STUDIES IN INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000400010012-8
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
48
Document Creation Date:
December 19, 2016
Document Release Date:
June 2, 2005
Sequence Number:
12
Case Number:
Publication Date:
January 1, 1975
Content Type:
IS
File:
Attachment | Size |
---|---|
![]() | 2.63 MB |
Body:
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
SECRET
25X1
cTUDIES
IN
INTEL-LIG
ENCE
VOL. 19 No. 2 SUMMER 1975
CENTRAL INTELLIGENCE AGENCY
25X1
ARCHfTAL . ?CORD,
PLEASE RE" RN TO
25X1 AGENCY ARCHI`' _: ,
Ap roved For Rele~
SECRET
4A00040W100123 6 8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET
1 -1
SECURITY PRECAUTIONS
Materials in the Studies are in general to be reserved to US per-
sonnel holding appropriate clearances. The existence of this journal is
to be treated as information privy to the US official community. All
copies of each issue beginning Summer 1964 are numbered serially and
subject to recall.
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
WARNING NOTICE
Sensitive Intelligence Sources and Methods Involved
NATIONAL SECURITY INFORMATION
Unauthorized Disclosure Subject to Criminal Sanctions
SECRET
Approved For Release - 94A000400010012-8
25X1
25X1
25X1
25X1
Approved For Releasi 265142 : IA-RDP78T03194A000400010012-8
19 January 1976
TO All holders of Vol. 19, No. 2, STUDIES IN INTEL-
LIGENCE, Summer 1975
The review of Philip Agee's book, Inside the Com an :
CIA Diary, which appears on pp. 35-38 of titsfie erence
pu lication, should be classified SECRET, rather than un-
classified. 25X1A
Editor, STUDIES IN INTELLIGENCE
5 G 22 H 25X1
Approved For Release 2RO IOY22 :,.pIA-RDP78T03194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may be
written on any theoretical, doctrinal, operational, or
historical aspect of intelligence.
The final responsibility for accepting or rejecting an
article rests with the Editorial Board.
The criterion for publication is whether or not, in the
opinion of the Board, the article makes a contribution
to the literature of intelligence.
DAVID S. BRANDWEIN LAWRENCE R. HOUSTON
GEORGE A. CARVER, JR. RICHARD LEHMAN
MAURICE C. ERNST WALTER L. PFORZHEIMER
SAYRE STEVENS
Additional members of the Board are
drawn from other CIA components.
SECRET
Approved For R - 03194A000400010012-8
25X1
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET
CONTRIBUTIONS
Contributions to the Studies or communications to the editors may come from
any member of the intelligence community or, upon invitation, from persons
outside. Manuscripts should be submitted directly to the Editor, Studies in
Intelligence, Room 5G22, Hq. 0, and need not be coordinated or sub-
mitted through channels. They should be typed in duplicate, double-spaced,
the original on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Articles may be classified
through Secret. Supplements, separately distributed, can accommodate articles
of higher classifications.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office dissemina-
tion center or the responsible Office of Training desk For back issues
and on other questions, call the Office of the Editor,
THE STUDIES IN INTELLIGENCE AND
SHERMAN KENT AWARDS.
An annual award of $500 is offered for the most significant contribution to the
literature of intelligence submitted for publication in the Studies. The prize may
be divided if the two or more best articles submitted are judged to be of equal
merit, or it may be withheld if no article is deemed sufficiently outstanding.
An additional $500 is available for other prizes.
Except as may be otherwise announced from year to year, articles on any
subject within the range of the Studies' purview, as defined in its masthead, will
be considered for the awards. They will be judged primarily on substantive origi-
nality and soundness, secondarily on literary qualities. Members of the Studies
editorial board and staff are of course excluded from the competition.
The editorial board will welcome readers' nominations for awards but reserves
to itself exclusive competence in the decision.
SECRET
ii
Approved For Release 200 - 010012-8
25X1
25X1
25X1
25X1
25X1
Approved For Release 2001/EQCWP : CIA-RDP78TO3194A000400010012-8
CONTENTS
Page
Secrecy and Intelligence in a Free Society ................ James E. Knott 1
The dilemma of security v. openness. UNCLASSIFIED
The Case for a Holistic Intelligence .................... Lloyd F. Jordan 9
On bringing all of the analytical disciplines to bear. CONFIDENTIAL
More on the Military Estimates ............................ Ross Cowey 21
How accurate were they? SECRET NOFORN
Another View of S&T Analysis ............ . .......... Donald C. Brown 25
Basic tenets of scientific and technical intelligence. SECRET
The LAMS Story .................................... Martin C. Elkes 29
Research, development, and deployment of a navigation system. SECRET
Intelligence in Recent Public Literature ................................. 35
SECRET
Approved For Release 2 . A-RDP78TO3194A000400010012-8
MORI/HRP THIS PAGE
25X1 Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
UNCLASSIFIED
The following article is the summary of a detailed study prepared for the Center for the Study
of Intelligence of the Office of Training on the recurrent topic of the intelligence dilemmas arising
from security requirements within the framework of a free society. We hope this statement of the
problem will stimulate further thoughts on the subject.
SECRECY AND INTELLIGENCE IN A FREE SOCIETY
James E. Knott
In discussing what I believe to be the major areas of concern that our free society
has evinced regarding secrecy and intelligence, I hope to make it clear that I feel there
are no final answers. They are not problems that can be solved; they are focal points
that will demand continuing attention in pursuit of a balance which must be worked
out between the opposing factors.
The central problem which demands attention does not stem from the question
whether secrecy, intelligence, or even clandestine operations are compatible with a
free society. The central problem is the structure through which that free society
oversees its processes of secrecy determination, intelligence production, and the
conduct of clandestine operations.
This may appear to be a mechanistic conclusion, but I make it because I am
convinced that our free society is in basic agreement as to the kinds of things on which
secrecy is justified. I am also convinced that-if the society knew more about the
subject-there would be a consensus on the criteria which should be applied to
deciding whether or not a foreign clandestine operation was an appropriate activity
for a free society. And, in complement to such agreement, there is the fact that the
virtue and blessing of a free society is that there is a constant and continuing process
which defines and refines the values the society expects to be applied by its
institutions. These values themselves do not change radically-but neither are they
absolute. They adjust to the efforts the society is called upon to undertake, and they
adjust in particular in accordance with the threats the society feels it faces. In other
words, the free society will relinquish some of its freedom if that is necessary, but it
will wish to see readjustment take place once such relinquishment is no longer
necessary.
The inherent feature of secrecy is the limitation of access to the secrets. The free
society as a whole cannot make the judgment as to whether or not individual matters
are legitimately kept secret. It must place its trust in an oversight body or bodies to
act in its behalf. The smaller the number of people it decides it needs to establish such
a condition of trust, the better it will be for the secrecy system.
The free society must have confidence that its oversight mechanisms have
adequate access to secret material to make judgments, and that this judgmental
process is being exercised independently. There has to be trust that secrecy is not
being used against the best interests of the free society; that the activities which are
being protected by secrecy are being conducted effectively; and that necessary
UNCI7I8 l For Release 2005/06/22: CIA-RDP78T0lV8,*NW O'L2 8
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
UNCLASSIFIED Secrecy in a Free Society
readjustment of these activities takes place in conformance with changed domestic
and international circumstances. It is this confidence and this trust in the oversight
mechanisms which has broken down.
In exploring the means by which confidence and trust can be restored, the free
society must bear in mind the fact that its consensus does change. The lessons of the
past must not be ignored, but it would be an error to judge what was formerly
done-or what might be done in the future-by a consensus of the current moment
deprived of historical perspective. It would also be mistaken to concentrate too much
on preventing the abuse of secrecy without also recognizing that there are legitimate
secrets. The free society owes it to those it holds responsible for producing secret
information and conducting secret activities to maintain an oversight process which
protects legitimate secrecy.
What then are some of the suggestions for improvement which should be
considered? I have grouped them under five headings:
Redefinition of Government Secrecy
"National security" alone is an inadequate base for a government secrecy
classification system. Some suggest expanding this to "national defense or foreign
policy." Executive Order 11652 uses "national defense or foreign relations" and then
combines the two into "national security." However, as I have noted, the Freedom of
Information Act not only excludes from its procedures those national defense or
foreign policy secrets which have been "properly classified," but also excludes eight
other areas, such as trade secrets and certain investigatory records. Such matters are
not part of the classification system, but one suspects that a good many of them get
mixed up in the classification system of those agencies dealing with national defense
and foreign relations secrets.
If it could be granted that there is overall confusion about governmental secrecy
in our free society, wouldn't it be better to have a comprehensive system? Or would
formalizing what already exists in practice only compound the already overwhelming
problems of dealing with government paper? Nicholas deB. Katzenbach, discussing
this only in the foreign policy field, comes down in favor of major surgery on the
classification system and relying "on the good sense of bureaucrats to keep
confidential what should be confidential most of the time, without employing bloated
concepts of national security to do so." Perhaps so, but I believe the opposite course
of inclusiveness is worth exploration.
