TOWARD A BASIS FOR EXPLOITING INTELLIGENCE IN THE NATIONAL INTEREST

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80R01720R000900080059-7
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
7
Document Creation Date: 
December 22, 2016
Document Release Date: 
September 21, 2012
Sequence Number: 
59
Case Number: 
Publication Date: 
January 1, 2000
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP80R01720R000900080059-7.pdf408.84 KB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 ' Nor Toward A Basis For Exploiting Intelligence In The National Interest "National Security" and "National Interest" are terms which, if each is defined very broadly, can mean essentially the same thing, and if defined very narrowly can mean "guns" and "butter. " A mix of these two extremes, put in perspective, can be helpful. In an unthreatening world, no effort (cost) would be expended in defending one's self; in a very threatening world, all one's effort would be expended on self-defense and if defenses were inadequate, extinction would result. In fact, reality is a mix of proximate and remote risks and benefits of such a variety that trade-offs are made in the expenditure of effort as between "interest" and "security." Interest and security are coupled in this view: immediate threats to security are met, at a cost to interest, with "off-the-top" resources; remote threats are created or discounted in the pursuit of interest. As a way of quantifying this, I postulate that, on a scale of value appropriate to both "interest" and "security, " an action which causes a gain in the interest metric by one unit can in turn decrease, with some probability and at some future time, the security metric by more or less than one unit -- all conditioned by intervening events. If one must buy back on the security value scate'the cost incurred then, if the present value of the interest gain is greater than this buy-back cost, the earlier decision was a good one; otherwise it was not. Thus if there is a potential cost due to national security risk resulting from a prospective national interest benefit, proper questions are -- What is the cost associated with the risk? -- When is it likely the cost will be incurred? -- What are the conditional (scenario) probabilities associated with these two questions? Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 "we An example might make this concrete: the contribution to national income derived from the sale of high technology (computers, large scale integrated circuits, etc.) processes and factories to the Soviet Union is clearly in the national interest. Such a sale makes American jobs, moves American influence overseas to a "denied" area and improves American world prestige for the implied Soviet deficiency in the technology area. However, such a sale is conceivably even possibly contrary to national security.. Computers and integrated circuits are the non of efficient and effective modern weapon systems which can threaten American national security. It is the speculative nature of the foregoing paragraph which is important: what is the national interest and what with some precision -- is the threat? There has been since at least late 1971 an apparently sincere effort by both policy- makers and the intelligence community to work together effectively on energy, economics, narcotics, terrorism, and the like. ,At the same time, however, there is a prevalent unease or dissatisfact'.on' that an adequate job was being done. I assert that progress has been slow for two reasons: we have not made systematic the'Comparison of national interest values and national security values, and as a consequence, we have not had the confidence required to move large amounts of resources to national interest related intelligence; on the other hand, the national interest community -- that identified by the codeword "butter" -- has not structured itself to use abundant and complex intelligence relating to interest. These two value systems are now separate and the way to change the situation is to tie them together by a mutually regenerative feedback between them. It appears that the intelligence community is willing and capable of responding to the needs of the "interest" community. If circumstances are left as is, an evolution in each community will take place with the result that better intelligence will be provided and it will be used more - 2 - Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 . NNW effectively. We could, however, short-circuit this evolution by adapting a national security process known to be effective -- some see it as too effectiNe -- to national interest problems. What follows is a synthesis of the elements of the national security (military-industrial complex, MIC) process. It is the working of this process which as a byproduct develops Don inputs to NSSM studies; the result of which is an assessment of policy options. To the degree that the non-DoD inputs result from similarly disciplined processes, NSSM study results are balanced. In an area where options are conditioned by both national security and national interest (e.g., where both an NSSM and a CIEPSM are required for implementation), it appears that all inputs are not so rigorously arrived at. The suggestion is therefore that the national security process should be adapted to clarifying "national interest" policy options. 