography from the test missions contained cloud formations from a
vantage point never seen before by meteorologists. The latter were
appalled, however, that frames of complete cloud cover (which to them
displayed valuable meteorological information) were being removed
before exploitation. Their complaints led to the establishment of a policy,
still adhered to, that all original negatives be kept intact.
Cloud forms are the most obvious feature of weather, yet little was
known in the early 1950's of the significance and climatic distribution of
cloud forms. Most observations were from ground stations reported In a
crude code, or from aircraft flying through cloud formations.
The meteorologists working at the Center prepared a study which
revealed much about the bottom layer of the atmosphere-the interface
of land-atmosphere, sea-atmosphere, vegetation-atmosphere, and cloud-
top-atmosphere. Most importantly, the study showed that a single U-2
mission could cover large storm areas, and suggested using the U-2 as a
hurricane hunter.
The first such mission was flown on 14 November 1956. The orders
were relatively simple: Conduct reconnaissance from above and inside
the eye of a storm. The storm selected was Typhoon Kit (Figure 11), and
the photography which resulted from overflying it marked a significant
advance in meteorology.'
For the first time in history a typhoon had been photographed. The
bowl-shaped eye of Typhoon Kit, the first ever seen in its entirety, was
approximately 30 miles in diameter. By photogrammetric methods, the
'Lt. Col. Robert C. Bungaard, "The First Flyover of a Tropical Cyclone," Weatherwise,
June 1958.
Ap rRth For Release 2005/04/18: CIA-RDP78T03194A00030''10009-3
Appro end Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Serendipity
figure 11. One of a Kind - The first photo of a typhoon. The U 2 is verti -
ally above the center of Typhoon Kit. Horizontal streamline analysis of
Typhoon Kit revealed nine cyclonic swirls.
lops of the clouds in the upper middle of the picture were fonrnd to be
18,000 feet high. Photo interpretation and meteorological analysis
revealed that 't'yphoon Kit contained nine cyclonic swirls (rnarked by C's
in the sketch).
A survey of damage from 't'yphoon Kit revealed that the Sturm had
claimed the lives of 39 persons, rendered over 58,000 persons homeless,
Approved For Release 2005/04/18 : CIA-RDP78T03194A0003` 0RlDb09-3
App oved .For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Srerendipity SECRET
and caused over $5,000,000 in property damage. To the men of the
weather groups, a new means of tracking violent storms, and increasing
our understanding of them, had been achieved.
The U-2's were to fly over more cyclones and hurricanes (Figure 12),
and the findings in these experiments were published in professional
journals.6
Data obtained from these experiments was used in planning the orbital
parameters and specifying the cameras to be used for the Tiros and
'Robert D. Fletcher, James R. Smith, Robert C. Bungaard, "Superior Photographic
Reconnaissance of Tropical Cyclones," Weatherwise, June 1961.
Approved For Release 2005/04/18: CIA-RDP78TO3194A00030010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
Figure 12. Wound up Tight. Typhoon Ida on 25 Sept 1968 had maximum
surface winds of 240 knots with an average of 145 knots. This photograph
was taken an hour after the record wind velocity was reached
Appro`ed For Release 2005/04/18 : CIA-RDP78T03194A0003069 '0609-3
Approve For Release 2005/04/18: CIA-RDP78T03194A0(~f%01.10009-3
eren ipity
Nimbus satellites. The locating, tracking, and monitoring of storms from
outer space is now a routine affair. The advance warning that can now be
given has saved countless lives and millions of dollars in property.
Urban Planning
The foregoing examples invite the reflection that the essence of aerial
imagery lies in its unique ability to record in minute detail the elements
of broad natural and human processes, and that it may in time render a
substantial contribution in the study of the latter. The case of the Santa
Barbara oil problem in the spring of 1968 is illuminating in this respect.
It will be recalled that a leak in an offshore oil well in California's
Santa Barbara channel unleashed an ecological disaster upon the bird
and sea life of the area. On request, CIA conducted a special U-2 mission
over the oil slick area. The U-2 has a two-camera system. For this
mission, the forward camera contained black and white film; the aft,
color. The proposed flight track was similar to that of an operational
search mission: i.e., the track would overlap and be crisscrossed at right
angles so that the resultant mission would look like a tick-tack-toe
schematic. The Center was to do a preliminary assessment, attempt to
track the movements of the oil, and check the damage being wrought on
the beaches.
The initial scan was accomplished on the higher resolution black and
white imagery. Although the oil rig, beaches, marinas, and coastal
features were observed on this imagery of good interpretability, the
damaged areas and the oil slick were not readily distinguishable from
natural features such as kelp beds, normal beach clutter, and wind
streaking in the channel.
Analysis of the color photography, with resolution considerably less
than that of the black and white film, revealed the extent of the oil slick
and showed the saturated beaches and marinas. The progress of the clean-
up operation, involving the spreading of straw and powders on the
affected areas, was easily determined. The slick was visible in feather-
shaped patterns broken by the movement of the waves and wind. The
damage from the slick was extensive in the marinas where the
breakwaters trapped and kept the oil from flowing out to sea with the low
tide. After preliminary assessment at NPIC, the mission photography was
given to the US Geological Survey for further study and was used to make
recommendations to the Secretary of the Interior.
More important than coverage of the slick, however, was the overview
of the coastal areas of California. We were especially impressed by the
damage done by the heavy rains which fell in January and February, and
Ap'T`65E~ For Release 2005/04/18: CIA-RDP78T03194A0003066
Approv Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
~ S !,-ndit) ity
Approved For Release 2005/04/18 : CIA-RDP78T03194A00030 616 09-3
Appro vied For Release 2005/04/18: CIA-RDP78T03194A0Sc 3 10009-3
by the heavy silting of streams, lakes, and reservoirs (Figure 13). Most of
the silting and damage was caused by man's poor urban planning-gross
land exploitation. By tracing the streams to the hills, we could see the
reason for the disaster-new and old housing developments built on fill
dirt taken from terraced hills. When the rains came, the fill dirt began to
slide, damaging millions of dollars worth of property, and clogging
streams, lakes, and reservoirs with silt. We were puzzled that the
extremely poor urban planning in the hills was not noticed earlier by
state and local authorities, or, even more curiously, by insurance
companies. By looking at aerial photography, this damage could have
been predicted. In an earlier case, in 1958, more than 100 homes slid
toward the Pacific Ocean at Portuguese Bend, California. A geologist for
the city's engineering department said that "every engineer and.
geologist in the state knew that the project was in a slide area and the
developer did or should have known it too."7 In spite of this knowledge,
the project was built.
The rapidly changing phenomenon of world urbanism is revealed on
aerial photography. All too often, the myriad factors of
urbanism-including road and highway construction, land use, home
construction, water requirements, factories, power lines-are thought of
as separate entities. The authority for control of these factors is vested
with a department, often parochial in its views, certainly limited in
budgetary resources, and concerned with a limited geographical area
(such as a township, city, or county). This department usually cannot
impose its views on its area, but rather must work through urban
planners, budget officers, legislators, and other officials. In this process
there are pitfalls which often deflect action into the path of least
resistance, the most politically palatable, or the cheapest course. The
problems associated with the increasing urbanization in some areas are
acute, and the ability to create and maintain a reasonable degree of
human comfort will depend significantly on actions taken in the future
which may be unpopular with the populace. The relationship between
the entities must be studied and understood in each city, and the
interrelationships between cities must be considered.
By the end of this century, the population of the United States will
have increased by an additional 100 million people. Most of this
development will come in the nation's rapidly expanding urban areas.
Unless urban planning is conducted carefully, considering the interplay
of water, traffic, construction, and pollution, our hope of coming to grips
with megalopolis will indeed be hampered.
7"Ilomebuycrs Ignore Slides," Washington Post, June 7, 1969, p. E1.
Approved For Release 2005/04/18 : CIA-RDP78T03194A000303 10009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
The synoptic view of the coastal areas of California, the serendipity
view of silting, and flying missions in both black and white and color
were revelations to the US Geological Survey, which normally flies
photographic missions at lower altitudes for specific purposes.
Undoubtedly, there will be further requests to use the U-2 for disaster
assessments. Possibly, the U-2 also may be used on a periodic or routine
basis to note changes which could have considerable bearing upon future
generations.
The prime purpose of the aerial photograph today is reconnaissance,
but its greatest role in the future could be as the principal record of
history. Even now, it could serve as a vital aid to historical accuracy and
provide a dramatic, visual testimony of truth.
The technical and scientific revolution of the past 50 years has meant
the destruction of countless visible remains of history, and the future
portends even greater destruction. The US Government is seemingly
unaware that it has become the possessor of the finest record of world
history over the past 30 years, but that it is destroying this record at an
unprecedented rate.
