THE ROLE OF TECHNOLOGY IN COVERT INTELLIGENCE COLLECTION BY HERBERT SCOVILLE, JR.
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP88-01315R000200030002-1
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
23
Document Creation Date:
December 16, 2016
Document Release Date:
October 14, 2004
Sequence Number:
2
Case Number:
Publication Date:
September 13, 1974
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP88-01315R000200030002-1.pdf | 1.58 MB |
Body:
- proved For Release 2004/11/01: CIA-RDP8&'A16'F 8000200030002-1"II
THE ROLE OF TECHNOLOGY
IN COVERT INTELLIGENCE COLLECTION
By Herbert Scoville, Jr.
Background
Beginning with World War II technological methods of
collecting intelligence have become increasingly dominant
over the traditional agent, informer, or defector as sources
of information, particularly in areas affecting national
security. Stealing plans, infiltration of agents into labo-
ratories, visual observation of new weapons have become more
and more difficult and unproductive. Even if a spy might
succeed in getting a look at a new weapon, he might not be
able to acquire important information since this might be
obtainable only with a scientific instrument. Thus, a person
watching a nuclear explosion would learn little other than
that it went off with perhaps some estimate as to whether it
was large or small; but a seismic instrument or an acoustic
listening device half way around the world could tell the ex-
plosive yield, and a filter in an aircraft at this same
distance could collect particles from which the secrets of
the internal design of the bomb could be determined.
Fortunately, as the usefulness of human beings for col-
lecting intelligence has decreased, the science of technical
intelligence collection has grown dramatically. Not only has
collection technology improved, but the very nature of modern
military weaponry has made the task easier. to accomplish in
less provocative ways. Nuclear explosions release trenfendous
amounts of energy, and modern missiles travel along trajec-
tories observable hundreds or even thousands of miles away.
Radars and communications systems frequently bounce energy
off the ionosphere so that the signals can be received at
long distances. Modern weapons and their logistic support
are easily observable by aerial photography. As a consequence,
available information on even the most secret military
weapons and on the deployment of forces even in remote locali-
ties is far superior to what it was twenty years ago.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
t fil
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
When President Eisenhower made his famous "open skies"
proposal calling for unrestricted, but monitored overflight
of national territories on both sides of the Iron Curtain,
we considered that.its acceptance would have gone a long way
toward thawing the Cold War. The Russians disparaged it as
legalized espionage. Today, thanks to technological improve-
ments, our capabilities for obtaining military information
far surpass any that we dreamed of under the Eisenhower plan
and, surprisingly, the Soviet Union in the 1972 SALT Agree-
ments sanctioned the right of the United States to have
pertinent military information provided that it was obtained
by national technical means that were not in violation of
international law.
In view of the overwhelming priority of technological
intelligence collection in the overall intelligence picture,
it is most appropriate that the role of this technology be
examined in considerable detail as a part of the Conference
Study of the entire intelligence process. This paper will
attempt to analyze the usefulness of the major technical
methods of intelligence collection and consider the political
risks and provocations which they entail. These, of course,
could vary considerably depending on the conditions surround-
ing their use. For example, an electronic receiver on a ship
far out in international waters is quite different from one
planted surreptitiously within a Soviet missile test center.
Communications Intercept
One of the oldest forms of intelligence collection is
the interception of other parties' communications. Early man
undoubtedly watched hostile smoke signals and attempted to
decipher the messages being transmitted. However, this form
of intelligence collection took on a whole new significance
with the advent of radio communications, which not only
heralded a tremendous increase in the volume of information
communicated, but also presented valuable new opportunities
for listening in on the messages being transmitted. Since
such listening was so inherently easy, a new field of counter-
measures was developed to protect the privacy of radio commu-
nications. Encrypting messages became a standard procedure
for disguising the content, and this, in turn, promoted a
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved ForRelease 2004/11/01: CIA-RDP88-01315R000200b b602-1
3
science of deciphering the codes. The race was on as one
side attempted to improve the security of its communications
system while the other side attempted to break through these
barriers. Because this was a game of counter-measures and
counter-counter-measures, dark secrecy was applied to efforts
in this area. Successes had to be concealed in order to pre-
vent them from being countered in future situations. The
classic publicized case was the U.S. breaking of the Japanese
codes before World War II. The secrecy over this success was
probably in no small part responsible for our failure to take
advantage of it at the time of Pearl Harbor.
Today, there is probably little question that methods
are available to insure that any specific communication can
be made invulnerable to being read. One time cryptographic
techniques make breaking specific messages almost impossible.
However, in the real world there are practical barriers toward
establishing such tight security on all communications. The
volume of communications, even in the national security area,
is so large that it is not possible to use such methods for
every message. Furthermore, the operation of any system is
always subject to human or mechanical errors and, in cryptog-
raphy, these can lead to the compromise of information. To
minimize this problem, resort is often made to the use of
land lines, short range line of sight radio transmissions, or
reduction in the power of the transmitters in order to limit
the opportunities for intercept.