In any case, whether the lesser secrets are dropped out of the currently
overblown "national security"-based classification system into a system of
government-wide applicability, or whether they are dropped to the level of reliance
"on the good sense of bureaucrats," there can be no doubt of the need for drastic
reduction in what has formerly been placed in the national security category. What is
needed is much greater clarity as to what this category should really contain. Better
guidelines would help immensely in the judgmental factor which will always be
involved. At the same time, the numbers of persons entitled to make such judgments
must continue to be reduced. Some such clarifications and further reductions, it
seems to me, will be the inevitable results of current attempts to cope with the major
changes brought about by the Freedom of Information Act and Executive Order
11652.
Approved For Release 2005/06/22: CIA-RDP78T03194A00040M $.%FIED
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Secrecy in a Free Society UNCLASSIFIED
Another area that needs clarification has to do with abuse of the classification
system. On the one side, it has been much too easy to overclassify. A Subcommittee
headed by Congressman William S. Moorhead conducted a study in 1971 that found
there had been 2,433 investigations by government agencies of classification system
violations over a four-year period. Of these, only 2 involved cases of overclassification
and "not a single administrative penalty was imposed against overclassification."*
On the other hand, great concern has been expressed about dangerous leakage in the
system-"unauthorized disclosure." No one would deny that there are legitimate
secrets which deserve greater protection. Clearly the current Espionage Act is
inadequate for this purpose. One doubts, however, that it will be improved upon until
secrecy has been reduced to the level the national consensus will feel is justified and
our free society becomes more convinced than it is at present that there are adequate
intra-executive means of airing and reconciling legitimate dissent.
Congressional Oversight
It is, of course, up to the Congress as to how it organizes its oversight role. The
current system has come under a great deal of attack, notably from members of
Congress itself. At least some modification, and possibly even major change, in the
four-subcommittee system appears to be in the offing. Whatever means of rebuilding
trust and confidence are found, there is one primary fact of life about secrets which
must be faced: those who have been made responsible for secrets they feel are
important cannot be expected to continue a system which endangers the secrets.
There must be trust and confidence on both sides of a secrecy-sharing process. In a
free society, the official who feels secrecy has been and will be violated cannot have
and should not have the option of evasion of legislative oversight. His only option is to
point out the consequences of poor security and the fact that the activity must cease if
the secrecy necessary to its continuance cannot be preserved. And, does anyone deny
that the publicity-attracting nature of clandestine operations creates special problems
in establishing mutual trust and confidence?
Another matter to be considered with regard to oversight are the interests of the
men concerned. The primary role of the intelligence community will undoubtedly
remain one dealing with military, security matters. However, other fields have been
increasingly added, notably international economics, narcotics intelligence, and
international terrorism. Further, there is a special need to view the intelligence
community as a whole, and the members of that community relate to quite a variety
of authorization committees. There needs to be a means of promoting greater
Congressional cohesion between these differing jurisdictions.
Other than including people who have the trust of their Congressional
colleagues, whose composition unifies the field of intelligence yet reflects its diversified
content, who can follow methods preserving secrecy, there is the key question of how
much detail the oversight body needs. British intelligence authority John -Bruce
Lockhart's central thesis on this question is : "the operations of Secret Services must
remain secret, but the principles by which Secret Services can best be directed and
controlled should be considered carefully, discussed, and understood by those at
government level who are responsible for controlling Secret Services. "** Not having a
*Rep. W. S. Moorhead, "Operation and Reform of the Classification System in the U.S.," in Frank
and Weisband, ed., Secrecy and Foreign Policy (Oxford University Press, New York, 1974) p. 101.
**John Bruce Lockhart "The Relationship between Secret Services and Government in a Modern
State," RUS!, journal of the Royal United Services Institute for Defense Studies, (June 1974) p. 3.
UNC M For Release 2005/06/22: CIA-RDP78T03194A000400016012-8
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
UNCLASSIFIED Secrecy in a Free Society
parliamentary system, we in the United States need to have such consideration,
discussion, and understanding shared by the executive and legislative bodies. It is
extremely important to note that what Lockhart urges be left out of the discussion are
the details of the "operations of Secret Services." The application of such a concept to CIA
is not as radical as it might appear, inasmuch as only a portion of what CIA does is
made up of the "Secret Service" kind of operation-and much that is supposed to
pass as clandestine, really isn't.
Perhaps such exclusion of clandestine operations from examination may not be
found satisfactory, however. Sometimes detail is needed for making evaluations.
Sometimes knowledge of specifics is needed to be able to ask the right general
questions. Does examination of detail need to be seen as an ongoing process, or might
it be seen as temporary-until confidence was restored? Would examination of detail
need to be across the board, or could the need be met by periodic or spot checks?
Could detail be restricted to one type of operation, and the others left alone?
Lastly, when an examination or follow-up probe involves very sensitive material,
does the full committee (or committees) need to be a part of such an examination?
Couldn't one or two members, possibly on a rotating basis, be assigned to the task?
Or, preferably, could such a question be transferred to some such body as the
President's Foreign Intelligence Advisory Board, which would then have the
responsibility of standing behind a reassurance of the oversight group. Or, could such
inquiry be undertaken by a very small number of particularly trusted and reliable
Congressional staffers? And what open record is at all possible on such matters to
help reassure the free society and improve acceptance of appropriate joint
responsibility? Could, for instance, some sort of quarterly listing of general topics
covered by oversight proceedings be made public?
Executive Oversight
Executive oversight is not as critical a matter at the moment as legislative
oversight, but it too merits attention. The primary concern of our free society at this
time does not seem to be whether or not the Executive knows what CIA does, but
whether the Executive will be able to abuse the secret capabilities represented by
CIA. The meeting of the problem of legislative oversight and the functioning of a
much more open Presidency should result in overcoming this fear.
This does not mean that there should be a return to the secrecy which used to
surround the clearance procedures for CIA activity. The channels for executive
approval of CIA activities should be uniform and not competitive or duplicatory, so
that no future charges of CIA selecting the most favorable channel can be made. The
channels should be publicly known, and so should the people in them. Again, it
should be as much a matter of principles rather than details on operations whenever
possible, but obviously when details are required in order to make risk/gain
assessments, they must be readily provided. Clearly, such details will be required very
often. Full knowledge can sometimes provide a better base for cooperation on the
preservation of secrets than a partial knowledge leading to shared speculation
between those partly "in the know." How often an operational activity needs to be
reviewed, and the number of people who need to give their approval, can depend on
the type of operation involved.
The "grey" area between CIA's domestically-based but foreign-related activities
and those of the FBI must be reduced to an absolute minimum. There must be clearly
Appr`bved For Release 2005/06/22: CIA-RDP78T03194A000404b t lED
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Secrecy in a Free Society UNCLASSIFIED
understood procedures for an accountable ruling in case of any doubt. Domestic
activities must be governed by the standards and institutional arrangements of the
domestic scene, and it must be clear to the free society that this is the case. There
must be a very minimum of overlap between the decision-making process for domestic
activity and the decision-making process for foreign activity. The two must be judged
by different standards.
Lastly, there is the problem of efficiency and effectiveness. There is a great deal
more of the administrative side of the intelligence organizations which could be open
to Congressional scrutiny. However, the major responsibility obviously rests with the
executive branch, which must continually improve its management practices. More
rigorous, not less rigorous, review by the Office of Management and Budget is
needed. Continued progress must be made on the community-wide framework of
requirements against which evaluations can be made. The techniques of evaluating
programs must also be improved. There must be evaluation in depth on a selective
basis-a requirement, a source, a station, etc.
Reduction of Agency Secrecy
Without the shadow of a doubt, a sort of Gresham's Law operates with regard to
respect for security systems. If an employee is asked to treat worthless material with
the respect due only to worthwhile secrets, the bad practices will drive the good
practices out of circulation. Similarly, if a free society is asked to respect a security
system and then finds that the system has protected "bad" or worthless secrets, it
may well result in damage to the system's ability to protect "good" secrets. From
both the standpoint of the employee's observance of the security structures and the
free society's respect for maintaining security systems, there can be only one
conclusion: the matters which need to be kept secret must be reduced to a minimum.
For a conclusion so obviously correct for a free society, it is hard to see why there
should be any disagreement or serious problems. But it is vastly easier to state such a
conclusion than it is to implement it. It seems to me that the problems of
implementing it for the Agency stem from three main sources. The first of these is an
insufficient differentiation between the security needs of the varied personnel of CIA.
To draw again on the wisdom in this field which John Bruce Lockhart has set forth:
Those in control of Secret Services must have a realistic and disenchanted
understanding of "security." This is not as simple as it sounds, because possibly
more follies have been committed in the name of security than in any other
governmental activity in a modern state. These broad principles must continu-
ally be borne in mind if this area of folly is to be reduced.
In secret operations there are only two degrees of security. One is the suit of
armour, where the man's identity or objective remains a total secret. The other is
the fig leaf, where a facade of respectability is imposed on functions or
individuals whose real purpose is widely known and accepted. Security trouble
arises when it is believed by those who control them that there are degrees of
security in secret operations between the suit of armour and the fig leaf. *
Those who are really operating in secret need the "suit of armor" and need every
help in keeping it impervious. Those who are operating under "fig leaf" conditions
should not be treated the same way as those within armor. It should also be fairly
*Ibid, p. 5.
