STUDIES IN INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84B00890R000800050003-4
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
125
Document Creation Date:
December 16, 2016
Document Release Date:
May 5, 2005
Sequence Number:
3
Case Number:
Publication Date:
February 5, 1981
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP84B00890R000800050003-4.pdf | 8.14 MB |
Body:
7
Approved For Release 2005/06/14: CIA-RDP84B00890R0 '504,1{4j
t~
: :~
k- Pt- I a ea M - J . .r/)11i a 4-
~.. y1$f~ ~rJ
5 February 1981
MEMORANDUM FOR: Director of Central Intelligence
SUBJECT: Studies in Intelligence
Studies in Intelligence was founded by Sherman Kent in
1955 to encourage the growth of a literature of intelligence.
It is published quarterly by the Center for the Study of
Intelligence, Office of Training and Education, and recently
celebrated its twenty-fifth anniversary. I am attaching a
copy of the Anniversary Issue for your examination.
The Spring 1981 Issue will be consigned to the printer in
three weeks.
With your approval, I should like to include in the Spring
issue "The Clandestine War in Europe (1942-1945)," the text of
your remarks on the occasion of the receipt of the William J.
Donovan Medal in 1974 in the Spring issue, (copy also attached).
I will append an appropriate editorial note.
itor
Studies in Intelli ence
OTE
Attachments (As Stated)
Distribution:
Orig - Addressee, w/ a r
1 - Exec. Reg.
1 - DDA, w/Att.r/
1 - ADTE, w/Att. ET
1 - ADTE Reading File, W/o Att.
1 - CSI
1 - Chairman, NICE w/Att.
OTE/CSI:Ro *6 ',
25X1
25X1
DOWNGRADE TO UNCLASSIFIED
UPON REMOVAL OF ATTACHMENT
aaseFo5/O& 1'4 : CIA-RDP84B00890R000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
The Clandestine War in Europe
(1942-1945)
Remarks of William J. Casey
on receipt of the William J. Donovan Award
at Dinner of Veterans of O.S.S., December 5, 1974
Presentation Ceremony, left to right, William P. Rogers, Mrs.
William J. Donovan, William J. Casey.
MORI/HRP THIS PAGE
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Donovan Award Citation
The Donovan Award must go to an individual "...with the spirit. . .and
the features which characterized General Donovan's career." William
J. Casey amply fits these specifications, as soldier, lawyer, author, diplo-
mat, and banker.
It was in World War II that the O.S.S. first knew him in action. He be-
came Chief of Secret Intelligence for the European Theatre of Opera-
tions where his great drive and judgment made their mark. One of his
many dramatic hours was his lightning organization of the radio teams
he parachuted into Germany to send back intelligence on enemy posi-
tions there, from the Battle of the Bulge to Hitler's last redoubt. His
many operations gained military objectives, helped to shorten the war,
and saved an untold number of lives.
As a public servant, he well fills the mold of William J. Donovan. Like
Donovan he has been a consistent student and activist of the strategic
position and problems of the United States and of the role of its intelli-
gence and operating agencies as vital tools in foreign policy. On this
plane he helped design the Central Intelligence Agency, served on the
General Advisory Committee on Arms Control, on the Presidential Task
Force on International Development, and is currently a member of the
Commission on the Organization of the Government for the Conduct of
Foreign Policy.
Recently he has served with distinction as Chairman of the Securities
and Exchange Commission, and with notable success as Under Secre-
tary of State for Economic Affairs. Now, as Chairman and President of
the Export-Import Bank, he is serving his government with great wis-
dom.
As a person, he is full of the courage that General Donovan exempli-
fied and loved in others, and that Hemingway called grace under pres-
sure. He has consistently shown his humanity in his work for Catholic
Charities, as a Trustee of Fordham, as a Director of the International
Rescue Committee, as a distinguished attorney, and as a friend to count-
less others.
i
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
The Clandestine War in Europe
(1942-1945)
How can I adequately express my appreciation for the William
J. Donovan Award. This medal has very special meaning for me. There
is the great affection and admiration which General Donovan holds in
my memory. There is the example and inspiration he provided during
the 15 years I was privileged to regard him as leader and friend.
So many of my most cherished friendships were formed in the
OSS and for all these years I have been proud of what we were able to
do together.
This sentiment extends in a special way to those who have come
across the Atlantic for this occasion tonight and to so many others
who worked with us throughout Europe. At the time, we may have
known them only as numbers or code names, like Caesar for Jean-Pierre
Roselli, but strong friendships and bonds have formed and flourished
across the Atlantic over these 30 years.
We have visited back and forth and attended each other's re-
unions. We've even overcome the barriers of language, notably when
the French invited us back for the 20th anniversary of their liberation.
They took us all over France and everywhere we'd go, there would be
an occasion and a speech. I had to respond in my fractured French and I
would begin: "Nous sommes tres heureux d'etre ici." This was intended
to mean, "We are very happy to be here." After a few such per-
formances, Barbara Shaheen, who had studied French in school, came
to me and said: "Bill. you are saying, 'Nous sommes tous heros,' " which
means, "We are all heroes." I hope you won't think that's what I'm
saying tonight, as I tell you for the first time the full story of OSS.
For us, in the United States, it all began with a New York lawyer
who saw his country facing a deadly menace and knew that it was un-
prepared and uninformed. It's hard for us to realize today that there
was a time in 1940 and 1941 when William J. Donovan was a one man
CIA for President Roosevelt.
I remember General Donovan bouncing into London, with little
or no notice, brimful of new ideas, ready to approve any operation that
had half a chance. He'd come tearing in from New Guinea, or wherever
the last invasion had been, and go charging off to Anzio, or wherever
the next landing was to be.
MORI/HRP THIS PAGE
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
He really loved the smell of battle but he'd look at you with his
cherubic smile and twinkling blue eyes and explain that he had to be at
these landings to see, first-hand, the conditions his men had to face.
Donovan's manner was deceptively mild. A few years earlier,
running for Governor, he had campaigned through upstate New York.
The local politicians, expecting this legendary World War I infantry
hero to come roaring and thumping into town, were disappointed by
his soft voice and his gentle manner. The saying was: "Donovan came
into town as Wild Bill and left as Sweet William"
What was the OSS and what was it all about? It was probably
the most diverse aggregation ever assembled of scholars, scientists,
bankers and foreign correspondents, tycoons, psychologists and football
stars, circus managers and circus freaks, safe-crackers, lock pickers
and pickpockets-some of them in this room tonight. You name them,
Donovan collected them. What did he do with them? Well, he unleashed
them-John Shaheen was unleashed to capture the Italian Fleet or at
least an Italian Admiral, Henry Hyde to build an intelligence network in
France, Mike Burke to liberate the Vosges-and these and many others
delivered magnificently.
Now, General Donovan unleashed this talent in a very intelligent
and perceptive way. He knew he had a bunch of rank amateurs going
into a very professional game. He knew the British had run an intelli-
gence service for five centuries and had been working for three years
to carry out Winston Churchill's dramatic order "to set Europe ablaze."
So, Donovan either set up joint operations with the British as he did in
sabotage and resistance support and in counter-intelligence or he set
up parallel but closely related organizations and arranged for an appro-
priate degree of British tutelage as he did in intelligence and propa-
ganda work.
Donovan grasped the value of the clandestine side of war as no
other American of his time. But, its potential was realized not by his
OSS but by the combined effort of British and American clandestine
services, of the Allied Governments in exile and the resistance, intelli-
gence and escape organization which sprang up spontaneously all over
Europe. OSS, coming into the European war three years late, would
not have been able to do very much at all if the British had not taken us
in as junior partners and so generously taught us all they knew. For this
we are ever grateful to our colleagues in the Special Forces Club which
Geoffrey Walford has so graciously come here to represent tonight.
Mrs. Tronstad was close to the first and perhaps the most vital
blow inside Europe. Her husband, Lief Tronstad had produced nuclear
terror in England in 1942 before we ever heard of the atom bomb. Escap-
ing from Norway, this Norwegian scientist brought intelligence which
led the Combined Chiefs of Staff to believe that the secret weapon brand-
MORI/HRP THIS PAGE
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
ished in Hitler's speeches was an atom bomb based on heavy water. He
had learned the Germans had ordered a tripling of production from a
plant in central Norway which was the only source of heavy water in
Europe. The -Combined Chiefs set the highest priority on destroying
this plant. Professor Tronstad knew that plant so intimately that he was
able to design plastic explosives in a pattern which exactly fitted its
critical distilling tubes and pipes. Nine tough Norwegians parachuted
in, succeeded in entering the plant, applying the plastic designed by
Lief Tronstad and escaping before the plastic explosive destroyed the
plant. But several months later, the Germans had the plant back in
operation. The Combined Chiefs then sent 155 American flying for-
tresses over to bomb the plant. This massive air raid killed 21 Nor-
wegian civilians and 22 Allied airmen but did only slight damage to the
plant. But this was enough for the Germans to decide to move the plant
and its inventory to Germany.
This intelligence got back to England promptly and the Combined
Chiefs ordered an air attack on the ship bringing the plant from the
seaport in southern Norway across the Baltic Sea to Germany. But the
plant never got that far. It had to be taken by rail to a ferryboat which
would take it down Lake Tinnjo towards the Baltic seaport. Knute
Haukelid, who was here with us when David Bruce received the
Donovan Award, was one of the original heavy water sabotage team
and had stayed behind in Norway. Singlehandedly, he entered the ferry-
boat, applied plastic explosive to its hull and got off before it sailed.
Halfway across, the innards of the heavy water plant and some 15000
litres of heavy water went to the bottom of the lake and it's still there.
This operation may have deprived Hitler of the atom bomb with all that
would have meant for our civilization.
General Guerisse, who was to come here from Belgium tonight
but couldn't make it because of illness, organized escape lines which
ultimately brought Ralph Patten and 4500 American, British and Cana-
dian airmen, shot down over Europe, back to England where they could
fly again. Every airman as he set out on his bombing mission knew that
if he had to parachute out and could find his way to a church, a school,
a convent or a farmhouse, he would probably be sheltered until a guide
from one of the escape lines called for him. These guides, many of them
teenage girls would take 4 or 5 men speaking only in southern drawls,
mid-western twangs or London cockney, move them by night on bicycles
or trains. hide them by day in one of thousands of homes between the
Rhine and the Pyrenees and, in a few weeks, deliver them to Gibraltar
or Lisbon. Thousands of Frenchmen, Dutchmen and Belgians made their
homes available knowing that if they were caught their whole family
would be tortured and shot or sent to a concentration camp. General
Guerisse, who was known in those days as Pat O'Leary, was himself
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
captured and dragged through several concentration camps finally
winding up in Dachau. Even Dachau couldn't keep Pat down and he
wound up organizing the prisoners and having taken over the camp
when the American forces arrived there.
Jean-Pierre Roselli is here tonight to represent the Amicale
Action made up of a thousand local chapters of resistance veterans all
over France. France was where we were to land and I recall the flood
of information that came over some 200 radio sets and in pouches full
of maps and drawings and reports picked up inside France by small
planes or small boats.
These Frenchmen put 90 factories out of production with less
plastic explosive than could be carried by a single light bomber. I be-
lieve the record shows that this kind of a job, when it could be accom-
plished on the ground by sabotage, was done more effectively and with
less cost that it could be done from the air where the cost in planes and
the lives of airmen and civilians could run very, very high.
The French resistance made 950 cuts in French rail lines on
June 5th, the day before D-Day, and destroyed 600 locomotives in ten
weeks during June, July and August of 1944. Our greatest debt to them is
for the delays of two weeks or more which they imposed on one panzer
division moving north from Toulouse, two from Poland and two from the
Russian front as they crossed France to reinforce the Normandy beach-
head. We'll never know how many Allied soldiers owe their lives to
these brave Frenchmen.
When General Eisenhower failed to destroy the Germans in
France, his armies found themselves moving into Germany without the
behind-the-lines intelligence which the French had provided so pro-
fusely. General Donovan brought in Milton Katz from Italy, Henry Hyde
and his team which had worked on France from Algiers, Dick Helms
from Washington, Mike Burke from the Vosges, Hans Tofte from the
Danish desk, and Bill Grell from the Belgian desk. George Pratt and his
Labor desk, including Lazar Teper and his small group of experts on
controls and documentation within Germany, were enlisted. New com-
munications, cover and air drop talent were brought in from Washing-
ton. Between October 1944 and April 1945, this combination sent some
150 men, mostly Belgians, Dutchmen, Frenchmen and Poles into Ger-
many with identification as foreign workers. They were sent to trans-
portation centers with radio sets or new equipment which enabled them
to hold a conversation with an airplane sent out for that purpose. These
brave men went into Germany blind and it was remarkable that over
90?l0 of them came out alive. I recall parachuting a young Belgian, Emil
Van Dyke, near Munich. He and his partner got jobs in the Gestapo's
motor pool in Munich, driving German officers around southern Ger-
many. After our 7th Army took' Munich, Van Dyke and his partner
turned up and brought me to their sleeping quarters, a cubicle in the
MORI/HRP THIS
PAGE
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Gestapo garage in Munich. They showed me how they had sawed out
a piece of the floor under the bed to create a hiding place for their radio
set. When they returned from a trip they would take out the radio and
send detailed messages to London on- German troop units and their
movements. His war over, Van Dyke had only one request. He wanted
to meet the girl who handled his radio messages to London. They had
gotten to exchange a few extra words every time he radioed in. He must
have fallen for her over the air because every extra word sent out of
that garage increased the chance that German direction finding equip-
ment would close in and locate him and his radio. As it turned out, she
was a corporal in the WACs, we had a fine wedding in London and they
settled down in Los Angeles to raise a family.
Fleming Juncker, who is with us tonight, organized the resistance
on the Jutland Peninsula in western Denmark. You'll recall that in
December of 1944 Hitler gambled everything he had left in the Ardennes
offensive aimed at depriving the Allies of the Port of Antwerp. Twelve
German divisions in Norway were ordered to go by ship to north Jutland
and then by train to join in this last desperate German counter-attack.
Three hundred Danes in Jutland, Fleming Juncker's men, supported by
the whole population, undertook to bottle up this force of over 200,000
Germans in Denmark. They brought the railway system in Jutland to
practically a complete breakdown and it took weeks for some of these
German divisions to make a journey that normally takes 12 hours. By the
time they arrived at the front the battle of the Bulge had been won.
The Port of Antwerp was a great prize. When Belgium was liber-
ated in September, the Belgian secret army had prevented the Germans
from carrying out orders to destroy it. The war would have lasted a good
deal longer if we had not been able to use those port facilities in the fall
of 1944. Even then, the Germans put it under constant bombardment
with V-2 rockets from sites near The Hague. The Dutch resistance,
represented here tonight by Dick Groenewald, attacked trains carrying
these rockets across Holland from Germany and destroyed a lot of
rockets which otherwise would have exploded on Antwerp or London.
All this had a heavy price. As you drive through central France
near Limoges, you come to Ordour sur Glane. There, a monument to the
cruelties of war, stands a small village still burned to a crisp, as the
Germans left it over 30 years ago, its 250 male citizens herded into a
barn to be shot, its 400 women and children herded into the church to
be burned. Was it worth the life of this community to keep a single
German tank division away from the Normandy beachhead for two
weeks? I don't know. But I do know that whether those GIs we sent to
Normandy were to be swept back into the English Channel was a very,
very close thing.
MORI/HRP THIS
Approved For Release 2005/06/14: CIA-RDP84B00890R0008003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Even that's not the point. The truly important thing is that those
Frenchmen and Belgians and Danes and Dutchmen and Norwegians
rose to fight and wanted to fight and had to fight because they loved
their country and what it meant to them.
Returning to General Donovan, while he loved all this action and
the courage it evoked, his real genius and greatness to me was the atten-
tion he gave to the more subtle war of the mind. His organization was
the only one which embraced all aspects of clandestine and intelligence
activity, psychological warfare, deception and research as well as
espionage, sabotage, and support of resistance. And he collected play-
wrights, journalists, novelists, professors of literature, advertising and
broadcasting talent to dream up scenarios to manipulate the mind of the
enemy through deception and psychological warfare programs.
Donovan created an outfit that was so secret it didn't have a
name. We called it X-2. He put Jim Murphy, one of his closest legal
associates, in charge and he integrated it with Section 5 of MI-6, the
British counter-intelligence unit. They had the closest thing to a decisive
clandestine impact on the war in Europe. It came not from the hun-
dreds of men and the thousands of tons of weapons parachuted into
Europe but from a handful of real German spies captured and turned
around in England and a couple of dozen imaginary spies in an imagin-
ary network carrying out imaginary operations within England. The fact
is that our side operated the entire German intelligence network in
England, writing their reports in London and sending them to the Ger-
mans by radio or with letters to Madrid or Lisbon in secret ink or micro-
dot. These fictitious reports convinced the German generals and finally
Adolf Hitler himself that the Allied landings would come not in Nor-
mandy but near Calais, 100 odd miles to the north.
This deception program consisted of radio traffic from a huge
imaginary army located on the east coast of England opposite Calais.
wooden tanks and rubber boats for the cameras carried by German
reconnaissance planes, as well as false reports from non-existent spy
networks. It had the Germans believing the Allies had over 80 combat
divisions in England on D-Day. Actually there were less than 50 of which
less than 40 were combat ready. Eight of them were to land in Normandy
on D-Day, 5 more on D + 1, 4 more by D + 3 and 4 more, 21 in all by D + 12.
Stiff resistance could back up the arrival of these divisions which had to
come in over beaches, without a port. The Germans had about 16 divi-
sions sitting in Normandy, a few more in reserve around Paris and by
D+2 or so had ordered 5 tank divisions from southern France, Poland
and the Russian front.
Yet, for seven decisive weeks, Hitler and his generals kept 19
of the best German divisions 100 miles away from our hard pressed
forces on the beachhead, waiting for an army that did not exist to make
an assault that was never intended.
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
The British had broken the German code used in wireless mes-
sages between Hitler and his generals. General Eisenhower and his
top generals were able to actually read the orders and intelligence
appreciations which passed between Hitler and his generals by wire-
less. Thus, it was possible for Allied strategists not only to know what
kind of facts to feed the Germans but to watch them take the bait.
For example, German messages showed that Von Runsted. in
command in western France, believed the landings would be launched
on the shortest line, across the Straits of Dover from eastern England
to the Calais area, while Hitler and Rommel, commanding in Normandy,
believed it would come from the south of England to Normandy. As
imaginary facts were fed out to support the Von Runsted view, the
intercepted messages showed Hitler wavering and hedging. The Allied
comand knew the deception program had worked when Hitler refused
Rommel's request for four tank divisions to back up the beaches in Nor-
mady, but insisted on keeping them under his own control around Paris
so they could go either way. Then, on June 8, two days after the landing.
Hitler actually ordered five infantry and two tank divisions to move
100 miles south to reinforce the Normandy beachhead. On June 9. the
Germans got a long message from London reporting that three fictitious
spies believed the Normandy invasion was diversionary and intended to
cause the Germans to throw in their reserves so that the massive forces
in east England could land in the Calais area. The Germans swallowed
this bait immediately. The next day, June 10, the orders sending the seven
divisions to Normandy were countermanded and all divisions in north-
ern France and Belgium were put on alert. One has to shudder to think
of what could have happened if that force had been thrown into Nor-
mandy a few days after the landings.
The deception was so good that when the Normandy invasion
plans were stolen by the Germans from the British Ambassador in
Turkey and General Eisenhower had to consider changing the whole
invasion plan, the decision was to intensify the signals that the invasion
would be at Calais and make the Germans think that the plans for Nor-
mandy stolen in Turkey had been deliberately leaked to cover up the
real landings on the Calais coast.
Later on, on the continent, Hubert Will and other X-2 officers
used half a dozen German agents captured in France to feed German
headquarters with tactical deception on the plans and movements of
General Bradley's forces. Three of these agents were so convincing that
the Germans awarded them the Iron Cross.
So you see, intelligence is a very uncertain, fragile and complex
commodity:
First, you have to get a report.
Then you have to decide whether it's real or fake.
MORI/HRP THIS PAGE
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Then, whether it's true or false as you find out what other intelli-
gence supports or contradicts it.
Then, you fit it into a broad mosaic.
Then, you figure out what it all means.
Then, you have to get the attention of someone who can make a
decision, and,
Then you have to get him to act.
Because General Donovan understood all this, he scoured our
campuses and mobilized thousands of the finest scholars in America
to put together, assess and evaluate, and then analyze the intelligence
that came in from all sources. This unprecedented collection of scholars
gave Donovan enormous influence. For example. in 1944 there was a
fierce struggle between the RAF and the U.S. Air Forces over bombing
strategy. Donovan was able to produce a team of outstanding econom-
ists: Ed Mason, Walt Rostow, Charlie Hitch, Charlie Kindleberger, Chan
Morse, Emile Despres to dissect the German economy and make the
case that, by concentrating on oil depots and transportation lines, Allied
air power could most effectively prepare the way for the invading
armies.
Donovan's grasp of this elusive, multiple and yet crucial nature
of intelligence led to the CIA, over which Bill Colby presides so grace-
fully, becoming not merely a spy outfit but one of the world's great cen-
ters of learning and scholarship and having more PhDs and advanced
scientific degrees than you're likely to find anywhere else.
Well, we've gone around the room and fought Donovan's war in
Europe all over again. I haven't touched the men and ideas Donovan
unleashed in Yugoslavia where John Blatnik spent many months organiz-
ing resistance forces in Slovenia, or Thailand to which Nick Deak has
referred, or Italy where Milton Katz and Mim Doddario were leaders,
or Greece where Jim Kellis and Chris Fragos performed nobly. or China
and Burma where General Peers distinguished himself or Indo-China.
or North Africa. I have neither the time nor the knowledge to do so. It
only remains for me to again thank, from the bottom of my heart, the
Veterans of the Office of Strategic Services and all of you here tonight
for your generosity.
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
e~/as 1Jo2oa~z~ . u~%Gea~a~
THE HONORABLE ALLEN W. DULLES
THE HONORABLE JOHN J. McCLOY
LIEUTENANT GENERAL WILLIAM W. QUINN
GENERAL OF THE ARMY DWIGHT D. EISENHOWER
THE EARL MOUNTBATTEN OF BURMA
THE HONORABLE EVERETT MCKINLEY DIRKSEN
J. RUSSELL FORGAN
THE ASTRONAUTS OF APOLLO 11
THE HONORABLE DAVID K. E. BRUCE
WILLIAM J. CASEY
The Veterans of the Office of Strategic Services will award the William J.
Donovan medal to an individual who has rendered distinguished service in the
interests of the United States and the cause of freedom anywhere.
The purpose of this award is to foster a tradition and spirit of the kind of
service to country and the cause of freedom which William J. Donovan ren-
dered in both his private and public capacities. He was the exemplar of the
citizen-soldier-diplomat who valiantly served his country and the cause of free-
dom throughout the world. This award, as a perpetual parallel, will be made
to an individual who, in his activities, exemplifies the spirit, the tradition and
the distinguishing features which characterized General Donovan's career. These
include a continuing concern for the world's security and safety, for the role
which the United States must play in the world, and for the rights, freedoms
and welfare of individuals in our society. Perhaps the most unique feature of
General Donovan's life was the continuing expression of these concerns in his
private life and activities as well as in public service.
Specifically, in General Donovan's career these features were expressed, as one
of America's leading citizen-soldiers, as ambassador, as intelligence chief, as
assistant Attorney General, as lawyer in the courtroom and in the office, as pri-
vate traveler seeing what he could learn for the benefit of his country.
The recipient of the Donovan medal will be an individual who has, in his own
career, outstandingly exemplified these features of Donovan's career. He will
be selected by a committee appointed by the President of the Veterans of the
O.S.S.
The award will take the form of a medal, carrying a likeness of General
Donovan.
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
25X1
Studies
in Intelligence
Fail 1980
25th Anniversary Edition
Secret
T SINr 80-00
N 5b5
Approved or,Release 2005/06114 CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Materials in the Studies are in general to be reserved to US
personnel holding appropriate clearances. The existence of this jour-
nal is to be treated as information privy to the US official commu-
nity. All copies of each issue beginning Summer 1964 are numbered
serially and subject to recall.
All copies of each issue beginning Summer 1964 are numbered
serially to facilitate control, accountability and recall. Copies which
are no longer needed by recipients should be returned to the Editor's
office, 1036 C of C Bldg., or may be destroyed if a notice showing
Volume number, Issue number and Copy number is sent to the
Editor.
All opinions expressed in the Studies are those of the authors.
They do not necessarily represent the official views of the
Central Intelligence Agency or any other component of the
intelligence community.
Warning Notice
Sensitive Intelligence Sources and Methods Involved
NATIONAL SECURITY INFORMATION
Unauthorized Disclosure Subject to Criminal Sanctions
SECRET
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14 :CIA-RDP84B00890R000800050003-4
STUDIES IN INTELLIGENCE
Editorial Board
Richard Lehman, Chairman
Richard Lehman
Chairman, National Intelligence
Council
Room 7E62 Headquarters
Extension
Deputy Director, Center for the
Studies of Intelligence
Room 1036 Chamber of Commerce
Extension
Acting Director of Training
and Education
1026 Chamber of Commerce
Extension
Helene L. Boatner
Director, Office of Political
Analysis
Room 6G00 Headquarters
Extension
Charles Briggs
Inspector General
Room 6E08 Headquarters
Extension
Maurice C. Ernst
Director, Office of Economic
Research
Room 4F18 Headquarters
Extension
Director, Center for the Study
of Intelligence
Room 1036 Chamber of Commerce
Extension
Chief, Audit Staff, OIG
1201 Key Building
Extension
James Taylor
Associate Deputy Director for
Science and Technology
Room 6E56 Headquarters
Extension
Deputy to the DCI for Collection
Tasking
Room 7E31 Headquarters
Deputy Chief, NE Division
Room 6D3107 Headquarters
Extension II
Chief, CA Staff
Room 3D00 Headquarters
Extension
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
25X1
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/066'ftR@jA-RDP84B00890R000800050003-4
25X1
STUDIES IN INTELLIGENCE
Articles for the Studies in Intelligence may be
written on any theoretical, doctrinal, operational, or
historical aspect of intelligence.
The final responsibility for accepting or rejecting
an article rests with the Editorial Board.
The criterion for publication is whether or not, in
the opinion of the Board, the article makes a contribu-
tion to the literature of intelligence.
HELENE L. BOATNER
CHARLES BRIGGS
MAURICE C. Ernst
Additional members of the Board are
drawn from other CIA components.
25X1
25X1
Approved For Release 2005/ 6/14: CIA- DP84B00890R000800050003-4
25X1
Approved For Release 2005/06/g#CpWlk-RDP84B00890R000800050003-4
Contributions to the Studies or communications to the editors may come from
any member of the intelligence community or, upon invitation, from persons outside.
Manuscripts should be submitted directly to the Editor, Studies in Intelligence, Room
1036 Chamber of Commerce Building Il and need not be coordinated
through channels. They should be typed in duplicate, double-spaced, the original on
bond paper. Articles may be classified through Secret. Supplements, separately distrib-
uted, can accommodate articles of higher classification.
For inclusion on the regular Studies distribution list call your office dissemination
center or the Center for the Study of Intelligence, or back issues and on
other questions, call the Office of the Editor, Xerox-quality copies of back
articles can be obtained from Document Services Brant , Office of Central Reference,
where a complete file of Studies is available on microfiche.
THE STUDIES IN INTELLIGENCE AND
SHERMAN KENT AWARDS
An annual award of $500 is offered for the most significant contribution to the
literature of intelligence submitted for publication in the Studies. The prize may be
divided if the two or more best articles submitted are judged to be of equal merit, or it
may be withheld if no article is deemed sufficiently outstanding. An additional $1,000
is available for other prizes.
Except as may be otherwise announced from year to year, articles on any subject
within the range of the Studies' purview, as defined in its masthead, will be consid-
ered for the awards. They will be judged primarily on substantive originality and
soundness, secondarily on literary qualities. Members of the Studies editorial board
and staff are of course excluded from the competition.
The editorial board will welcome readers' nominations for awards but reserves to
itself exclusive competence in the decision.
SECRET
?Approved For Release 2005/ 6/14: CIA-"P 4B00890R000800050003-4
25X1
25X1
25X1
25X1
25X1
Approved For Release 2005/06/51& 4rA-RDP84B0089OR000800050003-4
25X1
CONTENTS
Fall 1980
Page
Twenty-Five Years of Studies in Intelligence ........................ Stansfield Turner v
The Studies in Intelligence 25th Anniversary Issue ........................... The Editors vii
A Tribute to Sherman Kent ............................................................ Harold P. Ford 1
Saluting our founder and guiding spirit (UNCLASSIFIED)
Intelligence as Foundation for Policy .............................................. Robert Cutler 9
National intelligence orientation in 1958 (UNCLASSIFIED)
The Theory and Practice of Soviet Intelligence .......................... Alexander Orlov 17
An insider's account of the NKVD at work (UNCLASSIFIED)
The Shorthand of Experience .................................................. Thomas F. Elzweig 31
The true story of an exceptional spy (CONFIDENTIAL)
The Art of China-Watching ..................................................................... Gail Solin 47
Peering through the Bamboo Curtain (SECRET)
Mission to Birch Woods ....................................................... Henry S. Lowenhaupt 57
Targeting U-2 coverage of Soviet nuclear facilities (SECRET NOFORN)
Executive Privilege in the .Field of Intelligence ................. Lawrence R. Houston 65
Preventing sensitive disclosures in the good old days (OFFICIAL USE ONLY)
Elegant Writing in the Clandestine Service .................... Richard T. Puderbaugh 75
Things were no better in 1972 (UNCLASSIFIED)
On "The Craft of Intelligence...................................................... Frank G. Wisner 81
An insider's review of Allen Dulles at work (UNCLASSIFIED)
Intelligence in Public Literature ............................................................................... 91
Some oldies but goodies (UNCLASSIFIED)
SECRET
Approved For Release 2005/0 /14 : CIA-RD 84B0089OR000800050003u4 25X1
Approved For Release 2005/06r1WPCR-RDP84B00890R000800050003-4
A message from the Director of Central Intelligence
All professions share certain common characteristics. Intelligence is no different.
Special education and experience separate the professional from the layman. A unique
sense of responsibility to society as a whole influences the profession's operating stand-
ards and ethical norms. Even when the profession demands a high degree of practical
skill, that skill and the knowledge on which it is based combine with the profession's
philosophical foundations to provide the intellectual unity which, more than anything
else, binds the profession together.
Professions change over time. Like the society of which they are a part, they
accumulate a past and work to continue to be relevant in the future. Appreciating the
profession's past and understanding its vision of the future are vital to professional
competence in the present. Consequently, all professions are conscious of the need not
only to reflect on their amassed experience and the crescive reservoir of their knowl-
edge, but to pass it on to the generations which follow.
"Studies in Intelligence" has performed this vital function for the intelligence
profession for twenty-five years. It has done so with great distinction. Over those years
it has been the principal forum for advancing ideas within the profession and has
helped to establish the legitimacy of intelligence as an autonomous discipline. As the
preeminent journal of the profession it has successfully explored an impressive range
of issues, encouraged healthy and important dialogue, and has drawn together the
most significant body of professional comment on intelligence anywhere.
As "Studies in Intelligence" begins its twenty-fifth year of publication, it de-
serves our thanks for the service it has rendered to all professional intelligence officers
over the years, and our encouragement and support in the years to come.
Approved For Release 2005106/14: CIA-F4DP841300890R000800050003-4
25X1
25X1
Approved For Release 2005/06/9190(EA-RDP84B0089OR000800050003-4
25X1
The Need for an
Intelligence
Literature
Approved For Release 2005/
25X1
Approved For Release 2005/06SECRCTA-RDP84B00890R000800050003-4
25X1
As we recalled in our Spring issue, Studies in Intelligence began in September
1955 with the publication of Sherman Kent's monograph "The Need for an Intel-
ligence Literature." That and succeeding monographs by Abbot Smith, Harold Kehni
and Max Millikan became Volume One of Studies in Intelligence, although the first
full year of publication did not occur until 1958.
How Dr. Kent came to inspire what has become the journal of the intelligence
profession is recounted in Hal Ford's tribute beginning on page 1. The rest of this issue
is devoted entirely to reprints of articles from previous issues, including Kent's own
"Estimates and Influence," chosen to represent the many seminal articles he contrib-
uted to these pages over the years.
Our selections for this retrospective issue are both eclectic and limited; no single
volume of Studies could contain even a representative selection of all the outstanding
contributions to the literature of intelligence which have appeared between its covers.
In addition to the Kent piece, they include Robert Cutler's article on how intelligence
was geared to the national policy-making machinery at the time of Studies' founding;
an NKVD officer's interpretation of Soviet intelligence doctrine; a classic World War
II spy story by Thomas F. Elzweig; Gail Solin's prizewinning article on China-watch-
ing, as representative of the all-too-few Studies contributions on the intelligence an-
alyst's art; Henry S. Lowenhaupt's "Mission to Birch Woods" (also a prizewinner),
representing Hank's prodigious output of articles on scientific intelligence; one of
Lawrence R. Houston's many informed reviews of legal aspects of intelligence; and,
finally, an all-time favorite, "Elegant Writing in the Clandestine Services" by an
officer who, after retirement, produced an eminently readable novel about clandes-
tine service in the Vietnam War.
The book reviews in this anniversary edition are also chosen more or less ran-
`1omly from past issues. The first is actually a full-blown article by Frank G. Wisner on
AhPn Dulles' The Craft of Intelligence. Next is Roger Pineau's review of David
Kahn's classic The Codebreakers, then Charles Valpey's brief lament over the deplor-
able Irvisible Government by Wise and Ross. There follows Fritz Ermarth's erudite
dissection'? Graham Allison's Essence of Decision and a companion work, Victims of
Groupthink`U' Irving L. Janis. Finally, as the departing Editor's personal tribute to a
respected colleAue and collaborator, we have reprinted a review of one of the better
books on Richard Soi be; "Edward M. Zivich" is one of the many pen names of the
current curator of the Historical Intelligence Collection.
SECRET
Approved For Release 2005/ 6/14: CIA-R P84B00890R00080005000~3-4
25X1
Approved For Release 2005/06/SECRU-RDP84B00890R000800050003-4
25X1
Viii
Approved For Release 2005/ 6/14: CIA-
25X1
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Studies in Intelligence salutes
its founder and guiding spirit
A TRIBUTE TO SHERMAN KENT
Whatever the complexities of the puzzles we strive to solve, and whatever the
sophisticated techniques we may use to collect the pieces and store them, there
can never be a time when the thoughtful man can be supplanted as the intel-
ligence device supreme. . . . Great discoveries are not made by second-rate
minds, no matter how they may be juxtaposed organizationally.
Sherman Kent '
With this issue the Studies bids an official farewell to Sherman Kent, who
somewhat quixotically founded the journal in 1955 and has been its prime
sustainer for a dozen years. The infusions of his vigor and polymath good
judgment have been so much the wellspring of its life that is has reason to
tremble a little at this severance. Yet he has borne himself the wise father,
encouraging spontaneity and initiative, nudging here and checking there but
fostering the independent child; and he has thus brought it to a stature that
can stand the shock. It can take comfort, too, that he will not be altogether out
of its reach for fatherly advice. This is the end of an era, but the era's works go
on.
The Editors of Studies
in Intelligence, 1968
It can be said in one sense that Studies in Intelligence owes its birth to a slow
news day some years ago. As Sherman Kent later related that genesis, it was one quiet
Sunday in December 1953 when he had the morning duty in Mr. Allen Dulles' office
that Sherm memorialized Matt Baird, then CIA Director of Training, arguing that the
discipline of intelligence badly needed an Institute for the Advanced Study of Intel-
ligence and an accompanying learned journal. The idea of an institute, which Sherm
wanted modeled after the Institute for Advanced Study at Princeton, was in his words
put on a back burner by history ' while the idea of a journal came to fruition in 1955.
The author wishes to thank the many friends who have helped him prepare this article, but who bear
no responsibility for its shortcomings or particular judgments. These friends are Paul Borel, Keith Clark,
Mary Cook, James Cooley, Chester Cooper, James Graham, Klaus Knorr, Karen Platte, Edward Sayle,
Abbot Smith, Don Smith, Mary Shaw, and Joseph Strayer.
' Strategic Intelligence for American World Policy, revised ed. (Princeton University Press, 1966), pp.
xxiv, 174.
Remarks introducing Sherman Kent's article, "Valediction," Vol. 12, No. 1 (Winter 1968), p. 1.
The idea of an institute refused to die, but was born again in various suggested versions over the years.
In 1975 an institute at length came into being in the form of the CIA Office of Training's Center for the
Study of Intelligence, similar in certain respects at least to Sherman Kent's original proposal. The Center's
Senior Officers Development Course, now in preparation, may come even closer to the goal.
MORI/HRP PAGES 1-8
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R6be8>O45Wo3-4
In a more profound sense, the idea of Studies in Intelligence did not of course
suddenly strike Sherm out of the blue, one Sunday in 1953, but sprang from a long and
intensely held conviction that intelligence should be recognized and treated as a schol-
arly discipline, and to that end intelligence badly needed a professional literature. We
thus pay tribute to Sherman Kent not only for kindling our journal-which with this
issue celebrates a quarter century of contribution to intelligence theory, doctrine,
technique, and anecdote-but more importantly for the vision, perseverence, and
persuasiveness that has made him a principal father of the modern intelligence pro-
fession-as well as a splendid leader and colorful personality.
The professional integrity Sherman Kent intended for Studies long antedated that
quiet morning in Mr. Dulles' office; indeed, it antedated Sherm's own career as an
intelligence officer. While still a history professor at Yale, prior to World War II, his
classes had been popular because his enthusiasm brought history to life, generously
salted with his unique vocabulary; less popular at New Haven, however, was the rigor
he demanded: he bestowed D's and F's with abandon when he encountered sham or
lack of preparation-a characteristic some other young scholars, from the Staff of his
Office of National Estimates, experienced on occasion some years later. Closely
paralleling his theory and practice of professional intelligence were certain of the
principles of the historian's calling Sherman Kent enunciated in his first book, Writing
History, which he had written while at Yale. In many of its passages one need only
substitute the words "intelligence officer" for "historian." One example:
When the evidence seems to force a single and immediate conclusion, then
that is the time to worry about one's bigotry and to do a little conscientious
introspection into why this particular conclusion stands out. Was it in the
material or was it in you? The command of Socrates, "know thyself," never
gave richer rewards than in the world of what we've been calling systematic
study. . . .
Later, during World War II, Sherm served as Chief of the Europe-Africa Division
of the Research and Analysis Branch of the OSS, a direct predecessor of CIA's present
National Foreign Assessment Center (NFAC). It was this exposure, he recounts, which
brought him to believe passionately in the need for a literature of intelligence.
The more I talked with my OSS colleagues, the surer I was that a serious
book on the intelligence business was needed. It became a compulsion; I
simply had to get these thoughts off my mind.,
These thoughts began to take specific form immediately after the war, while
Sherm was serving on the staff of the National War College and before returning to
Yale in 1947. At this time Sherm was taking stock of U.S. intelligence and asking how
the United States could avoid another Pearl Harbor in the years ahead. In a Yale
Review article of 1946 he wrote:
The existence of controllable atomic energy, and the dead certainty that
others besides ourselves will soon possess the technical secrets, place a new
and forceful emphasis upon intelligence as one of the most vital elements in
our survival.'