Finally, even if a message is transmitted in an unbreak-
able code the intercept of the communication may still produce
meaningful intelligence information. For example, the fact
that points A and B are communicating gives by itself a useful
piece of datum since it shows some connection between the two
points; this can often be a clue as to the nature of the work
at A and B. During World War II, the transmission of messages
from Los Alamos, a deserted school site in New Mexico, and the
War Department, to say nothing of the University of Chicago,
Hanford in the state of Washington, or Oak Ridge, Tennessee,
would have provided an important lead as to the nature of the
activities being carried out in the Los Alamos area. The
activation of communications links between a missile launch
site and a missile impact point would be an important indica-
tor that a missile might shortly be fired. Since it is well
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
,Approved For. Release 2004/11/01 : CIA-RDP88-O'1315R000200030002-1
known that these types of communications could provide clues
to the hordes of analysts involved in communications intelli-
gence, communications security has to go farther than just
establishing codes. It must control the volume and nature
of the traffic on any communications link and frequently pass
false messages in order to hamper traffic analysis. Thus, it
will be seen that communications intelligence is a vast game
of cops and robbers in which each side is continuously trying
to outwit the other. Secrecy is an inevitable component in
this game which must be played if this information source is
sufficiently valuable.
There would seem to be little question that this form of
intelligence collection is vital not only in the national
security, but in the political area as well. Intercepting
communications can provide a wealth of useful information on
governmental plans and thinking. Different parts of a modern
bureaucracy must communicate to operate. While the most
sensitive messages can be kept secret, many of the less criti-
cal ones can be intercepted and understood. Furthermore, much
useful information must be'transmitted completely in the open,
and occasionally this can prove to be of vital importance,
For example, at the end of August, 1961, a woman listening to
open radio transmissions within the Soviet Union at a receiver
in the eastern Mediterranean heard an advance press release
with a three-day embargo announcing that the Russians would
resume nuclear testing. She recognized the significance of
this message, pulled it out of the mass of transcripts which
were being made routinely and forwarded it by priority to
Washington. This unclassified message gave President Kennedy
advance notice of the Soviet intentions to terminate the
nuclear test moratorium and the opportunity to take political
action to forestall this Soviet move. Unfortunately, the
government decision-making bureaucracy was too cumbersome
and, in the end, the President docilely allowed the Soviets
to recommence testing. An important political opportunity was
lost. This is a good example of where intelligence was good
but was of little value because of unwillingness to act upon
The usefulness of communications intercept in the na-
tional security field is so great and all-encompassing that
the selection of specific examples can be misleading. Aljnost
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
all military activities both in peacetime and in war are
heavily dependent oncommunications.
greatlyfenthese hancedan b~ thed,
then national security would
event that military forces were to be used in a surprise
aggression, widespread communications would be needed between
their various elements. The understanding of even one of
these messages might give advance warning and eliminate the
surprise. It could be the difference between national sur-
vival or collapse. It should be remembered that the communi-
cator normally has to send thousands of messages, while the
intelligence collection system can perhaps succeed in breaking
the system by a single success. Even if the content of the
messages cannot be read, the increased volume of communica-
tions could frequently be the indication that some operation
is imminent. Communications between military aircraft and
the ground are an important source of intelligence on mili-
tary operations. In the heat of battle, communications
security is frequently very poor.
As mentioned previously, messages passed on a missile
test range or at other weapons test sites can provide im-
portant clues as to the nature of the weapons system involved.
For example at the Atomic Energy Commission's (AEC) test sites
in Nevada and Eniwetok, scientists were in constant communica-
tions between various instrumentation stations and the labora-
tories at headquarters. Although there were strict injunctions
on communications security, any recording of these messages
would certainly have provided invaluable information on the
nature of the tests and their results. Security had to rely
primarily, but not always successfully, on the fact that the
frequencies and power used in the communications system were
such as to limit the range over which they could be received.*
As technology has improved, however, the ability to pick up
weak signals, to use computer techniques for pulling information
* Sometimes communications can inadvertently mislead. In 1958,
the Russians were obviously listening to communications at the
Eniwetok test site. They heard messages sent for a rehearsal
and mistook this for an actual test. Later, in commenting on
the extensive U.S. testing program at the Geneva test ban
negotiations, they wrongly listed this as an actual U.S. nuclear
test.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
out of the noise, and to understand better the nature of an
anomalous radio, transmission has made it easier to overcome
attempts to conceal the messages. Computers are also criti-
cally important for cryptoanalysis, although never sufficient
to break a truly first class communications code. The
counter-measure counter-counter-measure battle continues
today, albeit at a much higher technological level.
What are the political implications of intercepting
governmental communications: Secretary Stimson is reported
to have said before World War II that "nations, like gentle-
men, do not read other people's mail." This highly moral
attitude has long since disappeared from the conduct of na-
tions, and no longer is the public horrified at the thought
of such operations. All countries take for granted that
attempts are being made to intercept their communications
and employ the best counter-measures of which they are tech-
nically capable. This, of course, works to the disadvantage
of less affluent and less developed countries since they
neither have the resources nor the sophistication to carry
out such operations on a sufficiently extensive scale.
The provocation from this type of operation depends pri-
marily on the means and location by which the intercept is
carried out. Much of this can be done from international
waters or from friendly countries bordering the target area.