UNCI 8 I For Release 2005/06/22: CIA-RDP78T03194A000400019012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
UNCLASSIFIED Secrecy in a Free Society
unlikely that the "fig leaf" operator would revert to or become a truly clandestine
operator. A great many of the Clandestine Service personnel now have the trappings
which are the due of the "suit of armor" operators but they are in fact engaged in "fig
leaf" operations. The easily identified large-scale operations of Vietnam, Laos, and
Cambodia come most easily to mind. However, this is also true of many of the liaison
arrangements with foreign intelligence services. It may also involve such new missions
as anti-narcotics and anti-terrorism activities conducted in cooperation with local
authorities.
Such "fig leaf" operations may well be fulfilling agreed and necessary functions;
they may well require some clandestine skills; and in some cases they may well be
dangerous. But they do not require the high degree of protection of identity, skills and
movements necessary for the truly clandestine operator. Add to this need to
differentiate between operators requiring "suit of armor" protection and operators
who need only fig leaves, the further differentiation between operators and the rest of
the CIA personnel. Do people who are only handling secrets even need a fig leaf?
This area of difficulty can be compounded by the "one Agency" concept-the
idea of interchangeability of Agency careers. In my personal opinion, this is a mistake
in so far as it presumes a movement from the analytical side into the Clandestine
Service. It has been done, but how often? And how many of those who did make such
a transfer actually become clandestine operators?
Possibly the greatest source of difficulty on this differentiation problem could be
the extent to which there may be an effort to hide the operators within the larger
group of Agency employees. According to Roger Hilsman: "the original idea of CIA
had been to conceal the cloak and dagger activities behind the much larger mass of
`overt' intelligence work-research and estimating, monitoring foreign propaganda
broadcasts, and so on. "* I do not personally know if this was indeed the intent. To the
extent that it may be, such "cover" should be questioned as to its usefulness. At best it
far more resembles a fig leaf than it does a suit of armor. And society would really not
need to blush if this particular fig leaf were dropped.
In sum, the "one Agency" concept deserves a very hard look in terms of its conse-
quences for personnel security practices. And the degree to which the personnel
security practices of the Clandestine Service are based upon "suit of armor" assump-
tions also needs close examination. Are the justified needs of truly clandestine
operations being endangered by being too widely applied? Shouldn't the truly
clandestine be set apart as urged by another of Lockhart's principles: that the
"operational front of secret operations should be as narrow as possible?"**
The second main source of problems in reducing security practices to a
minimum are what must be regarded as national bureaucratic tendencies inherent in
any organization, but particularly large ones. Bringing about some uniformity in
judgmental matters is extraordinarily difficult and in practice the "lowest common
denominator" is subject to continual decline-particularly if there is no penalty for
"playing it safe." Such penalties should be set up and used. There is no final answer, of
course, but some clearer criteria need to be set up and there must be an improvement
in systems of review-an excellent function to assign to deputy chiefs.
Another major factor to be attacked are practices stemming from tradition and
precedent. Such practices do not necessarily represent accumulated wisdom.
*Hilsman, To Move a Nation, (Doubleday, New York, 1967) p. 79.
**Lockhart, Op. cit., p. 5.
Approved For Release 2005/06/22 : CIA-RDP78T03194A00040661,064 FIED
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
Secrecy in a Free Society UNCLASSIIFIED
Sometimes they do, but they can also represent outmoded ways of doing things which
historical circumstances may have once justified-circumstances which subsequently
departed the scene. There are, for instance, "worst case" regulations. These were set
up when a "worst case" did occur or when someone had the imagination to think that
it might. Such "worst case" regulations need to be examined to see what the
probability really is of such an event occurring. All too often such regulations stay on
the books, are not enforced by the authorities, but are available as a basis for
supervisory thunder "just in case." This is dishonest administration, natural as it
may be. Another group of practices undoubtedly stem from a "weakest-link"
concept. At some particular point a given security practice may well have been set up
or reinforced to prevent it from being the "weak-link" in a chain of security practices.
Its chain may no longer exist, or other parts of the chain may have become of a much
weaker gauge. It is absolutely right to view security practices in a systems approach
flow context. But differentiated flow channels are possible and can be treated
differently so that what would be a "weak link" in one wouldn't necessarily be so in
another.
Besides being looked at in a systems approach chain method, security practices
should be examined as a layered concept. Is the secret at the core still a secret? Are
the various layers of protection ("derivative" secrets) still needed or can some of them
be relaxed or dispensed with? How many practices may have come from the re-
quirements of some other body as part of the process of establishing the mutual trust
needed for the exchange of secrets? Are these still needed?
A third main source of problems is the necessity of not disclosing too many clues
as to your intelligence successes-or lack thereof. This is what is involved in the
reluctance to disclose too much information about Agency organization or budgeting.
It is held that such information could show trends which ought to be concealed.
One suspects that.some such trends would be fully evident from open policy documents,
i.e., increased concentration on the Mid-East, decreased attention to Indochina,
increased interest in economic information, etc. Further, even in the open parts of our
system, it is often very difficult to track expenditures from budget year to budget year.
Without denying that some trends merit concealment, one can't help wondering in
how much of the agency this may be a problem, and at what level of budgetary listing
it becomes a problem. Much information is justifiably withheld because it meets the
statutory protection provided in the 1949 Act for intelligence sources and methods.
But isn't there a good deal of such organizational information which would not endanger
sources and methods?
Turning from organizational information, what about making more of the
intelligence end-product available to Congress and the public? If this can be done
without endangering sources and methods, or endangering what I regard as
legitimate executive leadership rights and administrative responsibilities, I feel much
more such information in an appropriately usable form should be made available.
Such sharing is indeed on the increase. The more that it is possible to do this with
central intelligence, the less possible parochial manipulation through partial release
of information becomes. It has been suggested that the Congress should be able to
levy its own estimate requirements on CIA, and this is an idea worth exploring.
Procedures for promoting change
The discipline of the marketplace brings change. Much of what CIA does cannot
be out in the marketplace. Being responsive to a need to change and adjust poses very
UNCLASSIFIED 7
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
UNCLASSIFIED Secrecy in a Free Society
special problems for a closed organization. There is a need not only for CIA to be
much more closely attuned to the consensus of our free society, but also for a
reinforcement of its processes of eliminating the mediocre and the outdated.
CIA has had procedures to promote change, but I believe it is fair to say that they
did not work well enough. Undoubtedly a part of the reason for resistance to change
stems from a humanitarian concern about men whose services might no longer be
required. Another part might stem from a cautious reaction to preventing an over-use
of the Agency such as had marked certain periods in the past-an over-use which can
produce failures not balanced in The public mind with successes. It might have
derived from a realization that it would be much more difficult to operate in a multi-
polar world where the choices were less clear and where the cement of common
assumptions characterizing the Cold War period would be lacking. It may well be
prudent in some cases to keep standby capabilities until you are more certain that you
won't need them. However, much necessary change didn't take place simply because
it didn't have to.
Beyond the need to reinforce external procedures of promoting change, there is a
need to examine CIA's internal methods serving this purpose. Where did
recommended change take place and where did it fail to take place? What was the
record as regards Inspector General surveys? Where was lip service paid to their
recommendations but little actually ended up being changed? There were processes
of feedback and some attempts at evaluation. What happened to these? What is the
record on Management Advisory Groups? What was the upshot of training programs
designed to help challenge assumptions and promote rethinking? There should be a
considerable body of material available for analysis on what must be one of the key
problems of secrecy and intelligence in a free society.
To conclude: free society needs intelligence. It needs secrecy. But there has been
a loss of proportion, a loss of confidence and trust, and a lack of understanding on all
sides. These must be overcome because the free society needs to make wise use of the
capabilities at its command-and I include covert capabilities in this. It is high time
that a mending took place.
AppPoved For Release 2005/06/22 : CIA-RDP78T03194A00046K4&tcLS-DIED
Approved For Release 2005/06/22: CIA-RDP78T031&A QQ4 Q10012-8
On bringing all of the analytical disciplines to bear
THE CASE FOR A HOLISTIC INTELLIGENCE
Lloyd F. Jordan
The central thesis of this paper is that the increasing complexity of national
security problems requires that the Central Intelligence Agency adopt a new
approach to intelligence analysis. This approach requires that intelligence problems
which have important political, economic, scientific, military, and other salient
dimensions be treated in a manner that will assure from the outset that the interplay of
these various factors is taken fully into account. Since this thesis is based upon a belief
that the separate treatment of each of these factors is inadequate because the problem
as a whole is more than just the sum of its parts, it can be referred to as a holistic
approach. The finished intelligence product of such an approach - would be
qualitatively more than the mere sum of its parts by virtue of an extra dimension
provided by their integration at every stage of research-from the development of the
research design to the completion of the analysis.