' Revised edition (Appleton-Century-Crofts, 1967), p. 5. Sherm recounts that he wrote this whole book,
cover to cover, during a week's vacation in 1937 in Florida. "Then, five years and five drafts later, Apple-
ton-Century-Crofts published it." Still later, following World War II and the establishing of the occupation
of Japan, General Douglas MacArthur's headquarters had this book translated into Japanese. Kent to author,
May 1980.
' Kent to author.
6 "Prospects for the National Intelligence Service," Vol. 36, No. 1, Autumn 1946, p. 116.
2
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
PMlf4 r Release 2005/06/14: CIA-RDP84B00890R000800050003-4
During the interval before Sherman Kent joined CIA (November 1950), he
contributed to the art and practice of intelligence particularly through the publishing
of his Strategic Intelligence for American World Policy, certainly the most influential
book of its kind yet to appear. This reputation began with the book's first appearance,
the New York Times reviewer (William H. Jackson, himself a former OSS officer)
greeting it with the bouquets that Kent
knows his stuff and writes it down with persuasion and force. The result is
the best general book so far on any aspect of intelligence. . . . This book
should be read by all high officials charged with responsibility for the se-
curity of the country and by all those who work in the field of intelligence.'
Princeton Press reprinted the book in 1951 and 1953, and published a revised (paper-
back) edition in 1966. Archon Books published an edition in 1965. Foreign editions
include Chinese, Japanese, Spanish, Portuguese, Korean, and pirated.'
The content of that familiar work need not be repeated here. Suffice it to say that
Strategic Intelligence conveyed refined versions of certain themes he had previously
advanced in his 1946 Yale Review article, supra, plus numerous injunctions of perti-
nence to the intelligence world of the 1980s. A few samples:
A last reason for the misunderstandings between intelligence producers and
consumers is an understandable reluctance of the part of consumers to em-
bark upon a hazardous task on the basis of someone else's say-so. After all, if
anyone is going to be hurt it probably will not be the producers. I will
warrant that the Light Brigade's G-2 was high on the list of survivors in the
charge of Balaclava.'
The main difference between professional scholars or intelligence officers on
the one hand, and all other people on the other hand, is that the former are
supposed to have had more training in the techniques of guarding against
their own intellectual frailties.1?
When intelligence producers realize that there is no sense in forwarding to a
consumer knowledge which does not correspond to his preconceptions, then
intelligence is through."
When the findings of the intelligence arm are regularly ignored by the
consumer, and this because of consumer intuition, he should recognize that
he is turning his back on the two instruments by which western man has,
since Aristotle, steadily enlarged his horizon of knowledge-the instruments
of reason and scientific method.12
Sherm still-and quite justifiably-considers this pioneer book to be basicaly
sound: "The heart of the book is as solid as ever; the game still swings on the educated,
thoughtful man, not on gadgetry." 10
7 New York Times Book Review, 1 May 1949.
8 The remarkable success of this book contrasts with its humble beginnings. Various editors had told
Sherm to forget about such a project because it didn't include any blood, guts, or beautiful spies, and
because it wouldn't sell the 5,000 copies needed for a publisher to break even. Sherm's favorite edition is the
pirated one (English-language) General Chiang Ching-kuo presented him in 1959, "with a big smile," on the
occasion of a trip by Sherm to Taiwan. Kent to author.
9 Op. cit., p. 193.
10 ibid., p. 199.
Ibid., p. 205.
2 Ibid., p. 206.
Kent to author. May 1980.
3
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R000? 0 O4
A year after Strategic Intelligence was published, Sherm left Yale for the CIA.
The prime movers were in effect the Korean War, the distinguished Harvard historian
William L. Langer, and DCI Walter Bedell Smith. The difficulties U.S. intelligence
had had in calling the North Korean invasion of the South in June 1950, and especially
the massive Chinese involvement that autumn, had led to major shake-up of CIA's
analytic process. One of the principal such changes determined upon by DCI General
Smith was the creation of the National Intelligence Estimates (NIEs) and the Office of
National Estimates (O/NE)-to be headed by Dr. Langer, who had been the Chief of
the Research and Analysis Branch of OSS. Beedle Smith proposed the NIE function at
an October 20, 1950 meeting of the Intelligence Advisory Committee (the then NFIB).
On that occasion there "was general assent" with the proposals of a memorandum the
DCI had had prepared on "The Responsibility of the Central Intelligence Agency for
National Intelligence Estimates."
? That IAC memo set forth the concept of the NIEs as authoritative interpreta-
tions and appraisals that would help guide policymakers and planners.
? The NIEs should command recognition and respect throughout the government
as the best available and presumably the most authoritative estimates.
? It was the clear duty and responsibility of the CIA to assemble and produce
these coordinated estimates.
Following the IAC's discussion of that memo, the DCI proposed that an Office of
National Estimates be set up in the CIA "at the earliest possible time." In his opinion
O/NE would "become the heart of the Central Intelligence Agency and of the na-
tional intelligence machinery." 14 O/NE was formally established just a month later,
20 November 1950.
Bill Langer, called upon by President Truman and Beedle Smith to head O/NE,
thereupon put the heat on his former OSS R&A colleague, Sherman Kent, to come join
the new office. Kent's recollection of being interviewed for the job by the DCI one
Sunday in November 1950 (in the DCI's office), reminds us nostalgically of Beedle
Smith's persuasive charm. Says Sherm:
I told the DCI I had some doubts and wasn't certain about taking the job.
Whereupon, putting on that annoyed cobra look of his, Beedle snapped,
"Young man, if you think I make a business of coming down to my office on
a Sunday morning to talk with people who aren't sure about taking the joh,
you've got another think coming! 15
Sherm decided as how maybe the job was the right one for him, after all.
At first joining the newly-founded O/NE as a temporary consultant, Sherm
stayed on to serve as Langer's Deputy until January 1952 when, upon Langer's return
to Harvard, Kent succeeded him as chief of O/NE (AD/NE). He held that position
until 31 December 1967.
Sherm had thus been AD/NE almost two years when he petitioned Matt Baird to
establish an intelligence institute and learned journal. In that December 1953 memo
he repeated certain of his long-standing concerns: a "sense of disquiet that Intelligence
is a non-cumulative discipline"; a "sense of outrage at the infantile imprecision of the
language of intelligence-I give you the NSCIDs for a starter"; and the fact that there
'* IAC-M-1, of 20 October 1950, paras, 6-7.
15 Kent to author.
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Anp yyeepr Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
orle
existed no institutional memory-"what kind of a way is this to run a railroad?" 16 To
remedy that situation Sherm proposed the Institute and the journal. With respect to
the latter, the germ of Studies in Intelligence, Sherm wrote:
I would establish a journal-probably a quarterly-which would be devoted
to intelligence theory and doctrine, and the techniques of the discipline. I
would have an editor who fully understood the limits of his mandate. The
journal could be Top Secret; its component articles could be of any classifica-
tion or unclassified."
Once Studies in Intelligence was launched-with the active and good assistance
of Matt Baird-Sherm contributed an article to the very first issue (Vol. I, No. 1,
September 1955), which repeated his earlier themes about the necessity for a literature
of intelligence. A couple of attributes he attributed to the intelligence profession at
that time bear noting by later practitioners:
"We have within us a feeling of common purpose, and a good sense of
mission. "
People work at the intelligence calling "until they are numb, because they
love it, because it is their life, and because the rewards are the rewards of
professional accomplishment." 18
Sherman Kent's interest in Studies has continued to this day. As of 1968 (his
"Valediction" article), he felt that despite some problems concerning security clas-
sification and the need to twist author's arms to get articles, "it was beyond argument"
that Studies had contributed to a "richer understanding of the bones and viscera of the
intelligence calling." 19 His present view is that the journal's articles have in general
improved even more in sophistication and contribution since that time.20 Over the
years Sherm has himself contributed some nine articles, eleven book reviews, and one
other review (of the worst book he said he had ever reviewed) which was so steaming
it was not published-though a copy remains in the Studies files and in the Historical
Intelligence Collection.
The themes Sherm had championed so forcefully in his prior writings and in his
arguments for a learned journal all carried over into his sixteen-year stewardship of
O/NE. Keynotes there were intellectual rigor, conscious effort to avoid unconscious
analytical bias, willingness to hear other judgments, collective responsibility of judg-
ment, precision of statement, systematic use of some of the country's best experts as
consultants and checks against in-house blinders, and candid admission of short-
comings.21 This was purposely accomplished by a modest-sized operation: generally a
Board of about twelve very senior members, and a substantive Staff of a couple dozen
or so. The philosophy of Langer and Kent, alike, was that the people of such a smallish
office would work themselves numb, to use Sherm's figure, but would be too small to
"Valediction," Op. cit., p. 3.
? Ibid. p. 5.
e "The Need for an Intelligence Literature," p. 2.
Op. cit., p. 7.
10 Kent to author.
Q' Typical of Sherm Kent's candor are (1) his frank admission that O/NE had mis-called the Cuban
missile crisis ("A Crucial Estimate Relived," Studies, Vol. 8, No. 2, Spring 1964, pp. 1-18); and (2) a letter
of thanks to a former O/NE staffer for some comments he had given Sherm on the overall NIE record,
because those comments had highlighted "bads as well as goods; (highlighting one's own bad's is always the
most uncongenial of exercises). What you wrote is right on the nose." Letter, Kent to staffer, of 4 December
1974.
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R0S89~(0Rg~i4
carry all the accoutrements of bureaucratic overkill.22 Shielding Board and Staff in this
way, as well as from the passions of Washington policy advocacy, would be a necessity
in view of the extremely difficult task the office faced: the venturing out beyond
evidence to estimate the unknown.
O/NE was not Camelot, but Sherm did run a fine show. It was a great place to
work. Enthusiasm and sense of purpose were high. Everyone was overworked. There
were lots of laughs, amid countless unprintable Kentian anecdotes and aphorisms.
Under Sherm, there was never any party line, other than the dogged pursuit of truth.
There was M.B.O.-management-by-osmosis-and it worked. The office was
miraculosly shielded from non-substantive drag. The table gamesmanship was tough,
sophisticated, productive, and delightful.
Sherm presided over it all firmly, but without seeming effort. He gave Board and
Staff members their head(s), and asked in return only for a quality and integrity of
product and conduct. He was not Olympian. He was not a purveyor of Weltan-
schauung. He was the direction-setter; the catalyst; the cold reader-critic-beware his
broad pencilled questions; the weaver of product-to-policy relevance; the source of
enthusiasm; the setter of standards; the rewarder of the productive and the chastizer of
the unproductive; the one who demanded clear, concise exposition; and, throughout,
the exemplar of purpose, good humor, a proper degree of irreverence, civility, and a
supreme degree of decency.
Not too familiar to post-O/NE intelligence officers is the remarkable quality of
people and product Sherm's office maintained for some years. In those years the
Board included historians Langer, Kent, Raymond J_ Sontag, Abbot E. Smith, and
Joseph Strayer; Ambassadors Llewellan (Tommy) Thompson, Livingston Merchant,
Freeman (Doe) Matthews, and Harold Linder; Generals Harold (Pinky) Bull and Earl
(Diz) Barnes; plus prominent lawyers and government executives.
Sherm has been especially proud of the substantive Staff he recruited and main-
tained in O/NE: "For 20 years they were the best staff in town and so proclaimed by a
good number of very knowledgeable outsiders." 23 Even allowing for Sherm's
understandable enthusiasm concerning his people, the caliber of these O/NE Staff
officers over the years is illustrated by the responsibilities many of them subsequently
gained. Three later became Ambassadors. Three became the DD/I (or D/NFAC).
Three later headed O/NE. Seven became DDI (or NFAC) Office Chiefs. Five became
National Intelligence Officers. Seven became Chiefs of Station abroad. Three held
senior White House positions. Two became Director of State's INR. One an Undersec-
retary of Defense. Two, Assistant Secretaries of Defense. One an Undersecretary of
State. Several became distinguished academicians and authors. One heads the Wood-
row Wilson Center at the Smithsonian. One heads Washington's Institute for Energy
Analysis. One heads the Staff of the Senate Foreign Relations Committee. One is a
senior member of State's Policy Planning Staff. One is the Editor of Foreign Affairs.
Not least, one is President of the Washington Audubon Society. Sherm truly had his
men everywhere.
To repeat, O/NE was not Camelot. All Board members were not Langer's or
Sontag's; some were later wished on Kent by his DCIs; some board members tended to
22 According to Ray Cline, first Chief of O/NE's Estimates Staff, Dr. Langer told him at the outset that
DCI Smith thought that O/NE would require about 1,000 people, but that Langer had assured Beedle
Smith that he could do the job well with about 60, total. Cline, Secrets, Spies and Scholars: The Essential
CIA (Washington, D.C.: Acropolis Books, 1978), p. 120. Although CIA and the intelligence community
burgeoned in size over the years, Kent kept O/NE at about the 60-70 figure, total.
E3 Kent, classified study, 1976, V. 29. And, "The Staff was always the works." Kent to author. May 1980.
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
l nmre6id r Release 2005/06/14: CIA-RDP84B00890R000800050003-4
ramble on at great length about irrelevancies; some nit-picked the Staff up the wall;
and a few must have been embarrassments to Sherm. Nor were the Staff members all
clear-eyed Jack Armstrongs; some couldn't draft; some weren't good at coordination
gamesmanship; some Staff alumni later gave Sherman Kent bureaucratic fits. O/NE
was not a fount of ERA. In the view of some observers, O/NE later became somewhat
cut off from the policy-making world, somewhat self-satisfied and resistant to change,
and overly in-grown. Other elite offices developed as intelligence became more tech-
nical in many respects. In its later years bureaucratic constraints inhibited O/NE from
continuing to recruit the best available Staff members from CIA's ranks. Not O/NE's
fault, and indeed to its credit, was a certain fall from grace in its later years occasioned
in part by the fact that certain of its estimates were not congenial to senior policy-
makers. Throughout his tenure, however, Sherm Kent maintained tough, demanding
standards of his officers. He maintained the integrity of the estimative process against
corruption.29 He was a tough warrior who protected his scholars from the bureaucratic
world, while imbuing them with enthusiasm about the purpose of their common
understanding. And, he had a great curiosity about the whole of CIA and its business,
and he knew how the total effort all fit together.
No tribute to Sherman Kent could overlook his bright red galluses and his plug of
chewing tobacco, or ignore the contributions to the profession his colorful personality
has made. His versatility and style have enriched the intelligence profession and
helped protect it from becoming flat and featureless. Sherm has been called a rough
diamond aristocrat, a mix of Connecticut roots-schooling and California upbringing -
a mix which was captured years ago by Yale undergraduate pals who dubbed him
"Buffalo Bill, the Cultured Cowboy." The whole term applies, even though it's only
the "Buffalo" which has survived as a favorite term among his friends. Sheen's skills
include that of accomplished woodworker, whether making furniture or "Buffalo
Blocks" (hand-made multi-wood blocks Sherm later had produced for commerical
sale.) He is also a chef supreme. His publications concern not only intelligence and
how to write history, but a book on French politics (of the 1820s) '21 and one for
younger readers called A Boy and a Pig, But Mostly Horses.26 Sherm's versatility
helped the cause of his O/NE products because everyone in town knew him; the
impact of his NIEs was facilitated by the respect in which he was held. Truly, Sherm
Kent is no run-of-the-mill model of graduate student turned analyst or case officer.
Personalities such as his are a good remedy against the development of homogenous
CIA men or what author Stewart Alsop has termed the generation of prudent CIA
professionals. Our calling needs character. It also needs characters. In the best sense,
Sherm Kent has been both.
If Sherm were joining the CIA's analytic world this November rather than the
one he did of 30 years ago, what patterns of consistency and change would he encoun-
ter? The major hazards of the business remain: the ambiguity of evidence; the loneli-
ness of venturing out beyond available evidence in trying to call future trends; the
problems of recognizing and diminishing analytic bias, whether conscious or uncon-
scious; the joy of solving some of the analytic puzzles; the freedom to go wherever the
evidence takes you, whatever the consequent logic for U.S. policy or policy makers;
Q' A DCI once intervened strongly against one of the NIE's Kent had brought to the USIA (NFIB),
criticized Sherm before that body for not having sought the views of the (policy) people who "really know
the x situation best," and ordered O/NE to see those people and recast the NIE. That DCI later told Sherm
that the original NIE had had the situation right, and that he (the DCI) had made a mistake in so interven-
ing. Kent and other participants to author.
zs The Election of Eighteen Twenty Seven in France (Harvard University Press, 1975).
Qs Dodd, 1974.
Z
Approved For Release 2005/06/14: CIA-RDP84B0089OR0008000500034
Approved For Release 2005/06/14: CIA-RDP84B00890RQ%I Q?RQQ3-4
the competition for the time and attention of senior policy-making consumers; the
rewards when one's judgments prove congenial to the customers; the growls-or-
worse, the silence-when they do not. Other problems of 1980 differ substantially
from those of 1950. There is of course now more red tape, more form and triplicate.
But more importantly there are now many more world actors creating more crises
than a generation ago, there is more passion and unreason in the world-and not all
that is abroad-and there are more challenges to Sherm's expressed faith that reason
and the scientific method will see the intelligence process through. There is also a
greater need for close intelligence ties to the policy world: there have been some years
which show that this can occur without necessarily corrupting the independence of
intelligence judgments, and hence there is a certain questioning which can be made of
Sherman Kent's certainty that intelligence analysts and estimators who go downtown
will become policy advocates and begin to serve power rather than truth.
Whatever the case with respect to policy, however, the contribution of Sherman
Kent to the 1980s, as to the 1950s, and 1960s, is truly considerable. Together with
celebrating Sherm's key role in creating Studies 25 years ago, we pay tribute to the 30
years of Sherm's professional and personal contributions since he was pitched by DCI
Beedle Smith that Sunday in 1950, and to the even longer period Sherman Kent has
been championing those qualities the intelligence calling must possess if it is to have
integrity and effectiveness.
Honor is perhaps due to Sherman Kent, most of all, for someone who has em-
bodied and helped form the purpose of the intelligence profession, and who has set
standards for enthusiastically working oneself numb because of the intellectual chal-
lenge and the sense of service at hand. And, tribute, too, to someone who has pointed
out the folly of allowing situations to develop where these qualities do not obtain,
situations for example where, in Sherm's word,
From the very beginning, there was administrative trouble of a high order,
much of it avoidable; personnel actions-new appointments, replacements,
and overdue promotions-moved with the ponderous slowness of the glacier
or not at all. Life outside the government, or at best outside [that depart-
ment], began to be more and more attractive to irreplaceable professionals.
They began to leave in the order of their importance to the organization; and
as replacements did not appear, morale declined.27
Sherm was speaking here of the state of U.S. intelligence as it existed at the time-in
1946.
The preceding article is Unclassified.
8 Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
The role intelligence actually plays
in the Executive Branch's forging of
national security policy is described
and appraised by an indubitable
authority
INTELLIGENCE AS FOUNDATION FOR POLICY
Robert Cutler
An integral and in fact basic element in the formation of national security policy
is the latest and best intelligence bearing on the substance of the policy to be deter-
mined. That statement is not a theoretical truism, but a description of what has by and
large actually been practiced in the Executive Branch under the administration of
President Eisenhower. It is based on first-hand observation: for periods totaling almost
four years I was in continuous touch with the procedures for formulating, adopting,
and coordinating the execution of national security policies within the Executive
Branch. I assisted the President at 179 meetings of the National Security Council--
almost half of all the meetings it held in the first dozen years of its existence. I
presided at 504 meetings of the Council's Planning Board (earlier called its Senior
Staff). I was a member and for a while Vice Chairman of its Operations Coordinating
Board; I participated in meetings of the Council on Foreign Economic Policy; I rep-
resented the President on a small group which considered special operations. It is from
this experience that the conclusions of this article are drawn.'
NSC Operating Procedures
The function of the National Security Council, as defined by National Security
Act, is "to advise the President with respect to the integration of domestic, foreign,
and military policies relating to the national security, so as to enable the military
services and the other departments and agencies of Government to cooperate more
effectively in matters affecting the national security." The Act also gives to the Coun-
cil the duty of "assessing and appraising the objectives, commitments, and risks of the
United States in relation to our actual and potential military power." The Council
advises the President both on policy and on plans for its execution, but its primary
statutory function thus lies in the formation of policy. The role of the Council as a
planning body is subordinate to its policy function.
The Council and its subsidiary Planning Board 2 and Operations Coordinating
Board 9 constitute an apparatus available to the President to help him reach policy
' In 1951, in the early organizational stages of the Psychological Strategy Board, the author served as its
Deputy Director and representative at meetings of the NSC Senior Staff, later to become the Planning
Board. In early 1953 President Eisenhower asked him to study the organization and functioning of the NSC
mechanism and make recommendations to strengthen and vitalize its structure and operating procedures.
He then became the President's principal assistant with reference to the operations of the Council. He was
moved from the position of Administrative Assistant (January-March 1953) to that of Special Assistant for
National Security Affairs, where he served from March 1953 to April 1955 and from January 1957 to July
1958.
E The NSC Planning Board, chaired by the President's Special Assistant for National Security Affairs, is
composed of officials of the departments and agencies which are represented at the Council table with
reference to a policy matter there under consideration. These officials have a rank equivalent to Assistant
Secretary or higher. Each is supported by a departmental or agency staff. Each has direct access to his
department or agency chief and commands all the resources of his department or agency for the perform-
ance of his duties.
8 The NSC Operations Coordinating Board, of which the President's Special Assistant for Security
Operations Coordination is Vice Chairman, is composed of officials of the departments and agencies con-
cerned with the policies referred to the Board by the President for assistance in the coordination of plan-
ning. These officials have a rank equivalent to Under Secretary or higher. Each is supported by a small
departmental or agency staff. Each has direct access to his department or agency chief and commands all
the resources of his department or agency for the performance of his duties.
Approved For Release 2005/06/14: CIA-RDP84B00890R000800WQDU -'P PAGES 9-16
Approved For Release 2005/06/14: CIA-RD
P& MOP6Q% P050003-4
decisions on national security. The National Security Act is sufficiently flexible to
allow each President to use this personal aid as best suits his convenience. One Presi-
dent may use the Council mechanism in one way, another in another. The best use is
made of it when a President uses it in a way that satisfies his personal requirements. It
has never been felt necessary to test whether the Congress can constitutionally require
by statute that a President consult with specified persons or follow specified proce-
dures in coming to a policy decision in this field.
Under President Eisenhower, the normal procedure for operating the policy-
making aspects of the NSC mechanism has involved three main steps. First, the NSC
Planning Board formulates recommendations as to national security policy and cir-
culates them to Council members and advisers well in advance of the Council meeting
at which they are scheduled to be considered. Then the Council considers and ap-
proves or modifies or rejects these recommendations, and submits to the President
such as it approves or modifies. Finally, the President approves, modifies, or rejects
the Council's recommendations, transmits those policies which he approves to the
departments and agencies responsible for planning their execution, and-as a rule
where international affairs are concerned-requests the NSC Operations Coordinating
Board to assist these departments and agencies in coordinating their respective plan-
ning for action under the approved policies.
Thus, a policy is first determined by the President, and then the departments and
agencies plan how to carry out their responsibilities to the President under it, being
assisted in the coordination of this planning by the OCB. It is, of course, fundamental
that the planning to execute policy responsibilities be carried out by the respective
departments and agencies which are directly charged by the President with such
responsibilities. No person or body should intervene, at a lower level, between the
President and the department head directly responsible to him.
During the period 1953-1958, with which I am familiar, the great bulk of na-
tional security policy determinations were made by the President through the oper-
ations of the NSC mechanism just described. Because this method of policy formula-
tion was the usual one, such policies were commonly but erroneously referred to as
"NSC policies." Since it is the function of the President to determine policy in all areas
under his executive control and responsibility, and national security policy may be
formed in any way which he finds convenient and appropriate, the policies so formed,
whatever body or individual may submit the recommendations therefor, are the Presi-
dent's policies.
There were occasions during this period when national security policy was deter-
mined by the President as a result of Cabinet deliberations (though this was a rare
occurrence) or by his executive decision based on conferences with one or more of his
principal department or agency heads, the Joint Chiefs of Staff, or others within whose
special competence some particular subject would naturally fall. There should always
be complete flexibility for every President to determine however he elects the matters
of high policy which it is his responsibility to decide. Because of the utility and
convenience of the NSC mechanism, however, and because the present Chief Execu-
tive values the advantages of integrated recommendations and joint deliberations
based on them, it has been the more or less standard operating procedure during his
tenure to seek to form national security policies through the procedures outlined
above.
Factual Intelligence and Estimates
In this article the term "intelligence" is used to embrace both factual intelligence
and estimates based thereon. In forming national security policy both are of prime
importance.
10 Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
f"&a ShFf9F R I se 2005/06/14: CIA-RDP84B00890R000800050003-4
The gathering of intelligence facts is today a matter of enormous scope and
hardly conceivable complexity, bearing no resemblance to the simple if hazardous
personal mission of a Mata Hari. There are, indeed, many individuals working in the
field of intelligence, in and out of formal government service, who must exhibit per-
sonal bravery and rare ingenuity, taking risks beyond the ordinary call of duty. Be-
cause all is grist that comes to the intelligence mill, one need not seek to measure the
results of these individual efforts against the results of the world-wide scientific and
technological operations employed in modern intelligence gathering.
In our continuing confrontation by a power openly dedicated to swallowing all
mankind in the maw of Communism, the rapid gathering of germane intelligence on
the activities of other nations in every field of endeavor has put the United States into
an electronic business that is world-wide, highly scientific, incredibly complicated,
and extremely expensive. It is staggering to realize the limitless ramifications of cur-
rent technological procedures, the almost overwhelming amount of raw material that
comes flooding in every hour of the day and night to be sifted, analyzed, codified,
and-most urgent of all-communicated clearly to the decision-makers. For in the last
analysis the valid use of intelligence is to build intellectual platforms upon which
decisions can be made. It is not gathered to be stored away like a harvest. It must be
delivered, succinct and unequivocal, within the shortest time feasible to focal points
for use.
This prompt delivery is essential both to those who conduct our foreign affairs or
direct our defensive military mechanisms and to those who frame our decisions of
high policy. The sound concept that the national intelligence effort should be central-
ized is not inconsistent with a demonstrable need that each of the several departments
have its own intelligence arm. The man who may have to dispatch a SAC bomber, an
ICBM, a Polaris submarine, or a Pentomic task force has a dual function with regard
to intelligence: he has a part in acquiring the latest intelligence for use at central
headquarters, all the way up to the President; he also must himself have and use the
latest intelligence in carrying out his crucial responsibilities.
It is for these reasons that the National Security Act in 1947 created a Central
Intelligence Agency and a Director of Central intelligence, who at one and the same
time is chief officer of the Central Intelligence Agency, Chairman of the United States
Intelligence Board, and Foreign Intelligence Adviser to the President and National
Security Council. Through the series of NSC Intelligence Directives the President has
sought to make the gathering and dissemination of intelligence more rapid and effi-
cient. These Directives put emphasis on the centralization of authority and responsibil-
ity in the intelligence field, on making the separate intelligence organizations of the
armed services and other departments and agencies contributory to, and not inde-
pendent of, such central authority, while still allowing them to meet their specialized
needs.
The President has shown a constant awareness of the ungency of perfecting the
national intelligence effort. He gave close attention to the reports on this effort made
by the committee under General James A. Doolittle (October 1954) and by the Hoover
Commission's Task Force on Intelligence Activities under General Mark Clark (May
1955). In February 1956 he formally established a President's Board of Consultants on
Foreign Intelligence Activities, first chaired by Dr. James R. Killian and now by
General John E. Hull. He gave this Board the continuing mission of reviewing the
conduct of our foreign intelligence activities and reporting thereon periodically to the
Chief Executive.
The operation of the many intelligence arms in the critical field of intelligence
gathering and dissemination at all levels involves a truly vast annual expenditure. But
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005000314
Approved For Release 2005/06/14: CIA-RDP84B0p,8Q43-4
in terms of national survival, the prompt delivery of correct intelligence to the Presi-
dent, the ultimate decision-maker, is an undebatable necessity.
Beyond this requirement for current factual intelligence there is an additional
requirement for intelligence estimates. These estimates may be addressed to a particu-
lar country, area, situation, armament, or function and set forth both the pertinent
facts and the likely future actions predictable thereon, or they may seek to arrange
logically and with precision the broadest spectrum of intelligence materials into a
considered appraisal of what over-all developments may be in future time.
Both types of intelligence estimates can be of the greatest possible help to policy-
makers and planners. Their preparation requires expert competence and their co-
ordination calls for objective thinking by those who have the authority to agree or
differ on behalf of their organizations. Because of the prophetic nature of any es-
timate, it is of great consequence that the final text should seek not compromise but
clarity. Many of the coordinated national intelligence estimates with which I worked
during these four years clearly and fully set forth dissenting views held by competent
members of the U.S. Intelligence Board.
Intelligence Orientation for the Makers of High Policy
The prompt circulation of daily bulletins and special and national estimates as
basic orientation for those who make the recommendations and decisions on high
policy is an obvious necessity. The Planning Board, responsible for doing the spade-
work in forming policy, needs to review the special and national estimates in detail,
dissecting them and arguing over them until they become familiar material. And
Security Council members need to get them in time to study and weigh them before
the subjects to which they relate are taken up at the Council level. Both Planning
Board and Council members should be inseminated with their contents,
In the Planning Board this insemination has
been a feature of its standard operating procedure since 1953, as I will illustrate in a
moment. At the Council level the education of the members is carried on in several
ways.
In the NSC. The Council members receive daily, weekly, special, and general
intelligence publications, and their function requires that they be familiar with this
material. In 1953, moreover, in order to insure that Council members are kept fully
acquainted with current intelligence, an innovation was introduced at their meetings.
Until then, the oral briefing on current intelligence was given each day in the Presi-
dent's office to him alone. Now it became a part of the Council's established proce-
dure to make the first agenda item at each meeting a briefing by the Director of
Central Intelligence.
This oral briefing, assisted by the visual presentation of maps and charts on easels
behind the Director's seat, reviews the latest important intelligence throughout the
world but focuses on the areas which are to be taken up later in the meeting. It
normally consumes from fifteen to twenty-five percent of the meeting time, being
frequently interrupted by specific questions from the President and other Council
members. These questions often give rise to colloquies and extemporaneous expres-
sions of views which are of consequence to the policy recommendations that are to be
discussed. I have always believed this direct confrontation of the Council each week
with current and special intelligence to be an important aid to policy consideration
and formulation. Yet the British Cabinet and the War Cabinet under Sir Winston
Churchill, to the best of my knowledge, carried on their policy deliberations without
the benefit of this stimulating and thought-focussing device.
25X1
12 Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
pVX& ,F#?r ftJWse 2005/06/14: CIA-RDP84B00890R000800050003-4
There are other ways in which the Council, as the supervisory body to which the
Director of Central intelligence reports, is kept informed about intelligence problems.
The Director submits annually to the Council a summation of the problems that have
'faced the intelligence community in the preceding period and the measures and
means adopted for dealing with them. The President and Council must also from time
to time review and revise the National Security Council Intelligence Directives, which
constitute the charter for the operations of the intelligence community.
The revision of one of these detailed and often complicated NSCIDs, especially in
relation to the functional gathering and rapid dissemination of intelligence, may re-
quire months of prior study by a panel of specialists-perhaps scientists, technologists,
or communications experts, persons of the highest intellectual and scientific stand-
ing-brought together to advise on methods and procedures. Many of the panel studies
necessary for the purposes of the experts involve most carefully guarded secrets. Yet it
is important that the Council understand, in general terms, how the vast intelligence
community of modern days is organized, administered, and operated. The principles
which emerge from the findings and recommendations of these highly classified stud-
ies are matters for action by the Council, and especially by the President.
In times of particular crisis the function of intelligence is conspicuous in its
importance. In such historical crises as Indo-China in 1954, the Chinese off-shore
islands in 1954-1955, and Lebanon in 1958-to cite a few at random-the intelligence
appraisal of the Director of Central Intelligence, the foreign policy appraisal by the
Secretary of State, and the military appraisal by the Joint Chiefs of Staff were in-
dispensable ingredients in the deliberations held before the die was cast and the policy
set by the President.
In the Planning Board. The Planning Board necessarily probes deeply into the
latest intelligence on each subject that comes before it. A CIA Deputy Director is in
regular attendance at the Board table, bringing to its deliberations and informed
knowledge of the contents of special and general intelligence estimates. He partici-
pates from his point of view in the debate on current matters, and it would be as
unthinkable to overlook his views as to overlook those of the representative of the Joint
Chiefs of Staff, who is seated at the table as adviser on military issues.
The CIA Deputy Director and the Special Assistant to the President for National
Security Affairs seek to coordinate the preparation of intelligence estimates with the
forward agenda of the Planning Board. To that end the agenda is tentatively sched-
uled for a period of two months or more ahead so that the flow of intelligence materi-
als can be arranged to meet the policy-makers' demands. Of course, history sometimes
takes a hand, and the scheduled forward agenda has to be suspended for the immedi-
ate consideration of a special estimate that has been urgently called for. There can be
nothing static or cut-and-dried in scheduling ahead the Planning Board's work-load
(and consequently the Council's forward agenda); it is entirely unpredictable how long
a time may be consumed in the preparation of particular policy recommendations or
what interruptions may be forced by extrinsic happenings. Whatever the order of
business, however, one factor is essential: a foundation of the latest and best intel-
ligence to build upon and a constant rechecking of intelligence material as time
marches on to the Council deliberation and the Presidential decision.
In the OCB. Turning for a moment from policy formulation to the coordination
of plans for carrying out approved policy, we find that in this work of the Operations
Coordinating Board current intelligence is again a necessary ingredient. At the weekly
meetings of the OCB over which the Under Secretary of State presides, there are in
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005000 -4
Approved For Release 2005/06/14: CIA-RDP84B6680880961G03-4
regular attendance senior representatives of Defense, Treasury, Budget, USIA, AEC,
and ICA, and the two cognizant Special Assistants to the President. At the informal
Wednesday luncheon which always precedes the OCB meeting the Director of Cen-
tral Intelligence has an opportunity to thrash out problems of a sensitive nature. At the
more formal Board meetings which follow he is a full participant. The coordination of
planning in the responsible departments and agencies for the execution of a policy
which the President has approved requires the same up-to-the-minute intelligence
that the making of the policy did.
The Annual Policy Review. The annual Estimate of the World Situation pro-
duced by USIB member agencies is awaited each year with the greatest interest-and
anxiety-by those in the policy-making apparatus. It is an invaluable production,
presenting as it does a distillation of the painstaking efforts of the entire intelligence
community to state as of the year-end the dimensions of the foreign threat to our
national security. It is written with scrupulous care, it is well documented, and it sets
forth with clear distinction, where differences of opinion occur, the opposing views of
the experts who cannot agree with the majority estimate. I conceive this annual basic
estimate to be of great consequence-as a stimulant, as a guide, as a frank expression
of differing views on matters which may be of highest significance. It is this estimate
which constitutes each spring the point of departure for the recurring review of our
basic national security policy.
The first step in this review is to schedule the Estimate of the World Situation for
discussion at two or three meetings of the NSC Planning Board. At these meetings it is
subjected to 7 to 10 hours of controversial discussion in a search for better understand-
ing. Its contents are analyzed and dissected so that attention can be focused upon its
most important conclusions. In some years distinguished consultants from "outside of
government," such men as General Gruenther, John J. McCloy, Arthur W. Burns, Karl
R. Bendetsen, and Robert R. Bowie, have been invited to these Planning Board meet-
ings. They have been asked, after study and review of the high points in the Estimate,
to discuss them with the Planning Board at a meeting of several hours' duration. Then
these points, together with the consultants' and the Planning Board's reaction to them,
have been brought before the National Security Council at several meetings wholly
devoted to their consideration. Short papers presenting the policy issues and their
implications are prepared by the Planning Board as a basis for Council discussion at
these meetings.
The purpose of the procedure just described is not, of course, to try at the Plan-
ning Board or Council level to change or modify any part of the annual Estimate. The
purpose is to sharpen understanding of the important aspects of the Estimate and to
study and discuss in open meeting the policy implications thereof. Through this proce-
dure the Council members become sharply aware of the high points in the Estimate
and the differences in view regarding them, and can join in a give-and-take discussion
without feeling bound by the more formal presentation of carefully prepared policy
recommendations. Almost as important as the ultimate policy decision itself is the
intellectual controversy which precedes it, the educative and consolidating effect of
full and frank discussion, the exposure of views which have not become fully formed
in departmental exercise, the emergence of novel and interesting ideas at the highest
level.
The way in which this product of the intelligence community serves as a regular
precursor to the Planning Board's annual review of basic policy is a cogent illustration
of the community's essential role in the shaping of national security decisions.
14 Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Appvbx*dh Ffor Radlelase 2005/06/14: CIA-RDP84B0089OR000800050003-4
It may be appropriate, at the close, to describe what in my view is the ideal
procedure for formulating a national security policy. Let us take as an example not the
annual broad policy review which may consume several months, but a national policy
on the State of Ruritania.
First, the Ruritania item is scheduled far ahead on the Planning Board agenda,
with three to five or more sessions devoted to it. At the first of these sessions the Board
will have before it a national intelligence estimate on Ruritania. It will also have
before it a factual and analytical statement, prepared by the responsible department
or departments or by an interdepartmental committee, on the military, economic,
political, and other germane aspects of the Ruritania policy problem. To this compila-
tion of factual data and analysis, whether supplied in separate memoranda or as a staff
study, have contributed the vast resources of the informed departments and agencies
of government, the brains and experience of the operating personnel who work day
after day in the particular area of Ruritania and have learned at first hand the
strengths and limitations involved, the very persons who staff the departments and
agencies that will be called upon to implement this policy they are working on when
and if it receives Presidential approval.
The intelligence estimate and the departmental material are explained, discussed,
and chewed over in one or more meetings of the Planning Board. A senior representa-
tive of a responsible department is likely asked to attend at the Board table and be
questioned and cross-questioned about the factual information and tentative policy
recommendations submitted by his department. The Board seeks to squeeze out of the
material all the juice that it contains.
After these proceedings, a draft statement is prepared by the responsible depart-
ment or by an interdepartmental or special committee. This draft will consist of a set
of "general considerations" (drawn from the intelligence estimate and the factual and
analytical material as a basis for policy recommendations), a statement of the "general
objectives" of the proposed U.S. policy toward Ruritania, a more detailed proposal for
"policy guidance" in the several areas of U.S.-Ruritania relations, and appendices
covering anticipated financial costs of the proposed policy and comparison of military
and economic expenditures and other data for past and future years.
At as many Planning Board meetings as required this draft statement is discussed,
torn apart, revised. In the intervals between the meetings revised texts are drafted by
the Planning Board assistants for consideration at the next meeting. Finally, from this
arduous intellectual process emerges either full agreement on the correctness of the
facts, the validity of the recommendations, and the clarity and accuracy of the text,
or-as is often the case-sharp differences of opinion on certain major statements or
recommendations. In the latter case, the draft policy statement will clearly and suc-
cinctly set forth, perhaps in parallel columns, these opposing views.
When the draft policy has been thus shaped, reshaped, corrected, revised, and
finally stated, it is circulated to the Council at least ten days before the meeting which
is to take up policy on Ruritania. Council members will thus have sufficient time to be
briefed on the subject and familiarize themselves with the contents of the draft, and
the Joint Chiefs of Staff will have time to express in writing and circulate to Council
members their formal military views on the exact text which the Council is to
consider.