In the latter case, political sensitivities can be raised
since most nations do not wish it known that their territory
is being used as a base for intelligence operations against
their neighbors. However, such operations are so widely prac-
ticed that they now are rarely the cause for international
protest. The use of friendly countries,as a base does, how-
ever, create a degree of indebtedness to that country which
can sometimes be a political liability. We are prone to
support regimes which allow us to use their territory even
though the objectives of that regime may not be compatible
with our basic political goals. This is a problem which
applies to cooperation in intelligence gathering generally
and is probably less serious in the communications intercept
area than in more clandestine or provocative operations.
For some types of communications, receiving at a distance
is not practical, and this leads to operations which can be
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01'315R000200030002-1
much more provocative. For example, for the intercept of
certain air defense communications it may be desirable to. fly
very close to the border. This can be much more provocative
and occasionally errors can occur in which the aircraft acci-
dentally overflies another nation's territory. This can be
the cause of major incidents. Even more provocative would be
a situation in which the aircraft purposely intruded across
the boundaries of a country, but this probably rarely occurs
any more; certainly not by the United States over Russia or
by Russia over the United States. However, both countries
may have truly covert communications intercept operations in-
side the other nation's borders. These might be for the pur-
pose of intercepting some highly sensitive communication link
which could not be picked up at long range. Such an opera-
tion, of course, has all the political risks of any covert
operation and would only be practiced under highly critical
situations.
A new form of communication employs satellites as relay
stations. Since these are for transmission over very long
distances they are easily intercepted without the need. for
provocative collection operations within the territory of
the communicating country. In general, therefore, such
satellites would not be used for highly sensitive messages
unless some unbreakable code were used. In theory, satel-
lites can also be a platform for communications intercept,
but since satellites in normal orbit traverse the nation at
a very high rate of speed, they would provide only intermit-
tent information. A stationary satellite over a particular
location has to be more than 20,000 miles out which reduces
greatly its effectiveness in receiving radio signals unless
they are beamed directly to it. However, if it could be
used for this purpose, it certainly would not be provocative
since satellites for intelligence collection are now inter-
nationally accepted. (See section on Photo-Reconnaissance.)
Electronic Intelligence (ELINT)
A similar type of technological intelligence collection
is the intercept of radio waves of a non-communications type,
particularly those from radars. This type of intercept, known
as ELINT in the intelligence jargon, first came into being
Approved For Release 2004/11/01.: CIA-RDP88-01315R000200030002-1
1
Approved for Release 2004/11/01: CIA-RDP88-01315R000200030002-1
with the advent of radar in World War II and has since blos-
somed into a very extensive intelligence activity. Radars
are now the eyes of almost every aspect of military opera-
tions. In addition to detecting and tracking hostile air-
craft and missiles, radio beams are used for guiding defensive
missiles toward the incoming targets. Although many modern
offensive missiles now rely on inertial or laser guidance
techniques to avoid the chances of their being jammed, radars
are often used for offensive missilry as well. Radars are
critical to all manner of naval operations. Thus the collec-
tion and analysis of ELINT has become a very high priority
task of all military intelligence organizations.
Radars, if they are to be of any military use, must be
continually exercised. An air defense radar which is not
turned on provides no defense at all. Furthermore, training
must be continuously carried out to insure that they are
operated properly. All of these factors provide frequent
opportunities for carrying out ELINT operations. Counter-
measures, such as with the coding used for communications
transmissions, are not available to maintain security. The
only protection is to restrict the operations of the radars
to locations well within the interior of the country so that
the opportunities for ELINT collection are minimized. How-
ever, even this is not feasible since most air defense radars
must be located near the border, aimed out, in order to detect
aircraft flying in. The same is true for ballistic missile
defense radars. Moreover, even for tactical electronic equip-
ment, maneuvers must be carried out and, particularly in
Europe where the most advanced systems are likely to be em-
ployed, these must be held in regions susceptible to obser-
vation by foreign intelligence.
However, despite the increased opportunities for ELINT
collection, all such operations are not necessarily non-
provocative. In order to detect anti-aircraft radars located
along the periphery of a country, it is frequently necessary
to fly aircraft and sail ships close to the borders in order
to intercept the signals. Frequently, such operations are
subjects of international incidents. The Pueblo seizure off
the coast of Korea is an example of one in which the intercept
platform, this time a ship, was seized in international waters,
although operating in a perfectly legal manner. On another
occasion of more doubtful legality a U.S. RB 47 flying along
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
the Russian arctic coast was shot down and the crew captured
in 1960. We insisted that the plane was always over inter-
national waters, but the Russians claimed we had penetrated
into their air space. When the crew was returned as a part
of the detente at the beginning of the Kennedy administration,
the crew members admitted having been over Russian territory
thus at least partially substantiating the Russian claim.
