STUDIES IN INTELLIGENCE [Vol. 19 No. 3, Fall 1975]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78T03194A000400010014-6
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
57
Document Creation Date: 
December 16, 2016
Document Release Date: 
December 26, 2004
Sequence Number: 
14
Case Number: 
Publication Date: 
January 1, 1975
Content Type: 
IS
File: 
AttachmentSize
PDF icon CIA-RDP78T03194A000400010014-6.pdf4.32 MB
Body: 
25X1 Approved For Re - T03194A000400010014-6 cTUDIES II INTELLIGENCE VOL. 19 NO. 3 FALL 1975 CENTRAL INTELLIGENCE AGENCY 25X1 ARCHNAL RECORD PLEASE RETURN TO AGENCY ARCHIVES, BLDG. Approved Foil Approved For Release 4A000400010014-6 SECURITY PRECAUTIONS Materials in the Studies are in general to be reserved to US per- sonnel holding appropriate clearances. The existence of this journal is to be treated as information privy to the US official community. All copies of each issue beginning Summer 1964 are numbered serially and subject to recall. All opinions expressed in the Studies are those of the authors. They do not necessarily represent the official views of the Central Intelligence Agency or any other component of the intelligence community. WARNING NOTICE Sensitive Intelligence Sources and Methods Involved NATIONAL SECURITY INFORMATION Unauthorized Disclosure Subject to Criminal Sanctions 25X1 25X1 25X1 25X1 Approved For Rele4se 2005/01/26 : CIA-RDP78T031914A000400010014-6 25X1 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Next 1 Page(s) In Document Exempt Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET NOFORN CONTENTS Page Soviet Use of Assassination and Kidnaping ........................... 1 A CIA Memorandum of 1964. UNCLASSIFIED Estimating Soviet Gold Production ..................... Richard Flynn 11 A case study of the Muruntau Gold Plant. SECRET NFD The Great Chinese Mounds Puzzle ...................... Bruce Smith 23 From SAWRF to FADS to LMS, SECRET NFD The CIA Operations Center .. Paul H. Corscadden and H. Lawrence Sandall 37 A 24-hour command post. CONFIDENTIAL Intelligence in Recent Public Literature ............................. SECRET Approved For Release 2005/01/ rjfDP78T03194A000400010014-3; 25X1 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 UNCLASSIFIED A 1964 view of KGB methods SOVIET USE OF ASSASSINATION AND KIDNAPING* It has long been known that the Soviet state security service (currently the KGB) resorts to abduction and murder to combat what are considered to be actual or potential threats to the Soviet regime. These techniques, frequently designated as "executive action"** and known within the KGB as "liquid affairs" (Mokryye Dela), can be and are employed abroad as well as within the borders of the USSR. They have been used against Soviet citizens, Soviet emigres, and even foreign nationals. A list of those who have fallen victim to such action over the years would be a very long one and would include even the co-founder of the Soviet state, Leon Trotsky. Several well- known Soviet assassination operations which have occurred since the rise of Khrushchev attest .to the fact that the present leadership of the USSR still employs this method of dealing with its enemies. The sudden disappearance or unexpected death of a person known to possess anti- Soviet convictions immediately raises the suspicion of Soviet involvement. Because it is often impossible to prove who is responsible for such incidents, Soviet intelligence is frequently blamed and is undoubtedly credited with successes it actually has not achieved. On the other hand, even in cases where the Soviet hand is obvious, investigation often produces only fragmentary information, due to the KGB ability to camouflage its trail. In addition, Soviet intelligence is doubtless involved in incidents that never become officially recognized as executive action, such as assassinations which are recorded as accidents, suicides, or natural deaths. All of the factors cited above have helped to obscure Soviet practices in regard to assassinations and abductions outside the USSR. Certain observations cart be made, however, which will help to put these practices into their proper perspective. These observations are set forth in the following paragraphs and are based on information produced by the investigation of known or suspected Soviet operations which have occurred since World War II, as well as from information supplied by defectors during this period. Targets The large numbers of former citizens of the USSR (and of Imperial Russia) living abroad in protest against the Soviet regime have been a continuing cause for concern to the Soviets since the early twenties. Reducing and keeping to a minimum the potential threat to the regime represented by these emigres is one of the functions of the state security service. Soviet intelligence seeks to neutralize, discredit and destroy anti-Soviet groups by luring emigres back to the USSR, by penetrating emigre organizations, and by kidnaping or murdering individual emigres considered to be particularly dangerous. Emigre leaders who participate in anti-Soviet activities have been primary targets of Soviet abduction or assassination operations. Such operations are sometimes *This is a CIA Memorandum prepared in February 1964 for the President's Commission on the Assassination of President Kennedy (The Warren Commission) and declassified in 1971. It should be pointed out that the memorandum sets forth KGB policy and techniques as of 1964. **Strictly speaking, the term "executive action" emcompasses diversionary activities (such as sabotage) as well as terroristic activities. This paper, however, discusses only the terroristic aspect of Soviet executive action, namely, kidnaping and assassination. Maxg IFE$r Release 2005/01/26: CIA-RDP78TO3194A000400010011-6 MORI Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 UNCLASSIFIED KGB Terrorism, 1964 designed to demonstrate that the Soviet regime can strike its enemies anywhere in the world. The Soviets hope thereby to create fear, unrest, confusion, and dissension within emigre organizations, and at the same time deter other emigres from joining their ranks. The planned assassination in February 1954 of Georgiy S. Okolovich, leader of the NTS emigre organization, was to have been a particularly significant step toward achieving this goal, but the act was not carried out because of the defection of state security Captain Nikolay Khokhlov. On the other hand, assassinations of some emigre leaders have been carried out so skillfully as to leave the impression that the victims died from natural causes. Details of some of the techniques used to achieve this were brought to light in 1961 when professional KGB assassin Bogdan Stashinskiy defected to the West and revealed that he had successfully performed two such missions. In 1957 he killed Ukrainian emigre writer Lev Rebet in Munich with a poison vapor gun which left the victim dead of an apparent heart attack. In 1959, the same type of weapon was used on Ukrainian emigre leader Stepan Bandera, although Bandera's death was never fully accepted as having been from natural causes. These cases are discussed in more detail later in this paper. Executive action is also triggered by any signs of possible disloyalty on the part of Soviet officials abroad. The Soviets have gone to great lengths in the past to silence their intelligence officers who have defected, as evidenced by the assassination of former state security officer Ignace Reiss in 1937 and the unexplained "suicide" of former Soviet military intelligence officer Walter Krivitsky in 1941. In the post-war era, determination to prevent such defections was vividly demonstrated by the unsuccessful attempt to force the wife of Vladimir Petrov to return to the Soviet Union from Australia after his defection in April 1954. The practice of physical restraint applies with equal force to other Soviet officials who attempt to defect or are suspected of being on the verge of doing so. Examples were witnessed in Calcutta, India in January 1958 and Rangoon, Burma in May 1959. The respective victims, Aleksandr F. Zelenovskiy and Mikhail I. Strygin, were both portrayed by the Soviets as mental cases, were taken into custody by means of strong-arm tactics, and were forcibly removed to the USSR in a matter of days. Foreign nationals are sometimes victims of Soviet executive action. The targets who fall into this category may be indigenous agents who have become suspect, or former citizens of satellite countries who have turned against the Soviet regime. In the latter case, actions against such individuals are usually carried out through the corresponding satellite intelligence service, aided and abetted by Soviet state security. The abductions of Dr. Walter Linse and Bohumil Lausman exemplify this type of operation. Linse had fled East Germany in 1947 and later became a leader of the "Society of Free jurists," an anti-Communist organization that the Soviets considered particularly dangerous. He was kidnaped from West Berlin in July 1952 by agents of the East German security service, with the full knowledge and approval of Soviet state security; he was later turned over to Soviet authorities in Karlshorst, East Berlin, and eventually sentenced to imprisonment in the USSR.* Lausman, prominent Czech anti- Communist who fled to the West in 1949, disappeared from Vienna in 1953. It was later learned that he had been kidnaped by agents of Czech intelligence, with the * Linse died in a Soviet prison camp 15 December 1953, according to a statement issued by the Soviet Red Cross on 8 Jun(- 1960, a virtual admission of Soviet responsibility for the kidnaping. The cited date of his death is at variance, however, with information from fellow prisoners of Linse who reported having seen him in 1954 and 1955. Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 2 UNCLASSIFIED Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 KGB Terrorism, 1964 UNCLASSIFIED official sanction of Moscow. The Soviet state security rezidentura in Vienna also had been directed to assist the operation by supplying a car for transportating Lausman to Prague and arranging for the vehicle to have free passage through the Soviet Zone of Austria. Foreign political leaders are also potential targets of Soviet executive action operations and, according to recent information, the KGB's executive action component includes such persons among its targets. There is, however, no evidence proving that any Western leader has been the victim of Soviet executive action. Organization The executive action component of the Soviet government is currently designated the 13th Department of the KGB intelligence directorate (First Chief Directorate). The earliest known predecessor of the 13th Department was the so-called "Directorate of Special Tasks" reportedly established within the NKVD in December 1936 for terror purposes. During World War II terror missions were performed by the NKGB Fourth Directorate, which was responsible for partisan activity behind German lines. In late 1945 or early 1946 this directorate was replaced by a unit of the MGB known as Spets Byuro #1, which was organized to retain Fourth Directorate personnel to support and direct partisan activities behind enemy lines in the event of a future war. In the summer of 1952, however, the long-range aspects of Spets Byuro #1 mission were abandoned, and emphasis was shifted to using all available agents for sabotage and other violent activities. Spets Byuro #1 was given a new, and at present still unknown, designation some time in 1953 and assigned to carry out "special action tasks," such as sabotage, political murders, and kidnapings. With the creation of the KGB in 1954, the executive action component was redesignated as the 13th Department. Although the jurisdiction of the department is global, its main target areas are the United States and members of Western treaty organizations. There is no evidence of the existence of any unit within the Soviet military intelligence component (the GRU) responsible for the type of executive action discussed in this paper, although the GRU reportedly can undertake such operations under certain circumstances. The 13th Department is believed to be divided into sections (otdeleniye) or directions (napravleniye) by countries or groups of countries, such as, for example, the United States ("the principal enemy"), England, Latin America, etc. At Moscow headquarters the department has approximately 50 to 60 experienced employees, and was last known to be headed by a General Rodin, who under the alias Korovin had previously been the KGB resident in Great Britian. Secrecy about the work of this department is maintained through the careful selection and training of its personnel; the officers do not discuss their experience among others; department documents are not circulated. In addition to headquarters personnel, the 13th Department has its own support officers in legal residencies in Western countries and in some satellite countries. Such support officers work under the instructions of the legal resident and the 13th Department. One of the more active groups is a unit in East Germany which numbers perhaps 20 to 30 persons. As of 1960 there was a group in China, but it probably no longer exists. Prior to 1955 there was also a group in Austria. In a country in which a support officer of the 13th Department is stationed, the legal resident and the headquarters department for that country are aware of the targets of the 13th Department in that country, although they are not aware of illegal agents who are in direct contact with the 13th Department. Release 2005/01/26: CIA-RDP78T03194A000400010014-i Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 UNCLASSIFIED KGB Terrorism, 1964 Although the 13th Department is the KGB's executive action component, the Emigre (Ninth) Department directs all operations, including assassination operations, against Soviet emigres. The Emigre Department's assassination operations, however, are believed to be conducted jointly with the 13th Department and sometimes other KGB components-for example, the counterintelligence directorate (Second Chief Directorate). The 13th Department also supports the Disinformation (12th) Department of the First Chief Directorate in the latter's covert propaganda campaigns aimed at the creation of confusion and panic in Western countries. An example is the campaign conducted, in 1959 and later, for the purpose of creating adverse world opinion toward West Germany. This campaign included setting fire to synagogues and painting swastika signs in public places, and attributing these acts to West Germans. Other operations in which both the 13th Department and the Disinformation Department are involved include attempts to remove the threat to Soviet interests posed by certain members of Western governments. Sometimes this entails arranging for the dismissal of such persons from public office, but in theory at least it could mean "eliminating" them physically. The defector Khokhlov described two laboratories associated with the executive action department. One produced special weapons and explosive devices; the other developed poisons and drugs for "special tasks." The explosives laboratory was located near Kuchino, outside Moscow, and was responsible for the development and production of weapons, from drawing up blueprints to melting and pouring bullets. In no case was assistance obtained from military ordnance or other outside agencies. The laboratory for poisons was supposedly a large and super-secret installation. No agents were permitted access to it or even knew of its location. Khokhlov could provide no first-hand information on it. Other sources, however, have reported the existence of this type of laboratory dating back to the purges in the late 1930's. A report from one source in 1954 described an experimental laboratory within Spets Byuro #1 known as the "Chamber" (Kamera). This laboratory conducted experiments on prisoners and persons subject to execution to test the effectiveness of different powders, beverages, and liquors, and various types of injections, as well as research on the use of hvpnotism to force prisoners to confess. Beside its staff, only certain high-level persons were permitted to enter its premises. Although its existence officially was kept a secret, it was generally suspected or known by many state security functionaries that a unit of this sort was maintained. The Soviet government allegedly abolished the "Kamera" in October 1953, according to an announcement made to selected state security and Party officials, attributing the establishment and operation of the laboratory solely to Beriya and his close associates. Whether or not this step actually was taken does not rule out the possibility, however, that the same type of unit continues to exist in some other form. Training for executive action operations was conducted at a base in Moscow by a staff of instructors who specialized in such subjects as the use of small arms, jujitsu, code, wireless, driving, surveillance, and photography. Although executive action operations outside the USSR are planned, directed, and sometimes carried out by state security staff personnel, a mission may also be performed by one or more agents recruited specifically for this prupose. Khokhlov himself, for instance, was categorically forbidden to assassinate Okolovich personally. Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 4 UNCLASSIFIED Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 KGB Terrorism, 1964 UNCLASSIFIED Two German agents, Hans Kukowitsch and Kurt Weber, were to carry out the deed under Khokhlov's supervision. This reflected Soviet theory that indigenous personnel would have better access to the target, and also had the advantage of avoiding direct Soviet attribution. It appears from the Stashinskiy case, however, that security considerations ruled out the involvement of non-Soviets in more recent operations. Even though some sources have made statements to the contrary, it appears that the agents (as opposed to staff employees like Stashinskiy) who perform executive action for the Soviets may be used for more than one mission of this nature. Khokhlov spoke of special executive action units known as "boyevaya gruppa" (literally, combat groups) which consisted of indigenous agents and/or Soviet illegal staff officers situated outside the borders of the USSR on the territory of hostile governments or in close proximity thereto. Such groups were armed and prepared to perform executive actions when required to do so, either in time of peace or war. A group of this type under the direction of the executive action department base at Karlshorst ostensibly was involved in the kidnaping of Dr. Alexander Trushnovich, an NTS leader in West Berlin, in April 1954, Khokhlov believed the abductors to have been recruited and organized by the East German security service at the request of the KGB chief at Karlshorst. The same type of group was mentioned in connection with the abduction of Dr. Linse; the actual abduction was reportedly performed by four German members of a "boyevaya gruppa" from East Germany. It is probable that such teams are a modern variation of the "mobile groups" described by a pre-war source as units dispatched from Moscow to foreign countries to assassinate Trotskyites and state security officers who refused to return to the USSR, as in the case of Reiss and possibly Krivitsky. Techniques Many known or suspected executive action cases in the post-way period have involved the use of poison rather than guns or explosives. It is conceivable that the Soviets tend to favor poisons because murders can be accomplished more surreptitiously in this manner and in some instances without leaving easily recognizable traces of foul play. Drugs are also used to incapacitate a person temporarily for abduction purposes, as reportedly happened in the Trushnovich case and in the kidnaping of another NTS member, Valeri P. Tremmel, from Linz, Austria in June 1954. There are, however, many unknown, uncontrollable factors in the use of poisons and drugs which limit and often preclude their usage. Probably the most important is the narrow span between a dose that will cause disability and one that will cause death. Dosages vary from one individual to another depending on weight, state of health, and how the poison enters the body. The type used obviously is determined by the result desired. It is no problem to cause death, but often difficult to control dosage successfully when the objective is to incapacitate an individual only temporarily. There appears to be no consistency in the use of poisons by Soviet intelligence to cause disability or death, or in the repetitious use of any one drug. Chemicals which have been used in cases known or suspected to be Soviet-instigated include arsenic, potassium cyanide, scopolamine, and thallium. Other likely substances are atropine, barbiturates, chloral hydrate, paraldehyde and Warfarin. Combinations of two or more substances may also be used, which further complicates diagnosis and tracing. One well-publicized poisoning case involved the defector Nikolay Khokhlov. Khokhlov suffered a sudden and severe illness while attending an anti-Communist ~rLc~ FF Release 2005/01/26 : CIA-RDP78T03194A000400010014- Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 UNCLASSIFIED KGB Terrorism, 1964 meeting in Frankfurt, Germany in September 1957. A positive diagnosis was precluded by the initial treatment given him at a German hospital, but there was evidence of his having been poisoned by a thallium derivative of arsenic and/or other chemical agents, and a strong possibility that the poison had been administered at RIS instigation. Khokhlov himself believed, and allegedly had supporting medical opinion, that he had been poisoned by radio-activated thallium. He believed that the poison was of Russian origin because it was such a complicated substance that it was difficult to analyze and had been carefully prepared to leave virtually no trace. A unique mechanism for administering poison was described by a knowledgeable source as a pneumatically operated poison ice "atomizer" which leaves no wound or other evidence of the cause of death. The equipment and techniques used in the poisoning of Rebet and Bandera are treated below in some detail as examples of the most recent and sophisticated methods in use by the KGB. Specific Cases 1. Stashinskiy: In November 1961 a Soviet intelligence officer, Bogdan Stashinskiy, surrendered to the West German police, stating that he had, acting under official orders, assassinated two individuals during the previous few years: Lev Rebet, a Ukrainian emigre writer, and Stepan Bandera, a leader of the Ukrainian Nationalist movement. In both cases, a similar type of weapon had been used: a gun which fired vaporized poison which killed almost instantly upon being inhaled. The properties of the killing agent were such that, until the defection of the assassin, both victims were officially believed to have died from heart attacks. In the case of Bandera, however, there was some unconfirmed suspicion of potassium cyanide poisioning, although there was insufficient evidence to prove it. The Weapon: The weapon used to assassinate Rebet was a light-weight aluminum cylinder, 15 to 18 cm. long and approximately 3 cm. in diameter, weighing about 200 grains. The cylinder was divided into three separate chambers, one of which contained liquid poison sealed hermetically into a plastic-type ampule container under low pressure. (At normal temperatures the poison would evaporate, disappearing without trace in about two minutes.) The three components could be assembled by means of a thread which allowed one part to screw into the other. The first component was the posion ampule portion, the front end of which had a fine metallic screen. The poison ampule fitted solidly against the walls of the metal cylinder. The center component contained a piston and a piston arm which extended into the third or activating component. The latter contained a spring-mounted activating arm which, when drawn back, armed the weapon. The releasing arm was appended to the third component at an angle, and was attached to the activating arm by means of a releasing catch. A small safety arm permitted the weapon to be placed in the safety position. The third component also contained a few grams of powder. The maximum effective range of the weapon was about one-half meter; at one and one-half meters the effect of the vapors would be questionable; and at two and one-half meters, the vapors would be totally ineffective. (The assassin was instructed to fire the weapon only inches from the face.) The weapon was activated as follows: The activating arm was pulled back and the safety released. The weapon was then activated. It was held in the palm of the hand in such a fashion that it fired when the user pressed the releasing arm towards the activating arm. The releasing arm, when pressed, acted upon the releasing catch, Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 6 UNCLASSIFIED Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 KGB Terrorism, 1964 UNCLASSIFIED permitting the 'spring-held activating arm to fly forward against the small charge of powder. The exploding powder (which made a noise approximating the sound of a loud handclap with the hands cupped) drove the piston arm forward, causing the piston to strike against the poison ampule. The poison was thus driven out through the fine screen in the form of a liquid spray. The weapon used for the second assassination was similar, except that it was double-barreled. Each barrel contained a charge of poison similar to that contained in the single-barreled weapon. The two barrels could be discharged separately, or together as a unit. Thus, in the event the first charge did not kill the victim, a second attempt could he made. The two barrels were welded together, and the weapon had two releasing arms, two releasing catches, two safeties, and two activating arms. The effect of the poison was the same. Utilization of the Weapon: For maximum effective results it is recommended that the liquid poison be shot directly into the face of the victim, in order to introduce the vapors most quickly into the respiratory system. Since the vapors rise upward very rapidly, the poison is still effective when aimed at the chest; conceivably, this would give sufficient time to allow the victim time to scream. Effects of the Poison: The effect of the poisonous vapors is such that the arteries which feed blood to the brain become paralyzed almost immediately. Absence of blood in the brain precipitates a normal paralysis of the brain or a heart attack, as a result of which the victim dies. The victim is clinically dead within one and one-half minutes after inhaling these poisonous vapors. After about five minutes the effect of the poison wears off entirely, permitting the arteries to return to their normal condition, leaving no trace of the killing agent which precipitated the paralysis or the heart attack. Allegedly, no foreign matter can be discovered in the body or on the clothes of the victim, no matter how thorough an autopsy or examination. The liquid spray can be seen as it leaves the nose of the weapon, however, and droplets can also be seen on the face of the victim. Stashinskiy claimed that before using the weapon on his first victim, he tested it on a dog. He fired the gun directly into the dog's face, holding his hand approximately one and one-half feet from its nose. Almost immediately after the liquid spray had hit its face, the dog rolled over, without making any sound whatever. It continued to writhe for almost three minutes, however, Stashinskiy was told that the poison affected a human much sooner, causing death within one and one-half minutes. Safety Precautions for the User: Stashinskiy was told that neither the poisonous liquid nor the fatal fumes affected any portion of the body other than the respiratory system, and that, since it could not enter the body through the skin or the pores, one could safely place his hands into a pail of the poison. Inasmuch as the weapon was held at arm's length when fired and the liquid spray ejected forward in a conical pattern, the user, under normal conditions, is safe from the effects of the poisonous vapors. Nevertheless, as an extra precaution, Stashinskiy was provided with counteractive agents to use if he so desired. Concealment Methods: For transportation, the weapon was transported hermetically sealed in a container, and inserted between sausages in a can which was itself hermetically sealed. It was suggested to Stashinskiy that he should carry the weapon to the site of the plannned assassination wrapped in a light newspaper, in uverdt%En- Release 2005/01/26 : CIA-RDP78TO3194A00040001001476 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 UNCLASSIFIED KGB Terrorism, 1964 which he had torn a small hole to enable him to reach the safety quickly just before using the weapon. Method of Attack: In the first assignment, Stashinskiy observed Rebet debarking from a streetcar at about 0930 hours. Observing that the victim was heading for his office, the assassin preceded him into the building and climbed the circular staircase to the first floor. On hearing Rebet's footsteps on the staircase, Stashinskiy turned and started walking down, keeping to the left, and carrying the weapon, wrapped in newspaper, in his right hand. The two met about halfway between the two floors. Firing directly into Rebet's face from a distance of approximately one-half meter, Stashinskiy continued walking downstairs without even breaking his pace. The victim lurched silently forward and fell on the staircase. While still in the building, Stashinskiy shook off the liquid drops from the weapon and put it in the breast pocket of his suit. (A laboratory examination of the suit later revealed nothing of significance.) Although he had no reason to believe that he had inhaled the poisonous fumes, he used the counteractive measures provided. He later disposed of the murder weapon in a shallow canal in the city. In carrying out his second mission, Stashinskiy used a similar approach. Having previously abandoned an attempt to corner Bandera in the latter's garage, the assassin gained entry to the victim's apartment house by reproducing a key which he had observed being used in the front door lock. On the day of the assassination, having seen Bandera drive into his driveway, Stashinskiy let himself into the apartment building and waited. Bandera, carrying several packages of fruit and vegetables in his right hand, entered the front door with the aid of a key which was on a key ring together with other keys. As he was attempting to disengage the key from the lock, Stashinskiy moved away from the elevator, where he had been standing, toward the front door. The weapon was in his hand with the safety released. As he walked past the victim, who was still trying to extricate the key from the lock, the assassin took the door handle with his left hand, as if to assist Bandera, asking him "Doesn't it work?" By this time, Bandera had succeeded in pulling the key out of the lock. Almost at the instant he replied "Yes, it works," Stashinskiy fired both barrels simultaneously into his face at almost point-blank range. Seeing the victim lurch backward and to the side, the assassin walked out of the apartment building and closed the front door. Although he slid not wait to see Bandera drop to the ground, Stashinskiy is certain that, contrary to press reports, the man did not scream or otherwise call for help. Stashinskiy later threw the murder weapon into the same canal in which he had discarded the first weapon. Although the press reported that Bandera had been attacked physically before he was poisoned, Stashinskiy insisted that he had used no force, since it had not been necessary to do so. Some newspapers also reported that Bandera had died of potassium cyanide poisoning. Stashinskiy claimed that he was told, and believes, that the chemical was not potassium cyanide, since (1) he thinks that substance could not have been introduced into the body by the method employed, and (2) he believes the RIS would have no reason to deceive him on this matter, especially since he had to be provided with counteractive precautions. Stashinskiy claimed that one of his Soviet contacts was pleased to learn that the police suspected potassium cyanide, as this allegedly indicated that the true cause of the victim's death was not evident. 11. Radio Free Europe: The New York Times reported on an attempt to poison the staff of RFE on November 21, 1959, by placing atropine in the salt shakers of the cafeteria used by Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 8 UNCLASSIFIED Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 KGB Terrorism, 1964 UNCLASSIFIED RFE personnel. Atropine is a derivative of the deadly nightshade plant; it can cause paralysis of death if taken in sufficient quantity. The amount of poison in each salt shaker was said to be 2.36% by weight of the contents. White crystalline alkaloid is indistinguishable from salt. (Unclassified, from NYT, 17 December 1959.) In March 1955, Lisa Stein, an interviewer with RIAS, the American propaganda radio station in West Germany ("Radio in American Sector"), was fed candy containing the highly dangerous poison scopolamine. (Scopolamine is used in the so- called "twilight sleep." Given in small doses it induces a kind of euphoria; in larger doses it is supposed to be a deadly poison.) It was intended that Frau Stein would become ill and would be abducted. The plan was that the agent-someone whom Frau Stein trusted and with whom she was meeting in a West Berlin cafe-would offer the poisoned candy toward the end of the meeting. The lady was expected to become ill while walking from the cafe to her nearby residence. On becoming unconscious, she was to he picked up by a waiting car which would appear to be passing by chance. The plot was not carried to fruition, however, because Frau Stein did not become ill until she was near her apartment, at which point neighbors came to her aid and she was moved to a hospital. She was severely ill for 48 hours, after which an antidote was found. (Unclassified, from the testimony of Theodor Hans, formerly with U.S. Military Intelligence, Germany, September 21, 1960, before a Congressional investigating committee.) Another weapon used is described as a noiseless gas pistol, powered by a 300-volt battery, which fires a lethal, odorless, unidentified gas. The gas acts in two or three seconds, and is effective up to 15 or 20 meters, The pistol has three buttons: one for arming, one for firing, and the third for recharging the battery. (After 50 firings the battery may be recharged by plugging a transformer into normal house power source.) The piston is normally fired 20 times, very rapidly and automatically-" Bzzzd. " (Although one squirt could kill, 20 squirts are emitted in order to saturate the area, inasmuch as the gun is fired at a silhouette, rather than at a point.) The gas shot by the pistol would penetrate the victim's clothing and enter the skin. There is allegedly no danger to the user. Since World War II, and especially in the years since Stalin's death, assassination attempts abroad have become increasingly rare. Currently the emphasis in the executive action field is placed on sabotage and sabotage planning, rather than terrorism against individuals. The Soviets now apparently resort to murder only in the case of persons considered especially dangerous to the regime and who, for one reason or another, cannot be kidnaped. A kidnaped person is obviously more valuable inasmuch as the Soviets may be able to extract from him information of interest, as well as use him for propaganda purposes by making it appear that he defected to the Soviet side of his own fee will. This course was followed in the case of Dr. Trushnovich. It is also likely that the Soviets find it increasingly difficult to find persons willing to undertake murder assignments, while the same may not be true of abduction operations. It can further be conjectured that the Soviets are now more concerned about the adverse publicity generated by Soviet assassinations in general than they were in previous years. ggF Release 2005/01/26 : CIA-RDP78T03194A000400010014e6 &LCFkx Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 UNCLASSIFIED KGB Terrorism, 1964 [n this connection, comments made by state security defectors Petr Deryabin and Yurv Rastvorov in 1954 about what the Soviets would or would not do are still of interest. Both believed that the Soviets would murder one of their officials on the verge of defecting if that were the only way of preventing the act. The same would apply to a Soviet official who had just defected, if thereby state secrets could be preserved, and if they believed that killing him would not bring about a more adverse situation in terms of politics and propaganda than already existed. Deryabin and Rastvorov doubted, however, that the Soviets would murder an official who had been in non-Communist hands long enough to have been exploited for intelligence and propaganda purposes. While both granted that in particular cases the Soviets might go to any extreme, they both believed, generally speaking, that the adverse propaganda resulting from such an act would negate its original purpose. On the other hand, Khokhlov, who might have been in a better position to know, has stated without qualification that the Soviets would continue to assassinate defectors in the future. The threat of Soviet executive action against defectors is also considered a real one by Reino Hayhanen, who defected from the KGB in 1957. A still more recent Soviet intelligence source also believes that standard Soviet practice is to mount a kidnaping or assassination operation "through all intelligence opportunities" against defectors from the Soviet intelligence services. Deryabin and Rastvorov further agreed that the Soviets, without hesitation, would forcibly return to the USSR someone on the verge of defecting at a mission abroad. This was borne out by the aforementioned Strygin and Zelenovskiy cases. Deryabin and Rastvorov also believed that the same policy would apply to a Soviet official who had just defected, or one who had been in non-Communist hands long enough to have been exploited for intelligence and propaganda purposes, if the capability existed for returning him physically to the USSR. Lastly, Deryabin believed that the assassination of an Allied official would be highly unlikely and probably unprofitable. He also doubted that the Soviets would attempt to kidnap any U.S. officials unless they were particularly knowledgeable. Such an incident would not be worth the trouble for an average official, but an important person conceivably would have sufficient information to make it worthwhile. AFproved For Release 2005/01/26 : CIA-RDP78T03194A08~4&0R4S001E4-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET A case study of the Muruntau Gold Plant Richard Flynn The USSR has long maintained a veil of strict, unbroken secrecy on domestic production of gold. The State Secrets Decree of 1947, amended in 1958, forbids disclosure of data on the quantity of gold produced, plan goals, production capacity of plants, and the size of gold deposits. To help ensure a reticent attitude among knowledgeable Soviet officials, the State Secrets Decree carries harsh criminal sanctions for violation of its provisions. Since the early 1950s, intelligence analysts in the Office of Economic Research (OER) and its predecessor, the Office of Research and Reports, have tried to unravel the mystery of Soviet gold production. By effective use of all-source intelligence-and with expert assistance of other components of the intelligence community, non-USIB agencies, and sources in the business community-OER was able to penetrate much of the official blackout on gold production in the USSR and to develop estimates that are accepted as the official position of the United States government and by the intelligence services of allied nations as well. Intelligence methods used to estimate gold production in the USSR are highlighted by a new methodology developed to estimate the capacity of the Muruntau Gold Plant, the largest gold plant in the world.