STRATEGIC COUNTERINTELLIGENCE AND NATIONAL SECURITY
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP86M00886R002800160001-7
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
42
Document Creation Date:
December 21, 2016
Document Release Date:
August 25, 2008
Sequence Number:
1
Case Number:
Publication Date:
June 18, 1984
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP86M00886R002800160001-7.pdf | 1.35 MB |
Body:
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
EXECUTIVE SECRETARIAT
ROUTING SLIP
Please acknowledge receipt directly
for EXDIR as well as for DDCI (ref ER
84-2632).
Exec rve re
18 June 1984
Doic
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
NATIONAL DEFENSE UNIVERSITY
NATIONAL WAR COLLEGE WASHINGTON. D.C. 20319 / l
TO:
REPLY TO
ATTENTION OF:
Executive Director
Central Intelligence Agency
Washington, D.C. 20505
a)q- r/t 5y-.7- G3 2
SUBJECT: "Strategic Counterintelligepce and National Security"
Forwarded herewith is a copy of a research paper prepared by a
student at The National War College, Class of 1984. The subject
falls within the purview of your agency and is provided solely for
your information. The ideas and conclusions in the paper are
strictly those of the author. If you would like additional
information on the research program, or would like to suggest a
research topic that deals with an aspect of national security,
please contact Colonel Benjamin C. Buckley, USA, Autovon 223-8404 or
Commercial (202) 693-8404.
Z~~--rte
R`TY N/. STAPF0
iol el, USAF
Deers of Faculty
cc:'
EXEC
REG
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
STAT
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
THE NATIONAL WAR COLLEGE
NATIONAL DEFENSE UNIVERSITY
STRATEGIC STUDY
STRATEGIC COUNTERINTELLIGENCE AND NATIONAL SECURITY
by
R. B. WADE
FEDERAL BUREAU OF INVESTIGATION
A RESEARCH REPORT SUBMITTED TO THE FACULTY
IN
FULFILLMENT OF THE RESEARCH
REQUIREMENT
Research Supervisor: Mr. John F. Gilhooly
THE NATIONAL WAR COLLEGE
March 1984
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
EXECUTIVE SECRETARIAT
ROUTING SLIP
2j I
1 TDCI
5 DDI
611DDA
11 JIG
12 iCompt
13 1D/Pers
15
16 !SA/iA
AO/DCi
R 19
20
I SUSPENSE
Please acknowledge receipt directly.
Execut,tie ecre ory
18 June 1984
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
NATIONAL DEFENSE UNIVERSITY
NATIONAL WAR COLLEGE
WASHINGTON, D.C. 20319
REPLY TO
ATTENTION OF.
TO: Mr. John N. McMahon
Deputy Director
Central Intelligence Agency
Washington, D.C. 20505
SUBJECT: "Strategic Counterintelligehce and National Security"
Forwarded herewith is a copy of a research paper prepared by a
student at The National War College, Class of 1984. The subject
falls within the purview of your agency and is provided solely for
your information. The ideas and conclusions in the paper are
strictly those of the author. If you would like additional
information on the research program, or would like to suggest a
research topic that deals with an aspect of national security,
please contact Colonel Benjamin C. Buckley, USA, Autovon 223-8404 or
Commercial (202) 693-8404.
ST
nel, USAF
n of Faculty
T-112,.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
THE NATIONAL WAR COLLEGE
NATIONAL DEFENSE UNIVERSITY
STRATEGIC STUDY
STRATEGIC COUNTERINTELLIGENCE AND NATIONAL SECURITY
by
R. B. WADE
FEDERAL BUREAU OF INVESTIGATION
A RESEARCH REPORT SUBMITTED TO THE FACULTY
IN
FULFILLMENT OF THE RESEARCH
REQUIREMENT
Research Supervisor: Mr. John F. Gilhooly
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
TABLE OF CONTENTS
Chapter
Page
DISCLAIMER-ABSTAINER
ABSTRACT
BIOGRAPHICAL SKETCH
EXECUTIVE SUMMARY
INTRODUCTION
i
ii
iv
1
I.
THE COUNTERINTELLIGENCE ENVIRONMENT
2
II.
STRATEGIC COUNTERINTELLIGENCE AND NATIONAL SECURITY
11
III.
CONCLUSIONS
27
IV.
BIBLIOGRAPHY
30
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
DISCLAIMER-ABSTAINER
This research report represents the views of the author and
does not necessarily reflect the official opinion of the National
War College, the National Defense University, the Department of
Defense or the Federal Bureau of Investigation.