The following discussion is focused on: (1) the two dominant characteristics of
the Agency's analytical process which make it deficient in meeting today's national
security requirements; (2) the rationale for and explanation of the proposed new
approach; and (3) the organizational and management implications of adopting such
an approach.
It is not the purpose of this paper to present a summary indictment of the past
and present modes of intelligence analysis; it is rather an attempt to identify the
reasons for their inadequacy and to define a new analytical approach which will
enable the Agency to cope better with the increasing number of complex intelligence
questions confronting it. Whatever is critical of past and present approaches to
intelligence analysis is intended as constructive criticism.
Dominant Characteristics of the Analytical Process
The approach to intelligence analysis within CIA has two dominant
characteristics which impair the Agency's capability to deal most effectively with
complex intelligence problems. First, despite the fact that the political, economic,
scientific, and military aspects of intelligence problems have become increasingly
interwoven, intelligence analysis tends to treat each of these dimensions
independently of the others. Political intelligence is produced as a final product
primarily by political scientists and historians, economic intelligence by economists,
and scientific and weapons intelligence by physical scientists and engineers. Second,
intelligence analysis has been and continues to be carried out largely without the
consideration of additional aspects of intelligence problems which all now agree are
important. For example, many of our major, intelligence problems need to be
analyzed from the perspectives of sociology, social psychology, and cultural
anthropology as well as from more traditional viewpoints. The negative impact of
these two characteristics of Agency analysis can best be discussed in the context of the
phases of the Agency's analytical process.
Intelligence analysis within the Agency can be characterized as a three-stage
process: (1) "building block" research, (2) intermediate-level analysis, and (3)
synthesis, or the production of national intelligence estimates.
CONFAIDENTIAL 9
pproved For Release 2005/06/22: CIA-RDP78T0319 R10fd1 9-19
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
CONFIDENTIAL Holistic Intelligence
The "building block" phase of research involves the accumulation, sorting, and
organization of the vast amounts of information received which pertain to matters of
intelligence concern. It produces the underlying studies that constitute the basis for
subsequent, broader-gauged analysis intended to answer specific intelligence
questions. Because its focus is on the organization of informational fragments, the
"building block" phase of research lends itself-indeed, requires-a
microscopic approach taken from the point of view of individual aspects
or disciplines if it is to be done efficiently and with sophistication. Such research is an
indispensable continuing intelligence function. The need to perform it, however,
differs in degree in various problem fields and geographical regions. Much of the
crucial information needed for analysis is frequently unavailable to the intelligence
analyst. Therefore, the sifting, weighing, piecing, and structuring of bits and
fragments of available information on a particular problem is indispensable if the
analyst is eventually to have any foundation upon which to make intermediate-level
analysis and intelligence estimates.'
CIA's work over the years in developing "building block" analyses on a country
and problem basis has been and remains impressive. The work, for example, begun in
the 1950s and extending into the early 1960s on the Soviet and East European
economies, political systems, scientific and technical efforts, and weaponry
development attest to this excellent performance. More specifically, the numerous
research aids produced in the Office of Scientific Intelligence (OSI) in the 1950s on
the Soviet Academy of Sciences, its departments, their structure, staff, and research
plans, the status of various fields of Soviet science and engineering were indispensable
first steps in the structuring of a meaningful data base upon which later more
sophisticated assessments of Soviet achievements and prospects for development in
various scientific fields and in weaponry were made. Likewise, the pioneering
"building block" analyses of the quantity, types of specializations, and quality of
Soviet and East European scientific and technical manpower were carried out in OSI
through a number of highly specialized studies. Similarly, the research in the 1950s
and early 1960s on the Soviet Bloc economies provided the foundations for later more
sophisticated economic intelligence analyses. There is, however, somewhat less need
now for such work in many problem areas of the USSR and East European countries
because both raw data and finished intelligence have been built up to substantial
levels, though undoubtedly new problems will continue to arise demanding that such
basic research be undertaken. In contrast, "building block" research will continue to
be indispensable to intelligence analysis on Communist China across a broad
spectrum of problems for several years.
On the intermediate level of analysis, the objective is to aggregate and
synthesize the material developed in various "building block" studies to produce
interpretative and predictive intelligence analyses. The monodisciplinary
microscopic approach that is so important for "building block" research has had, and
continues to have, an unfavorable influence upon the analysis work at the
intermediate level in two major respects. First, multidimensional problems are
approached too narrowly; i.e., they are not considered from all relevant aspects.
Second, too little attention has been given to spelling out exactly how the analysis
undertaken will lead to the answers sought and how underlying assumptions or
uncertainties must qualify the results. A review of prefaces and introductions to
It is in this "building block" phase of research that the analysts in the Central Reference Service
frequently make crucially important but frequently unheralded contributions.
Appr R'ed For Release 2005/06/22: CIA-RDP78T03194A0004 11' Q?ITIAL
Approved For Release 2005/06/22: CIA-RDP78T031e6A~~r01q?AL0012-8
Holistic Intelligence
intermediate-level intelligence analyses-where the writer really owes the reader an
explanation of what it is he is about to do-of a number of different intelligence
problems reveals that studies at this level almost exclusively attack their problems
from a single point of view and without detailing the conceptual basis upon which the
analysis will proceed.
The National Intelligence Estimate (NIE) process prior to 1973 was designed to
develop a synthesis of separate finished intelligence studies on a variety of problems to
support U.S. national security policy making. A review of the NIEs, however, reveals
that they, too, reflected the monodisciplinary approach to problems present in the
intermediate-level analyses prepared in the intelligence production offices. This is not
to say that a given NIE, for example, on Soviet military research and development
and others did not frequently incorporate sections on budgets, S&T capabilities,
quality of manpower, etc. The fact is, however, that these particular analyses were, in
large part, produced in different offices by several distinct organizations focused upon
separate specific pieces of the problem. It was really only at the National Estimates
level of analysis that an effort was made to put all the pieces together into some
meaningful whole.' Too often it was done by giving serial consideration to each of the
distinct aspects of the problem. The Office of National Estimates (ONE),
furthermore, was traditionally the preserve of the historians and political scientists,
with only an occasional infusion of expertise in other disciplines in the latter years of
its existence.' Beyond the resolution or accommodation of Agency differences, the
synthesis that occurred at the ONE level was essentially that of a style and format and
to a lesser extent substantive.' ONE's failure to deal in a satisfactory manner with the
interactions of various aspects of the problems it faced cannot legitimately be
attributed exclusively to it as an organization per seas much as to the type of analytical
inputs it received. It is virtually impossible to integrate meaningful discrete pieces of
analysis on different but related facets of a complex intelligence problem after the
research on the various pieces has been completed by analysts using different assump-
tions and sometimes mutually exclusive analytical approaches.
A number of CIA intelligence officers involved in analysis have recognized in
recent years the need to mount a different type of attack on intelligence problems. A
common concern is expressed in their writings about the need for the improved
integration of intelligence analyses relevant to particular multidimensional
problems.' They presented good evidence that the analytical process left much to be
desired in this respect. In his dialogue with Mr. Shryock on the issue of bringing
various schools of thought in Sovietology to bear on intelligence analysis on the Soviet
Union, Mr. Whitman stated that:
The national estimating process contributes even less to the synthesis of
methods and insights for which Mr. Shryock calls.
While the drafters of an NIE may be partial to one or another of Mr.
Shryock's schools, they perform little sustained research on their own and are in
2Ludwell Montague, Studies in Intelligence, XVI/2.
'Individuals with engineering and scientific backgrounds assigned for limited periods to ONE were
John Kerlin, Jim Porter, and Herb Orlins; with economic backgrounds, Edward Proctor, Louis Marengo,
and Penelope Thundberg, and possibly a few others.
'John Whitman, "Better an Office of Sovietology," Studies in Intelligence, VIII/1.
`Richard W. Shryock, "For an Eclectic Sovietology," Studies in Intelligence, VIII/ 1. John Whitman, op.
cit.
CONFIDENTIAL 11
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
CONFIDENTIAL Holistic Intelligence
principle eclectic. Their estimate is produced with little participation by the mul-
tifarious units of Sovietologists tucked away in various parts of the community.'
In general, however, these analysts sought mechanisms for introducing additional
viewpoints into the synthesis phase of the analytical process, rather than urging
changes that would ensure that all relevant aspects be taken into account in the
earlier phases of that process.
The present National Intelligence Officers (NIO) structure has potential for
creating an environment that could be conducive to the implementation of holistic
approach to intelligence problems on a geographical or functional basis. Several of the
Key Intelligence Questions (KIQ) strategies implicitly suggest the need for taking into
account the multifarious aspects of the intelligence problems with which they deal.
Inter-office projects or joint studies are mentioned in these papers; they reflect an
effort to synchronize analyses on the various dimensions of a given KIQ. This
approach, however, falls short of providing the type of integrated analytical focus to
be advocated here because, once again, the interactions between the various aspects of
the problem are left to the NIO to recreate late in the game on the basis of separately
prepared inputs.