Most US Government agencies use and, therefore, must store aerial
photography. The storage facilities are limited, The criteria for
destruction of film for most organizations is the frequency of use rather
than the historical value of the film. A variety of means, some of them
crude, are used to control and record the use of film from manual
means-such as date stamping a can of photography each time it is
used-through machine control methods. One organization uses the
"dust control" method, determining which cans of film are least used by
the amount of dust collected on the tops of the cans. Periodically, at
intervals set by records management personnel or whenever the vaults
become full, orders are given to destroy some of the film. The film that is
the oldest, is duplicative, or is the least used is generally destroyed. Little
or no concern is shown for the content of the film. One should not be too
harsh, however, on personnel who handle film. Management, generally,
is too preoccupied with the present and the future to care about the past.
't'here are no national film archives. Security considerations preclude
giving the film to colleges or universities. Private research organizations
have raised no clamor to receive it, and the national professional
associations are oblivious to its potential use or prefer to remain with the
traditional approaches to recording history. Yet, those of us who have
Approve For Release 2005/04/18: CIA-RDP78T03194A00030-3
AtereoveIip.F r Release 2005/04/18: CIA-RDP78T03194A p10009-3
studied aerial photography over historically denied areas are amazed at
what could be added to existing historical records.
The study of the past through photography is fascinating. Who has not
seen the Civil War through the lens of Matthew Brady's camera or World
War II through the film documentary "Victory at Sea"? Yet the
records of nations and people on an immediate scale are frozen on
today's aerial photography grows larger and the resolution becomes
better, our ability to recognize the patterns of the past will become more
acute. We will be able to compare these patterns with the present and the
future and enjoy the intellectual pleasure of seeing ourselves in the vast
perspective and panorama of history.
There is a great need, therefore, to compare observations in the same
locations as much as several decades or centuries apart. The advantages
of seeing life forms and tasks performed at a single point in time or as a
background against which plot changes are obvious. We know, for
instance, that many tasks are performed today in the same fashion as
they have been for centuries. Periodic coverage of a relatively large area
can provide an infinite number of details on a variety of subjects such as
transhumance, migratory phenomena, and the routes and tracks man has
taken through the years. On a large scale, it will show how and where
man lived, his standard of living, and his cultural development. It will
also record his spiritual resources as well as his divisions and
destructiveness.
Hundreds of examples can be cited of historical facts gleaned or
strengthened from aerial photography. At one time for example, our
concern was focused on Lop Nor in Sinkiang for indications that China
was building a nuclear weapons capability. The number of written
descriptions of the area available to us was meager and most of the data
was rather old. We compared, however, the data from the written record
with what we observed on Genetrix balloon photography; it was amazing
how we could confirm observations made decades and centuries ago.
In 1934, the Swedish explorer Sven Hedin in his book, The Wandering
Lake,' described the Lop Nor area in detail. Through his descriptive
text, sketches, and ground photography, we were able to follow his jour-
ney and pinpoint the areas of his archeological discoveries. Similarly, we
could follow the travels of Sir Mark Aurel Stein9 through Central Asia
and the Lop Desert in 1907. We saw not only the trail that he followed,
but also hundreds of others that linked the centers of civilizations in
Central Asia. Going back to the earliest traveler in the area on record,
8Hedin, Sven. The Wandering Lake. New York, Dutton, 1940.
'Stein, Sir Mark Aurel. On Ancient Central Asian Tracks. New York, Pantheon, 1964
Ap~Vov N For Release 2005/04/18 : CIA-RDP78T03194A0003000310009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
SECRET Serendipity
Marco Polo, we find that his description10 "Of the city of Lop and the
Great Desert" was amazingly accurate.
The Desert of Lop as it existed for Messrs. Polo, Stein, and Hedin
remained unchanged for centuries. Then, abruptly, China entered the
nuclear age, and Lop Nor began changing. Trails became roads,
watering holes became towns, obstacles were bridged, and electricity and
gasoline powered the tools that changed several large desert areas.
Science and technology had changed an area and in the process had
erased a number of identifiable points in a chapter of history and
mankind. But we still have a record from photography as to how Lop Nor
looked to Messrs. Polo, Stein, and Hedin. One dreads to think that some
25 years hence someone in search of film vault space will thoughtlessly
destroy this priceless historical record.
Many questions are asked that could be answered from a historical
record of photography: How was a country invaded? How does an
invasion change the invaded country? What is the impact on the invaded
country if there is a clash of cultures? The questions are endless.
Prior to our first coverage of Tibet, we asked our librarians to assemble
all the books on this country that were in the Library of Congress. There
was a total of 22 books, all of them written before the Chinese
Communist invasion and occupation. U-2 photography revealed that the
military invasion and occupation, making great use of motor and air
transport, were carried out swiftly and efficiently. After the roads were
constructed, land development, the construction of a military
establishment, and the exploration for mineral resources began in
earnest. All of these activities were new to Tibet and, therefore, easy to
spot and identify. Subsequent coverage indicated further sinicization of
the country. The few millions of the indigenous population that
remained were faced with overwhelming and brutal power and by an
ever-increasing influx of Chinese immigrants who dispossessed them of
their land. Tibet as it existed for 1.3 centuries with its tiny, peaceful
population and its geographical and cultural remoteness is fast
disappearing (Figure 14). Authors who had written books subsequent to
the invasion and occupation of Tibet have been hampered by the severe
censorship imposed by the Chinese Communists, and the only
information coming from the country is riddled with propaganda.
Obviously, aerial photography is a vital historical record. Unless we
act now to preserve it, someone in the future on receiving newer photog-
raphy of increased resolution and quality may thoughtlessly decide that
Polo, Marco. The Travels of Marco Polo. New York, Modern Library_ 1931.
Approadd For Release 2005/04/18: CIA-RDP78TO3194A0003aMID?09-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Serendipity SE RET
t}ec older photography is no longer of value arid destroy it. 't'his de ti ac-
tion would rncart the loss of the most significant records of this p-iod
and it would be through serendipity!
iqure f4. the Old and the New The Lhasa that most of us know with the
D-rlai Lama's Place (the Potala) and the individual homes with walled
courtyards are being surrounded by Chinese military installations.
AI3b 4Jcl For Release 2005/04/18: CIA-RDP78T03194A000301b10009-3
Approved For Release 2005/04/18 : CIA-RDP78T03~fiA~Q10009-3
Time, Change, and
Intelligence.
The Central Intelligence Agency is twenty-two years old-old enough
for Parkinson's law to have gone into operation and for its original
missions to lose some of their crispness and relevance to the needs of the
country and of its policy-makers.
It is clear that the world in which we operate today is strikingly
different from that of the Second World War and the Korean war. The
Soviet Union, China, and International Communism are much changed,
and the threats and problems they pose are different from those of the
late forties and early fifties. The character and dimensions of war have
changed dramatically, as have the political uses of military power. A
whole crowd of new nations has elbowed its way into international
politics, an endeavor in which the great powers have been most
cooperative. The world of science and technology has expanded vastly
during this period, spreading affluence and expectation of greater
affluence around the world, and making possible interaction-
psychological, social, economic, and political-among countries on
an entirely new scale.
Responsible Agency officers have, over the years, had reason to ask
themselves whether we were not too often chasing Communists in
situations where new forms of revolution were the problem, or concerning
ourselves with the question of stability in countries in which change was
inevitable and, in fact, desirable. Many thoughtful officers have asked
themselves and their colleagues whether, indeed, the Agency has not
been too busy fighting the last war and performing missions that were
conceived in its aftermath to comprehend that our opponents, and
indeed we ourselves, have changed out of all recognition.
The answers to these questions, important though it is that they be
asked, are not gloomy. The Agency has changed almost continuously
from the time of its inception and has taken on new areas of
responsibility in response to the changes in the world situation as well as
to technical developments that opened up new means of collecting and
evaluating intelligence. One of the most dramatic areas of change has
Approve or ~ellease 2005/04/18: CIA-RDP78T03194A000~7~
`1tll'O'RQIR0 PAGES 77-87
Approved Fggr M rase 2005/04/18 : CIA-RDP78TO3194A000300010009-3
CON FID N IAL The Future
been that of intelligence on strategic weapons and in the whole field of
science and technology. Not quite so dramatic, but equally important as
an indicator of the Agency's capacity to respond to new interests and
needs of the policy-maker, has been the development of resources for
collecting and evaluating intelligence on the Afro-Asian countries and
Latin America. The Office of Economic Research was originally charged
with economic research on Communist countries; for some time it has
taken the rest of the world into its purview. The Office of Current
Intelligence has put itself in a position to deal with developments in
every country of the world and to consider the pertinence to American
interest of social and economic change in these countries, as well as
questions of Communist influence and political stability. National
Intelligence Estimates have dealt with matters outside the context of
great power confrontation with increasing frequency. Whereas in the
early years of the Agency a substantial proportion of NIEs tended to be
on the subject of Communist prospects in this or that country, or on the
question of the chances for survival of the regime in power, more and
more estimates deal with such matters as "The Potential for Revolution
in Latin America" (NIE 80/90-1-69) and "Black Africa's Prospects for
Modernization" (NIE 60/70-1-69).
