PNIO REVIEW COMMITTEE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP82R00129R000100060026-6
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
33
Document Creation Date: 
December 16, 2016
Document Release Date: 
January 7, 2005
Sequence Number: 
26
Case Number: 
Publication Date: 
February 15, 1963
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP82R00129R000100060026-6.pdf1.63 MB
Body: 
Approved For Rse 2005/03G1~2R00129F0100060026-6 UNITED STATES INTELLIGENCE BOARD 15 February 1963 MEMORANDUM FOR: Mr. Ray S. Cline, Deputy Director (Intelligence), Central Intelligence Agency Mr. Allan Evans, Deputy Director for Research, Intelligence and Research, Department of State Chief of Staff, Defense Intelligence Agency Mr. Ludwell L. Montague, Board of National Estimates, Central Intelligence Agency Deputy Assistant Director for Production, National Security Agency SUBJECT PNIO Review Committee REFERENCES (a) USIB-D-25.1/5, 9 January 1963, USIB-Approved (b) USIB-AM-63/3, 11 January 1963 1. Confirming telephonic advice to your office, the initial meeting of the PNIO Review Committee established by the USIB in accordance with reference (b) is scheduled for Monday, 18 February, at 1+30 hours in Room 7 E 30, CIA. Headquarters Building, Langley. 2. For background in connection with this meeting, the following documents are pertinent: a. NSCID No. 1 (New Series) paragraph 3.b. b. DCID No. 1/2, "Comprehensive National Intelligence Objectives" c. The current DCID No. 1/3, which has been distributed by reference (a) d. The attached list of "Points Raised During USIB Discussion of PNIOs, 3 January 1963" e. The attached CIA. memorandum for the Special Group (CI) on the relation of PNIOs to counter-insurgency Approved For Release 2005/03/S E~'T~RRM~5PR00129R000100060026-6 Approved For R ase 2005/0 *.CJRI 82R00129F ,QO100060026-6 f. The attached articles from Studies in Intelligence entitled "A. Fresh Look at Collection Requirements and "Priority National Intelligence Objectives" 3. It is suggested that the discussion at the first com- mittee meeting consist of a preliminary exploration of each member's views regarding the basic concept, purpose and form of the PNIOs, particularly as to changes that should be considered. Following such discussion, the committee could then determine the procedures for further study and the preparation of a draft report to the USIB. In this connection, it is suggested that each committee member bring at least one staff assistant to support him in carrying out the work of the committee. 25X1 Executive Secretary, Approved For Release 2005/03/2 eaff R00129R000100060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 SECRET Points Raised During USIB Discussion of PNIOs, 3 January 1963 The PNIOs are in artificial categories. They should define more clearly and specifically where to direct the intelligence effort. First priority should be any threat to the life of our Country. Consider carefully the operational. consequences of the PNIO categories. The PNIOs should provide specific guidance to critical problems without negating normal efforts. There should be specific and maximum efforts directed where indicators warrant without standing down efforts elsewhere. Keep Categories I and II. Rely on regular coverage for the rest. Outline areas of interest without specifying countries. PNIOs should be concerned with threats to (a) the U. S. and (b) our strategic position world-wide. Priorities change day-to-day. Therefore, if the PNIOs list countries, you must put in catch all definitions. Dissatisfied with the PNIOs because they didn't command the necessary performance in Cuba during July and August. Any additions or deletions from the PNIOs should be explained, particularly that deletions do not mean 'that normal collection on that subject should be stopped. Approved For Release 2005/0''LIA82R00129R000100060026-6 Approved Foh,Release 2005/03/24: CIA-RDP82R001l'000100060026-6 -it - -T C E N T R A L I N T E L L I G E N C E A G E N C Y 12 February 1963 MEMORANDUM FOR THE SPECIAL GROUP (C . I . ) SUBJECT: DC ID 1/3, "Priority National Intelligence Objectives," 9 January 1963, in Relation to Counter-Insurgency. 1. DCID 1/3 is prepared pursuant to NSCID No. 1, paragraphs 3b (1) (b), as broad gdidance for the coordination of intelligence research and collection. The DCID is reviewed and revised whenever a need to do so is indicated, but in any case at least annually. 2. In the -prepacrtion of DCID 1/3 it 16 recognized that the bulk of the intelligence required in the formulation and execution of national security policy will be the product of routine collection and research, and that priority national intelligence objectives (PNIOs) should be strictly limited to those critical problems which require special attention and effort, in order to preserve the meaning of the word "priority". 3. The priority national intelligence objectives set forth in DCID 1/3 are not "essential elements of information". They GROUP 1 Excluded from automatic downgrading and S-E-C-R-E-T declassification Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Approved Fo lease 2005/03/24: CIA-RDP82R001290000100060026-6 are the USIB's identification of the principal estimative problems confronting the intelligence community, and as such are only the first step toward the development of priority collection require- ments. The full process requires further analysis by research personnel to determine the elements of information essential to a solution of the problem indicated? the elements already available or readily obtainable through research, the additional information obtainable through routine collection, and finally the residual information of such critical importance as to warrant a priority collection effort. 4. Four broad categories of priority within the general priority listing are recognized in DCID l/3: 25X1 Approved For Release 2005/03/2 IA-RDP82R00129R000100060026-6 25X1 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 "All statements of fact, opinion, or analysis Approved expressed in 'Studies in Intelligence' are those of the authors. They do not necessarily reflect official positions or views of the Central Intelligence Agency or any other US Government entity, past or present. Nothing in the contents should be construed as asserting or implying US Government endorsement of an article's factual statements and interpretations." For Release 20Qp3/24 : CIA-RDP82R00129R0001002~-6 ELORE Evolution and role of "the most broadly controlling document in the field of requirements." PRIORITY NATIONAL INTELLIGENCE OBJECTIVES Ludwell L. Montague Clyde Herter, in the "Fresh Look at Collection Require- ments" which he takes in a recent issue of the Studies,' notes the "conspicuous hiatus" between such high-level guidance documents as Director of Central Intelligence Directive 1/3, Priority National Intelligence Objectives, and the collection requirements actually produced at the working level, particu- larly with respect to the question of determining relative priorities among such requirements. He invites discussion of the problem of "how to formulate needs and priorities in such a way as to facilitate the satisfaction of needs in a de- gree roughly proportionate to their priorities, through the most effective use of the collection means available." In the nature of the case, collectors are likely to be more keenly aware of this problem than people working in other phases of the intelligence process, but its existence and gravity should be of concern to researchers and estimators as well, for it is their work that ultimately suffers from any diffusion and misdirection of the collection effort. The hiatus be- tween general guidelines and practical requirements that Mr. Herter points out is real, and its consequences are serious. He has considered it from the collectors' viewpoint. The pur- pose of this article is to complement his analysis with an ex- amination from the other side of the gap-specifically, to de- scribe the development of the PNIO concept and to review what the PNIO's are and are not intended to be. Conclusions as to what is wanting for the determination of practical pri- orities are substantially the same from either point of view. Evolution of the PNIO's From the outset it was understood that the responsibility of the Director of Central Intelligence for the coordination of Approve?elease 2005/03/24: CIA-RDP82R00129R0001000600261-6 Approved For Release 2005/03/24: CIA-R2R00129R000100060026-6 SE%.RET PNIO's U.S. foreign intelligence activities included a responsibility to provide authoritative guidance for intelligence collection and production from a national (as distinguished