This document is the property of the United States Government
and is not to be reproduced in whole or in part without permission
of the Commandant, The National War College, Fort Lesley J. McNair,
Washington, D. C. 20319.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
THE NATIONAL WAR COLLEGE
STRATEGIC STUDIES REPORT ABSTRACT
TITLE: Strategic Counterintelligence and National Security
AUTHOR: R. B. Wade, Federal Bureau of Investigation
DATE: March, 1984
The Counterintelligence Community is seen to be too
operationally oriented and fragmented to be fully effective. A
critique of current recommendations to correct these problems
concentrating on the multidisciplinary approach. The suggestion of
a matrix management system as an alternative means to enhance the
Community's effectiveness by improving interagency coordination and
providing better strategic intelligence. In the absence of
organizational reform, the paper recommends that a commission be
formed to analyze the current situation and institute changes to
improve the quality of strategic counterintelligence.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
BIOGRAPHICAL SKETCH
Robert B. Wade (B.A. Histor
University; M.A. Political Science, University eWashingtonington
Supervisory Special Agent, Federal Bureau of Investigation is~a
counterintelligence specialist. He is a graduate of The National
War College, Class of 1984.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
EXECUTIVE SUMMARY
Counterintelligence can be defined several ways, depending on
the perspective. No matter the definition, Positive intelligence,
which can be of strategic use to policy makers, can always be
generated. However, this type of intelligence has not been
furnished to top policy makers by the Counterintelligence
Community. The re.asvns for this are threefold. First, the
Community is organizationally and mission fragmented. Second,
Counterintelligence is not the major mission of any specific ,
organization and consequently, it has not received the resources
attention it deserves. Third, counterintelligence has been t or
operationally oriented. 00
To correct this situation, it has been recommended that the
Community be centrally reorganized and a multidiciplinar
y
counterintelligence approach initiated. This paper contends that
such reorganization is not practicable and would make
impact. little
A matrix management system, however, controlled through the
National security Council, would enhance the Community's
effectiveness by improving interagency coordination while better strategic intelligence. providing
In the absence of organizational reform, the paper recommends
that a blue-ribbon commission be formed to analyze the current
situation and institute a dialogue to improve the quality of
strategic counterintelligence.
The paper concludes, that
counterintelligence elements must balance their short-term
operational focus with strategic vision. In turn, it is incumbent
on policy makers to demand this from the Counterintelligence
Community.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
INTRODUCTION
There exists a vast amount of counterintelligence
literature. These accounts, however, normally emphasize specific,
colorful "spy" stories and ignore other, more significant,
contributions which counterintelligence can make to national
security. In order to better understand counterintelligence and the
sophisticated contributions it can make, this paper examines the
Counterintelligence Community and makes recommendations to enhance
its vital role in the national security process. The conclusions
arrived at, I hope, will provide a better understanding of the role
counterintelligence can play while raising issues worthy of further
discussion and analysis.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
CHAPTER I
THE COUNTERINTELLIGENCE ENVIRONMENT
The current source of authorization for United States
intelligence activities, Executive Order 12333, defines
counterintelligence as:
"... information gathered and activities conducted to
protect against espionage, other intelligence activities,
sabotage, or assassinations conducted for or on behalf of
foreign powers, organizations or persons, or international
terrorist activities, but not including personnel, physical,
document or communications.security programs."1
At its most basic level, counterintelligence is the
identification and neutralization of the hostile intelligence
threat. However, although it appears to be a simple concept, there
are many subtleties within it which have caused one commentator to
call it the "least understood" and "most mysterious" component of
intelligence2. This complexity is apparent in the numerous
definitions provided by various authors.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Harry Howe Ransom, for example, has defined
counterintelligence as:
...intelligence activity devoted to countering the
effectiveness of hostile foreign intelligence operations.
Essentially, it is a police function. More specifically, its
purpose is to protect information against espionage, to guard
one's intelligence operations from infiltration by the
adversary and to secure installations or material against
sabotage. Counterintelligence is, in a sense, a negative,
defensive function."3
On the other hand, others have seen a broader, more
aggressive role for counterintelligence. Newton S. Miler, a former
member of CIA's Counterintelligence Staff, has stated that
"counterintelligence involves investigation and surveillance
activities to detect and neutralize the foreign intelligence
services and the initiation of operations to penetrate, disrupt,
deceive and manipulate these services ...to our benefit., "4
Most commentators view counterintelligence from one side or
the other of this offensive-defensive split. The majority of
professionals in the Counterintelligence Community, however, define
counterintelligence as offensive, (counter) human intelligence.
Their task, as they see it, is to target and neutralize the hostile
intelligence activity of foreign intelligence officers and their
agents.5 The greatest success, from this perspective, is the
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
recruitment of a hostile intelligence officer while he remains in
place.' The value of information gained in such an operation, it is
believed, is greater than that received through any other method.