Equally impressive has been the resourcefulness of the Agency in
finding ways of doing its business more efficiently. The vast
improvements in scientific means of collection of intelligence and in the
evaluation of such intelligence are notable. The establishment of the
Office of Computer Services, the use of computers to handle specialized
problems throughout the Agency, and the assignment of a senior officer
to study the long range prospects for the use of automatic data processing
in the evaluation of intelligence, demonstrate a readiness to change and
alertness to opportunity for useful change.
Before we over-indulge in self-congratulation, however, it might be
useful to use the old question-asking technique again. The question this
time is what kind of situation we are likely to have to operate in during
the next twenty-one years and whether we might not need to think about
ways in which to extend our capacity for flexibility and inventiveness. It
may be that the proven disposition of the Agency to respond to new
opportunities, even the systematic review by the Plans, Programs and
Budgeting machinery of the relevance and effectiveness of our present
efforts and projection of programs into the future, will prove inadequate
to the conditions of the next generation.
Seeing the future as wildly different from the present, full of wonders
and terrors, bearing little resemblance to the solid and known world of
ApproZgd For Release 2005/04/18: CIA-RDP78T0319lA Obt T1 09-3
Ap ron d For Release 2005/04/18 : CIA-RDP78T0~1"~~ (~Q10009-3
e
the present, seems to be the natural tendency of those who these days try
to look more than a year or two ahead. It is wise for one who
contemplates the future to remind himself that one of the clearest lessons
of history is the continuity of human ideas and institutions, the way in
which change evolves out of that which already exists. It is also well to
remind one's self that there has been a considerable amount of change in
our own lifetime, not to mention that of the elders who have seen the
world modified by the motor car, electronic communications, the
airplane, antibiotics, nuclear fission, and space flight, to give an
incomplete list. Like all older generations they have asked themselves
what the world is coming to, but they-most of them-have adjusted
nicely, thank you, and are basically more like their parents than unlike.
Still and all, there is something different about the future today. It
probably always seemed to be rushing at one; today it seems to be
rushing at an accelerating pace. Younger and younger people are asking
what the world is coming to. The imminence of the year 2,000, magic
millenial figure, probably has something to do with it. Still, there must be
more reason than that for the tremendous growth of active interest in
looking ahead. A European society for the study of the future-with Ford
Foundation money-called "Futuribles," has been at work for some
years now. The American Academy of Arts and Sciences has set up a
Commission on the Year 2,000 with an impressive array of talent among
its membership. One of its members, Herman Kahn of the Hudson
Institute, a "think tank" that usually concerns itself with strategic
weapons and the like, and a colleague, Anthony Wiener, have written a
widely read book entitled The Year 2,000, An Inquiry ... New books on
the shape of the future appear at frequent intervals. There is somewhere
an Institute for the Future. Studies of current situations and problems
projected ten and twenty years ahead are now commonplace in
government and in the many foundations and research organizations. At
every learned society convention that met at the turn of the year, papers
on the future, usually with a warning of impending disaster, filled a large
part of the program.
Is all this interest and activity different in kind from the work of
Edward Bellamy, who wrote Looking Backward in 1887, or H. G. Wells,
who wrote The War of the Worlds in 1889? Perhaps not. Perhaps it is just
a contemporary manifestation of the same natural human curiosity about
what is around the corner. Each man must judge for himself. It is possible
to argue impressively that the basic dimensions of change are much as
they have been. One has only to try to sketch out what Herman Kahn
calls a "surprise free" picture of the world a generation hence to provide
Approve~For pease 2005/04/18 : CIA-RDP78T03194A0003000009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
CONFIDENTIAL The Future
one's self plentiful food for thought. A "surprise free" world is, of course,
one arrived at by projecting present trends. Each individual would
choose different trends and find that he expected them to develop
differently than his neighbor, but it is striking that it is quite difficult to
carry out the exercise without positing a world very different from that in
which we live today.
Just as a sample: it could be argued that people in their thirties today
can look forward with some assurance to a world with twice the present
population, with real time communications-with access to vast stores of
information-which are likely not only to change the role of information
in human life but to give those in command of the central machinery a
kind of control over individuals never before exercised by anyone, a
world in which the problems before the decision-makers in many
countries are of such technical complexity as to make real public
participation in their resolution impossible, and in which the majority of
the world's people will not have real, i.e. productive, jobs to keep them
occupied and out of mischief.
It is not the purpose of this paper to try to sketch out a scenario or
scenarios for the future. What we want to do here is talk about what
change is likely to mean to intelligence, and content ourselves with a
"surprise free" projection rather than go into all the most likely
alternatives and permutations.
In the military field, generally speaking, circumstances seem less likely
to change in ways affecting in our present methods of collecting and
analyzing intelligence than in other fields. Weapons seem likely to
become more sophisticated and complex and to be developed for use in
areas hitherto inviolate-the sea bed and outer space, but the problems
for intelligence seem likely to remain essentially the same. The biggest
change in the nature of the problem of military intelligence would come
about in the event of the achievement of firm disarmament or arms
limitation agreements among the larger powers. The problems of
inspection and monitoring of development and test programs would
become of paramount importance in such a situation. Whether
disarmament or arms limitation becomes a reality or not, intelligence on
the acquisition of sophisticated weapons by small countries, particularly
the less stable and balanced small countries and those involved in bitter
feuds, seem likely to become both more important and more difficult to
acquire.
Recent experience has made it abundantly clear to intelligence officers
that the traditional methods of collecting and presenting intelligence on
conventional land warfare are of limited validity in situations like that in
Appro4d For Release 2005/04/18: CIA-RDP78T0319 Q 6WMi 109-3
Are vutd For Release 2005/04/18: CIA-RDP78T0~WAB"(8410009-3
Vietnam. The order of battle concept has been very difficult to apply
meaningfully where organized combat units have played only one of
several complementary roles. Collection and presentation of meaningful
statistics on manpower gains and losses and assessments of enemy
capabilities have evaded traditional methods and concepts. The impact
of the Vietnam war on concepts of resistance and rebellion all over the
world seems certain to be tremendous in coming years. The emergence of
new patterns of rebellion among youth and student groups and in
situations where the racial issue is important seems likely to give rise to
new forms of insurgency that will require a major effort on the part of
intelligence, first to comprehend what is going on in various
revolutionary situations and then to develop means of collecting useful
intelligence.
Another problem of military and defense-related intelligence that
seems likely to demand more attention is that of anticipating and
detecting methods of taking advantage of the complexities of advanced
societies to provoke breakdowns of essential services or otherwise bring
about chaotic situations. Interference with water supplies, the
development of transmission of power, communications-including
computer banks of records, personnel data, programs for use by the
national automatic data system in the event of specific emergency
situations, and the like-all provide kinds of opportunities for bringing a
society to a standstill that did not exist when individuals and
communities operated in a relatively independent fashion.
Scientific and technical not directly related to military intelligence is
probably also likely to have a relatively easy problem of adjustment in a
rapidly changing situation. S and T personnel and resources are already
focussed on the future and on areas likely to be of continuing intelligence
interest. It is intelligence with a focus on human beings and their
institutions that is likely to face the most difficult problems, both with
respect to determining what they should be collecting and how they
should go about making what they collect meaningful to the decision
makers.
In a world of unprecedentedly rapid change the essential mission of
intelligence will remain the same: to tell the policymaker what is going
on in the world and to warn him of specific threats to the safety and the
interests of the United States. Performance of this mission requires,
among other things, an agreed concept of the general pattern of
international relations and its implications for the welfare of the United
States. Even the most modest piece of intelligence collection depends
upon some kind of judgment as to what is of interest to the intelligence
Apprrove~d ForlAelease 2005/04/18 : CIA-RDP78TO3194A00030M10009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
CONFIDENTIAL The future
community, and ultimately to its customers. Many changes have been
made in the simplistic concept of the Cold War once so widely used to
determine what was relevant to the intelligence mission. One of the most
important tasks that faces us now is that of adjusting our overall
understanding of the world situation to take into account the effects of
the major engines of change: population, communications, technology in
general, and the breakdown of traditional social and political
institutions.
One of the most important and difficult tasks of the intelligence
analyst, as of the political analyst, has always been that of determining
the real goals and priorities of foreign nations. Whether the leaders of a
nation were willing to sacrifice domestic goals for military has in the past
been generally determinable by examination of indicators as to what
they were spending in each field. As lead times for the development and
deployment of weapons systems have stretched out, however, and as
government involvement in long-range domestic development has
increased, it has become both easier and more difficult to determine the
direction in which a given nation is going. On the one hand, the
intelligence officer can see what another nation is doing in certain areas
long before the activity in question produces an end result in its military
capability or in its wealth and stability. On the other, as commitments
become more complicated and longer-range, it will be increasingly
difficult to determine just what their eventual consequence will he.