That is my concept of how the integrating procedure of the NSC mechanism
should work when it is working at its best. Some such procedure is the desired goal, a
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500b-4
Approved For Release 2005/06/14: CIA-RDP84BOWSdR Oi9g60 "3-4
goal often approximated in actual performance. The views of all who have a legiti-
mate interest in the subject are heard, digested, and combined, or in the case of
disagreement stated separately. In a good many instances the views of experts or
knowledgeable people from "outside of government" are sought and worked into the
fabric at the Planning Board level. The intelligence estimates, the military views, the
political views, the economic views, the fiscal views, views on the psychological im-
pact-all are canvassed and integrated before the President is asked to hear the case
argued and comes to his decision.
It is certainly true that human beings are fallible and that the instruments which
they create are always susceptible of improvement. The mechanism which I have
described, and its operation, can and will be improved as time goes on. But the main
course of this integrative process seems to me mechanically and operatively sound.
And it must be grounded on the firm base of the best and latest intelligence.
(From Volume 3 Number 4, p. 59, 1959; Unclassified)
16Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
A thoughtful former insider exam-
ines in depth the Soviet (and West-
ern) intelligence services
THE THEORY AND PRACTIVE OF SOVIET
INTELLIGENCE '
Like the Western intellignce services, the Russians get information about foreign
states from two principal sources, from secret informants and undercover agents and
from legitimate sources such as military and scientific journals, published reference
material, and records of parliamentary debates. But the Russians regard as true intel-
ligence (razvedka) only the first type of information, that procured by undercover
agents and secret informants in defiance of the laws of the foreign country in which
they operate. Information obtained from legitimate sources and publications they
consider mere research data. In the eyes of Russian officers it takes a real man to do
the creative and highly dangerous work of underground intelligence on foreign soil,
while the digging up of research data in the safety of the home office or library can be
left to women or young lieutenants just beginning their careers. The Western intel
ligence services, on the other hand, treat both types of information as intelligence,
often with a much higher regard for research than for undercover work.
Fundamental Doctrine
It is in these variant attitudes toward the two types of information that the
difference between Soviet and Western intelligence doctrine begins to emerge. The
difference is not just a theoretical one; in practice it affects every phase of intelligence
activity from operational planning and choice of strategy to evaluation of the reliabil
ity of information procured and its importance to policy makers.
Both Soviet and Western intelligence services strive to learn the secret intentions,
capabilities, and strategic plans of other states, but they don't go about it in the same
way. The Russians believe that such important secrets can and should be procured
directly from the classified files in offices of the government in question and from
informants among its civil servants. When the Russians suspect that another country is
trying to form a coalition directed against the Soviet Union, they don't seek informa-
tion about it in newspaper editorials, panel discussions, or historical precedents, al-
though all these sources may shed some light on the matter; they set out to steal the
secret diplomatic correspondence between the conspiring states or to recruit an
informant on the staff of the negotiators if they don't have one there already. When
the Russians want to know the number of bombers in the air force of a potential
adversary, they get the figure, not by doing library research on the productive capabil-
ity of airplane plants or assembling educated guesses and rumors, but by asking their
secret informers within the foreign air force or war ministry and by stealing the
desired information from government files.
' The material in this article is excerpted from the author's subsequent book, Handbook of Intelligence
and Guerrilla Warfare, University of Michigan Press, Ann Arbor, 1963.
Approved For Release 2005/06/14: CIA-RDP84B00890R00QOD003-4AGES 17-29
08Q
Approved For Release 2005/06/14: CIA-RDP84B008W0fifi0pfj3-4
The Americans, on the other hand, and to a certain extent the British, prefer to
rely more heavily on legitimately accessible documents. The American intelligence
agencies are said to monitor as many as five million words daily-the equivalent of 50
books of average length-from foreign radio broadcasts alone. From enormous quanti-
ties of open material like this analysts derive a lot of information about foreign coun-
tries, their economies and finance, their industries, agriculture, and trade, their popu-
lation and social trends, their educational and political systems, the structure of their
governments, their leaders' past lives and present views, etc. Drawing on that colossal
warehouse of encyclopedic data, intelligence officers write reports and compose na-
tional estimates of foreign countries for the benefit of policy makers.
Admiral Ellis Zacharias, Deputy Chief of Naval Intelligence in the last war, wrote
that in the Navy 95% of peacetime intelligence was procured from legitimately acces-
sible sources, another 4% from semi-open sources, and only 1% through secret agents.
Another authority on American intelligence, Gen. William J. Donovan, who headed
the Office of Strategic Services during the war, expressed the same predilection for
"open sources" by saying that intelligence is not the "mysterious, even sinister" thing
people think it is, but more a matter of "pulling together myriad facts, making a
pattern of them, and drawing inferences from that pattern." This predilection for
open sources lies at the core of the American doctrine of intelligence.
But how can intelligence officers pick out from the vast amount of encyclopedic
data that flows in to them the key developments for their purposes? One of the chiefs
of American intelligence, a distinguished professor and noted scholar, had this to say
on the subject:
How can surveillance [of the world scene] assure itself of spotting . . . the
really unusual? How can it be sure of putting the finger on the three things per
week out of the thousands it observes and the millions that happen which are
really of potential import? The answer is . . . procure the services of wise men-
and wise in the subject-and pray that their mysterious inner selves are of the
kind which produce hypotheses of national importance.
In the Russian view, such an approach is but one step removed from mysticism
and metaphysics. What if the "mysterious inner selves" of the researchers and analysts
fail to produce the right hypotheses? How safe is it, in general, to rely on hypotheses in
matters of such profound complexity as world politics, where nothing is stable and
enemies of yesterday become today's friends and fight together against their former
allies? A hypothesis may be wisdom itself, yet turn out to be utterly wrong. Not only
intelligence officers but statesmen of the highest caliber have time and again been
proved wrong in acting on undeniably wise hypotheses.
In 1940-41 Stalin based his strategy on the calculation that Hitler would not
attack the Soviet Union. He knew that-it was not in Germany's interests to get into a
two-front war, and he thought that Hitler understood this too. In the spring of 1941
the British Joint Intelligence Committee also estimated that Hitler would not be so
foolish as to add the powerful Soviet Union to his formidable enemies in the West. But
these logical hypotheses went up in all-too-real smoke on 22 June that year.
Stalin, who was his own intelligence boss and liked to take a personal part in the
cloak-and-dagger business, warned his intelligence chiefs time and again to keep away
from hypotheses and "equations with many unknowns" and concentrate instead on
acquiring well-placed informants and access to the secret vaults of foreign govern-
ments. He used to say, "An intelligence hypotheses may become your hobby horse on
which you will ride straight into a self-made trap." He called it "dangerous guess-
work." In 1932 he had ordered that our quarterly intelligence surveys of foreign
18Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
SoAipp WAftftcsRe 2005/06/14: CIA-RDP84B0089OR000800050003-4
countries no longer be sent him. Although based on secret data, these surveys were
interspersed with unsubstantiated hypotheses and subjective views; they corresponded
roughly to the national estimates which the American intelligence agencies produce
for the National Security Council. After that the NKVD sent him the cream of raw
intelligence only-summaries of important documents stolen from other governments
and reports from exceptionally valuable secret informants like foreign ambassadors
and general staff officers.
During his periodic conferences with the chiefs of the intelligence services Stalin
would often interject: "Don't tell me what you think, give me the facts and the
source." But sometimes he would violate his own rule and ask one or another intel-
ligence chief for an opinion. Such was the case during a joint conference which Stalin
and Voroshilov had in the summer of 1936 with the chiefs of the NKVD and the Red
Army Intelligence Department. Stalin asked Artouzov, deputy chief of military intel-
ligence, "With whom would Poland side in a war between Germany, Italy, and Japan
on the one side and Russia, France, and England on the other?" Without hesitation
Artouzov answered: "Poland will always be with France and England." "You are a
jackass," retorted Stalin. "If Poland didn't side with Germany against us, she would be
crushed by the German mechanized divisions on their way to the Soviet Union and
would not live to see another day, whereas if she allied herself with Germany she
could hope to expand if things went well, and if things went badly she might still get a
negotiated settlement." Artouzov did not live to see his illogical prediction come true;
he was shot in the great purge, in 1937.
In the Soviet Union research on publicly accessible materials is conducted by the
Academy of Sciences, the universities, the scientific journals, and the Ministries of
Foreign Affairs, Industry, Trade, Finance, and Statistics. The NKVD based its work
100% on secret sources and undercover agents. The Main Intelligence Department of
the Army did study some legitimately accessible sources, but only those dealing with
n'iilitary matters, such as foreign military and scientific journals, army and navy man-
uals, military textbooks, topographic explorations, and anything printed anywhere
about the armed forces of the world. But even in army intelligence the main efforts, at
least 80% of the total, were concentrated on building and operating networks of secret
informants and on the procurement of secret documents.
Had the Soviet intelligence agencies put their main efforts and resources into
building up encyclopedias of world-wide information from overt sources and on
processing and analyzing that enormous amount of incoming raw material, they would
have never been able to acquire the secrets of the manufacture of the atomic and
hydrogen bombs or the blueprints of the American nuclear-powered submarines or to
infiltrate the key departments of the American, British, and European governments.
Important state secrets and especially clues to the intentions and plans of potential
enemies cannot'be found in libraries or encyclopedias, but only where they are kept
under lock and key. The task of intelligence services is to acquire the keys and deliver
the secrets to their governments, thus providing them with the foreknowledge and
orientation needed for the making of decisions.
When General Douglas MacArthur, who had been blamed for not having fore-
seen certain developments in the Korean War, was asked by the Senate investigating
committee in 1951 to explain why the North Korean invasion caught the Americans
by surprise, he gave a classic reply from which many an intelligence chief could take
his cue. He said:
I don't see how it would have been humanly possible for any man or group of
men to predict such an attack as that. . . . There is nothing, no means or
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050683-4
Approved For Release 2005/06/14: CIA-RDP84B0089@BQQP?QQQ -4
methods, except the accidental spy methods-if you can get somebody to betray
the enemy's highest circles, that can get such information as that, It is guarded
with a secrecy that you cannot overestimate.
Thus, under the fire of the investigation, General MacArthur who was not an
expert in intelligence, arrived with excellent logic at an idea which touches the very
heart of the intelligence problem. "There is nothing, no means or methods, except . . .
spy methods . . . that can get information as that." This is the essence of the Soviet
doctrine of intelligence.
Political Intelligence
While The Main Intelligence Department (GRU) of the Soviet Ministry of De-
fense does only military intelligence, the Foreign Directorate of the Committee of
State Security (KGB), successor to the NKVD, is actively engaged in at least seven lines
of intelligence and related work, not counting sabotage and guerrilla warfare.
The first line, which is considered the most important, is the so-called diplomatic
intelligence, the purpose of which is to keep the Soviet government informed of the
secret deals between the governments of capitalistic countries and of the true in-
tentions and contemplated moves of each of these governments toward the Soviet
Union. This information is to be procured from primary sources within the secret
councils of the foreign governments. The principal sources are the following: foreign
diplomats, including ambassadors; the staffs of foreign ministries, including code
clerks, secretaries, etc.; private secretaries to members of the cabinet; members of
parliaments; and ambitious politicians seeking financial aid and left wing support. The
life history of such officials is studied beginning with their school years, and their
character traits, weaknesses and vices, and intimate lives and friendships are analyzed
with the purpose of finding the Achilles' heel of each and securing the right approach
to him through the right person, say a former classmate, intimate friend, or relative.
These well-prepared approaches have often paid off. Some politicians have been
lured into the Soviet network by promises that the Soviet Union would use its secret
levers of influence in their countries to further their political fortunes. Such promises
have often been accompanied by "subsidies," ostensibly to promote good will toward
Russia but in reality a bribe. A number of high officials have succumbed to outright
offers of money. Others, especially those who in their youth had belonged to Fabian
and other idealistic circles, were influenced by humanitarian arguments and per-
suaded that they must help the Soviet Union stop the march of fascism. Considerable
success was achieved among foreign diplomats tinted with homosexual perversions; it
is no secret that the biggest concentration of homosexuals can be found in the diplo-
matic services of Western countries. Those of these who agreed to work for the Rus-
sian network were instructed to approach other homosexual members of the diplo-
matic corps, a strategy which was remarkably successful. Even when those approached
declined the offer to collaborate, they would not denounce the recruiter to the
authorities. Soviet intelligence officers were amazed at the mutual consideration and
true loyalty which prevailed among homosexuals.
It is usually supposed easier to lure into the Soviet network a code clerk or
secretary than a diplomat or statesman; a man in an important government position is
expected to know better than to take the road to treachery, and he has much more to
lose if caught doing so. The experience of Soviet intelligence has in many instances.
however, not borne out this view. Honesty and loyalty may often be more deeply
ingrained in simple and humble people than in men of high position. A man who took
bribes when he was a patrolman does not turn honest when he becomes the chief of
20Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
S(4pprhV&JPelease 2005/06/14: CIA-RDP84B00890R000800050003-4
police; the only thing that changes is the size of the bribe. Weakness of character,
inability to withstand temptation, lightmindedness, wishful thinking, and bad judg-
ment are also traits that accompany a man to the highest rungs of his career.
The consensus of Soviet intelligence chiefs has been that departmental and pri-
vate secretaries in a foreign ministry are often more valuable as sources of information
than an ambassador, because a well-placed secretary can supply documentary data on
a wide scale, covering the policies of the foreign government toward a number of
countries. An ambassador is considered a much bigger prize, however, because he can
be used not only as a source of information but also as a competent consultant for the
Russian Foreign Office and even as an agent who can influence to a certain extent the
foreign policy of his government.
Military Intelligence
The second line of Soviet intelligence activity is to procure data on the military
posture of Western and other countries, the quality and strength of their armies,
navies, and air forces, their degree of mechanization, mobility, fire power, technologi-
cal advancement, and modernization, and the productive capacity of the armament
industries and the mobilization plans of the big powers. Soviet intelligence watches
with a jealous eye every new invention in the field of arms and tries to steal it while it
is still in the blueprint stage or on the drawing board so that Soviet inventors and
engineers can be the first to apply it. With the adyent of the nuclear and rocketry age,
which has completely revolutionized the material base, strategy, and very concept of
warfare, Soviet intelligence strains all its efforts to obtain immediate information on
the progress being made by the leading Western countries in these advanced fields and
to gauge the striking and retaliatory power of the Western world.
As we have said, the KGB does not look for this information in public documents.
Neither is it interested in monitoring foreign radio transmissions and distilling from
them crumbs of random information. It procures the military secrets of foreign gov-
ernments from the classified files of the general staffs of those countries, from the
secret reports of foreign defense ministries, from military research laboratories and
proving grounds, and so it knows that what it gets represents, even if incompletely, the
true facts on which Soviet policy makers can confidently base their decisions.
In wartime, military intelligence becomes the principal function of every branch
of the Intelligence Directorate of the KGB. The main task of its field posts, its under-
ground residenturas abroad, is then to inform the Soviet government by radio and
other means about the war plans of the enemy, his troop concentrations and move-
ments, the size of his uncommitted reserves in men and materiel, and the extent of the
damage inflicted on the enemy by the air forces of the Soviet Union and its allies.
Diplomatic intelligence concentrates the efforts of its informants and secret agents on
watching the relations among the governments of the enemy coalition, with special
emphasis on frictions among them. The residenturas must keep a sharp eye also on
Russia's allies in the war, immediately signaling to the Soviet government if an ally
puts out peace feelers and is gravitating toward a separate peace with the enemy. It
may be recalled that during World War II the Kremlin sounded an alarm when it
intercepted rumors that British representatives were about to meet in Franco's Spain
with emissaries of Hitler. During the worst days of the last war, when Russia's defenses
were crumbling and the Western allies were slow in opening a second front, there
were moments when the Western leaders were jittery at the thought that Stalin might
try to save what was left of the country by making a separate peace with Germany.
While the residenturas abroad keep the government informed of the enemy's
grand strategy and his capabilities and vulnerabilities, day-to-day tactical or combat
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005066-4
Approved For Release 2005/06/14: CIA-RDP84B00890F2000t800050003-4
ovie n e igence
intelligence is taken care of by the intelligence sections of the Soviet armed forces and
by the special detachments (Osoby Otdel) of the KGB attached to all army units down
to the regimental level. It is their duty to supply the Soviet commander with data on
the size, disposition, and fighting strength of the enemy force with which the troops
under his command will soon be locked in battle. The standard sources of military
intelligence are supplemented by material obtained in raids the KGB guerrilla detach-
ments make on enemy headquarters, by ground and aerial photo reconnaissance, and
by the interrogation of prisoners, refugees, and spies who pose as refugees.
Economic Warfare
The third line of Soviet intelligence is called economic intelligence, which con-
trary to what might be supposed has little to do with studying the economy of foreign
countries. It was created for the purposes of exercising State control over Soviet export
and import operations and of protecting Soviet foreign trade from the pressures and
abuses of international cartels and other organizations of monopolistic capital.
In the 1930s, for instance, the Division of Economic Intelligence discovered that
the biggest electric concerns of the world had entered into a "gentlemen's agreement"
according to which they would not compete with each other in their dealings with
Soviet Russia and would overcharge her on purchase up to 75% over current world
prices. I myself saw a letter signed by the vice president of General Electric Co.
addressed to the presidents of the German AEG and the Swiss Brown Bovery Co.
which contained a list of prices made up especially for the Soviet Union 60 to 75%
higher than the regular market prices. General Electric tried to justify this extortion by
pointing out that Russia's credit standing was "not too good." The gentlemen's agree-
ment was finally broken up by the Soviet government, but not before Soviet trade had
suffered losses totaling tens of millions of dollars.
Plants
The fourth line of Soviet intelligence is misinformation. The Soviet government is
interested not only in obtaining information about the policies and impending moves
of other countries but also in misinforming and misleading the foreign governments
concerning its own position and intentions. But whereas in procuring secret informa-
tion from abroad the intelligence officer is given free rein to steal whatever he consid-
ers valuable, the task of misinforming the outer world about the Soviet Union cannot
be left to the discretion of the individual officer or even of the intelligence service as a
whole. What false information or rumors should be deviously placed within earshot of
some foreign government is a question of high policy, since the purpose is to induce
this government to do what the Kremlin wants it to do, perhaps to bluff it into inaction
or into making a concession. In this area, therefore, Soviet intelligence cannot act
without specific directives as to the substance of the misinformation and the way it
should be planted.
When in the 1930s, for instance, the Soviet government wanted to obtain a mu-
tual defense treaty with France in order to counteract the growing menace of Hitler's
Germany, Soviet intelligence was given instructions to introduce into French General
Staff channels certain pages from a German army report which showed that Germany
was planning to occupy the Rhineland at the beginning of 1936 and invade France
within eighteen months after that. Similarly, at about this same time, an effort was
made to shake England out of her complacency by slipping into British intelligence
channels (through a German double agent) inflated figures concerning German air-
craft production; these created quite a stir in the highest councils of the British govern-
ment. Here the task of the misinformation desk of the NKVD had been to fabricate
A roved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
S rpy &o?2elease 2005/06/14: CIA-RDP84B00890R000800050003-4
ostensible photocopies of the German documents with such skill that they would seem
genuine even to trained military experts.
During the Spanish civil war, in which a Russian tank brigade fought against the
forces of General Franco and Russian pilots flew the newest and best Soviet fighter
planes (1-15 and 1-16) and medium bombers (CB) against the German air squadrons
supporting him, the misinformation desk was ordered to introduce into German mili-
tary intelligence channels the information that these Soviet planes were not of the
latest design, that Russia had in her arsenal thousands of planes of second and third
succeeding generations possessing much greater speed and higher ceiling. In August
1937 German experts had examined and tested two Soviet 1-16 fighters when they
landed by mistake on an enemy air strip in the Madrid sector, and they had been
amazed at the quality and performance of the planes, which in some respects sur-
passed German fighters. Now the false information that the Russians had on the
production line still better and more modern models served Stalin's evident aim of
impressing upon Hitler that the Soviet Union was better armed than he thought and
that it would be wise for Germany to have Russia as a partner than as an opponent.
The fifth line of Soviet intelligence is infiltration into the security agencies and
intelligence services of foreign countries. This activity holds a special challenge and a
peculiar fascination for Soviet intelligence officers. Although they regard foreign intel-
ligence officers as mercenary spies (while thinking of themselves as devoted revolu-
tionaries carrying out dangerous assignments for the Party), the Soviet officers do have
a feeling of kinship with them and react to an encounter with one of them with the
same thrill and curiosity that enemy fighter pilots feel on sighting each other across a
space of sky. Their hostile attitude toward their foreign counterparts becomes sin-
cerely friendly the moment the latter begin to cooperate as informants.
The principal aims pursued in infiltrating foreign security agencies are the fol-
lowing: to find out what these agencies know about Soviet intelligence operations in
the country in question; to determine whether they have succeeded in planting coun-
terspies in the Soviet network or in recruiting anyone connected with the residentura.
to learn in good time of any intended arrests of network personnel; and to use their
facilities to check up on persons in whom the Soviet residentura happens to be in-
terested. The penetration of foreign intelligence services is done to find out whether
they have succeeded in creating a spy network in Soviet Russia, and if so who their
spies are, what secret information they have transmitted, and what lines of commu
nication they use.
In some of the Western countries, furthermore, the intelligence services have
access to the confidential papers of other departments of the government, including
defense and foreign affairs. This practice is justified on the ground that it helps them
evaluate the information from their own secret sources abroad and render more ac
curate estimates of the intentions and capabilities of other countries. Whatever thu
merits of this argument, the NKVD was quick to take advantage of the resulting
convenient concentration in one place of secret documents from several government
departments; it instructed its residenturas abroad to try to procure from the intel
ligence services not only their own information but also that which they receive from
other government departments, for example military attache reports and the political
analyses and estimates of ambassadors.
Although the intelligence services of different capitalistic countries do not always
have harmonious relations with one another, thanks to national rivalry and personal
jealousies, they do cooperate with one another to a certain extent in combatting Soviet
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005003-4
Approved For Release 2005/06/14: CIA-RDP84B008900200g8P90#0003-4
espionage and subversion. Some of them exchange information in this field, forward-
ing to each other photographs of known or suspected Soviet spies. Soviet acquisition of
this correspondence reveals what they know about Russian intelligence activities and
may sometimes warn of an impending exposure and arrest of an agent. In my time,
however, the secret information procured from foreign intelligence services rarely
gave us cause for alarm. Much of it was incompetent and out of date. As a rule the
strength of the Soviet armed forces was ridiculously belittled. The reports on Soviet
espionage activities were based more on hindsight than foresight, and they frequently
contained outright fantasies concocted by unscrupulous doubles and falsifiers. But
though much of the information collected by the foreign intelligence services about
Russia was found to be worthless, it was by no means worthless to Soviet intelligence to
know about this.
It is generally said that knowledge of two things is indispensable to the charting of
foreign policy in a time of crisis-the real power of one's own country and the power
of the potential enemy. But to these a third must be added; one must also know what
image one's own power creates in the eyes of the adversary. This is very important,
because however distorted that image, it is what he is going to act upon. By infiltrating
the intelligence services of foreign countries Soviet intelligence can learn and report to
policy makers how each country assesses the capabilities and deficiencies of the Soviet
Union. It is then up to the policy makers to figure out what mistakes the potential
enemy will be likely to make when the chips are down as a result of the distortions in
his view of the Soviet Union as a world power.
The infiltration of a foreign intelligence service is a much more hazardous oper-
ation than the acquisition of informants in other government departments, because the
foreign intelligence officers are wise to such practices and may maneuver the recruit-
ing officer into a trap or grab him outright before he can get away. The KGB therefore
advises its residenturas not to rush things but to approach and cultivate first a friend or
relative of the target officer and use him as a go-between. Then the actual recruiting
and all meetings until the recruited officer has proved his sincerity (by turning over
important information) should take place on territory outside the jurisdiction of the
target country.
The safest way to infiltrate a foreign intelligence service without fear of being
trapped is to transplant a completely reliable agent into that organization, for example
to induce an old and trusted informant in some other branch of the government to
seek employment with the intelligence service. Sometimes it may be necessary for him
first to cultivate socially for this purpose a senior officer of the intelligence service.
Agents planted in a foreign intelligence service can be used not only to procure secret
information but also as a channel through which misinformation about the Soviet
Union and other countries can be introduced.
The intelligence and security services of none of the big world powers have
escaped infiltration by Soviet agents. Gen. Walter Bedell Smith, as head of the CIA,
was aware of Soviet successes in this field, and in September 1953 he expressed his
apprehension in the following words: "I believe the communists are so adroit and
adept that they have infiltrated practically every security agency of the government."
The sixth line of Soviet intelligence is to influence the decisions of foreign govern-
ments through secret agents occupying important positions within them. In the last
two decades there have been quite a few instances in which highly placed Soviet secret
agents were able to tip the scales of policy in favor of the Soviet Union. Some of these
2Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
S rAy@#&grcFelease 2005/06/14: CIA-RDP84B0089OR000800050003-4
agents started out as junior diplomats in the foreign offices of the West and climbed
with the help of their socially prominent families to high government positions. Others
were already mature politicians and statesmen when they were seduced by money and
other base considerations. One of the leading members of Mussolini's cabinet and the
Fascist Grand Council succumbed to an offer of money and agreed to collaborate with
Soviet Russia.
A leading member of the parliament of a mid-European country, who was not
thought to be a friend of the Soviet Union, would meet secretly with the Soviet
ambassador and take his instructions concerning the position he should assume in
certain matters affecting Soviet interests. In another European country an inspector of
the national secret police, who had become a Soviet informant, reported the police
had documentary proof that an influential member of the cabinet was a partner in a
big narcotics ring and owned, together with a famous racketeer, a luxury brothel a few
blocks away from the presidential palace in the center of the capital. This minister was
so powerful in the councils of the government, as well as in the underworld, that the
head of the secret police was afraid to tangle with him. Moscow ordered the
residentura to steal all the incriminating documents, and photographs of them were
shown to the minister at the Soviet embassy, as a "friendly gesture," by the Soviet
ambassador himself, who happened to be a former chief of the Foreign Department of
the OGPU, i.e., of Soviet intelligence. The friendly gesture was well understood, and it
inaugurated a period of close collaboration between the minister and Soviet intel-
ligence. His task was not merely to provide information but to influence the policies of
his government as directed by the Soviet Foreign Commissariat.
Another type of KGB political action is to pave the way in ticklish international
matters for later negotiations between the Soviet Foreign Office and other govern-
ments. If exploratory talks conducted, directly or through go-betweens, by Soviet
intelligence agents with representatives of a foreign government produce results sat-
isfactory to both sides, the official diplomats of both countries can then take over. If
not, the Kremlin remains free to disclaim any knowledge of them. A Russian intel-
ligence officer by the name of Ostrovsky who had secretly negotiated the establish-
ment of diplomatic relations with Roumania became the first Soviet ambassador to
that country.
Another activity along this line consists of clandestine attempts to induce leaders
of a political opposition to stage a coup d'etat and take over the government. The
inducement would be a promise of political and financial support and, if the state
happened to border on Soviet territory, military aid as well. In 1937, for instance, one
of the chiefs of intelligence was commissioned by Stalin personally to enter into secret
negotiations with former Roumanian Minister of Foreign Affairs Titulesku, who lived
at that time in Menton, on the Franco-Italian border, and persuade him to overthrow
the reactionary regime of Prime Minister Maniu. Stalin offered financial and military
aid against a promise by Titulesku that upon assumption of power he would sign a
mutual assistance pact with the Soviet Union.
Industrial Intelligence
Although intelligence activity is as old as society, this seventh line of Soviet oper-
ation is something new, first begun in 1929. Its purpose was to assist in the industri-
alization of the Soviet Union by stealing production secrets-new inventions, secret
technological processes, etc.-from the advanced countries of Europe and America.
Soviet intelligence organizations abroad began to recruit engineers, scientists, and in-
ventors working in the laboratories and plants of the big industrial concerns of the
world.
Approved For Release 2005/06/14: CIA-RDP84B0089OR00080005003-4
Approved For Release 2005/06/14: CIA-RDP84B00890 epeg8A9MBgRpe4
At this time the Soviet Union, besides buying big quantities of machinery and
even whole plants from the industrial companies of the West, negotiated with them
for the purchase of patents and the know-how for production processes. A number of
such purchases were made and foreign engineers came to instruct the Russians in the
application of the new methods. But often, when the price demanded by foreign
concerns for their "technical aid" was too high-it always ran into many millions of
dollars-the head of the Soviet government would challenge the Foreign Department
of the NKVD to steal the secrets in question from them. The response of these chal-
lenges was invariably enthusiastic, and after a number of them had been successfully
met the new Division for Industrial intelligence was created within the NKVD For-
eign Department.
Sometimes the theft of all the necessary formulas, blueprints, and instructions
would still not enable Soviet engineers and inventors to construct a complicated mech-
anism or duplicate a production process. They would need the human component, the
special skill or engineering know-how. In such cases officers of the Division for Indus-
trial Intelligence would, with offers of additional rewards, persuade the appropriate
foreign engineers to make a secret trip to Russia to instruct the Russian engineers or
supervise the laboratory experiments on the spot. Precautions were taken to insure that
the traveler's passport should not bear any border stamps or other traces of his visit to
the Soviet Union: the engineer would travel with his own passport only to the capital
of an adjacent country, where he would turn it over for safekeeping to the local Soviet
agent and get from him a false one on which he would proceed to Russia; then on the
return trip he would turn this in and pick up the genuine passport where he had left it.
The fees paid by the Russians for such trips ran sometimes as high as ten thousand
dollars for a few days, but the savings realized amounted to millions of dollars. The
following is a typical such operation.
In view of the fact that the Soviet government was spending huge sums of money
on industrial diamonds needed for the expanding oil industry, metallurgy, and various
geological projects, it was naturally interested in an offer made by the German Krupp
concern to supply newly invented artificial diamonds almost as hard and good as
natural ones. The new product was named "vidi," from the German wie Diamant,
"like diamond." The Commissariat of Heavy Industry bought some of the vidi, tested
them in drilling operations, and was amazed at their high quality. It decided to buy
the patent from Krupp and have German engineers build a plant to produce them in
the Soviet Union.
Soon a delegation of German experts headed by two Krupp directors arrived in
Moscow. Knowing how badly the Russians needed industrial diamonds for the five-
year plan, they demanded a staggering price for this technical aid. When the deal was
being discussed at the Politburo Stalin turned to the head of the NKVD and said: "The
bastards want too much money. Try to steal it from them. Show what the NKVD can
do! " This challenge was taken up eagerly, and one of the chiefs of the Foreign
Department was charged with the operation.
The first step was to find out the location of the vidi factory and the names of the
inventor and the engineers in charge of production. This task was assigned to a Ger-
man agent, scientist Dr. B. In the Berlin Technische Hochschule, with which he was
associated, Dr. B. looked up all the available treatises on achieving hard metal alloys
and then approached a noted professor who had written some of them. From him he
learned that a Krupp inventor had succeeded in attaining the hardest alloy known and
that this was being produced in a plant on the outskirts of Berlin.
2Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
$WJr%y@r~ -chRelease 2005/06/14: CIA-RDP84B00890R000800050003-4
Dr. B. now went to the site of the plant and dropped in at a beer hall frequented
by its technical personnel. After visiting the place a few times, he engaged some of the
technicians in conversation. He represented himself as a scientist who was writing a
book on hard metal alloys. "Oh, then you are working with our Cornelius," said one
technician. Dr. B. said no, but he had known a Professor Cornelius. "No," said the
technician, "he is not a professor, he is only a foreman in our plant, but he is a mar
who could teach the professors how to make industrial diamonds."
Through an inspector of the Berlin Polizei Presidium, another secret Soviet
informant, the Russian residentura obtained information on Cornelius, including his,
home address and the next day Dr. B. rang the doorbell there. He was admitted by
Cornelius' wife, who told him that her husband had not yet returned from the plant
This Dr. B. knew; he had come early on purpose, hoping to learn something about
Cornelius from his wife. He told her that he was a Doctor of Science and was writing a
treatise on hard metal alloys and that his colleagues at the Technische Hochschuk
advised him to see Herr Cornelius, who might be helpful to him. He added that ii
Herr Cornelius was really an expert in that field and if he was willing to contribute to
the research he might earn some money on the side.
Frau Cornelius, flattered that a scientist from the famous Technische Hochschuk.
should come to seek advice from her husband and stimulated by the prospect of
earning extra money, began to praise her husband's abilities and high reputation at the
plant. She said that the engineer who had invented the process for producing artificial
diamonds had trusted only her husband, because he alone knew how to handle the
specially built electric oven, and now that the inventor had fallen out with Krupp and
quit her husband was practically in charge of the whole thing. He could demand from
Krupp any salary he wanted, and they would have to give it to him; but he was not
that kind of man. For him devotion to the company came first.
When Cornelius returned home Dr. B. restated the purpose of his visit and, in
order to underscore his purely scientific interest in the matter and allay any possible
suspicion, invited him to his personal room at the Technische Hochschule for the
following Saturday. On Saturday, after a talk at the Hochschule, he took him for
dinner to his luxurious ten-room flat in the eight-story apartment house which he had
inherited from his father. He had seen at once that Cornelius was too illiterate tech
nologically to be able to explain in scientific terms the secrets of production, even if he
wanted to. He was only a foreman trained by the inventor to operate the oven. What
Dr. B. wanted was to find out the name of the inventor, his whereabouts, and the
history of his break with the Krupp concern. After an excellent dinner and a few
glasses of brandy, Cornelius enjoyed telling the story to his genial host.
The inventor's name was Worm. When he saw what fabulous prices Krupp was
getting for the industrial diamonds which he had created and which cost the company
so little, he decided to build secretly a plant of his own and realize some of these
profits for himself. He borrowed money from the bank, rented a little shop, made an
oven like the one he had constructed for Krupp, installed the minimum equipment
needed, and made a few profitable sales of vidi to foreign customers. With the pro-
ceeds of these he was able to pay off part of the loan, and it looked as though he was
on the way to becoming a rich man. But at this point the Krupp concern learned about
his disloyal competition and swooped down on him with all the fury of an industrial
giant. He was summarily fired. Customers were warned that if they bought a single
ounce of vidi from him Krupp would never sell them anything. The bank suddenly
became rigid and demanded prompt repayment. In spite of his talents as an engineer
and inventor Worm could not find work. All doors were politely but firmly closed in
his face.
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500W-4
Approved For Release 2005/06/14: CIA-RDP84B00899RQ9P?PgA*Q;-4
Dr. B. hurried to see Herr Worm. Here too, he contrived to ring the doorbell
when the man was not at home; he had found that women are more talkative than
men, especially when they have an opportunity to do a bit of advertising for their
husbands. Frau Worm was overjoyed that someone was interesting himself in her
husband. The Krupps were brutes, she said; they ruled the country. Her husband was
a martyr. They had driven him to desperation. All his savings had gone into the
enterprise, and it was ruined with one blow.
Dr. B. listened to her story with unfeigned sympathy. He said he had an interest-
ing proposition for her husband which might get him out of his difficulties. From that
moment he became her trusted friend, the man who was going to save her husband
from strangulation by the Krupps. He left his telephone number for Worm to call.
The next day they met at the Technische Hochschule and from there went to Dr.
B.'s apartment. Dr. B. suggested that in order to escape from the Krupp stranglehold
Worm would have to offer his talents to a foreign concern. He said he knew a big
Scandinavian company which might be interested in acquiring the secret process of
vidi production and entering the field in competition with Krupp; he would check. A
few days later he informed Worm that the company was definitely interested; it had
authorized him to advance the inventor up to ten thousand German marks. He asked
Worm to submit a description of the vidi production process and furnish data on
equipment needed, cost, etc.
For the time being, Dr. B. declined to name the company. This did not necessar
ily look suspicious, because as a go-between he was entitled to a commission and would
need to protect his own interests. But Worm got a strange hunch. "I want to warn
you," he said, "that if my invention is needed for the Russians I will have nothing to
do with them!" Dr. B., taken aback, hastened to reassure him that it was a Scandina
vian concern all right. It turned out that Worm was a fanatical Nazi and Russian-
hater.
Something had to be done to overcome that burning hatred if Worm was to be
maneuvered into giving his vidi invention to Russia. While he was writing up his
process Dr. B. would supplement the advance, giving him another thousand marks
every week or so, which delighted Frau Worm. He also had the Worms several times
for dinner at his home. When Frau Worm wanted to buy things which she had been
denying to herself for so long, but her husband kept too wary an eye on his dwindling
advances, Dr. B. sensed this and immediately came to her assistance. He privately
gave her money for herself with the understanding that she would repay it when her
husband struck it rich; he was convinced that a prosperous future was just around the
corner for them.
Worm's description of his process was sent to Moscow. After a close study, the
Russian engineers declared that without the personal guidance of the inventor they
would have trouble constructing and operating the special oven required; it was sup-
posed to make several thousand revolutions a minute under an enormously high tem-
perature. Moscow wanted to have the inventor at any cost. Now the friendship Dr. B.
had cultivated with Frau Worm paid off. She cajoled her husband and wrangled with
him for a whole week and at last brought him to the realization that they had no
choice, that this was their last and only chance.
The Soviet trade delegation in Berlin signed an official two-year contract with
Worm, under which he received a flat sum in German currency, a monthly allowance
in marks for his wife-who preferred to remain in Germany-and a salary for himself
in Russian rubles. He was entitled to a suite in a first-class Moscow hotel with res-
taurant and other services and to a chauffeured automobile and two vacations in
28Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
SOip*ote Ii en'cRelease 2005/06/14: CIA-RDP84B0089OR000800050003-4
Germany per year at Russia's expense. He took with him to Moscow a German en-
gineer by the name of Mente who had been his assistant at the Krupp plant.
Worm's letters to his wife breathed hatred toward everything Russian. He con-
tracted rheumatic fever during his stay and returned to Germany a broken and embit-
tered man. But he had fulfilled his contract with the Soviets to the letter, turning over
to them his cherished brainchild, the priceless vidi process.
(From Volume 7 Number 2, p. 41; 1963; Unclassified)
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000503-4
Approved For Release 2005/06/14: CIA-RDP84130089090W1 1Aa3-4
This true story of an exceptional spy
has been reconstructed from records
of the postwar debriefings of
participants and witnesses to his
adventures
THE SHORTHAND OF EXPERIENCE
Thomas F. Elzweig
This is the story of two men who broke nearly every rule in the spy's handbook,
and were right. One was a German. The other was one of the top drawer Czechoslo-
vak military intelligence officers. As a young man, long before World War II, he had
studied intensively the unchanging axioms of espionage, and was thoroughly versed in
these fundamentals:
Identify the agent. Don't do clandestine work with parties unknown.
Study the agent. Know as much about him as possible before asking him to work
for you.
Recruit the agent. If it is he that selects you, beware of provocation. You choose
him-for access, reliability, motivation, stability, etc.
Train the agent. Untutored, he is a menace to himself, to you, and to your service.
Test the agent. Be skeptical not only of his capability but also of his loyalty.
Establish all possible independent checks on all his contacts.
Control the agent. You ask all the questions; he provides the answer. You order;
he obeys.