However, there is a third perspective which generally
receives less attention particularly by counterintelligence
professionals. This'is the fact that counterintelligence operations
can produce positive intelligence. Generally, since most
counterintelligence organizations are offensively (case) oriented,
the intelligence emphasized, such as a hostile services modus
operandi, has immediate operational-value. Although, at the same
time, intelligence pertaining to the hostile government's
capabilities, intentions, or gaps in information, is also
received.6 A hostile intelligence officer, for example, might
show interest in developing information about certain grain
diseases. Since this information is not operationally important
(e.g. personality assessment of the officer), its strategic value, a
possible low grain harvest in the foreign country because of
disease, may be missed. Consequently, it might not be provided top
policy makers for assistance in their deliberations.*
*Strategic intelligence is defined as foreign, positive intelligence
pertinent to national security.? Positive intelligence being "all
the things you should know in advance of initiating a course of
action.8
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Increased interest in one area might also signal the
imminence of military action. The British double agent, Dusko
Popov, for example, purportedly brought the FBI a questionaire for
Pearl Harbor, given him by the Germans, prior to the Japanese
attack. No action was apprently taken on this information since the
FBI apparently believed it to be German deception.9 The point is
that operational considerations, if Popov's account is correct,
overrode the strategic possibilities of furnishing this information
to policy makers for early-warning or possible use in our own
deception operation.
Further, faced with an increasing hostile presence,
counterintelligence managers must direct their limited resources to
investigations of the activities of h:jstile intelligence officers
where the immediate threat is and where tangible payoffs are
necessary. Although each component of the Community produces
individual reports and studies, they reflect their organization
orientation and center on "case" studies or "after-action" reports.
Consequently, there is little emphasis on the production of
strategic intelligence.
The Community as a whole could also produce strategic reports
of great value to policy makers. Studies could be made of the
potential threat posed by emerging nations, rising immigration or
even new technology. However, under the current system, these types
of problems are seen piecemeal, if at all.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Top policy makers, in turn, do not demand this type of
information. Although it is only speculation, this attitude may
result from identifying the FBI's counterintelligence role with that
of law enforcement. The result is a passive, negative view of
counterintelligence and a lack of understanding about the type of
positive information counterintelligence can provide.10 These
differing views result in a situation where there is no impetus,
from within or without the Community, to change the current system.
The situation is complicated by the fact that the
Counterintelligence Community is composed of a number of executive
departments and agencies. Of these, the FBI, CIA and each of the
military services have operational counterintelligence
responsibilities. Each of these, as well as the nonoperational
elements, have differing missions and, therefore, different
perspectives of counterintelligence. Each organization, therefore,
has only a fragmented view which limits its operational and
strategic effectiveness.
The FBI, for example, has primary counterintelligence
responsibility within the United States. Its investigations are
geared to detecting and countering the human intelligence threat
posed by hostile intelligence services. CIA has a corresponding
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
responsibility abroad albeit with emphasis on protecting its
collection efforts from the activities of the hostile service.
Concurrently, each of the military services conducts similar
activities, domestically and overseas, to protect our military
interests.
This structural fragmentation is an outgrowth of our domestic
political culture and its distrust of government power which might
inject its influence into the private lives of citizens.
Counterintelligence has overtones of "secret police" and the
Community reflects this desire fora division of power. Watergate
just confirmed this natural suspicion and allowed further erosion of
the investigative powers of the Community.
Functionally, this pluralism can and does lead to overlaps in
jurisdiction, bureaucratic "turf" battles and failures to pass
pertinent information throughout the Community. Although there are
established and generally effective procedures to facillitate
interagency cooperation, they tend to be informal and to lack clear
lines of authority and responsibility. The basic fact remains,
however, that each agency maintains a separate data base under its
control.
There is then no formal or systematic means to provide policy
makers with a Community-wide strategic intelligence product. The
Community is aware of the need to enhance its capability in this
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
area and has, through the years, created various committees in an
attempt to coordinate the nation's counterintelligence effort.
Most
recently, for example, a Counterintelligence Staff was established.
Representatives from throughout the community are as signed to o the
Staff which provides staff assistance to the Director of Central
Intelligence. The staff also develops 1
Policy for the Community and
coordinates nonoperational matters throughout the group. It also
provides staff support to the National security Council
particularly
an annual threat analysis. However, although the Staff levies
individual requirements on elements of the Community, it has no
authority. Consequently, it does not overcome the Community's
pluralism (it only coordinates nonoperational matters) or
significantly raise the quality and quanity of strategic
intelligence.