As in the past, one of the main questions before the intelligence officer
will he that of the intentions of another country's leadership.
Determining what another country's intentions are has always depended
heavily upon understanding its governmental system as well as upon
understanding the men who control it. One of the big problems for the
intelligence officer over the next decade or two seems likely to he to
comprehend changes in other political systems. All the newly
independent countries in the period since World War II have gone
through complicated, and usually agonizing, searches for forms of
government suitable to their new situation. Intelligence officers like
everybody else, have had a hard time understanding what was going on,
politically, in Uganda, in Syria, and in Burma, for example. The problem
has usually been approached by watching the man or men who seemed to
wield authority, a method which would have been less satisfactory if
what was happening in most of these countries-not China or India, of
course-had been more important to the US.
Without making the estimate that it will be so, it seems worthwhile to
consider that over the next generation it may be the advanced nations
Appro'd For Release 2005/04/18 : CIA-RDP78T03196i09-3
AppAg ,FLpr Release 2005/04/18: CIA-RDP78T0%'~Y4 p 10009-3
and, in particular, the large and important nations that will be going
through changes which will make it most difficult for the intelligence
officer concerned with overall political analysis and estimates to
determine what is going on and, indeed, who is in charge.
All the advanced nations are faced with problems that are the
consequence of population growth and the advance of technology;
problems which manifest themselves in urban crises, the breakdown of
transportation and other services in the face of escalating demand, and
pollution of the environment. These problems tend to confront
governments with unprecedented requirements for investment of
resources. All produce and are, in turn, stimulated by dissatisfactions,
antagonisms, and demands that have, or develop, a strong political
content and lead to aggressive action, eventually in some cases to
rebellion, against the powers that be-the establishment.
All these factors have the effect of eroding the system-the social,
economic, and political. Another factor, not noted above, is the role of
technology, which is changing the lives of ordinary people at an
unprecedented rate, with the ultimate effect of making the rules and
inhibitions that once governed the conduct of most people seem less and
less relevant. Perhaps the most important contribution of
technology-including that of economic organization-has been to
remove from over the heads of many people the once controlling
certainty in their lives: the knowledge that their survival depended on
their willingness to work-usually to work according to the rules of the
system. Today, in every advanced country in the world, more and more
people-mostly youths-are indicating that if given a choice between a
job with its material rewards, but also with its obligations and
disciplines, and an uninhibited, undisciplined life supported by handouts
from society or parents, they will choose the latter-for a time, at least.
All governments in advanced nations face the problems of internal
crises plus the breakdown of traditional attitudes and institutions.
Democratic governments face still another kind of crisis which challenges
the basic assumptions on which their system depends. The most
advanced nations are already at a point at which it is extremely difficult
even to keep up the appearance of free public discussion of many of the
issues which face the policy-makers. This is particularly true where
highly sophisticated technology is involved, as in decisions with respect
to transportation systems, use of natural resources, and acceptance of
public responsibility for the welfare of the individual. The essence of the
point being made here is that many governments are likely in the next
several years to face problems which cannot be solved by the political
CONFIDENTIAL g3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18: CIA-RDP78T03194A00Q$00010009-3
CONFIDENTIAL e uture
methods of the past. Some will improvise for a long time; others may
carry out quiet revolutions among the elite which will change the nature
and the uses of power as much as democratic forms changed the
absolutisms which they succeeded.
One thing that makes the concentration of power in the hands of small
elite groups seem a likely development in some countries over the next
decade or two is the fact that the instruments by which such an elite
might exercise its control lie readily at hand.
As the machinery of life gets more and more complicated and
centralized, opportunities for central control are multiplied. It can be
argued that it is easier to control a closely knit urban community than a
dispersed rural society, though history records many despotisms holding
sway over peasant societies and failing to subdue the citizens of
urbanized societies. Quite clearly, the kind of government a people has
depends upon a great many factors, most of them rooted in the past.
Nevertheless, it seems worthwhile for the intelligence officer with an
interest in the future to ponder the implications for government of the
following:
(a) Centralized, interlinked, computerized banks containing all (repeat
all) information in the country's libraries, government records (including
intelligence, FBI, and police files), credit records, financial records, etc.
(b) A system whereby all funds, personal and corporate, are kept in a
central, or inter-linked system, of repositories. Personal income would be
paid into individual accounts by computer and drawn out by
presentation of a credit cum identity card, cum passport, or, more likely,
by pressing the thumb-with its unique print-against a sensitive plate.
A host of other science-fiction horrors could be postulated for the
computerized world of twenty years, or less, from now. (For one,
computer consoles could provide employment at home for a large part of
the working population-which would mean that no one would know
whether he was really working or simply being kept out of mischief....)
For our purposes the two developments sketched out above-
computerized records and computerized money-carry enough impli-
cations to make the point that government may soon have means of
control of the population quite unlike anything that has existed in the
past.
First, let us look at a few of the implications of computerized storage
and retrieval of information. Such a facility will, indeed, make it possible
for junior to do his homework without reference to books, his mother to
do her family budget with astonishing ease and accuracy (maybe), and
father to check the "facts" on almost anything. The question is, what
Approv1 For Release 2005/04/18 : CIA-RDP78T031945 ?M&M 9-3
Approved For Release 2005/04/18: CIA-RDP78T0~WAB(RQ10009-3
The Future
does it do for the people who control the selection, organization, and
content of the information banks, as well as access to it, once stored, In
the first place, everyone will have to have a security clearance rating his
level of access-in itself a means of exercising control over the individual
citizen. There is also the' matter of access to credit and business
information, a possible source of influence and profit.
Centralized personal records-scholastic, medical, credit policy,
,security, etc.-on each and every person also suggests possibilities for the
exercise of controls over individuals of a sort never before possible. If you
have to present your thumbprint every time you buy something-in order
to assure that the proper sum is deducted from your central account-you
will be querying the computer for a record of your personal file. What an
opportunity for a solicitous, or venal, or sadistic, or managing
government authority to tell the computer that certain individuals
mustn't have cigarettes, alcohol, certain drugs or books, or go to certain
places.
A proper reaction to all this is that it is farfetched-admittedly-and
that human beings would never put up with this sort of thing. Maybe. On
the other hand, we are talking about a new dimension of relations
between men and society, and between the individual and those in
charge. For the intelligence officer to understand and interpret what goes
on in other nations, hostile or friendly, he must be prepared to anticipate
the temptations that confront their governors and to spot the indicators if
they do decide to try something outlandish.
Not at all outlandish is the prospect that Communist dictatorships and
some of the authoritarian rulers in the less developed countries of Africa
and Asia, will try to exploit the new ways of controlling and
manipulating their people. It goes without saying that changes in the
governmental system in Communist nations will be a matter of
continuing concern to intelligence analysts. As in the past those countries
seem likely to lag behind the more advanced countries of Europe and
North America in their response to many of the major stimulants to
change in the contemporary world. It is difficult, however, to
contemplate the Communist states retaining their past degree of
immunity to the outside world, particularly to the world that one projects
on a surprise free trend over the next generation.
The intelligence analyst who is primarily concerned with the less
developed countries can probably look forward to as exciting and
demanding a time over the next several years as his colleagues who are
assigned to the advanced countries. Most of the new states have gone
through a post-independence period in which the veterans of the fight for
ApRgA T LIease 2005/04/18: CIA-RDP78T03194A000300M 0009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
CONFIDENTIAL The Future
independence, most of them still much under the cultural and political
influence of their former "imperialist" mentors, have tried and generally
failed to realize the promises they believed were implicit in the fact of
independence. Most have gone through a period of planned
`development- in which they used up reserves left over from the colonial
period, plus the generous foreign aid available from Fast and West
during the period of their most active competition. Many of these new
countries seem to be returning to the obscurity from whence they came.
Many have accepted a less important place on the world stage than they
thought their due when they became independent. There are reasons for
believing that the Afro-Asian and Latin American world will he less
important in world affairs and demand less of intelligence officers in the
next decade or so than it has since World War H.
The Great Powers may, of course, be less concerned in the years ahead
about instability and change in the Afro-Asian and Latin American
states than they have been. It seems highly unlikely, however, that they
can long consider it possible to remain indifferent to turmoil or human
suffering on a large scale in places like India, Egypt, or Brazil. Afro-Asia
and Latin America in general show no signs of greater stability over the
coming years than they have in the past. With the accumulation of
conventional weapons and the spread of sophisticated weapons, security
problems are likely to continue to be of major importance to the
intelligence officer concerned with these areas.
The development and application of technology seems likely to have a
great influence on the future of the less developed countries. In many of
them, technological backwardness has made local products-even when
made with local materials and cheap local labor-more expensive than
imported mass-produced products, dependence upon which not only
creates critical balance of payments problems but also unemployment
and the decline of local crafts and skills. In other ways technology and
the worldwide spread of investment and enterprise by the larger
companies in the more advanced countries links the economies of many
less advanced states to the world economy. Whatever the scenario, the
less developed states seem likely to he more a part of the world, its
problems and its changes, than they have in the past and to require
adjustments and new perceptions on the part of the intelligence analyst
who would explain it to the policy-maker.