The man who breaks these rules in ignorance is likely to die young, at least
professionally. But General Z, the Czech, and Major L, the German, broke them
wittingly and for good reasons. The result was a brilliantly successful operation that
began before World War II, provided Czechoslovakia and the Western Allies with
invaluable intelligence, and survived to the end of the war. It was like the other great
espionage coups of history, which are almost all full of deviations and exceptions to the
rules. But in all of them the controlling service planned the rule-breaking before the
operation began. It did not begin by the book and then stumble into anarchy.
The story begins on 4 March 1937, four years after der Korporal became der
Fuehrer. The wind from the north, Dr. Goebbels, howled around the ears of the
Czechs. But their houses were snug, their stores full; they were prosperous and free.
The Nazi occupation of Austria was still six months away. A year and a half would
pass before Chamberlain would go to Munich with his symbolic umbrella and return
in a figurative barrel.
In Prague the Agrarian Party was in power. It saw keenly the full national gra-
nary but only dimly the shaking of Sudeten German fists. And this myopia spread
throughout the country. Only a handful of people, among them the Czech intelligence
officers, saw the growing danger clearly. Intelligence was busier than it had ever been
before. On the positive side, it was straining to learn everything possible about Ger-
man political and military intentions, while counterintelligence struggled to prevent or
COApproved" For Release 2005/06/14: CIA-RDP84B00890R000800050bb3-4
MORI/HRP PAGES 31-45
CKMFOrM IFIAt Release 2005/06/14: CIA-RDI?j"1308, %QRaQp> QDQ;~-4
manipulate the activities of the Abwehr. This small group of men knew that war was
coming.
The Agent Recruits a Case Officer
General Z reached his office in the General Staff building punctually at eight. He
hung up coat and cap, sat at his desk, read his correspondence. In other offices admin-
istrators and analysts, code clerks and comptrollers, were also starting the day. The
machinery began to move. The general sorted his correspondence swiftly. Policy,
promotions, pyroelectric techniques. And then he stopped. He had opened an en-
velope typewritten in Czech and addressed to him by full name, rank, and function. It
had been mailed in Chomutov, a town in northwestern Bohemia. It held a three-page
letter, also typewritten, but in German, with only the initial L for signature. This is
what it said:
I offer you my collaboration. After we have had a personal meeting and
you have been given the first samples, and after mutual agreement on the
terms of further cooperation, I shall be paid one hundred thousand Reichs-
marks.' I need this money urgently.
Here is what I can do in return. I can provide you with information,
partially documentary, on German preparations for mobilization; detailed
order of battle; documentary material on Wehrmacht developments and
current dispositions; documentary material on German defences along the
Saxony border; information concerning German armament, tanks, planes,
and airfields; Sudeten-German underground activities and the support
provided for these by the government of the Third Reich. I can also provide
information about German espionage in Czechoslovakia.
Our interview will take place in the restaurant at the Chemnitz railwau
station. The time and date are for you to select. Please send your reply,
general delivery, to [a code name], Chomutov, main post office.
General Z read the letter several times. Never in his wide experience had a
peddler made quite so crassly commercial an offer. You couldn't take it at face value:
even worse than the possibility of fabrication was the probability of provocation.
Chemnitz was well inside Germany, and the specification of the meeting place would
make it simple for the German police to arrest a Czech officer there. And what an
array of information the writer claimed-not only military, but political and clandes-
tine as well. Surely no one German could have access to so much. The language, too,
had a faintly technical flavor, as though formulated by a military intelligence service.
General Z had recently conducted a successful provocation against the Abwehr; sweet
is revenge. No doubt the technical examination of letter and envelope would prove
only that both were sterile. Chomutov was in Sudeten territory; a check at the post
office there would probably draw a blank.
But while the general's mind pondered everything that was wrong with the letter,
his nose was telling him something different. Somehow the distinctive odor of the
phony was missing. His mind, intrigued, began to consider what was right about the
letter. Well, it was too suspicious; the Abwehr had demonstrated that its provocations
were professional. Again, it dangled too many kinds of bait. A provocation is built like
3Approved For Release 2005/06/14: CIA-RDP84B00890a89dR6,%Td&-4
Ti el Rff&f4PfZ9 '&20?5/06/14: CIA-RDP84B00890R96'$6lMM6 -4
a tunnel; he who enters may go deeper and deeper, seeing more and more; but lie
cannot turn to left or right. He is confined to that area which the provoking service
can control and exploit. Then too, that sentence about needing the money urgently-a
personal consideration, of no concern to the Czechs, somehow not the sort of thing that
an enticer would hit upon.
The general summoned the chiefs of his espionage and counterintelligence sec-
tions. Both read the letter attentively. Both looked a bit blankly at the general, as
though to inquire why he asked advice in so elementary a matter. Both had the same
opinion: swindle or provocation.
The letter was subjected to technical examination. Nothing. The Chomutov post-
mark was genuine. The general decided not to risk a check at the post office, because
it would not reveal a hoax and might ruin a possibility. What next? If he dropped the
matter, he could not be wrong.
Instead a letter went to Chomutov. It expressed interest in L's offer but flatly
rejected a meeting on German soil. L could select any Czech site he found convenient.
He was to send his reply to the Chomutov post office, box 83. The general particularly
liked this last touch. It did not matter if every postal employee in Chomutov were a
Nazi: his own men would watch. They would find out who picked up the letter to L;
or, if anything went wrong, they would at least see who slipped L's reply into box 83.
But they didn't. They could not determine who picked up the Czech reply, in its
distinctive off-blue envelope. And the postal clerk who put L's response in box 83 was
sorting his mail in normal fashion. The letter was stamped.
L proposed that General Z meet him in Linz, Austria. Technical examination
revealed only that his second letter was like the first, written on the same German
machine. Perhaps it was just a diversion operation. If so, it had already succeeded in
tying up a surveillance team and some technical experts, not to mention one of the key
men in Czech intelligence.
Linz, of course, was as unacceptable as Chemnitz. By this time the Nazis were
already on the march in Austria. The Anschluss was coming, and everyone knew it. So
L received another rejection and another proposal to meet on Czech soil.
Finally he agreed. As the place he chose Kraslitz, a little town situated directly on
the Saxony-Bohemia border and lying partly in Germany, partly in the CSR. He set
the time at midnight on 6 April 1937. His letter said that he could be recognized-in
the unlikely event that anyone else should be standing in the square of the sleepy town
at such an hour-because he would set his watch by the clock in the tower.
General Z was decidedly unecstatic about this proposal. The border town could
not be controlled as tightly as a wholly Czech village. The dark forest which came
marching to the outskirts on one side was on German territory. Ninety-nine percent of
the 8,000 villagers were Sudeten Germans, the most fanatical of Nazis. Available for
protection in this situation was a six-man patrol of local gendarmes with doubtful
loyalties. Recently there had been several kidnappings along the German border. Not
long ago, in fact, an intelligence officer of the East Bohemian 4th Division had been
taken by force.
The general nevertheless decided that he too would be in the town square at
midnight. He knew perfectly well, of course, that by simple logic he should be any-
where in Czechoslovakia except Kraslitz that night. But his initial decision to pursue
this matter had been intuitive, and it was not to be expected that later decisions could
be based entirely on reason. General Z knew his subordinates agreed unanimously that
L's offer was a piece of cheese poised neatly on an especially vicious trap. Therefore,
CONFIDENTJAL 33
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
CO J I br Release 2005/06/14: CIA-RL o896RQ,Q0 }QQ3-4
he did not feel justified in forcing them to run a risk which he evaded. But at least
preparations could be made. His own trusted men, heavily armed, would form a
hidden ring around the square. The most loyal of the gendarmes (or least disloyal,
thought the general) would serve as outer circle. Signals for the inner ring were estab-
lished: one to indicate the approach of L, or anyone else; the other to warn of danger.
Finally, the general would remain in Kraslitz only long enough to identify L. Within
minutes he and L, with selected subordinates, would be in a car and on their way to
Chomutov, some thirty miles away, where a villa had been fully equipped for just
such a purpose.
The night was black. There was no moon, and an oppressive blanket of black
clouds shut away the stars. There was no wind either. Standing at one side of the
seemingly empty square, the general heard all the unreal noises created by the ears of
a waiting man. Now and then he glanced at his luminescent watch. The unlighted
clock was as invisible as the tower in which it was ensconced. Darkness blotted out
everything. The hands on the general's watch moved to berate himself silently. It was
obvious now. The cat had spotted the mouse in the town square, but it had also spotted
the waiting dogs. No one would come.
Then, 25 minutes past 12, the general saw a figure standing motionless in the
center of the empty space, near the fountain. Neither the approach signal nor the
danger signal had been sounded. The stranger had apparently not walked into the
square. He just stood there. Then he turned toward the town clock that he could not
see, raised an arm, and made an indistinct motion with the other hand. Immediately a
young Czech officer emerged from a doorway, walked over to the man, and spoke a
few words. The two approached the general, who now could see that the stranger was
carrying a suitcase in either hand and a long roll of white paper under one arm. No
greetings were exchanged. The three men walked swiftly to the car, parked in a
nearby street. There a staff officer, drawn aside to report, said that neither the outer
nor the inner ring had spotted anyone entering the square. The general ordered that
the outer ring stay in place for three more hours.
The villa in Chomutov was comfortably furnished and warm. Among its facilities
was an excellently equipped photographic laboratory. The experts and technicians
were waiting.
In the living room L put down his suitcases and turned to the general. "This one,"
he said in fluent, accented Czech, "holds what you may keep. You'll have to photo-
graph the contents of the other, which I must take back with me. I have to be over the
border before dawn."
"We'll help you return," offered the general.
"Thank you, but I prefer that the car drop me near Kraslitz; I'll make my own
way back. I know the border well."
The general heard the faint click of the shutter as a concealed camera photo-
graphed L while he spoke. He hoped that L had not heard it. Two Czech officers, both
blown to the Abwehr, came into the room. One left with the suitcases and the roll of
paper. The other, a colonel, remained. The three men sat down.
Identification, Study, and Control
The general leaned forward slightly. The time had come, clearly, to get this
operation on the tracks. "Would you mind telling me your name?" he asked
pleasantly.
"Yes," L said.
34 1p ppEE T~,e,
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050b03-4
Th& rs,ti,rhEmf Iga0a2 05/06/14: CIA-RDP84B00890{3MBMM4*OOl -4
"Oh. Well, in that case, would you please state your occupation?"
"No."
"But this information is necessary, so that I can determine what possibilities exist,
what you can do for us."
"You have my suitcases. They speak for themselves."
"Why do you need 100,000 Reichsmarks?"
"For personal reasons."
"Is the money your only reason for offering to work for us?"
"No," said L, and now for the first time he looked less guarded and withdrawn.
"My fiancee, who comes from Lausitz, is of Slavic origin. I do not like the things that
our beloved Fuehrer and his buddies have been saying about Slavs. In fact, there are
several things that I do not like about our heroic leader and his little group of trained
animals."
"Money and ideology do not usually go hand in hand this way," the general
observed bluntly.
L smiled. "If it were not for the devil," he said, "who would believe in God?"
They fell silent, waiting for the analysts to report whether the stuff was jewels or
junk. No one said anything until, on signal from a sergeant, the general excused
himself and left the room. In the hallway the first analyst reported, and then the
second. They were enthusiastic. The report on the defenses along the Saxony border
tallied with information from other sources.
It was hard to believe that Czech intelligence now had in its possession a true
copy of the German Grenzschutz plan in all its meticulous detail. The plan for border
protection was in all the countries of Europe one of the most closely guarded secrets.
The Germans had ordered a state of border alert in order to proceed with their
mobilizations on schedule and without detection; knowledge of the preparations for
war would reveal to the Czechs the areas of main concentration of force, and therefore
their intentions, not to mention other logical deductions. Yet the information on bor-
der defenses checked out.
The general re-entered the living-room, the border plan still in his hand. "This
document is a hand-made copy, I presume?"
"Yes," said L. "I did it myself. Took me two months."
"It will require further study," said the general.
L grinned. "It's all there. And now that you have it, you may be interested to
know that we have yours too." From his pocket he drew several sheets of paper and
passed them to the general. The briefest of inspections was sufficient to reveal that it
was the Czech border plan for Northeastern Bohemia and that it was wholly accurate.
"Where did you get this?" the general asked.
"I am sorry, but I shall not be safe unless you figure it out for yourself. I do assure
you that this plan, like everything else I've brought, is genuine."
(Subsequent investigation led finally to the arrest of a captain of the Czech Gen-
eral Staff. He was hanged for treason.)
The general turned to other documents. Two contained original orders from
Abwehrstelle Chemnitz concerning certain subversive activities of Sudeten Germans.
ACA%R JdIi r Release 2005/06/14: CIA-RDP84B00890R0008000500 3-4
CQ j1 {T *Jr Release 2005/06/14: CIA-R 49WffQOMQi08QP@5@19W-4
The nature of the orders made it clear that the underground work was directed
entirely from inside Germany, by the Abwehr. Moreover, it had been instigated by
German intelligence and was financed by Abwehr funds. (These documentary proofs
were shown to the Czech government, which in turn passed their contents to its
Western allies, but the evidence was largely ignored in the prevailing atmosphere of
appeasement.)
After four hours of talking with L and examining his materials, General Z had
formed several conclusions about the German. First, he had a military background; it
was apparent in his speech, in his bearing, and in the documents he had submitted.
Next, he was an Abwehr officer or at least was closely associated with the German
service. He knew Saxony well and specialized operationally in this border area. He
was particularly knowledgeable in security matters. Apparently he had direct access to
secret documents. He was intelligent.
Mentally General Z reviewed the standard data form for agents: true name(s) in
full, with variants; aliases; exact place of birth; etc., etc., etc. Not one of the required
blanks could be filled. There were only these deductions and conjectures.
So the general hired L. He paid him his 100,000 Reichsmarks. And feeling rather
like a man who props up one splintered door at the entrance of a building wracked by
war or revolution, he asked a little weakly, "I wonder if you would mind signing a
receipt? The administrative people ..." His voice trailed off.
L grinned companionably. "I know," he said. "Sure, I'll sign it."
He picked up the receipt, made a motion, and returned it to the general. It now
bore a block L in the lower right-hand corner.
Well, there was one consolation. In General Z's shop the auditors had no jurisdic-
tion over operational expenses. Otherwise this first meeting with L would have been
the last. And maybe it should be, the general thought.
"Naturally," he said in firm tones, "our work is beginning in unorthodox fashion.
I quite understand that it had to begin this way, or not at all. But I'm sure you'll agree
with me that it would be best to-ah-regularize the circumstances in the future. We
shall need one or two rules."
"Naturally," L agreed. "Three, in fact. The first is that you will not pass any
requirement to me but will be content to review what I provide. If I were to try to
carry out assigned tasks, I'd be practically certain to make mistakes. If I bring apples
and peaches, and you want apples and pears, throw the peaches away. You needn't
pay a groschen for them. But if I try to steal pears for you, I'm likely to lose my neck."
"Agreed," said the general. He did not even wince.
"The second rule," L continued, "is that you will not attempt to ascertain my
identity or my vocation. If you do so, you are likely to direct the attention of German
counterintelligence toward me."
Again General Z agreed.
"The last rule is that there will be no other rules."
"Unless mutually agreeable."
"All right."
It was near dawn now. There was time for only two more questions. "Tell me,"
said the general, "how did you manage to mail your letters from Chomutov?"
"I have my ways," said L.
Approved For Release 2005/06/14: CIA-RDP84B0089 6@5K5b3-4
T,pgtigy#A,F(proibRM5/06/14: CIA-RDP84B00890FWWWbT 4
"Well, what about coming across the border, then? Rather risky for someone who
stresses security as much as you do."
"I know the area," said L. He smiled at the general, not in the least insolently or
tauntingly, but understandingly, as a friendly fencer might smile at a highly-trained
opponent who looks clumsy against an unorthodox attack.
Arrangements were made, of course, for continued contact, personal and postal.
The next meeting was set. Two Czech officers took L by car to the outskirts of Kraslitz.
He walked away from the road, into the last of the darkness.
But he reappeared on schedule, not once or a few times but through the years.
His value remained extremely high. In fact, General Z and his staff, both in Prague
and later in London, had no source of greater worth or reliability. The Allies, too,
discovered that L was a pearl beyond price. One British general said, "When L
reports, armies move."
Episode in a Partnership
The value and validity of L's information clearly reduced, or even eliminated,
the normal need to establish a source's identity and obtain as much personal data as
possible. Unless that is, the entire operation were aimed at one master stroke of decep-
tion. What if all this accurate reporting which clearly hurt the Nazi cause were in-
tended solely to insure that when the big lie came, at the critical moment, it would be
accepted unquestioningly? But in that event any prying at L's secrets would be certain
to establish only that he was exactly what he seemed to be, an Abwehr officer.
Of course, as the contacts continued, the Czechs learned more about L. For one
thing, the general and the agent began to discuss their respective needs and capabili-
ties with growing frankness. And L became less guarded about himself as time went
on. Gradually it was learned that he was indeed an Abwehr officer, stationed in
Chemnitz and assigned to Abwehrstelle IV, in Dresden. He mentioned his age, 35,
quite casually one day. But not until 1940, three years after the operation started, was
his identity established by name, and then only because he chose to reveal it.
The major unsolved mystery remained his motivation. At the outset he had
claimed an antifascist idealism while demanding at the same time large sums. He was
in fact paid handsomely: he had received more than 800,000 RM up to the German
occupation of Czechoslovakia. General Z was well aware that the swindler (especially
the wartime swindler) customarily professes the highest motives while lifting your
wallet; but L was no swindler. A mercenary, then, a salesman of secrets without
loyalties. Strictly cash-and-carry. Or was he truly antifascist? Perhaps he belonged to a
small clique that was deliberately leaking information as one means of hastening der
Fuehrer's defeat?
Whatever else he might be, he was engaging. Once in 1938, in the safehouse at
Chomutov, L was smiling a little, as usual. "How about doing me a favor?" he asked.
General Z was painfully conscious that a significant raise or bonus for I., already
better paid than any other source, might place the G-2 budget squarely in the red.
"What is it?" he asked cautiously.
"I have orders to establish four new W/T sets inside the CSR. Two go to Slovakia.
The other two are supposed to be placed in Moravska Ostrava, in Moravia. I don't
have any operators in the towns chosen by the brass for these four sets. I could recruit
them, of course, and let you know who they are. I'd like to do it that way, the natural
way. But the brass have put one of those blasted `urgent' stamps on this one. The sets
A99 Jt elease 2005/06/14: CIA-RDP84B00890R00080005000334
CONRI FAdr Release 2005/06/14: CIA-RDRA4 OW6QS@FJ@q&3-4
aren't supposed to go on the air now, you understand. They come up when you begin
emergency mobilization. So how about giving me a hand?"
"You realize the problems?"
"Well, IT read them from our side, and you read them from yours."
The problems were indeed horrendous. The four radio sets could not be faked or
quietly forgotten; the Abwehr might check at any time. The four operators-
"Let's say three," said the general. "Better to fail on one; nothing more suspicious
than infallibility."
"No," said L. "I want all four. After all, my professional reputation is involved."
"All right; maybe they do think you're infallible. But these four men must be
completely loyal to us and yet acceptable to you. And they must be skilled already or
else they will have to be trained. They can't be trained because I don't want to tell
them the story, and your people would have to do the training. And you're going to
want test runs, I suppose, which my people are likely to pick up."
But L remained cheerful and helpful. One by one the knotty problems were
solved. Finally the four sets were all in place, and Czech intelligence gained a thor-
ough knowledge of German methods and tactics in radio operations, German equip-
ment, German codes and signals. Exploitation of the information led to the discovery
of seven really German-controlled sets in the CSR. L's four sets could be used by the
Czechs at will, to remain silent or to furnish deception. Finally, the severe pressure
exerted upon L for speedy placement of the sets had been an unmistakable warning
that the war was near.
This success seemed to make L even happier. By 1938, in fact, there was a
genuine and mutual cordiality in the relationship. In the summer of that year occurred
another episode which is worth describing because it reveals how constantly danger
threatened the operation and also provides an added insight into L's character. At that
time serious public disturbances, nearing the proportions of armed revolt, occurred in
the Sudeten German area of the CSR. Units of the Czech Army had to be dispatched
to the border regions to put down the rebellion. L continued to appear for scheduled
meetings, punctual and serene. One night two Czech intelligence officers were return-
ing him, as usual, to the outskirts of Kraslitz. The car was stopped by a barricade;
armed men appeared; their leader, in gutteral Czech, ordered the occupants to get out
of the car and hand over their identity papers. There was no doubt that this was an
insurgent group, and the lives of the two Czech officers would be in serious danger if
they were searched and exposed as intelligence personnel.
In sharp German L ordered the leader of the group to step aside with him. At a
distance he showed the leader a paper of some kind. The Sudeten German listened
respectfully to L, saluted, and then shook hands, as though he could not decide
whether civilian or military courtesy was required of him. L and his two associates got
back into the car, armed now with the password for the return trip.
At the next meeting L laughed over the incident. "Nothing could be simpler," he
said. "I showed him an official Abwehr document-without a name on it-and told
him that your chaps were two of my best agents who had just supplied me with
excellent material and now were guiding me back to the border."
"You thought quickly. I want to thank you on behalf of my subordinates as well
as myself. You save their necks."
"Mine was on the same block," said L.
38Approved For Release 2005/06/14: CIA-RDP84B00890rR@&;W3-4
]rpf)?(y,g >?r ?lr (I9piRe;g25/06/14: CIA-RDP84B00890RQR9 8J949 4
Being human, L was not an ideal agent. It was obvious, for example, that he knew
a great deal about Czechs who were spying for the Abwehr. In fact, he had promised
at the outset to deliver precisely such information. But when General Z pressed him
for it, he became evasive. "Do you remember hanging that General Staff captain
because he was an Abwehr agent?" L asked sharply, "Every one of your arrests is
thoroughly investigated by the III-boys [Abwehr counterintelligence]." L grimaced at
the memory. "And not only the Abwehr, but the Gestapo and the Sicherheitsdienst as
well. "
"But you did not identify that man," the general protested.
"Exactly. That's why I'm still wearing a head."
Yet once, inexplicably, he volunteered the information that someone in Artillery
Regiment No. 305 in Ctyry Dvory (Southern Bohemia) was a German agent. A
lieutenant colonel of German parentage was arrested and confessed. "This time it was
safe," said L.
He was proud and sensitive. At the time of one scheduled meeting other business
had called General Z away for three days, and his deputy filled in. The deputy was a
scholarly man, precise of habit.
L was coldly angry at his next meeting with the general. "Keep your good little
boy away from me from now on," he snapped. "I do not risk my hide this way to talk
with fools and pedants."
"I am sure that he meant no offense."
"Of course not," said L, unmollified. "But he is forever saying, `In such a cast-,
one does thus and so. The rule to follow is this or that.' He doesn't appreciate our nice
little operation, he isn't interested; he only wants to know what type of operation it is,
so he can decide which of the three sets of rules he has memorized ought to apply
here. "
"Perhaps he is right," General Z argued. "Rules are the shorthand of experience. "
"Rules of this kind are the crutches of feeble minds," retorted L. "The simple
truth is that the world we live in is in a chaos. And most minds are uncomfortable
when confronted by chaos. Scatter blocks in front of a baby, and it makes patterns.
Any child can do it, and does. So we impose on this whirling formlessness all kinds of
imaginary structures, each different from the next. Confusion is too much for us; we
create an arbitrary order. That's all right; but then we confuse our subjective patterns
with reality and say that these structures are inherent, that they belong to the nature
of reality."
The general drew the correct conclusion from this discourse. He decided that his
deputy had somehow offended L's sensibilities.
Munich and After
The work of Major (later Colonel) L for the Czechoslovak G-2 falls into two
periods: from March 1937 to the German invasion of the CSR in March 1939, and
from then to the end of the war. Through both periods he was an invaluable source.
The Czech army and government were kept steadily apprised, up to the time of the
Munich conference, of German intentions and capabilities affecting Czechoslovakia.
Moreover, this flood of reliable information served to reveal new gaps in Czech knowl-
edge and thus to stimulate new efforts, both in positive collection and in counterintel-
ligence. During the Munich crisis L appeared only once. Obviously he was very busy
CW9MT0,4 Release 2005/06/14: CIA-RDP84B00890R000800050009-4
C?N tD?.4lrI5 tr Release 2005/06/14: CIA-RDR?4JAg9#A9R0 0?9R9 PL%3-4
in connection with the German mobilization and final preparations for the forthcom-
ing campaign; it was surprising that he could get away at all. Moreover, the increased
tension had tightened the border controls on both sides. L looked completely relaxed,
however, as he sat in his favorite armchair at the safehouse and calmly reported that
unless the Czech government surrendered the Sudeten territory, the Germans would
open fire.
"Der Fuehrer and his foot-kissers are convinced that there is not a country in
Europe, including your ally France, that will come to your aid if Germany attacks.
The main thrust will come from Lower Austria, where your fortifications are
weakest. "
L continued, explaining the German plan in detail. On the basis of his informa-
tion the Czechs were able to inform the French High Command that all but two of the
first-class German divisions would be employed against the Czechoslovak army. The
rest of the divisions along the border of France would be second and even third class,
incompletely equipped. The entire length of the Polish border would be guarded by
only two divisions. This concentration of force upon the CSR left the German flanks
obviously exposed, although the Czechs were under no illusion that the Allies would
counter a thrust against the CSR by an attack elsewhere. The solution, instead, was
"peace in our time," and some months later the Nazi occupation of Czechoslovakia.
L did not appear during this interim. General Z assumed that Munich's elimina-
tion of Czechoslovakia as a military power had caused him to lose interest in any
further collaboration. Moreover, the changing times had wrought collaborative
changes in the Czech G-2; L now had increased reason to fear betrayal to German
counterintelligence if he presisted. Perhaps, too, he suspected that there was little cash
left in the Czech coffers. General Z reasoned that L either would cease to work against
the Hitler government or would now seek support from a stronger, wealthier power.
General Z was wrong. L came, hurried but unagitated, to the safehouse on 2
March 1939 and told the houseman to arrange an immediate meeting with the gen-
eral. The latter left an important conference and sped to Chomutov. Without prelimi-
naries L reported that the occupation of Bohemia and Moravia would take place on 15
March 1939. He identified the German armies scheduled for participation, the
commanding generals, the directions of advance, and the objectives. Armored and
mechanized units were to reach Prague and Brno as fast as possible. Only token
resistance, or none at all, was anticipated from the demobilized and demoralized
Czech army. Slovakia would become an independent German protectorate. L pro-
vided a copy of a document which ordered police units advancing with the German
armies to arrest all Czechoslovak intelligence officers and subject them to immediate
interrogation. Of key interest were the identities of all Czech sources in Germany or
reporting about Germany.
Thirteen days! And so much to do.
L was not smiling now. His face showed plainly his sympathy and deep concern.
"Look here," he said, "what are your plans?"
"Oh, we have something cooked up, of course."
"Well, it's plain that you've got to clear out, unless you want to invite the Gestapo
for tea. I don't advise France. Wherever you go, you'll be able to set up a safe meeting
place or two, nicht?"
"Yes, I can give you an address in Holland, and another in Switzerland."
"Good." L wrote them down. "I promise to get word to you as soon as I can. And
I want you to promise me something."
40 Approved For Release 2005/06/14: CIA-RDP84B0089 68 ff1903-4
A~ro edfo1Release 2005/06/14: CIA-RDP84B0089@~@Q,QQ3-4
The ort~ian o xperience
"Whatever I can."
"See to it personally that any file material which identifies me, or even points
toward me, is destroyed."
"It has already been taken care of," said the general.
The two men stood then, and shook hands. "God protect you," said L in German.
"This is not goodbye. I'll be in touch with you soon. Just get out in time to save your
"Yes. Thank you."
"Not necessary. If you're stabbed, I bleed." But L's eyes, usually full of inquisi-
tiveness or amusement, now showed his anxiety for his associate.
The general sat down again after L had gone. There was much to do. But 1, was
as always, a teasing enigma. Why did he risk his life to appear at such a time? And
why did he volunteer to continue serving the Czechs even after his own people had
driven them from their homeland? He could withdraw now. Even if the Czechs were
so unscrupulous as to betray him, they would not profit thereby. He had been paid so
well that he could now live comfortably throughout the war and for years thereafter.
Or if he were greedy, he could seek out a major power and reap far handsomer
rewards than could be offered by an impoverished government in exile. Perhaps the
promise was empty, a gesture intended to console an associate in distress, offered
without any intention of carrying it out. Yet his manner had not been one of pious
sympathy; it was too sincere and friendly.
Still baffled, the general was driven back to Prague, where he reported his latest
information to the Chief of Staff. But the report was met with governmental skep-
ticism. Collaborators had already infiltrated the government, and many of those free
of this taint seemed half paralyzed by the headlong rush of events and the ominous
clouds gathering. L's information was labelled incredible, and the general was forbid-
den to disseminate it. Under these circumstances he concentrated on plans for the
security of his own staff. At 6 p.m. on 14 March 1939, six hours before the German
armies crossed the border and twelve hours before they entered Prague, the general
and twelve of his staff members left the capital in a plane made available by the
British.
Intelligence-in-Exile, Impoverished
Czech operations were resumed from London through offices in Switzerland,
Holland, Sweden, Denmark, and Poland. The ranks of Czech intelligence officers
were augmented by a number of military attaches abroad who refused to serve a
Hitler-dominated government.
The spring passed, and the summer, without word from L. Despite the refutation
of his earlier doubts, General Z was by now convinced that he would never again see
the Abwehr major, or hear from him. Undoubtedly, he thought one day as he attacked
his morning mail, L had worried in the spring about the possibility that Czech docu-
ments or arrested Czech intelligence officers would reveal his identity and the story of
his silent battle against the Nazis. Now that nothing had happened for nearly half a
year, he probably felt safe. And freedom from this anxiety would be such a welcome
relief that he would not be likely to put his neck into the same noose a second time.
Thus theorizing, General Z opened a letter from Switzerland. It came from L. He
would soon arrive in the Hague, where he would like to meet General Z or even the
fgp Q fp Release 2005/06/14: CIA-RDP84B00890R0008000500614
Cftprp lFkpr Release 2005/06/14: CIA-R4l,,8 Q?RAfitQ#Qg }?M3-4
once-hated deputy. He would reach the Hotel des Indes at 2 p.m. on the afternoon of
4 September and would register there under the name of Braun.
On the appointed day L received the deputy cordially. "Please tell General Z,"
he said quietly, "that if he is interested, I am prepared to resume our association."
"I am sure he will be delighted."
"I've been transferred to Berlin, to the OKW Abwehr Abteilung [General Staff G-
2]. I shall have plenty of opportunities to travel and can easily meet you. And I'll have
some first-rate information for you."
The deputy looked a shade uncomfortable. "This is wonderful news, of course,"
he said, "but-"
"It's the money. You'll understand that things are not the same for us now. I do
not mean that we cannot pay anything, but in comparison with the old days we --"
"I don't want pay," said L. "General Z has done very well by me; my only money
problem now is to keep your generosity from endangering my security. So don't give it
another thought."
The general's deputy was tempted to ask what caused this remarkable about-face
on the part of an agent who had required about one million Reichsmarks for two
years' work. But his earlier encounter with L had made him cautious.
L turned over valuable and detailed information about German armored and
mechanized divisions. The deputy agreed to his proposed arrangements for the next
meeting, and returned to London to report.
General Z listened to the story with surprised delight. Was nothing that L did
ever to conform to expected patterns of behavior? Now he did not want money, and
was willing to serve an emigre organization that had lost much of its power along with
its funds. Why? His fondness for a Slavic fiancee seemed a far from sufficient answer.
If he were a burning anti-Nazi, was he operating all alone? Or did he perhaps tie in to
some German underground group dedicated to Hitler's overthrow? Was he part of the
dissident Canaris group? Was this group seeking a liaison channel to the Allies? But
probably, in that event, it would have sought contact with the English, or another
power, rather than the exiled Czechs.
Now that contact had been reestablished, reporting flowed smoothly. Corre-
spondence embroidered with secret writing went to cover addresses in neutral coun-
tries, usually Switzerland or Portugal. Personal meetings were also held in these coun-
tries and in Holland. One meeting was held in Constantinople. It is no exaggeration to
say that L's reports, submitted on both military and intelligence subjects from 1937 to
1945, were of momentous significance. Here are a few examples:
? Accurate advance information about the German attack on Poland and plans
for the subsequent campaign. This information included the now familiar fact
that German SS units garbed in Polish uniforms would simulate an attack on
German positions to furnish a pretext for war.
? The concentration of German armies for the invasion of Denmark and Norway.
? Prior warning of the German attacks upon Belgium and France, together with
clear indications of the main lines of thrust.
? The opening of hostilities against the U.S.S.R.
42Approved For Release 2005/06/14: CIA-RDP84B00890k& ?ab 3-4
T 8yfhq~86 P QS/06/14: CIA-RDP84B00890FQORQDG6MOL3-4
? Plans for the German offensive in the Kharkov area in the spring of 1942.
? A series of reports on German order of battle.
? Reports on the movements of major German headquarters from one battlefield
to another.
? Some information on preparations for the V-1 and V-2.
? Hitler's plans for Spain, which did not materialize.
L's written reports were almost always brief. Sometimes the secret text consisted
of a single sentence. His oral reports were somewhat lengthier, but they too wear
pithy. During these personal meetings the friendship which had grown between Gen-
eral Z and the agent never led L into confidences or irrelevancies. In time the Czechs
managed to organize from London a respectable agent network, but L's value contin-
ued to outweigh the combined work of the others.
At one meeting in Lisbon he eyed the general reproachfully. "It looks as though
your British friends pried my name out of you," he said.
The observation was accurate. For quite a long time General Z had withstood the
pressure of British questions about L's identity, but finally things had reached the
point where withholding it was no longer possible.
"Some very smooth customer dropped in on me right after our last meeting and
with an air of engaging frankness explained all the practical reasons why I should work
for his firm directly instead of through an intermediary."
"Oh?" said the general. "And what did you tell him?"
"I told him that I didn't know him and that he had obviously made a mistaki.
You know, you might tell them to check with you before they come calling, and get
your blessing."
"Perhaps you should agree to cooperate with our friends," said General Z. "They
can pay you better than I."
"I've told you I don't want money. Look here: I've worked with you for about
three years now, and I'm still alive."
General Z said nothing more. It was typical of L to profess the purest self -interest
as his sole motive. He would have blushed at the mention of loyalty. In fact, the
general reflected, the idea of fealty has been out of fashion for a long time.
In January 1944 L wrote to ask for a meeting in Constantinople. He reported that
he had been promoted to the rank of colonel and transferred to the Prague military
command. His new assignment precluded frequent travel.
General Z discussed this change with his deputy. It had serious disadvantages.
The transfer from Berlin took L away from the brain of the German Army. It also
posed delicate problems of communication, for secret writing mailed from Prague
would obviously be too risky. There were some advantages. The Protectorate had
grown increasingly important to German military operations as the result of develop-
ments on both fronts. The war industry there was virtually unmolested by Allied
bombing, so that the railroad network served the German High Command efficiently.
Moreover, it had become clear by 1944 that the Allies were going to win the war. The
exiled Czech government therefore needed information from Prague. Communica-
tions were the hardest problem. There was good radio contact between the Prague
underground and London, but General Z felt that placing L in touch with the under-
00foil 4*LRelease 2005/06/14: CIA-RDP84B00890R000800050004A4
CONMDemihlpr Release 2005/06/14: CIA-R B4,S}Q ?Q Q,WQQ3-4
ground so that he could use its facilities was too risky. Ile anticipated, in fact, that L
would reject such a proposal.
The deputy met L in Constantinople. The new Abwehr colonel proposed that
communications be maintained by radio; he was willing to use the Czech underground
if his contacts with it were restricted to a single reliable man. General Z had previously
selected such a man, a Colonel Studeny. It was decided that a separate code would be
employed for L's reports. The time and place for future meetings with Studeny were
chosen by L, and arrangements for dead drops were worked out in detail.
And so L began a new life. His assignment as chief of the counterintelligence
section of the Prague military command, under General Toussaint, provided him a
measure of protection. He usually knew in advance which persons were suspect to the
Germans and which were slated for arrest. This knowledge was not infallible; the
Gestapo and Sicherheitsdienst were often-and increasingly-on unfriendly terms
with the Abwehr. And sometimes Gestapo arrests were not only unannounced but
seemingly capricious, made for precautionary reasons, on suspicion rather than
evidence.
But at least the operation was now conducted in accordance with the rules. Colo-
nel Studeny had dropped all other underground activity and functioned solely as L's
cut-out. There were no more chancy meetings in neutral countries. L had received no
money for years, so the danger which an added and inexplicable income always brings
had now evaporated. L and Studeny never met; they used a number of cleverly
concealed drops. Perhaps it was a miracle that the operation had survived its cowboy
years, but now L had for protection an intelligence application of the rules.
His reports continued to be very valuable, fulfilling also the new function of
providing warning about forthcoming Gestapo arrests. The months rolled by, months
in which the German armies met a series of major defeats. The end was in sight.
Mission Fulfilled
In October 1944 Colonel Studeny was arrested. It seems that he had been under
surveillance for some time. And yet, surprisingly, the Gestapo had not found his dead
drops; for if they had they would have arrested L as well. What they did find, when
they searched Studeny, was a piece of paper bearing questions obviously addressed to
someone in the German headquarters at Prague. Colonel Studeny was interrogated
under relentless torture. He died a hero, without revealing anything about the radio
station or the identity of the German collaborator. L even participated, on behalf of
the Abwehr, in the investigation of the case.
L's own arrest came in December. Its causes remained as obscure as those that
had led to Studeny apprehension. Perhaps an analysis of the requirements on
Studeny's person had led, in turn, to investigation of the past activities of all logical
suspects. Such a review would presumably have revealed L's presence near the Czech
border before the war started, his specialization as intelligence officer in Czech mat-
ters, his extensive travels, and a number of other significant indicators. Or perhaps,
after the attempt on Hitler's life in June 1944, L was one of the large number of
Abwehr officers who fell under suspicion of complicity. Whatever the reasons for the
arrest, the Gestapo used much the same barbarous methods on him as it had previously
employed on Colonel Studeny.
There was one difference. L must have sometime read The Arabian Nights. At
any rate he emulated Queen Scheherezade by prolonging his story, relating only one
44 Approved For Release 2005/06/14: CIA-RDP84B00896 W&3-4
TAQISfor Oh br R?J9ssiP&005/06/14: CIA-RDP84B00890F~6f 'Ab1M4
episode at a time, and ensuring that much additional investigation would be required
before the next chapter could be drawn from him.
In this way Colonel L sought to remain alive until the dying war reached its end
and he, along with the other prisoners at Terezin, was set free. He nearly succeeded.
In fact, this rational plan would almost certainly have worked except that fate is
notoriously irrational. The SS guards at Terezin, growing more frightened daily as the
Russians stormed closer and closer, got thoroughly drunk on their last afternoon as
masters of the concentration camps. They decided to shoot forty prisoners in a final
Teutonic orgy of death. By chance a sodden sergeant chose L as one of the forty.
As he was led from his barracks, he managed to exchange a few words with a
Czech inmate not marked for execution. He told him to seek out General Z and tell
him what had happened.
"Tell him it was a wonderful time. I'm sorry it stops here. And tell him-he
always wanted to know why, so tell him that my reasons in life were just as logical as
the reasons for my death."