Given the Political culture's tendency to distrust
intelligence organizations, it is interesting to note that
counterintelligence is not the primary mission for any of the
Community agencies. The FBI, as I have immiied, is first a law
enforcement organization while CIA is primarily concerned with the
collection and he
production of positive intelligence. Consequently,
in these and other Community organizations, counterintelligence
somewhat of an abused stepchild which does not is
get the attention,
resources and nurture it deserves. This reinforces the focus on
operational matters noted above.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
lil one final analysis, counterintelligence and
intelligence are different sides of the same c
Counterintelligence coin. Positive
is not just a reactive, law enforcement
function. It can
produce strategic intelligence.
Community, as it is Further, the
organized today, in a loose confederation of
independent, case oriented agencies, does not
role in national security play the strategic
that it is capable of. How to improve
this situation will be discussed in the next c
? hapter.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
NOTES
CHAPTER I (Pages 2-9)
1. "Executive order 12333," Weekly Compilation of Presidential
Documents, December 7, 1981, p. 1347.
2. Roy Godson, "Counterintelligence: An Introduction," National
Strategy Information Center, Roy Godson, ed., Intelligence
Requirements for the 1980's? Counterintelligence (Washington, D.C.,
1980), p 1.
3. Harry Howe Ransom, The Intelligence Establishment (Cambridge,
M4ass: Harvard University Press, 1970), p. 14.
4. Newton S. Miler, "Counterintelligence" National Strategy
Information Center, Roy Godson, ed., Intelligence Requirements for
the 1980's: The Elements of Intelligence, (Washington, D.C.
p. 49. , 1980),
5. Arthur A. Zuehlke, Jr., "What is Counterintelligence," in Godson,
ed., Intelligence Requirements for. the 1980's: Counterintelli ence,
p. 26.
6. Ransom, p. 14.
7. Sherman Kent, Strategic Intelligence for American World Policy
(Princeton: Princeton University Press, 1949), p. 3.
8. Ibid, p. 210.
9. Dusko Popov, Spy/Counter-S y (Greenwich, Connecticut: Fawcett
Publications, Inc., 1975), p. 132.
10. Zuehlke, p. 36.
11. Thomas Emerson, "Control of Government Intelligence Agencies,"
(The Political Quarterly, July-September, 1982), pps. 273-277. "
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
CHAPTER II
STRATEGIC COUNTERINTELLIGENCE AND NATIONAL SECURITY
The Counterintelligence Community, in structure and function,
is fragmented. These circumstances have led some knowledgeable
commentators to advocate reorganization and centralization of the
Community in an effort to provide better direction. The concern is
that there is nobody in charge of the national counterintelligence
effort and these recommendations are designed to give someone the
appropriate authority and responsibility. Typical recommendations
are:
The creation of a Director of National Intelligence who would
be separate from the Intelligence Community's operational elements
and have no institutional ties to the Community. One of his
responsibilities would be to provide guidance and tasking to all
Government counterintelligence elements.'
The establishment of a new, independent intelligence service
which would conduct both counterintelligence and positive
intelligence operations.2
Designation of a National Intelligence Officer for
Counterintelligence who would report to the National Security
Council.3
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Interwoven with these arguments for reorganization is concern that the U.S. does not have the capability a
foreign intelligence threat in its entirety. In response, some
critics have proposed a new concept which has become
multidisciplinary counterintelligence (MDCI) or known as
counterintelligence. all source
Proponents of this position, like Kenneth E.
DeGraffenreid, formerly a staff member of the Senate Select
Committee on Int.elli ence elect
g (SSCI?), argue that the intelligence threat
today is not just espionage (HUMINT) but technical systems, signals
intelligence (SIGINT) and photointelligence (PHOTINT
Their position is that these systems cross the )~ as well.
Community's
jurisdictional lines and, in light of of the Communi
fragmentation ty's
limit our ability to identify and counter them. Th
Community also does not e
possess the technical knowledge to fully
assess the threat thereby weakening our security further. are faced with a multidisciplinary threat, we Since we
kind.4 need to respond in
Supporters of MDCI believe that the means to rectif
situation is b y this
y forming an autonomous organization which would have
access to all intelligence source reporting, human and technical.
This agency would be totally separate from the Community's
operational components and would only conduct total threat
(strategic) analysis. Implicit in this system would
be a
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
centralized file system incorporating all Government
counterintelligence files. The organization would analyze the
information received and provide the product, a national foreign
intelligence threat assessment paper, to Policy makers for action.
In addition, some commentators assume that the organization, in
performing its analytical functions, will need the authority to
provide guidance and tasking to all counterintelligence elements on
how to investigate certain cases-and what information to collect.5
This system, it is argued, would give the U.S. a better
picture of the foreign threat while providing a greater flexibilit
of response. A human source in-place, for example, might y
give
information contradicted by a technical source. Knowing this,
policy makers could direct that action be taken to verify the
correct source. If a hostile deception effort was uncovered,
direction could be given that a countermeasure be instituted to
negate the deception. Under the current system, commentators argue,
there is little likelihood that such deception would be found out.