* The Basic Methodology Gold is produced in the USSR by two meth(As: by mining placer and vein deposits, and by recovery as a by-product in the processing of other non-ferrous metals such as copper, leads, and zinc. The Northeast Region, which consists of Magadanskaya Oblast and the Yakutskaya ASSR, is the country's largest gold-producing region. Open source Soviet literature revealed that the Northeast Region accounted for 60 to 65 percent of Soviet production of mined gold in the late 1950s. The rest was produced mainly in the Lena area of Irkutsk Oblast, the Transbaikal Region, the Kazakh SSR, and scattered locations in the Ural Mountains. Annual plan fulfillment data indicated that production of mined gold in other parts of the USSR was increasing about as rapidly as it was in the Northeast Region. Hence, the geographic distribution of mined gold production in the USSR was not changing much from year to year. Total Soviet production of mined gold thus could reasonably be estimated because two critical parts of the puzzle were known: a) the amount of gold produced in the Northeast Region, and b) this region's share of total Soviet production of mined gold. Production of gold derived from by-product recovery was estimated using a weighted average recovery factor of 35 grams of gold (slightly more than 1 troy ounce) per ton of refined copper in conjunction with previously developed estimates of Soviet *Many CIA personnel made valuable contributions to the original OER report on which this article is based, in particular John Keilty (OER); Mrs. Louise Noyes, John Jackson, and Richard Ordemann (IAS); Will Rogers (OGCR); and George Gilbert (DCD). MORI/HRP Shoved For Release 2005/01/26: CIA-RDP78T03194A000400010014-6 from pg 11-22 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Gold Production copper production. This average recovery factor was developed using information on average gold recovery at each copper refinery in the USSR. With these established tools, OER analysts developed estimates of annual Soviet gold production covering the period from 1957 through 1968. (See Table 1.) Gradually, our confidence in the methodology increased, but we were aware of the fact that it hinged precariously on one key relationship: that gold production in the Northeast Region would remain a relatively constant share of total Soviet production of mined gold. In the late 1960s, evidence began to mount that this relationship of the Northeast to total production was about to change. The Soviets were building a huge gold processing plant outside the Northeast Region at Muruntau in the Uzbek SSR. The sheer size of the project suggested that the plant would produce large amounts of gold. New tools had to be developed to estimate the capacity of the Muruntau gold plant. Muruntau-"Nose Mountain" for those not fluent in Uzbek-came to the attention of the intelligence community in 1964. In that year, the Soviet press began reporting that huge deposits of gold had been discovered at Muruntau in the Kyzyl- Kum desert of central Uzbekistan. The Soviet press first announced that Muruntau was the largest deposit of gold in the USSR. Later reports claimed that Muruntau was the largest gold deposit in the world. overhead photography of the Muruntau area in 1965 revealed evidence of large- scale geological prospecting, the possible beginning of an open pit mine, and a Gold Production in the USSR, 1957-68 (in Metric Tons) Mined Gold Northeast Region Other Areas By-Product* total 1957 ............... 48 32 14 94 1958 ............... 51 34 14 99 1959 ............... 55 35 15 105 1960 ............... 58 36 17 111 1961 ............... 62 38 18 118 1962 ............... 68 38 19 125 1963 ............... 71 42 21 134 1964 ............... 77 43 23 143 1965 ............... 86 44 24 154 1966 ............... 92 46 26 164 1967 ............... 96 48 28 172 1968 ............... 99 51 32 182 `13y-product gold is obtained at the copper refineries located at Kyshtym, Norilsk, Pyshma (RSFSR); Ralkhash, Dzhezkazgan, Irtysh (Kazakh SSR); Alaverdi (Armenian SSR); and Almalyk (t zbek SSR). /pproved For Release 2005/01/26 : CIA-RDP78T03194A0004000IM Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Gold Production SECRET considerable amount of unidentified construction. Except for general background purposes, however, OER analysts could do little with this photographic information. The June 1966 issue of Soviet Life suggested that the Muruntau deposit might be about the same size as the Kalgoorlie deposit in Western Australia, which produced about 20 tons of gold annually. Thus, until more information became available, OER tentatively estimated that upon completion Muruntau would produce about 20 tons of gold annually. During 1971-73, however, as overhead photographic coverage of the Muruntau complex improved, it became evident that OER's estimate was inconsistent with the size of the project and its rate of construction. The observed scale of activity at Muruntau gave credibility to claims made in the Soviet press that Muruntau would be the largest gold plant in the USSR and stimulated a re-examination of the plant's production capacity. A systematic reassessment was started in 1972, which resulted in a revised estimate of Muruntau's production capacity that was almost seven times the original OER estimate and almost 25 times estimates made by other intelligence services. Exploiting the Photography At the outset, we decided to test the feasibility of developing a methodology based on high resolution overhead photography. Although OER had used, satellite photography to estimate Soviet production of copper and aluminum, photography had never been used to estimate the production capacity of a Soviet gold plant. In the early stages of the research, no one knew if photography could be used for this purpose. Our confidence in this attempt was increased by an idea an OER analyst received from a televised news account of the damage done to a sewage treatment plant by Hurricane Agnes. A plant engineer interviewed by TV reporters commented that there was a direct correlation between the size of the treatment tanks that had been damaged and the amount of sewage the plant could process. Photography of the Muruntau plant revealed circular tanks, similar to those at the sewage treatment plant (presumably processing different materials), and we reasoned that a correlation should also exist between the size and capacity of the tanks at Muruntau. Experts at the U.S. Bureau of Mines confirmed this, stating that as a general rule, the processing of one ton of ore per day requires three to six square feet of surface area on thickening tanks with a depth of 20 feet, the depth indicated by photography of Muruntau. This correlation is a standard engineering yardstick used worldwide to rate the capacity of gold plants, with the exact amount of surface area required depending on the elevation of the plant, the type of ore being processed, and the metallurgical process used. The Imagery Analysis Service and the Office of Geographic and Cartographic Research were asked to perform a detailed photographic and geographic analysis of the Muruntau complex. Meanwhile, efforts were started-with the assistance of the U.S. Bureau of Mines, the U.S. Geological Survey, the Colorado School of Mines, and two of the largest U.S. gold mining companies-to ascertain the geological composition of the Muruntau ore deposit and to identify the production process used at the Mauruntau plant. The Results: Elevation Experience of U.S. mining engineers indicated that elevation affects the correlation between the surface area of thickening tanks and tank capacity. As a Spnroved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET Gold Production general rule, more surface area is required as the elevation of the plant increases because of lower barometric air pressure. The Muruntau plant is 1300 feet above sea level and lies in a hilly, arid region, similar in climate and terrain to the high desert country of northern Nevada. Ascertaining the elevation of the Muruntau plant helped U.S. engineers to narrow the range of estimate of thickening tank surface required per ton of processing capability. Support Facilities Because of the relative isolation of Muruntau-roughly 250 nautical miles west of "Tashkent, the nearest population center of any significance-the Soviets had to build extensive support facilities. These included 165 miles of rail line from the nearest terminal at Navoi, road links and powerlines, and a 155-mile water supply system from the Amu Darya river. Between 1966 and 1970 a new permanent settlement was built about 25 miles west of the plant to provide housing and day-to-day services for the Muruntau labor force. This settlement, called Zarafshan ("bearer of gold" in the Uzbek vernacular), eventually will grow to a population of 40,000. In addition, there are three smaller housing components at the Muruntau site: housing for about 500 workers near the open pit mines; barracks for about 1,000 construction troops near the processing plant; and a prison compound for about 800 forced laborers also close to the processing plant. The prison labor is used in the dangerous task of building the underground mine. The Ore Deposit Intensive geological prospecting of the Kyzyl-Kum desert, involving some 3,000 people at its height, began in 1959 and continued at least through 1968. The decision to build the Muruntau plant apparently was based on estimates made during the early 1960s of gold in formations near the surface. This ore, which lies only six to ten feet beneath the surface in some areas, requires the removal of only light overburden and thus is suitable for cheap open-pit mining operations. Exploration from 1966 to 1968 revealed that vast reserves of gold also existed at depths as much as 7,000 feet below the surface. This ore apparently has a higher gold content than that near the surface. In 1969 the Soviets reported that the Muruntau deposit was twice as large as originally believed and that it was the world's largest proved gold deposit, with reserves that will last at least several decades. At Muruntau the gold appears in quartz veins, similar to the Australian deposits at Ballarat and Castlemine and to formations of the Homestake gold deposit in South Dakota. According to the U.S. Geological Survey, the Muruntau deposit is described technically as a low-sulfide, quartz-pyrite-arsenopyrite formation. The gold content of the Muruntau deposit could not be ascertained exactly. However, we had good reasons for believing that it was not less than 0.15 troy ounce of gold per ton of ore-about one-half the gold content of typical ores mined in the United States and South Africa. First, experts in the U.S. gold industry and U.S. Bureau of Mines estimated a probable gold content of at least 0.15 troy ounce per ton based on a study of the Muruntau deposit by the late Mr. Douglas Alverson of the U.S. Geological Survey. Mr. Alverson, a professional geologist and fluent Russian linguist, provided OER with a detailed study of the Muruntau deposit along with comparisons of this deposit with analogous ore bodies in non-Communist countries. 14pproved For Release 2005/01/26: CIA-RDP78T03194A00040005'IEOCQ~E4~6 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Gold Production SECRET Second, published results of tests conducted by the Soviets in 1967 on ore samples from new quartz deposits in the USSR-almost certainly including Muruntau-showed an average gold content of 0.15 to 0.57 troy ounce per ton. These results were published in the Soviet Journal of Nonferrous Metals. Third, the Soviets have compared the Muruntau deposit to the Kommunar deposit in the Altai Kray which, according to. information published in Soviet technical journals, contains an "average industrial content" of gold. The system of mineral classification described in Soviet publications indicates that "average industrial content" means at least 5 grams (0.16 troy ounce) of gold per ton of ore. The second part of the puzzle had fallen into place. The Central Processing Area The processing plant is located on a plateau about 3 miles west of the open pit mining area and at an elevation of 800 feet relative to the mine. (See Figure 1.) It is connected to the mining area by a rail shuttle. The plant, which covers an area of 150 acres, is the largest gold plant in existence, It contains four major production facilities: a) a mill building 2,130 feet long; b) 18 circular thickening tanks, each 165 feet in diameter; c) two buildings housing cylindrical tanks (called Pachuca mixers) to extract gold from solution; and d) a refinery 435 feet long. Detailed photographic analysis of the thickening tanks yielded two vital pieces of information. First, we could measure the diameter of the tank, and hence calculate its surface area. Second, the tanks were constructed on exactly the same level, and there was no evidence of any internal piping between them; hence, each tank operated as an independent unit. In contrast, thickening tanks in U.S. gold plants are installed in a descending pattern, and the slurry is thickened sequentially, using gravity to move the slurry from one tank to the next. (Ground photography of typical thickening tanks and Pachuca mixers at Muruntau is shown in Figures 2 and 3.) The Cost Muruntau is the largest project ever carried out in the Soviet gold industry and is probably the most expensive undertaking by any gold industry in the world. On the basis of U.S. experience, we estimated that this project, including infrastructure, would cost $620 to $680 million (in 1974 dollars) if it were undertaken in the United States. The most expensive part of the project, the processing facility, probably would cost $375 million when outfitted with machinery and equipment. This is roughly six times the capital valuation of the largest gold plant in the United States and three times the average of South African plants. The Production Process The refining process at Muruntau is defined in metallurgical terms as an ion exchange in the pulp process. Although Muruntau is the only plant in the world that currently uses this technique to recover gold, the technology involved is well known and is used widely in uranium processing plants in the United States. The process involves five basic steps: crushing; grinding; thickening; extraction of gold with ion exchange resins; and final refining. (See Diagram, Figure 4,) At Muruntau, the ore is transported to the plant from the mines by a standard- gauge rail line. Primary crushing of the ore occurs underground between the railcar unloading facility and the mill building. Secondary crushing and grinding of the ore -fved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 15 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 >CPRE Gory Production Approved For Release 2005/01/26 : CIA-RDP78T03194A0004000' 1rf Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 u.;4-)id Production SECRET ,.6 Pved For Release 2005/01/26 : CIA-RDP78TO3194A000400010011-6 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Gold Production MILL BUILDING GRINDING & CLASSIFICATION Figure 4. Ion Exchange in the Pulp Process (Simplified Flow Diagram) proved For Release 2005/01/26 : CIA-RDP78T03194A0004000 %1f Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Gold Production SECRET takes place in the mill building. The ore is ground to a fine powder. Water is added in the final grinding stage to obtain a water solution, or slurry, with a solid content of about 15 percent. The slurry is sorted in spiral classifiers to insure uniform fineness and then is pumped from the mill building to the thickening tanks. In the thickening tanks, the solid content of the slurry is raised to about 50 percent by allowing the solids to settle to the bottom of the tank, a process taking 16 to 18 hours. Rotating rake arms push the settled solids toward a discharge point at the center of the tank bottom. When the desired 50/50 liquid-to-solid ratio is achieved, the viscous residue, called pulp, is pumped through pipes to ion exchange buildings. The ion exchange buildings house the Pachuca mixers. The pulp enters the mixers and is dissolved in a cyanide solution for about 10 hours to form the electrolyte sodium gold cyanide-NaAu (CN)2. The electrolyte is then treated with ion exchange resins (plastic polymers with an affinity for gold) which extract the gold from the electrolyte. Resins that have stripped gold from the electrolyte are removed from the Pachuca mixers and pulverized to a powder. Gold is separated from this powder by an electrolytic process in which gold is deposited on titanium sheets (cathodes) set in electrolytic cells and then manually peeled from the cathodes. At this point the gold has a purity of 99 percent. Such a degree of purity cannot be achieved prior to final refining by other processes. Final purification of the gold is performed in the refinery, adjacent to the ion exchange building, using a fire refining process to produce gold that is 99.99 percent pure. Muruntau is one of only two plants in the USSR capable of producing gold with this purity. The other is the All-Union Precious Metals Plant in Novosibirsk, which performs final purification for all the gold produced in the Northeast Region. Construction Chronology Photographic analysis indicates that the processing complex was designed from the beginning in 1967 for the configuration that it will have upon completion. This was not apparent until recently, however, because construction has proceeded in three stages. The cornerstone of the plant was laid on 14 May 1967, according to Soviet press sources, and construction proceeded rapidly thereafter. Photography of March 1968 showed the frame of a mill building 500 feet long, part of the roof structure in place, three thickening tanks under construction, and the ground cleared for three more tanks. On 12 June 1969, the first gold was produced and ceremoniously announced in the Soviet press, and on 1 July 1969 the plant was officially commissioned. Photography of January 1971 revealed that the length of the mill building had been extended to 1,100 feet and that the six thickening tanks had been completed. In addition, an ion exchange building housing 28 Pachuca mixers, and a refinery 435 feet long had been built. Photography of July 1973 revealed that additional construction had doubled the capacity of the Muruntau plant. The mill building had been extended 400 feet, six additional thickening tanks were installed, and a second ion exchange building, identical to the first, had been completed. Photography of April 1974 revealed that the mill building is being extended by an additional 1,000 feet, six additional tanks are in various stages of construction, and a third ion exchange building is in an early stage of construction. The pace of construction as observed in mid-1975 suggests that the facilities will be completed and fully operational by 1977. Space limitations imposed Awpd For Release 2005/01/26 : CIA-RDP78T03194A000400010014-? Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET Gold Production by other buildings and topography indicate that further expansion of the central processing area is unlikely. (A comparison of the three stages of construction of the Muruntau, identified as Stages 1, 2, and 3, is shown in Table 2.) Having gained an understanding of the key aspects of the Muruntau plant, and of the pace of its construction, we were in a position to begin integrating all the disparate information into a formal methodology for estimating the capacity of the plant. The Methodology We concluded that the capacity of any gold plant can be estimated with a high degree of accuracy on the basis of the following information: a) the surface area of the thickening tanks; b) the number of tanks installed; c) the settling characteristics of the ore-that is, the rate at which the powdered ore precipitates from the slurry in the thickening tank. For any particular settling rate, the amount of gold-bearing ore that can he processed per unit of time is directly correlated with the surface area of the thickening tank. In the case of Muruntau, U.S. engineers estimate that four square feet of thickening tank surface area are needed to process one ton of ore per day. This estimate is based on the elevation of the plant, the settling characteristic of the ore, and the production process. In the extreme, no more than five square feet would be needed. Upon completion of present construction, Muruntau will have 18 thickening tanks, each with a surface area of 21,382 square feet, or a total surface area for all tanks of about 384,876 square feet. Hence, at four square feet per ton, Muruntau could process 96,200 metric tons of ore per day, and at five square feet, 77,000 metric tons. Given a range for the amount of ore that can be processed, final output of gold will depend upon the gold content of the ore, the rate of plant utilization, and the recovery rate. We had estimated the average gold content of the ore at 0.15 troy ounce per metric ton at a minimum. Some experts in the U.S. gold industry argued that the probability was high that the ore was richer, perhaps 0.20 troy ounce per metric ton. In the judgment of U.S. engineers, the Muruntau plant probably operates at 95 percent of capacity (which is a fairly standard plant utilization rate in the gold industry), although a higher utilization rate is possible. Lower rates of utilization are unlikely. Finally, it is unlikely that the recovery rate at Muruntau is less than 92 percent. (The Sequence of Construction at Muruntau Stage 1 Complete As of Stage 2 Complete As of Stage 3 Under Construction As of January 1971 April 1974 April 1975 Total Plant Length of Mill (feet) ............... 1,100 230 580 2,130 Number of Thickening Tanks (units) 6 6 6 18 Area of Thickening Tanks (square feet) ........................... 128,295 128,295 128,295 384,885 Ion Exchange Buildings ............. 1 1 1 3 Pachuca Mixers (units) ............. 28 28 28 84 Capacity of Mixers (cubic feet) ....... 630,000 630,000 630,000 1,890,000 Length of Refinery (feet) ............ 435 - - 435 20 For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Gold Production SECRET recovery rate is the amount of gold actually recovered as a percent of the total that would be recovered if the production process were perfect.) In U.S. practice, recovery rates normally exceed 95 percent and on occasion run as high as 98 percent. The effects of these variants on the annual output of gold (based on a 360-day work year) are shown below for two cases. The tabulation summarizes the possible ranges of output at Muruntau. The widest range implied is from 112.9 to 208.9 metric tons per year. Only the values given in Case 1 for 95 percent capacity utilization were considered to be "real" possibilities, however. Thus, potential output at Muruntau falls within a range of 112.9 tons to 148.9 tons. The mean and median value is 130.9 tons. A crosscheck, calculated by an alternative technique, supports a somewhat higher figure. Output was computed for crosschecking purposes on the basis of the dimensions of the Pachuca mixers, because a correlation exists between the volume of a mixer and its processing capability per unit of time. Analysis of ground-level photography published in Sputnik, a Soviet magazine, revealed that the volume of each mixer is about 22,500 cubic feet. When present construction at Muruntau is complete, 84 mixers, with a total volume of 1.89 million cubic feet, will be in place. U.S. experts calculated., that about 20 cubic feet of mixer are needed to process one ton per day. By dividing total volume by the constant factor of 20 cubic feet, it follows that the Pachuca mixers have a daily throughput capacity of 94,500 tons, compared with 77,000 to 96,200 tons calculated on the basis of the surface area of the thickening tanks. Applying the same values for ore richness (0.15 troy ounce) recovery rate (92 percent), and plant utilization rate (95 percent) yields an estimate of 138.7 tons of gold per year. As a "best" estimate, 135 tons of gold per year was used. This figure is both the mean and median value of the estimates derived from the thickening tank and Pachuca mixer estimating techniques. Significance of Muruntau Using the foregoing methodology, in conjunction with photographic information on the rate of plant construction, OER estimated that gold production at Muruntau increased from 1 ton in 1969 to 45 tons in 1974. In 1975 the plant was capable of producing 90 tons, and upon completion of present construction in 1977 it will have a capacity of 135 tons. (See Table 4.) These estimates are supported by a Soviet At 100% of capacity 92% .................. 148.6 118.9 198.3 158.5 97% .................. 156.7 125.4 208.9 167.2 At 95% of capacity 92% .................. 141.3 112.9 188.2 150.6 97% .................. 148.9 119.1 198.6 158.8 "Case 1 is based on an ore content of 0.15 ounce per ton, Case 2 on a content of 0.20. Recovery rates of 92% and 97% are specified at plant utilization rates of 100% and 95%. bSurfacc area needed to process one ton of gold-bearing ore. i- ed For Release 2005/01/26 : CIA-RDP78T03194A000400010014- 1 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Gold Production in the USSR, (Metric Tons) 1969 .......................... 1 191 192 1970 .......................... 5 196 201 1971 .......................... 20 198 218 1972 .......................... 45 207 252 1973 .......................... 45 216 261 1974 .......................... 45 225 270 1975 .......................... 90 236 326 1976 .......................... 90 NA NA 1977 .......................... 135 NA NA monetary specialist who confided to a former member of the President's Council of Economic Advisors that output at Muruntau will be at least equal to that of Magadanskaya Oblast, traditionally the country's largest gold producing area. Magadanskaya Oblast currently produces about 85 tons of gold annually. Muruntau's production in 1974 surpassed total U.S. output of 35 tons and was not far behind that of Canada (52 tons). Muruntau's production in 1975 probably was six times that of the largest gold plant in the United States and surpassed the record level of 88 tons achieved by the largest South African plant at West Driefontein in 1971. When Muruntau is complete and fully operational in 1977, its annual output will account for about 40 to 45 percent of total Soviet gold production. During 1975-77, Muruntau will produce an estimated 315 tons of gold, which at Free market prices of $170 per ounce could bring in about $1.7 billion in hard currency to help the Soviet government pay for imported grain and badly needed Western equipment and technology. Without meaning to, OER seems inadvertently to have given some credibility to an old Uzbek proverb, ' In the Kyzyl-Kum desert, it is harder not to find gold than to find it." OER now is working to apply the methodology developed for the Muruntau gold plant to other nonferrous metals plants. The most promising possibility is a new gold plant the Soviets are building at Zod, on the eastern slope of Mt. Ararat, in the Armenian SSR. This plant is under construction and is similar to Muruntau in external configuration, but smaller. According to published Soviet press reports, it will also use an ion exchange in the pulp process. As more photography becomes available, and as we obtain more information on the geological composition of the Zod deposit, an estimate of the capacity of the Zod plant will be made, thereby further unraveling the "secret" of Soviet gold production. Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 22 SECRET Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET From SAWRF to FADS to LMS THE GREAT CHINESE MOUNDS PUZZLE Bruce Smith The Chinese have built 18 mounded structures that have no counterparts any place else in the world. The intelligence community, at least a large part of it, has labeled these installations Large Mounded Strongpoints (LMS*). They are generally believed to be defensive positions to protect strategic invasion corridors leading into the country. When these structures were first discovered in the mid-1960s, they created great excitement in intelligence circles. Because some of them were located near Shuang-ch'eng-tzu, China's first missile test center, the curious mounds were called SAWRFs (see Map, Figure 5). The acronym stood for Suspect Advanced Weapons Related Facility. This essay traces some of the events which ultimately led to downgrading the mounds from something exotic into the more mundane conventional weapons field. Description of the Mounds The mounds were in an early stage of construction when first seen in satellite photography in 1966. They appeared to consist of long narrow corridors built at ground level on flat, open land. Shorter passageways led from the main corridors to the perimeters, and rooms were located off the corridors in a staggered fashion. At later stages of construction, the networks of corridors and rooms were mounded with earth to form huge man-made hills, each covering an area larger than the Pentagon. They ranged in size between 1,000 and 1,500 feet long, 500 to 900 feet wide, and 70 to 125 feet high (see Figure 6), All the mounds are surrounded by a water-filled moat, except for the one near Shanghai, which is located on the bank of a river. The Intelligence Response Nothing resembling China's mounds had ever been seen before, and their uniqueness led to a great stir among intelligence analysts. Typically, the vast resources of the U.S. intelligence apparatus were mobilized to determine the purpose of the curious mounds, Every agency of the intelligence community participated in the task. Coordinating responsibility for the effort was vested in one of the committees of the USIB. Outside experts from a variety of disciplines, including construction engineers; nuclear physicists, geologists, hydraulic engineers, military engineers, and China scholars were provided with data and asked to give their opinion on the function of the mounds. Satellites were programmed to obtain repeated coverage of the mounds from every possible angle. Hundreds of photographs were taken and each one carefully scrutinized by photo interpreters in Imagery Analysis Service (IAS) and the National Photographic Interpretation Center (NPIC). Modelers built relief models, artists drew concepts, and photo interpreters measured and remeasured all visible features of the mounds. *Pronounced "limbs." MORI/HRP from ftRffved For Release 2005/01/26 : CIA-RDP78T03194A000400010014 pg. 23-35 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Chinese Mounds 24Approved For Release 2005/01/26 : CIA-RDP78T03194A0004002~g011,-6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Chinese Mounds SECRET Pentagon Building in roughly the same Peking East mounded structure-earth mounded and moat scale as the mounded structure at right water filled Figure 6. Large Mounded Structures S rrved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014 6 25 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET Chinese Mounds In addition to IAS, other offices within CIA who volunteered their unique expertise in the great quest to unravel the mystery of the mounds included OSI, OSR, FM SAC, DDO, and OBGI. Within the military establishment, the Corps of Engineers, DIA, and NSA developed a coterie of "mound experts." In all, thousands of man- hours and undoubtedly hundreds of thousands of dollars went into the mammoth effort. Conferences were held, foreign intelligence organizations were queried, and reams of paper were consumed by the topic. One battle-hardened veteran of the mound scene even coined a new vocabulary to improve communications between the hundreds of experts working on the problem and the outside world. * Early Hypotheses The massive mobilization of intelligence resources during the late 1960s produced a number of scholarly hypotheses explaining the purpose of the so-called SAWRFs. Some thoughtful ideas seriously put forward included: ? Rain-making devices ? Blood storage vaults ? Memorial halls to enshrine the thoughts of Mao ? Personnel shelters ? Communications centers ? Atomic weapons storage vaults ? Strategic missile launch sites ? ABM sites ? Utility plants for electric power ? Solar pumps ? Hospitals ? Tombs or crematoria ? Sites to cultivate mushrooms The Soviet Union also was interested in ascertaining the purpose of China's mounds. In early 1969, a Soviet official approached a high-ranking U.S. intelligence officer, allegedly at a cocktail party in Washington, and queried the American on the purpose of the structures. The Soviets, like some U.S. intelligence analysts, apparently *Part of this unique vocabulary included such terms as: SAWRF-A Chinese puzzle built in committee SAWRFLET-A mini-SAWRF SAWRFETTE-A female SAWRF LUMPIE-A dead SAWRFLET SAWRFOID-A neuter SAWRFLET SAWRFAGE-Effluent from a SAWRF SAWRFITIS-Inflammation of the corridor system SAWRNLING-An adolescent SAWRF SAWRFOBIA-Fear of being assigned SAWRF responsibility SAWRFNIK-A U.S. intelligence officer who, knowing nothing about the subject, becomes chairman of a working group convened to determine its function 26APproved For Release 2005/01/26 : CIA-RDP78T03194A0004009de9RJf-6 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Chinese Mounds SECRET thought the mounds were associated with advanced weapons. The Russian told the American that: Adjacent to the border of Mongolia there are in the construction stage several launching pads of semi-subterranean type. There are 28 launching pads there altogether. In the area of Peking and to the south of it there are several launching pad complexes of the same type under construction with direction of fire to the southeast. The First Crack in the Puzzle For more than two years after the mounds were discovered, no one adequately explained why the Chinese were building the strange structures. Every theory was weak and could easily be shot down for one reason or another. In fact, people took great delight in shooting holes in the various hypotheses put forward. Each analyst, naturally, wanted to become the first detective to break the case and thus reap the benefits of an intelligence coup. But SAWRF was not fated to be pruned down to LMS until somebody applied "Occam's Razor" to the increasingly complicated theories, and then indulged in some fancy coordination footwork to propagate the simplified result. Into the den of sharpshooters aiming at all the proffered solutions walked three unsuspecting lambs who had developed a new and simplistic hypothesis to explain the mounds. (Why look for an abstract answer before considering the simple ones first?) Two of them, Kenneth C. Fuller and William Trimpin, worked for the now-defunct Construction Branch in OER. A third man, working independently, had written a brief memorandum in late 1968, outlining his theory that the mounds were "essentially land fortifications associated with future deployment of conventional defensive weapons, most likely field artillery pieces, to be used against ground invasion forces." At about the same time, the two analysts in the Construction Branch reached an identical conclusion. It appeared to them that the Chinese were building man-made hills in flat areas in order to control the only high ground along traditional invasion corridors leading into the country. They based their conclusion, in part, on voluminous information supplied by photo interpreters working at IAS (particularly helpful among these unrecognized heroes at IAS were Mr. Ed. Parris, Mr. Frank Filmore, Mr. Charles Balyeat, and Mr. Kim Fitzgerald). Now that the problem had been solved-at least in the view of the Construction. Branch-the first order of business naturally was to dream up a new acronym describing the mounds. After considerable thought, the term "FADS" was chosen. This stood for Flat Area Defensive Strongpoints (some people interpreted the term to mean that China's mounds were nothing more than passings fads). Armed with a descriptive new name for the mounds, the analysts in OER felt they would have little trouble selling the idea that China's mounds were defensive strongpoints. This did not prove to be the case. The intelligence community was not yet ready to accept the weird thesis that SAWRFs were actually FADS and that a FADS was in reality an LMS, the name now accepted for the structures. When verbal discussion fails to sway a debate, sometimes the pen proves to be mightier than the tongue. The Construction Branch, therefore, decided that the best method to convince a skeptical audience was to compose a memorandum outlining the SNLRE4ved For Release 2005/01/26 : CIA-RDP78T03194A00040001001#66 ooroved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET Chinese Mounds reasoning why SAWRFs were FADS. A detailed memorandum was written and disseminated to as many SAWRFNIKs within CIA as possible in an attempt to influence the course of the discussion decisively. (A copy of this original memorandum follows this essay, for those newcomers who are interested in the early reasoning behind the argument downgrading the SAWRFs.) The reaction to the inter-office memorandum was mixed. Some readers were not moved by the argument, while others considered it a decisive piece of analysis. Agreeing with this latter group, the OER team decided to push on with the selling campaign. The next move in the game was to write a formal CIA report on the topic in order to convey the message to other parts of the U.S. Government. The main problem with writing a formal Intelligence Memorandum at that time, however, was the requirement that such reports should be coordinated with all interested offices prior to publication. Given the controversial nature of the topic, there was an excellent chance the paper would have been killed before seeing the light of day. Thus, a plan was devised to publish the FADS thesis in a way that would minimize the problems of coordination. An Approach that Worked The approach adopted to outflank the expected opposition was to write an Intelligence Memorandum discussing China's massive underground construction program then under way at airfields, naval bases, storage sites, and other installations. During the late 1960s, this topic was of considerable interest because of the U.S. involvement in Vietnam and the worsening situation along the Sino-Soviet border. The discussion of the FADS hypotheses was introduced into the "underground paper" as an apparent afterthought and comprised only a minor part of the presentation. The objective was to slip the FADS idea into formal print under a broader topic of general interest. The paper was coordinated only with those offices who would readily agree to sign off. It was not shown to many of the specialists working on the SAWRF problem. The IM was published as a formal CIA report in May 1969. Although the debate on the mounds continued to drag on for some time after the IM was disseminated, general agreement was finally reached that the structures probably were defensive fortifications when 130 mm artillery pieces were observed protruding from the entrances. The most recent CIA paper written on the mounds was published in April 1974 by the Office of Strategic Research. This report reviewed the latest evidence on their tactical capabilities and potential effectiveness for defense against invasion. The acronym "FADS" never caught on, but the original OER analysis has stood up well. Of course, the final chapter on China's great mounds may not yet have been written. A time may come when new evidence will rekindle interest in the mounds. Perhaps the FADS thesis will eventually be disproved when one of the mounds suddenly bursts open like a rosebud and a gigantic missile roars off from a subterranean pad. Or some bright young analyst may come along who can logically explain why the Chinese would build eight of the mounds in the sparsely populated Gobi Desert to use as blood storage vaults, communications centers, electric power plants, hospitals, or crematoria. Perhaps the mounds will finally turn out to be ideal places to enshrine the voluminous writings of Mao after he leaves the scene. Finally, the hypotheses that the mounds are rain-making devices or sites to cultivate mushrooms may prove to be the ultimate answer. In any case, the great mounds should provide interesting puzzles to archeologists digging in China five thousand years from now. (See Figure 7). 2&pproved For Release 2005/01/26 : CIA-RDP78T03194A0004000r0 AT6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Chinese Mounds SECRET A .. , 7; Shu hg Ch Tiu pecfa! efeh v Mound Area. Number: ; . C Janu 9 8 wxwqNroiYn e l e \fed For Release 2005/01/26 : CIA-RDP78TO3194A000400010014, Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Chinese Mounds (CIA Memorandum) Probable Purpose of "SA WRFs" 1. There has been considerable discussion during the past few years about the function of eleven (probably fifteen) unidentified construction projects in China. Although the intelligence community has postulated many theories to explain their function, there has been no consensus and the projects have temporarily been designated Suspect Advanced Weapons Related Facilities (SAWRFs). Speculation on their purpose includes strategic missile deployment sites, atomic weapons storage vaults, communications centers, command and control centers, personnel shelters, memorial halls to enshrine the thoughts of Mao, and even rain-making devices. The interesting possibility has been raised elsewhere that SAWRFs are nothing more than. land fortifications associated with a future deployment of conventional defensive weapons-most likely field artillery pieces-in a defensive role against ground invasion forces. OER's Construction Branch, International Services Division (IS/CST) independently arrived at the same conclusion, with the caveat that SAWRFs could also be used for the deployment of artillery rockets as well as conventional field artillery pieces. 2. There is general agreement within CIA (not DIA) that SAWRFs are too small to house strategic missiles (MRBMs or IRBMs) and are poorly placed in China to store nuclear weapons. SAWRFs as a group also are located in the wrong places to be personnel shelters, storage sites, communications centers, or command and control centers. Many factors, however, support the theory that SAWRFs are defensive positions to protect against an invasion by sea or over land. The more important reasons supporting this thesis include methods of construction, physical configuration, location, tactical orientation of the SAWRFs, and the nature of other related construction projects in the field of national defense. SAWRFs are only the Tip of the Iceberg 3. There have been many reports that mention China's effort to construct a series of defensive positions in the country, from a first line along the coast and border regions to second and third lines farther inland, A number of sources have discussed in some detail the coastal defense works the Chinese have been building since the early 1950s. These coastal gun sites are hardened and typically have two, four, or six entrances (generally four) facing toward the sea. Many of these sites closely resemble SAWRFs in configuration and layout. 4. A Chinese Army officer who defected also discussed the military construction program in China's southwest border area, where a system of "national defense works" was built in the mid-1960s. The works were constructed underground to defend natural invasion routes against penetration by enemy forces. These fortifications reportedly are of reinforced concrete construction, have good antigas, antifire, anti- aircraft characteristics and protect against atomic fall-out. The SAWRFs have all of these characteristics and are placed astride some of the most important invasion routes leading into the country. 3C~pproved For Release 2005/01/26: CIA-RDP78T03194A000400gJ5 -6 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Chinese Mounds SECRET 5. SAWRFs are esentially nothing more than tunnels that have been erected on a flat plain, rather than drilled through rock or cut and backfilled as in hilly terrain. After the corridors and rooms have been poured in place at ground level, they are covered with layers of earth and rock to form a man-made hill. The outward appearance of a SAWRF is similar to scores of defensive positions in other areas of China and North Vietnam that have been drilled or cut into the mountains rather than built from the ground up. Constructing hills where none exist is an expensive and time- consuming undertaking, particularly when there are natural hills within 25 to 50 miles, and implies that the location of a SAWRF is of decisive importance. Location in the East 6. A knowledgeable historian wrote, "the fight for the control over China is in effect a fight for the control over the `A' formed by three major rail lines-the Tientsin- Nanking, the Peking-Hankow, and the Lunghai line (the east-west line running through Cheng-chou) and the cities along them." The SAWRFs in east China are all located near important junctions along this critical "A". Railroads are the primary means of transportation in China, and the rail system in the east consists of two north- south trunk lines and four east-west connecting links. Three of the four east-west rail lines continue inland from their junction with the Peking-Hankow-Canton trunk line, and SAWRFs are located near all three of these major junctions. This placement indicates a systematic plan to defend important rail hubs and industrialized centers farther inland. 7. The two SAWRFs near Peking are strategically placed about 15 miles south and southeast of the city to defend the coastal approaches to the capital. These SAWRFs are adjacent to the only two main lines of communication (LOC's) running directly between the capital and the Gulf of Chih-li-a double-tracked rail line and an all-weather two- or three-lane highway. Each Peking SAWRF is constructed with four entrances on one side and two on the other. The sides with the four entrances face directly toward the sea coast and provide a logical field of fire for a defensive position. 8. The two SAWRFs at Shih-chia-chuang also are strategically placed to defend important LOC's. They are located about 10 miles from the city and are near the only rail line and highway in the area leading directly from the coast. The orientation of the Shih-chia-chuang SAWRFs is similar to the Peking SAWRFs. The sides with the four entrances face the coast, which also provides a logical field of fire for a defensive position. 9. Construction of the two SAWRFs at Cheng-chou has not progressed far enough to determine all of their characteristics. Both of these SAWRFs, however, are near the main railroads and highways running into Cheng-thou from the east and the south and are located facing invasion routes. 10. Two possible SAWRFs are in an early stage of construction straddling the railroad line between Tientsin and T'ang-ku. The layout of the sites is nearly identical with that of the other SAWRFs, but because of very marshy conditions their preparation differs from methods followed elsewhere. At one location, fill material is being brought in by rail to provide a foundation mat for the SAWRF. At the other location, which is in even worse soil, piles are being driven on the site of the future SAWRF. The construction of these two facilities under unfavorable soil conditions emphasizes the importance of the location, i.e., on the coastal side of a major city, fffffed For Release 2005/01/26: CIA-RDP78T03194A000400010014j? Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Chinese Mounds astride the main transportation lines, and oriented towards the direction of potential invasion. Near Shuang-ch'eng-txu 11. Five SAWRFs have been firmly identified near the Shuang-ch'eng-tzu Missile 'l'est Range (SCTMTR), and one or two others may be in the initial stages of construction. All of these structures are located from 50 to 100 miles north- northeast of the main support base, in the mouth of a likely invasion corridor leading across the (;obi Desert from Mongolia. The river basin where the SAWRFs and test range are located contains the only fresh water in the area and is the only region in north central China suitable for north-south cross-country movement of wheeled or tracked vehicles. This river basin also leads directly to the strategic Kansu Corridor, the gateway to 1'unx'n, Lanchou, and other advanced weapons centers in the northwest. The Gobi SAWRFs, therefore, are not placed there exclusively to defend SCTMTR but rather to block the natural invasion route. Lin Piao may have been referring to SAWRFs in the Gobi when in mid-1968 he reportedly discussed "national defense construction works by forces stationed in desert regions." 12. SAWRFs are apparently only part of other defensive precautions taken by the Chinese near the test range. There are a few ridge lines south of the SCTMTR rangehead and many of them are riddled with tunnels which constitute an additional line of defense. Some of the excavations may he small scale mining operations, but the others are probably gun positions, storage sites, and personnel shelters. Photography indicates that the majority of these tunnels were excavated during the past few years. Similarities to Defensive Positions in North Vietnam 13. An NPIC Study on "Probable Cave Defense Sites in North Vietnam" draws a number of conclusions which apply to the location and orientation of SAWRFs in China. When the study was published in January 1968, photography had identified 37 sites in North Vietnam that were under construction or recently completed. Twenty- seven sites had four symmetrically arranged entrances and are similar to coastal defense sites in North Vietnam and China. In many instances, the natural topography had been ignored in an attempt to achieve symmetry in both orientation and separation of the entrances. The tunnel sites are located up to 80 miles inland and are generally dispersed along an east-west line corresponding with the main route between Hanoi and Vinh. Most of the entrances are oriented towards these routes. NPIC concludes that "the construction pattern indicates that the primary function of the tunnels was probably as defensive artillery sites in anticipation of a land invasion." Many of the sites, moreover, are believed to have been built by Chinese engineering troops. Use of Local Labor 14. Projects with top military priority in China in the advanced weapons field are built by well-trained and closely-screened military engineering troops. For security reasons, there is no attempt to recruit local laborers to build highly sensitive projects. When building more conventional military projects, however, the Chinese follow their traditional approach and employ a combination of mechanized construction equipment and local unskilled labor. Such projects include airfields, POL storage sites, strategic roads and railroads, and defensive positions. Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 32 SECRET Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Chinese Mounds SECRET 15. Photography clearly indicates that some of the SAWRFs in the densely populated cast are being built by traditional methods. The Chinese are using a combination of mechanized construction equipment and local labor recruited from nearby villages. The SAWRFs located north of the test range, however, are being constructed with more capital-intensive methods than those in the cast. This is to be expected, as there is almost no local labor to recruit in the Gobi Desert, and unskilled laborers are not brought in because the missile complex is considered a highly sensitive area. Why the Moats? 1.6. In the flat terrain of the Gobi Desert and the North China plain, a moat provides a physical barrier between the SAWRF and an attacking force. In addition, Chinese defensive doctrine, as reported by defectors, calls for an adequate water supply for tunnel-type installations for drinking, sanitation, and fire-fighting. It is also common practice for troops to raise fish for their own food supply. Finally, and probably most important, in building any mound, revetment, or fill, the cheapest approach is to obtain the fill material from a nearby borrow pit. The moats fill each of these roles and in combination are the most economical and efficient method available. Why the "SAWRFL ETs"? 17. Although moats provide some physical protection, SAWRFs would. make much stronger defensive positions if they were protected by additional fire power from a variety of weapons. This protection may be developing in the form of associated structures or "SAWRFLETs" that have been discovered around some of the SAWRFs. The so-called SAWRFLETs are probably nothing more than infantry strong points sited in support of the SAWRFs. In other words, they are pillboxes armed with automatic weapons, recoilless rifles, small-caliber field artillery pieces, mortars, and other weapons. Some of the structures also are probably used for storing ammunition and other military supplies. 18. Six pillboxes were recently identified along the coast of the Shan-tung Peninsula that are very similar in size, shape, and type of construction to some of the "SAWRFLETs" seen in the North China Plain and in the Gobi Desert. These structures were seen in 1965 photography, and they clearly were built to house coastal artillery pieces. Other groups of pillboxes and probable military storage sites have also been discovered along the northern portions of the trunk line runnning between Peking and Shanghai-near such cities as Tientsin, Ts'ang-hsien, and T'ang-ku. SAWRFs are an Integral Part of China's Overall Defensive Construction Program 19. SAWRFs by themselves seem to be unique projects with some exotic puropse, but when they are viewed in terms of China's other construction programs they appear to be only part of a larger effort to build defensive facilities in depth. The current phase of this program started in the mid-1960s and is aimed at protecting strategic areas against conventional attack. The essence of the program is underground construction or "hardening." Airfields 20. Chinese preoccupation with hardening military installations is most readily apparent in their airfield construction program of recent years. Since 1964 they have Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET 33 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Chinese Mounds newly built or improved almost 60 jet-capable airfields near the border and in the inland provinces. Ten of these airfields have extensive underground facilities for dispersing and servicing aircraft. Two hardened fields were started in 1964, four in 1966, two in 1967, and two in 1968. Nine of the ten fields are in the eastern part of the country in the same general area as the SAWRFs. The remaining underground airfield was recently started in north central China near industrial centers associated with China's advanced weapons program and about 400 air miles from Shuang-ch'eng-tzu. 21. When constructing underground dispersal areas to protect aircraft from attack, the Chinese usually follow the conventional approach of drilling tunnels into a nearby mountain side. At the new Ling-chiu airfield near Peking, however, they are using the same construction techniques they use when building SAWRFs. This approach was necessary because of terrain constraints-there are no mountains in the immediate vicinity of the field. 