from depart- mental) point of view. To this end, National Security Coun- cil Intelligence Directive 4, adopted by the NSC in December 1947, prescribed two specific duties: (1) To prepare "a comprehensive outline of national intelli- gence objectives [generally] applicable to foreign countries and areas." (2) To select, on a current basis, the sections and items of this outline having priority interest. By "comprehensive outline" the drafters of NSCID 4 meant an integration of such then existing departmental docu- ments as the Army's Index Guide and the Navy's Monograph Index. What they had in mind has actually been accom- plished by the preparation of the National Intelligence Survey outline (NIS Standard Instructions, June 1951). However, the publication of DCID 1/2 (15 September 1958) was consid- ered necessary to meet the formal requirement for a "com- prehensive outline" of national intelligence objectives. The 1947 directive had the fault of prescribing a method rather than a mission. Manifestly, national intelligence ob- jectives have never been determined by the selection of "sec- tions and items" from a "comprehensive outline." They are no longer required to be in NSCID 1, of 15 September 1958, whose subparagraph 3b (1) is the present-day survivor of the original NSCID 4. The fact is that no priority national intelligence objectives were formulated until 1950, and that their provenance then was unrelated to NSCID 4. In May 1950 the Joint Intelli- gence Committee produced JIC 452/7, "Critical Intelligence Objectives of the Department of Defense with Respect to the USSR." This document identified as critical intelligence ob- jectives five generalized aspects of Soviet military capabilities. In September its text, with the addition of two highly gen- eralized references to political warfare, was adopted as DCID 4/2, "Priority National Intelligence Objectives." In June 1952 this DCID was amended to cover explicitly not only the USSR but also "its Satellites (including Communist China)." Approved For Release 2005/03/24: CIA-RDP82R00129 aM060026-6 Approved For Release 20$53/24: CIA-RDP82RO0129R0001000 6-6 PNIO's SECRET The preoccupation of DCID 4/2 with Soviet military capa- bilities was a natural consequence of its origin and of the cir- cumstances of the time, the shooting war then in progress in Korea. In August 1953, however, an armistice having been signed, the adequacy of the DCID as priority guidance for a national intelligence effort was questioned. The Board of National Estimates was directed to study the problem and to propose a suitable revision. Its study, in consultation with research and collection personnel throughout the Agency, ex- tended over a period of ten months, followed by six months of inter-agency coordination. It was represented to the Board that the almost exclusively military character of DCID 4/2 resulted in claims of priority for the collection of any desired item of military information over any other information, no matter how significant the latter might be in relation to the national security. Such claims were plainly out of consonance with the current esti- mate (NIE 99, October 1953) that, for the near term at least, the Kremlin would probably avoid military action with identi- fiable Bloc forces, that the active threat to U.S. security was likely to be a vigorous Communist political warfare campaign designed to undermine the Western power position, and that there was danger of a weakening of the unity of the Free World. They were also plainly out of consonance with NSC 162/2, Basic National Security Policy (October 1953), which emphasized a need for intelligence on the capabilities and in- tentions of friendly and neutral states as well as of the Soviet Bloc. The Board concluded that the list of priority national in- telligence objectives must be expanded to cover at least the most significant of these non-military concerns, and that there must also be some discrimination between military ob- jectives of greater and of lesser consequence. This expansion of the list and need for discrimination within it led to the de- velopment of three general categories of priority within the listing. A single list in absolute order of priority was con- sidered infeasible and also undesirable, as likely to introduce self-defeating rigidity into the system. The revised DCID proposed by the Board of National Esti- mates and adopted by the Director of Central Intelligence with the concurrence of the Intelligence Advisory Committee Approved kelease 2005/03/24: CIA-RDP82R00129R00010006002a-6 App ved For Release 2005/03/24: CIA-Rd2R00129R000100060026-6 SL:LRET PNN1O's (DCID 4/4, December 1954) was the prototype of the present DCID 1/3 (4 January 1961). The differences between the two represent only those adjustments normally to be expected as responsive to developments in the situation. Criteria for PNIO Selection The DCID has an annex that sets forth certain criteria to govern the selection of priority national intelligence objec- tives. A gloss on these criteria is in order at this point. It is stipulated, first, that the PNIO's should be directly re- lated to the intelligence required in the formulation and exe- cution of national security policy. Through its role in the preparation of national intelligence estimates, the Board of National Estimates is cognizant of the intelligence require- ments of the NSC and its subordinate policy boards. It is also cognizant of the most critical problems inherent in the estimates required to meet their needs. Its identification of these substantive problems as priority national intelligence objectives can provide a basis for identifying priority research and collection requirements, but of course does not in itself define such requirements. Second, since the bulk of the intelligence required in the formulation and execution of national security policy will be the product of routine intelligence collection and research, the PNIO's should be limited to the critical problems which require special attention and effort. This principle should be axiomatic. There is, however, constant pressure to make the listing more inclusive, with a consequent danger of its becom- ing so nearly all-inclusive as to deprive the word "priority" of meaning. This pressure, which apparently springs from a de- sire to get everyone's favorite topic listed as a priority objec- tive in order to insure that it will not be neglected, has to be resisted. Third, in order to afford a stable basis for intelligence planning, the DCID should be designed to remain valid over an extended period. This consideration requires the exclusion of topics of momentarily urgent, but transitory, interest, which will require and receive ad hoc treatment in any case. The present practice is to review and revise the DCID annu- ally, the process sometimes extending the period between re- visions to as much as eighteen months. Approved For Release 2005/03/24: CIA-RDP82R00129R9QUBP060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R0001000600 6-6 PNIO's i.r, SE Fourth, since broad generalities are of little practical use, the PNIO's should be specific enough to provide discernible guidance for the allocation of research and collection re- sources, but not so specific as to constitute in themselves re- search and collection requirements. The application of this criterion presents the greatest difficulty in the formulation of PNIO's and is the source of complaints from those collection personnel who refuse to accept them, with Mr. Hefiter, as "a constitution which requires both laws and courts to interpret it." The criterion has served on the one hand to rule out the kind of generality found in the 1950-52 DCID 4/2, and on the other to keep the PNIO in rather broad terms, especially in comparison with specific collection requirements-that is, to maintain its character as the statement of a critical sub- stantive intelligence problem rather than an itemizing of the essential elements of information needed for its solution. Role of the PNIO's in Guiding Research and Collection The function of the PNIO's as stated in the DCID, is to serve as a guide for the coordination of intelligence collection and production. They are intended to be only the first step in a process beginning with a need for information felt at the national policy planning level and extending to the servicing of specific collection requirements in the field. In this first step, the Board of National Estimates, with the advice of other Agency offices and in coordination with USIB representatives, identifies the critical substantive prob- lems inherent in the general body of intelligence required for purposes of national