A staff member of the SSCI sees MDCI as playing a broad
devils advocate role. In his view, all positive intelligence should
be looked at from the MDCI perspective. As a defensive measure,
MDCI should look at each aspect of our operations from the hostile
side. We might know, for example, that the hostile government might
have the ability to penetrate our communications.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
The MCDI organization would then task one of the counterintelligence
operational groups to test the theory and see if the communications
were being penetrated. Offensively, according to this individual,
MDCI would critique our own collection efforts to determine if we
are the target of an organized deception effort.6
DeGraffenreid' believes in an even broader MDCI program. He
would incorporate into MDCI, personnel, document, installation and
communications security which are not even defined in the current
Executive Order as counterintelligence. He not only believes MDCI
would defeat the foreign intelligence and deception threats, it
would also neutralize foreign attempts to obtain U.S. technology and
effect the American economy. Finally, he argues that an MDCI
organization could also assist other elements in the Intelligence
Community in responding to terrorism, anti-American propaganda and
other types of operations directed against our security.7
These arguments, I think, reflect a number of influences on
the Intelligence Community which have occurred during the past
decade. First, there is an increased awareness that the Soviet
Union is obtaining important technology, legally and illegally.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Christopher Boyce, for example, voluntarily provided the Soviets
information on covert satellites used by the CIA which he obtained
from his employment at TRW. William Kampiles was another volunteer
who also provided the Soviets with information about another
classified surveillance satellite. These cases led to concern that
the Soviets would use the information learned from these systems to
deceive other U.S. technical collection systems.
Additionally, the post-Watergate Congressional Hearings on
the conduct of U.S. intelligence activities badly bruised those who
favored human intelligence activities. The Intelligence Community
still chafes under the legal and policy restrictions which
resulted. Emphasis was given to technical collection methods and
the human intelligence side was downgraded. This orientation
inevitably affected counterintelligence activities and a broader
scope for the discipline was envisaged.*
* For an example, see William R. Harris, 'Counterintelligence
Jurisdiction and the Double Cross System by National Technical
Means* in National Strategy Information Center, Roy Godson, ed.,
Intelligence Requirements for the 1980's? Counterintelligence
(67ash ngton, D. C., 1980) .
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Further, the Congressional Hearings brought the intelligence
system into the public spotlight. Academics, as well as others,
then began to make a study of the intelligence process. MDCI expands
this beach head since it would also bring more people into the
counterintelligence process particularly non-professionals.
Finally, there is deep concern over unauthorized "leaks" of
classified information. By centralizing the intelligence process,
the reasoning is that these could be stoppered or the breach in
security found easily.
Much of the support for the multidisciplinary approach
originates in Congress especially in the SSCI. Most recently, the
SSCI attempted to gain support for a separate
group of analysts,
from throughout the Intelligence. Community, to perform MDCI. The
proposal met with strong objections from all members of the
Community and was deferred. Separate committees, composed of
leading members of the counterintelligence community, were
established, under the authority of the Director of Central
Intelligence, to look into the issue. To date, no further action
has occurred. However, one professional staff member of the SSCI
has stated that, whether the Intelligence Community likes it or
not," interdisciplinary counterintelligence is here to stay."
8
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Discussions over MDCI have served to highlight the iss
raised in the beginning of this report notably the need fo ues
strategic intelligence r
production and better coordination amon
elements. Even more importantl g its
y, perhaps, is the debate initiated
about the type of counterintelligence system needed to
challenge of the future. However, I would argue that meet the
the MDCI and centralization conce is inherent in
P , there are serious faults which
negate their possible implementation.
Foremost is the fact that MDCI, with its emphasis on
technical intelligence and concern about deception, is not
counterintelligence. t
Counterintelligence is concerned with
neutralizing human intelligence efforts. It is not oriented
equipped to deal with technical or
questions or to interpret the
technical product and vice versa.
Additionally, MDCI focuses on
protecting information which is a security function and not
the definition of counterintelligence in Executive Order part 12333 n
short, combining two different orientations approaches . In
techniques, would be like mixing water and oil. and
It would, I
believe, have an extremely adverse affect on our ability the foreign intelligence threat. y to deal
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Whenever there appears to be a lack of direction in an
organization, the initial impulse is to consolidate its functions
and create a distinct chain of command with a definite focus of
authority and responsibility. In considering such centralization
for the Counterintelligence Community, however, a number of problems
exist.