Even when over international waters, such operations can
be provocative. and are often a potential source of interna-
tional incidents. In order to insure that the radars will be
turned on and functioning in a truly operational mode, the
aircraft frequently approach the coast as if intending to
penetrate the national boundaries. it is not surprising that
under such circumstances, trigger-happy air defense personnel
are inclined to take counteraction. Furthermore, the scale
and number of such operations is probably much larger than
can be really justified on the basis of military need. There
is always a tendency in such a situation to repeat and repeat
operations with the consequent increased probability that an
incident will occur. Greater restraint on the part of those
authorizing such operations would probably reduce interna-
tional tensions without any serious loss to national security.
A related type of intelligence collection normally
classed under FLINT is the intercept of telemetry signals
from new weapons testing programs. In order to develop a new
missile or carry out a space mission, a nation must equip its
test vehicles with instrumentation to measure the functioning
of various components, and the only way in which the data from
these instruments can be relayed back to the test site is by
radio-telemetry. Since in many cases the telemetry signals
will be receivable at long distances from the source, the op-
portunities for intercepting such signals from without the
country are great. Interpretation of the signals may be more
difficult than for the nation which was originating the tele-
metry, but, nevertheless, useful information can frequently
be obtained on the nature of the test program. An example of
conspicuously successful telemetry intercept was at the time
of the first Soviet manned space flight. U.S. receivers in
the Aleutians were able to pick up the television pictures of
the astronauts as they were being transmitted back to the
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-f
10
Soviet Union so that U.S. authorities were in a position to
know simultaneously with the Russians that the mission was a
success. Soviet secrecy had led to considerable skepticism
over their claims of space superiority, and these intercepts
provided the data for an independent analysis of their
achievements. Similar telemetry intercepts provided much of
the information which Secretary Schlesinger and his predeces-
sors have published on the details of the Soviet missile test
program.
Since most of this collection can be carried out at long
distances and outside the territories of the testing country,
it is not provocative and therefore not a source of interna-
tional friction. Truly covert ELINT operations within the
country are rarely needed or feasible, but in some areas the
territories of friendly countries are required as a base of
operations. This could on occasion lead to political embar-
rassment and an undue dependence on the good will of that
country in order to obtain permission for the operations. A
case in point is Turkey which is strategically located oppo-
site the southern border of the Soviet Union where much of
the Soviet missile launching and other weapons testing occurs.
It is no secret that the United States has many stations in
that country for the collection of such information, and the
continuance of these operations is dependent on maintaining
good relations with the Turkish government. These relations
were recently subject to strains as a result of our desire
to persuade the Turkish government to halt the cultivation
of poppies, a major source of the illicit drug trade in the
United States. The United States could have been hampered
in its representations to Turkey by the desire to keep these
strains from reaching the point where we would lose our re-
ceiving sites there.
The reentry part of the Soviet ICBM test ranges is either
on the Kamchatka peninsula or in the Pacific ocean, so obser-
vations can be made from U.S. territory or international
waters, obviating the political difficulty of dealing with
other foreign governments. Intelligence on Soviet MIRV pro-
grams is thus easy to obtain without any political hazards.
Unfortunately, satellites are not ideal platforms for
intercept of signals from those portions of the test ranges in
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
the interior of the USSR because normal altitude satellites
traverse the target area so rapidly that the duration of any
single intercept is very short. Thus it would be easy to
schedule launchings so as to minimize useful coverage by the
satellite receivers. The intercept from stationary satel-
lites at a distance of more than 20,000 miles is greatly
handicapped because the long range reduces the strength of
the signal to an intolerable extent.
Radars for Intelligence Collection
A final form of electronic intelligence collection is
the converse of ELINT, that is the use of active radars to
observe a missile in flight. This type of collection, known
as RADINT, involves the transmission of easily detectable
radio signals so it cannot be done clandestinely. It has
been used very successfully to observe missile flight testing
by operating high-powered radars within line of sight of the
ballistic missile trajectory. By this method the United
States was able to confirm the first Soviet ICBM test flight
in 1957 and to keep track of virtually all launchings of
long-range missiles since that date. The deployment of such
radars on native territory is of course'non-provocative since
radiation has no effect on the object in space. However, as
in the case of the telemetry receivers referred to earlier,
the radar had to be located in Turkey in order to observe
the launch ends of the Soviet medium, intermediate and inter-
continental range ballistic missiles. Although there was a
moderate amount of secrecy associated with this radar instal-
lation to avoid undue provocation, it could not be kept from
the Russians since it was a large installation which trans-
mitted very powerful radio waves. To the best of my knowledge
no official protest was ever made to Turkey over this instal-
lation. However, it did increase U.S. dependence on Turkish
good will. The more that such type of technological intelli-
gence collection is recognized internationally as legal, the
less will be the dependence on good will of the nation for its
continued deployment. The United States and the USSR have now
endorsed such national technical means for use in verifying
arms control agreements. (see page 21.)
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
A new form of RADINT which can perhaps become of increas-
ing value and which would present even fewer international
problems would be the use of over the horizon (OTH) radars.
Since these do not require line of sight location, they do
not need to be located in sensitive areas. However, at pres-
ent, such technology is not as advanced so that the quality
and thus the value of the information gathered would probably
be considerably lower. So far only the wildest and most
impractical schemes have been suggested for using satellites
as radar platforms. Side looking radars, flown in aircraft,
have been developed for observing ground targets, even through
cloud cover and at night, but the quality of the information
obtained is relatively low when compared with optical photog-
raphy. It is unlikely that overflight of hostile territory
would ever be undertaken in peacetime for this type of in-
telligence collection so such radars would only be useful for
observations of areas close to the border.