security policy. This is as far as esti- mators can properly go in relation to the total problem. The identification and formulation of collection requirements re- lated to these priority national intelligence objectives requires analysis by research personnel to determine the elements of information essential to a solution of the problem, the ele- ments already available or readily obtainable through re- search, the additional information obtainable through routine collection and the residual information of such critical im- portance as to warrant a priority collection effort. Obviously, not every bit of information somehow related to a priority national intelligence objective will be required with equal urgency. Many are procurable by routine means. It is Approved i-TRelease 2005/03/24: CIA-RDP82ROO129R0001000600N-6 Apr'bved For Release 2005/03/24: CIA-R2R00129R000100060026-6 bLCRET PNIO's therefore necessary that research personnel exercise discrimi- nation and restraint in formulating collebtion requirements, claiming priority for only those aspects of a priority objec- tive that actually do require a priority collection effort. As Mr. Heffter has pointed out, the criterion here is not a pos- sible incidental relationship of the collection requirement to a PNIO, but the importance (the essentiality) of the desired information for a solution of the critical problem designated in the PNIO and its unavailability from other sources. If re- search analysts present unjustified claims for priority collec- tion, citing some not cogent relationship to a PNIO, collectors must exercise their own judgment and authority in rejecting them. If a particular system of intelligence collection is unable to satisfy all of the legitimate requirements levied upon it, determinations have to be made as to which requirements will be accorded priority. In this operational context, :how- ever, priority can never be determined solely by reference to the PNIO's. One requirement related to a PNIO and certi- fied by a responsible research agency to be a really essential element of lnformation, being well suited to the particular mode of collection, may consequently be accorded the desired priority. Another such requirement may be totally unsuited to that mode of collection and therefore unworthy of any con- sideration whatever, no matter what the PNIO to which it is related. All sorts of gradations are possible between these two extremes. In these circumstances collection officers must assume the responsibility for deciding between the im- portunate claimants for their services. Their decisions may be informed and guided by the PNIO's and other instruments that Mr. Heffter cites, but they must be made primarily in terms of the collector's expert professional knowledge. Problems such as these are inherent in the administration of intelligence research and collection. No reformulation of the PNIO's could obviate them-unless, indeed, the PNIO's were to be transformed into a community-wide listing of coor- dinated collection requirements in an absolute order of pri- ority. Even if this were done, something like the present PNIO's would then have to be reinvented to guide the coordi- nators of collection requirements. The problem lies, not in the PNIO's, however imperfect they may be, but in the gap Approved For Release 2005/03/24: CIA-RDP82R00129RCMOWD60026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 PNIO's ?.w SEtXmf between them and the scramble to obtain priority for indi- vidual collection requirements. What Can Be Done About It? In 1954 the Board of National Estimates was keenly aware that the formulation of PNIO's was only a small part of the total problem. It recommended that the then Special Assist- ant to the Director for Planning and Coordination be directed to review existing procedures for the development and coordi- nation of collection requirements in relation to the PNIO's, and to propose improvements. The Special Assistant made such a study and concluded that no action was advisable. Like Mr. Heffter, he considered that a single community-wide mechanism for coordinating collection requirements, assign- ing priorities to them, and allocating particular collection re- sources to their service would be a Rube Goldberg contrap- tion, more a hindrance than a help. The Board of National Estimates would heartily agree. It had not meant to propose the invention of such a machine, but it had hoped that seri- ous study of the subject might bear such fruit as a more gen- eral understanding of mutual responsibilities and more sys- tematic procedures for cooperation in the common cause. For six years, however, the gap has remained, and collec- tors as well as estimators evidently find it to be not a Good Thing. And now Mr. Heffter comes forward with some con- structive suggestions and a welcome invitation to profes- sional discussion of the problem. Rejecting as impractical the idea of a community-wide coordination of collection require- ments in priority order, he suggests that the situation could be alleviated if more systematic use were made of the find- ings of the several USIB subcommittees under their assigned authority, in their respective fields, "to recommend ... intel- ligence objectives within the over-all national intelligence ob- jectives, establish relative priorities on substantive needs, re- view the scope and effectiveness of collection and production efforts to meet these objectives, and make the necessary sub- stantive recommendations to the departments and agencies concerned." This would be precisely the kind of implemen- tation of the PNIO's which the Board of National Estimates has advocated for many years. Approv 99bTRelease 2005/03/24: CIA-RDP82R00129R000100060026-6 Apved For Release 2005/03/24: CIA-R2R00129R000100060026-6 S_ _RET PNIO's More important than any procedural proposals, however, is Mr. Heffter's recognition of the fundamental need for a truly professional doctrine and discipline in relation to this subject. The professional discussion which he seeks to stimulate is a necessary step toward the satisfaction of that need. It is now time for someone to join the discussion from the viewpoint of the research components of the community. 4proved For Release 2005/03/24: CIA-RDP82R00129R A16b060026-6 "All statements of fact, opinion, or analysis Approved expressed in 'Studies in Intelligence' are those of the authors. They do not necessarily reflect official positions or views of the Central Intelligence Agency or any other US Government entity, past or present. Nothing in the contents should be construed as asserting or implying US Government endorsement of an article's factual statements and interpretations." For Release 2005/03/24: CIA-RDP82R00129R0001000Sf002&-6 An unsolved problem analyzed in depth and some approaches recommended to solution. A FRESH LOOK AT COLLECTION REQUIREMENTS Clyde R. Heffter In the immediate post-war period, the word "requirement" was seldom heard in intelligence circles, and what we now know as collection requirements were managed in a very off- hand way. Today this subject is well to the fore, its impor- tance acknowledged by everyone. Looking back, it is possible to see certain steps by which this reversal of things came about. First there was a time when many people, both collectors and consumers, saw no need for requirements at all-when information was believed to be there for the plucking, and the field intelligence officer was considered to need no help in de- ciding what to pluck. This period overlapped and merged quickly into a second one in which requirements were recog- nized as desirable but were not thought to present any spe- cial problem. Perhaps the man in the field did, after all, need some guidance; if so, the expert in Washington had only to jot down a list of questions and all would be well. A third phase began when it was recognized that require- ments were an integral and necessary part of the intelligence process and that they needed to be fostered and systematized. Committees were set up, priorities authorized, channels es- tablished, forms devised, control numbers assigned. Thus by the early 1950's the formal requirements machinery of today was mostly in place. The fourth and most interesting phase, which is still with us, might be called the phase of specialized methodologies. The harsh difficulties of intelligence collection against the Sino-Soviet Bloc have driven home the realization that the way a requirement is conceived and drawn, the way it gets at its ultimate objective, the details it includes, the alterna- tives it provides, the discretion it permits, and a dozen other features may largely predetermine its chances of fulfilment. Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026 43 Awed For Release 2005/03/24 :CIA-F3i 82R00129R000100060026-6 _RET C. action Requirements Specialists in many fields, intent on solving immediate, con- crete problems, have created new types of requirements pe- culiarly adapted to their own aims and circumstances. One requirement may take its shape from an analytical technique, Another may be cast in the mold of a collection method-photography, ELINT, exploitation. of legal travel. Subjects, areas, sources, access, communica- tions-all have put their mark on the writing of requirements. If we turn from the past and speculate on the future, we can hardly doubt that it will be one of intensified effort. For it is more and more evident that the answers we get are intimately conditioned by the questions we ask, and that asking the right questions-the business of requirements-is no spare-time job. But what direction should this intensified effort take? Undoubtedly the healthy specialization and experimental- ism of the present should and will continue. But by itself this is not an adequate program. The problems of requirements are not all special problems. Some of them are central to the very nature of the requirements process. One cannot help reeling that too little of the best thinking of the community has gone into these central problems-into the development, m a word, of an adequate theory of requirements. it would be untrue to imply that nobody has been concern- ing himself with the broad questions. Much expert thought as gone into the revisions of guidance papers for the com- uunity at large or for major segments of it. But there is 1ften a conspicuous hiatus between these high-level docu- uuents and the requirements produced on the working level. ., )ealing with general matters has itself become a specialty. We lack a vigorous exchange of views between generalists and ;pecialists, requirements officers and administrators, members of all agencies, analysts in all intelligence fields, practitioners of all collection methods, which might lead at least to a clarifi- cation of ideas and at best to a solution of some common prob- lems. It is the aim of this paper to incite, if possible, such an ex- change of views. It offers as candidate for the title of Num- ber One Requirements Problem the problem of priorities. More exactly, it is the problem of how to formulate needs and priorities in such a way as to facilitate the satisfaction of a4Oproved For Release 2005/03/24: CIA-RDP82R00129F`tNM0060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Collection Requir&llfints S _ T needs in a degree roughly proportionate to their priorities, through the most effective use of the collection means avail- able. This problem is one which deserves and will probably re- ward the most searching study that can be given it. The present paper cannot claim to be such a study. Among its limitations is the fact that the writer's personal experience is confined to the clandestine collection field. It seeks, how- ever, to demonstrate that there is such a general problem; that it is amenable to general analysis; that it must be ex- amined not merely as a problem in administration but as one in analytical method; and finally that it is one with which the individual intelligence officer can effectively concern himself. The few specific proposals in the following pages are incidental to these general aims. We may begin with a provisional definition of a collection requirement as simply "a statement of information to be col- lected." Our next step is to examine the most important va- rieties of such statements. Kinds of Requirement In the management of collection requirements there are certain persistent tendencies that reflect the divergent in- terests of the participants. There is the tendency of the analyst to publish a list of all his needs in the hope that some- body will satisfy them. There is the tendency of the theorist and the administrator to want a closely knit system whereby all requirements can be fed into a single machine, integrated, ranged by priorities, and allocated as directives to all parts of the collection apparatus. And there is the tendency of the collector to demand specific, well-defined requests for informa- tion, keyed to his special capabilities. These tendencies are capable of complementing each other usefully if brought into reasonable balance, but their co- existence has more often been marked with friction. It will be useful at this point to take a look at the word "requirement" in ordinary English usage. For the divergent tendencies just mentioned have a remarkable parallel in cer- tain divergent but thoroughly ingrained connotations of the Approved G%lease 2005/03/24: CIA-RDP82R00129R0001000600261 Ap ved For Release 2005/03/24: CIA-R 2R00129R000100060026-6 AET ction Requirements word itself. It is highly likely that these connotations, jum- bled together loosely in the backs of our minds, help to create our notions of what a requirement "really ought to be." Though not mutually exclusive, they are sufficiently different that as one or the other predominates, the character of the resultant concept varies appreciably. The first connotation is that of need. A requirement is :something needed, or a statement of that need. This mean- ing does not necessarily involve the idea of authority. The need is objective; it is determined by the facts of the case. Thus food, water, and oxygen are requirements of the human organism. And thus information on various subjects is a re- quirement of the analyst, the intelligence organization, and the Government itself. When we think of the intelligence re- quirements of the Government, we are thinking not merely of what has been authoritatively determined to be needed, but of what actually is needed. This way of regarding require- ments, which is basic and which we all share to some extent, adds dignity to our conception of our work. To the analyst, who thinks in terms of what he needs in order to do his job, it is the dominant connotation, and in fact the only one he cares about until experience forces him to look farther. The second connotation for most people is that of compul- sion or command, stemming from authority. As children we are "required" to go to school. In college we must take cer- tain "required" courses. In intelligence, many of us regard a requirement as essentially a directive from a higher echelon to a lower one. In this view, the key question is not whether the information is objectively needed but whether its procure- ment has been directed by competent authority. It is a view which commends itself to the administrator, who would, of course, contend that certification by competent authority pro- vides the best assurance that a valid need exists. This con- notation, like the first, exists in varying degrees for everyone. Where it dominates, it leads to an emphasis on machinery, systems, channels, committees. Finally, there is the connotation of request. Though "re- quest" is no lcnger an active meaning of "require," both come from the same root, along with "inquire," "question," and "query." In intelligence this meaning has again come into its 1proved For Release 2005/03/24: CIA-RDP82R00129Ik & 0060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100566-6 Collection Requirnts own. Under this interpretation, one equal (the "customer") makes a request or puts a question to another (the collector), who fulfills or answers it as best he can. There is a sort of honor system on both sides--with a dash of mutual suspicion. The requester vouches for the validity of the requirement, though the collector is free to reject it. If he accepts it, the collector gives an implied assurance that he will do his best on it, and this the requester is free to doubt. In any event the relationship is a mutual one, and in its pure form is free from compulsion. The use of direct requests appeals particu- larly to the collector, who finds that it provides him with more viable, collectible requirements than any other method. It sometimes appeals also to the requester-analyst, who if he finds a receptive collector is able by this means to get more requirements accepted than would be possible otherwise. Again, it is sometimes disillusioning to both, if the collector comes to feel overburdened or the analyst to feel neglected. These three connotations of need, compulsion, and request are embodied in three kinds of collection requirement, to which we shall arbitrarily give names-the inventory of needs, addressed to the community at large and to nobody in par- ticular; the directive, addressed by a higher to a lower eche- lon; and