And there you have it, thought General Z, pondering the story. Maybe no one can
proceed by logic or rules alone; maybe nobody knows enough. I don't know why he
was the best spy I ever knew. I don't know why he was a spy at all. I don't even know
why I broke all the rules at the outset. One of my English friends once said that the
prerequisite for intelligence is intelligence. He's wrong. The indispensable organ in
this business is not the brain. It's the nose.
(From Volume 3 Number 2, p. 105, 1959; Confidential)
ApprovDedNFor Release 2005/06/14: CIA-RDP84B0089OR000800050003 4
Approved For Release 2005/06/14: CIA-RDP84B0089OR00080085 4
This article is for those who wonder
what problems the China analyst
has, what tools, techniques, and as-
sets he can bring to bear, and how
confident he may be in the end
product
THE ART OF CHINA-WATCHING
Most knowledgeable observers agree that information on, and analysis of. events
within the People's Republic of China has advanced now to the level of `Kremlinol-
ogy" about 15 years ago. It is no semantic accident that observers of the Chinese
political scene are more often called "China-watchers" than "Sinologists," while an-
alysts of the Soviet Union are frequently referred to as "Kremlinologists." The art of
China-watching is imprecise at best, and hardly deserves yet to be called Sinology.
The explanation, or blame, for this often frustrating situation lies mainly with the
way the Chinese conduct their affairs. To say the Chinese have a penchant for secrec,"
is almost an understatement. Some Chinese have said privately that they deliberate],
try to hide important domestic events from their northern enemy, the Soviet Union.
While there is certainly an element of truth in this, the Chinese are also anxious to
conceal information from the Chinese populace and from the outside world in general.
The secrecy syndrome applies more often to domestic than to foreign affairs By its
very nature, Chinese foreign policy inevitably makes itself known. With a second
country involved, Peking has had less success in hiding its foreign policy.
4. On the domestic front, however, there have been for the past several years serious
policy differences and genuine personal animosity among the Chinese leaders. It is
these schisms that Peking seems most anxious to hide-from the Chinese populace, in
order to promote confidence in the leadership and relative stability at the grassroots;
from the Soviet Union, because Peking believes Moscow has tried and will try again to
exploit differences in the Chinese leadership; and from the rest of the world, perhaps
for similar reasons and also because the Chinese seem to believe that their internal
affairs are none of our business. They complained bitterly about Western press cov-
erage of Chinese domestic politics last year. They did not like the interpretation
presented in the articles, but neither did they say anything to clarify the situation.
The Aging Leadership
By most standards, China is a peculiar country. It has perhaps the most aged
leadership in the world. Four of the five vice-chairmen of the party are in their
seventies. The chairman, Mao, is 81. In the government bureaucracy, which exists
alongside the party structure, there is no head of state. In fact, as with most major
decisions, it took the Chinese several years of debating the issue to decide whether to
abolish the job. Until January, when the post was officially dropped, it was filled on a
temporary basis by an 88-year-old party veteran. Without a head of state, the highest
ranking government official is the chairman of China's legislature. He, too, is 88.
Since the Communists came to power in 1949, China has been run by essential]-,
the same small group of aging revolutionaries. As a rule, they do not retire. They tend
SApproved For Release 2005/06/14: CIA-RDP84B00890R00080005006-4
MORI/HRP PAGES 47-56
SF rbved For Release 2005/06/14: CIA-RDP84B00890e O8WQA516 @3-4
to remain in office until they die or are purged. Thus far, very few have died. Because
they are roughly the same age-that is to say, old indeed-there is the danger that
they will all die nearly at once, leaving a relatively inexperienced group of younger
officials to take over the world's most populous country. Only in the past two years has
this old leadership made a concerted effort to bring younger people into the top ranks
of the party and government hierarchies. By Chinese standards, "younger" generally
means men in their sixties.
Being elevated so recently, these younger officials will probably not have much
time to show their administrative and political talents, especially the ability to survive
the political maneuvering, backbiting, and rivalries that are likely to emerge when the
old leadership finally passes from the scene. Because the leadership has been relatively
tardy in beginning to put together a succession arrangement, China watchers have
little information to go by in trying to predict the outcome of a possible succession
struggle and the directions Chinese policy will take in the coming years. Why the
leadership was so slow in recognizing the obvious need to groom younger officials
remains a mystery, but no firm steps were taken until party congress in August, 1973,
24 years after coming to power.
Vacancies and Unannounced Appointments
There are, of course, many mysteries on the Chinese political scene. For more
than three years there was no officially designated defense minister, although it was
fairly obvious who was acting in that capacity. The man was finally given the job
publicly in January, but why he wasn't named earlier is yet another unanswered, and
perhaps unanswerable, question. The man is 76, which means the Chinese will have to
go through this same apparently arduous process of choosing a defense minister again
in a few years.
The previous defense minister was Lin Piao, Mao's designated heir who allegedly
died in a plane crash fleeing to the Soviet Union after an abortive coup attempt. All
the events surrounding Lin's political demise and death will probably never become
known, but the incident has had a profound effect on the Chinese leadership. It has
fed their fears of possible Soviet meddling in China's domestic affairs and has trans-
formed the once glorified army into an institution now viewed with considerable
distrust. In typical Chinese fashion, Lin was privately vilified by name in documents
circulated within China, but for the public record he was just an unidentified "politi-
cal swindler." Everyone in China and outside knew that the "swindler" was Lin, and
the Chinese probably were aware that they were fooling no one with their attempts to
conceal his identity by not using his name publicly. Nevertheless, it was not until
nearly two years after his death that the Chinese propaganda machine started to
attack Lin by name.
The defense portfolio was just one of many jobs that remained vacant for years on
end. For several years there was no army chief of staff, no finance minister, no one in
charge of health, no one in charge of public security, and, despite the growing impor-
tance of China's oil industry, no minister of petroleum. At no time since 1971 have all
of China's provinces had an officially designated top man. Each time a new job opens
up in China, it evidently becomes a political nightmare just to get a small group of
people to agree on who should fill it. Most Chinese, even those in officialdom, can at
best take only wild guesses as to who sits in what job until the appointments are
announced by the Chinese press.
Because the Chinese people, and even many officials, are often kept in the dark
about domestic politics, the usual problems of obtaining clandestine information about
48Approved For Release 2005/06/14: CIA-RDP84B00890R00080 k1 b3-4
CjWpp Wh ,c r Release 2005/06/14: CIA-RDP84B0089OR00080 i-4
denied areas are magnified in the case of China. Officials abroad are often as confused
about domestic developments as western observers are. An amusing exchange ensued
last year when the Peking press began to attack the Italian film maker Antonioni. One
official abroad asked another what the attacks were all about, and the reply was that
there had been no explanation from Peking. Meanwhile, China watchers in Wash
ington and elsewhere were frantically poring over the articles, certain that they were
of enormous significance but not at all united about why they were.
Propaganda Analysis
Over the years, China watchers have developed some analytical tools, much the
same as those used by Kremlinologists, to help break through the fog. The Chinese, for
their part, as their perceived need for secrecy has increased, have devised a number of
schemes to render these tools less useful than they might once have been. One rule of
thumb is that in their propaganda the Chinese do not say things by accident and rarely
say anything directly. They did not, for example, attack Antonioni for nothing, and
they probably were trying to convey other messages beside their distaste for the film
he made about China. One theory was that the attacks were directed at someone in
the Chinese leadership who was known to be an Antonioni fan, another that they
reflected a hardening of Chinese views toward cultural exchanges with the West
While the various theories arrived at through propaganda analysis usually lead to
lively debates among China watchers, rarely can any single theory be proved
conclusively.
Complicating the process of analyzing propaganda is a relatively "free" press in
recent years, at least for those in the highest levels of the bureaucracy. The party's
official newspaper has been known to carry two articles on the same subject in the
same issue, expressing diametrically opposed views. Because no one "faction" in the
leadership has exclusive access to the press and because even signed articles are usually
in pseudonym, China watchers can never be absolutely certain whose views are being
expressed in a given article.
Imprecise though it may be, propaganda analysis is often the only way to keep
track of an important political development as it evolves. Last year the Chinese waged
a major political campaign, almost exclusively through propaganda, that attacked two
corpses-the fallen defense minister, Lin Piao, who died in 1971, and the ancient sage
Confucius, who died some 2500 years ago. The propaganda articles discussed major
figures and events from the Chinese past, but the historical figures seemed to be
surrogates for people in the current leadership, and the events often resembled current
problems.
Accepting the premise that the historical figures did in fact represent current
leaders, the problem of course was to determine which ones. With little more than
propaganda to go on, China watchers came up with widely differing interpretations.
Adding to the confusion, some historical figures who had been consistently praised for
implementing progressive policies suddenly were attacked in other articles. The re
verse took place. All this suggested that different people in the leadership were
promoting their own favorite historical figures, i.e., those who stood for themselves,
and denigrating the other stand-ins.
Confucius, of course, was consistently attacked, sometimes for very specific and
detailed misdeeds. For example, he was criticized for being finicky about food and
insisting that his meat be sliced just so. This accusation, though obscure to China
watchers, probably was very revealing to the small group of leaders at the top who
know one another's habits thoroughly. No information has ever turned up as to who in
S$$$ .Jved For Release 2005/06/14: CIA-RDP84B0089OR000800050069-4
SEARRRoved For Release 2005/06/14: CIA-RDP84B0089 8g005GV3-4
the current leadership is noticeably picky about food, but undoubtedly the individual
in question and his colleagues recognized the target immediately.
When Chinese leaders attack one another through the use of information known
only to themselves, it not only leaves China watchers overseas baffled, but makes it
impossible for most Chinese officials to understand who is being attacked. In fact,
officials, and the Chinese populace in general were all instructed to study the same
propaganda articles, without explanation, that the outside world was puzzling over.
They, too, had to be China watchers, and their speculation as to who was under attack
covered the entire political spectrum in the Chinese leadership. A Chinese official
even guessed that the target was the 88-year-old acting head of state, who was ex-
tremely frail and died a year later. One Chinese, expressing his frustration over the
obscure criticism of Confucius, posted a notice on a public building that read "why are
we attacking someone who has been dead more than two thousand years?" To their
credit, China watchers were generally quicker to recognize the importance of the anti-
Confucius campaign than were many Chinese officials.
One of the pitfalls of propaganda analysis is that certain catch phrases used
repeatedly over the years can mean different things at different times. The term
"three-in-one combination," for example-the organizational principle for the forma-
tion of local administrative organs-meant at its inception a combination of experi-
enced officials, military men, and "the masses," i.e., ordinary workers or peasants. In
recent years, however, as the military has fallen into disfavor and many workers and
peasants have shown themselves to be incompetent administrators, the phrase has now
come to mean a combination of old, middle-aged, and young officials. Failure to
recognize the change in meaning would leave a China watcher several years behind
the times, leading him to believe that the Chinese were still interested in having
soldiers, workers, and peasants share the management of the local administrative units.
Subtle changes in the propaganda line are often extremely significant, and a
China watcher can be left high and dry if he misses the changes. In its heyday, the
army was the model for all of China. Everyone was exhorted to learn from the army.
When in recent years the Chinese added that the army must learn from the people.
this was the Chinese way of telling the outside world that the army was falling out of
favor with the leadership in Peking.
Propaganda analysis would be incomplete without a careful study of the propa-
ganda line coming from each of the provinces and comparisons between them. Some-
times, differing lines from various provinces mean only that the local leadership is
confused about what to do. In some cases, however, the differences are very meaning-
ful. When ex-defense minister Lin Piao was still in power, many provinces said the
army was founded by Mao and commanded by Lin; others said the army was founded
and commanded by Mao. With the advantage of hindsight, it is clear that even well
before his fall, Lin's authority had begun to erode. What is not clear is whether those
provinces that failed to mention Lin in this context were merely expressing their own
dissatisfaction with him or whether they were acting on instructions from leaders in
Peking who were working to oust him. In this case, as in many other, China watchers
will probably never know the answer. They can probably make an educated guess,
however, that those provinces which say the army whould "obey" the party contain
military men more willing to submit to party authority than those provinces which say
the army should merely "respect" the party.
The Pecking Order
Another favorite tool of the analytical trade is the scrutiny of leadership appear-
ances. The order in which Chinese leaders are listed can be a reliable gauge of their
50
Approved For Release 2005/06/14: CIA-RDP84B00890R00080&&3-4
Chi a oteldrfgor Release 2005/06/14: CIA-RDP84B00890R00086NOOU3-4
relative standing in the leadership. The Chinese have often circumvented this system
by listing their leaders in the Chinese equivalent of alphabetical order. On major
holidays, the Chinese used to hold mass rallies in Peking with the entire leadership
standing before the assembled crowds. Who stood next to whom was another clue to
the importance of individual leaders, but in recent years the rallies have been aban-
doned. Instead, several small groups of leaders appear in different parks in Peking,
thus avoiding a public display of the entire pecking order.
When several important officials fail to appear over an extended period of time,
it often means that a leadership meeting is in session. When at the same time the top
officials in many of China's 29 provinces do not appear at home, the betting is that
Peking has called in leaders from the provinces for a large meeting. In August, 1973, as
China watchers awaited a party congress, Peking threw the intelligence community
off the track: the national leadership attended a table tennis match, and, on the same
day, a provincial leader gave a speech at home, several thousand miles from Peking.
As it turned out, the party congress was in session during the time. In what was an
obvious effort to hide the fact, the meeting was adjourned in midstream to allow
national leaders to appear in public; the provincial leader, who obviously did not
attend the congress, was elected in absentia to the party's ruling Politburo.
When all else fails, Peking resorts to outright deceit. In January, a secret party
meeting elected a new party vice chairman from the ranks of ordinary Politburo
members. After the meeting, in order not to tip the public, the new vice chairman was
listed not among the other vice chairmen but among ordinary members of the Polit-
buro. Thus the meeting and the new appointment remained a secret until Peking
chose to reveal it.
In the hands of the wrong people, the game of appearance watching can result in
widely speculative and highly sensational conclusions. When a national leader does not
appear in public over an extended period of time-say a month or more-the Chinese
people themselves, who watch appearances just as analysts do, invariably begin rumors
about their political demise or death. On one occasion, after Madame Mao had not
appeared in public for a couple of months, some Chinese devised a wild story to
explain her absence: they concluded that she had had a fight, including fisticuffs, with
her husband, and he had killed her. She reappeared a few days later, however, with no
black eyes.
In the case of Mao, who has often withdrawn from public view for long periods,
rumors of his death have plagued analysts for years. If accounts from Chinese officials
and ordinary people over the years were compiled, it would appear the man has died
at least 20 times since the mid-1950s. Today, he remains alive and relatively well,
considering his advanced age. Reports of Mao's death naturally send shQck waves
throughout Washington officialdom. Because there is no way to verify or discredit
these reports until he appears again in public, some China watchers have more than
once been forced to conclude tentatively, and even sometimes in writing, that he was
dying. With the Chinese tendency toward secrecy, it is impossible to predict how soon
after Mao's actual death the Chinese will announce it. There are, of course, a few who
still maintain Mao has been dead for years, and the man seen greeting foreign visitors
is actually a double.
Does Logic Help?
Logic, or common sense, is sometimes the China watcher's only tool for assessing
the veracity of a piece of new information. The problem is that the Chinese, who are
not without common sense themselves, can often disregard it when they choose to. In
SQp roved For Release 2005/06/14: CIA-RDP84B00890R0008000500V3-4
SA Edved For Release 2005/06/14: CIA-RDP84B008901 QQ$Q9Bft1 -4
July 1973, when the first report of preparations for a party congress appeared in China
watchers' in-boxes, many tended to reject it. The party's anniversary had passed a few
days earlier without so much as a major article in the Peking press extolling the virtues
of the party. If a party congress was in fact in the offing, it was reasoned, surely the
Chinese press would have made more of the party's anniversary. Additionally, the
leadership was still sharply divided over a number of serious issues and showed no
signs of resolving differences; the party apparatus in several provinces was still a
shambles. Under these conditions, there seemed no point-indeed, it could be disas-
trous-to convene a party congress.
The Chinese, who were obviously as aware of their problems as China watchers
were, held the congress away. To be sure, the congress was something of a disappoint-
ment. Many important issues remained unresolved, and the congress seemed to raise
more questions than it answered. When, in December, a secret party meeting took
some major steps toward resolving some of the problems, the question was raised again
as to why the congress had been held in August; it obviously would have made more
sense to wait until December, when the political climate was apparently more suitable
for major decisions.
Logic does not fail in every case, however, and it sometimes allows the China
watcher to second-guess even top Chinese officials correctly. At the August 1973 party
congress, Premier Chou En-lai announced that the National People's Congress, China's
legislature, would convene "soon." At the time, the anti-Confucius campaign had just
begun and was likely to cause further divisiveness among the leadership and have
major repercussions throughout the country. With a major political campaign just
getting under way, many China watchers believed that chances of holding the Na-
tional People's Congress under these circumstances were very slim. Nevertheless, no
China analyst worth his salt is going to contradict Chou En-lai and say in writing that
the premier has either taken leave of his senses or does not have a firm grip on the
political scene in China. Chou, as it turned out, had indeed miscalculated: the Na-
tional People's Congress was not held until a year and a half later.
This was not the first time Chou had "misspoken." Earlier, he told a western
reporter that China's harvest would show an increase over the previous year. A month
later, he had to retract that statement; the harvest had in fact shown a four percent
drop. China analysts seldom ignore statements coming directly from Chou with good
reason. The occasional slips, however, can cause confusion.
Statements by high-level Chinese officials on the internal conditions in the coun-
try are so rare that the China watching community must pay particular attention to
them, but there is cause for some caution on this score. A member of the party's ruling
Politburo, in response to a question about the anti-Confucius campaign, calmly an-
swered, "We know what we are doing." At the time, the campaign had already caused
major disturbances in several provinces and was beginning to affect the economic
sector. In fact, shortly after that statement was made, the campaign was all but turned
off. Its only visible result had been a decline in production, clearly not the intent of the
leadership, and China watchers have a right to question whether the Chinese did in
fact know what they were doing or whether they merely knew what they wanted to
do but were not sure they would be successful. It is also possible that the Politburo
member was lying through his teeth or that, while others in the leadership did indeed
know what they were doing, this person, who most observers would conclude was
ultimately a loser in the political sweepstakes of 1974, did not.
Leadership Speeches
While statements by Chinese officials are frequent and relatively easy to come
by, China's leaders stopped making public speeches about domestic political affairs
SApproved For Release 2005/06/14: CIA-RDP84B0089OR000800 8b l5-4
CfA1*Vft ;ffQr Release 2005/06/14: CIA-RDP84B00890R00080ggW-4
several years ago. One Politburo member tours the provinces giving addresses on
agriculture, but save for these and two general wrap-up speeches by Premier Chou
En-lai at major leadership meetings in the past two years, no Chinese leader had gone
on public record regarding internal affairs since the mid-1960s.
This situation contrasts sharply with that of the Soviet Union. In recent years
Moscow had held party congresses on a fairly regular basis; the congresses hear a major
address that usually drags on for hours, in which party leader Brezhnev reports on
party affairs, and another long speech by the Soviet Premier on the economy. These
speeches and many others delivered on less ceremonial occasions are made public. At
China's last party congress-only the third since the Communists came to power-
Mao was said to have made a few brief opening remarks, which were not made public.
In fact, Mao has not made a public speech since 1949. While Soviet analysts chew on
marathon speeches by Brezhnev, China watchers must content themselves with the
brief, usually enigmatic, quotations that Mao issues periodically.
Chou En-lai's two speeches were a mixed bag of political, economic, and foreign
affairs. Even at the National People's Congress, China's vehicle for reporting on and
ratifying government policies, there was no separate report on the economy-at least
no report that was made public.
Precedents and Past Performance
One analytical tool that has been all but rejected by China watchers is the use of
precedents. The Chinese have broken with past practice on several occasions in the last
two years, and China watchers have frequently been led astray by trying to predict
events on the basis of past patterns. The party congress is a good example. Congresses
have usually been preceded by a plenary session of the party Central Committee. The
plenum, held in secret but revealed after it is over, usually issues a call to convene the
congress. On its first day, Peking announces the opening of the congress and issues
periodic reports during the session. The congress is usually held in Peking's grandly
named building, the Great Hall of the People. Lights burning late at night in the
building, and large numbers of cars, buses, and limousines parked outside are visible
signs to Peking residents that a major meeting is in session.
In August 1973, however, there was no Central Committee plenum, no sign of
activity at the Great Hall of the People, and presumably no congress. As China an-
alysts watched and waited for the usual signs, Peking surprised everyone by announc-
ing that the congress was over.
The National People's Congress of 1975, held in January, revealed another break
with precedent. This meeting has usually been a public affair: banners in Peking greet
the delegates as they arrive, foreign visitors have attended, and the press builds up the
event with frequent references to it. On several earlier (and abortive) attempts to hold
the conclave, the press did indeed refer to it, and more than once the New Year's Day
pronouncement from Peking indicated it would be held within the year. This year, the
New Year editorial ignored it, but the meeting was secretly held two weeks later
In an important departure from the standard way of doing business, widespread
personal attacks on high ranking party and military officials throughout 1974 have
thus far had no visible effect on their political health. During the Cultural Revolution,
if an official was publicly criticized in wall posters, this spelled the end of his political
career-in most cases he was either about to fall or had already been stripped of his
power. Officials attacked in wall posters last year, however, adopted a very casual
attitude toward the process; some even went out of their way to point out the posters
to foreign visitors. None of those attacked last year, including some who came under
SECA6~roved For Release 2005/06/14: CIA-RDP84B0089OR00080005003-4
ved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
S T China-Watching
extremely heavy fire in several different provinces, have been purged. Today, wall
posters are apparently not as damaging as they were a decade ago, but China watchers
were misled into thinking one of the party vice-chairmen was purged because he was
widely criticized in posters.
Peking Directives
Directives from Peking, in essence the laws of the land, are usually a good way to
gauge the intentions of the leadership. Ironically, as knowledge of the contents of these
directives has increased, thanks to clandestine collection efforts, the number of
directives issued each year has steadily declined. From some 90 in 1971, to perhaps 60
in 1972, to 44 in 1973, the number hit an alltime low of approximately 27 last year.
With such a large country to manage, presumably there are a number of issues
demanding the attention of the leadership and requiring specific and authoritative
instructions from Peking.
Disagreements in the leadership over a number of questions may have contrib-
uted to the declining number of Peking directives. In some instances, these differences
manifest themselves in contradictory directives. The occasional reversals are usually
short-lived and have not affected the general trend of events, but they raise impor-
tant-and puzzling--analytical questions. How can one faction in the leadership he
strong enough to push through a directive one day but be unable to get it enforced the
next? How can they block a personnel appointment for months but suddenly be
powerless to stop it? And who, in fact, are "they"?
Last year, most directives from Peking set strict limitations on the conduct of the
anti-Confucius campaign: officials could not be criticized by name; wall posters, writ-
ten by the general populace to expose the "crimes" of unnamed officials, could not be
posted outside public buildings where foreign visitors could see them; and people were
not to bring their complaints to Peking but were to stay in their provinces and resolve
their differences at home. Suddenly a new directive was issued which said just the
opposite: it was all right to attack officials by name, posters could be put up anywhere,
no effort was to be made to prevent foreign visitors from reading them, and the people
were invited to come to Peking to express their grievances.
Taking Peking at its word and acting in accordance with the latest official direc-
tive, a number of people descended on Peking, mounting posters throughout the city
attacking several important officials by name. The poster writers were quickly sup
pressed: they were harassed, and sometimes jailed, by the security forces, and their
posters were often torn down as soon as they were put up. The poster writers were
then sent home to their provinces, and from then on the campaign proceeded as
though the latest directive had never been issued. If the new directive came as a
surprise to China watchers, it must have been an even greater surprise to the unfortu-
nate people who acted on it and got themselves arrested for following Peking's latest
instructions.
There are times in the China business when having solid information about a
particular event is more confusing than it is enlightening. If the event is reported in
the western press, it can even be a nuisance. For example, a large meeting was held in
Peking in the summer of 1973, as China watchers were looking for signs of a party
congress. Because the meeting was public, reporters got wind of it and accounts of the
meeting appeared in the western press. China watchers knew the meeting was not a
party congress-it was too large-but do not know even today what that meeting was
all about and some wish they had never known of its existence.
54Approved For Release 2005/06/14: CIA-RDP84B00890R0008090~%g43-4
CA&a c~iFor Release 2005/06/14: CIA-RDP84B00890R00080ggE~&-4
Despite the vicissitudes of China watching, analysts in some cases are better
informed about the situation in China's provinces than China's own national leaders
are. As early as 1970, for example, it became obvious to China watchers, through
intelligence reports and provincial radio broadcasts, that urban youth sent to live and
work in the countryside were being consciously discriminated against with the ac-
quiescence of local authorities. The situation seemed to come as something of a shock
to Mao, when he first learned of it in 1973. A school teacher, with a son out in the
country and apparently with contacts who could see that messages got to the leader-
ship, sent a letter to Mao describing the living conditions of urban youth in the rural
areas. Mao was outraged and ordered that steps be taken immediately to end discrimi-
nation against these young people. Not until 1974, however, after Peking had long
since issued yet another directive on the subject, did local authorities begin to move on
this question.
Cases of major disruptions or flagrant disobedience in the provinces, of course,
eventually come to Peking's attention. In such cases, national leaders acting as trouble
shooters often visit the province in question to help solve the problems. In this context,
discrimination against urban youth is a relatively minor problem and one that is not
likely to reach the ears of China's leaders on its own. Local officials, after all, are not
going to report to Peking that they are deliberately giving urban young people a hard
time, but this is exactly the kind of information that refugees are best qualified, and
most likely, to report to China watchers. Paradoxically, the intelligence community
can beat the Chinese leaders on this issue, not one of especially high priority, while the
Chinese can consistently outfox us on the major issues that we watch so closely.
Disinformation
In addition to the usual analytical problems, Peking has two enemies-Moscow
and Taipei-who insist on inundating the world with disinformation. China watchers
can usually quickly discern and discard the more obvious fabrications, but the press is
less discriminating. Lies ofter become accepted as facts simply because they appear in
a number of western newspapers. The heavyhanded disinformation tactics have often
led China watchers to disregard any information coming from either Moscow or Tai-
pei. This is unfortunate, because on several occasions they have both come up with
sound, accurate, and important information. The Chinese Nationals somehow manage
to get the full texts of a number of Peking directives, and these are not hard to
distinguish from those that they fabricate. The Soviets, for their part, scooped every-
one on the election of a new member of the Chinese Politburo and also correctly
predicted the precise dates during which the National People's Congress would he in
session. China watchers must be careful not to throw out the baby with the bath water.
With all the ins and outs of China watching-the layers of secrecy, the shifting
political winds, the analysis of obscure propaganda articles, the scrutiny of leadership
appearances-those less close to the China scene are tempted to view the China prob-
lem as insoluble and to write the Chinese off as "inscrutable." China watchers, of
course, do not have that luxury, and most of them would disagree that the Chinese are
impossible to understand. It may seen ridiculous to others that China watchers learned
to distinguish military officers from enlisted men, when ranks were abolished and
insignia removed, by the number of pockets on their tunics, or that some China
watchers have noticed a remarkable correlation between those Chinese leaders who
wear sunglasses in public and those who eventually lose their jobs. That is, after all, the
unique feature of the China watching business: there are almost no clues that are not
worth following up. On those rare occasions when there is solid information about a
SE I *oved For Release 2005/06/14: CIA-RDP84B00890R00080005Q 3-4
Sp i-pved For Release 2005/06/14: CIA-RDP84B00890H,%%?%q pc9)00~3-4
major development, the often divided China watching community can usually agree
on its implications and on Chinese motivations. It is not hard to understand the Chi-
nese; it is just hard to get information about them.
(From Volume 19 Number 1, p. 23, 1975; Secret)
SECRET
56Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R00080,WQ@J3-4
NOFORN
Targeting the first U-2 coverage
of Soviet Nuclear facilities
MISSION TO BIRCH WOODS
Via Seven Tents and New Siberia
I suppose I remember so distinctly working on nuclear targets for the U-2 mis-
sions of late August 1957 because this was my first direct experience with recon-
naissance operations, and first impressions are lasting. Besides, it was a striking re-
minder of my 1944 mission from a basic training camp in Alabama to a telephone
number in Knoxville, Tennessee, which turned out to be the secret atomic city of Oak
Ridge. Here in 1957 my prime target was a secret atomic city known as the Post Box,
Tomsk, in central Siberia.
There was also at the time an anticipatory feeling of self-vindication. In 1945 I
had been impressed with the accuracy of a wartime estimate of the output from the
famous Joachimsthal uranium mines of Czechoslovakia, an estimate based on aerial
photographs taken a year apart. So in 1949, after the first Soviet nuclear test, I had
advocated photoreconnaissance of the nuclear production sites in the Urals. I actually
persuaded the Air Force member of the Joint Atomic Energy Intelligence Committee
to submit a formal proposal for flying the Urals in a B-25 which would take off from
Iran and afterwards be ditched beside an aircraft carrier in the Barrents Sea off
Novaya Zemlya. We still have in the files Secretary of State Dean Acheson's reply,
through the DCI to the Chairman of JAEIC, denying as of 30 December 1949 per-
mission to implement the scheme.
U-2 Against the Atom
I was convinced that satisfactory photographic coverage of a U-235 separation
plant, or of a plutonium production reactor, would be worth the proverbial thousand
words, giving information "on electric power consumption, cooling water consump-
tion, plant arrangement and size, new construction, and the physical details which,
when analyzed, should enable us to make a much better estimate of Soviet critical
material production," ' I would have been shocked at the suggestion that it might take
months of steady work by competent photointerpreters aided by the best procurable
consultants to work out the real intelligence meaning of a picture. Yet this was to be
the case. The Russians, not being able to copy our atomic facilities, had had to en-
gineer and design their own from scratch. We were thus to face a real cryptographic
problem in trying to interpret the totally foreign engineering shown in the U-2
photography.
The atomic sites near Tomsk, those to the east near Krasnoyarsk, and the nuclear
weapon proving ground known through seismic measurements to be near Semipala-
tinsk had been selected on 27 May 1957 by interagency agreement in the Ad Hoc
Requirements Committee as three prime objectives for flights over central Asia and
Siberia. Other major objectives than the atomic ones included what is now the Tyura
Tam missile test range east of the Aral Sea, the aircraft industry in Omsk and Novo-
S oved For Release 2005/06/14: CIA-RDP84B0089OR000800050693-4
MORI/HRP PAGES
57-63
SEf9Prfoved For Release 2005/06/14: CIA-RDP84B00890R0VA%0 3-4
sibirsk, and beyond the latter all of Stalin's second industrial bastion, the Kuznetsk
Basin. It was the conjunction of all these targets with immediate bearing on weapon
systems that had persuaded first the ARC, and then eventually U-2 Project Director
Richard M. Bissel and DCI Allen Dulles to cash in the blue chips necessary to procure
take-off bases along the southern periphery of the USSR and China.
As an analyst in CIA's Office of Scientific Intelligence, I was therefore directed in
July 1957 to work up target briefs, by priority, for all atomic targets in the enormous
geographical area of central Asia and Siberia. The U-2 program was still being kept
under extraordinary security measures, and I did my targeting in the Blue Room, a
small centrally located secure area away from my normal desk. Psychologically, we
were prepared to be not only secure but devious: the Blue Room was in fact painted
light green.
The targets thus identified were to be used by the operational side of the program
in planning the actual flights or missions. The procedure was to plan each specific
mission around one or two of the ARC's highest-priority targets but to cover as many
lower-priority targets as possible along the way. As targeteer, I became involved in
selecting the flight path because the best photography, that from the vertical angle,
covered a band only five miles wide: it was desirable to orient this band lengthwise
over an oblong target and adjust it in other respects so as to counteract possible errors
in target location or in navigation.
Semipalatinsk had been so named because seven trading companies had main-
tained residencies there when it was an important crossroads on the caravan trails to
China and the fabled cities of Samarkand and Bukhara to the south. Twenty-odd
nuclear tests had occurred near there in the last eight years, but the exact location of
any test was not known closer than within thirty miles. I had no idea how big the test
area was. Our own atomic test site at Frenchman's Flats in Nevada, measured against
a five-mile-wide camera swath, was of astronomical size.
I finally asked Doctor Donald Rock of the Air Force Technical Applications
Center (then AFOAT-1)2 to average for me the seismic epicenters of the five largest
nuclear detonations at Semipalatinsk. The geographic coordinates for this "centroid"
turned out to designate a spot in the featureless desert some seventy miles due west of
Semipalatinsk, about one-third of the way to Karaganda. It was south of the old
caravan trail, and the only names on the map in the vicinity were those of seasonally
dry salt lakes. This was an arbitrary pin-point for a highest-priority target whose
location was so poorly known that it ought to be represented as a hand-sized blur on a
standard aeronautical chart-a hardly realistic target in operational terms.
This difficulty in locating the Semipalatinsk nuclear proving ground pointed up
the essence of our dilemma: we needed and wanted U-2 flights in central Asia and
Siberia because we knew so little about what was going on there; yet unless we had
precise knowledge of an activity and where it was located, we would stand little
chance of photographing it. General Philip G. Strong, director of scientific collection
in CIA, who had had much World War II reconnaissance experience, was on the side
of precision in targeting and of detailed justification for the collection priority given
each target. He questioned the accuracy of maps and suggested that targets be located
relative to major features that could be identified visually rather than by coordinate
systems of longitude and latitude. That we could not do in this case.
2 For the early history of AFOAT-1 see Northrup and Rock's "The Detection of Joe 1" in Studies X 4,
p. 23 ff.
58Approved For Release 2005/06/14: CIA-RDP84B00890R000806k$3-4
BiA11tp For Release 2005/06/14: CIA-RDP84B00890R000800
,6p@}3-4
Nearer Targets
Thus it was with renewed care that I assembled data on other atomic targets in
this area. I reviewed the atomic sites which had been listed in 1955 for the Genetrix
program, in which free balloons bearing cameras were allowed to drift across the
USSR on predetermined paths. Lower-priority targets included the uranium con-
centration plants of Combine 6 in the Fergana Valley, notably one just south of
Leninabad at Ispisar, one north of Leninabad near Taboshar, and one a good many
miles to the east near Andizhan. These had already been located as well as possible: a
1947 Jewish refugee who has driven a bread truck to each of them had been inter-
rogated exhaustively and then resettled with appreciation in Brazil. Incidentally, there
had been a curious problem with the maps he drew: east of where the Syr Darya river
turns north on its way to the Aral Sea he had swapped north and south, but west of
there his maps were right side up. In several instances his reporting had been con-
firmed by returned prisoners of war.
Other uranium concentration plants which belonged to Combine 8 lay east of
these toward the Pamir Knot and south of Alma Ata, but their locations were at best
poorly known and targeting was considered doubtful.
Krasnoyarsk
Ever since we had learned that Novosibirsk, Tomsk, and Krasnoyarsk, deep in
Siberia north and east from Semipalatinsk, were the location of the second generation
of Russian atomic sites fathered by those in the Urals 5 we had maintained a special
watch on these cities and the countryside nearby. Krasnoyarsk had been made off
limits to foreigners by 1948, and information about the atomic site on the east bank of
the Yenisey river some 35 miles downstream (north) from the city had been especially
hard to come by. The defector Icarus reported in early 1951 that many trainloads of
mining equipment had been sent there the year before from Wismut, A.G., the vast
Russian uranium mining enterprise in East Germany, so he believed the purpose of the
new enterprise at Krasnoyarsk to be the mining of uranium. By 1952 all administrative
centers in the peninsula of land south of the confluence of the Kan and Yenisey rivers
and north of the Trans-Siberian Railroad had disappeared from the annual editions of
"Deleniye," the published MVD listing of administrative centers in the USSR.
Then a German prisoner of war had been returned to West Germany, who,
despite all the Russian rules and regulations, had actually spent several years as a
construction worker at the Krasnoyarsk atomic site. He reported hearsay information
about many kilometers of tunnels all lined with concrete. His name for the associated
town was Komsomolsk na Yenisey. In early 1957 a Genetrix balloon was recovered
from the Aleutian islands with a number of aerial photographs of Dodonovo, as the
Krasnoyarsk site came to be known after an old village there. These photographs
showed an enormous construction effort-a new city of apartment houses, labora-
tories, warehouses, and machine shops-and a vast mining enterprise. There was every
reason to believe that higher-resolution photography would clarify the functions of the
large, complex, and possibly underground installation.
The uranium metal plant northeast of Novosibirsk had also first been identified
by the defector Icarus. In 1956 Doctor Nikolaus Riehl and other German scientists
formerly engaged at Elektrostal, near Moscow, in research on uranium metal manu-
SEWoved For Release 2005/06/14: CIA-RDP84B00890R00080005063-4
S ved For Release 2005/06/14: CIA-RDP84B00890ROWN00 $3-4
facture " confirmed and updated Icarus' testimony. Attaches had photographed it
from the Trans-Siberian Railroad in 1952 and 1954 because of its evident size and
importance, and George Monk, now State Department representative on JAEIC, had
identified it by comparing these photographs with material filed in the old Industrial
Register under the name "Stalin Auto Works," apparently the local cover name for the
enterprise. It could be located within half a mile of permanent map features.
A uranium metal manufacturing facility was basically of second priority as a U-2
mission objective, but across the Trans-Siberian Railroad was the Novosibirsk Airframe
Plant, an additional reason for the U-2 to visit this northeast suburb of Novosibirsk.
Post Box, Tomsk
The atomic site near Tomsk was a matter of more concern, though the amount of
information on its function and location was woefully sparse. Furthermore, it was at
extreme range so that the aircraft could not, in fact, spend time hunting for it even
though we felt we could justify such an effort as against a prime target. Our collection
effort against this site had been especially impeded by the 15 January 1952 Soviet
order closing Tomsk, Novosibirsk, Omsk, and other specific areas to foreigners because
Tomsk was not accessible, like Novosibirsk, to attache photography from the Trans-
Siberian Railway.
There had been a number of remarks in reporting about something atomic or
about a special post box in connection with Tomsk. These had led to the location and
interrogation of a few prisoners of war who had at one time or other been in the area
before returning to West Germany in 1954 and of a few ethnic Germans who had
been returned in 1956. By now in 1957, however, the resulting evidence of a kind one
could put one's finger on was all contained in just three reports and the analysis of a
fur hat.
The latest of these reports was from an ethnic German who claimed to have been
employed in Tomsk in 1955 as a blacksmith. He told his Army interrogator that local
inhabitants had facetiously suggested "Atomsk" would be a better name for the town.
He knew of no clearly atomic installation in particular but had heard of an under-
ground secret plant and settlement called "Kolonne [Labor Brigade] 5" located north-
east of the Tomsk II railroad station.
Another returned ethnic German told his British interrogator he had heard of an
industrial enterprise engaged "in manufacturing fillings for atomic weapons locally
known as the Post Box." In Tomsk II he had seen a large building with barred win-
dows on all floors and a large sign saying "Information Office, Personnel Department.
Post Box." He knew of two relatively small sites belonging to the enterprise, one east
and the other northeast of Tomsk.
On reinterrogation this man mentioned traveling north from Tomsk II on a bus
belonging to the Post Box when going to visit a friend of his in a lunatic asylum located
on the southern fringe of a prohibited area. He reported seeing railway trains running
into the prohibited area carrying coal, wood, and building materials. He had also
heard that persons employed there were well paid and received preferential treatment
in the distribution of foodstuffs, etc. He mentioned seeing at a distance of six to eight
kilometers north of Tomsk II three large chimneys which emitted black smoke.