22. Subterranean facilities at the Ling-chiu field are being built at the edge of an alluvial plain near one end of the runway. The Chinese have excavated a trench in the silt and are pouring a series of massive concrete tunnels, similar to SAWRF tunnels but much larger. The width of the tunnels is between 60 and 70 feet and they will hold an estimated 30 to 40 MIG aircraft when work is completed. The tunnels will be mounded with earth during the final stages of construction. Naval Facilities 23. The Chinese have also extended their hardening program to naval installations. The Ching-shan naval facility, located almost 20 miles northeast of Ch'ing-tao on the Shantung Peninsula, has been developed into China's first known underground naval facility. Ching-shan is possibly the home base for at least eight of China's OSA/Komar units in the North Sea Fleet, and the underground pen can apparently store and service all these boats. A 1,650-foot tunnel also links the main facility with a smaller barracks area on the south side of a small mountain headland. The base is the key facility for guarding the naval approaches to the strategic north China area. POL Storage Sites 24. Another part of China's program of defense in depth is the nationwide system of hardened regional POL storage sites. At least 44 such sites have been identified in China since the later part of 1963. Most of the storage tanks are buried or semi-buried and are located in hilly country to take advantage of the protection afforded by the terrain. A few of the sites are in border and coastal areas, but the majority are located on the inland rail net. A military defector who helped build one of the sites reported that regional POL storage depots are run by the Chinese Army for the use of all three services. SAM Sites 25. Judging by the known military construction program in the country, defense of the strategic northeast is clearly of prime importance to the Chinese. In addition to hardened airfields, naval facilities, and POL storage sites in the area, there is an apparent correlation between the location of SAWRFs and SAM sites. The only operational SAM sites around Peking are all located in the sector southeast of the city in an arc just beyond the two SAWRFs. A number of additional SAM sites were started near Peking during 1968 and will probably become operational in the near future. Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 34 SECRET Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Chinese Mounds SECRET SAWRFs or "FADS" (Flat Area Defensive Strongpoints) 26. The main points in this memorandum can be briefly summarized as follows: a. SAWRFs are nothing more than mounded tunnels on flat terrain rather than drilled tunnels in hilly terrain. A terrain constraint, therefore, forced the Chinese to build hills where none exist. b. Defensive gun positions are the only other installations we have ever seen having four or more entrances symmetrically placed and facing toward the sea coast or covering important LOCs. This applies to North Korea, North Vietnam, and China. Other types of underground installations are not built this way. c. All of the SAWRFs are located astride natural invasion routes in the critical "A" and in the Gobi Desert. d. All of the SAWRFs face along an azimuth which presents a logical field of fire toward an advancing ground force. e. Pillboxes (SAWRFLETs) have been identified near the SAWRFs and, as would be expected, in areas where no SAWRFs exist. f. SAWRFs are only part of a much larger construction program to provide defense in depth. 27. In essence, therefore, the Chinese have hardened their airfields, POL storage sites, and are deploying a SAM system as a defensive measure against air attack. They have constructed a network of coastal defense positions and have hardened at least one patrol boat pen to defend against naval bombardment and amphibious landing. The third phase in the defensive buildup would logically be to protect against an enemy ground force moving inland after breaching the coastal defense or a force coming overland from neighboring countries. This gap in the system is being filled by constructing a series of defensive positions composed of pillboxes and Flat Area Defensive Strongpoints (FADS). None of these measures is associated with offensive weapons systems or with strategic deployment of advanced weapons. The mounds would provide little defense against nuclear warheads delivered by missiles, but they are well tailored to defend against an attack by a hostile force using conventional weapons. Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014ft Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL A 24-hour command post: THE CIA OPERATIONS CENTER Paul H. Corscadden and H. Lawrence Sandal] This is the age of the 24-hour command post, a time when the intelligence community is forced to keep pace with advances in information processing; it must acquire automated data processing skills and adopt new methods to feed the thirst of policy makers for the "latest word." The intelligence watch centers in the community are at the heart of a growth industry stimulated by the urgencies of crisis management, accordioning time zones, Orwellian engineering, and departmental rivalries.* As a group, they are loosely knit, not unified under central management, and held together by goodwill and shared information. The working arrangements among them, particularly when tension mounts, become of vital concern. It would be untrue to say the Agency has blazed the path, but we can take credit for establishing the first 24-hour watch operation irr the community. Twenty-six years ago the Office of Current Intelligence set up such a facility, manned by graduate students from Georgetown and George Washington, Command and Control The year 1961 is pivotal to an understanding of today's complex of centers and the interlocking relationship between defense and intelligence. Soon after his inaugural, President Kennedy called for an exhaustive reappraisal of defense policy-ranging from the development of new weapons systems to organizational changes, On March 28, in a special message on the Defense Budget, he re-emphasized civilian authority over the Armed Forces, and he recommended new procedural arrangements that would reserve to him and other presidents and to key civilian advisers ultimate authority over military operations.** The White House and its staff thereafter operated on the premise that "Diplomacy and defense are no longer distinct alternatives, one to be used where the other fails ... both must complement each other." By late July, an impending crisis in Berlin led the President again to address the Congress on defense issues. This time he set forth the doctrine of flexible response and proposed the creation of quick reaction forces. These concepts breathed life into the *There are some 30 such watch centers listed by the Intelligence Community Staff. These do not include highly compartmented collection centers and numerous specialized activities housed within service or departmental organizations. The most important are: CIA Operations Center, National Military Command Center, National Military Intelligence Center, National Photographic Interpretation Center, National SIGINT Operations Center, State Department Operations Center, and White House Situation Room. **Because it also contained a $2 billion supplemental appropriation for additional ICBMs, Polaris submarines, and bombers, the message's central theme was largely overlooked at the time. MORI/HRP Release 2005/01/26: CIA-RDP78T03194A000400010014f6 from pg. 37-44 (ftpMn04fl9ltL Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL Operations Center embryo of crisis management. The U.S.-Soviet confrontation over the Berlin Wall, beginning in August, brought home the inadequacy of communications links and the snail-like pace of interdepartmental consulation. At least eight foreign crises occurred before the end of Kennedy's first year.* All lent leverage to an administration out to challenge the accepted way of doing business. When Soviet missiles arrived in Cuba, the entire military command and control apparatus was placed in the hands of the President-with significant faults. Thus the stage was set to construct a World Wide Military Command and Control System (WWMCCS);** its focal point was to be a new National Military Command Center (NMCC), under the aegis of the Director of Operations for the Joint Staff (J-3) in the fall of 1963. The confrontation over Cuba hastened the advent of the NMCC by spurring the Joint Chiefs to wire together the major commands and autonomous services to ensure a quick response. The inception and later expansion of the NMCC drove the USIB community to speed the flow of raw and the release of finished intelligence. The Cuban blockade saw the extension of White House control over ships at sea; the President and his civilian advisers communicated directly with the fleet, whose officers were no longer free to operate according to traditional guidelines for a quarantine. The Commander- in-Chief in Washington laid claim to enough on-the-spot information to steer a man- of-war. The inadequacy of military communications was evident.*** There began to emerge the notion of a field or fleet commander's role as a reporting source for national-level clients. The chain of command closed its own loop, with each echelon dependent on the other's intelligence and operational data. A British anecdote may illustrate the implications accompanying the creation of the World Wide Military Command and Control System. One of His Majesty's skippers aboard the corvette Flying Arrow, off Hong Kong in 1949, was ordered only to "See to the best interests of the King," when Chinese Communist coastal artillery *A selected crisis list during President Kennedy's first eight months in office includes the following: February-USSR threatens intervention in the Congo. March-Communist forces advance in Laos. April-Bay of Pigs. May-The Liberation Front and Hanoi announce victory possible in South Vietnam by year's end. June-Khrushchev personally warns Kennedy in Vienna that Soviet peace treaty by December with last Berlin will end Western access rights in West Berlin. August-Berlin Wall. September-Soviets press for troika in UN following death of Dag Hammarskjold. **The WWMCCS is designed to give the President all strategic and tactical military information rapidly and simply, and to permit him to order actions with minimum delay. It is simply the provision of technical resources in the command chain to the White House and Secretary of Defense, as well as the joint Chiefs. In s strategic context, control of the nuclear trigger is central and unquestioned. What is disputed by civilian and military alike is the point in the use of conventional forces at which the exigencies of the tactical situation should override orders from Washington. *'*This is a phenomenon in the American military experience. Its genesis lies in the creation of Unified and Specified Commands which can be tasked by the President and Defense Secretary without the knowledge of the joint Chiefs. The first recorded use of it occurred on October 6, 1962, when the Deputy Secretary of Defense ordered CINCLANT orally to move a squadron of F4B Phantom jets from Norfolk to Key West as a precautionary move against Soviet MIGs in Cuba, bypassing JCS and the Chief of Naval Operations. The Navy squadron was to be under Air Force control once in Key West. During the blockade itself, the command chain ran from the White House to CINCLANT, descending to the task force and supporting elements. (See "Pentagon Civil-Military Tension Increases," Aviation Week and Space Technology, October 15, 1962, p. 26; and Captain F. C. Collins, USN, "The Loss of Leadership," U.S. Naval Institute Proceedings, April 1975, pp. 32-33.) A proved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Operations Center CONFIDENTIAL opened fire against merchant shipping. U.S. military officers are not likely to receive such latitude. Instead, Washington if it chooses can be a rudder command post, to use a naval expression. The CIA agreed gingerly in January 1964 to man a 24-hour liaison billet at the NMCC. An invitation from the Director of Operations (J-3) had been proffered earlier and declined, but it soon became apparent that there was a fence between military operations and intelligence. The harassment of commercial fishing vessels in the Caribbean by Castro Cubans the previous February was not always communicated to the DCI, whose exclusion from information passed via military channels went unnoticed-at first. But one such attack on a U.S. shrimp boat was reported by a U.S. Naval patrol to the Pentagon and then to the White House. It prompted an evening call from the President to a surprised John A. McCone. The DCI set out to correct the oversight. Strengthening Our Pentagon Acquaintance The men selected to serve with the NMCC came from the Directorate of Intelligence's Collection Guidance Staff (CGS). They were charged with levying requirements upon military collectors and monitoring U.S. contingency plans and operations. The Panama crisis in 1964 revealed the NMCC to be a warehouse of tactical information on both friendly and enemy forces, and the "action officers" became conduits for channeling back to the Watch and the DCI military reporting on both anti-American demonstrations and U.S. responses. They also relayed timely analytical material and Agency field reports to the military operators, so that our role in the NMCC thus took on another dimension. Moreover, our representatives exchanged information with colleagues from State Department, Defense Intelligence Agency and National Security Agency, and these exchanges became an informal national watch officers' conference. Panama was not yet quiet before President Johnson ordered elements of the Sixth Fleet, with Marines, to stand by off Cyprus. Since most of the late President Kennedy's aides had remained at their posts, the new Chief Executive was able to capitalize on the strides toward civilian control of military forces taken by his predecessor. Cyprus was followed by the Tonkin Gulf incidents, the rescue of Americans from Stanleyville, and, in 1965, intervention in the Dominican Republic. The President's Watch A parallel but unheralded effort was under way in the White House to establish a channel to funnel intelligence of special interest directly to the Chief Executive and his staff advisers. Heretofore, cabinet members, senior departmental officials, and the DCI-all of whom shared responsibility for notifying the President and his immediate assistants of significant developments-had reported independently of one another. Such diffuse responsibility proved inadequate to the needs of an administration involved in the day-to-day direction of foreign policy. The White House Situation Room was established in mid-May 1961. Located in the basement of the West Wing, it was staffed 24 hours daily by officers from CIA, State, and Defense. The White House soon became dissatisfied, however, and through a combination of performance and default CIA was asked to take over full staffing. Approved For Release 2005/01/26: CIA-RDP78TO3194A0004000100110 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL Operations Center Those selected were chosen, as now, from the Agency's watch officers. They were referents for all intelligence centers, particularly after hours. The White House Situation Room now operates much as it did a decade ago, with two-man teams working under the direct supervision of a director (currently a former State Department officer) answerable to the Assistant for National Security Affairs. There was only a slow awakening in the community to the implications this had for the intelligence process as the President forged closer to real-time command and control over military forces. "In the beginning .." Since John McCone,* the swearing-in of each Director of Central Intelligence has been followed by a letter from the President-a communication describing the emphasis and direction the inductee is expected to impart to the Agency and community. These letters have not been pro forma; indeed, they have contained key operating instructions that have served to enhance, not circumscribe, the DCI's authority. The more recent ones have outlined broad tasks relative to the intelligence process and its administration. On January 16, 1962, President Kennedy wrote McCone that he was the ... "Government's principal intelligence officer," ... and should ... "assure the proper coordination, correlation and evaluation of intelligence from all sources, and its prompt dissemination to me and to other recipients as appropriate." The White House provided the cue in the phrase "prompt dissemination." Three years later President Johnson appointed a new Director-Admiral Raborn. Although Raborn lacked intelligence experience, the President added another dimension to the responsibilities of the man in charge of the burgeoning and dislocated intelligence bureaucracy. He wrote Raborn on September 24, 1965: "Our government is making a substantial effort and is expending large sums of money to obtain timely intelligence vital to our national defense and security. This effort requires the most efficient possible organization of the activities of the various departments and agencies concerned. It is essential that these activities be conducted as an integrated endeavor best suited to meet both current and long-term national intelligence needs." With such charters, back-to-back, it was inevitable that "integrated endeavor" and "prompt dissemination" would fuse and a constant stream of raw intelligence be fed into and measured against both that which was known and that which was speculative. McCone did his bit to streamline the flow of intelligence to the White House and pointed us toward the Pentagon. Raborn, with little heed for culturally grounded rivalries between Washington-based analysts and field collectors, ordered reconciliation within the Agency. Santo Domingo prompted many changes. It coincided with the advent of a Director who had to cope with reports-exaggerated-of street gangs and wholesale terrorism. When the U.S. Ambassador reported rifle fire against his Embassy, the President asked the new Director just what-in-hell was going on, and the Admiral, who had spent most of his career pioneering the advent of nuclear missiles in submarines, found there wasn't one single referent he could turn to for the answers that Mr. At the risk of seeming to dismiss the Allen Dulles era, this account highlights the early 1960s when the intelligence/watch business changed in ways many of us failed to perceive. Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 40 CONFIDENTIAL Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Operations Center CONFIDENTIAL Johnson-not the most patient of Chief Executives-wanted. The DCI nudged the Directorate of Plans into joining forces with OCI in the Watch, now dubbed the "Operations Center." This was an innovative decision, and not, as some of his critics have suggested, the result of a whim-something undertaken to concentrate everything at one phone number. Berlin, Cuba, Cyprus, the Dominican intervention-all summoned the intelligence community to greater efforts in pursuit of more timely dissemination of unevaluated field reports and the production of "Situation Reports." But by the time U.S. forces went ashore in the Dominican Republic, the machinery for publishing finished intelligence failed to satisfy White House aides who believed from a distance that the analytical/ production process was chaotic. One of them even visited CIA to observe how a situation report was put together and what retarded delivery to the President. If the U.S. commander on the scene could send in instant eye-witness accounts, why couldn't that reporting be digested and assessed in similar fashion? Neither electrical dissemination nor delivery by courier could overcome the hourly requirement for a blow-by-blow account of street fighting in Santo Domingo. And what of the need to protect sources and methods, or the putative requirements of compartmentation, or "need-to-know" and all that? In practice, it is damaging as well as embarrassing for a CIA officer to inform the Duty General in the NMCC that the Agency has useful information, but that security inhibits its passage, or-worse still-that it will be "a while" before an incoming message is sanitized for release. Delay means an information gap, and can reduce command options. The ability to orchestrate military responses in tandem with diplomatic initiative seemed indispensable to success. The separation of plans and operations within the intelligence cycle began to shrink. There was a perception that both were dependent on information; one geared to military decisions, and the other on relying on accurate recording of events and an assessment of their meaning. Technology would help bridge the remaining gap. The Operations Center, still a proprietory of the Office of Current Intelligence's Watch, became a pestle for both McCone and Raborn. They left us a framework that could be expanded to accommodate the increased flow of information resulting from advances in technology, yet remaining flexible enough to allow for the integration of new resources. All-Agency In fact, little changed from 1965 to early 1973. But then two things triggered a re- examination of the Director's role vis-a-vis the President and the community, and the Agency's staffing in non-duty hours. Military planners who had set out in 1972 to redefine national-level responsibility for strategic warning intelligence ended up by submitting plans for a national watch center under Pentagon auspices, a center staffed by watch officers/ analysts drawn from various agencies. Their concern grew out of the strategic warning problem, but failed to distinguish the differences between strategic and tactical intelligence. The latter is heavily dependent on military collectors and provides a fairly rich, if incomplete picture, of weapon systems and combat forces. The other contains a large but frequently ambiguous dose of political and economic factors, i.e., the intentions and reactions of key national leaders to events, their perceptions of U.S. objectives, and their combat capability. Intelligence hearing on intent is not readily available; it is a Release 2005/01 /26 : CIA-RDP78T03194A0004000100144~ Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL Operations Center distillate of the best analytical judgments of the community. As the Government's senior intelligence adviser, the DCI not only manages strategic estimates, but conveys them to the President. Concerned over the prospects that a national-level center under military auspices would support the so-called National Command Authority which does not include the Director, senior Agency officers set out to study the feasibility of a center answerable to the DCI, whose statutory responsibilities would thereby be reinforced. They concluded chat was feasible, albeit difficult, given departmental rivalries, but the attention of the White House was riveted elsewhere. And so was that of the Agency's leadership. A less innovative move followed-an accomplishment made possible by our own resources. Over several years, a number of DDI officers who had been involved in the Operations Center/Watch game, also had served abroad. There they could read the flow of field reports against the Washington-produced "finished intelligence," and had begun to wonder whether the Agency product advertised to White House and other consumers as the most timely and most authoritative was precisely that. Or did it suffer from a correctable time lag? If the latter were so, was the delay coincidental to communications lapses between the field and Headquarters and whatever befell a message on its receipt in Washington-especially after close of business-or to the coordination process? At the recommendation of OCI's Director, Richard Lehman, who sought, too, to defend the DCI's prerogatives, the CIA Management Committee established an interdirectorate study group to explore what transpired after hours and examine the massaging of all narrative traffic addressed or readdressed to the Agency. Why was there a dual-directorate "Operations Center" on the seventh floor and another 24-hour facility on the fifth? How many such places were there? What did any do that was unique? To what degree were all living off the same paper? To whom did they answer? Who really had the authority to speak for the Director? To what extent could-and should-their separate functions be combined? 't'here were nine 24-hour facilities in Headquarters (three others were on standby); the majority lived off the same traffic; none was predominant or spoke clearly for the Director.* More importantly, the study group found not all substantive traffic was being read against production requirements in non-duty hours. Instead, it was being scanned against reader profiles and with some delay by non-professionals and by people not privy to the publications. The study group recommended that management create an all-source, Agency- wide Operations Center and affirm the authority of the Senior Duty Officer to speak *Intelligence Directorate CIA Operations Center Central Reference Service/Support Services Group Foreign Broadcast Information Service/Wire Services Staff National Photographic Interpretation Center Operations Directorate Duty Officer Intelligence Watch Science and Technology Directorate Foreign Missile and Space Analysis Center (FMSAC, now OWI) Office of Elint/Special Systems Operations Center Support Directorate Office of Communications/Signal Center and Cable Secretariat Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 47 CONFIDENTIAL Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 Operations Center CONFIDENTIAL for the Director with the benefit of advice from duty officers from the DDS&T, the DDO, and the DDA. These and other recommendations were approved 6 June, with implementation set for 1 October. A communications facility which had existed for some time on the seventh floor had to be wired directly into the Office of Communications so that incoming traffic would print out where it could be read by substantively qualified officers. The DDS&T joined the Center on August 5, and the Office of Communications completed the task of pulling wire up to the seventh floor by the first of September. FMSAC and Ground Services Operations Center (GSOC) would follow in May 1975 as the Center, doubling its space, expanded downward to the sixth floor. The Office of Communications had told us that we could expect a weekly cable flow of 15,000-a "take" likely to increase at the rate of 7 to 8 percent annually. This rate of increase has been observable in Agency communications over the past decade-hence the forecast seemed reasonable-but we are reading 46,000 items a week, including press: more than 270 items an hour! The first week the Arabs and the Israelis squared off for the fourth time in October 1973, we read 83,000 items. The Operations Center has a broad mission in support of the Director and his principal deputies, and hence the Agency as a whole, it also has specific responsibilities in support of the Directorate of Intelligence and its production cycle. We scan incoming narrative traffic in order to alert the Director and his principal deputies to information that may require action or prompt a query from the President, the Secretaries of State and Defense, etc. We select for reading by the Director and Deputy Director information that merits high-level attention-whether the most sensitive traffic or unclassified press ticker. Twice daily-at 0800 and at 1700-our duty officers prepare for the DCI, the DDCI, and the four Deputy Directors The Director's Cable Summary, the most exclusive intelligence publication in Government. It summarizes traffic which officers from three directorates judge to be critical, and appended to it are precis of spot reports sent to the White House over the same reporting period. Accompanying it is an Operations Annex. Responsible for supporting the Agency's ongoing production, we are a service organization-not a production component. We seek to ensure that the White House Support Staff (responsible for The President's Daily Brief), the managing editors of the National Intelligence Daily, and the panel chairman for The National Intelligence Bulletin receive speedy delivery of the latest information. We utilize the National Operations and Intelligence Watch Officers Net (NOIWON) to canvass the intelligence community to achieve a quick assessment, a community view of critical developments. No electronic superstructure can compensate for human cooperation and diligence. As we adopt technology, we hope to avoid the soubriquet recently given to a Middle East country by the OCI analyst who wrote, "It is merely populous and not inherently strong." The production analyst is our client; once alerting has been accomplished, he must be free to do his job while we do ours. ~ Release 2005/01/26 : CIA-RDP78TO3194A0004000100144S Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL Operations Center What does supporting a task force mean? Well, it means assuring access to the existing communications system, providing clerical support for the production of an all-source situation report coordinated in-house for Washington consumers, and then converting the text for release to our Stations and U.S. embassies and, finally, liaison services. The evacuation of the Agency dependents from FBIS facilities on Cyprus, though planned and executed by FBIS management, was conducted alongside of a substantive task force. An analytical task force is altogether different from an operational one. The intelligence analyst is asked to produce situation reports and briefings or special estimates for the National Security Council or Washington Special Action Group. Chese are best done by a small group of people-lest a great milling about lead to confusion and mishandled information. I'he best managers strive for an elusive but effective balance between personnel and workload. The CIA Operations Center probably is the only 24-hour component in Washington whose workload has had quantum jumps in the past 15 years, with only a negligible increase in manpower. Complements from the Directorate of Operations and that of Science and Technology have been added, but in the Center's "bullpen," where the "eyeballing" of most traffic is (lone, the division of labor is relatively unchanged. This continuity stems from a conscious managerial effort to nurture the growth and exposure of voting recruits. The insight distilled from experience and error is embodied in seasoned officers who are ready for the next crunch. Their familiarity with the habits and analytical environment of senior Agency officials and area experts is as important as their almost intuitive recognition that an incoming message merits closer scrutiny. Their professionalism contributes immeasurably to keeping the lid on or blowing the whistle for our sleeping colleagues. The creation of today's all-source alert center is a singular achievement. Its accomplishment goes far in the direction of aiding a near real-time publication schedule. One need only witness the teamwork at 5:00 AM to accommodate a major headline change for an intelligence newspaper delivered at 6:30 AM. The Agency's compartmentation into Directorates and Offices is shattered by the effective communication among analysts, editors, duty officers, clericals, and printers-all of it unceremonious and void of both rank and protocol. 'T'hose graduate students 26 years ago gave its an equity early on in the quality of the intelligence product. Today, it gives meaning to our association with all current producers. The juncture that occurred in 1973 altered our role as the night broker for current intelligence. May the next Study Group do as well in helping us meet our obligation to all analysts on whatever disciplinary pedestals they stand. A- proved For Release 2005/01/26: CIA-RDP78T03194A0LQa4MgJMJ L6 Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 SECRET INTELLIGENCE IN RECENT PUBLIC LITERATURE THE ULTRA SECRET by F.W. Winterbotham, CBE. (Harper & Row, New York, 1974) We now have available a book purporting to reveal facts about British communications intelligence successes in World War II. Some passing references are made to U.S. work in this field. If such a revelation about Allied cryptanalytic successes in WW II was inevitable, it can be debated whether a professional COMINT officer would want it made by a person who knew absolutely nothing of any technical aspects of the subject (certainly true of RAF Group Captain F. W. Winterbotham) or by one possessing at least the most elementary technical knowledge. In the first instance, a Wintcrbotham can reveal the fact of analytic operations against the German ENIGMA while hopelessly confusing the extent of the success and the fact that other types of machines and hand systems were also involved. A person with any technical background could never have made the word ULTRA synonymous with ENIGMA decrypts. ULTRA simply was an UK/US agreed word to designate decrypts resulting from cryptanalytic work against any targeted high-level system. Once reconciled to the inevitability of publication, a cryptanalyst can single out a number of interesting aspects of The Ultra Secret. It increases, for instance, the depth of meaning of Churchill's famous statement "Never was so much owed by so many to so few." There actually were two "fews" involved, one of them the RAF fighter pilots and the other the "cryppies" at Bletchley Park, the site of most of the British wartime cryptanalysis. But let us not unduly distort our perspective because of the book. Cryptanalysis did not win the war either in Great Britian, in the Atlantic, in Europe, or in the Pacific. It was a weapon, one of utmost value, but still a weapon to be used either skillfully or clumsily. Both usages occurred, and many are highlighted. In the glow of cryptanalytic successes, the reader may overlook the need for the blood and the sweat and the tears of the fighting men. There was extended hard and very bloody fighting in all theatres, without whose success there would be no Free World as we know it. The fearlessness and self-sacrifice of the skilled and all-too-few RAF fighter pilots gave Britain a chance to survive. True, they were often positioned in advance and the number of them actually committed to any engagement was carefully scheduled and controlled by knowledge derived from ENIGMA (when available) and other decrypts. We should also note that the actual engagement and the fighting, once a German raid was launched, were heavily influenced by British radar which was vital both to give the precise last-minute timing and location of the raid and to provide plausible cover for the effective fighter attacks. This cover was good enough to fool the Germans and most of the English, for only a very few most senior English commanders knew of the existence of the decrypts. Full credit must be given to Group Captain Winterbotham for the establishment and maintenance of what today we would call an SSO (Special Security Officer) system. He worked hard at it, and it Was effective. I am not so sure that the comparable United States SSO system, particularly in the Pacific, was as much dependent on his energy and travel as he would have the reader believe. But he does make crystal clear the successful and necessarily extreme measures that were used to MORI/HRP 4 e ted For Release 2005/01/26 : CIA-RDP78T03194A0004000100144$ from pg. 45-47 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Books control the handling of ULTRA and, where possible, to sanitize it so that it could be used in a timely manner. He leaves no doubt that some of the brilliant tactical victories achieved by maneuver and accurate estimation of enemy intentions were made possible by looking into the ULTRA mirror which revealed key cards in enemy hands. This information may, no doubt, reduce the stature of some battlefield commanders. Some were unable to grasp the meaning of the material made available to them or unwilling to use it promptly for some reason or other. No need for me to name names in this review, for Winterbotham's book is based not on official history but on his recollections, which are at best incomplete even if quite accurate in places. The Ultra Secret is a prolific source of misinformation. It is absurd or wryly laughable to read that the cryptanalytic coups against the Japanese navy, e.g., the Battle of Midway, were made possible because ENIGMA machines were used by that navy. None were used for any Japanese navy traffic at any time in any area. It is equally erroneous to imply that any Japanese diplomatic communications were ever enciphered by a derivative from any version of the ENIGMA. The "purple" (diplomatic) and the "red" (naval attache) machines were related to one another, but in no way to any German equipments. No one of dozens I knew from Bletchley Park, either in the British party or in the sizeable American contingent, had ever heard of the "bronze goddess" or the " Eastern Goddess" or the "oracle of Bletchley" until they read this book. Winterbotham speaks of one decryption device, whereas in fact there were almost two hundred British devices by 1944, and more than one hundred equipments in the U.S. of a more complicated nature to deal with more sophisticated versions of the ENIGMA. All were called "BOMBES" after the Polish name for their analytic equipment, "bomba," since the Poles first achieved a cryptanalytic solution in the late 30's of one of the original (and simpler) versions of the ENIGMA. The "BOMBES" were used to set messages and not to decrypt them. Decryption was done either on replicas of the German equipments or on higher-speed cryptographic equivalents manufactured by the United Kingdom or the United States. No "goddess" or "oracle" did any speaking. Seriously misleading inferences can be drawn from the book, e.g., that almost all German traffic was read and that all levels of traffic, including the highest level of command, were enciphered by using ENIGMA machines, In actuality a very skilled management of available COMINT resources was mandatory, for there always was more traffic to be set and decrypted than available cryptanalysts and equipment could manage. Selectivity of material and direction of effort were skillfully accomplished, as the results show. There also were several other kinds of German machines in use; the several different versions of the ENIGMA were devoted almost exclusively to operational traffic. A message from Hitler enciphered by ENIGMA is so rare as to be almost if not actually non-existent. I have heard of none such. Highest-level German Command traffic, including messages from Hitler, was enciphered in other machines apparently unknown to Winterbotham. An occasional German commander would insist that his orders not be