First, i do not believe our domestic political culture, with
its distrust of Government power, would allow a centralized
intelligence system. Democracy depends on public policy being
developed through a checks and balances g
process. Its foundation is
the separation of powers. A unified intelligence system would
violate all of these precepts.
Second, the creation of another bureaucracy, with its own
institutional goals, on top of the first, would further complicate
the original problems. It would be another competitor for scarce
resources and "turf." Who would control the new organization?
Practically, it would be difficult, if not impossible, for the
individual agencies to give up or allow limitations, whether
perceived or not, on their power and influence. The situation would
violate every principle of organizational behavior.
Reorganization,
without having "everyone on board," would not only lead to "turf"
battles but would seriously limit the efficiency and effectiveness
of the new organization.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Third, how would information be shared? The centralization
of files and data would violate the basic principles of security
such as compartmentation and "need to know." Some individuals would
presumably have knowledge of all the secrets of U.S. intelligence.
Who would want to pay the price for leaks from this organization or
for hostile possession of the information? The FBI,.for example,
takes great pride in protecting its sources and believes this is the
fundamental reason' people cooperate with it. It is extremely
doubtful that it would abandon this responsibility to a centralized
system.
Fourth, how would investigations and the dissemination of
information be handled to accord with the Freedom of Information and
Privacy Acts, which strictly limit what can be done?
Fifth, would an analytic product, free of competition,
provide better information to policy makers? Many.would argue that
it would not.
In discussing reorganization we must also determine if it
will make any real impact in the output of the Counterintelligence
Community. Richard Betts, in a study of intelligence failures,
addresses this issue. Betts argues that reorganizations of the
intelligence system make little difference unless they are in
response to the specific needs of decision makers.8
Reorganization can never compensate for the decision makers
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
predispositions or for the ambiguity within the decision making
process. Betts further states that reorganization to address one
wrong will only create a new glitch in the system. Accordingly,
Betts concludes that any changes in the system should be specific
and minor. Besides, he notes, the intelligence system overall has
done well in the past and may not need any more modification.9
Clearly, the fragmentation and analytic capability of the
Counterintelligence Community need to be improved. Although most
professionals in the Community believe the current system of
interagency cooperation works well enough, one is left with the
belief that the U.S. Government would be better served if this
informal system of cooperation was formalized. The current
Executive Order recognizes this problem when it exhorts the
Community to "...seek to ensure full and free exchange of
information in order to derive maximum effort from the United States
intelligence effort."10
Betts' assertion that limited, modest structural adjustments
are better than full scale reorganization make sense to me. Given
the validity of these comments, what can be done to improve the
structure and analytic capability of the Counterintelligence
Community?
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
First, someone needs to be in charge. Someone needs to
provide oversight of Community activities with the necessary
authority and responsibility to influence the production of
strategic intelligence.
Sherman Kent, in his classic work Strategic Intelligence For
American World Policy, argued for a highly centralized (positive)
intelligence system. His ideas eventually became the organizational
nucleus of the CIA. Although the prime mission of the
Counterintelligence Community must remain the neutralization of the
human foreign intelligence threat, some of his ideas have direct
bearing on the concerns I have expressed.
Kent believed that a centralized intelligence system should
perform a coordinating function. It should establish clear .
jurisdictional boundaries for the Community and ensure that these
were maintained. The organization should also see that the
Community's individual reporting was of high standard and manage all
interagency projects. This organization would also channel
resources to agencies that were in need. Kent stressed in his plan
that the organization should not participate in operations and
become embroiled in bureaucratic wars. Finally, it should be kept
inordinately small so that it did not bureaucratically
proliferate.11
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
These functions, although somewhat too broad, are similar to
those that I believe need to be implemented to improve the
efficiency and effectiveness of counterintelligence in the national
security process. There are a number of ways, aside from MDCI, in
which this can be done. One way would be to give the necessary
authority to one of the existing agencies in the Community. The most
logical choice, of course, would be the FBI which is the coordinator
for counterintelligence within the U.S. However, this would open
the door to charges of partiality as well as to organizational
politics. For these reasons, it would not be practical or desirable.
Another possibility would be to increase the authority of an
already established group such as the Counterintelligence Staff.
However, since it currently involves people detailed from their
agencies, institutional ties would be strong and politics would
probably play a continuing role. These factors would severely limit
the desirability of such a move.