Nuclear Test Detection Methods
A special class of technical intelligence techniques
includes those which have been devised for the specific pur-
pose of detecting and obtaining information on nuclear tests.
Ever since the first nuclear explosion, an important intelli-
gence goal has been to acquire knowledge of nuclear tests
carried out by foreign governments and insofar as possible to
gather as much information on the nature of the explosive
used. As a consequence, over a period of years a series of
highly sophisticated scientific methods were developed and
put into operation. Fortunately, nuclear weapons produce
such large scale phenomena that they are easily observed at
very long distances from the source and, therefore, do not
require the intrusion into the territories of the testing
country. Measurements can in many cases be made half way
around the world, but since broad geographic coverage is fre-
quently desired, particularly if information on source loca-
tion is needed, collection stations have been placed in
friendly countries. Although such operations were often kept
secret in order to avoid possible embarrassment to the host
nation, this precaution was probably exaggerated since no one
has ever questioned the legality or desirability of gathering
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
this type of information. The value and effectiveness of the
various techniques were freely discussed in open negotiations
which began in 1958 and led to the Limited Test Ban Treaty of
1963. There have been continued international information
exchanges since then in attempts to negotiate a comprehensive
test ban. Rather than being considered provocative, the col-
lection of information on nuclear tests is looked on as a
contribution toward reducing the risks of nuclear war.
These specialized techniques included seismic and acoustic
receivers which could pick up the shock waves transmitted
through the earth and air and provide data on the location
and size of the explosion. Recordings of the electromagnetic
waves produced at the moment the explosion occurred provided
supplementary information. For detonations which took place
in the atmosphere or which vented into the atmosphere, the
collection of the radioactive debris provided unequivocal
evidence that it was indeed nuclear in origin and most im-
portantly, information on the nature of the explosive device.
All of these techniques were refined until a very sophisti-
cated intelligence collection system emerged and made the
nuclear programs of any nation testing in the atmosphere rela-
tively open. Since 1963, all tests except those carried out
by France and China have taken place underground so that de-
tailed information available from radioactive debris analysis
has been denied. Since very small amounts of radioactive ma-
terial are needed to carry out detailed radio chemical analy-
ses, the debris does not need to be collected close to the
source. Aircraft flying over international waters and, in
many cases, on the opposite side of the world, are quite
satisfactory for sampling the bomb clouds. Thus, this very
useful intelligence technique does not-involve any provoca-
tive action. Occasionally, bases from which t1e sampling
aircraft take off were located in foreign countries in order
to obtain cloud samples within a shorter time after the ex-
plosion, but the use of such bases has never generated any
international repercussions. Overflight of non-friendly
nations was never required.
Approved For Release 2004/11/01 CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Photoreconnaissance
While all the foregoing technological methods of intelli-
gence collection are extremely useful for the maintenance of
adequate information to protect our national security, they
are dwarfed in importance by photoreconnaissance. A picture
is worth a thousand words--and often many reels of recorded
radio signals. Photography provides easily understandable
evidence even when a skilled photo-interpreter is needed to
describe the object on the film. It has applications in al-
most every intelligence area, whether it be scientific,
political, economic or military.
While photoreconnaissance has long been an important
tool of intelligence, recent technological advances culminat-
ing in the capability to obtain useful photography using
satellites as platforms have completely revolutionized the
entire intelligence collection process. No longer can any
nation hide its military and industrial activities behind an
Iron Curtain. Only those facilities, equipment, or forces
that can be continuously kept under a non-revealing cover,
such as underground or in an innocuous structure, can be con-
cealed; this can rarely be done. The mission of an agent to
procure information on troop dispositions, missile deploy-
ments, or submarine construction has now been eliminated. An
entire country can be photographed within a few days, the
only limitation being the degree to which clouds interfere,
and almost no area in the world is continuously cloud covered.
Thus, with persistence any target is now subject to photo
observation.
Aerial reconnaissance dates back to the first availability
of the airplane, and probably the most valuable function of
aircraft in World War I was to carry out visual reconnaissance.
By World War II the sophistication of both the aircraft plat-
form and its photographic systems was greatly improved, and
aerial reconnaissance was an important combat mission. How-
ever, the risk of a single aircraft operating on a reconnais-
sance mission being shot down was very high so that its use-
fulness was somewhat restricted. With the end of open conflict
the value of photographic reconnaissance became very limited
because of the political and physical hazards of penetration
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
beyond foreign borders. While such overflights probably oc-
curred, they were certainly very limited in number. They
could only be justified for the most critical intelligence
missions and occasionally resulted in the loss of the air-
craft and crew. A few abortive attempts were made to use
balloons as camera platforms, but this misguided effort
collapsed without many tears being shed by the intelligence
community. They were both provocative and non-productive.