transmitted on the air, possibly (or probably) more because he mistrusted the setup which made cryptographic and code room personnel knowledgeable of his plans than because of any doubts about the security of the cryptography. Another major aspect of the problem, apparently quite unknown to Winterbotham, was the difficulty of actually understanding and making operational sense out of the decrypts. This statement might be clearer if the reader were to imagine that he began to have somewhat random access to streams of technically-oriented 4 Xpproved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 SECRET Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Books SECRET telegrams and not to all of them in any one stream. It would take some time and intensive study and imagination to develop the background and the specialized vocabulary necessary to understand the telegraphese, the abbreviations, the specialized allusions, the references to past events and statements, etc. A very major effort had to be put into this work, and brilliant results followed. But the work involved, the competence of the intelligence analysts engaged in this area, and the many frustrations and false leads that were not allowed to hamper the flow of useful material are not even alluded to in the book. The sizeable American contingent working side by side and around the clock with their British colleagues at Bletchley Park has been overlooked. Maybe Winterbotham never actually crossed the threshold into the working area? There is almost no mention of the German Naval ENIGMA, a more complicated equipment than the Army version, whose solution was so important in winning the battle of the Atlantic. Nowhere in Winterbotham's book is there any clear indication of the effective wartime liaison and exchange of technical personneldand data between the British and the U.S. Army and Navy COMINT organizations. Judged from the viewpoint of today's cryptanalysts, it is most helpful that The Ultra Secret is the bad and incomplete book it is. His account is inaccurate in detail, and although it resembles the truth in outline, much of it is purely imaginary. Nonetheless, one seriously damaging effect the book will have is to give target communications security organizations an accurate base line from which to estimate the competence of the US/UK SIGINT organizations. The successful cryptanalysis of the ENIGMA in the 1940's as set forth in the book gives an accurate measure of competence not hitherto available in unclassified literature. Extrapolation from that information in light of the power of modern, very powerful computers may well cause several lucrative targets to have second thoughts about their present systems and to take remedial measures. I do not believe the book should have been published, nor do I think it would have been if Group Captain Winterbotham had not hoped to usurp a prominent place in the spotlight he is using to illuminate an area that practicing COMINT personnel would prefer to have in the shadow. Without competent code clerks and communicators, the successes he details could not have occurred; his valid claim to fame is scarcely greater than theirs. In addition to alerting target Communications Security organizations to the UK/US cryptanalytic capability against a device of the complexity of the ENIGMA, The Ultra Secret will probably have the effect of causing someone (not me) to attempt a book in which Winterbotham's many errors are corrected and the American role adequately portrayed. Further revelations can only make steeper and rockier the road today's cryptanalysts are walking. giffeved For Release 2005/01/26 : CIA-RDP78T03194A0004000100144 B 8A r oved For Release 2005/01/26: CIA-RDP78T03194Ae Opp --6 THE FROLIK DEFECTION, by Josef Frolik. (Leo Cooper, Ltd., London, 1975.) Josef Frolik, now 47 years old, was a major in the Foreign Intelligence Directorate of the Czechoslovak Ministry of Interior who defected to the West in July 1969, accompanied by his wife and teenage son. While he had apparently contemplated defection for some years, his final decision was prompted by the Soviet invasion of Czechoslovakia in August 1968. As a supporter of the short-lived reformist regime of Alexander Dubcek, Frolik faced at least the loss of his position and, as he puts it, probably worse. Having been recruited for the Czechoslovak Intelligence Service (CIS) in 1952 as a "promising young Party member of unimpeachable proletarian background," Frolik quickly rose through the ranks and served during the ensuing seventeen years both at the Prague headquarters and abroad, including a tour in London. The psychological shock and a feeling of deep national shame following the massive Soviet military intervention against a small friendly neighbor caused several other CIS officers to leave the service and the country. Of these one, a specialist in deception and disinformation operations, has already written a book,* and another is planning to publish his in the near future. In addition to already known information, the wealth of material provided by these defectors serves as confirmation of much of Frolik's account, since several of these CIS officers were either involved in or at least knew about some of the case histories described. Furthermore, Frolik-a thorough professional-prepared himself well for the crucial step which would affect the rest of his life. Because some of his colleagues had defected in 1968, the CIS was forced to undertake a massive defensive reorganization which had been completed by the time of Frolik's own departure in 1969. Consequently, by studying these changes and making copious notes which he was able to take with him, Frolik was in a position to report in detail not only on hundreds of his colleagues and their agents but quite fully on the CIS's "new look." Despite voluminous cuts by British officials censors and Frolik's self-censorship prompted by British libel laws (an uncensored U.S. edition is planned), The Frolik Defection is still well worth reading. It is presented in a concise and convincing manner and offers a number of fascinating case histories, many of which have been confirmed by independent sources. It goes without saying, as already noted in some British press reviews, that those people who regard the KGB and the East European Intelligence Services as mere inventions of cold war propaganda, will certainly cast doubt on Frolik's exploits, especially those dealing with the subversion and, in some cases, recruitment of prominent Western personalities. The credibility of Frolik's account however should be enhanced-at least to the initiated reader--by the well- documented fact that the CIS, more than any other East European intelligence service, has for 20 years been used by the KGB (and is still) to conduct operations around the globe which do not even remotely represent Czechoslovakia's national interest. The CIS, ostensibly operating on behalf of a small nation with few political and economic concerns beyond continental Europe, has with Soviet prodding shown a *Iadislav Bittman: The Deception Game (Syracuse University Research Corporation, 1972), reviewed in Studies in Intelligence XVII/I. MORI/HRP from " l pA?2elease 2005/01/26: CIA-RDP78T03194A000400010014'' pg. 49-51 Coo roved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 CONFIDENTIAL BOOKS surprising appetite and capability for conducting intelligence operations on every continent. While the other East European services also cooperate with the KGB, it was the CIS which was usually singled out to operate in those areas where a high Soviet profile might have been suspect. These included large-scale anti-U.S. operations in Africa, Asia, and Latin America, such as fomenting "peace" demonstrations, organizing student riots, and spreading forgeries. In Western Europe, where the CIS can claim at least some logical reason for operating, its targets are not only people with access to military, political, and economic information, but also high-ranking individuals with political influence in their respective countries, such as members of parliament, trade union leaders, and political party officials. Frolik identified, but in the book did not name, three British MPs as having been recruited by the CIS, and provided damaging information on others (such as the recently publicized Stonehouse case). On the basis of Frolik's testimony, one MP was indicted and tried, but he was eventually acquitted "for lack of convincing evidence." Of the individual topics and case histories described by Frolik in his book, his London experience is probably the most interesting, despite the fact that it is in this chapter that the British censors have been busiest. Also, it is this phase of Frolik's experience which is and will continue to be most loudly criticized by both friend and foe precisely because it exposes CIS methods and the unfortunate gullibility of certain highly placed Western personalities to various types of CIS approaches. The chapters on CIS operations against emigres, notably Josef Josten and his Free Czechoslovak Information Service in London, are well presented and correspond with the wealth of available information on the traditional Soviet and Eastern European paranoia about their national emigration. Information on the unimplemented CIS plan to assassinate or kidnap Josten has been reported by other sources. The chapter entitled "The Czech Philby," dealing with a CIS penetration of British Intelligence operations against Czechoslovakia, seems to be overstated when one compares it with known facts on the subject. By 1958, when the penetration agent was reportedly recruited by the CIS, British offensive operations against Czechoslovakia were virtually phased out; it is, therefore, doubtful that the "Czech Philby" could have caused as much damage as claimed by Frolik. On the internal CIS side, the book provides intimate details of its objectives, procedures, and methods, as well as closely drawn portraits of individual officers, and past and recent high-ranking Interior Ministry personalities. The period which must have been the most painful for Frolik to deal with, namely, the Soviet invasion and its aftermath, is treated with commendable objectivity in describing the profound effect these events had on the CIS and its individual officers, both liberals and pro-Soviet hardliners. Finally, it should be noted here that Frolik's dramatic escape story is not entirely factual; he did not have contact with CIA in Prague, but rather walked in at a U.S. Embassy in another country. The one weakness of Frolik's story is of a purely subjective nature, and a familiar one with most defectors from Communist countries. One has a nagging feeling that Frolik is trying very hard to convince himself that he had intellectually parted with the objectives and methods of the CIS as early as the late fifties, and that it was only due to circumstances beyond his control that he remained in place as long as he did. Straight admissions by some of the other CIS defectors that "they had never dreamed of defecting" until after and because of the Soviet invasion, sound significantly more credible. This is not to say however that Frolik is consciously deceiving himself or his readers. This comment is merely a reflection of dealings with many individuals who 50proved For Release 2005/01/26: CIA-RDP78T03194Aft g11l1111A4-6 Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 BOOKS CONFIDENTIAL had to face the same problem, namely, the question of conscience which all former Communist intelligence officers upon their defection had to grapple with. In summary, The Frolik Defection is an eminently readable and believable account of the inner workings of the most 'important East European intelligence service, which should be of interest to both the professional and uninitiated readers, except of course those in whose estimate the KGB & Company can do no wrong. 0pfFQb2 J ffQrLRelease 2005/01/26 : CIA-RDP78T03194A00040001001% Approved For Release 2005/01/26 : CIA-RDP78T03194A000400010014-6 Books UNCLASSIFIED FIGHT ANOTHER DAY. By Lt. Col. J.M. Langley. (Collins, London, 1974.) SATURDAY AT MI-9. By Airey Neave. (Hodder & Stoughton, London, 1969.) Here are two books of wartime memoirs, published only in England, about a rather esoteric branch of British Intelligence known as MI-9. Both will have found an interested but rather limited audience. In the best British tradition, neither book "tells all." Indeed, both are so discreet regarding anything approaching tradecraft secrets that they will be of only marginal and historical interest to the professional intelligence officer seeking information on "how to" or "how not to." Langley's book is by far the better. It is livelier and provides a clearer organizational picture of how certain special wartime British secret offices came into being and where they fitted into the overall intelligence structure. What is (or was) MI-9 and what did it have to do with American intelligence in the second World War? MI-9 got its start in the early days of the war when the British decided an organization was urgently needed to help its soldiers (mostly downed airmen) evade capture in German-occupied Europe or, if captured, to escape. Very quickly MI-9 created and was managing networks of French, Belgian, and Dutch men and women who dedicated themselves at enormous personal risk to getting British, and later American, evaders and escapers back into allied hands "to fight another day." Some of Langley's book (and much of Neave's) is devoted to detailed descriptions of these escape and evasion networks in France and the Lowlands. These accounts, a number quite dramatic, include the story of the exploits of Pat O'Leary, who became one of the legends of "E & E." Royal Navy Lieutenant-Commander Patrick O'Leary was in fact a doctor in the Belgian Army named Albert Guorisse, who had escaped to England in 1940, volunteered for service in enemy waters off the coast of Southern France and-because he got left behind one night in the confusion of a landing operation-ended up in France running an important E&E network for two years until his capture through treachery in 1943. Langley draws a rather sympathetic picture of the MI-9 Chief, Brigadier Norman Crockett, whose full title was Deputy Director of Military Intelligence for Prisoners of War, shortened to DDMI P/W. Crockett had many virtues, not the least that he lacked the latent and sometimes active anti-Americanism of Langley (and of author Airey Neave), Most American officers who served with them, including this one, found the egos of Langley and Neave to be rather vast and discovered that the feeling was shared by a number of their British colleagues. It so happens that Crockett also directed as part of his responsibility another interesting branch known as MI-19, which was concerned with the detailed interrogation of those relatively few enemy prisoners who had special, even vital, strategic information-a German general captured at Tobruk, a submarine captain rescued from the North Atlantic, a signals sergeant captured in North Africa. (None of these details, unfortunately, is included in Langley's book, which deals exclusively with MI-9.) The most interesting facet of Fight Another Day is Langley's anecdotal account of himself: how he became a Coldstream Guardsman; the dramatic role he and his comrades played before their capture at Dunkerque; how he managed, though X% I~ 5Relea5e 2005/01/26 : CIA-RDP78T03194A000400010014,- Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 UNCLASSIFIED Books still not recovered from the loss of an arm, to escape and return to England; and how as it result he got into the escape and evasion business. Although the reader will learn that MI-9 was part of MI-6, Britain's Secret Intelligence service, he will get no new insights into how MI-6, or for that matter MI- 9, handled its technical tradecraft problems. Radio messages, yes; how to construct and protect codes, no. He will learn that the brave men and women who were recruited for the networks were mostly motivated by hatred of the Germans or by a conviction that human freedom depended on the Allies winning the war. The reader will learn that some endured terrible tortures and that some, often the bravest, died. What he will not learn is methods which might be useful for the future. He will not learn, for example, how the British communicated clandestinely with prisoners in the enemy's camps. Just before D-Day, a special "European Campaign" off-shoot of MI-9 was established to operate with the Allied armies on the continent. The unit was a joint British-American operation and bore the name I.S.-9 (WEA), short for Intelligence School-9, Western European Area. The British personnel came from MI-9, while the American members-both officers and enlisted men-were from MIS-X (Military Intelligence Service-X), the U.S. Army's escape and evasion component and the equivalent of MI-9. Small detachments of I.S.-9 (WEA) were assigned to each Allied field army to organize and bring about rescues if that should prove practicable. (To a large extent it did not, because the Allied forces rolled over France too rapidly, but there were later some successes in Holland). The British-American detachments did, however, interrogate escapers and evaders in the field, not only to extract intelligence quickly about what was "beyond," but also to establish these men's bona fides. Saturday at MI-9* might very well lead the reader to believe that the Americans hardly had a role in the common cause of escape and evasion. The British did in fact have the lion's share of "E & E" responsibility in the European Theatre, just as the Americans had it in the Pacific. This state of affairs existed by mutual U.S. & British agreement, however, which is a point Neave chooses to ignore although he could hardly have been unaware of the agreement. Perhaps this was a calculated omission, explainable by an observation of Langley (page 73) about his colleague, "Airey will, I am sure, forgive me when I state that he had already mastered the art of calculated arrogance." Let it not be said that Neave is unclever. He managed in 1953 to get elected to a seat in Parliament and to retain that seat over the years, and was recently credited by The Economist with being the architect of Margaret Thatcher's victory over Edward Ileath for the leadership of the Tory Party. A British friend from the days of MI-9 recently remarked to this reviewer, "Airey never lacked the knack of attaching his wagon to the right star." The serious reader will not learn any more about "how to do it" from Neave than from Langley. Let it be said, even so, that the book contains interesting historical and statistical information. The following is an example of the kind of facts which find ample place in the Neave book and which, in print, are a valuable contribution to the history of these little known episodes of World War II: "The actual MI-9 figures for Air Force evaders in Western Europe as a whole were: 1,975 R.A.F. and Commonwealth, and 2,962 United States Air Force." (p. 221) *"Saturday " was Neave's pseudonym. Approved For Release 2005/01/26 : CIA-RDP78TO3194A000400010014-6 54 UNCLASSIFIED Approved For Rele 25X1 25X1 Approved For Releacle 1005101116 - C' A--R-DR78T03194 A0004 00