A third alternative, which deserves some serious
consideration, would be the modified use of a system business has
termed "matrix management" This concept grew out of "high-tech"
industries, such as aircraft manufacturers, where several research
and development efforts were proceeding simultaneously. it was very
difficult to coordinate all these efforts in a formally structured
environment so the matrix model was created. This involves the
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
creation of ad hoc groups, each led by a team leader, who manages a
specific project. The team leader reports to a project manager, who
coordinates that particular area of research, and to a functional
manager, who is responsible for the total effort. The team, for
example, might be concerned with wing stress. The leader would
report to the manager responsible for wing design and to the manager
responsible for the entire plane. The system theoretically,
therefore, balances the needs of specialization with the needs of
coordination. 12
Transfer of a method like this to the counterintelligence
system might allow specialized questions to be answered or monitored
via task forces or ad hoc committees while maintaining the integrity
of the individual agencies. In fact, the Counterintelligence
Staff's threat assessment is somewhat similar although not so
formalized. The establishment of this system, coupled with a small
coordinating group like that envisaged by Kent, would provide the
needed unification of policy while allowing the agencies of the
Community to continue their basic missions as they have in the past.
Structurally, the one major change in the current system that
would be necessary is the creation of a "counterintelligence
coordinator" with the authority and responsibility to perform the
functions outlined by Kent. Preferably, this person should be a
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
civilian or possess no institutional ties to a Specific agency. He
assistance from a small staff of specialists, wh
might come from within the Communit o
return to avoid bureaucratic y but would not be allowed to
pressures or organizational bias.
Finally, the group should be
responsible to the National Security
Council to further prevent bias. This latter suggestion
the Counterintelligence Staff to be the might allow
foundation of the new
organization since the basic framework is already in Place.
The success of this organization, which I will
"National Counterintelligence Center," will ul term the
strategic leadership and thinking within the Community and on the
part of top policy make,...
Indeed, this ;,~
true for the current
"dclonal counterintelligence effort.
must make a greater effort to explain
they do, what resources they need and
the decision making process.
Counterintelligence managers
to Policy makers what it
what they can contribute
They must deter.~_ _
d
--- e
from the Community and do their
t
urn,
Policy
makers
process. They must
strategic
resources
what policy
best to provide it
, In
must bring counterintelligence into the
policy
require that the Community prod
intelligence and be willing uce quality to do to provide the necessary
so.
The Reagan administration has, from its ince tio
interest in u p n, expressed
pgrading counterintelligence. To date, significant
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
changes have not occurred primarily because of bureaucratic
politics. In order to get the reform process moving again, i would
recommend that a Presidential "blue-ribbon" Commission be
established which would study the counterintelligence system and the
arguments for and against reorganization. The counterintelligence
system has changed little since World War II and it is time for
rethinking its purpose. The Commission would also kindle the needed
dialogue between the Counterintelligence Community and national
security policy makers. These actions can only benefit the
Community, policy makers and, most importantly, the nation.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
NOTES II
CHAPTER II (Pages 11-25)
1. Roy Godson, 'Intelligence Reform in the United States: The
Proposed Charter,' World Affairs, Summer, 1980, pp. 15-16.
2. Donovan Pratt, "Counterintelligence Organization and Operational
Security in the 1980's," Godson, ed., Intelligence Requirements for
the 1980's: Counterintelligence, p. 228.
3. Interview with a professional staff member of the Senate Select
Committee on Intelligence (non-attribution).
4. Kenneth E. DeGraffenreid, "Building for a New Counterintelligence
Capabilty: Recruitment and Training," Godson, ed., Intelligence
Requirements for the 1980's: Counterintelligence, pp. 263-276.
5. Roy Godson, "Intelligence Reform in the United States: The
Proposed Charter," World Affairs, Summer, 1980, p. 17.
6. Interview with a professional staff member of the Senate Select
Committee on Intelligence (non-attribution).
7. DeGraffenreid, p. 263.
8. Richard K. Betts, "Analysis, War and Decision: Why Intelligence
Failures are Inevitable," World Politics 31, No. 1 (October, 1978)
p. 72.
9. Ibid., pp. 84-85.
10. "Executive order 12333," Weekly Compilation of Presidential
Documents, p. 1337.
11. Sherman Kent, Strategic Intelligence for American World Policy,
Princeton: Princeton University Press, 1949, pps. 91-94.
12. For a complete discussion of this topic see David R. Hampton, et
al., organizational Behavior and the Practice of Management
(Glenview, Ill: Scott, Foresman and Company, 1982) pp. 507-509.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
CHAPTER III
CONCLUSIONS
The United States Intelligence Community is composed of
several departments and agencies. Each of these organizations has
some counterintelligence responsibility. Each, according to their
missions, sees this responsibility differently and defines their
objectives and goals accordingly. It is these different, albeit
complimentary, views which have led to the current situation where
the counterintelligence target is not getting the recognition, focus
and resources it deserves and is not fully performing to the best of
its ability.