In addition to the virtual absence over the years of any real integration of all
problem aspects in intelligence analysis, there has been virtually no attention given to
the perspectives of other disciplines such as sociology, social psychology, and cultural
anthropology. It appears that the policy for staffing the analytical components of the
Agency over the years has omitted the hiring of analysts with training or experience in
these three disciplines. This is not to contend that a number of people with such
backgrounds have not been employed by the Agency in various capacities, but it
appears that they were not recruited for the specific purpose of performing
intelligence analysis from the perspectives of their disciplines. The pattern of staffing,
therefore, has restricted significantly the spectrum of disciplines used in the solution
of intelligence problems.
The following case is illustrative. Since the inception of SALT, considerable
interest has been expressed by both analysts and policy makers in Soviet perceptions
of U.S. policies and intentions. The perception problem has also been raised in the
context of the relations among China, Japan, and the USSR. Despite major
contributions to the field of elite perception analysis-mostly by social psychologists
and political scientists-they have been largely neglected in the intelligence analysis
community. For intelligence purposes, there is a need to assess what has been done in
the academic community and to determine if and how such research can be adapted
to intelligence analysis.' Our past failure to incorporate such work has constrained
the Agency's ability to deal with some of its most important current problems.
The Case for a New Approach
To remedy these two deficiencies in the Agency's intelligence analysis sector, it
is necessary to adopt a holistic research approach to intelligence analysis at the
intermediate and estimative levels. This higher plateau of analysis must rest upon the
foundations of polydisciplinary research combined with monodisciplinary studies at
the building-block phase, undertaken from disciplinary perspectives heretofore largely
"Ibid., p. 65.
1'he Office of Political Research recently initiated a literature assessment on approaches to perception
analysis in the Analytical Support Center.
ApprbVed For Release 2005/06/22: CIA-RDP78T03194A00040v9'I 8yy _ITIAL
Approved For Release 2005/06/22 : CIA-RDP78T033$4 8P44,4Q 0012-8
Holistic Intelligence
untried in the CIA.' This approach can only be achieved by assigning analysts to a
given intelligence problem with disciplinary expertise relevant to its various facets in a
multidisciplinary or interdisciplinary research mode. More specifically, such an
approach would require that groups of analysts jointly embodying the capabilities
required to deal professionally with all the significant aspects of an intelligence
problem would work together as a team toward its solution. Communication between
team members and their mutual approach to the problem would have to be such that
a full understanding of the interactions between its economic, political, technical,
strategic, cultural, and sociological factors can be understood and delineated in a
form suitable to guide their analysis. So elaborate an approach to all tasks is obviously
not appropriate, but it is becoming essential in order to cope with the growing
number of very complex intelligence problems that are key to the making of policy
decisions. Such an analytical approach will provide the Agency with a finished in-
telligence product that can best be termed holistic.
What are the specific advantages of the polydisciplinary approach to intelligence
analysis? First, this approach will make more explicit than is now the case the
interrelationships of the various dimensions of complex intelligence problems which
are now treated in a fragmentary form or individually as discrete problems. Second,
possibly the most important objective of intelligence analysis is to identify the range of
possible outcomes of a given situation and to attach some ranking or likelihood to
each of them. A polydisciplinary research approach to intelligence problems offers
high promise in efforts to achieve this objective. Research to date on polydisciplinary
research has shown that:
The interaction among scientists of different disciplines will result in
new combinations of ideas that will not occur in the absence of intense team
interaction. This interaction will lead to the asking of questions that would
never be asked from a monodisciplinary perspective. And, finally, these new
combinations of ideas and the asking of new questions will generate a
greater range of proposed solutions to the team problem.'
The history of the development of the physical and natural sciences and
technology clearly shows that the majority of significant advances were the result of a
polydisciplinary research approach. This is no less true in the social sciences where
the movement to higher and more sophisticated levels of analysis has been made
'The following terms and definitions will be used throughout the remainder of this paper. They arc
adopted from the work of Michael Anbar and Bernard Cohen. See Michael Anbar, "The `Bridge Scientist'
and His Role," Research and Development, July 1973.
monodisciplinary approach-the analysis approach to a problem from the perspective of one
discipline,
polydisciplinary approach-the analytical approach to a problem from the perspective of several
disciplines.
The terms multidisciplinary and interdisciplinary refer to two modes of conducting
polydisciplinary research.
multidisciplinary mode-a monodisciplinary team leadership formulates the plan of the project and
specifies the contribution of each of the participants.
interdisciplinary mode--each of the disciplines represented on the team interacts on an equal footing
to formulate the plan of action and to specify the contributions of each of the participants.
'Michael Anbar, Op. cit.
CONFDENTIAL 13
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
CONFIDENTIAL Holistic Intelligence
possible almost exclusively by the integration of concepts and approaches from
several disciplines. Such an integrative process has produced the landmark de-
velopments in the social sciences such as David Bidney's Theoretical Anthropology, the
first work providing a general theoretical framework for cultural anthropology, based
on work in anthropology, sociology, psychology, philosophy, and history;
Morgenstern and von Neuman's work on game theory which drew upon
mathematics, philosophy, and economics; Kurt Lewin's Field Theory in the Social
Sciences which was based upon psychology, mathematics, and sociology; and finally
Parsons and Shils' Toward a General Theory of Action which was built upon the adaption
of concepts and approaches from psychology, sociology, cultural anthropology, and
political science. This latter work provided a truly significant theoretical framework
for the social sciences in general.
It may be correctly contended that almost all the analytical offices of the
Agency are staffed, in varying degrees, with people who have training in various
disciplines. The presence, however, of such a staff does not mean that truly
polydisciplinary research in under way. Neither does the presence of an inter-office
research project task force mean that a polydisciplinary research design for the
project has been conceived and is being carried out. Inter-office projects frequently
result in the participating offices preparing their contributions for such a study
according to their respective missions and special expertise; these submissions are
then collated, edited, and organized to make a coherent presentation. Such products,
however, do not reflect the influence of a sustained dialogue among a polydisciplinary
group of analysts who work together within established conceptual frameworks of
analysis which explicitly relate the many aspects of the problems they are addressing.
In such an environment, each analyst has an opportunity to acquire a much broader
appreciation of a problem as a result of his exposure to the various ways that
individuals with different professional backgrounds may approach it.
Such efforts in the Agency have been few and far between but not non-existent.
Indeed, a considerable amount of the work performed by the Analysis Division of the
Office of Economic Reports (OER-then ORR) in the 1950s and early 1960s on the
Soviet and East European economies was based to some extent on a polydisciplinary
approach. This Division utilized the narrowly-scoped specialized studies prepared by
the engineering, technical, and economic specialists of the other components in the
Office in broader analyses considering various facets of the Soviet and East European
economies. In the Office of Scientific Intelligence, an attempt was made in the early
1960s to approach the analysis of the Soviet space program on a polydisciplinary
basis."' The problem was defined and specific pieces of it were assigned to various
analysts with the requisite disciplinary backgrounds to deal with them. This
analytical program encompassed the research contributions of intelligence officers
with backgrounds in the physical, engineering, natural, and social sciences. In this
effort, however, there was insufficient interaction among those involved in the project
to generate an analytical approach sufficiently sophisticated to encompass the many
interactions among the various factors of the problem they addressed. Such attempts
as these unfortunately remain exceptions to the overall pattern of intelligence research
at the intermediate-analysis level within the Agency.
There is also certainly a need for monodisciplinary intelligence analyses, but
such studies need to be conceived within more rigorously developed research designs
The Soviet Space Research Program Monograph If, Objectives CIA/SI 32-59 29 August 1959.
Apprb ied For Release 2005/06/22: CIA-RDP78T03194A00040DONRifl2 TIAL
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Holistic Intelligence CONFIDENTIAL
which make explicit how the analysis will proceed and on what assumptions it will
rest. The spelling out of these "theoretical underpinnings" should include the clear
delineation of the conceptual view or model of the system (i.e., the state, the party, the
bloc, the weapon system, etc.) being studied, the assumptions that the acceptance of
that view imposes, any hypotheses to be investigated, the tests to be employed in
establishing their validity, the methods to be used in manipulating the information
involved, and a characterization of the data themselves. Unless a study proceeds with
some awareness of such considerations, it is unlikely to get beyond the descriptive
stage. Because these conceptual foundations are so important, they must be accessible
to the reader in explicit form. If a monodisciplinary study is to contribute to
polydisciplinary research, its underpinnings must be so well revealed and
understood that new and broader concepts for integrating a number of problem
factors can be developed. Thus a holistic approach to intelligence analysis will put
new demands even upon those studies produced with a single focus.
There are two major reasons for such work. First, there is a need to incorporate
into intelligence research additional discipline perspectives, primarily in the
behavioral sciences, to deal with the increasing number of questions wherein these
disciplines are relevant. As noted above, such disciplines heretofore have not been
used to any great extent in CIA analysis. Second, the conduct of monodisciplinary
studies from the standpoint of these disciplines would eventually help pave the way
for the integration of the contributions that they have to make to the analysis of
complex intelligence questions on a polydisciplinary basis.