the request, addressed by a customer to a collector. The Requirement as Inventory of Needs An example of the inventory of needs is the series of Periodic Requirements (recently relabeled Reporting) Lists issued by the CIA Office of Current Intelligence. No collector is directed ("required") to collect against these lists; the lists are not addressed to any single collector. Some responsible individuals in clandestine collection (branch chiefs and station chiefs) have refused to handle the PRL's on the grounds that they are "not really requirements," i.e., they are not requests to the clandestine collector for information which only he can pro- vide. In most cases, however, the PRL's are selectively utilized for guidance despite their character as inventories. There are several reasons for this. Revised three times a year, they are the most up-to-date of requirements. Their main subject, cur- rent affairs of chiefly political significance, is one which engages the interest and competence of nearly all collectors and which presents opportunities to nearly all. Many such opportuni- Ap proved W1 lease 2005/03/24: CIA-RDP82R00129R00010006002d?6 Aped For Release 2005/03/24: CIA- 2R00129R000100060026-6 ,.tion Requirements ties are sudden and gratuitous; they divert no effort from other requirements, hence raise no issue of priorities. Generally speaking, however, the inventory of needs does not appeal to the busy collector. When he accepts it, it its a sign that adequate requirements addressed to his particular capabilities are lacking. But the collector's viewpoint is not the only pertinent one. The inventory of needs can have great value as an instrument of analysis within the intelligence pro- duction office that originates it. The one thing it can not do is to contribute significantly to the resolution of the priori- ties problem. The Requirement as Directive The most broadly controlling document in the field of re- quirements is the list of Priority National Intelligence Objec- tives issued annually as a Director of Central Intelligence Di- rective to which attention is given in the NSC itself. Tech- nically not requirements, and certainly not collection require- ments, the PNIO's establish general guidelines for both col- lection and research. They are ranged in three priorities and contained in four pages. They are comprehensive, authorita- tive, and community-wide in their application. But because of their extreme generality, the PNIO's provide no practical guid- ance in settling issues of specific collection priorities. They form a constitution which requires both laws and courts to interpret it. To only a limited extent do present collection di- rectives provide such "laws" or the USIB committee structure =f?h "courts." It is still common practice for individual cus- c equirements (chiefly of the "request" variety) to ,-laim a priority derived directly from the master document. If conscientiously applied, this practice is sound as a discipline to the requester. But it has no more value in judging the relative urgency of two specific collection requests than cita- tion of the U.S. Constitution would have in settling a subur- 'tan zoning dispute. On the level of collection requirements proper, the directive occurs in several situations. The clearest example is where ;here is a command channel, as between a collection organi- zation's headquarters and its field representatives. Any re- quirement sent through such a channel is a directive if the higher echelon chooses to make it one. (Paradoxically, by 48 EECCRREETT Approved For Release 2005/03/24: CIA-RDP82R00129ROOOT00060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R00010006-6 Collection Requirnts S ET euphemism, the fact that command authority is being exer- cised will often be indicated by the word "request.") For purposes of this discussion, the most significant type of directive is that which emanates directly or indirectly from the authority of the DCI, or is issued in consequence of agree- ments between two or more agencies. Typically, such require- ments originate outside the collection organization-often through the mechanism of an inter-agency committee-and represent the coordinated interests of major customers. Where requirements of this kind are traditionally and with- out question accepted by the collection organization and is- sued with command force to its components, it is reasonable to classify them as directives without looking into the precise authority of the committee concerned. Directives are most practicable in the following circum- stances: (a) where a command relationship exists; (b) where there is only one customer, or where one customer is incom- parably more important than the others; (c) where a single method of collection is involved, and where this method has very precise, limited, and knowable capabilities. The last of these circumstances is most likely to occur in collection by technical methods. In such collection, especially on the Sino- Soviet Bloc, directives have been relatively successful. For when it is perfectly clear, as it often is in technical subjects, that it is possible to have this or that but not both, it becomes both feasible and necessary to reach a binding decision. In these circumstances, priorities have real meaning. The situation is very different in some other fields where the need for priorities and hence for directives is felt equally keenly. One such field is the broad area of clandestine col- lection. Clandestine collection, though distinguished by its methodology, is not a single method but a congeries of diverse methods. Its capabilities are limited, but for the most part are neither precise nor knowable. The demands on it are fan- tastic. It serves as many customers as there are members of the intelligence community, but is under the command of no customer office. In short, it combines a maximum need for di- rection with a minimum of the characteristics that make di- rection practicable. In these circumstances the Interagency Clandestine Collection Priorities Committee, which is charged Approved-Y&i~ 2lease 2005/03/24: CIA-RDP82R00129R0001000600296 R~C?d For Release 2005/03/24: CIA- 2R00129R000100060026-6 ction Requirements with determining priority requirements for collection by the Clandestine Services of CIA, has an unenviable mission. The lists of requirements and targets (IPC Lists) issued by this body of USIB representatives since 1951 form a fascinating record of attacks on the requirements problem, from the hihly selective, 18-target USSR list of 1952 to the encyclo- spedic, 379-target list of 1956, the subsequent selective excerpts from that list, and the worldwide list now in preparation. The IPC Lists have served various important purposes: they have established goals, provided a basis for planning, and re- corded in small compass many of the most critical informa- tion needs of the USIB agencies. The IPC has also addressed itself continuously to the problem of priorities. Its primary method has been to relate its requirements for clandestine collection to the objectives set forth in the PNIO's, and to as- sign each requirement the priority carried by the correspond- ing objective. This method, and the variations on it, will be discussed at a later point in this paper. It cannot be said to have helped much in solving the concrete problem of deciding what items, among all items that are probably collectible, are most worth collecting at the expense of something else. The Requirement as Request Examples of the requirement as request can be found every- where. Most requirements fall in this category, including a large majority of those bearing RD numbers in the commu- nity-wide numbering system administered by the CIA Office f Central Reference. The fact that RD stands for Require- ,,went Directive is historically interesting but not currently significant. A request may range from a twenty-word question to a fifty-page questionnaire. It may ask for a single fact or a thousand related facts. Its essence is not in its form or con- tent but in the relationship between requester and collector. An important variant on the request is the solicited require- ment. Here the request is itself requested, by the collector. The collector, possessing a capability on an existing general requirement (of any of the types discussed), informs the ap- propriate customer of the capability and asks for specific :rc quirements "tailored" to it. The resulting requirement is Approved For Release 2005/03/24: CIA-RDP82R001291bc8gF60060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R0001000AWT6 Collection Requirnts drawn up with an eye to the nature of the particular sources