The traditional bureaucratic response to the kinds of challenges noted
here would he to create an Office of Population Research, then, perhaps
an Office of Revolutionary Intelligence. With two such important new
offices in existence, the next step would naturally be a Directorate of
Appro4d For Release 2005/04/18: CIA-RDP78T0319 AMDQWJ 009-3
A r?ved For Release 2005/04/18 : CIA-RDP78TTA~jj4. A6WRQ010009-3
e uture
Long-Range Intelligence. Fortunately, we have generally been able to
resist such devices and the Agency has avoided much tinkering with the
division, direction, and organization of effort. The central importance of
the man with the yellow pad-his quality, his preparation and training,
his support-has been and should continue to be the main emphasis in
the Agency's approach to its job.
But is the average intelligence officer, in present circumstances, able to
do his day to day job and to prepare for the future as well? In many
areas, given the support he gets from administration and planners, he
probably is. This is particularly true of officers who are concerned with
keeping up with the technology which will enable them to do present jobs
faster and more efficient. It is also true of officers in Scientific and
Technical areas where the emphasis is naturally on development and
change. It is in the areas where intelligence is primarily concerned with
men, their motives, and the consequences of their actions that the outlook
seems less assured. If we can't solve these problems by setting up an
Office of Development Research, or the like, what should we do?
This article proposes no solution, only a suggestion, and it is, indeed,
the classic non-solution: a committee. The most important requirement
here, it is submitted, is a heightened consciousness on the part of Agency
officers of the impending problems for intelligence imposed by rapid,
world-wide change. More discussion, more thought, more analysis, more
attention to the problem of understanding the processes of change and
their implications for intelligence cannot but be desirable for an Agency
whose purpose in being is to tell the US Government not just what has
happened and is happening, but what is likely to happen. A seminar run
by the Office of Training, a Committee on the Future intended to
coordinate and direct debate and discussion, these and other activities
designed to concentrate our minds on what is surely going to be a bigger
and bigger problem for the Agency would certainly be worth a try.
Ap Povela or Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Next 12 Page(s) In Document Exempt
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
EDITORIAL NOTES
Holders of the Studies in Intelligence may wish to note that the Winter
edition, 1970, was omitted because of a shortage of contributions deemed
publishable at the time.
103
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TR R~ ( 010009-3
INTELLIGENCE IN RECENT PUBLIC
LITERATURE
THE SUPER SPIES. By Andrew Tully. (New York, 1969)
In case you are curious as to just who the Super Spies are, they are the
USIB agencies (including the three service intelligence organizations),
less CIA. The Super Spy masters, as listed on one of the book's prefatory
pages, are the chiefs of these agencies, less Mr. Helms. Four of the eight
names on the list have changed since the printer set this page; and two
more of the eight ought not to be represented as personally associated
with the limited foreign intelligence operations of their agencies. Mr.
Tully is thus only about 25 per cent correct within his own bizarre frame
of reference. This score is, however, well above expectation.
In the main text itself there are lots of little pieces of a good many
things; an alleged Damon-Pythias relationship between DIA and INR;
things about NSA; about how Congress ought to watch intelligence more
closely; about the Pueblo and. the SAMOS; about the peculations of
William Godell and the travels of Stokely Carmichael; about the
defections, some eight-plus years back, of Martin and Mitchell; plus
some spy fiction which we are supposed to accept as fact.
A great deal of all this is ill-informed or wrong. A good part of it
(except Mr. Tully's new fabrications) is a further mutilation of what had
already been bowdlerized in the public literature.
In short, this is another dismal Tully book about the intelligence
business. One perceives but a single improvement over an earlier work:'
this time, someone saw to the correct rendering of proper names.
Otherwise, it is the same lengthy display of Mr. Tully's innocence, nay,
towering ignorance, of intelligence and the world within which
intelligence has its being. For example, behind the cover of its
intelligence research mission, INR (the Bureau of Intelligence Research
of the Department of State) is supposed to run one of the best espionage
services there is (this outrageous allegation runs through the whole book);
the Soviet fractional orbit bombardment system utilizes full orbit
(although Mr. Tully knows what the "F" in FOBS stands for):
mechanical translation is doing its job at 35,000 words per hour. Mr.
'CIA, The Inside Story (N.Y., 1961).
Ap~ 9WPW lease 2005/04/18 : CIA-RDP78TO3194A000301& 10009-3
MORI/HRP PAGES 105-107
Approved For Release 2005/04/18 : CIA-RDP78T03194A000300010009-3
CONFIDENTIAL Recent Books: Miscellaneous
Tully has not heard of changes in the attache system made several years
back, nor does he know the role of the service intelligence chiefs in the
USI B; he thinks the headquarters of the Institute for Defense Analyses
are on the Princeton campus (which they are not); he thinks Camelot was
a (,-2 enterprise (it was sponsored by the Army's operations division); he
even thinks the US, which had no diplomatic relations with Cambodia at
the time, had an operating embassy (with a safe house) in Phnom Penh in
1967.
This sort of error which reveals the incompetence of the author more
than it may affront his audience is well within the Tully tradition. So is
the threadbare dodge of reading something in the public domain and
pretending that it was learned via a privileged interview. In the case of
the quotations from Allen Evans, they came from Mr. Evans all right, but
from an unclassified brochure he once wrote about intelligence in the
State Department. Likewise the seeming quotations from Thomas
Hughes are taken from the transcript of unclassified testimony that Mr.
Hughes presented to a Congressional committee. Where Mr. Tully got
the story about how INR was correct all along in its view that the Soviets
were engaged in putting long range missiles within Cuba is anybody's
guess. Elie Abel's remarkable hook about the missile crisis and Roger
Hilsman's both have the story straight. Yet Mr. Tully with a feigned
inside source puts Hilsman in conflict with John McCone on the matter.
It will not he forgotten, I hope, that Mr. McCone was the only USIB
member, indeed probably the only senior intelligence officer in the US,
who called Soviet intentions correctly in those tense weeks.
There are a number of other supposed live sources who are reputed to
have told Mr. Tully how secret Soviet intentions to move into
Czechoslovakia were penetrated, how espionage really laid bare the
secrets of recent events in Greece and the coming of the Tet offensive in
Vietnam. Whoever the source is in fact, if there ever was one, he would
not now recognize his story; the author modestly states that he has to
change names and scenes in the interests of security. In these instances
Mr. 'Gully's observance of the security of his country's secrets is
impeccable.
On NSA matters no one talked except the notorious defectors, Martin
and Mitchell, and their talk to the Soviets was printed in The New York
Times in 1961. What Tully did not get from this sort of source he seems to
have borrowed-almost verbatim and without attribution-from David
Kahn's hook, The Codebreakers.
Throughout the book Tully studiedly omits CIA except to dart
waspishly at it now and then. This should not upset any devotee of the
Appro For Release 2005/04/18: CIA-RDP78T03194 1MO 0,Q09-3
Approved For Release 2005/04/18: CIA-RDP78T86VFJt? 9`Q010009-3
Recent Books: Miscellaneous
Agency which, after all, once basked solo in the full majesty of Mr.
Tully's ineptitude. But serious outside critics may wonder why a book
bearing this title is so reticent about the one agency of government
popularly supposed to have a considerable capability in the spy business.
A reason that is sure to leap to the mind of such a critical reader will
derive from his realization that no CIA officer is cited as the source of any
of Mr. Tully's allegations. Since CIA was obviously cool in its relations
with him, he is endeavoring in his own inimitable way to square the
account. With respect to this sort of tit for tat I perceive few moist eyes in
the house.
THE GAME OF NATIONS, THE AMORALITY OF POWER
POLITICS. By Miles Copeland. (Weidenfeld and Nicol-
son, London, 1969)
Miles Copeland's book on the life and philosophy of a "crypto-
diplomat," consultant to the mighty, and player in the "game of
nations" quickly sold out its first printing in England and has prompted
varied reactions.
The Arab press and radio and the "anti-imperialist" press and radio
elsewhere have noted it, more or less hysterically, as another evidence of
the deviousness of American methods and purposes.
C. L. Sulzberger, in the New York Times of 10 August 1969, wrote that
the degree of involvement" of the US in the Middle East plots and
counterplots and the "specific details" are "now for the first time
exposed."
The reviewer for The Economist (6-12 September 1969) observed that
books like this must be "looked at warily," because "one has to wonder if
there is, embedded in this elegant compound of reminiscence and
didacticism, somewhere something that some higher personage than Mr.
Copeland actually wants exposed to the light of day."