There has always been, and there remains, a high level of U.S. intelligence
interest in various foreign governmental and private institutions and their
contributions to the governmental policy-making decision process. Different
disciplines provide considerably different analytical perspectives and, therefore,
different insights into the roles and internal dynamics of institutions. A sociologist, for
example, looks at political parties, political leadership, and bureaucracies in general
with significantly different considerations in mind than does a political scientist,
historian, or physical scientist. The result is that he conceptually models the problem
with which he is working in different ways."
Two recent books, Jean-Claude Thoenig's L'Ere des Technocrates, and Jacques-A.
Kosciusko-Morizet's La "Mafia" Polylechnicienne, are illustrative of the potential utility
of a particular type of sociological analysis to intelligence. Thoenig is a sociologist
specialized in the sociology of organizations and Kosciusko-Morizet is a scientist-
engineer steeped in the literature of the sociology of organizations.
Thoenig's work deals with the role of the corps of engineers for bridges and roads
in French public administration and in the broader context of French society. More
specifically, he focuses on the evolution of this elite group in French public
administration since the 18th century, the recruitment of its members, their
educational and social backgrounds and geographical origins; their discipline and
cohesiveness; the infrastructure of their own administration; and finally an analysis of
the significance of all these variables for the position they occupy in the French
government. This position is one that gives them a monopoly of authority over
For illustrative purposes see: David E. Apter, "A Comparative Method for the Study of Politics," The
American journal of Sociology, Vol. LXIV, No. 3, 1958, pp. 221-237; Leonard Reissman, "A Study of Role
Conceptions in Bureaucracy," Social Forces, Vol. 27, 1949, pp. 305-310; and Michel Crozier, The Bureaucratic
Phenomenon, The University of Chicago Press, 1967.
CONFA~ tfi For Release 2005/06/22: CIA-RDP78T03194A00040001012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
CONFIDENTIAL Holistic Intelligence
highways, ports, canals, and airports throughout France and, therefore, over the bulk
of the French technical civil service at the national, departmental, and local levels.
Thoenig assesses the implications of this type of institution and elite for both French
public administration and society in general.
Kosciusko-Morizet's book, La "Mafia " Polytechnicienne, is a companion volume, in
it sense, to Thoenig's work. The author deals with the position of L'Ecole
Polytechnique as an institution in France,. its history, the role of its graduates in
French government administration, its role in the process of elite formation, the
place of this elite in the structure of French society, and the implications of their
position for the French political system and society in general.
The analytical frameworks of these studies emphasize the systemic and dynamic
aspects of institutional behavior; the emphasis is on the how rather than the why of
behavior; and both history and environment are examined to provide insight into the
ongoing process of institutional change rather than an explanation of the results of
change. 'Z This analytical emphasis has especially important implications for
intelligence in that it offers much potential for charting and understanding in advance
certain processes of change that are likely to produce particular types of institutional
behavior.
Despite the problems of data availability that obtain in much intelligence
analysis, especially on the closed societies, the approach employed in these two
studies suggests an excellent analytical framework for the analysis of the roles of
particular elites in various foreign institutions or social sectors. Indeed, though
retrospective or historical analysis is something of a luxury in CIA, it might prove
useful to undertake a number of such studies of institutions and programs of
longstanding intelligence interest. These studies should help improve the analyst's
basic understanding of how various foreign institutions function and change." This
type of an approach should, over time, move the analysis of foreign organizations and
programs away from its predominantly descriptive and why orientation to a more
analytical and predictive focus that would be valuable for both intelligence analysis
and clandestine operations.
It may be argued that the intelligence analyst does not have access to enough
data to undertake the types of analyses suggested above. It is a fact, nevertheless, that
studies of various institutions and programs are undertaken in CIA; the contention
here is simply that better defined research designs going beyond traditional
approaches will improve the analysts' capability to make the most of the available
data.
I )o such approaches or experiments properly belong only in the domain of the
academic investigators? The answer must be "no" if the Agency hopes to be prepared
to deal effectively with the increasing complexity of national security questions. As
For elaboration on this point see: Michel Crozier, "The Relationships Between Micro and
Macrosociology," Human Relations, No. 3, Vol. 25, pp. 239-251.
Che admonition of the distinguished cultural anthropologist, E. Evans-Pritchard, is apropos on this
point. He stated that the claim that one can understand the functioning of institutions at a certain point in
time without knowing how they have come to be what they are ..seems to me an absurdity." E. Evans-
Pritchard, "Social Anthropology: Past and Present," Man L, No. 198 (1950). The Marett Lecture,
1950, p. 123.
Approv d For Release 2005/06/22: CIA-RDP78T03194A000400WbCF1DE1TIAL
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Holistic Intelligence CONFIDENTIAL
long ago as 1958, R. A. Random, made the following observation which is most
relevant to the argument above:
To suggest that it is redundant and impractical to erect a science of
intelligence is not to reject the application of scientific methodology to
intelligence, and specifically the acknowledgement and use of the principles
of the social sciences applicable to the phenomena of intelligence. Such a
rejection would reject rationality and scientific principle as a basis for
practice, and substitute intuitive guesses and unanalyzed conjectures. While
irrational conduct of intelligence practice, like non-principled behavior
generally, may become skillful and may be successful to the extent of
attaining particular ends desired, as a rule it can be recommended only as a
kind of short cut in simple situations. When the situation is complicated and
the actor is confronted with multiple choices of action, reliance on non-
principled behavior introduces an unacceptably high level of probable error.
The propositions advanced above-that it is not profitable to develop
intelligence as a separate science because the phenomena with which it
deals are covered by the social sciences, and that the only sound practice of
intelligence is that based on the scientific method as specifically applied in
the social sciences-have important practical implications. The main one of
these is that we must build up within the intelligence community a
knowledge of scientific method and the techniques and principles of the
policy sciences and must study their application to intelligence problems.
We must do this because it is the only way to effect any fundamental
improvement in professional intelligence practice."
It may be contended that, in general, the level of theory and method in the
various social sciences is so primitive that they offer little aid to the intelligence
analyst. The rejoinder to this argument must be at least twofold. First, the accuracy of
this argument remains largely to be verified empirically in the Agency's intelligence
analysis process through experimentation with various theories and methods. Second,
granted that social science theory and method are primitive relative to those of the
physical and natural sciences, significant progress has been made in developing new
approaches to identifying and understanding the immensely complex interrelations
that occur among the actors within a given social system.
Although our ability to define mathematically how the effects of a perturbing
event will be passed from one element of the system to another is grossly limited, these
approaches at least better enable us to understand what is happening. Since
particular disciplines (e.g., economics, political science, etc.) tend to limit their
attention to only selected types of events and actors in a social system, it is important
that we include a number of different disciplinary perspectives and that they be as
rigorously defined as the state of the art will allow. Thus, the use of theory and highly
structured designs derived from the perspective of different disciplines should expand
the spectrum of hypotheses about a given intelligence problem.
There is no intention here to suggest that more attention to theory and research
designs in either polydisciplinary or monodisciplinary approaches to intelligence will
lead to the methodological rigor that obtains in the physical and natural sciences. On
the contrary, it is imperative that those engaged in both the management as well as
the conduct of intelligence analysis be alert to the pitfalls of slavish attempts to impose
R.A. Random, "Intelligence as a Science," Studies in Intelligence, 11/2.
CONFIRppirbv' d For Release 2005/06/22 : CIA-RDP78T03194A000400 3 0012-8
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
CONFIDENTIAL Holistic Intelligence
upon the analysis of social science phenomena the methodological rigor that is
productive in the physical sciences. Even to entertain such an expectation is to fall
victim to scientism."
The Implications of Adopting the Holistic Approach
It is not enough to advocate a major change in a function as important as
intelligence analysis without at least identifying some of its salient implications. It
must suffice here to outline only those that would seem to be most important if a
holistic approach were adopted.
Formulation of Intelligence Questions-A decision to take such a step would impact
significantly on the types of questions the intelligence community regularly addresses
at the three levels of analysis discussed earlier. For example, many of the discrete
questions now treated at the intermediate and, to some extent, at the synthesis levels
of analysis about such matters as particular aspects of foreign institutions, manpower
levels and costs of various economic and scientific research programs, and the perfor-
mance characteristics of weapon systems would be shifted backward to the "building
block" phase of analysis. Clearly, these types of questions are basic and indispen-
sable. With a holistic approach, however, such questions would become the underpin-
nings for the subsequent investigation of broader questions. The effect of this develop-
ment would be a redefinition of building block studies as a result of the
polydisciplinary consideration of more broadly posed intelligence questions.
Requirements and Collection-The adoption of a holistic approach to intelligence
analysis would have a significant impact upon that extremely important but
frequently neglected relationship between the analysts and the collectors of
information. First, the broader focus would result in the examination of problems
from different points of view which would in turn generate a different type of
intelligence requirement from that which generally has been asked by analysts
working predominantly within the framework of a single discipline. Increased
emphasis, for example, would be placed upon the interaction and relationships among
the variables of a given problem. In essence, the questions would deal more with the
way in which various systems operate internally than with the discrete external
features. Second, the use of more explicit and theoretically based research designs
should result in the better structuring and definition of data requirements to meet the
specific needs of the project by highlighting the key categories of data required. Third,
the requirements to support a broader analytical approach would require a
substantial understanding of the research designs for particular intelligence projects
by the collectors of information. All three of these factors would undoubtedly affect
the nature of intelligence collection operations and place new demands upon those
involved in them.