In 1955, the effectiveness of the Iron curtain in ob-
scuring Soviet military developments became intolerable to
U.S. security planners as the Russians gradually accumulated
nuclear weapons of greater and greater power and sophistica-
tion. Under CIA direction a crash program was initiated to
develop a very high altitude long-range photoreconnaissance
aircraft equipped with the most advanced state-of-the-art
photographic equipment. Its ability to fly above Soviet
interceptor or missile defenses was its only protection; it
could, however, be observed and tracked by Soviet radars so
that its presence was known. On the other hand, it had no
capability for offensive action. This new aircraft, nick-
named the U-2, was truly a revolutionary technological achieve-
ment and became operational in 1956 just at a time when fears
were being aroused over the burgeoning Russian ballistic
missile program. Overflights of critical areas in the Soviet
Union were carefully programmed, and for the first time the
Iron Curtain was significantly lifted.
Although the Soviet leaders knew of these overflights,
they refrained from public protest since they did not wish
to admit to the vulnerability of their air space--a good ex-
ample of a most provocative intelligence collection program
which was protected by its immunity from counteraction.
However, by may 1960, perhaps with the assistance of a bit
of luck, the Russians finally managed to shoot down a U-2,
and the, international uproar that followed brought this pro-
gram of overflight of the USSR to an end. However, the use-
ful reconnaissance life of U-2 type aircraft continued, and
this type plane discovered the Soviet missiles being deployed
in Cuba and also provided photographic coverage in many
troubled areas of the world even up to the present time.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Although the U-2 was invaluable in collecting the only
information then obtainable on a wide variety of high priority
intelligence targets within the Soviet Union, it still was far
from an ideal reconnaissance platform. Because of the politi-
cal sensitivity of overflights, the number of sorties was kept
very limited, perhaps of the order of thirty during the four
years that it operated in that theater. More importantly, the
area that an aircraft could cover in a single flight was
limited to at the most a swath approximately 100 miles across
and about 500 miles long. As a consequence, only the highest
priority locations could be targeted for coverage, and large
areas of the Soviet union remained completely blacked out.
When fears of a missile gap arose in 1959, every effort
was made to find possible ICBM launch sites; this was the
primary mission for the ill-fated flight in may of 1960. No
such operational launchers were ever located by a U-2, but
because of the limited area covered, the negative results
were no proof of their absence and did nothing to allay fears
that deployment was under way. The Soviets had a fully tested
and operational, so-called SS-6, ICBM, and the logical assump-
tion was that it was being deployed. The failure of the U-2
to find launchers could not dispel the belief that they were
there. It was not until more than a year later, when satellite
photography with the capability of large area coverage became
available, that one could establish that the Russians never
deployed more than a handful of.their first generation ICBMs.
Aircraft photoreconnaissance has tremendous value in
some situations since the vehicle can be easily directed on
short notice to a specific location, can take a high resolu-
tion picture, and can give a planner useable information
within a few hours after the return of the plane. It has
the disadvantages of the need for a base within range of the
target, of limited area coverage, of vulnerability to destruc-
tion and, most importantly, of being extremely provocative.
It is hard to tell whether a plane is carrying a camera or a
bomb. This hostile characteristic frequently destroys com-
pletely its value as an intelligence tool in peacetime. Be-
cause of their flexibility, aircraft will probably continue
to have limited utility as platforms for photoreconnaissance
despite these drawbacks. The United States has already
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
17
available a successor to the U-2, the SR-71, and the Soviet
Union also has planes for this purpose. Other nations use
them as well and in times of actual armed conflict they be-
come essential.
October 4, 1957, however, marked the beginning of a new
era which culminated in the current revolutionary improvement
in capabilities for photoreconnaissance.* On that day the
Soviets orbited their first satellite which traversed the
United States and many other countries of the world and set
the precedent for making legitimate space transit of national
territories without permission of the states involved. No
request was ever made for permission to carry out this opera-
tion, and no complaint was ever voiced by the Soviet Union
when the United States followed suit the next year.. No other
country has ever raised the question of legality, and thus
the first steps were taken toward the establishment in custom-
ary international law of the freedom of access to outer space
for peaceful and scientific purposes.
Of course, these early satellites did not contain any
cameras for taking pictures of the territory over which they
passed, but the precedent had been set, and it was not long
thereafter that at least crude reconnaissance capabilities
became available. In 1960, the United States orbited weather
satellites capable of making low resolution photographs of
the earth, i.d., photographs which could define large geo-
graphical features such as lakes, but not smaller manmade
objects such as buildings or vehicles. In April 1961, the
Soviets placed Astronaut Gagarin in orbit around the earth
so that at least limited visual observation would have been
possible. Still no complaints on the part of any nation.
Admittedly, these early space flights were of no practical
value. for intelligence purposes, but they did help set the
stage for international approval of satellite reconnaissance.
Already by May 1960, when the U-2`aircraft was shot down
over the Soviet Union, the United States had foreseen the
* This material on satellite reconnaissance is drawn from a
chapter by the author entitled "A Leap Forward in verifica-
tion" in the book SALT - The Moscow Agreements and Beyond,
Free Press, 1974.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
eventual demise of aircraft reconnaissance over many foreign
countries and had proceeded with a program for developing
methods of obtaining similar information from satellites.