Indeed, there are things of which to be wary and things which cause
one to wonder, even if one has some knowledge of the events described
and long acquaintance with their narrator and interpreter. This review is
not intended to set the record straight, a much too lengthy and
complicated task, if not an impossible one. It is offered simply as an
account and an evaluation of this book from the perspective of an
intelligence professional.
A dR TIlk~lease 2005/04/18: CIA-RDP78TO3194A000368 10009-3
MORI/HRP PAGES 107-112
Approve F i-l el . y 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Recent Books: Miscellaneous
The reviewer must begin by stating that he thinks the book violates the
confidences of a great many people who did not and do not look on
politics or intelligence as a "game" and did not consider that they were
playing games with Miles Copeland. The reviewer is aware that his harsh
judgments on the book, which pari passu reflect inevitably on the
character of the author of so personal a document, may, by some, be
interpreted as a violation of confidence on his part. He can only say that
Copeland, by writing the book, put it and himself up for public
discussion, and certainly ought to have known that it would arouse
interest and comment by former colleagues.
The Game of Nations is a readable, though often confused, and
ultimately incomprehensible book. It reflects Miles Copeland's fabled
charm and nimbleness of mind. It is also replete with his special brand of
jargon which has so often beguiled and disarmed both colleagues and
antagonists. Despite the many curious turns of language and thought,
the book gives a memorable picture of the world of Miles Copeland.
't'here has seldom been so revealing a title: The Game of Nations, The
Amorality of Power Politics. The author means every word of it. His basic
proposition is that international politics is a game in which morality and
principle are stupidities and which only the devious and unprincipled
can win.
Ile explains his own role in the game by quoting Edmund Wilson to
the effect that F. Scott Fitzgerald was once inspired by Emily Post's
Etiquette "to write a play wherein the dramatic conflict would arise from
stalemates between Gentle People all trying to do the Right Thing. The
conflict would only he resolved by the intervention of a cad who would
bound on to the scene and set things right by behavior such as is totally
outlawed by Mrs. Post." (p. 11). Miles is the cad, and proud of it-or at
least so he insists almost but not quite to the last.
The villains of the piece are the "goo-goos," i.e., those "who believe
that, even in a country like Syria, Good Government is not only desirable
but possible." (p. 43) There are also harsh words for those who follow the
"High Road of Statesmanship and Diplomacy," which Copeland informs
us was known in the Pentagon and CIA as "HORSESHIP." (p. 126)
Toward the end of the book Copeland expresses a growing
disillusionment with those who make and influence US policy overseas.
He refers to a distressing "distaste for violence" which became evident in
the US business community and Government about the time of the
Lebanese crisis of 1958 (p. 198) and says that the ability of the US to play
the game was curtailed by the fact that "high morality" became the "in
thing" in the State Department in the early sixties. (p. 222).
ApproJeu For Release 2005/04/18 : CIA-RDP78T03194Aq ?ba1T1ob9-3
A provedooFor Release 2005/04/18 : CIA-RDP78T( pp9Qp10009-3
ecenf s: Mean aneous
Throughout the book Copeland harps on the subject of amorality,
which he advocates, and morality, which he regards as foolishness.
Moralists in the State Department and elsewhere, he explains, are always
thwarting the efforts of the hard-headed realists in international politics.
However, he says in one of the most revealing passages of the book, we
Americans can "sleep more easily at night from knowing that behind this
front (of high morality) we are in fact capable of matching the Soviets
perfidy for perfidy." We "do indeed believe in honesty," says Copeland,
"although not so much as a great moral principle as because, as
Benjamin Franklin said, it `is the best policy'." (p. 13).
It is presumably to help Americans sleep more soundly that this book
has been written, though this reviewer is uncertain whether the overall
effect will be more sleep for Americans and their friends and less sleep for
their enemies, or the other way around. Any reader who approaches this
book cold is going to have a difficult time figuring out who the author is
and how to evaluate what he says. His principal problem will be to
decide whether the book itself is not a ploy in some game, the limits and
rules of which are unknown to him.
It is worth noting briefly here how the author does represent himself.
He says he "helped set up CIA." Later he was a "crypto-diplomat" in the
US mission in Syria involved in activities which included bringing about
a change of government. Except for these acknowledgements of an
intelligence connection, an effort is made throughout the book to
establish the author's identity as a private citizen with "companies" and
business interests around the world. This private citizen is, however, said
to have been in constant demand to play war games in Washington, and
to serve on task forces and special committees set up by Dean Acheson,
John Foster Dulles, and others of their eminence. A number of
diplomats-Jefferson Caffrey,' for example-are said to have called on
him for advice and service from time to time. No mention is made of
employment by CIA, and Allen Dulles is referred to only once; care is
taken in the mention of names of active intelligence officers; and it is
suggested that the CIA men the author worked with were on detached
duty. The CIA and CIA attitudes, policies, etc., are, however, referred to
with an insider's seeming familiarity, on almost every page.
What does all this add up to? The uninformed reader can assume that
the author was a CIA officer who thinks his cover story will hold water, or
that-as most of the Arab commentators and the reviewer in The
'The book, incidentally, is dedicated to Caffrey, Hare, and Wadsworth, three
"ambassadors of the old school" whom Copeland apparently believes were gamesmen, not
moralists, a judgment which these gentlemen might not have considered complimentary.
Ap~OeMPFW lease 2005/04/18: CIA-RDP78TO3194A00030DU10009-3
Approv qAg 2005/04/18 :CIA-RDPe8en9 oo~cAs 0, 03000010009-3 neous
Lconornist appear to think-he is a CIA officer whose superiors have
some devious purpose in allowing the book to see the light of day. Some
uninformed readers have also demonstrated that it is possible to read this
book and conclude that Copeland has explained his role exactly as it was,
difficult though that seems to this reviewer. The explanation that
Copeland wrote this hook without official approval or collaboration
seems unlikely to occur to many readers.
It is hard to say what the message of this hook will be for most
uninitiated but believing readers. One of the strongest impressions will
probably be of a US Government straight out of science fiction and some
of the wilder mail order courses on management. One gets an impression
of foreign policy being made and implemented the way P & G makes and
sells soap. One sees the Secretary of State and the President waiting with
bated breath to find out what the oldest continuing floating war game in
Washington has made of some new hit of intelligence before they order
that formula so-and-so be fed into the computers, which will then tell
them what to do.
'T'here is a considerable amount of circumstantial detail cited to
support this picture of the government. The first chapter begins with a
colorful account of a Games Center in operation in Washington which
fed its results directly into the policy-making process. There is also an
account of a team set up to fight the Cold War which developed
intelligence assets, decided that since it had them they ought to be used,
and then, by a process of elimination, decided on Syria as the best
available practice ground. (pp. 35-36). The same formula is repeated in
account of a highly secret committee of specialists set up in 1951 by Dean
Acheson to study the Arab world, which "when we thought ourselves
ready for a major operation," decided that "Egypt was the place to
start." (pp. 48-49).
Another strong impression on the reader is certain to he made by
Copeland's solemn lucubrations on his political philosophy and his
system for successful gamesmanships in a very restricted area of
international politics. At the end of the first chapter he says he wants to
"dispel any remaining notion that this is a book about Nasser. Rather it
is a case history-hopefully teaching lessons of general applicability-of
relations between the United States and a `non-Western' leader of a
particular kind which is likely to become increasingly prominent in
international relations of the future. Although I have devoted much
space to Nasser, I have tried to concentrate on aspects of his behavior
which might he expected of any Afro-Asian leader, to the extent that he is
the Nasser type...... (pp. 26-27).
Approved For Release 2005/04/18: CIA-RDP78T03194J V8Ib*9-3
Appecoen dBFg[CSR#i1qpffa;ggRJ04/18 : CIA-RDP78T0t'J 10009-3
It is just possible that if a reader discovered another non-Western
leader who was enough of the Nasser type to suit Copeland's definition
he might find something in the book that would further application, but
only just.
Urgent insistence is made throughout the book that the reader is being
given the most succinct and practical instructions for playing the game of
nations. Rules of the game appear at the chapter heads. For example:
"The first prerequisite for winning the game is to know that you're in on
it; if you can't change the board, change the players ... but settle for a
true player, not a pawn; the strategy of the weak player is to play off the
strong players against one another ...," and so on. When Chairman Mao
produced these sayings, or whether it was Chairman Mao or another, is
not made clear, but the message to the reader is obviously intended to be
that this is choice stuff and, more impressive, that this kind of stuff is
taken seriously at high levels in Washington.
It is possible that a few readers will react as John Crosby did in his
column in the London Observer (21 December 1969). His comment was:
"I have always felt strongly that you can't beat a man at tennis by tying
your shoelaces at crucial points.... I can't escape the conviction that if
you play war ... you are going to lose." They may, however, make this
judgment on the validity of Copeland's approach to international
politics and still, as Crosby apparently does, accept his picture of the way
things are done in the US Government as an accurate one.