The interrogator noted that the source had a very poor memory, seemed to be
suffering from some kind of mental disorder, and was preoccupied with his plans to
emigrate to Canada. Clearly, neither of these two reports tended to inspire confidence
69pproved For Release 2005/06/14: CIA-RDP84B00890R000800fW-4
Bir fP17W9&SP For Release 2005/06/14: CIA-RDP84B0089OR00080 RO93-4
in the existence of a major atomic installation in the Tomsk area, let alone its precise
location.
The story of a returned German prisoner of war who had been employed in 1949
as a tailor in a small factory northwest of Beloborodovo, some twelve kilometers north
of Tomsk city, seemed much more persuasive. Interrogated by the Air Force, he
reported that within eight days in April or May 1949 some 12,000 penal workers
passed through the bathing and delousing facilities of the Beloborodovo penal camp
and were put to work in a secure area fenced off between his factory and the village of
Iglakovo, several kilometers north and west down the Tom river. The tailor, clearly
proud of his professional ability and reputation, said that many military officers of the
construction staff in charge of this project came to his tailor shop to get their uniforms
fitted properly.
This military construction outfit had arrived, complete with families, from Tallin
where they had just completed another large job. In charge was a Soviet general who
had arrived in April with his staff. Interestingly, from the point of view of MVD
responsibility for nuclear facilities, the guard force was of a different subordination
and neither lived nor mingled with the construction staff officers. The tailor's Russian
supervisor had told him that the fenced-off area was to be an atomic energy plant.
In an application of environmental sampling, CIA scientific officer John R. Craig
had obtained in the summer of 1956 a fur hat from one of the ethnic Germans who
had recently lived in Tomsk. Its analysis, done by AFTAC with the aid of AEC
laboratories, was at last conclusive: its exterior surface contained 50 parts per billion of
uranium that was slightly, but definitely, enriched in the U-235 isotope. Since no U-
236 was detectable, the uranium was not from fall-out, nor had it been through a
reactor. Additional analyses for plutonium, radio-iodine, and separated lithium iso-
topes were all negative.
The U-235 enrichment was evidence of U-235 separation in the Tomsk area. The
fabrication of nuclear warhead components was an alternative possibility, but the size
of this atomic operation seemed much too great for that. The evidence was against its
being a reactor with associated chemical plant or a lithium isotope separator. I made
my target a U-235 separation plant and centered it on the spot where the German
tailor had seen 12,000 prisoners go to work. The die was cast.
Luck at the Proving Ground
In late August 1957 the missions were flown-rapidly to minimize possible
counteraction, and many of them to cover as much useful area as possible. Here we
cannot review all the results but will cite some of the outstanding ones.
One flight was planned around Stalinsk in the Kuznetsk Basin and Alma Ata in
the Kirgiz SSR as prime targets. In between, the Semipalatinsk proving ground was a
prime target, but confidence in its location was so low that the cities of Semipalatinsk
and Karaganda were made way-stations and the flight path between them adjusted to
hit the latitude and longitude of my seismic centroid. Mention of the proving ground
was dropped from the flight plan for security reasons ("Why give away knowledge if
you don't have to?"). I doubt that anyone thought seriously about the danger of flying
into a nuclear test.
The coordinates turned out to be good. The U-2 passed directly over the proving
ground on 22 August 1957, and the pilot got a thrill. He had many times flown over
our Frenchman's Flats, and he recognized what he saw. Moreover, he saw that the
shot-zone had been cleared and they were ready to fire.
SEC roved For Release 2005/06/14: CIA-RDP84B00890R00080005003-4
SEoved For Release 2005/06/14: CIA-RDP84B00890R0O,pMW56893-4
It was actually four hours later that Joe 36 was detonated; it was airdropped and
went half a megaton. The pilot had photographed it and its carrier aircraft on the
ground when he had flown over the Semipalatinsk airfield and associated nuclear
weapon facility. The nuclear weapon "cab" he apprehensively spotted on the shot-
tower at the proving ground was for a low-yield device that was not to be detonated
until 13 September.
Other Findings
The same mission photographed a well-planned, modern community of 20,000
people not previously known of on the north shore of Lake Balkhash. This turned out
to be the headquarters of the Sary Shagan antimissile test range, a real find. It also
covered the uranium mill at Kadzhi-Say near the west end (not the east end as t had
thought) of Lake Issyk Kul5 south of Alma Ata, proving that the Russians had large
modern uranium mills. The uranium mines of Bystrovka were covered but not found
in the film for another year.
The flight that was to cover the Dodonovo mining site near Krasnoyarsk failed
with respect to this target because of heavy cloud cover, an all too familiar occurrence
in the reconnaissance business.
The uranium metal plant at Novosibirsk turned out to be quite a large installa-
tion, including what is probably a large lithium isotope separation plant then under
construction between its raw uranium ore facility and its thermal power plant.
Birch Woods
The outstanding target, the Tomsk atomic site, was covered on 21 August in clear
vertical photography. The tailor's location for it proved correct. Allen Dulles is said to
have exclaimed jubilantly, when he heard the news, "You mean you really did know
that something atomic was going on 'way out there in the wilds of Siberia!"
As summarized in the mission report, the installation
covers an irregular shaped area of about 40 square miles on the right bank of
the Tom River. No single atomic energy complex in the western world in-
cludes the range of processes taking place here. The villages of Iglakovo and
Beloborodovo are encompassed in the housing and administration area along
the river. On the west edge of the area, a large thermal power plant with an
estimated capacity of 400 megawatts is undergoing further expansion. Fur-
ther power is provided by Gres II in Tomsk and by tie-ins to the Kuzbas
Grid. East of this plant is located the feed and processing section and gaseous
diffusion plants. One gaseous diffusion building is uncompleted. On the east
edge is located the reactor area. One of the two reactors appears to be in the
final stage of construction. A maintenance and construction area is just north
of these areas. On the northeast edge, a plutonium chemical separation area
is uncompleted. A mud lake dump area is on the north edge of the complex
outside of the fence which encompasses the whole installation. It is rail
served by a spur line from Tomsk.
Actually, one reactor was already in operation, and two more were tinder
construction. These latter would eventually turn out by-product electric power. The
gaseous diffusion U-235 separation facility, with its four operating buildings and a
fifth under construction, was about one-sixth the size of that at Oak Ridge, which
drew about 2000 megawatts of electric power.
"Warm Water," so named because its salinity kept it from freezing.
6Approved For Release 2005/06/14: CIA-RDP84B00890R000800 'W~-4
Bir*WMoardtl For Release 2005/06/14: CIA-RDP84B00890R000800@6QQg3-4
The photograph could not tell us, of course, for the purpose of production es-
timates just how long each installation had been operating or would begin, nor what
the Russians called them. Fortunately, we were able in the spring of 1958 to talk to a
defector who had been a soldier in a military construction brigade working there from
July 1955 to February 1956. He solved many of our time schedule problems and
supplied names and identities. The general address of the whole installation was Post
Box 5, Tomsk. The new city was named Berezki, Birch Woods, and the birch forest
was still preseved around the city then, for the Russians love such forests.
Beloborodovo had apparently been expanded to become the construction workers'
town of Chekist (Tomsk 19), presumably in honor of their connection with the MVD,
and Iglakovo had become Kuzminka (Tomsk 17). The man in charge was Major
General Tzarevskiy, who had built the steel town of Nizhniy Tagil in the Urals in the
1930's.
This was the important atomic installation that now took shape out of mere
indications and the vague rumors given substance by a fur hat and location by a tailor.
(From Volume 12 Number 4, p. 1, 1968; Secret/Noforn)
SEW~roved For Release 2005/06/14: CIA-RDP84B0089OR00080005003-4
Approved For Release 2005/06/14: CIA-RDPW0 6W1%0W&&0 03-4
A review of legal precedents for protecting
sensitive information from disclosure in
the courts and Congress, with particular
reference to Central Intelligence privileges
EXECUTIVE PRIVILEGE IN THE FIELD
OF INTELLIGENCE
Recent agitation in congressional and newspaper circles against "secrecy in gov
ernment" has focused attention on information security measures in the Executive
Branch. The courts, too, have declared in recent months that information used by the
government in preparing criminal prosecutions and even some administrative
proceedings must he divulged, at least in part, as "one of the fundamentals of fair
play."' In this atmosphere, the intelligence officer may reflect on the risk he runs of
being caught between the upper and nether millstones of congressional or court de-
mands on the one hand and the intelligence organization's requirement for secrecy on
the other.
Actually, the problem of demands for the disclosure of information which the
government considers confidential is not a new one, as can be seen from the history of
the Executive Branch's struggles to withhold information from the courts and Con-
gress. The Executive had based itself in these struggles on the doctrine of the separa-
tion of powers among the three branches of government, which holds that no one of
the branches shall encroach upon the others.
The Separation of Powers
Demands for the disclosure of information held by the Executive have been made
by the courts and by the Congress since the early days of the republic. On the other
hand, the very First Congress recognized, more than a year prior to the ratification of
the Bill of Rights, that some of the information held by the Executive ought not to be
divulged. An act passed on 1 July 1790 concerning "the means of intercourse between
the United States and foreign nations" provided for the settlement of certain expend-
itures which in the judgment of the President should not be made public.' During his
first term of office President Washington, anxious to maintain close relations with
Congress, on several occasions passed information to the Congress with the warning
that it not be publicized. In a special message dated 12 January 1790, for example, he
wrote:
I conceive that an unreserved but a confidential communication of all
the papers relative to the recent negotiation with some of the Southern
Communist Party v Subversive Activities Control Board; U.S. Court of Appeals, District of Columbia
Circuit, decided 9 January 1958.
2 Richardson, Messages and Papers of the Presidents, 2283.
~q EE L ffJ~
FA$pr~ved~or RdFeaOse 2Y005/06/14 : CIA-RDP84B0089OR000800050003-4
Fpop ,JAQi brl- IOQW1Q005/06/14: ?1eR1 84 i QF OM9 QQe-4
Tribes of Indians is indispensibly requisite for the information of Congress. I
am persuaded that they will effectually prevent either transcripts or publica-
tions of all such circumstances as might be injurious to the public interests.;
Two years later, in March 1792, a House resolution empowered a committee to
call for such persons, papers, and records as may be necessary to assist their inquiries"
into Executive Branch actions with respect to a military expedition under Major Gen-
eral St. Clair. The president did not question the authority, of the House, but wished to
be careful in the matter because of the precedent it might set. He discussed the
problem with his cabinet, and they came to the conclusion:
First, that the House was an inquest and therefore might institute in-
quiries. Second, that it might call for papers generally. Third, that the
Executive ought to communicate such papers as the public good would per-
mit and ought to refuse those the disclosure of which would injure the pub-
lic: Consequently were to exercise a discretion. Fourth, that neither the
committee nor the House had a right to call on the Head of a Department,
who and whose papers were under the President alone; but that the commit-
tee should instruct their chairman to move the House to address the
President.'
By 1794 President Washington, then in his second term, began to show less lib-
erality in divulging information to Congress, for on 26 February of that year he sent a
message to the Senate stating that "after an examination of [certain correspondence] I
directed copies and translations to be made except in those particulars which, in my
judgment, for public consideration, ought not be communicated." 5 Two years later,
on 30 March 1796, he transmitted to the House his famous refusal to divulge certain
information requested by the House in connection with the Jay Treaty. In this treaty,
many people believed, the young republic did not get enough concessions from the
British, and the Federalists who supported it had become the target of popular resent-
ment. Washington replied as follows to a House resolution:
I trust that no part of my conduct has ever indicated a disposition to
withhold any information which the Constitution has enjoined upon the
President as a duty to give, or which could be required of him by either
House of Congress as a right ... The matter of foreign negotiations requires
caution, and their success must often depend on secrecy; and even when
brought to a conclusion, a full disclosure of all the measures, demands, or
eventual concessions which may have been proposed or contemplated would
be extremely impolitic.
Pointing out that he had been a member of the general convention and therefore
" knew the principles on which the Constitution was formed," Washington concluded
that since "it is essential to the due administration of the government that the bound-
aries fixed by the Constitution between the different Departments should be pre-
served, a just regard to the Constitution and to the duty of my office under all cir-
cumstances of this case forbids the compliance with your request." B
Thus, during Washington's administration the doctrine of the separation of pow-
ers came to provide the basis for executive privilege in withholding information. This
s Id. 63,
Writings of Thomas Jefferson, 303-305.
' Richardson, op. cit. supra, note 2, 144. Italics supplied.
6 id.186.
66
Approved For Release 2005/06/14: CIA-R[-J ~&VSI b bb03-4
l~V~ r~41'e is r 9p1~/ 84 : CIA-RDP84 %Q8QW#?` QL3f4
U-APV
doctrine, not specifically enunciated in the Constitution, emerged from decisions
taken on specific political situations which arose during the first years of the republic,
as the same men who wrote the Constitution interpreted it in such ways as they
thought promoted its intended ends. In this way it was established that the Executive
Branch of the Government has within its control certain types of executive documents
which the Legislature cannot dislodge no matter how great the demand. The Execu-
tive Branch can be asked for documents, but should exercise discretion as to whether
their release would serve a public good or be contrary to the public interest.
The Judiciary also recognized, as early as 1803, the independence of the Execu-
tive Branch and its ability to control its own affairs. Chief Justice Marshall wrote:
"The province of the court is, solely, to decide on the rights of individuals, not to
inquire how the Executive, or executive officers, perform duties in which they have a
discretion. Questions in this nature political, or which are, by the Constitution and
laws, submitted to the Executive, can never be made in this court."'
It is notable that this executive privilege was applied in the congressional cases
cited above to the President's responsibility for foreign affairs. Under the Continental
Congress, the Department of Foreign Affairs had been almost completely subject to
congressional direction. Every member of the Congress was entitled to see all records
of the Department, including secret matters. But after the Constitution was written,
and pursuant to its grand design based on the separation of powers, Congress in 1789
subordinated the Department of Foreign Affairs to the Executive Branch and pro-
vided that its Secretary should have custody and charge of all records and papers in
the Department. In 1816 the Senate Foreign Relations Committee declared that the
"President is the Constitutional representative of the United States with regard to
foreign matters" and that the nature of transactions with foreign nations "requires
caution and success frequently depends on secrecy and dispatch."
Precedent in Intelligence Cases
Intelligence activities, intimately linked with foreign policy, played their part in
the evolution of the Executive Branch's position on disclosure of information. In 1801
Congress interested itself in the expenditures of various Executive Departments and
instituted an inquiry "as to the unauthorized disbursement of public funds." in reply
to charges that the War Department expended funds for secret service not authorized
by law, Oliver Wolcott (Comptroller of the United States 1791-1795; Secretary of the
Treasury 1795-1800) gave a clear exposition of the accounting requirements of intel-
ligence which is applicable today:
I never doubted for one instant that such expenditures were lawful, and
that the principle should now be questioned has excited a degree of astonish-
ment in my mind at least equal to the "surprise" of the Committee.
Is it then seriously asserted that in the War and Navy Departments-
establishments which from their nature presuppose an actual or probable
state of war, which are designed to protect our country against enemies-
that the precise object of every expenditure must be published? Upon what
principle are our Generals and Commanders to be deprived of powers which
are sanctioned by universal usage and expressly recognized as lawful by all
writers of the Law of Nations? If one of our Naval Commanders now in the
Mediterranean should expend a few hundred dollars for intelligence respect-
ing the force of his enemy or the measures meditated by him, ought the
present Administration to disallow the charge, or publish the source from
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500&'-4
F?R IFkf?r1jgfleg 112005/06/14: % ?J199?89RR9 9X09Rp~-4
which the intelligence was derived? Is it not equivalent to a publication to
leave in a public office of accounts a document explaining all circumstances
relating to a payment? Ought the truth be concealed by allowing fictitious
accounts? Could a more effectual mode of preventing abuses be devised
than to establish it as a rule that all confidential expenditures should be
ascertained to the satisfaction of the Chief Magistrate of our country, that his
express sanction should be obtained, and that the amount of all such expend-
itures should be referred to a distinct account in the Public Records? 8
The statute referred to in the debates was an Act of Congress passed on 9 Feb-
ruary 1793 which gave the President authority, if the public interest required, to
account for money drawn from the Treasury for the purpose of "intercourse with
foreign nations" simply by his own certification or that of the Secetary of State.
Actually, this statute reaffirmed the similar legislation of 1790 providing for the settle-
ment of certain expenditures which, in the judgment of the President, ought not be
made public.,, The substance of these Acts was revived and continued in later legisla-
tion, and President Polk utilized it in 1846 in refusing to accede to a House resolution
requesting an accounting of Daniel Webster's expenses as Secretary of State in the
previous administration.
In 1842 Webster had negotiated an agreement with the British representative,
Lord Ashburton, on the long-disputed boundary of Maine. To make the treaty more
palatable to the public and enhance its chances of ratification in the Senate, Webster
had spent money out of "secret service funds" to carry on favorable propaganda in the
religious press of Maine. Senator Benton termed this practice a "shame and an in-
jury ... a solemn bamboozlement." A Congressional investigation followed, during the
course of which the request was levied upon President Polk.
President Polk based his refusal to comply on the statutes which gave the Presi-
dent discretionary authority to withhold details on how money was spent. He sup-
ported his predecessor's determination that the expenditure should not be made pub-
lic, asserting that if not "a matter of strict duty, it would certainly be a safe general
rule that this should not be done." In his message to Congress he acknowledged the
"strong and correct public feeling throughout the country against secrecy of any kind
in the administration of the Government" but argued that "emergencies may arise in
which it becomes absolutely necessary for the public safety or public good to make
expenditures the very object of which would be defeated by publicity." He pointed
out as an example that in time of war or impending danger it may be necessary to
"employ individuals for the purpose of obtaining information or rendering other
important services who could never be prevailed upon to act if they had the least
apprehension that their names or their agency would in any contingency be
divulged." 10
The non-disclosure of information relating to intelligence was tested rather vig-
orously in several instances during the Civil War, and these tests established a strong
precedent in favor of the inviolability of intelligence activities. Brigadier General
G. M. Dodge, who conducted a number of intelligence activities in the West with
considerable results, became the object of relentless criticism for his financing meth-
ods. He refused obdurately to break the confidence of his agents by revealing names
and amounts paid, and when he was denied the funds necessary for these activities, he
had to raise the money for his agents by confiscating cotton crops in the South and
9 Control of Federal Expenditures, A Documentary History 1775-1894, Institute for Government
Record of the Brookings Institution, pp. 329-330. Punctuation modernized.
Richardson, supra, note 2.
? Richardson, op. cit. supra, note 2, 2281.
68Approved For Release 2005/06/14: CIA-RDP C@??W1MMb?C@1W3-4
0 p6QY?96vqreU?I&1S9nQAkfQJ14 : CIA-RDP8#0&MS8A% `AQL3f4
selling them at public auction. Three years after the end of the War, when War
Department auditors discovered that General Dodge had paid spies for Grant's and
Sherman's armies, they peremptorily ordered him to make an accounting of the exact
sums. Receipts and vouchers signed by spies who lived in the South were obviously
difficult to obtain, and furthermore the names of the agents, for their own security,
could not be disclosed. As a result, when the War Department closed Dodge's secret
service accounts 21 years after the war, they were apparently still without a receipt for
every dollar spent."
A leading legal decision governing the privilege of the Executive Branch to with-
hold intelligence also had its genesis in the Civil War. In July 1861 William A. Loyd
entered into a contract with President Lincoln under which he proceeded "within the
rebel lines and remained during the entire war." He collected intelligence information
all during the war and transmitted it directly to the President. At the end of the war
he was reimbursed his expenses, but did not get any of the $200-per-month salary for
which the contract called. After Loyd's death a suit was brought by his administrator
against the Government to collect the salary Lincoln had contracted to pay him.
The case was finally decided by the Supreme Court in 1876, and the claim was
denied. Mr. Justice Field set forth in his opinion a position on secrecy in intelligence
matters which is still being followed today. He wrote that Loyd was engaged in secret
service, "the information sought was to be obtained clandestinely," and "the employ-
ment and the service were to be equally concealed." The Government and the em-
ployee "must have understood that the lips of the other were to be forever sealed
respecting the relation of either to the matter." Were the conditions of such secret
contracts to be divulged, embarrassment and compromise of the Government in its
public duties and consequent injury to the public would result, or furthermore the
person or the character of the agent might be injured or endangered. The secrecy
which such contracts impose "is implied in all secret employments of the Government
in time of war, or upon matters affecting foreign relations," and precludes any action
for their enforcement. "The publicity produced by an action would itself be a breach
of a contract of that kind and thus defeat a recovery." 11
The pattern of executive privilege as applied to withholding information on intel-
ligence activities was determined by the resolution of these situations which occurred
from the first years of the Republic through the Civil War. Decisions in later cases
utilized the precedents which had here been established. In 1948 the Supreme Court,
deciding a case concerning an application for an overseas air route, reaffirmed that
"the President, both as Commander-in-Chief and as the nation's organ for foreign
affairs, has available intelligence services whose reports are not and ought not be
published to the world," and defined its own position on cases invloving secret
information:
It would be intolerable that courts, without the relevant information,
should review and perhaps nullify actions of the Executive taken on in-
formation properly held secret. Nor can courts sit in camera in order to be
taken into executive confidences.... The very nature of executive decisions
as to foreign policy is political, not judicial."
Intelligence information is recognized by the three branches of Government as of
special importance because of its connection with foreign affairs and military security.
" Perkins, J. R., Trails, Rails and War, Bobbs-Merrill (1929).
Trotten Adm'r v United States; 92 US 105 (1876).
"Chicago and Southern Airlines, Inc. v Waterman Steamship Corporation; 33 US 103 (1948).
FpPdgIFg4r X1005/06/14: CIA-RDP84BOO89OR0008000500OW4
F W1F4 q&1R1R'005/06/14 : C }FA4Rft%NPdW?ggPW~-4
Authorities for CIA Information Controls
As an Executive agency CIA partakes of the privileges accorded generally to the
Executive Branch with respect to withholding information, privileges ultimately
dependent on the separation of powers doctrine. In addition, Congress has specifically
recognized the secrecy essential in the operation of Central intelligence by providing
in the National Security Act of 1947 that the Director "shall be responsible for protect-
ing intelligence sources and methods from unauthorized disclosure." In the Central
Intelligence Act of 1949, noting again this responsibility of the Director, Congress
exempted the Agency from any law which requires the disclosure of the organization,
functions, names, official titles, salaries, or numbers of personnel employed. Other
statutes exempt the Agency from requirements to file certain information reports.
Pursuant to the Director's task of safeguarding intelligence information, Agency
regulations governing the release of information serve notice upon employees that
unauthorized disclosure is a criminal and an administrative offense. A criminal pros-
ecution for unauthorized disclosure can be instituted against an employee under sev-
eral statutes, including the Espionage Laws, or administrative sanctions including dis-
charge can be applied against him.
Central Intelligence is also subject to the provision of Executive Order 10501 that
"classified defense information shall not be disseminated outside the Executive Branch
except under conditions and through channels authorized by the head of the dissemi-
nating department or agency.". This provision, although it has never been tested in the
courts, gives the Director added support in controlling the release of information to
the courts and Congress as well as to the public. He can and will upon request release
information of no security significance to the courts or Congress; he can exercise
discretion in the release of information produced by and concerning the CIA; but
there are limitations on his authority over information originating in other depart-
ments, joint interagency documents, and personnel security information. If the de-
cision whether to comply with a demand for information cannot be made at the
Director's level, it is referred to the National Security Council.
CIA's position vis-a-vis the courts and Congress is unique beside that of other
agencies, because of the recognized secrecy and sensitivity and the connection with
foreign affairs possessed by the information with which the Agency deals. This po-
sition has been tested on several occasions.
Intelligence and the Courts
The secrecy of intelligence employment which the Supreme Court recognized in
the Totten case on the Loyd-Lincoln contract over eight years ago is basically un-
changed today. The difficulties encountered in the courts by a person claiming pay for
secret work allegedly performed for the Government were illustrated in the Gratton
Booth Tucker case in 1954. Tucker alleged that he had performed services "under
conditions of utmost secrecy, in line of duty, under the supervision of agents of the
United States Secret Service and of the C.I.D. of the Armed Services and Department
of Justice, FBI and of the Central Intelligence Agency." He claimed that from 1942 to
1947 he contributed his services voluntarily and "without thought of compensation in
anticriminal and counterespionage activities in Mexico and behind the lines in Ger-
many," and that in 1950 he was assigned to Korea. For all this he brought suit against
the United States in the Court of Claims, seeking payment of $50,000 annually for the
years he worked and of $10,000 as expenses. On the very basis of these allegations, and
without going into the matter any further, the court refused recovery, citing the
Totten case as authority."
" Grattan Booth Tucker v United States; 127 Ct. CI. 477 (1954).
70Approved For Release 2005/06/14: CIA-RDP?Q@O i A6W??OfOt`3-4
l4 v veaPEid elgeleadehOOdG, 06&$4 : CIA-RDP84ZQA p 8Q 5@QQ[3y4
Another aspect of the Government's privilege not to disclose state secrets in open
court was decided several years ago by the Supreme Court in the Reynolds case. This
was a suit for damages brought against the Government by the widows of three
civilian observers who were killed in the crash of a military plane on which they were
testing secret electronic equipment. The Air Force refused to divulge certain informa-
tion which the widows thought necessary to their case, stating that the matter was
privileged against disclosure pursuant to Air Force regulations prohibiting that reports
be made available to persons "outside the authorized chain of command." The Air
Force then made a formal claim of privilege, affirming that "the aircraft in question,
together with the personnel on board, were engaged in a highly secret mission of the
Air Force." An affidavit by the Air Force Judge Advocate General asserted further
that the material could not be furnished "without seriously hampering national ste-
curity." The Supreme Court accepted the Air Force argument, saying that "even the
most compelling necessity cannot overcome the claim of privilege if the court is ulti-
mately satisfied that military secrets are at stake." And these Air Force statements had
been sufficient to satisfy the court of the military secret involved.1,
The privilege of withholding national security information from the courts had
been subject to some limitation. One case, U.S. v Jarvinen,16 illustrates that this execu-
tive privilege is not judicially inviolable. Jarvinen was a casual informant in the United
States who gave information in 1952 to CIA and later to the FBI that Owen Lattimore
had booked passage to the USSR. He later informed CIA that he had fabricated the
whole story. Soon thereafter Jarvinen was indicted for making false statements to
government agencies. At the trial a CIA employee called to testify by the Department
of Justice prosecutor was directed by CIA not to answer. The witness' claim of prive-
lege was not accepted, however, and when he refused the court's order to answer he
was held in contempt and sentenced to fifteen days in jail. He was pardoned by the
President.
The CIA argument had been based on the provision of the CIA Act of 1949 that
the Director "shall be responsible for protecting intelligence sources and methods from
unauthorized disclosure" and on Executive Order 10290, then in effect, which limited
dissemination of classified security information. The court had reservations about the
substantive merits of the privilege, and the widespread publicity emanating from the
case apparently vitiated the claim of need to protect sources and methods. It was the
further opinion of the court that in a criminal prosecution the Government must
choose either to present all the pertinent information, regardless of its sensitivity, or to
risk dismissal of the case by not presenting any sensitive information at all.
There have been several instances of indirect Agency participation in court cases,
usually when employees have been requested to furnish documents or testify on behalf
of the Government or private parties. In recent cases in which other Government
agencies have participated there has been a cooperation between them and Central
Intelligence representatives which was lacking in the Jarvinen case, and little dif -
ficulty has been encountered with respect to the privilege of withholding classified
information. A good example is the Justice Department's prosecution of the case
against Petersen," an employee of the National Security Agency who had passed NSA
documents to the Dutch. The Justice Department needed to present classified in-
formation to the court in order to substantiate its case, but the Director of Central
Intelligence advised, in the interest of security, that a particular document not be used.
The Justice Department accepted this recommendation and succeeded in convicting
Petersen on other evidence.
" United States v Reynolds; 345 US 1 (1952).
6e United States v Jarvinen; Dist. Ct. Western District of Washington, Northern Div. (1952).
" United States v Petersen (E. D. Va. Criminal No. 3049, January 4, 1955).
FRpp99v0f6 18VA- 005/06/14: C1A-RDP84B00890R00080005003-4
pbViMpRfl~qrLFA
e g005/06/14 : Cl&-g@ Pe4Ph8#~RLRRRRfeR15i0003 4
CIA and Congress
CIA's record of cooperation with congressional committees has on the whole been
satisfactory. The Agency certainly recognizes that Congress has a legitimate interest in
some intelligence information and obviously a better claim on it than say the private
citizen who needs it for purposes of litigation. Although, under the separation of
powers doctrine, intelligence gathering and production is an executive function and
the responsibility of the Executive Branch, the Congress does have responsibilities in
the foreign affairs field. It is, moreover, the appropriating authority for Agency funds,
and indiscriminate withholding of information could not only result in a poorly in-
formed Congress but also jeopardize the good will the Agency enjoys with it. Within
the bounds of security, therefore, CIA has attempted conscientiously to fulfill requests
from Congress proper to the legislative function. And Congress, for its part, has so far
respected CIA's decision to withhold information or produce it only in closed session
with the understanding that it is not to be released.
If summoned by a subpoena to testify before a Congressional Committee, all CIA
employees, including the Director, are required to appear or be held in contempt of
Congress. There are few instances, however, in which an employee has been subpoe-
naed to testify involuntarily, and no documents have ever been released to Congress
without the Director's approval. In most cases it has been as a matter of form or at
Agency request that an employee's testimony has been called for and a subpoena
served. In only two instances situations have arisen which led to strained relations
between the Agency and congressional committees. When Agency testimony was de-
sired by the Senate Internal Security Committee concerning the security status of John
Paton Davies, CIA successfully requested several delays in the hearings on security
grounds. And in 1954, while the Senate Committee on Government Operations was
considering inquiring as to certain facts relating to the security status of an Agency
employee, counsel for the Committee and the General Counsel of CIA agreed on the
legitimate interests of the Agency and the Committee. The employee was never ques-
tioned by the Committee.
No court cases have defined an employee's rights to withhold from Congres.,
information which has been classified and the divulgence of which could work harm
to this country's intelligence program. Such a case could theoretically arise through
testing a Congressional contempt citation in a habeas corpus proceeding, but it is
unlikely that such a test will be made. The employee could use an order from the
Director as a basis for not testifying, and the Director's judgment has always been
respected by the Congress when he has decided he cannot reveal certain information.
Because the information which CIA has is so clearly within the purview of the Execu
tive Branch, this Agency has a much stronger legal basis for refusal than other depart
ments have.
If Congress should persist, there would of course have to be eventual Presidential
support for continued refusal to give information. Such support was tendered, outside
the intelligence and foreign fields, in 1909 when Theodore Roosevelt withstood a
Senate resolution calling for certain papers in the Bureau of Corporations concerned
with the absorption by U.S. Steel of another corporation. Roosevelt informed the
Senate that he had obtained personal possession of the papers it desired but that the
Senate could get them only by impeachment. "Some of these facts which they [the
Senate] want," he declared, "for what purpose I hardly know, were given to the
Government under the Seal of Secrecy and cannot be divulged, and I will see to it that
the word of this Government to the individual is kept sacred." 18
18 The Letters of Archie Butt, Personal Aide to President Roosevelt; by Abbott, pp. 305-06.
72Approved For Release 2005/06/14: CIA-RDPM 0OffM@40U660SGtlOf3-4
E op#Wedblifi eledsletROWO&14 : CIA-RDP84M U008MQ Ot16-4
Generally, there has been a spirit of cooperation between the Legislative and
Executive Branches. In those cases where a conflict has occurred, and the Executive
has refused to divulge information requested even in the strongest terms by the Legis-
lature, the decision of the Executive has prevailed. The Constitution has been in
existence for over 170 years and under it 34 Presidents and 85 Congresses have forged
a strong interpretation of the separation of powers. In the field of foreign affairs
intelligence, the Director of Central Intelligence, acting under the constitutional pow-
ers of the Executive Branch of Government together with powers granted by statute
can withhold such information as he believes is in the best interests of the United
States. If a showdown were to occur, however, the issue is between the President and
Congress as to whether classified information should be divulged against the wishes of
the Director, who is responsible for the protection of sources and methods. Historical
precedent in similar situations appears to favor the President.
(From Volume 2 Number 4, p. 61, 1958; For Official Use Only)
F~ijyj~oy ega 2005/06/14: CIA-RDP84B00890R000800050a033-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
In which it appears things
aren't getting any better
Richard T. Puderhaugh
How I came to be designated CWH/WW (Chief Word Watcher, Western Hemi-
sphere) was that a certain Senior Officer called me into his office the other day and
showed me a paper from one of the stations, which spoke of giving an operation "short
shift." ' My God, he said, who ever heard of a short shift? I knew what he meant, so I
didn't make the mistake of mentioning Volkswagens, 1970 petticoats or the Redskins.
The Senior Officer went on with his denunciation, and ended up by asking me "Don't
they know what `shrift' means?"
It is a good question. How many people do know? It is one of those terms
everybody knows about and thinks he can define, and one which should really lead
people inexorably to the dictionary. But it doesn't, not even those people who know
how to spell it. I didn't say these things to the Senior Officer, because he is more senior
than I am, and has a quick temper.
Anyway, in that conversation, the Senior Officer appointed me Official Word
Watcher for the Division, by I don't know what authority, and charged me with the
following duties:
To collect from all CS communications outstanding examples of elegant writ-
ing, and to report upon my research at opportune times so that our writers may
be edified and instructed thereby.
As soon as my appointment became known, I had a great deal of help from other
headquarters personnel, but I will acknowledge that help specifically only if the dan-
ger of lynching becomes clear, and I need help (or company).
Here, then, is my first report. I should like to begin it by listing some of the most
elegant words we have in our correspondence, words which I urge one and all to use at
every opportunity. I should like to see the day when not a single page of our prose
escapes the use of at least one of these words. I especially urge our writers to try new
uses for all these words, and not be bound by such things as tense, gender, number or
mode. Caveat, for example, is in the Latin imperative mode, but that is much too
restrictive, and we have quite properly used this word as a noun for some time now.
Imagine my delight when I observed recently the first attempt that I know of to use it,
as is, in the present indicative. When you consider that we have long since expanded
its original sense of "warning" to include the sense of "conditions" or "provisos," you
can understand why the word is so important to us. I can right here remark that I
should caveat some of the remarks I am about to make in this essay, and you will not
' Author's Note: lu this essay, examples of elegant writing have been taken from official CS commu-
nications. The names of originating stations and officers, as well as cryptonyms and other indicators, have
been changed to protect the guilty.
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500?3-4
MORI/HRP PAGES 75-79
Approved For Release 2005/06/14: CIA-RDP84B008900-4
have the slightest idea what I mean, but it sounds distinguished and important, and
that is what matters.
caveat
rational
thrust
interface (used as a noun and a verb)
dichotomy
lacuna'
forthcoming (in the sense of "candid")
profile (can be either high or low)
silhouette (can be either high or low)
options
life-style
posture
rapport
Rapport is an especially fine word, but so far we have used it only as a noun.
Perhaps we should offer a prize to the officer who first devises a successful sentence
using rapport as a verb, although we may have been beaten to the punch on this one
by the folk-rock expression "to rap." Even employing "rapport" as a noun, neverthe
less, we can do great things. Note the following excerpt from a field report:
"We hope it does not reach the extreme where the agent fails to establish a
working rapport, or worse, and thus destroys ..."
The mind boggles at the thought of anything being worse than a working rapport,
and yet here is an officer who does not want the agent to fail to establish exactly that.
Like the character in the play who suddenly discovered that he had been speaking
prose all his life, this writer is probably unaware that he has contructed a litotes there.
A litotes affirms something by denying the contrary, as in "he is not without charm."
The device can also be stretched to refute something by negating the denial of the
contrary, as in "he denied that he was not unwilling to go," ... and so on, into total
opacity. It is one way to make a reader really study your prose. Still with me:
Try this one:
"Subject: Refutal of rumors regarding a coup."
To take words from other languages or disciplines, and use them in new and
clever ways to confound the pedestrian mind, is a noble thing, but how much more
magnificent it is to take a legitimate word from our own language and by the change
of one phoneme devise a new word, which nobody ever heard of before, but whose
meaning everybody will immediately perceive! The roots of this particular treasure
seem to be in the words refuse and refute, but I noted that the inventor did not
arrange a reciprocal loan of suffixes and speak of such things as "Hanoi's refusation to
make peace." There is something not quite right about that one. Sort of low class,
perhaps. It is possible, of course, that the word rebut was bobbing around in the
crucible which produced refutal, but in that direction lies paranoia, and we will
venture no farther.
It seems to me that refutal deserves at least as high a place in our lexicon as
normalcy, which, as you may know, was invented by Warren G. Harding, who didn't
Plural is lacunae. This is really a keen word, which has only recently appeared. Used judiciously, it
should be OK at least through 1973.
7Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
El~4or Release 2005/06/14: CIA-RDP84B00890R000800050003-4
realize he was inventing anything. He would have made a good operations officer.
Indeed, I think that the authenticity of these inventions has to be based to a great
extent upon the fact that when they are first uttered their inventors are unconscious of
bringing something new into the world.
I don't know whether the innocence of the inventors has any bearing on the
acceptability of words to modern dictionaries. I doubt it. Modern dictionaries will
accept anything anybody says, because if somebody says something it become usage,
and usage is king! There is one grumpy headquarters officer who dislikes this modern
trend, and says that the Oxford of 1912 is the only authoritative dictionary of the
English language. He is a troublemaker, who will one day be dealt with by Division
Authorities. He is the one who brought to me the following:
"Subject: Easement of the Threat of a Coup."
I had to point out to him that Webster's New World Dictionary says there is such a
meaning to easement, in addition to the legal use pertaining to land titles, so that
settles that. He also has to accept the fact, for instance, that chaise longue has now
become chaise lounge in this country, by authority of Sears, Roebuck and Company,
and the lingerie means ladies' drawers and shifts and things of that nature, and if he
and the French don't like it then they can damn well lump it.
What should we do about the shall/will problem? My own inclination is to let it
lie, because the shall/will rule was an artificial thing, anyway, set up in a very elegant
epoch of the English language, to tone up the speech of His Majesty's subjects. It is a
difficult thing to master, and I think we are doing well enough without it, although
you have to admit that nothing dresses up a sentence quite so much as an unexpected
"shall" where a "will" really belongs. That is to say that we should pay no attention to
the rule, but should just put in a shall at any time a sentence needs to be toned up a bit.
Another problem which I'm inclined to de-emphasize is the one which the New
Yorker calls "The Omnipotent Whom." There is no doubt about it, whom sounds
much more literate and polished than plain old everyday who, but I think we have this
factor under good control. In fact, I have ceased collecting samples, after nearly filling
a notebook, because everyone is doing so well. I shall cite just two fairly typical
examples:
"ZPDRUM, whom we note is currently in Paris. . ."
"Forward the document to whomever may have an interest in the matter.'
If there is anything that dresses up our prose even more than the shall/will or
who/whom pilasters, it is the mixed metaphor. If your metaphor gives a clear picture
you should be ashamed of yourself. We don't do as well as we should on metaphors, in
fact, and we must work on them a bit harder. We have much to learn from the State
Department in this respect, as witness the following sample from State traffic:
"If the government of Graustark does not box itself in by wrapping the
national flag around the training area . . ."