But in the spring of 1960, this new camera platform was
still not fully operational. As mentioned earlier, fears of
widespread Soviet ICBM deployment that could not be confirmed
or put to rest by the U-2 or other intelligence sources re-
sulted in the creation of the so-called "missile gap," an im-
portant campaign issue in the presidential elections of that
year. There was no disagreement even within the Eisenhower
administration that the Soviets had more ballistic missiles
than the United States, only on the size of the gap and its
military significance. The Air Force saw the gap as very
large and the significance as horrendous, while the President
was less concerned since he felt the U.S. bomber deterrent
was more than enough to compensate for the reasonably esti-
mated disparity in missile force levels until the U.S. missile
program could catch up. By the end of 1960, satellite photog-
raphy was starting to be available and during early 1961, the
missile gap began to shrink and, by the end of 1961, U.S.
authorities confidently discounted the existence of any missile
gap. Apparently the Russians had deployed at the most a hand-
ful of their cumbersome first-generation SS-6 missiles. The
ability to carry out satellite observation of large areas of
the Soviet Union with sufficient photographic resolution to
spot missile silos had proven that the launchers were not
hidden even in the most remote parts of the USSR.
The Soviet Union proceeded with a parallel development of
observation satellites, and both nations improved the capabi-
lities of their systems throughout the 1960's. By 1964, Sec-
retary McNamara was regularly reporting publicly on Soviet
strategic deployments and in 1967 President Johnson extolled
the virtues of the U.S. space program for protecting our
security. In recent years, Secretaries Laird and Schlesinger
have described the Soviet strategic posture in detail, fre-
quently announcing new construction very shortly after it began
and accurately describing the size of Soviet missiles. Neither
country, however, publicly admitted the method by which this
information was obtained in order to avoid a political con-
frontation and a possible international uproar which might
have raised questions as to the legality of such operations.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Instead, there was a tacit recognition of photographic satel-
lite capabilities by both sides and perhaps an increasing
realization that the availability of the information to the
other nation provided a stabilizing influence.
Satellite reconnaissance has a number of major advan-
tages over that carried out by aircraft in addition to its
invulnerability and international acceptance. A satellite
in an orbit of 100 to 300 miles altitude can survey very
large areas in a very short time period. If a satellite were
launched in a north-south polar trajectory, then the entire
earth could be covered, once in daylight and once at night,
every 24 hours. Thus, a satellite camera platform is ideally
suited for searching large areas to determine the presence of
military equipment and installations. A satellite at these
altitudes would normally have an orbit period of approximately
1' hours, thus permitting 16 orbits of the earth each day.
For complete daily coverage of the earth's surface at 450
latitude, the camera would have to photograph a swath 1,100
miles wide. Since most of the USSR lies north of the 450
latitude, a camera that could observe 600 miles on each side
could cover the entire USSR in successive passes. Since this
wide a swath might unduly degrade the quality of the picture,
it may be more practical to photograph a narrower strip of
the earth, leaving gaps in the coverage which can then be
filled in on subsequent days. This gap-filling can be accom-
plished by selecting an orbital period which is not an even
fraction of 24 hours so that the identical path over the
earth will not be covered on successive days. The satellite
programming must, of course, take into account the hours of
sunlight, but a complete survey should be obtainable in 3 to
4 days. Some areas will inevitably be screened by clouds,
so observation of the entire country cannot be counted on
in any given flight. While certain parts of the world are
covered by clouds a large part of the time, they are never
covered 100 percent of the time, and the entire world is thus
always potentially exposed to satellite observation.
Since the wider the swath, the poorer will be the
photographic resolution, a narrower band would have to be
photographed in a single pass for detailed examination of an
object. This can be accomplished by longer focal length
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
cameras which can be programmed to look at small areas. Thus,
a survey type system might locate a missile silo while a high
resolution system could measure its dimensions and determine
its characteristics. Apparently, at the present time, the
United States and the USSR each have both kinds of systems,
i.e., those that can photograph rapidly-large areas with rela-
tively low resolution, and other systems which can focus on
specific locations deemed of interest as a result of the large
area surveys. Judging by the details reported on Soviet
weapons systems, the United States and probably also the USSR
have a capability to resolve objects with a dimension of a few
feet or even less. This would permit the observation of most
items of military equipment exposed in the open, but the
presence and characteristics of those under cover can only be
inferred from the nature of the surroundings. The informa-
tion obtained can be relayed back to earth by TV transmission,
in which case the quality and resolution might be degraded,
or by returning the photographic film to earth in a recover-
able capsule. In the case of TV transmission, the time lag
between observation and the. availability of the information
at a command center can be very short--hours or less, but if
the film must be returned to earth, the delay can be days or
even a week or more.