Miles Copeland's book will make a lot of serious and devoted US
Government servants wince, particularly those who are already nervous
about this kind of thing making headway in Washington. It will frighten
a lot of outsiders, friends of the US and of the US Government, who have
on occasion suspected that things inside the Government might be as
weird as Copeland says they are.
On the other hand there may be some little consolation in the
knowledge that Copeland's book is going to confuse the dickens out of
the real enemies of the US. They will make some obvious propaganda use
of it, but surely most of them will hold back, fearing that they are being
put on, that some ingenious trap has been laid for them.
What must the professional intelligence officer's judgement on this
book be? He cannot ignore the fact that the book is not an entirely
fanciful description of Miles Copeland's world. One of the most inter-
esting things about the book is Miles' acknowledgement of disillusion
with the whole business of the intelligence game as he has played it.
One is reminded of something he says Nasser said to him: "The genius
of you Americans is that you never make clear-cut stupid moves, only
ApproveFdI ForT1Wease 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
CONFIDENTIAL Recent Books: Miscellaneous
complicated stupid moves...." (p. 138) In the reviewer's opinion he was
saying this to the right man. Not that Copeland isn't a man with a great
natural talent for dealing with people, but, as The Game of Nations
shows, he has tried to rationalize and solemnize his role and his formulae
for international politics to the point that they became exactly as Nasser
said, a complicated nonsense. Miles Copeland has dealt a mortal blow to
the theory that gamesmanship is the key to success in international
politics. And a good thing, too. For his own sake, and for the sake of those
of his former associates who are still active intelligence officers, however,
it would have been better if he had not written this book.
I)IF KOMMUNISTISCHEN PARTEIEN DER WELT. (The Communist
Parties of the World.) Edited by C. D. Kernig. (Herder, Freiburg-
Basel-Vienna, 1969. 583 pp.)
The old and respected Herder publishing house, whose reputation
derives in part from its encyclopedias, is in the process of putting out an
ambitious, five volume comparative encyclopedia entitled Soviet System
and Democratic Society, two volumes of which have already appeared.
The present hook was prepared as part of that project, but has been
issued to stand by itself. The publisher's consultants and editorial board
listings contain a number of established authorities, e.g., Z. K.
Brzezinski, M. Fainsod, A. Inkeles, A. Brumberg. This hook is in two
parts: general and specific. The general part treats the world movement
as a whole, including the Comintern, Cominform, and international
fronts. The specific part contains individual articles on each of the world
CPs, including the CPSU; because of special situations, some areas are
treated regionally rather than by country. Each article has been written
by an authority with an established reputation. Not necessarily for the
true specialist, this is nevertheless a useful and well done reference work
for the generalist.
LA I)EUXIEMEMORTDE RAMON MERCADER. (The Second Death
of Ramon Mercader.) By Jorge Semprun. (Gallimard Paris, 1969.
432 pp.)
This novel, which was awarded the 1969 Prix Femina, should be of
some interest to intelligence officers for two reasons: its author, and its
ApproadG7 For Release 2005/04/18: CIA-RDP78TO319470000OWN09-3
MORI/HRP PAGES 112-113
p~3
Approved For Relea a 2005/04/18: CIA-RDP78T02a, PRMRQ10009-
pRecent Books: Miscellaneous
plot. Jorge Semprun, until 1965, was a leading official of the Spanish
Communist Party, under the nom de guerre Federico Sanchez; he was
expelled from the Party in that year after a bitter dispute with Party
leader Santiago Carrillo over policy. He did the film scenario for the
controversial motion picture about Greece, "Z," and is presently at work
on the scenario for a film to be made of Arthur London's book, "L'Aveu"
(The Confession), the story of his arrest, trial, and imprisonment in the
context of the Slansky purge in Czechoslovakia. "The Second Death" is
the story of a Soviet KGB "illegal" who is placed in Spain under the
identity of a Spanish"Nion" who died in the Soviet Union, whose career
is haunted from the outset by his notorious namesake, the killer of
Trotsky. He is pursued around Western Europe by CIA officers, one of
whom in turn is being pursued by the East German State Security
Service, who in turn are pursued by the Dutch police-all in all, one
could probably call it an espionage western. Some idea of Semprun's
style can be had from his prefatory note at the beginning of the book:
"The events with which this tale is concerned are completely imaginary.
Even more than that: any coincidence with reality would be not only
fortuitous, but downright scandalous." Worth reading, if you have good
French.
THE SECRET ROAD TO WORLD WAR TWO: SOVIET VERSUS
WESTERN INTELLIGENCE, 1921-1939. By Paul W. Blackstock.
(Chicago: Quadrangle Books, 1969. 384 pp.)
This book has grave defects. For the most part they result from two of
the author's characteristics. The first of these is that he is insufficiently
grounded in intelligence, or insufficiently critical, to make
discriminating judgments about his sources. The second is that he
artificially equates the USSR and the democratic West in comparing
their governments and their intelligence services.
The Secret Road to World War Two is really an amalgam of what
might better have been two books, one dealing with clever and sinister
deception and penetration operations conducted by Soviet intelligence
against anti-Soviet Russian emigres abroad, the other with the inept
policies and miscalculations of the great powers, the blunders that led to
the tragedy of the Second World War. The contrived joining of these two
subjects contribute neither to lucidity nor to unity. This reader was left
with the impression that Blackstock tried to make these dramatic spy
stories more impressive through his references to the political and
Ap~~ i lease 2005/04/18: CIA-RDP78T03194A0003dd0110009-3
MORI/HRP PAGES
113-126
Approv 2005/04/18 : CIA-RDP78T03194A000300010009-3
WI DEN "R F Recent Books: Miscellaneous
historical dynamics of the time. His views as an historian are those of
Robert "fucker, of John Erickson, and in part George F. Kennan.
Roth the title and the sub-title are misleading. The word road implies
that the contest between the secret services of East and West led to war;
yet the author fails to produce any evidence supporting this view. As for
the sub-title, "Moscow's Allegations about Soviet versus Western
Intelligence" would have been more accurate. And the title itself might
more appropriately have suggested Soviet ingenuity in such operational
specialities as disinformation, provocation, and liquidation. The real
struggle, moreover, was not a contest of equals, a hidden conflict between
intelligence antagonists, but a ruthless campaign by the Soviet services to
destroy the Russian emigre groups abroad, viewed by the Stalinists as
a nuisance and potential threat, as well as the internal enemies, real
and imaginary, of the Communist regime.
The work is divided into four major sections, each of which includes a
string of episodes attributed by the author to a Soviet-Western war of
wits between their services of intelligence and counterintelligence during
the 1920's and 1930's. In each of the four parts Blackstock tries to holster
his thesis by data drawn from other Western writers and from official
Soviet interpretations, with only an occasional note of skepticism about
the latter. (This approach to the subject reminded this reader of the
grossly disinformational book by Sayers and Kahn, The Great Conspir-
acy, Little Brown and Co., Boston, 1946, in which the putative authors
chose from a mass of Western documentation those accounts best suited
to support and "prove" the Soviet version and justification of their
Operations.)
Blackstock has carried out extensive research, in the course of which he
examined all the materials available in libraries of several countries and
in the archives of anti-Soviet organizations that plotted indefatigably but
ineptly the overthrow of the Bolshevik regime. He personally interviewed
sonic of the last surviving emigres who participated in the confused,
tumultuous events of the era, and he discovered hidden papers and
diaries left behind by participants long since dead. But digging up facts
is less important than understanding them and interpreting them
correctly. Here Blackstock falls short. He does not know enough of the
history of revolutionary Russia or of the realities of power in the USSR.
I Ie does not understand Russian psychology. He accepts uncritically both
authorized Soviet versions of events and the opinions of emigres who
were completely disoriented by the crushing defeats inflicted on them.
ApproJJ6 For Release 2005/04/18: CIA-RDP78T03194~k'&ROMT6669-3
Appcent1oop1 RJ?ff@n?g9P/04/18 : CIA-RDP78TQ j 4. 010009-3
The book also contains occasional distortions and half-truths that seem
to have originated with the author, not his sources. For instance,
Blackstock alleges that most of the roughly one million Russian refugees
and emigres bowed to the reality of the Bolshevik regime and began in
their adopted lands the process of assimilation. A minority even joined
the Communist Party. He finds that 75 per cent of the Party's member-
ship in Chicago, for example, was of Russian origin, and creates an
impression that these members were refugees from Bolshevism, whereas
in fact they were predominantly pre-1917 Jewish immigrants from
Russia, people who had never lived under Communist power.
Other less obvious inaccuracies result from the author's tendency to
generalize and oversimplify. He says, for example, that after 1925 the
"European world" (meaning the West) was polarized spiritually and
politically into a Communist, anti-fascist left and a pro-fascist right that
was ready to appease Hitler at almost any price in the hope that he could
be turned against the Soviet state (p. 195). He argues that the free-
floating political violence of right-wing and left-wing European mobs
was matched in the United States by the cold-blooded violence of
organized crime under gangster overlords (p. 196). He asserts that bloody
purges in the Soviet Union in 1937 were paralleled by the epidemic of
denunciations in the United States during the McCarthy period (p. 225).