to be used, rather than merely to the presumed over-all capaci- ties of the collecting organization. Through this interaction of consumer and collector, requirements of great precision and immediate practical value are developed. In clandestine collection the solicited requirement is regu- larly used for legal travelers, for defectors and returnees, and for other sources whose capability or knowledgeability can be exploited only through detailed guidance or questioning. It is the cornerstone of the requirements system managed by the Interagency Defector Committee. The solicited requirement blends into the jointly developed requirement. Here collector and consumer work out the re- quirement jointly, usually on a subject of broad scope and usually on the initiative of the collector. This too is a prac- tical device of often considerable merit. The possible variations on the request are innumerable. The unsolicited or "spontaneous" request is the basic require- ments tool of the community, the means by which all can seek help from those they think able to help them. The so- licited request is a precision tool for relating needs and capa- bilities. If capabilities were ample enough to fulfill all needs, no other form of collection requirement would be necessary. But needs are infinite, capabilities limited, priorities therefore essential, and some form of directive indispensable. The Study of Priority If this description of the kinds of requirement is valid, it is evident that each of the three kinds answers a deep-felt need, has a life of its own, and plays a role of its own in the total complex of intelligence guidance. Since the focus of this paper is on the problem of priorities, it must concern it- self chiefly with the directive. But while the directive is the only practical vehicle for priorities, requests are also very much in the picture since priorities must govern their fulfil- ment. In approaching the priorities question, it is natural to think first in terms of administration and system. Adequate ad- ministrative arrangements are in fact essential, and will be Approved FRor elease 2005/03/24: CIA-RDP82R00129R00010006002~_6 Appoved For Release 2005/03/24: CIA-R2R00129R000100060026-6 S~ ET Crr Lion Requirements discussed in some fullness. In themselves, however, they are powerless to do more than make the wheels go round. If the wheels are also to mesh, the question must be studied further _ts a problem in intellectual discipline, involving analytical method and an appropriate language. Finally, it must be viewed in relation to the training and responsibilities of the individual intelligence officer. Each of these approaches will be examined in turn. System and Administration There exists no single, general requirements system. What might be called the requirements situation has previously been well described in this journal,' but a brief recapitulation will be useful here. A department or agency which engages in collection pri- marily to satisfy its own requirements generally maintains an independent requirements system for internal use, with is own terminology, categories, and priorities, and with a single requirements office to direct its collection elements on behalf of its consumer elements. This pattern is characteris- tic of the military departments. The same requirements of- :.ice that performs these internal functions (or perhaps a :separate branch of it) represents both the collector and the consumer elements in dealing with other agencies. Where, as in CIA, the consumer components are dependent on many collectors and the collection components are in the :service of consumers throughout the community, no such one-to-one system is possible. Each major component (col- lector or consumer) has its own requirements office. There may also be requirements officers at division and branch levels, as in the Clandestine Services. Requirements offices differ in many respects, but in all cases they are the official channels for the movement of require- ments between. agencies. Their personnel are middlemen, and must have some understanding of the problems not only of 'By William F. Bundy in "The Guiding of Intelligence Collection," in the Winter 1959 issue (III 1), and, in the narrower context of clandestine collection, by Lowell M. Dunleigh in "Spy at Your Service, Sir," in the Spring 1959 issue (III 2). 4proved For Release 2005/03/24: CIA-RDP82RO01291Rbt')8EFbO060026-6 ApprovedCFq~' Feleake 20Q5/03124: CIA-RDP82R00129R000100a~i6 o ec ion equir fs those whom they represent but of those whom they deal with on the outside. The consumer requirements officer must find the best collection bargain he can for his analyst client; the collector requirements officer must find the best possible use for the resources he represents, while protecting them from unreasonable demands; each must restrain his own side from ill-advised intransigence. Between agencies (or between major components of CIA) the typical requirement moves officially from analyst to con- sumer requirements office to the CIA Office of Central Refer- ence to collector requirements office to collector. (Even this is a simplified statement.) OCR's community-wide system whereby such requirements are numbered and recorded makes for convenient reference. In some cases OCR also performs other functions normally performed by requirements offices, such as checking to make sure that readily available sources have been canvassed before levying a requirement on an ex- pensive collection system. Although the vast majority of requirements move offi- cially through the channel just described, many of these move- ments are merely in confirmation of advance copies which have previously passed directly between the two requirements offices concerned. Matters of substance are regularly dis- cussed by one requirements officer with another. And beyond this there are many instances where one or both of the re- quirements offices are unaware that a requirement has been agreed upon between analyst and individual collector until a confirmation copy comes through channels. From the standpoint of the "free market," of bringing analyst and collector together, this way of doing things works well. Where the collection situation is such that effort on a low-priority target does not actually detract from the effort that can be made on a high-priority target, little harm can be done. Or where analyst and collector are both highly knowledgeable and responsible, the results can be excellent. The former condition still prevails in some areas outside the iron curtain; the latter has been attained in certain compo- nents. But neither analyst nor collector nor yet require- ments officer is competent to set priorities. SECRET 53 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 A ved For Release 2005/03/24: CIA-R ,82R00129R000100060026-6 S _r2ET G. _-ction Requirements hitherto we have spoken of requests and directives as clear- cut categories. But it is necessary to take account of a spe- cial variety, the request-cum-persuasion, and its still more vigorous relative, the request-cum-pressure. The intense ef- forts which are often made informally to induce individuals in the collection offices to give special emphasis to particular requirements are a clear sign that there is a felt need for priorities. But priorities are slippery. Let us see how a typi- -al collection priority is handled on the working level. The OCR form used for RD's has a place for the requester to =heck "degree of need" as "standard," "great," or "urgent." If the analyst checks this in a way that is grossly out of line, ,pis own requirements office will probably catch him up; if it does not, the collector's requirements office will balk. But al- though it may be assumed that the requesting requirements office would not approve an "urgent" rating unless the re- quirement deserved it in relation to other requirements placed by that office on the same collection organization, no such assumption can be made as to its priority relative to re- quirements from other consumers. And it would be a very self-confident collector who would try to settle the question cnaided. If the collector should show no interest in a requirement ,narked "urgent," the requester may try proof, persuasion, or pressure. He may indeed, in anticipation of resistance, have originally indicated a relationship between his requirement and one of the Priority National Intelligence Objectives. He almost certainly right that a relationship exists, but there may be question of its cogency. It is possible to tie a very small requirement to a very big objective. Early warning is important, but not everything described as early