1. Thi2: e=ti_.on is the starting point initiated or ? suggested to the policymaker. It leads to customer intelligence requirements of a general nature as in the DCI's Key Intelligence Questions and generates ? the necessary, permanent process of their develop- ment. These general requirements lead to: 2. Intelligence acquisition through the intelligence process (requirements and priorities for collection, processing, production and analysis and dissemination). The intelligence acquisition permits a threat description not complete in all dimensions but providing a basis for: 3. Threat definition in the context of the customers' perception of the threat. The definition may be elaborated in an informed community in and out of government (e.g., MIC), which then puts forward: 4. Systems* concept formulation to gain capability for countering the defined threat. The conceptual System is meant to connote either hardware or software (i.e., organiz,Ltional or logical) constructs which produce deterministic results. - 3 - Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 'roe countering systems might by class be offensive, defensive or non-competitive and must be proved by state-of-the-art assessments and by systems analysis. When realizable or very probably realizable systems are identified then: 5. Cost/benefit calculations based on net assessment (i.e., system analysis of A's "threat" vs B's "counter" in which 'responsive strategies are permitted to develop) should be carried out. This mandates establishing a value system or "metric" for assessing and/or rationalizing various kinds of costs, risks, and benefits. When the costs and benefits of candidate approaches (systems) are identified they could become inputs to the NSSM/CIEPSM study and provide the basis for identifying policy options. In any event, when the cost-beneficial system (or class thereof) is found, then: 6. System definitioiL (specification) in terms of performance, cost, schedules, reliability, risks, initial operating capability, etc., is made, and agreement is reached (a contract made) with theorganization responsible for actions leading to the capability. 7. System RDT&E* is an iterative process of items 1-6 above leading to a prototype system on the one hand and incidentally a better understanding in the intelligence process (#2) of the threat indications. Conditioned by the system's being hardware or software, the prototype might be an "all-up" copy, a "breadboard" or "brass board," an operating mock-up, anew computer simu- lation or a "game," When the system meets defined specifications adequately, then given a decision to go ahead: 8. System procurement is implemented: for hardware systems, replication might be large; for software systems, final procurement could have been accom- plished in the RDT&E phase, i.e., in obtaining the prototype. Finally: Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 9. System operation and maintenance (O&M) is carried on.. Some monitoring of O&M is required to assure that the desired objective (countering the threat) occurs and that costs and benefits are as assessed or that discrepancies are understood and corrected if possible. Clearly, the foregoing process is too elaborate if the national interest is getting a negotiator ready for a GATT meeting. However, the organized approach it conveys is appropriate to enduring, complex or chronic problems relating to national interest. How to propagate such an approach is not evident. The I\TIO's and the ICS as DCI bearers of different aspects of intelligence community interests could -- given highest level support -- be the catalysts for change toward the relevant aspects of the structure shown above. The present time of flux in the intelligence community and in the government is a good time to start trying. - 5 - Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 Offi,..of the Director of Central Intelligence Messrs. Slighton and May 7, 1974 ttached is a note to me froff To be blunt, it reinforces my prejudice t at systems analysts should be seen and not heard.________got Leo Cherne quite stirred up withissuggestion that we (i.e., the DCI) ought to organize an "intelligence-industrial complex" to serve functions (beneficial in eyes) similar to those now performed by the "military-industrial complex." It took me several minutes over the long distance telephone to get Cherne off the chandelier and reassure him that this brain storm was neither stimulated nor endorsed by Mr. Colby or anyone else I had encountered in the DCI's office. After you have had a chance to look over this paper I would like to discuss it briefly. George A. Carver, Jr. Deputy for National Intelligence Officers '711C STAT ? STAT STAT .STAT STAT Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 STAT STAT Declassified in Part - Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7 'war' 'vivo MEMORANDUM'F ? itM O. AUG 54 ? ? REPLACES FORM 10-101 WH ICH MAY BE USED. ' f STAT Declassified in Part -.Sanitized Copy Approved for Release 2012/09/21 : CIA-RDP80R01720R000900080059-7