V or example, polydisciplinary intelligence analysis would probably require, over
time, innovation in approaches to clandestine intelligence collection. "Thus, efforts to
collect information about a particular foreign elite's perceptions on important
political, economic, or strategic issues might necessitate the use of indirect or
clandestine opinion survey research in the target country.
Staffing of Analysis components-Clearly, the polydisciplinary approach requires an
examination of past and present personnel requirements and recruitment policies of
.For an excellent discussion of this problem see F. A. von Hayek, "Scientism and the Study of
Society," Economica, Netv Series 9 (1942), pp. 267-91; 10 (1943), pp. 34-63; and 11 (1944), pp. 27-39.
Approved For Release 2005/06/22 : CIA-RDP78T03194A0004000I@TIAL
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
Holistic Intelligence CONFIDENTIAL
the Agency's analysis offices. To approach intelligence analysis on such a basis
requires disciplines that are not present in the Agency's analytical staff. The narrow
professionalism that has permeated staffing philosophy within the Agency's analysis
components must give way to the acceptance of the fact that the ever-increasing
interplay among scientific, economic, political, cultural, and strategic variables and
the relationship between domestic and external affairs must be viewed at every level of
the intelligence analysis process. This view must prevail if the final intelligence
product is to be the most useful and relevant that can be provided the policy makers.
Management of analysis-The implementation of a holistic approach to intelligence
analysis would be a difficult undertaking. It would present major challenges to both
the managerial and working levels of both the analytical and collection components.
Not the least of these challenges would be the immensely difficult task of reorienting
several sectors of a large bureaucracy away from well-established practices to
significantly new ways of doing business. For example, it would be necessary for each
analyst involved in a polydisciplinary-based project to become very familiar with
facets of a given problem other than those in which he or she is a specialist.
A number of significant alterations in the present structure and management of
analysis would be required over time as a result of the adoption of a polydisciplinary
approach. It would be necessary to develop an organizational approach that would
allow the assignment of analysts now working in separate organizational elements to
a single analytical task. While organizational changes may contribute to the creation
of an environment conducive to polydisciplinary intelligence research, they alone are
not adequate for its successful realization. Perhaps more important than
organizational change is the philosophical outlook held by the managers and analysts
and their commitment to its implementation.
An additional important consideration in any effort to implement
polydisciplinary research is that experience elsewhere has revealed that different
managerial problems obtain in the multidisciplinary and interdisciplinary
approaches to research and that different managerial qualities are needed. There is,
for example, a "bridging" role to be carried out by research managers. The need for
fulfilling this function helps to identify certain characteristics that managers of
polydisciplinary research should possess.
COI 1$U LFor Release 2005/06/22: CIA-RDP78T03194A00040001b9012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET
NOFORN
In the preceding issue of Studies, Jack H. Taylor matched the results of NIEs on Soviet
weaponry against the thesis of Professor Albert Wohlstetter that the Pentagon track record-public
opinion notwithstanding-has been to underestimate rather than overestimate Soviet strategic
forces. Taylor found for Wohlstetter's thesis. In the following article Ross Cowey demonstrates that
the estimates fared much better in their non-quantitative judgments.
MORE ON THE MILITARY ESTIMATES
Ross Cowey
Having worked closely with Jack Taylor in drafting some of the National
Intelligence Estimates which he surveyed in his article in the February Review of
National Intelligence,* I read his piece on Soviet military estimates with great interest. I
found myself in agreement with most of his findings, but disappointed by his failure to
go farther with some of his analysis.
Taylor's summary of the Estimates reminded me of an observation which Abbot
Smith made in an article in the Fall, 1969 issue of Studies in Intelligence (X11114): "One
could easily make up a list of projections (from the military estimates) which were too
low, another of those which were too high, another of those which were substantially
correct, and a final one-very short-of those which, thanks more to luck than
wisdom, were precisely correct." Taylor certainly proves the point.
Admittedly, Taylor focused on the quantitative underestimates referred to by
Professor Albert Wohlstetter. ** What his article does not show, therefore, is that the
estimates were right with respect to a number of important, non-quantitative
judgments made over the years about Soviet forces. Perhaps the most significant of
these was the repeated judgment through the Sixties that the Soviets could not expect
to achieve strategic capabilities which would make rational the deliberate initiation of
general war.
Any review of the Estimates written since about 1962-i.e., since the advent of
improved collection systems-would also show that the intelligence community has
been able to provide warning of the introduction of every major Soviet strategic
weapon system well before its initial operational capability. We have not always been
able to agree among ourselves on the specific mission of each new system (e.g., the
SA-5 missile and the Backfire bomber) or-as Taylor shows-about the pace or
extent of its deployment. But we have been able to provide the planner with
knowledge sufficient for general guidance, if not for detailed planning.
I would agree with Taylor that part of the reason for our repeated
underestimates in the mid-Sixties of the impending growth in Soviet ICBM forces was
an over-reaction by the community to the gross overestimates on this subject in the late
Fifties. Over-reaction to past mistakes-at least to past overestimates-seems to be a
recurring pattern in the estimative process. Our overestimates in the mid-to-late
*See also Studies in Intelligence, XIX11.
**"Is There a Strategic Arms Race," Foreign Policy, Summer 1974.
SECljproved For Release 2005/06/22 : CIA-RDP78T03194A00040001%'012-8
MORI/HRP PAGES 21-23
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET Military Estimates
Fifties of Soviet missile, bomber, and fighter strengths were followed by
underestimates for each of those forces during the Sixties.
Another analytical syndrome working against us-one which may be even more
controlling-is our tendency to overestimate future force levels in the absence of firm
evidence, and to underestimate with the advantage of such evidence. During the late
Fifties, we were groping in the dark for information on what the Soviets were doing as
they translated the new technology of the space age into new military hardware. With
the introduction of more sophisticated intelligence collection methods in the Sixties,
we gained a much better appreciation of Soviet capabilities to make use of the new
technology. But this more complete base of information led to more conservative
analysis, and to consistent underestimating. The less information we had, the more we
overestimated; the more information we had, the more we underestimated. We hedged
against uncertainty, but felt constrained by evidence. This is not to say we would have
been better off with less information. What it does say is that we should guard against
this tendency to overestimate in the absence of hard evidence, and to underestimate in
its presence. Another phenomenon to which we seem to fall prey is the one to which
Wohlstetter refers in his article, and which Taylor cites: the intrinsic uncertainty of
predicting the size and mixture of a deployment program, because decisions on size or
mix can be reversed between the time of our prediction and the time of actual
deployment. In 1958, for example, we overestimated the strength of Soviet fighter
forces for the early Sixties, but this resulted mainly from Khrushchev's unanticipated
decision in the interim to cut back Soviet general purpose forces in favor of missiles.
Indeed, our estimates-right or wrong-can in themselves have an impact on
force-level decisions, in both the U.S. and the USSR. The infamous "missile gap"
gave strong impetus to U.S. strategic weapon programs, which contributed at least
indirectly to Khrushchev's decision to put strategic missiles into Cuba. Soviet
embarrassment in Cuba in turn gave impetus to the USSR's strategic weapon
programs. The ensuing underestimates of the growth in Soviet ICBM forces resulted
at least partly from our failure to take full account of this action-reaction
phenomenon. The full effect of such interactions is so unpredictable, however, as to
make complete accounting difficult if not impossible-even in retrospect.
In the submarine force estimates, we ran into a different problem: mirror-
imaging-the tendency to use American experience as the means to measure likely
Soviet goals. In the early Sixties, we estimated (without any direct evidence) that the
USSR would follow the U.S. lead and build a sizable force of ballistic missile
submarines. What we did not recognize at the time was that the Soviets saw a need for
more cruise missile submarines-to defend themselves against U.S. aircraft
carriers-and that the Russians were having difficulty developing an acceptable
ballistic missile submarine system. The result was that full-scale production of
modern ballistic missile submarines did not start in the USSR until the mid-Sixties,
which put our estimates of the early Sixties way over the mark. I would like to think
that the later and correct five-year estimates of 1968 and 1969 resulted from my
having written them, but in reality they resulted merely from straight line projections
of identifiable production rates-on up to the "mirror-imaged" and now
demonstrably low estimate of as many as 50 modern ballistic missile submarines. a
figure we then believed to be the ultimate Soviet goal.
The list of quantitative errors, then, is a long one. But this, perhaps, is not so
surprising, considering the number of specific estimates made and the limited amount
of information available to us at the time they were made-at least in the early part of
Appgved For Release 2005/06/22: CIA-RDP78T03194A000400010012. RET
Approved For Release 2005/06/22 : CIA-RDP78TO3194A00gg00010012-8
Military Estimates
the period. The future is not likely to be any brighter. We will not be wanting for
sophisticated intelligence collection systems, but difficult-to-observe qualitative
improvements in the weapons already deployed will be as important to us in the
future as changes in the observable number of delivery vehicles have been in the past.