warning is equally important. The collector may still be unimpressed. There is no impartial arbiter, short of the USIB itself, for the requester to appeal to. Oddly enough, in requests addressed to the Clandestine Services it is unusual for a requester to cite an IPC List. Yet in theory there should be many such citations. The Lists are designed to contain all the highest priority requirements for clandestine collection. They carry priorities derived author- itatively from the PNIO's. Moreover, taken together they A4proved For Release 2005/03/24: CIA-RDP82R00129l b 10060026-6 Approved For Release 2005/0/24 : CIA-RDP82R00129R00010006 0-6 Co lection Requir nts S ENAWE T are more than a hundred times longer than the PNIO's and are crammed with specifics. It would be much easier to prove that a request is significantly related to an IPC item than that it is significantly related to a PNIO-provided it actually The chief reason for the paucity of citations seems to be that only a small proportion of requirements received as re- quests are actually on subjects specifically covered in the IPC Lists. The Lists are not cited for the simple reason that they contain nothing suitable to cite. On non-Bloc areas this is not surprising, since the IPC Lists have scarcely begun to touch them. But on Bloc areas it is astonishing, all the more since the Lists are composed of requirements and targets origi- nally submitted by the very analysts who now make these re- quests for information. Is it possible that the preparation of IPC Lists is regarded by some analysts as a formal, academic exercise unrelated to the real expression of their keenest in- terests? Or do the Lists contain only items of such rarity and difficulty that on ordinary workdays nobody really hopes to get them? Or is it that the day-to-day requirements deal with matters so current that the IPC Lists have not caught up with them? Or with matters too unimportant to merit inclusion in the Lists? Be the answer what it may, the fact is that the analyst in our hypothetical situation would probably appeal to a different source of authority in his effort to show the collector the im- portance of his requirement. The chances are good that, if he had a case capable of being pressed at all, he would draw support from positions taken by one of the substantive USIB committees that concern themselves with requirements. Among these committees are the Economic Intelligence Com- mittee, the Scientific Intelligence Committee, the Joint Atomic Energy Intelligence Committee, and the Guided Missile and Astronautics Intelligence Committee. Each of them is au- thorized, among its other duties, "to recommend . . . intelli- gence objectives within the over-all national intelligence objec- tives, establish relative priorities on substantive needs, review the scope and effectiveness of collection and production efforts to meet these objectives, and make the necessary substantive SECRET 55 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Approved For Release 2005/03/24: CIA-IR82R00129R000100060026-6 SL-RET CL _:!ction Requirements recommendations to the departments and agencies concerned." Each is also authorized "to determine the deficiencies" in its own category of intelligence, "to take appropriate remedial ac- tions, and to recommend to the Intelligence Board remedial actions" beyond its own cognizance. Such recommendations have from time to time been made and approved, with the result that priorities on very specific matters have been estab- lished by the USIB. Priorities so established have, of course, the force of directives. And such priorities have frequently been cited effectively in the levying of requirements, although the exact applicability of the priority in the context of a given collector's responsibilities has not always been clear beyond doubt. It is the intent of this paper to illustrate rather than to exhaust the questions it raises. The requirements situation has many other significant systems and phenomena: the spe- cial, closed requirements systems governing technical meth- ods of collection; the Watch Committee with its General Indi- cator List; and, to name but one more. the Critical Collection Problems Committee, whose recommendations on specified critical collection questions carry great weight with the 1:n- telligence Board. But enough has been said to give a sense of the administrative question. It would seem to involve at least the following aspects: (a) a vast number of requests with no consistently effective way of relating them to established directives and hence to pri- orities; (b) directives all of which emanate directly or in- directly from the USIB, but through different channels and without sufficient coordination, so that their impact is often disconcerting. One sometimes encounters the view that all requirements should be fed into a single mechanism, where the marginal ones would be eliminated and the others properly related, sub- ordinated, formulated, and allocated. The appeal of this dream is that such a procedure would, at least theoretically, deal head-on with the problems of priorities and capabilities, and would ensure that all relevant considerations and in- terests were taken into account simultaneously by a single re- sponsible authority. h0proved For Release 2005/03/24: CIA-RDP82R0012AHM0060026-6 ApprovedCFogr-eFtpjRagpa9 /0. J?4 : CIA-RDP82R00129R0001000 0Q0 fib There are a dozen reasons why such a scheme is impractical. The group charged with this function would have to be dele- gated an unprecedented amount of the authority of the USIB. It would be unwieldy in size. Its staff would have to consist mainly of substantive experts and experts on capabilities, yet neither of these could be extensively spared from regular ana- lytical or collection duties, and if away from such duties long would lose their expertise. Such a group could not keep abreast of current developments, and much of its output would be stillborn. It is inconceivable that it should take over direction of the self-contained collection systems, or that it could do so successfully. If charged with processing all re- quirements, its machinery would whir meaninglessly over the many that present no problem and find it difficult to pause for those that do. The priority system would probably be too standardized to help with the really hard and painful deci- sions. There would be a strong tendency to ratify the ob- vious and sidestep the prickly. To encounter these faults and dangers, to be sure, it is not necessary to create this gigantic requirements mechanism. We face most of them already; they are the hazards of all centralized systems, whether large-scale or small-scale. But since we have still so much to learn about how to make priori- ties work, it would seem sensible to do our experimentation on a scale where the strains are tolerable. One such experiment might confine itself to requirements for clandestine collection by CIA. These might be divided into directives and requests. The directives would be issued-pos- sibly by a strengthened IPC-under new procedures to be es- tablished by the USIB. The issuing body would take advan- tage of the specialized competence of the substantive intelli- gence committees, and the latter would coordinate with the issuing body any recommendations to the USIB affecting clan- destine collection priorities. All directives and priorities pre- sented to the Clandestine Services (except those received di- rectly from the DCI) would reach them through a single chan- nel and would constitute a single, interrelated body of guid- ance. Frequency of revision would be essential. Special emer- gency priorities established through command channels would be possible as they are today. As for requirements of the SECRET 57 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Aved For Release 2005/03/24: CIA-R2R00129R000100060026-6 SL_(tET Ct .tfion Requirements request type, they would be served in much the present man- ner except that on challenge they would have to be justified by a demonstrable relationship with a directive. Discipline: Method and Language The more one reflects on it, the more one sees that the set- ting of priorities is a singularly subtle and elusive task. Use- ful priorities simply cannot be caught in the coarse nets of authority, information, channels, and the division of labor. These things are needed, but so also are a disciplined intellec- tual approach to the subject, comprising a delicate analytical method and, perhaps most important, an adequate language. To illustrate problems in method, we may draw once more on the experience of the IPC. That committee, as was noted earlier, derives its priority