This kind of recurring generalization awakens an impression that the
writer wants to disarm any reader who may be skeptical of Soviet
explanations of their secret operations and their excesses. After all, he
argues, America had its corresponding hysteria. And the British
reactionaries, responsible for the Arcos raid and the break in diplomatic
relations, precipitated the war scare in the Soviet Union. The threat of
war-whether in fact it was real or merely invented by the Kremlin for
purposes of propaganda-was the basis for an abrupt increase in OGPU
arrests of Western intelligence agents inside the USSR in the summer of
1927, as shown in Blackstock's table (p. 166). Of 192 spies arrested in that
year, 167 were seized in May and June. Soviet propaganda denounced
almost all of them as agents controlled by the British SIS (p. 166).
Blackstock's conclusion is that the traumatic events of that year made the
Soviets realize the urgency of doing battle with the Western intelligence
services.
The author's failure to distinguish among the various Soviet services
pitted against the West is a defect that is not uncommon among
nonprofessional writers on the subject. David Dallin's Soviet Espionage
(Yale University Press, 1955) talks almost exclusively about the GB
CONFIQFNTIAL 115
Approved For elease 2005/04/18 : CIA-RDP78TO3194A000300010009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
CONFIDENTIAL Recent Books: Miscellaneous
(Gossudarstvennaia Bezopasnost, or State Security), for example,
whether in fact he meant the Cheka and its many successors, together
with their branches and subdivisions, or the GRU and its military and
positive intelligence subgroups and affiliates. Such lack of precision
about the identities and structural positions of the Soviet agencies is
disconcerting to a reader interested in counterintelligence. Blackstock
either has nothing to tell such readers or he confuses the issues.
Much of Blackstock's account concerns aggressive Soviet operations
against counterrevolutionary groups of emigres abroad as well as real
and imaginary traitors at home. Such activities were predominantly, if
not exclusively, the responsibility of the Cheka, OGPU, and NKVD. But
Blackstock does not clarify or even suggest the role that the GRU or any
other military intelligence element played in the contest or in the
cooperation with the German military and the rapprochement with
Hitler that Stalin avidly sought. Thus it is far from clear who the
principals were and what units were engaged in the numerous
operations. When the Trust operation collapsed in 1927, the OGPU
foreign section speedily rebuilt networks of agents in all the capitals of
Kurope (p. 195). Walter Krivitsky, according to Blackstock, was among
the OGPU professionals who directed the work. Yet it is known from
Krivitsky's own depositions as well as other accounts that he was a GRU
officer and had no dealings with OGPU until 1935. In one passage
Blackstock expresses annoyance with writers who lump together the
various Nazi intelligence services, labelling all of them as Gestapo. Here
he commits the same offense.
The author quotes the dictum of Boris Nikolaevsky, by now almost a
cliche, that to understand the real motives behind foreign policy one
must study the battle of the secret services, a war waged constantly
beneath the surface of history. In the prewar era of Stalin, however, the
activities of the OGPU and the NKVD, at home and abroad, reflected
Soviet domestic concerns rather than foreign policy, i.e., they were de-
signed to support the conspiracy at the top that guaranteed the abso-
lutism of Stalin's rule. Blackstock's entire book, despite its inaccurate
title, is proof of the point.
The first of the four sections of the hook takes up one hundred pages. It
is the story of the Trust; the monumental exercise in deception and
provocation contrived by the chiefs of OGPU counterintelligence and
directed against the emigration abroad from 1922 to 1927. The legend
contrived by the Soviet specialists was the story of a secret monarchist
organization which, they claimed, had come into being in Petrograd by
Approved For Release 2005/04/18: CIA-RDP78T03194IXIOE 1D91IYOD9-3
Approved For Release 2005/04/18: CIA-RDP78T02~"A8~WR410009-3
Recent Books: Miscellaneous
1921. This network had supposedly succeeded in banding together the
patriotic elements of the old capital into units determined to liberate
Mother Russia from Bolshevism. The OGPU ensured that the electrifying
news reached the ears of the leaders of the White Russian emigration,
which consisted of monarchists, former high officials of the Tsar,
expropriated industrialists, and tens of thousands of exasperated tsarist
officers. Most of these people lived in poverty and longed for the day
when they, together with the armies of the great powers, would march
into Russia, overthrow the regime and resume their rightful posts in a
liberated homeland.
Alexander Yakushev had been a high official of the Tsar's Civil
Service. An unprincipled and promiscuous man, he agreed to play the
OGPU's game. He went to Germany and reported to the High
Monarchist Council in Berlin about the development of the conspiracy by
the Monarchist Organization of Central Russia, MOCK. He was well
received by the leading emigres and by the Grand Duke Nikolai
Nikolayevich, the pretender to the Russian throne. Later two more
"conspirators" were sent abroad with the same tale. Both were well-
known tsarist generals who had thrown in their lot with the red regime.
Through Russian emigre channels, the Polish, French, and English
services soon began to receive disinformation, fabricated by the OGPU.
With the "help" of the Trust, the anti-Soviet organizations abroad
began to send spies and terrorists into the USSR. Some were executed,
but others were allowed to survive and leave the country for the purpose
of maintaining the confidence of the emigres and the Western services
in the MOCK.
Blackstock is right when he says that the Trust was one of the OGPU's
most successful foreign ventures, although he is by no means the first to
recognize this fact. He disagrees with Richard Wraga and others who
have maintained, correctly, that the MOCR was an OGPU hoax from the
outset. Blackstock supports instead the official Soviet version, which
maintains that the OGPU penetrated the MOCR, the Trust, after its
establishment, and that the OGPU recruited key monarchists abroad,
such as Yakushev and General Zayonchkovskiy. Blackstock admits that
the official Soviet chronicler, Lev Nikulin (Mertvaia Zyb, Moscow, 1965,
The Deadly Swell, usually translated in English as The Swell of the Sea)
had to make radical revisions in each of his three consecutive editions,
but he follows the Nikulin line nevertheless. The result is that the smell of
provocation and deception is obliterated by the less acrid odor of
penetration.
Ap$ &Nti1P lease 2005/04/18: CIA-RDP78T03194A0003dd910009-3
Approved For Release 2005/04/18 : CIA-RDP78TO3194A000300010009-3
CONFIDENTIAL Recent Books: Miscellaneous
The ideology of the Soviet-controlled Trust operatives was tailored to
please Western tastes. They were anti-interventionists. They propagated
the deception that the Bolshevik regime was becoming more and more
like the capitalistic West and added that it would soon collapse anyway.
They opposed terror as an unproductive tactic potentially harmful to the
Trust, which needed only moral and financial support to remain a steady
and good source of intelligence, i.e., disinformation.
hlackstock's account tells us of the famous revolutionary Boris
Savinkov, who before the revolution had organized the assassination of
the Grand Duke Sergei, the uncle of the Tsar, and of Minister of the
Interior Plehve, and who later, fighting against the Bolshevik revolution,
seized three cities on the Volga in 1918. Savinkov was duped by the Trust
and was persuaded in 1924 to cross into Russia illegally in the
expectation of leading the secret army, which had never existed, against
the Kremlin. Despite his entrapment and death, his co-conspirator, the
British intelligence officer Sidney Reilly, who had been under a death
sentence in the Soviet Union since 1918, let himself be lured in 1925 to
Moscow, where he was executed.
Blackstock recognizes that neither Savinkov nor Reilly represented a
serious threat to Soviet security and that their liquidation first cast doubt
upon the Trust. The author expresses the opinion that the OGPU became
overconfident because of its initial successes. "They thought they could
deceive the Western intelligence agencies indefinitely." He appears
unaware, however, of the study put out by the Soviets in 1967.'
The author maintains that in 1927 the combined Western intelligence
agencies conducted a major offensive against the USSR. To support this
unconvincing assertion, he quotes largely from the Moscow press and
reproduces its statistics on the arrests of Western spies. He provides
practically no details about the alleged offensive except for the story of
what he describes as "vest-pocket terrorist raids" conducted by the
Combat Corps of General Kutyepov. The general was supposedly
suspicious of the Trust from the very beginning. In 1927, acting without
the Trust's knowledge, he sponsored a few (and for the most part
unsuccessful) teams that entered Russia for purposes of espionage and
terrorism. By then, however, the Trust had collapsed, mainly because of
the apparent defection of one of the principal OGPU agents,
"Opperput," whose real name was Edward Ottovich Staunits.
'Vasiliv Ardamatskv, Vozrnezdiye (Retribution), Neva Nos. 8-11 (August-November
1967). This material emerged later as a book. Extensive, accurate, and in many instances
hitherto unpublished OGPU documentation is appended to each chapter.
Approvlelc8 For Release 2005/04/18: CIA-RDP78T03194rQO?QQ,(1