In an arms control environment, where most of the developments prohibited by a
treaty will be those which are relatively easy to monitor, we will not only have to
watch for violations of the agreements themselves but will have to try to follow the
variety of more difficult-to-observe improvements in Soviet weapon systems which
will be permitted and which are likely to proliferate under such agreements. More
than ever, the task for intelligence will be to observe the unobservable-and as the
Soviets become more cognizant of our intelligence sources and methods, more things
are likely to become less observable.
SECRA proved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A00 SECRET 012-8
For the preceding issue, Robert M. Clark provided a layman's guide to the birth,
developments, and some of the basic tenets of Scientific and Technical Intelligence, possibly with a
somewhat jaundiced eye and with tongue rather firmly in cheek. In the interest of balance, we provide
the answer he provoked from fellow S&Tman Donald C. Brown.
The Editor
ANOTHER VIEW OF S&T ANALYSIS
It was with a feeling akin to deja vu that I read Dr. Clark's article. What he
describes is very familiar, but it just isn't the S&T intelligence that I know.
With the large variety of individuals, government agencies, quasi-official bodies,
segments of private industry, and an assortment of fans involved in some way with
scientific and technical intelligence, it is not surprising that there are so many views
on what this area of the intelligence art is. Perhaps Dr. Clark's article can serve as a
starting point for a more rigorous development of the philosophy of what technical
intelligence ought to be. Studies, as the professional journal of Intelligence, would fill a
real need by opening its pages to such a continuing dialogue. I shall return to this
point later with some suggestions.
Although I think I agree with many of the things Bob Clark says, I profoundly
disagree with others, and all in all I must conclude that he and I are viewing S&T
Intelligence darkly through different glasses. His view appears to me in part to be too
simplistic, in part to dwell on peripheral issues at the expense of the central point, and
in part to be just plain wrong. A cynicism which I believe to be unwarranted crops up
here and there against the intelligence "outsider," also.
A few of Clark's specific points bear discussion.
To Describe a Weapon is to Know All
Early on in the article, we come upon the surprising statement, "Once you know
the characteristics of an enemy weapon system then his tactics and strategy for using
the weapon system follow naturally" (!). It would be useful to know more clearly what
the author means by tactics and strategy, but this statement does little justice to the
complex distinctions between capabilities and intentions. The example the author
uses, of the ICBM accuracy needed to disable Minuteman missile silos, appears
plausible at first glance, but one need only follow the debate generated during the
past year by Dr. Schlesinger's public musings on the proper use of this country's very
accurate missiles to recognize that strategy and tactics are not wholly determined by a
weapon's technical characteristics.
I would agree that it should be a goal of S&T Intelligence to describe weapon
system characteristics, but there is much more to assessing the meaning of the system
than sheer mechanical description.
Proving A Negative is a Fool's Errand
Under "Case #2" ("we develop weapons-they don't develop weapons"), the
author cites several examples of estimates made in the absence of real evidence, then
SECRET
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400110012-8
MORI/HRP PAGES 25-28
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET S&T Analysis
complains about the difficulties of refuting such assertions. I suppose all of us analysts
have complained at some point in our careers about this problem. The issue in my
view, however, is not, how do we suppress the asserters?, but, how can S&T
intelligence improve its capability to deal with important questions? Certainly, if we
concern ourselves only with questions on which we have "adequate" information we
will be in danger of propagating a distorted picture. There is much that we can do in
the way of identifying the information needed to answer important questions, and
much that we can do to collect it, but there will always be inadequate information.
Someone needs to give some deep thought to a better way of usefully illuminating the
issues for which hard intelligence information does not exist.
We Tend to Ignore Developments That Don't Mirror Our Own
In "Case #3" ("we don't develop weapons-they develop weapons"), Clark
oversimplifies the history of U.S. intelligence interest in anti-ship cruise missiles by
confusing the missile with the system. It is true that the threat posed to U.S. naval
forces is better appreciated today than it was in the early 1960s, but that is because
the threat is greater, not necessarily because the intelligence community was slow on
the uptake. It takes more than a missile to threaten a ship: the missile must first be
placed within firing range of the ship and provided with a knowledge of where it
should go to hit the ship. In truth, the Soviet anti-ship missile forces did not pose a
serious threat to the U.S. surface fleet 15 years ago. The fact that they do today is
attributable to the tremendous growth and expansion of deployment of the Soviet
navy and the consequent growth of total cruise missile system capabilities-launch
platforms, targeting systems, and communications, as well as missiles.
There is nevertheless a lesson in this example. S&T Intelligence can and must do
a better job of anticipating problems and putting itself in a position to cope with them
when they become real.
Phantoms in the Night
I'm not sure what point Clark is trying to make in his discussion of "Case 14"
("we don't develop weapons-they don't develop weapons"), but I gather that he
feels frustrated answering the "what if . . . ?" questions such as the one on SAM
upgrade.
On the contrary, I feel that CIA's S&T Intelligence took a large step toward
maturity as an analytic discipline during the SAM Upgrade Era of the late 1960s. It
was certainly an unconventional issue in its time and one not without its frustrations.
(One of my favorite memories is of a non-senior CIA official summing up his
exasperation before an august review panel with the not-quite-technical argument,
"What I don't understand is how the U.S. can't build an effective ABM system after
spending ten years and billions of dollars, and you think the Soviets can do it with a
bunch of tin cans.") But those of us who were intimately involved in the issue are a
little proud that we were pushed by our management into wading into an argument
that went against our intuition (a "stupid" hypothesis), and treating it from a strictly
analytical viewpoint. It was a tough problem, and the stakes were potentially high,
but isn't that exactly the sort of thing S&T Intelligence should be doing-reducing
the uncertainties in the information used by policy makers.
The lesson I carried away from the SAM Upgrade Blues is that S&T Intelligence
must be more open to unconventional approaches, and we must always be prepared
to make our case on hard-headed technical analysis and not on emotion. Steps have
Appro7kd For Release 2005/06/22 : CIA-RDP78T03194A0004000100125hCRET
Approved For Release 2005/06/22: CIA-RDP78T03194A0004E ~1.0012-8
S&T Analysis
already been taken within the DDS&T to examine such "wild" schemes ourselves
rather than waiting to be surprised by outsiders.
The Truth Shall Make You Free
Clark says, "The objective of any intelligence analysis is the truth ...." That's a
pretty highfalutin notion of our calling, especially since I think most people would be
hard pressed to say what the truth might be in most of the issues on which we work. I
certainly don't want to see the experiments which demonstrate the truth about the
accuracy of Soviet ICBMs against the U.S. or the number of Minuteman reentry
vehicles the Moscow ABM system can intercept.
I would prefer to see S&T Intelligence aim for something a little more
attainable-and understandable. Part of that objective might be to describe and
analyze foreign weapon systems and technologies in a way that is of most use to U.S.
policy makers. How to meet this goal should be the subject of prolonged discussion,
but I think a central feature of any attempt should be to erect a rigorous logical
framework for each analysis so that the user can clearly understand its underlying
assumptions and the limits to its utility. I am reasonably sure of one thing: We can
only reduce the value of our efforts by any pretense that we are revealing abstract
truth.
Inexpert Experts
On the subject of experts, Clark seems to miss the forest for the trees. By his
definition, I gather, the expert is the tradition of someone from out of town who
carries a briefcase. He should be more selective. The test of expertise is not hard to
apply, and experts in and out of the official intelligence community have contributed
in every facet of our work.
The tale of the ABM radar used to illustrate the caution about experts seems to
me to have most of the characteristics of a shaggy dog story. All intelligence problems
include different and often contradictory hypotheses at first (else, would they be
problems)? As evidence accumulates (in the case of the ABM radar, as construction
progressed), we hope we can narrow the bounds on the uncertainty. But what is the
point of the tale? I contend that in the intelligence trade it is of little value to be right if
your reasoning is not persuasive, and apparently, in Clark's example, those who
eventually proved correct about the radar were unable to establish their case
persuasively. Even guessers can be correct, but we are not in the business of guessing.
Those Perfidious Contractors
The section on contractors illustrates the ancient maxim: All generalizations are
wrong, including this one. It is not hard to understand, when one is exposed to a
philosophy as cynical as this, why Clark has had little success with contractors.
Of course a contractor is in the business for the money, much as Clark and I
always cash our pay checks. If you can clearly define a problem which you can't solve
yourself, if you can make a contractor understand your problem, if you have
investigated the contractor's capabilities thoroughly enough to convince yourself that
he can solve the problem, and if you supply him with the needed information, then
you will probably be satisfied with the results. If you can't do those things, then you
have no right to expect good results.
SECRET 27
Approved For Release 2005/06/22 : CIA-RDP78T03194A000400010012-8
Approved For Release 2005/06/22 : CIA-RDP78TO3194A000400010012-8
SECRET S&T Analysis