In the early 1960's, while the early reconnaissance
satellites were being gradually improved, debate was simul-
taneously proceeding on the international legality of such
operations. Although the principle of free access to space
for peaceful purposes was universally recognized from the
outset, considerable debate ensued concerning the definition
of the term "peaceful." In 1962, in the Legal Subcommittee
of the United Nations Committee on the Peaceful Uses of Outer
Space, the Soviet Union proposed that the "use of artificial
satellites for collection of intelligence information in the
territory of foreign states is incompatible with the peaceful
objective of mankind in its conquest of outer space." The
United States, while not accepting that'reconnaissance satel-
lites were "incompatible" with the peaceful uses of space,,
was, nevertheless, a strong advocate of restricting the use
of outer space to non-military purposes. This apparent incon-
sistency in position was clarified by a later U.S. statement
that reconnaissance was non-aggressive and, therefore, should
be considered peaceful and essentially a non-military use. The
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R00020003000
21
United States argued that observation from space is consistent
with international law just as is observation from the high
.seas.
This difference in point of view between the United
States and the Soviet Union was finally resolved in the fall
of 1963 when the Soviet Union suddenly dropped its insistence
on including a ban on space reconnaissance and negotiated with
the U.S. representatives a United Nations resolution* dealing
with outer space which called upon all States to refrain from
placing in orbit nuclear weapons or other weapons of mass
destruction. The United States and the USSR had just previ-
ously stated their intentions not to do so without including
any reference to the issue of reconnaissance satellites.
This public change in Russian attitude may have resulted
from their acquisition of a satellite reconnaissance capabi-
lity of their own, although Khrushchev is reported,to have
stated earlier that satellite photography was permissible.
In 1967, this U.N. resolution was broadened into a Trey on
Outer Space** which carefully omitted reconnaissance fro
the banned activities. However, no document during this
period ever specifically endorsed the use of space for recon-
naissance purposes.
The final seal of approval was placed on the use of
space for photoreconnaissance by the ABM Treaty and the Interim
Agreement on offensive Weapons signed in Moscow, in 1972. In
these agreements the United States and the USSR:agreed that
national technical means should not only be used to verify
the provisions of these arms control agreements., but also that
these information collection methods should neither be inter-
fered with, nor have deliberate concealment measures used
against them. While satellite reconnaissance is not specifi-
cally mentioned in the treaty, the legislative history is
clear that this was the key method of information collection
being referred to. While these were bilateral agreements
* General Assembly Resolution 1884, XVIII, October 17, 1963.
** Treaty on the Principles Governing the Activities of States
in the Exploration and Use of Outer Space, Including the Moon
and Other Celestial Bodies.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
between the United States and the USSR, no other country has
ever objected to such reconnaissance, and thus one can say
that it now has widespread international legality. At last
we have available a technological intelligence collection
tool which is recognized as legal and, therefore, non-;
provocative. Space vehicles are not practical for launching
weapons and so overflights by reconnaissance satellites can-
not be considered as hostile acts. Furthermore, such recon-
naissance has the capability of satisfying such a wide
variety of information needs that it should reduce the
justification for intelligence collection by many much more
provocative methods. For example, aircraft reconnaissance
could be largely phased out and the capability maintained
only for extraordinary situations or potential use in wartii -,
New Role of Technical Intelligence
A review of the overall field of technical intelligence
collection demonstrates with little question its overwhelming
importance in the entire intelligence picture. No other in-
telligence methodology even approaches technical intelligence
in the breadth of its applications or in the quality of the
information provided. It produces a wealth of hard facts
much less subject to alternative interpretations than the
information from other sources. No one questions its relia-
bility as a source since it is not subject to manipulation
like a human agent. Its data is invaluable for almost every
aspect of military and national security planning. Even such
limited arms control agreements as the partial Test Ban
Treaty and the SALT treaties would have been impossible with-
out technical intelligence data, and, more significant,
disarmament will never be achieved without it. Even in the
political arena, technical intelligence provides the factual
background to assess the estimates of intentions derived from
political analyses. It is similarly useful in the economic
field where it provides data on industrial and agricultural
programs without which too often one would be dependent on
suspect published reports.
Technology has not only improved the intelligence data
base, but it has done so with increasingly less provocation
and fewer political risks. The use of satellite platforms
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1
23
are now internationally recognized as proper for the collec-
tion of what heretofore had been considered sensitive national
information. Many other technical collection methods can be
effectively used without intrusion across national boundaries.
National technical means of verifying arms limitations have
been legitimized in treaties between the United States and
the Soviet Union. This is a revolutionary turnabout from the
outcry which greeted President Eisenhower's "open skies"
proposal.
The important question that should be asked is whether
our national security planners and the intelligence community
have adequately taken this new situation into account. We
should not carry out politically risky agent operations when
the incremental addition to data available by technical
methods is not large. We should not carry out provocative
peacetime aircraft missions when satellites can provide the
same data even if the latter method is more expensive. We
should not be negotiating arrangements with governments
inimical to our democratic principles just to obtain a base
for redundant information available from other sources.
Aircraft and naval missions which run the risk of armed
conflict should be carefully re-examined to determine their
real priority in light of the new situation. Some of these
new looks are undoubtedly taking place and may be behind
the reported cutbacks and reorganizations in the intelligence
community, but in light of the revolutionary changes wrought
by improvements in the technology of intelligence collection,
it is hard to believe that even more cannot be done.
Approved For Release 2004/11/01 : CIA-RDP88-01315R000200030002-1