Try to construct a mental picture from the Ozymandian blueprint, and despair! The
same State Department expert also spoke of "a certain rustling of sabers," which shows
that he is made of championship material. I would quarrel mildly in one sense, how-
ever. If the sabers are, in truth, made of something that rustles, he should correct and
extend his borrowing from Poe, and make the rustling uncertain, as well as sad, and
perhaps silken. Unless, of course, the writer meant to imply that there was a kind of
military Bad Bart who was going around stealing great numbers of sabers from the
corrals of nice folks in white hats.
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500 3-4
Approved For Release 2005/06/14 CIA-RDP84BOO890909
But a fig for the State Department! We have our own experts, and I defy any
other agency to produce anything to equal the following:
"The result of the medical checkup was that the agent has diabetes."
"His bank allotee is forwarded under separate cover."
"The negative reaction to this device was its (attaboy!) lack of sufficient
range. It was tested singularly and in pairs."
"He is not temperamentally geared to write in subtilities, but does produce
good hardhitting yellow journalism in the style of a poor man's Westbrook
Pegler."
The last sentence may be one of the decade. I don't say that because of his reference to
"hardhitting" journalism, either, even though that term does limn a picture of an
energetic, up-and-at-'em CIA officer playing Wagnerian themes on the mighty
Wurlitzer he has constructed from his local (sob) stable of assets. It's good, but you
can't give very high marks for it, because when you come right down to it, our
operations have never to my knowledge produced a single paragraph that wasn't
hardhitting. Where that sentence achieves greatness is in calling attention to one of the
characteristics of the late columnist which has been too long overlooked-that is, the
fact that only the rich could afford the real Westbrook Pegler.
But there is more. If one lifts the phrase "temperamentally geared" out of the
stream and contemplates it carefully, one cannot help but be impressed with the
subtility of the thing. I know a number of people in this agency who I think are
temperamentally geared. I steer clear of them. They can't do you any good.
"In view of the serious flap potential, which, if discovered by the host gov-
ernment, could have lead to a worsening of relations . . ."
We need not dwell upon the construction which hypothesizes the damage that might
be done if the government discovers the flap potential of an operation. We all know
that, surely. Who among us would ever want a host government to find out how risky
an operation he was mounting? We must always keep our host government reassured
that our clandestine operations in their countries have also no flap potential at all. But
let us press on to the rest of that sentence, whose enigmatic wording led my mind into
an almost psychedelic whirl, with images of "some lead is red, and some reds are led,"
and when the machinery finally clanked to a halt, here is what came out of the
printer:
Wherever your writing may lead, Sir,
You may rest assured I shall read, Sir;
But if, when I've read,
You insist I've been lead,
Then I surely shall sea read, indeed, Sir.
You can have that, if you want it.
Perhaps there is something about lead that attracts the man-Freudian associ-
ations with bullets or poison or pollution. It would not be the first time our prose
implied more than it said. Notice the gothic scene evoked by the following:
" . . . we will continue to keep this asset tabled, and will call on him for
spot reporting when necessary."
If all our Operations Officers were as skilled at writing as this man, the Green
Beret case would never have hit the headlines. There is no "terminated with extreme
prejudice" blooper here to provoke the news media into soaring flights of fancy. No,
78Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
El ob*diFF9r Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
the untutored mind would receive that sentence as meaning that the matter was being
held in abeyance, as in the parliamentary term "to table a motion," whereas those of
us in the know immediately perceive that this officer is describing a bit of standard
tradecraft, whereby we strap a man to a deal table and belabor him with interfaces
and rapports and dichotomies until he by god comes up with a spot report.
"So successful was Fulano's re-immergence as a crusading journalist
that . . . "
A number of our stations have in the past produced or supported underground news-
papers, but this must be the first one of record whose clandestine journalism was done
under water. Eat your heart out, MI-6!
"Fulano appears to be in excellent financial straits."
"Subject and his wife, Josephine, nee unknown .
"He did it in a fit of peak."
"He easily looses his head."
"He attempted to illicit the information."
"The rightist candidate, who won a pleurality of votes .
"The agent demonstrated an excellent operational posture."
. . . like operating in a vacuum tube."
"The national liveration movement .
"Incendiary fires will be set."
"Several methods of modus operandi are being contemplated."
The author of that last sentence could have added immeasurably to its charm by
pointing out that incendiary fires can be put out with wet water; but he did at least
clarify things a bit the following week by explaining "By large incendiary fires, the
agent may be referring to one of the petroleum storage areas . . . "
One of the prize words in my collection is the invention of a State Department
officer, whom we really ought to try to identify and recruit. The word is fragile and
beautiful, and it is with some hesitation that I offer it up on our rather brutal altar, for
I fear that we will over-use it and cause it to wilt and fade before its time. I have no
right to keep it, however, and present it herewith with a fervent exhortation to one
and all to use it tenderly so that it will last for at least six months to a year. Here it is:
If that doesn't bring a lump to your throat, nothing will. There is more, but I
cannot go on. I trust you will all keep your passive voice active. It must never be
allowed to be wondered why our communications are not being written with more
thrust and rationale. Go forth and write, and may the Lord have rapport upon you.
(From Volume 16 Number 1, p.1, 1972; Unclassified)
Fit of peak is known to the medical profession as "Pike's Syndrome." In Asia, it is called "Norky's
Complaint."
The OK operational posture for 1970-72, in case you didn't know, if forward-leaning. We have in
the past been through postures of defense, agonizing re-appraisal, benevolent neutrality and the like, but
then came that luminous moment when an unknown genius suggested that we should all be forward-
leaning. Thousands of our patriotic, conscientious headquarters staff members were thereupon transformed
into human gnomons, who can be observed every morning shortly before 8:30, inclined dutifully in the
direction of Langley, and at about 5:00 p.m. pointed just as dutifully toward home.
79
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
The work of one veteran intel-
ligence chief evokes reflections
from another
Allen Dulles's book, aptly entitled The Craft of Intelligence,' has been so exten-
sively and variously reviewed by the professionals of the press and so much wisdom
has been reflected in the more thoughtful of these reviews that it was with the greatest
reluctance and diffidence on the part of the undersigned that he was prevailed upon
to undertake the task of addressing a further commentary to the readership of this
publication. The evident presumption of attempting to provide any useful com-
mentary upon a work so cogently and concisely written, and more particularly of
venturing views of possible value to such a uniquely sophisticated audience, would
have sufficed to deter this effort but for the opportunity thus afforded of grinding
certain special axes and getting in some plugs for a number of strongly-held convic-
tions. (Incidentally, it may be of interest to note in passing that the preponderance of
the book reviews have ranged from favorable to enthusiastic, with only a small propor-
tion registering significant dissatisfaction or hostility.)
Mr. Dulles has written a most valuable book, one which, in the judgment of this
reviewer, should be read and if possible possessed by all persons having a serious
professional interest in the subject of intelligence, and hopefully also by a wide seg-
ment of the general public. It is essentially an encyclopedia of the terminology, con-
cepts, and craft of the trade, abundantly illustrated by cases and anecdotes drawn
from the author's own treasure-house of experience, and highly readable in form.
Intelligence Terminology
One of the chief merits of the book from the standpoint of the public in general is
its clarification, through definition and painstaking exposition, of the argot of the
trade, which has sprouted and proliferated in such lush profusion as to have become
highly confusing and dangerously misleading-largely as the result of loose usage on
the part of the considerable and still growing number of amateurish exploiters of this
rich vein of literary ore. Newspapermen, the authors of popular fiction, and, I fear,
even a small number of would-be practitioners of the profession of intelligence have
all made their contribution to the chaos, to the point that it was well overdue for one
of the leading and most revered experts in the field to hack a clear track through the
tangled undergrowth. In fact, if it were possible for the intelligence community in
general to accept and conform to Mr. Dulles's definitions and supporting explanations
for such variously used expressions as "deception," "defector," "double agent," and
"counterintelligence," to mention but a few, much difficulty would be avoided in
future; and if as an extra dividend the interested representatives of the fourth estate
could be persuaded or influenced in the direction of adopting these definitions, there
would be in time a constructive clarification of the public mind and a more under-
standing appreciation of the problems of intelligence. The repeated references in the
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000
WGRP PAGES 81-90
Approved For Release 2005/06/14: CIA-RDP84B008901 b0ibf&6 63-4
Western press to both H. A. R. ("Kim") Philby (who recently skipped to Moscow to
join his old cronies Guy Burgess and Donald Maclean) and George Blake (now serving
in England a heavy sentence for espionage) as "British double agents," when in point
of fact they were highly important long-term Soviet penetration agents, may serve to
illuminate the reasons for concern on this score.
In sharp contrast with the large and ever-mounting stacks of books and articles
purporting to divulge the inside story of U.S. intelligence and to "tell all" about our
espionage system and activities, Mr. Dulles does not reveal secrets which are still
sensitive (and many of which must always remain so) but rather has confined himself
to a serious discussion of the principles and methods of sound intelligence operations.
Whereas the omission of such succulent tidbits has disappointed many of the reviewers
and also tends to circumscribe the appeal of the book to the public, it is taken for
granted that the members of the intelligence community will understand and applaud
its wisdom and will value this example of security-mindedness and restraint. It is in
fact an excellent illustration of the general rule that persons having the deepest and
most legitimate insights into intelligence matters are most scrupulous in their trustee-
ship of such knowledge and that the penchant for sensational revelations is the near
monopoly of the charlatans and pretenders who scavenge along the flanks of the
intelligence enterprise.'
Classical Espionage
In his introductory recitation of the long historical background and the more
recent evolution of modern intelligence, counterintelligence, and other forms of
clandestine operations, Mr. Dulles has provided some much-needed perspectives on
matters which will be alluded to later in this review. Having thus set the stage for his
examination and analysis of current practices and procedures of the leading intel-
ligence services of the world, both friendly and opposed, he launches into an admira-
bly complete discussion of our intelligence requirements and collection methods.
Here he places well-merited emphasis upon the progress resulting from the inven-
tion and adaptation to the uses of intelligence of sophisticated scientific devices, but he
does not permit the glitter of these technological marvels to obscure the perduring
value of the classical methods of procurement. Though the high-flying Mata Haris of
today may with their glass eyes be able to discern the most minute of man-made
molehills from untold miles of altitude, and though their acoustical siblings of equiv-
alent acuteness may be able to hear across continents the rustle of a mounting missile,
these are not and will never become any substitute for the older and less "exotic"
measures which are essential to the discovery and frustration of subversive intent. This
point is made manifest by Mr. Dulles in his numerous allusions to recent successes of
the covert intelligence and security agencies of the United States. He has also called
attention to many of the detections of Soviet secret operatives which have been the
fruit of close cooperation as between the American services and their allied opposite
numbers.
Counterintelligence and the Adversary
The chapter on "Counterintelligence," taken together with relevant and related
portions of two or three other chapters, viz. "The Main Opponent, etc." and "Volun-
teers," makes an unusually valuable contribution toward a better comprehension of
the true significance and vital importance of this weapon in our own arsenal of de-
fense. For one thing, Mr. Dulles disposes of the popular misconception that counter-
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
G1kppT e6tJW Release 2005/06/14: CIA-RDP84B00890R000800050003-4
intelligence is essentially a negative and responsive activity, that it moves only or
chiefly in reaction to situations thrust upon it and in counter to initiatives mounted by
the opposition. He shows that counterintelligence produces its most valuable results by
subtle but aggressive attacks upon its chief target-the structure and personnel of
hostile intelligence services. These chapters also bring out the fact that counterintel -
ligence generates and delivers highly valuable by-products in the form of positive
intelligence and the detection and exposure of enemy deception, including their so-
called "disinformation" activities.
Lastly, but by no means of lesser importance, there are the frequently significant
indicators of Soviet policy and intentions which are provided by our successful oper-
ations in this field. In this way our counterintelligence has been sounding a much-
needed warning that in spite of the ostensible shifts of Soviet policy from warm to cold
and vice versa, the fundamental and consistent aims thereof are essentially hostile, and
that we must therefore at all times react most warily to Soviet and other Communist
overtures packaged in the attractive wrappings of "peaceful coexistence," "the new
Spirit of Moscow," or whatever may be the sales slogan of the moment. For example,
during the peak of the euphoria which broke out in certain Western capitals as the
result of and in the wake of the August treaty for a limited nuclear test ban, and long
before this premature and uncritical enthusiasm was beclouded by such recent Soviet
actions 2 as their renewed interference with the Berlin access routes and their handling
of the Barghoorn affair, the best available counterintelligence sources are understood
never to have ceased signaling that the thrust of Soviet policy continued to be aggres
sively antagonistic and that despite all of the fair words at the top there was not the
slightest dimunution in the vigor and intensity of the Soviet effort at the level of the
secret and subversive.
This may perhaps be another way of saying that the French seem to have had
something on their side of the argument in maintaining that it would be a mistake
quite capable of leading us into mortal danger to believe the test ban treaty to signify
any substantial easing of tensions and that the behavior into which the Russians have
relapsed most recently 2 is in accordance with their normal pattern-the other being
both abnormal and highly transitory. Be that as it may, of such magnitude are the
power, position, and prestige of the intelligence and security empire within the Soviet
scheme of things as to suggest that it will be soon enough for us to begin believing in
the sincerity of Soviet protestations of peaceful intent when we have received satisfac
tory evidence that they are muzzling their subversive bloodhounds and dismantling
their apparatus of clandestine conquest-covert as well as open evidence, for example
in such matters as the Soviet position, both proclaimed and clandestine, toward
socalled "wars of liberation."
Overt Aspects
It was obviously impossible for Mr. Dulles to cover in adequate depth, in even
such a comprehensive work as this, all of the multiple and complex phases of the
subject which are currently included in the craft of intelligence. Doubtless each mem-
ber of the intelligence community reading the book would desire a fuller treatment of
his own pet subject, and this reviewer, in full recognition of the unfairness of criticiz-
ing a work which covers so much ground, finds himself in basic agreement with
certain observations in the most excellent review written by Professor Robert R. Bowie
and published in the New York Herald Tribune, edition of Sunday, October 13, 1953.'
2 Written as of 20 November 1963, just before the assassination of President Kennedy.
3 In Book Week, distributed also with the Sunday Washington Post.
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050f 3-4
Approved For Release 2005/06/14: CIA-RDP84B00890R?A08%0@P9fi3-4
It is believed that the author might himself be willing to acknowledge the existence of
an imbalance in favor of intelligence tradecraft, i.e., clandestine techniques and oper
ations, and to the disadvantage of certain of the most important functions and prob-
lems of the research and analysis and estimative processes.
Regrettably the experience and background of this reviewer are not such as to
permit him-nor would it otherwise be either appropriate or possible in this short
space to attempt-to comment in detail upon these apparent deficiencies. However, it
the hope that Mr. Dulles himself will soon find time to give us the benefit of hip
wisdom and close knowledge pertaining to these areas, it is suggested that more em-
phasis should be devoted to the very great reliance which our system places upon the
open and above-board techniques of scholarly research and analysis and to bringing
home more forcibly the weight accorded to the product of these efforts in the sci-
entific and technical fields, for example. It is further recommended that Mr. Bowie's
review be read by those interested in these spheres of activity and their attendant
difficulties. Mr. Dulles had been both wise and just in the distribution of his com-
mendations among the personnel concerned in the various departments and agencies
of the Government which collectively comprise our intelligence community. In so
doing he has singled out for special praise numerous non-CIA personnel and functions
and he has attributed to "the men and women of the CIA," to whom the book is
dedicated, no more than their fair share of the honors. Even so, some larger measure
of recognition for the contribution of the researchers and analysts would be in order.
In this same general connection it may be worth noting at this point what has long
seemed to this reviewer to represent one of the most notable distinctions between the
West (the U.S. and U.K. in particular) and the Russians in over-all approach and
philosophy of intelligence operation. The relatively greater emphasis and reliance
placed by the leading Western intelligence services upon the results obtainable from
extensive overt collection and expert analysis stand out in marked contrast to the
Soviet attitude and credo, in which these measures and methods have heretofore and
at least until very recently been regarded as distinctly secondary to, and as valuable
chiefly in so far as they served to confirm or interpret, the intelligence produced by
clandestine means-most notably stolen documentary materials. This fundamental
difference in approach may be explainable in part by the origins and character of the
two opposing civilizations, Soviet intelligence having developed and at all times func-
tioned within a highly secret and conspiratorial political atmosphere in which intense
suspicion of the freely spoken or written word of the antagonist has been a major
hallmark.
Although he has been out of Russia long enough to have perhaps fallen behind the
times, the former NKVD general Alexander Orlov has provided a most incisive com-
mentary upon this significant distinction in his provocative and edifying little book
entitled Handbook of Intelligence and Guerrilla Warfare.' According to Orlov, who
was certainly in a position to know the facts, the Russians regard as true intelligence
only that which is produced by secret informants and undercover agents, and they
relegate to a category of far lesser importance and credibility material coming from
overt and legitimate sources. He explains that in the Russian view the secrets of
foreign stateiaving the most vital interest for them can be procured only from the
classified governmental files of those states or from cooperative foreign officials and
civil servants having access thereto.
Although it is understood from other sources that the Russians have of late been
paying more attention to the values of overt collection and analysis than they did
' An adaptation was carried in Intelligence Articles VII 2, and appears elsewhere in this issue.
84Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
O pThw6JdF 'r Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
during the period with which Orlov was so intimately familiar, it is nevertheless
evident from the very massiveness of their clandestine collection effort-to say noth-
ing of the rich rewards which they have to our knowledge been reaping from such
sources-that their main emphasis is still centered upon espionage and the procure-
ment of secret documentary materials. It is thus a fair assumption that these activities
and functions have not been downgraded in the Soviet system and that they are not
likely to be at any time in the foreseeable future.
Deception
In commenting upon the techniques and the art of deception Mr. Dulles has
made some very accurate observations concerning the difficulties of mounting signifi-
cant deception operations from the base of "open societies" such as ours in peacetime
and the relative ease of such operations on the part of the Russians, who have all the
advantages of the secrecy and discipline of their police state society going for them. If
anything, he has understated the obstacles confronting Western intelligence authorities
in this area of activity; and he might well have placed more stress than he has upon the
free assists which the opposition receives from a certain class of representatives of the
Western press who, it would appear, have been seeking to elevate to the level of a
national sport the ferreting out and public exposure of the clandestine operations of
their own governments.
Given the intimacy of our journalists with almost all echelons of the Government,
executive as well as legislative, and taking into account the extensive coordination as
between all of the governmental arms which is essential to the success of a significant
deception operation, the opportunities and possibilities for some leak or revelation
fatal to the operation are very great indeed; and frequently the sleuthing is done for
the Russians on a volunteer though doubtless unwitting basis by those representatives
of our own competitive and "scoop-minded" information media who justify even the
most reprehensible forms of "keyhole journalism" on the ground that they are acting
as the chief guardians of our most cherished institutions. The freedom of the press and
the asserted right of the public to know all are used indiscriminately to either justify or
condone actions which are damaging to our national security and the principal benefi
ciary of which cannot fail to be our mortal enemy. Thus the fruit that is available toy
our side only as the result of our most diligent and successful professional operations
may be expected by the Russians to fall gratis into their lap, and if in any particular
case the branches should appear to require a little agitation, this is easy enough to
arrange by the simple device of planting a few provocative questions about any policy
or program of ours, either real or apparent, that may be obscure or perplexing to
them.
Sharpshooting
Although the roster of Communist methods of subversion in the cold war pro-
vided by Mr. Dulles is very extensive, it seems to this reviewer that he omitted ade
quate treatment of one of the most insidious and effective of their techniques. Ref
erence is here made to the evidence of skillful and increasingly successful attacks upon
individual personalities by the Chinese Communists as well as the Russians. These are
specialized operations targeted against key political and military leaders in various
parts of the world-not limited to the softer areas of the so-called uncommitted na-
tions. This method of subversion embraces the widest variety of approaches and is
designed to capitalize on the vanity, cupidity, prurience, ill health, hypochondria.
superstition, or other special susceptibility of the target individual. It is hand-tailored
for each particular case on the basis of the most intimate knowledge and study of the
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050 3-4
Approved For Release 2005/06/14: CIA-RDP84B00890RQQ8qflg,A, *4
individual, and it depends for its success upon great skill and perseverance on the part
of the operatives employed.
This pinpoint, not to say needle-point, attack on selected individuals in positions
of power obviously provides tremendous leverage if successful, and its workings are
most difficult to perceive and to combat. Even though strongly suspected of being
under way in a particular case, the proof to and even more so the persuasion of the
subject of this mental massage that he is being victimized or duped is well-nigh impos-
sible, once the infection has spread to the bloodstream. It is accordingly all the more
important for those having the responsibility for guarding against and countering
Communist subversive activities to be on a special alert against this insidious form of
activity.
One of the most readily recognizable telltales of such an operation is the sudden
and otherwise inexplicable souring of a leading political or military personality pre-
viously regarded as pro-Western or at least dependably neutral in his views and poli-
cies. Another indicator is the falling from grace and departure or removal from office
of a number of subordinate officials known for their pro-Western and anti-Communist
attitudes-for this may be the result of subtle and effective "well-poisoning" against
such personages, accomplished through repeated insinuations and suggestions to their
superior that they are secretly hostile to him or are otherwise unreliable instrumental-
ities of his will. The Russians may be less skillful in their application of this ancient
technique than the Chinese, who possess all of the subtlety and sensitivity that comes
to them from centuries of familiarity with its traditional use.
To accept as valid and treat with full seriousness the necessity for remedial meas-
ures against this form of subversive threat does not require disagreement with Mr.
Dulles's proposition that the Chinese have not yet achieved the full panoply of subver-
sive tactics which have been developed and assembled by the Russians. They, the
Chinese, are clearly making rapid strides and may well already have perfected certain
specialized techniques for which they have a greater natural aptitude than their Com-
munist competition.
The havoc that was wrought in Britain by the Profumo scandal has been widely
interpreted in the Western press as a triumph of Soviet disruptive design, and even in
Lord Denning's fascinating analysis he poses (at page 8 of his Report) the suggestion
that Captain Eugene Ivanov's mission may have been directed more toward the cre-
ation of a crisis of confidence as between the Western allies than to the procurement
of intelligence information. Yet it seems as though Ivanov was a fairly overt and
heavy-handed operative, and that if disruption was his objective, his success was due
more to lucky coincidence than to the cunning of his own contrivances. At one critical
Cliveden weekend in October of 1962 Ivanov is reliably reported to have been going
so flat out in his attempts to enlist high-level British sympathy and support for the
Soviet position over Cuba as to render himself both objectionable and conspicuous; and
it was just lagniappe that on the earlier occasion Jack met Christine by chance encoun-
ter at the pool and so swiftly succumbed to her charms. Moreover, if such was his
mission, Ivanov was also the beneficiary of the most extraordinary series of failures of
coordination on the part of British authorities concerned, the security services having
been well aware of his significance and the game that he was playing with the
wretched Dr. Ward as his tool nearly two years before the final explosion.
Psywar
From what may be a particularly subjective point of view, it is regretted that Mr.
Dulles did not give us more in his chapter entitled "Intelligence in the Cold War," for
example by pointing up more clearly the essential differences in the Communist and
%pproved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Orppt ovve raiptr, Release 2005/06/14: CIA-RDP84B00890R000800050003-4
e
Western approaches to propaganda and other forms of psychological warfare. The
standard Soviet practice of constant and continuing reiteration of a theme or thesis
stands out in sharp contrast to the generally relevant practice among Western propa-
gandists, which seems to have its origins in and to take its main inspiration from press
attitudes toward "news." Even the most productive themes and theses are quickly
abandoned or allowed to sink soon into disuse once the headlines have been made and
the story has been told.
Consider the contrary Soviet practice, which is well illustrated by their treatment
of what must have been for their propagandists the extremely difficult and discourag-
ing subject of the brash betrayal and brutal suppression of the Hungarian freedom
fighters in November 1956. Throughout the non-Communist world and in many areas
behind the iron curtain there was at the beginning an almost universal revulsion of
feeling and condemnation for this act of naked Soviet imperialism. Thus the Soviet
propaganda machine was forced to begin from far behind scratch and invent and
fabricate a whole series of justifications and rationalizations which few Western
propagandists would have believed likely to command any significant degree of cre-
dence and acceptance. Yet in a remarkably short space of time, by continuing to
hammer away at their bald-faced distortions, the Soviet mouthpieces had succeeded at
the least in beclouding the issues and at the most in creating widespread belief that the
Soviet action had been justified in the interests of rescuing the Hungarian people from
slipping back into a state of "reactionary feudalism." In getting off to their start they
enjoyed a windfall in the form of a strong assist from that self-proclaimed prophet of
neutralism, Krishna Menon, who seemed only too happy to serve as the Soviet stalking-
horse in the United Nations debate on intervention in Hungary and who was able to
completely confuse the discussion by his strident exploitation of the Suez incident.
Neither the consistency nor the truth of Soviet representations has ever appeared
to be of much concern to their propagandists. They seem to proceed on the assumption
that they can get away with any amount of enlargement and tergiversation and to
operate on the theory that the memory of man for words spoken and deeds done is
very short. Moreover, they are not unduly concerned about being caught at and called
to account for even the most transparent of their canards. The Philby case offers a
good illustration of this thick-skinned attitude and approach. Those who followed the
unfolding chapters of that case during the spring and summer months of 1963 will
doubtless recall that many assets of the Soviet propaganda mechanism were marshaled
to plant and cultivate the version that Philby's mysterious disappearance from Beirut
earlier in the year was in fact no mystery at all. He was simply denounced as a British
secret agent and said to be operating in the deserts and mountains of the Yemen to
overthrow the "glorious new revolutionary regime" there. In less than a month's time
following the propagation of this wholly fabricated story, which incidentally had
picked up widespread belief and following in the West, circumstances forced upon the
Russians the acknowledgment of Philby's defection to them, and they blandly an-
nounced the awarding to him of Soviet citizenship. In so doing they gave no slight
indication of dismay, and there has never been any attempt on their part to explain or
correct their previous account of the disappearance. And they seem, unfortunately, to
have been permitted to slip off this hook with little difficulty.
Exchanges
The still current incident arising from the imprisonment by the Russians of Yale
professor Frederick C. Barghoorn, taken together with the mid-October event of the
exchange of two American prisoners-Walter Ciszek and Marvin Makinen-for two
Soviet espionage agents picked up last August by the FBI, provides timely corrobora-
tion for Mr. Dulles' reservations concerning the wisdom of establishing a pattern of
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005006V-4
Approved For Release 2005/06/14: CIA-RDP84B00890RO0O'8MS3 003'-4
this type of prisoner exchange. At page 119 Mr. Dulles observes-and without the
benefit of these two late developments-many of the risks which are inherent in such
trafficking in the persons of real or alleged espionage agents. If our Government is
going to play at this game it should at least do so with eyes wide open to the hazards
which are involved, including the possibility that the Russians, who are very old hands
at this form of enterprise, will be the gainers in the preponderance of any such swaps
as may be engineered or acceded to by them.
It would certainly appear that in the Ciszek-Makinen exchange the Russians gave
up nothing of value to themselves in releasing a middle-aged priest held since 1940
and a youthful student, whereas they realized a very significant gain in recovering two
well-trained and experienced operatives-who, had they been held and subjected to
the pressures and uncertainties which are the inevitable concomitants of conviction
and heavy sentences, could very conceivably have ended by providing information
and leads of the greatest value to the security services of the United States and
presumably other Western allies. Irrespective of what may have been the controlling
reason for the arrest of Professor Barghoorn, and it is anybody's guess whether the
Russians were mainly motivated by a desire to retaliate for the immediately preceding
arrest of their own agents-or to discourage the further development of cultural con-
tacts of this order-or simply to put out of action a scholar who has long been a cinder
in Khrushchev's eye because of his expert knowledge of the Soviet system and record
of exposing the myth of "Soviet legality," it is evident that he was quite innocent of
the charge of espionage for which he was claimed to have been arrested and impris-
oned. Moreover, if this incident had not backfired with unforeseen violence in the
faces of the Soviet policy makers, Barghoorn could have become "very large wam-
pum" as a bargaining counter, to be held in reserve for coaxing out of us the release of
one or several of their intelligence officers or agents caught in flagrante by the FBI.
Actually, as previously suggested, the Russians have been playing at this game of
"exchanges" for many years and have on numerous earlier occasions shown themselves
to be completely brazen and unscrupulous in their connected tactics. The
Kindermann-Wolscht affair, which in 1924-26 resulted in an impasse in Russo-Ger-
man relations so serious as to have threatened to sever diplomatic relations between
the two countries, furnishes an excellent example and a most rewarding case study of
the underlying Soviet motivation and methods employed in arresting foreign persons
innocent of espionage and holding them for ultimate exchange in return for their own
professional spies and saboteurs.
That case began with the arrest in Russia on patently trumped-up charges of
espionage of two young German students (Kindermann and Wolscht) as an offsetting
deterrent to the trial which was about to commence in Germany of a number of
Chekist terrorist agents for planning and attempting to promote in 1923 a revolution to
overthrow the then very unstable German government. It did not conclude before the
highly reputable German diplomat, Gustav Hilger (who was attached to the staff of
the German Ambassador in Moscow), had been charged with aiding and abetting the
students, and until after most of the ranking governmental officials on both sides had
become deeply embroiled in the controversy.
In the end, the Russians got back their boy (Skoblevsky), a personal pal of Stalin
who had been dispatched by Trotsky on his revolutionary mission, in return for the
two obscure German students who had been guilty of no crime in the first place. For
the fuller details of this highly illuminating study in Soviet motives and methods the
attention of readers is invited to an article prepared by Professor Lamar Cecil, until
recently of Johns Hopkins University, and published in the Journal of Central Eu
ropean Affairs, Volume XXI No. 2, July 1961.
% proved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
aNppr6ve(Eirr Release 2005/06/14: CIA-RDP84B00890R000800050003-4
The Trumpeting of Casualties
Early in his first chapter Mr. Dulles observes that "intelligence is probably the
least understood and the most misrepresented of the professions," and in the conclud-
ing chapters he advances the most persuasive arguments in support of his appeal--
which he clearly appears to be making on behalf of our intelligence community as a
whole-for a better understanding of the difficulties and for a more sympathetic
acceptance of the inevitable percentage of reverses which must be expected in intel-
ligence operations. The point is especially well taken at this time in view of certain
quite recent and wholly unwarranted scapegoating for which the CIA in particular has
been required to stand still.
But there has been a long-standing need for both official and public opinion in
the United States and in the West more generally to adopt a more sensible and realistic
attitude toward what might be termed the casualties of intelligence operations in the
cold war. The fact that our freedoms and liberties and those of our friends and allies
are being subjected to the ubiquitous and relentless campaign of Communist espionage
and subversion on a front as wide as the world should entitle the Western intelligence
and security services which are courageously and effectively striving against this un-
precedented assault to a better break from their own press and public opinion. Most
thinking people have long since digested and, however reluctantly, accepted the neces-
sity of combatting the Communist threat by the expenditure of vast treasure and
much blood. Why is it, then, that the occasional intelligence casualties which are
incurred in the form of personnel losses and "blown" operations are the subject of so
much soul-searching self-criticism and anguished cries of mea culpa, to say nothing of
having become the standard butt of deliberate distortions and sharp ridicule?
The passages in the book which attempt to deal with this problem include numer-
ous historical references from which it should be clear to any fair-minded reader that
clandestine political warfare has been going on from time immemorial and has long
been a recognized arm of statecraft. It has affected the destinies of nations and in
innumerable cases has served to protect the lives of people. At the worst, its execution
involves relatively few casualties, and for the most part none at all. There is simply no
rationality in the fact that people, certainly including Americans, will cheer the spec-
tacle of massed military forces exterminating one another, as well as innocent bystand-
ers, by the millions, and when socalled "peace" comes they will deplore as somehow
unnatural and immoral the kind of activity on our part which can contribute so much
to forestalling the necessity for armed conflict.
To be sure, such programs involve secrecy as an essential ingredient, and there
appears to be a well-developed national myth that secrecy in Government operations
is bad per se. At the same time and again quite illogically, we all practice secrecy of
one sort or another in our personal lives and business dealings and have a constitutional
distaste for people who do not observe discretion in their private affairs.
No one should construe this as an appeal for a carte blanche to conduct covert
operations without the fullest coordination with the policy levels of government or
otherwise than in the most meticulously careful and professional manner that it may
be possible to devise. But when these and all of the other requisite tests are met, and
when a top-level decision has been taken to entrust an operation to agencies that
include some of the most able and dedicated persons to be found anywhere in the
service of our Government, there should be a greater public willingness to give those
' One such scavenger (as cited on p. 82) recently received his long overdue comeuppance when
Kenneth Hugh DeCourcy, editor and publisher of the Intelligence Digest, was convicted on 13 December
last in the Old Bailey of fraud, forgery, and perjury and sentenced to seven years.
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005000-4
Approved For Release 2005/06/14: CIA-RDP84B00890FZ8OQ$ OOEOOA3-4
brethren who are "serving the rice" some benefit of the doubt. When on November
28, 1961, President Kennedy declared in commenting upon the difficulties of the
intelligence profession that "its successes are unheralded and its failures are trum-
peted" it was surely farthest from his intention to grant to critics an unlimited shooting
license to hunt within this sensitive preserve.
(From Volume 8 Number 1, p. Al, 1964; Unclassified)
9%pproved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
INTELLIGENCE IN PUBLIC LITERATURE
THE CODEBREAKERS: The story of Secret Writing. By David Kahn. (New York:
Macmillan. 1967. 1164 pp. $14.95.)
The journalist-author of this massive, richly informative, and eminently readable
book has been an amateur cryptologist since 1943, when he was thirteen, and for
many years President of the American Cryptogram Association. He has largely sue
ceeded in the undertaking set forth in his preface, to write a serious history of
cryptology-the development of the various methods of making and breaking codes
and ciphers and how these have affected human events-using primary sources wher
ever possible and not fictionalizing or exaggerating the influence of cryptologic suc-
cesses, although "codebreaking is the most important form of secret intelligence in the
world today." Certain deficiencies from an unqualified success of the work wil be
noted at the end of the review.
The preface is followed by a helpful few pages on the vocabulary of cryptology,
and then the reader i launched into 965 pages of main text.
The opening chapter, "One Day of Magic," is a dramatic presentation of the role
of cryptology in connection with the attack on Pearl Harbor. The story begins with
Herbert O. Yardley's cryptologic sction of military intelligence in World War I and
"Black chamber" of the 1920s. The events of the period between the wars are woven
into a coherent narrative leading to the American success in breaking Japanese codes
as war came closer. Kahn tells what was done, how it was done, and what the effect of
those achievements was on the "day of infamy." The lengthy cast of people cited in
these 67 pages is widely varied and generally pertinent. The standout star is William
F. Friedman, "the world' greatest cryptologist," in his role in the attack on the Purple
crypto-system of the Japanese.
The real conclusion to this chapter appears early in "Notes to Text," which
occupy 156 pages at the back of the book. In the first few of these pages Kahn gives a
cogent summary of his views on the responsibility for the Pearl Harbor disaster.
paralleling closely such authoritative and well-reasond opinions as those of the
congressional investigative committee, Roberta Wohlstetter, and Samuel E. Morison.
After this dramatic opening the reader is treated to a pageant of cryptography
through the centuries, beginning with the earliest known deliberate transformation of
a writing about 1900 B.C., found in the tomb of Khnumhotep II. Cryptographic
developments of the ensuing 3,000 years are traced through India, Mesopotamia, Bab-
ylonia, and Assyria, in Greek and Roman writings, in Persia, Egypt, Anglo-Saxon
Britain, and Scandinavia.
To this point the story is simply of cryptography, the rendering of a message
unintelligible by some transformation of the plain text. The cyptanalysis side of
cryptology begins with the Arabs, who in the seventh century were the first to discover
and record methods of analyzing the frequency and juxtaposition of letters. The au-
thor describes with examples and anecdotes the developments from this beginning to
the sudden rise of secret writing with the Renaissance in western civilization an the
work of Geoffrey Chaucer and Roger Bacon. Thirty centuries is a long period to cover
in some thity pages of text, but seven pages of notes on this chapter indicate that Kahn
has rather thoroughly plowed the field.
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000500RJ3-4
MORI/HRP PAGES 91-95
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005-4
Next the spread of political cryptography is pursued from rudimentary begin-
nings in the early I3thcentury through Venice, Rome, the Vatican, the secular prin-
cipalities of Italy, and throughout Europe. The growth of cryptology paces evenly the
flowering of modern diplomacy. Kahn's examples range from the well to the little
known and from the simple to the recondite in each period and stage of development.
The development of the modern system of polyalphabetic substitution, described
in a chapter called "On the Origin of a Species," began in the 17th century with the
work of four amateurs who adopted a mixed alphabet, the principle of letter-by-letter
encipherment, and an easily changed key. A further improvement came in the use of
grilles and tableaux to govern the enciphered sequence. These successes were not
achieved without pitfalls and pratfalls, which Kahn recounts with clarity and gaiety,
including an example of Casanova's use of cryptanalysis as a key to seduction.
In spite of the advance to polyalphabetic substitution, the nomenclators system of
cryptography first developed for Pope Clement II in the late 14th century continued
to flourish in Europe. Kahn attributes its continued use to a legend of unbreakability
nourished by writings of inferior cryptologists, whose books
... have a certain air of unreality about them. There is good reason for this. The authors borrowed
their knowledge from earlier volumes and puffed it out with their own hypothesizing, which seems
never to have been deflated by contact with the bruising actuality of solving cryptograms that they
themselves had not made up. The literature of cryptology was all theory and no practice.
"The Era of the Black Chambers" begins with the work of "France's first full-
time cryptologist: the great Antoine Rossignol," under Richelieu, Louis XIII and XIV,
and Mazarin. Kahn goes on to describe the almost unbelievably efficient Geheime
Kabinets-Kanzlei of Vienna in the 18th century, and in England the work of John
Wallis for William and Mary and later of Edward Willes and his descendants, who
dominated the English field for nearly a century.
Across the Atlantic cryptology was making its way informally into the life of the
American colonies. In 1775 the solution of a monoalphabetic substitution cipher
showed George Washington that a Boston Tory was sending military information to
British commander Gage. James Lovell, of the Continential Congress, may be called
the father of American cryptanalysis for his prompt solutions of some intercepted
redcoat cryptograms. There was cryptographic involvement in the case of Benedict
Arnold and later that of Aaron Burr. Thomas Jefferson invented a "wheel cypher," far
and away the most advanced of its day, but he seems to have filed and forgotten it. It
was rediscovered among his papers in the Library of Congress in 1922, the year the
U.S. Army adopted an almost identical device invented independently.
Kahn stresses how telegraphy made cryptography what it is today, principally by
creating a new instrument for war-the signal communications that enabled
commanders for the first time in history to exert instantaneous and continuous control
over great masses of men spread over large areas. The telegraph broke the 450-year
reign of the nomenclator and brought acceptance of the need for polyalphabetic
substitution-the adoption of which was, however, followed shortly by its solution.
The role of ciphers in the Civil War and postwar politics is described in a brief chapter
called "Crisis of the Union."