system from the PNIO's. The sys- tem consists of three priorities, based on the degree to which the United States could be benefited by the achievement of an objective or harmed by the failure to achieve it. All IPC requirements and targets (the latter being institutions or in- stallations on which information is needed) bear the same pri- ority as the PNIO to which they are related. Since the PNIO's on the Si.no-Soviet Bloc are all of First or Second Priority, the (PC requirements on those areas are too. The result is that a list of 300 Bloc targets may have 100 of First Priority and 200 of Second Priority. There are several difficulties here. One, which the IPC has for some time recognized and tried to overcome, is that two priorities simply do not provide enough span. By various de- vices-arranging certain related targets in an internal order of importance; describing certain targets as substitutes for others; treating targets as subordinate to "basic require- ments" which are sometimes expanded into several para- graphs-the IPC manages to convey a somewhat more 'dis- criminating sense of priority. A second difficulty is that a requirement related to a First Priority objective is really not necessarily more important in itself than another requirement related only to a Second Pri- ority objective. Everything depends on how significantly each requirement is related to its objective--how far its fulfilment would go towards achieving the objective. It is illogical to Akbroved For Release 2005/03/24: CIA-RDP82R0012919b5b0060026-6 ar Rtelea a 2Q05 /24 : CIA-RDP82R00129R0001000? 02 ~6 Approved ~ o ec on equar s suppose that every item of information (or every target) has an importance strictly proportionate to the importance of the objective on which it bears, however minutely. Here again the IPC has recognized the difficulty and has tried to compensate for it to the extent compatible with its system. Where a re- quirement or target bears on both a First and a Second Pri- ority objective, it is ranged under the objective to which it would contribute more significantly. This still leaves a tre- mendous unevenness in the importance of targets assigned the same priority. Still a third difficulty is that a requirement meriting a given priority in the context of total U.S. security interests does not necessarily merit the same priority in the context of a particular collection method. The economic stability of a cer- tain friendly country may be of great importance (Second Pri- ority in the PNIO's), yet may not require clandestine collec- tion at all. This difficulty also has been recognized, and where it is agreed that a requirement can be satisfied by other meth- ods it is omitted from the List. Unquestionably the difficulties of the priority-allocating process could be illustrated equally well from the experience of other bodies, though perhaps none faces so baffling a task. And the difficulties cited are only a few among many. These are the kinds of matters which appear much simpler before studying them than afterwards. The fact that they are no- where near solution is one reason for keeping our experiments in priority administration on a medium scale, rather than magnify the problem by creating more grandiose structures. In order to clarify and refine our method we need a better language. Here the most pressing need is for a common vo- cabulary in which such indispensable words as objective, re- quirement, target, and request can be relied on to mean at least approximately the same thing to everybody. This happy state can not be attained by promulgating official glossaries, but only through continued, careful discussion of common problems by persons from all parts of the community. As we probe the more subtle aspects of requirements theory, we may find that language itself is putting blinders on us in our search for method. For instance, in the parlance of intel- ligence direction specific requirements are said to be "derived" Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026 59 ~r~d For Release 2005/03/24: CIA-F82R00129R000100060026-6 A-6 C cfion Requirements from general ones which in turn are "derived" from the PNIO's or a similar authority. Is it possible that this con- cept of "derivation" is really no more than a convenient but misleading fiction; that the specifics are actually thought up independently and, at best, are then matched with the gen- eralities? The same process is often described as "translat- ing" requirements or as "breaking them down." It is not sug- gested that we discard such expressions but that we analyze their implications and limitations. Nobody literally believes that a PNIO of fifty words somehow contains within itself the hundreds of thousands of specific questions that will be asked somewhere, sometime, in the effort to fulfill it. We know that many of those specific questions are not inevitable. Others could be substituted for them, perhaps advantageously. There is indeed a relationship between the fifty-word PNIO and the innumerable small questions, one which admittedly can never be fully charted; but has it been adequately ex- iplored? In looking into this particular matter-and here we are momentarily returning from the question of language to the question of method-it would be useful to consider the history of the recently suspended specialized annexes to the PNIO's as well as of a stillborn experiment several years ago by the Office of Current Intelligence in the articulation of a body of intelligence requirements at a middle level of abstrac- tion between the PNIO's and collection requirements. The final aspect of the language question, and perhaps the most important, is the skill with which requirements them- ;elves are expressed. What is needed here is not different words from those now used, but surer ways of communicat- ing the essence of a matter from one mind (or set of minds) to another. There is no formula for this but a trained alert- ness to the perils of misunderstanding. Training and Personal Responsibility In the last analysis every action is performed by an indi- vidual; and in intelligence it is clear that the individual cannot expect to be helped more than half way by systems and meth- ods. This is true in the field of requirements as elsewhere. To adapt a hoary but still valid epigram, requirements are far too important to be left to the requirements officers. In types of collection .requiring individual initiative and judgment, Ak proved For Release 2005/03/24: CIA-RDP82R0012ASM0060026-6 Approved For Release 2005/03/24: CIA-RDP82R00129R000100060026-6 Collection Requirnts SgT these qualities must be applied to ends no less than to means. It is pertinent, therefore, to add a word about the role of the intelligence officer through whom requirements are finally put to work. In the training of new case officers-the second lieutenants of clandestine collection-substantial attention must continue to be given to the interpreting, tailoring, questioning, solicit- ing, and developing of requirements suited to their sources, as well as to the training, briefing, debriefing, directing and redirecting of sources in response to requirements. The case officer must learn to study carefully the requirement which comes from far-away Washington, to grasp its purpose as well as its letter, to flesh it out with all the knowledge he has or can get, to cable for clarification when necessary, to adapt it to the understanding and the access of his sources. He must also learn to study the reporting as it comes in from the source, and from it to develop his own immediate feed- back of further questions without waiting for the customer's reaction. To illustrate the case officer's strategic position at the cross- roads of outflowing direction and inflowing product, the usual image of the intelligence cycle might be twisted into a figure 8, the upper part representing all the paraphernalia of higher echelons, the lower the collection situation for which the case officer is responsible. He himself appears, not on the outer periphery of a vast, impersonal, revolving wheel, but where he feels himself to be-at the center, receiving and giving direc- tion downward, receiving and submitting reports upward, himself deriving and feeding back direction from the reports he receives. The symbolic crossroads of the figure 8 is equally applicable to the analyst in a consumer office. He too is at the center; he too must communicate upwards and downwards; he too is no cog in a machine, but a mind at work. When the systems and doctrines have been perfected, the job will still have to be done by these two. 8 Approved For Release 2005/03/24: CIA-RDP82ROO129R00010006002916