The reasons for this are threefold. First, the Community is
organizationally and mission fragmented. There is not a strong,
central authority to speak for counterintelligence like the Director
of CIA speaks for intelligence collection requirements. No one has
specific authority or responsibility for counterintelligence and,
consequently, it does not receive the attention it deserves in the
security and decision making contexts. Second, counterintelligence,
in each organization, is always a secondary if not tertiary
mission. As a result, it must compete for a voice internally as
well as externally. Third, counterintelligence, as a discipline,
has been too operationally oriented. Resources have been directed
to this area at the expense of analysis. As a result,
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
counterintelligence has developed a narrow, short-range, immediate,
and introspective view of itself.
As a result, the Counterintelligence Community has not
provided policy makers with the strategic information it should.
Counterintelligence though must learn to see itself as part of the
"Intelligence Community" and, as such, be able to provide policy
makers with positive information equivalent to that provided by
United States collection efforts. In turn, policy makers must be
educated about the types of strategic information the Community can
provide, and then must demand that type of information from it.
The answer, I believe, lies in minor reorganization of the
Community. It can not remain the informal confederation it is
today. It must speak with one voice so that a coherent, consistent,
and strategic counterintelligence program can be formulated and put
into practice. Given the political realities, the establishment of
a counterintelligence coordinator and staff in the National Security
Council appears to be the most logical answer.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
To avoid bias and bureaucratic politics, this individual
should be a civilian with the authority and responsibility to
implement a national counterintelligence program. A matrix
management system might be the means to bring strategic
counterintelligence to the attention of policy makers while
conveying their concerns to the Counterintelligence Community.
In order to initiate the reform process and foster dialogue
between policy makers and the Community, it is recommended that a
Presidential Commission be created to study the counterintelligence
system and arguments for reorganization.
In todays complex environment, with its concern over Soviet
expansionism, state sponsored terrorism, technology transfer and
other threats, decision makers need the best intelligence they can
have. Counterintelligence represents a seldom tapped reservoir. It
can and should play a large role in national security policy
formulation and execution.
In short, the Counterintelligence Community needs strategic
leadership. This is not to downgrade the operations function of
counterintelligence. It is an effort to provide a balance to the
Community which will best serve the nation's security.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
CHAPTER IV
BIBLIOGRAPHY
Books
Blackstock, Paul W., and Shaf, Frank L., Jr. Intelligence,
Espionage, Counterespionage and Covert Operations: A Guide to
Information Sources. Detroit: Gale Research Co., 1978.
Cline, Ray S. Secrets, Spies and Scholars. Washington, D.C.:
Acropolis Books, Ltd., 1976.
Eliff, John T., The-Reform of FBI Intelligence Operations.
Princeton, New Jersey: Princeton University Press, 1979.
Felix, Christopher. A Short Course in the Secret War. New York: E.
P. Dutton and Co., Inc., 1963.
Godson, Roy, ed. Intelligence Requirements for the 1980's:
Counterintelligence. National Strategy Information Center:
Washington, D.C., New Brunswick (USA) and London (U.K.): Transaction
Books, 1980.
Godson, Roy, ed. Intelligence Requirements for the 1980's: The
Elements of Intelligence. National Strategy Information Center:
Washington, D. C., New Brunswick (USA) and London (U.K.):
Transaction Books, 1980.
Hampton, David R. Organizational Behavior and the Practice of
Management. Glenview, Ill.: Scott, Foresman and Company, 1982.
Kent, Sherman. Strategic Intelligence for American World Policy.
Princeton: Princeton University Press, 1949.
Popov, Dusko. Spy/Counter-Spy. Greenwich, Connecticut: Fawcett
Publications, Inc., 1975.
Ransom, Harry Howe. The Intelligence Establishment. Cambridge,
Mass.: Harvard University Press, 1970.
Whitehead, Don. The FBI Story. New York: Random House, 1956.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7
Articles
Beichman, Arnold. Can Counterintelligence Come In From the Cold?'
Policy Review, Winter, 1981.
Betts, Richard. "Analysis, War and Decision: Why Intelligence
Failures are Inevitable." World Politics, October, 1978.
Emerson, Thomas. 'Control of Government Intelligence Agencies."
The Political Quarterly, July-September, 1982.
Godson, Roy. "Intelligence Reform in the United States: The
Proposed Charter." World Affairs, Summer, 1980.
Latimer, Thomas. "U.S. Intelligence and the Congress.' Strategic
Review, Summer, 1979.
Rees, David. "The Crisis in United States Intelligence.' Conflict
Studies, December, 1979.
U.S. Government Documents - Periodicals
"Executive order 12036.' Weekly Compilation of Presidential
Documents, January 30, 1978. pp. 194-214.
"Executive Order 12333." Weekly Compilation of Presidential
Documents, December 7, 1981. pp. 1336-1348.
Approved For Release 2008/08/25: CIA-RDP86M00886R002800160001-7