Of cryptologic events before World War I perhaps the most sensational involve-
ment occurred in the Dryfus case, which was not finally closed until 1906. Less than a
decade later the war engulfed most of the principal nations of the world, and commu-
nications-now by radio as well as cable-took on a new importance. British and
French cryptology had an early lead; Germany had no cryptanalysts on the Western
Front for the first two years of the war. In the United States, Hitt's Manual for the
9Ipproved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
gdpproved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Solution of Military Ciphers, selling for thirty-five cents, served as the textbook to
train cryptanalysts of the American Expeditionary Forces.
In "A War of Intercepts" Kahn covers the episodes of the war in which
cryptology was involved, that of the Zimmermann telegram being the outstanding
one. This war "marks the great turning point on the history of cryptology." From an
infant science it had become big business. Radio made all the difference, but
cryptanalysis had matured, too.
"Two Americans" are introduced in chapter 12-Herbert O. Yardley, who "owes
his fame less to what he did than to what he said-and to the sensational way in which
he said it," and William Frederick Friedman, "uncontestably the greatest," whose
eminence is due "most emphatically to what he did." Of the latter:
His theoretical studies,which revolutionized the science, were matched by his actual solutions.
which astounded it. Both are complemented by his peripheral contributions. He straightened out the
tangled web of cipher systems and introduced a clarifying terminology for his arrangement. Words he
coined gleam upon more than one page of today's dictionaries. His textbooks have trained thousands.
His historical articles have shed light in little-known corners of the study, and the Shakespeare book
has done much to quash one major area of a perennial literary nuisance. Singlehandedly, he made his
country preeminent in his field.
The work of private individuals and corporations in developing new machines
and new aspects of cryptology in the period between the wars is told in convincing and
sometimes intimate detail in the chapter entitled "Secrecy for Sale." The principal
names are Vernam, Hebern, and Hagelin. Kahn seems to have something of an obses-
sion for his belief that "the armed forces had adopted the rotor principle from Ilebern
and used it without just compensation in hundreds of thousands of high-security ma-
chines in World War II and the cold war."
Kahn missed, incidentally, an interesting anecdote about the testing of the
Hebern machine at the Navy building. There were continuing electrical problems-
fuses blowing and solenoids burning out-although other tests which the Director of
Naval Communications had suggested be carried out at his home on Kalorama Road
gave no such trouble. It was finally discovered that the Navy building was still using
direct current in 1926, while the Kalorama Road neighborhood was provided with AC
power.
The cryptography of World War II is delineated in four chapters covering 136
pages. Numerous anecdotes and episodes and some epic stories are interestingly told,
many in good perspective. It is clear that Kahn found several ready European sources
of information about allied, enemy, and neutral cryptology in the war. The detail
sometimes appears exhaustive. The sources he names are never the top experts, for the
most part entirely unknown; and his narratives consequently depend upon surface and
low-level detail. But the stories are well told.
The one great exception to his European coverage is Britain, and the gap shows.
Probably British cryptologists, under the constraints of their Official Secrets Acts, are
less likely to talk than those from countries with less severe protective laws. In any
case, Kahn has stated that he excised from his text at the request of the Defense
Department the material he had on British cryptologic activities.
In narrating events of the Pacific war Kahn sometimes violates his prefatory
promise not to credit cryptanalysis unduly, or at least he fails to credit other factors
After telling, dramatically and in detail, the story of the interception and death of
Admiral Isoroku Yamamoto, for example, he concludes, "Cryptanalysis had given
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005003-4
Approved For Release 2005/06/14: CIA-RDP84B00890R0008000,Q3-4
America the eqivalent of a major victory," thus ignoring his own reminder that
"Knowledge alone is not power. To have any effect in must be linked to physical
force. "
A chapter of 62 pages devoted to the history and structure of the National Se-
curity Agency tells of publicized successes and failures in which it has been involved.
Descriptions of scandals and defections, most notably that of Martin and Mitchell, are
derived from the news accounts and lead to an endorsement for Congressional surveil-
lance of intelligence agencies. This chapter reports on military communications gen-
erally, along with those of the Department of State and other parts of the government,
including the hot line to Moscow. Most of the material is based upon news releases,
news accounts, and speculation. Kahn seeks to validate the latter by a sedate notice in
his "Notes to Text" that he has used "the word `probably' or the verb `may' to indicate
that the statement is my own supposition"-rather too inconspicuous flags of warning,
it seems to this reviewer.
The book's last section is a collection of heterogeneous addenda that can be taken
or left. There is a psychoanalytic treatment of cryptology in which cryptanalysis is
equated with voyeurism and it is implied "that cryptography may come ultimately
from the infantile sexual pleasure that Freud says children obtain from the muscle
tension of retaining the feces." There is a catch-all chapter discussing miscellaneous
motives, purposes, and media for cryptologic activity. "Rumrunners, Businessmen,
and Makers of Nonsecret Codes" offers well-told stories about these subjects and in-
troduces a lady code expert of the war against rumrunners in the prohibition era-
Mrs. William F. Friedman. There is a collection of historical oddities, the most intrigu-
ing of which is probably the still unsolved Voynich manuscript. The problem of Roger
Bacon and the Shakespeare writings is treated not uninterestingly. Finally we go way
out with paracryptology to "Ancestral Voices" and "Messages from Outer Space."
In sum, this reviewer learned a lot from The Codebreakers, found many parts
and sections to be of great interest, and considers it a monumental work. The short-
comings I mentioned above derive from a careless and somewhat cavalier attitude
toward factual detail in matters not strictly cryptologic. One detail is the meaning of
the word interview. A number of the people whom the author "interviewed" told me
they had no idea their conversations with him were related to the writing or publica-
tion of a book. One man assured me that his "interview" consisted of a 15-minute
telephone conversation devoted mostly to reasons why Kahn should not try to write
about this subject.
As to historical detail: there are anachronisms in military rank; a 5'8" commander
is called "tall"; Ellis M. Zacharias is mistakenly treated as a cryptanalyst; the "Manchu
laws" requiring the rotation of Army officers to the field are foolishly applied to the
Navy; Vladivostok is cited as having a U.S. legation when there was never more than a
consulate there; the distance from Navy building to State is called 8 or 10 blocks; the
United States is said to have had in World War II 1,350 days of conflict, three to
many; Yamamoto is said to have lost two fingers of his right, rather than left, hand;
Magic is given as the source of a report on Japanese shipping which actually came
from ONI agents along the Chinese coast; a Japanese ship misnamed; it is claimed that
the creation of the USAFFE command was a "direct" result of intercept information
about German pressures on the Japanese.
As this review was nearing completion I had occasion to talk with Kahn and
mentioned some of these errors; he brushed them aside as too minute to be concerned
about. It is more understandable that his lack of experience in any kind of wartime
91kpproved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Bg4,roved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
office leads to some gaucheries and misinterpretations of the relationships among
offices, functions, people, and intelligence reports; nowhere were organizational
arrangements so precise and neat as he describes them.
(From Volume 12, Number 3, p. 99, 1968; UNCLASSIFIED)
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005a9A3-4
8A3roved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
THE INVISIBLE GOVERNMENT. By David Wise and Thomas B. Ross. (New York:
Random. 1964. 375 pp. $5.95.)
The journalist-authors of this best seller admit that Communist subversion and
espionage pose a unique threat to the American people and their government, and
they accept the necessity under certain circumstances for secret American efforts to
prevent Moscow and Peking from gaining new allegiances. But they profess to believe
that our secret attempts to meet the Communist challenge constitute so real a threat to
our own freedoms that they must be exposed in as detailed and dramatic a way as
possible. If the Soviets are profiting from these revelations, as they are, Wise and Ross
apparently think that such self-inflicted wounds must be endured in the battle against
excessive secrecy.
Broadly stated, their thesis is that the U.S. intelligence community with the CIA
at its heart, has grown so big and powerful that it threatens the democracy it was
designed to defend. The CIA, they say, conducts its own clandestine foreign policy,
and even the President has been unable to control it. The State Department is power-
less to exert policy direction because its ambassadors are kept uniformed and are
habitually by-passed by CIA operatives. The Congress has abdicated its legislative role
and votes huge secret funds without adequate knowledge of how the money is spent
If all this were true, American democracy would certainly be in serious trouble,
and the alarm professed about the "invisible government" would be justified. But is it
true? Strangely enough, the authors themselves provide, ambiguously, a negative an-
swer to this question which is so central to their major thesis. They concede the
existence of institutional arrangements designed to give the President and his principal
foreign policy advisors the very kind of close policy control over secret operations that
they ought to have. Early in the book, they mention the existence of a "Special Group"
which makes the major decisions regarding clandestine operations, though they say it
is so secret that it is "unknown outside the innermost circle of the Invisible Govern-
ment." The reader must wait through 255 pages to learn that the members of this
policy group are no sinister shadows but McGeorge Bundy in the White House, Sec-
retary of Defense, McNamara, the Under Secretary of State for Political Affairs, and
the Director of Central Intelligence. These are just the officials that one would expect
the President to have chosen to advise him on matters of high clandestine policy, and
they are far from invisible.
The authors, in order to prove their thesis, do not try to show that the Special
Group is ineffective: they claim it meets in a "highly informal way without the elabo-
rate records-and procedures of other high Government committees"; there is no "oui-
side analysis" and "little detached criticism"; the members are too busy with their
other duties to perform their supervisory function adequately. The impression is left
that the President and the Secretary of State are not even informed of the Group s
decisions. One must have a very low opinion of the sense of responsibility and
competance of the men in these key government positions to believe so cavalierly. And
yet if one does not believe this, the authors' whole portrayal of an irresponsible and
invisible government becomes inherently incredible.
Similar treatment is accorded the President's Board of intelligence activities
formed under the Eisenhower administration and reconstituted by President Ken-
nedy. This is dismissed as a superficial facade with the remark that "both committees
were composed of part-time consultants who met only occasionally during the year,
07
Approved For Release 2005/06/14: CIA-RDP84B00890R00089J P PAGES 97-99
Approved For Release 2005/06/14: CIA-RDP84B00890R00080003-4
and it is implied by use of the past tense that the Board is now extinct. Actually it is
very much alive and its membership is no secret, having been announced in a White
House release of April 23, 1963. It includes Clark Clifford, William O. Baker, Gordon
Gray, Edwin H. Land, William L. Langer, Robert D. Murphy, and Frank Pace. These
are able, experienced men who discharge conscientiously their duty of advising the
President on the workings of the intelligence community, and it wouldn't have taken
much journalistic initiative to find this out. They have a right to resent being dismissed
as "veneer."
In his last public reference to the CIA, at the time of the Diem crisis in Vietnam,
President Kennedy declared, ". . . I can find nothing, and I have looked through the
record very carefully over the last nine months, and I could go back further, to
indicate that the CIA has done anything but support policy. It does not create policy; it
attempts to execute it in those areas where it has competence and responsibility.... I
can just assure you flatly that the CIA has not carried out independent activities but
has operated under close control of the Director of Central Intelligence, operating
with the cooperation of the National Security Council and under my instructions...."
The impression grows that Wise and Ross felt obligated to ignore or at least belittle any
evidence that the supervision of American intelligence activity is in responsible hands.
This impression is strengthened by their description of the role of Congress. They
grant that the CIA budget and program is subject to review and approval by special
subcommittees of the Appropriations and Armed Services Committees of both Houses,
but they reject this congressional scrutiny as inadequate. They charge that the sub-
committees "are controlled by the most conservative elements in Congress, men who
are close personally and philosophically to those who run the `Invisible Government.' "
Then they state the case for a joint congressional watchdog committee, the one specific
institutional reform they argue for. So far the watchdog committee idea has been
opposed not only by successive administrations but also by the congressional
leadership.
If this book is widely accepted at its face value within the United States, it can
only reduce public confidence in the intelligence services and make it more difficult
for them to recruit the able men and women we shall need in the difficult days that lie
ahead. Although incomparably better research than its forerunner by Andrew Tully,'
it too tends to portray the American on the clandestine fronts of the cold war as
typically a reactionary, unscrupulous blunderer. One chapter purports to describe the
desperate efforts of the Peace Corps to prevent itself from being infiltrated by the
CIA. Leaders of the Corps are represented as being so fearful that CIA will disobey
presidential directives and attempt to infiltrate that they take the most elaborate
precautions. The implication is clear that CIA's irresponsibility made such precautions
necessary. Only at the end of the chapter will the reader find a brief sentence admit-
ting that no single case of attempted infiltration was ever discovered.
Another effect of the book is to expose for the first time certain individuals and
organizations as having intelligence connections and thus sharply increase their
vulnerability to Soviet attack. A spokesman for Random House has been quoted as
claiming that the book contains nothing that had not already appeared in public print,
but in the first chapter the authors boast that "much of the material has never been
printed anywhere else before." They insist that they have stayed "within the bounds
of national security" but appear to have reserved to themselves the right to decide
what those limits are. Such an attitude raises serious questions as to the responsibility
of the journalist in a free society in a time of cold war. In Great Britain, which is
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
BAroved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
second to none in its devotion to liberty, there exists an Official Secrets Act under
which the authors would have been tried and sentenced to prison. Such a law in this
country is not feasible, but in its absence the American journalist carries an even
heavier responsibility than his British counterpart.
By far the most damaging consequence of this book will have been its exploitation
by the propaganda apparatus of the Soviet and Chinese regimes. The CIA has under-
standably been for a long time a primary target of the Soviet KGB, and everything
from forgeries to full-length books have been inspired by the Soviet propagandists in
their efforts to destroy the reputation of American intelligence organizations and
undermine their effectiveness. The KGB technicians must find it hard to believe their
good luck in being donated so much useful ammunition by a reputable American
publisher and two certifiably non-Communist journalists. The book is being reprinted
and replayed in press and radio from one end of the world to the other. That much of
this material has been printed before does not reduce the value to the Soviets of having
it gathered in one volume under such genuine American auspices.
The problem of balancing freedom with security has been an ancient dilemma
for democratic states in their long struggle to survive against aggressive totalitarian
isms. This book may serve to dramatize the problem, but it does not provide any deer,
insight or new solutions. It was written not to enlighten but to shock and to sell.
Charles E. Valpey
(From Volume 8, Number 4, p. 106, 1964; Unclassified.)
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050903-4
Roved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
ESSENCE OF DECISION: EXPLAINING THE CUBAN MISSILE CRISIS.
By Graham T. Allison. (Little, Brown, and Company, Boston, 1971.)
VICTIMS OF GROUPTHINK. By Irving L. Janis. (Houghton, Mifflin Company,
Boston, 1972.)
Both of these books are about "decision making," a trend of contemporary social
and political science that, in Stanley Hoffman's acerbic regard, involves digging
around in other people's waste baskets to see who did or said what to whom. Both
treat, from different vantage points, the problem of how governments make decisions
or shape their behavior on the gravest matters of national security. One is exclusively
on the Cuban missile crisis; the other devotes much attention to it. Both have vital
lessons for intelligence. Allison's book is about how to understand the decisions and
actions of governments; its main aim is to present tools that can improve that under-
standing. Allison thus speaks directly to the tasks of analysis in most of the intelligence
community's production components. Janis, although in search of understanding and
better analysis, is really after improvements in policy decision making itself; but his
insights into policy decision making have a useful bearing on what we may call intel-
ligence decision making.
Reviewing Allison's book at this time presents the reviewer with a dilemma.
Those who have not come into contact with it, now some three years after its publica-
tion, must either be little interested in its subject or have no time for reading. They
would best be served by a fairly extensive survey of its contents. Those in the intel-
ligence community most directly interested in its message, however, have in all likeli-
hood read it carefully and have been influenced professionally by it. What they need
would be more in the nature of a status report. Neither task can be adequately met in
a short review. The dilemma is sharpened by the fact that this reviewer has a strong
stake in the popularity of the Allisonian view but remains at heart somewhat ambiva-
lent as to its value.
The Essence of Allison lies in three approaches to understanding government
behavior, three conceptual models, as he calls them. The models are composed of the
assumptions we use, the questions we ask, the information we seek, the vocabulary we
employ; and they shape the answers we get.
Model I is the Rational Actor. It states or, more correctly, implicitly assumes that
governments are akin to rational individuals who have values (or cost-benefit calcula-
tions), purposes, and an instrumental command of tactics. They establish aims, gather
and assess information, weigh risks, then choose and implement a plan of action as an
exceedingly sensible man would buy a car or play a hand of poker. If the Rational
Actor fails or gets in trouble, it is because he lacked the necessary information, miscal-
culated, or was lacking in rationality. The noun-verb combinations of this Model are
straightforward and familiar: "The USSR seeks . . . , " "Moscow has apparently
decided ... ," "The Politburo believes ... ," "The Russians are now going to ...."
The subject may be plural, but the notion is singular and the action conscious and
purposeful. Most important, the all-pervasive assumption is that of a fully reasoned
correlation of ends and means, and complete self-control on the part of the actor, the
government in question.
Allison's purpose is to challenge the Rational Actor Model "on its home
ground"-that of deep international crisis where reason and self-control are at a pre-
mium-and trim it down to size as a tool for understanding government behavior. He
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050d8J-4
MORI/HRP PAGES 101-106
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005WQ3-4
starts essentially from the realization of any attentive newspaper reader that govern-
ments are not really Rational Actors. A government is an assortment of disparate
institutions, each with its own preoccupations and habits. Further, a government is an
arena in which groups and individuals compete for power and influence. These char-
acteristics of government are as important in shaping government behavior as are
rational calculation and purpose, perhaps more so. From them he derives two alter-
native models to complement the perspective of the Rational Actor.
Model II is called the Organizational Process Model. It is concerned with the role
of standard operating procedure of governmental entities in the aggregate behavior of
the government they make up. Any member of any organization can understand the
power of Model II. Many actions of the organization take place, not because they are
sensible or some powerful influence wants it that way, but because that is just the way
things are done. Large organizations have to have standard operating procedures to
handle important and complex matters or they will lapse into complete paralysis.
Moreover, government organizations are created to handle enduring, repetitive mis-
sions; they cannot develop new strategies or operational repertoires from scratch in
each new instance. Thus, they are usually called into action to do something more or
less as they've always done it, and you get the standard operating procedure with
minor variations.
Model III is also quite congenial to a layman's view of reality; it is the Gov-
ernmental or Bureaucratic Politics Model. When you put people into an organization,
or little organizations into bigger organizations, you have Politics. People and organiza-
tions-"players" in Allisonian terms-compete for status or influence, or perhaps to
avoid influence and the risks that go with it. This means struggle, factionalism, even
duplicity on the part of the players, the antithesis of what the Rational Actor is
supposed to stand for.
The backbone of Allison's book is a series of chapters in which he first introduces
the logical or theoretical machinery of his three models along with a precis of their
academic antecedents, and then methodically applies them to the history of the Cuban
missile crisis to see what they explain about the behavior of the Soviet and American
governments in that harrowing event. Both the theoretical and applied chapters are
rich in value and thoroughly worth reading. Because he is supplied with an abundance
of data, it is the American side of the story, not surprisingly, that shows Models [I and
III to best effect. In a familiar and poignant episode we see a human confrontation
between Model I in the form of Secretary McNamara and CNO Admiral Anderson
representing Models II and III. The Secretary wants to know how the CNO will
implement the quarantine to see that it will conform with the carefully calculated
strategy of the Administration (Model I). The CNO cites the Manual of Naval Regula-
tions (Model II) and suggests that the matter be left to the Navy (Model III). To Model
I's way of thinking, Model II or "how John Paul Jones would have handled it," much
less Model III or "leave it to the Navy," just wasn't good enough.
Unfortunately for us, Dr. Allison's tour de force falls short precisely where we are
most interested-in explaining Soviet behavior. At the outset, Allison poses several key
questions about the crisis that he feels have not been satisfactorily answered, two of
them about Soviet behavior: Why did the Soviets try the Cuban missile gambit? Why
did they pull out of it? In the end, his effort to apply Models II and III are forced and
contrived, despite a treatment that is factually largely accurate and carefully done.
The main problem, of course, is data. As has been argued persuasively by Messrs.
Johnson, Steinbrunner, and Horelick in a study commissioned by CIA (The Study of
Soviet Foreign Policy: A Review of Decision-Theory Related Approaches, the Rand
Corporation, forthcoming), Models II and III, along with other approaches focused on
10
I pproved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Bo proved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
the inner workings of governments, are voracious consumers of detailed information
When that information is lacking, the models do not work well. They turn into largely
speculative excursions, worthy of pursuit and inspiring to the imagination, but devoid
of reliable explanatory, much less predictive, power. In applying Model III to Soviet
behavior in the crisis, Allison explores the role of Khrushchev, his conflicts with other
members of the leaderships, and the possible impact of those conflicts on Soviet de
cisions. Incidentally, while he treats these matters fairly well, he is largely dependent
on the research of academic and official analysts who, without the aid of his models,
were hot on the scent of Kremlin conflict even during the crisis. But in the end, the
theoretical apparatus of Model III does not fill the gaps of absent information.
Allison's efforts to apply Model II to Soviet behavior focus on asserted conflicts
between what the Soviets may be presumed to have been seeking in putting the
missiles in Cuba and the way they actually went about it. In essence, Allison claims
that the Soviets "blew it" because their standard- operating procedures for deploying
the missiles and associated defenses revealed the move either too early, before the
missiles were operational, or too late, when it was very difficult to pull back. In
Allison's view, the Soviet authorities in charge, namely the Soviet Rocket Forces (SRF),
set about deploying missiles as they always had, in nice identifiable sites, mindless of
the need to orchestrate with Soviet diplomacy what the Americans learned and when
they learned it.
If "A" for effort is ever warranted, surely it is here. But the result is not quite
convincing. As we all know, the SRF can be quite secretive when it wants to be. But
Soviet military and political decision makers alike were surely aware that they could
start the Cuban move in secret, but they could not keep it a secret from the U.S.
Government very long. Why did they think they could go ahead with it when it was
discovered in the face of the kind of political pressure that Senator Keating and others
were placing on the Kennedy Administration? The reviewer is indebted to Mr. W. P.
Southard of CIA and Mr. Anatoliy Gromyko, currently of the Soviet Ministry of
Foreign Affairs and son of the Soviet Foreign Minister, for a plausible answer to this
riddle. Mr. Southard suggests that the Soviets, knowing they could not keep the secret
long into actual deployment, believed that they could count on the U.S. Government
to keep it a secret from the public and its political opponents, a not uncharacteristic
Soviet expectation repeatedly disappointed, and that the Kennedy Administration was
in fact signalling its willingness to let the missiles be deployed. In the weeks preceding
the outbreak of the crisis, Kennedy was saying in effect that he knew what was going
on in Cuba, that offensive missiles were not there, and "were it otherwise, the gravest
issues would arise"-this when it was already "otherwise" and the Soviets thought we
knew it. From this they may have concluded that the U.S. would acquiesce in the
missile move as long as the Soviets kept it from public view, as would the U.S.
The foregoing may seem farfetched but essentially no more so than Allison's
assumption that the Soviet government, not particularly given to light-handed man-
agement, would allow the trickiest undertaking since Alamogordo to run on unexam-
ined standard operating procedures. The Southard thesis has gained novel support
from the junior Gromyko who, in an article for a Soviet book on international crises,
argued that prior to the crisis, Kennedy did not directly challenge the Soviets as to
what was going on, and that they were as surprised as the U.S. public when Kennedy
threw down the gauntlet in his TV address. Admittedly there must be in this an
element of post hoc rationalization on behalf of Gromyko senior; but it is not therefore
a false view of Soviet perceptions. Which of the two theses fares best under Occam's
razor may be left to the reader and future historians. The point is that Model II facts
can be made to work just as nicely in a Model I explanation.
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005gj3-4
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005-4
In fact, although Allison sets out to challenge him on his own ground, the Rational
Actor remains standing astride the history of the Cuban missile crisis like the Jolly
Green Giant. Allison has a clear polemical interest in deprecating the power of the
Rational Actor Model. Among its offshoots, he accounts the various sub-models called
deterrence theory, strategic calculus, or missile power. These he finds inadequate to
explain Soviet behavior. But to this reviewer the strategic power approach offers about
as good an explanation of Allison's key questions-why they started and stopped the
missile gambit-as any available.
Despite the cruciality of strategic issues in the crisis, the Soviet view of these
issues preceding and during the crisis has never been fully sorted out in public discus-
sions. From the position of Moscow, or Khrushchev, or the Soviet General Staff, the
strategic situation in early 1962 must have appeared positively horrendous. After
much ballyhoo, the missile gap had collapsed in one speech by Roswell Gilpatrick; the
Soviets had only a few dozen soft and very slow-reacting ICBMs; a small, very vulner-
able bomber force; and a rag-tag assortment of missile submarines that the U.S. Navy
had under constant trail. Meanwhile, the U.S. had about 100 Atlas and Titan ICBMs
by mid-year 1962, a formidable force of 1,500 heavy and medium bombers, and 96
operational Polaris SLBMs. Moreover, it had been toying since McNamara came into
the Pentagon with a counterforce doctrine that looked fearfully like a theory of
preventive war to the Soviets. This was enunciated in McNamara's Ann Arbor address
which not only pronounced counterforce, but implied a U.S. expectation that Soviet
retaliation with any small surviving strategic force could be deterred. And finally,
Minuteman was coming into the force at what the Soviets must have found a mind-
boggling rate; Penkovsky's contribution from the SRF Bulletin of summer 1961 in-
dicates that the Soviets saw this with chilling clarity. In short, the Soviets faced a near
future of woeful strategic vulnerability; they knew it and knew we knew it.
What could they do? They could try to change the political relationship. This is
what they did after the missile crisis convinced them they had no choice. But in the
summer of 1962 Khrushchev, both for Model I and Model III reasons, was not yet
willing to scuttle his past tactics of confrontation. The Cuban missile gambit was a
cheap and daring way to fix the problem temporarily. Much is made of the probable
political value that successful deployment of missiles to Cuba would have had. But it
would also have had direct and tangible value in enhancing Soviet deterrence against a
surprise attack. For it could have created the kind of synergistic relationship not unlike
that existing between U.S. Minuteman ICBMs and bombers today. Facing deployed
missiles in Cuba, U.S. strike planners would have to choose between launching a
missile attack against the USSR simultaneously and an attack on the Cuban bases or
timing a missile attack on the USSR and an attack on Cuba such that they arrived at
the same time. In the first tactic, the strike on Cuba would arrive first, and rudi-
mentary communications would allow the Soviets to launch USSR-based systems on
warning. In the second, warning of a ballistic missile attack on the USSR might allow
some of the Cuban missiles to get off before they were destroyed. In practice, none of
this would have worked very well, but simply complicating U.S. operational problems
was a plus. And the Cuban missiles could have substantially increased the
megatonnage targeted on the U.S. in a preemptive strike.
When the U.S. finally made it clear it would not stand for this, the Soviets had no
choice but to back off, for the very same reasons they initiated the missile venture:
they were too vulnerable. The sole remaining mystery in this line of reasoning is this:
If Khrushchev was so impressed by actual and impending U.S. strength that he would
try such a desperate move, how could he believe the U.S. would let him get away with
it? Again, the simplest explanation may be the best. After the Bay of Pigs and the
1Roproved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
0#Aproved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
Vienna summit, Khrushchev thought he could psych Kennedy out. By inference from
the Gromyko essay, he continued to think so until very late in the game. Nobody said
the Rational Actor of Model I couldn't make mistakes.
Now where does all this leave us? Several useful lessons emerge from facing the
analytical challenges that Allison presents to intelligence analysis:
-A deliberate quest for different perspectives and approaches to explain
government behavior is definitely useful, because of the questions raised if not for
the answers found.
-Almost all "Facts" can be treated in several different ways; and a cor-
ollary, there can be facts without intelligence, but not intelligence without facts.
-It is extremely important to be explicit about assumptions and the distinc-
tion between logical inference and speculation. Speculation should be promoted
but not confused with inference.
-Finally, on really important matters, its unfortunately the charge of of-
ficial intelligence to be more than insightful; it must be right. This requires carry-
ing the methodological excursions of scholars forward to a synthesis that they
rarely achieve. When faced with an urgent intelligence problem, it will not do to
report that we see a bit of Models I, II, and III plus a few others we might invent.
They all have to be put together and the best explanation with the most predic-
tive power derived.
How this is done is indirectly a concern of Janis' Victims of Groupthink, provoca-
tively subtitled "A psychological study of foreign policy decisions and fiascoes." The
message of this book is simply conveyed: Why do individually wise, able, informed,
and dedicated foreign policy decision makers sometimes make some absolutely disas-
trous decisions and at other times do fairly well? Part of the answer, according to
Janis, lies in the pernicious influence of Groupthink. When this syndrome is present
and strong, there is bound to be trouble; when absent or controlled, things will turn out
better. Groupthink is the purely internal pressure for consensus that is generated by
the social dynamics of small, cohesive, deliberative groups of people. It includes the
pressure to "get along and go along," the tendency of action groups to idealize their
image of themselves and demonize their image of adversaries, the incentives to get
difficult things over with, and resistance to scrutiny of biases and assumptions that will
challenge the group's cohesion and self-image.
Janis traces the deleterious effect of Groupthink through four modern episodes of
national security policy: the Bay of Pigs, U.S. operations in North Korea, Pearl Harbor,
and Vietnam. By way of counterpoint to these fiascoes, in his view, he offers examples
in which success attended the control or suppression of Groupthink: the Cuban Missile
Crisis, and the formulation of the Marshall Plan. The author is particularly attentive to
the lessons of the Bay of Pigs and the Cuban Missile Crisis because they were such
starkly contrasting performances by essentially the same group of decision makers.
The Bay of Pigs episode stands for Janis as "a perfect fiasco," a failure of collec-
tive reason so dramatic as to stagger the imagination. Why did it happen? Why did
sensible people drift so uncritically into so wrong-headed an operation? In reviewing
the published histories, he finds that key figures in the Kennedy Administration went
along even though they felt and expressed reservations which on their face were
profound but still were glossed over or ignored. A whole set of wrong assumptions was
bought, from the military viability of the plan to the prospects for an anti-Castro
revolt. Janis cites four so-called official explanations for this episode employed after
the fact by analysts and participants: The Administration had to act on the plan for
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050 -4
Approved For Release 2005/06/14: CIA-RDP84B00890R00080005Js4
political reasons; the Administration was new and inexperienced; operational secrecy
kept needed expertise out of the deliberations; doubting decision makers did not want
to damage their reputations by casting doubt. The author finds all of these wanting for
various reasons and goes on to assay how the real villian was Groupthink, the pressure
for consensus. It took the guise of an "illusion of invulnerability," and "illusion of
unanimity," "suppression of personal doubts," "self-appointed mindguards" and other
forms. Few who read Janis' book will attend their next meeting without sensing the
demonic presence of Groupthink.
Top level decision making during the Cuban Missile Crisis was a success because
it consciously fought the Groupthink phenomenon. It encouraged dissent and repeated
review of judgments. It took place in a changing organizational context that obstructed
the establishment of set patterns of authority and influence. The President kept out of
group deliberations so as not to intimidate subordinates. Fatiguing as it was, decisions
were allowed to be reopened. Janis offers in his historical and concluding chapters
some interesting views on where and why Groupthink arises. He is not very successful
in telling us why in a few happy instances it does not arise. With regard to Cuba in
1962, he suggests, almost as an aside, that the threat of nuclear war might have had
something to do with it.
From Janis' perspective there are some similarities between policy decision mak-
ing and intelligence analysis, also a kind of decision making in that it involves a
weighing of evidence and then a decision on what judgment to put forward. The
lessons derived are also similar: The most important one is to make sure that assump-
tions are made as explicit as possible and scrutinized with the same rigor as the
evidence. The value of this lesson stands out in official reviews of the intelligence
community's performance prior to the outbreak of the October Middle East War.
Unfortunately, there are a great variety of "think" syndromes that impair intel-
ligence analysis. Perhaps worst of all is Nothink when the day-to-day hassle prevents
recognition of impending problems and thought about them until they are blazing hot.
Then there are Bossthink and Bureauthink, hierarchical derivatives of Groupthink,
whereby analysts almost unconsciously assimilate the views of superiors and their
organizations and drive evidence to fit them. One encounters "I've-seen-it-all before"-
think, a peculiar peril of the experienced analyst in a profession that is obliged to
appear, if not be, omniscient. Another one could be called Lobbythink. This occurs
when some preferred policy position is being pushed in the guise of intelligence analy-
sis. When the intelligence is clearly linked organizationally with a policy making
institution, this syndrome is readily detectable. But it may appear in the most pristine
garb of "objectivity" or in a determination to see some objectionable point of view
counterbalanced.
Finding a remedy for all these potential maladies is happily not the objective of a
book review. But if they are genuine problems, surely part of the solution lies in
reflection, an enterprise for which the intelligence profession must allot a good deal of
time. A few hours with Allison and Janis couldn't hurt.
(From Volume 18, Number 1, p. 61, 1974; Unclassified)
106
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
Bdklkproved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
AN INSTANCE OF TREASON: Ozaki Hotsumi and the Sorge Spy Ring.
By Chalmers Johnson. (Stanford University Press. 1964. 278 pp. $6.50)
Popular spy anthologies have long paraded a strange combination of fact and
fantasy about Richard Sorge's espionage operation on behalf of the Soviet Union
twenty and more years ago in the Far East. The first English-language work on the
case was the heavily documented but somewhat inadequately researched Shanghai
Conspiracy: the Sorge Spy Ring by Major General Charles A. Willoughby, General
MacArthur's intelligence chief.' General Willoughby and his staff, working with a
large number of documents procured by the occupation forces upon entering Japan,
assembled for the military establishment, a congressional committee, and the public an
illuminating collection of facts about the espionage activities in China and Japan of
Sorge, confessed member of the CPSU and agent of Department Four (Intelligence) of
the Soviet Army General Staff, and his ring. It was this material which served as the
basis for General Willoughby's book. Details copied indiscriminately from the Japa
nese documents available at the time, English transliterations from Japanese translit-
erations of Russian names, errors made by translators unfamiliar with the Soviet es-
pionage establishment and its personalities, a tendency to accept colorful
characterizations of members of the ring, and a concentration of interest on the angle
of American involvement left the Willoughby study an interesting but not unflawed
account of the activities of the net.
Later The Man With Three Faces, by Hans-Otto Meissner,2 a former member of
the German embassy staff in Tokyo, intermingled fact, near-fact, and completely
erroneous information with the author's personal recollections. This uncritical work
carried in an epilogue the oft-repeated legends that Sorge was not executed as reported
and that the mysterious "Kiyomi," Sorge's mistress, had been machinegunned to death
in a Shanghai cabaret in 1947 for having betrayed him. But the memoirs of the
mistress, Miyake (Ishii) Hanako, very much alive and running a boarding house for
students in Tokyo, were published the same year as Meissner's book.
It is from the Willoughby and Meissner English-language materials that most of
what has appeared in various anthologies and 1-knew-Richard-Sorge-when stories has
been taken-and sometimes embroidered on to please the public taste.
In the meantime, however, some two hundred books and major articles were
written in Japan about Sorge and his associates. One, we noted, was by his mistress,
some came from minor members of the net, one was a collection of letters written by a
central figure in the net, Ozaki Hotsumi, to his wife from prison, and yet another was
written by Ozaki's half-brother, who had been 13 years old when Ozaki was arrested.
With rare exception each of these many writings contributed a little something to
improve later ones. The most important single work was the three-volume Materials
on Modern History: The Sorge Incident published in Japanese by Misuzu Shobo, a
leading publishing house.' Devoted entirely to the police and court records of the case,
it printed for the first time many documents unavailable at the time of the Wil-
loughby study. These three volumes probably did more than any of the others to dispel
myths which had grown up around the figures in the Sorge net.
New York: E. P. Dutton, 1952.
London: Evans, 1955. Meissner should not be confused with Joseph Meisinger, a colonel in the Ge-
stapo, who was assigned to the German embassy in Tokyo as security officer at the time of Sorge's arrest.
3 Gendai-shi Shiryo: Zoruge Jiken. Tokyo, 1962.
07
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050d03
-4
MORI/HRP PAGES 107-109
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050990 -4
In An Instance of Treason Chalmers Johnson now brings together and analyzes
the most significant of these Japanese contributions to the history of Soviet espionage.
His study is centered on the background and activities of Ozaki Hotsumi, probably the
most effective member of the net. It gives also an excellent picture of the times which
produced Ozaki and of the other members of the net, but we must wait for some
future work to treat the many German-language documents publicly available which
deal with Sorge's earlier life and German and Soviet associations.
Mr. Johnson corrects the several transliteration errors found in earlier books and
correctly identifies and discusses in extensive footnotes the Soviet personalities men-
tioned by Sorge in his confessions. The professional student of the Sorge operation will
be particularly grateful to him for having included a glossary of pertinent Japanese
names in both romanized and ideograph form, a lengthy bibliography, and a complete
index. For the more general reader he debunks many of the old myths; in only a few
instances does he perpetuate previous irregularities, and these are minor, generally a
matter of being misled by earlier writers' colorful inventions about personalities in the
net.
The reader may not agree with Mr. Johnson's high evaluation of Ozaki as an
individual or as a revolutionary, but he will most certainly be impressed by the chron-
icle of Ozaki's rise within Japanese circles of influence and consequent access to
official opinion and secret information. As a revolutionary, a man such as Ozaki, it
could be argued, would likely have been purged if he had been within the Soviet
borders, for he was feudal in approach, supported the Greater East Asia Co-Prosperity
Sphere as a means of encouraging a resurgence of nationalism throughout Asia, and
dreamed of a revolution in Japan coming not from the lower strata of society but from
the intellectual elite. However this may be, within the Japanese society existing at the
time he served the Soviet intelligence services almost if not equally as well as Sorge
himself.
Another point at which intelligence officers could possibly disagree is when Mr
Johnson attempts to distinguish between cooperators and real members of the net. His
probings, however, of the status of cooperator vs. agent, Soviet agent vs. Comintern
agent, and the.like are more than semantic exercises. He explores in depth and accepts
the hypothesis that Sorge and Max Clausen, the net's radio operator, were the only
ones who knew that their superiors were officials of Red Army intelligence, the other
members of the net, including Ozaki, believing themselves to be working for the
Comintern. Then he makes one of the most interesting points of the entire book: he
explains how the Japanese authorities found it legally advantageous to the prosecution
to keep characterizing the net as a Comintern activity, as Sorge first called it, despite
his later confession of the role of Department Four. Had this aspect of his confession
been accepted, he might have been spared from execution under Japanese law. This
seeming technicality is particularly intriguing in the light of the recent Soviet
acknowledgment (Mayevsky article in Pravda, 4 Sept. 1964) that Sorge was indeed an
agent of the USSR.
The Mayevsky article confirms another conclusion reached by Mr, Johnson, that
the greatest achievement of the net was its report in the fall of 1941 that the Japanese
would not attack the Soviet Far East but the Allied controlled territory to the south, a
report that made it possible for Soviet forces to be moved west to save Moscow. It also
confirms that the net's earlier reporting on the German plan to attack the USSR was
highly accurate though ignored by Stalin. As Mr. Johnson points out, Sorge considered
this one of his major achievements, and he claimed to have received a message of
thanks and congratulation from Moscow after his advance warning proved to have
been right.
108
Approved For Release 2005/06/14: CIA-RDP84B00890R000800050003-4
g roved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4
The Soviet acknowledgement of Sorge, twenty three years after his arrest and
twenty after his and Ozaki's execution, makes particularly timely the publication of
An Instance of Treason, the most complete study in English to date of the operation
of the net.
(From Volume 8, Number 4, p. 99, 1969; Unclassified)
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050093-4
Approved For Release 2005/06/14: CIA-RDP84B0089OR000800050003-4