TEACHING INTELLIGENCE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00806R000200750011-5
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
97
Document Creation Date: 
December 22, 2016
Document Release Date: 
August 6, 2010
Sequence Number: 
11
Case Number: 
Content Type: 
OPEN SOURCE
File: 
AttachmentSize
PDF icon CIA-RDP90-00806R000200750011-5.pdf2.86 MB
Body: 
Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 K Q P L: 0' W I TI Z; STAT NATIONAL INTELLIGENCE STUDY CENTER TEACHING INTELLIGENCE A Survey of College and University Courses on The Subject of Intelligence by N I S Wilfred D. Koplowitz Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 TEACHING INTELLIGENCE A Survey of College and University Courses on The Subject of Intelligence by Wilfred D. Koplowitz With a Foreword by Ray S. Cline National Intelligence Study Center Suite 805, 1015 Eighteenth Street, N. W. Washington, D. C. 20036 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Copyright 1980 by National Intelligence Study Center All Rights Reserved Library of Congress Catalog Number: 80-83739 ISBN: 0-938450-00-X Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 In the continuing search for creative and sys- tematic approaches to understanding the dynamics of national security policy, the function of intelli- gence has recently been attracting fresh academic attention. This development, I feel, is sound, con- structive, and merits encouragement. My premise is that disciplined inquiry into the intelligence pro- cess can serve the interests of higher education, scholarship, and an informed public opinion. The inquiries and disputes of the past five years have amply demonstrated that American citizens need a better understanding of just what our intel- ligence agencies do, what they cannot or should not do, and what the system of political control and accountability is. Above all, officials and citizens alike need authoritative explanations of the essen- tial contribution intelligence must make to national decision-making, defense, arms control, and main- tenance of international peace in a dangerous world. The place to start the accumulation of knowledge about the role of intelligence in our society is log- ically in our advanced research and educational in- stitutions. Yet there was until recently an almost complete void in our universities insofar as specific courses devoted to the subject of intelligence as a part of our political process and international af- fairs. Happily, as this monograph shows, a serious, Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 scholarly discussion of intelligence as a factor in policymaking has begun in the halls of colleges and universities in the past few years. Most of the re- search and instruction have been based on the person- al initiatives of a number of individual teachers with special interest and experience in the field. It is, therefore, now for the first time feasible, sensible, and constructive for academic and research institutions to begin to exchange information on courses, projects, and programs devoted entirely or partially to the sub- ject of intelligence. The National Intelligence Study Center (NISC), in this first publication, hopes to assist the pro- cess of intellectual cross-fertilization among inter- ested scholars. NISC's basic aim is to facilitate whatever tasks are necessary to lay the foundation for a better understanding of the importance of good intelligence in a democracy. Wilfred D. Koplowitz, formerly Director of In- telligence Studies at the National War College and the National Defense University, has brought to this survey his own considerable experience in "Teaching Intelligence," as well as his broad understanding of intelligence functions and processes. His continu- ing efforts to encourage and improve the teaching of intelligence has enjoyed the support of the Inter- national Studies Association (ISA) and the Association of Former intelligence Officers (AFIO), as well as the Board of Directors of NISC. Ray S."Cline President National Intelligence Study Center Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 COURSE CONCEPTS AND CONTENT 5 Intelligence: A Process Within a Process 5 Survey Courses 6 Variations on the Survey Approach 8 The Academic Thirst for Theory 8 Intelligence "Components " 9 The Rationale for "Whole Intelligence Courses " 11 Intelligence Education in the Official Community 12 THE BIBLIOGRAPHIC STORY 14 Practitioner's Product 15 Academic Contribution 16 Media Sources 17 STUDENT REQUIREMENTS AND TEACHING METHODOLOGIES 18 To Illustrate 18 PERCEIVED NEEDS FOR IMPROVED COURSE SUPPORT MATERIALS 20 The Literature 21 Case Studies and Simulations 22 Experts and Conferences 2g Visuals 23 Research 24 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 GENERAL OBSERVATIONS 25 AN AGENDA FOR ACADEMIC SUPPORT DEVELOPMENT 29 POSTSCRIPT 34 INSTITUTIONS OFFERING WHOLE INTELLIGENCE COURSES 36 INSTITUTIONS OFFERING INTELLIGENCE COMPONENTS IN BROADER COURSES 53 SENIOR SERVICE SCHOOLS OFFERING PROFESSIONAL TRAINING COURSES 70 RESEARCH ON INTELLIGENCE RECENTLY COMPLETED OR IN PROGRESS 75 SYLLABI RECEIVED 79 STATISTICS AND MAIN FINDINGS: A BRIEF SUrIlKARY 81 BIBLIOGRAPHY 84 NOTES 89 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Fresh interest in intelligence, long regarded as an arcane and even nefarious activity involving per- sons of doubtful character and eccentric powers of rea- son, derives from several factors, some substantive and others circumstantial. There is an obvious and maturing appreciation for the significance of intelligence in the public policy and decision-making process. Scholarly trail- blazers produced seminal works on this relationship after World War II. The subjects chosen reflected momentous experiences of that global conflict: Oper- ation Barbarossa, the German attack on the Soviet Union; the Japanese attack on the United States at Pearl Harbor; ULTRA, the deciphering of the German code by British cryptanalysts; the Double-cross Sys- tem, the British manipulation of German agents in Great Britain. The curve of attention crept steadily upward in the ensuing years in the area of intelligence per- formance, a phenomenon nourished by classic cases of strategic surprise, warning, and deception emanating from recurring Cuban and Mideast eruptions. Scholars linked their work to crises and decision-making, but- tressed by new perceptions of individual and group behavior in bureaucratic settings. The serious and valuable products of this period focused less on intelligence as a composite set of Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 functions, actors, and institutions than on the cen- tral, though not all-encompassing, issue of intelli- gence and policy relationships. It is likely that the teaching of intelligence in a more comprehensive mode would have gradually commend- ed itself to the academic community, but the shock of expose and alleged scandal accelerated the process. The spread of courses related to intelligence in aca- demia during the past half dozen years, therefore, can be attributed more to public controversy than to pri- vate analysis. Revelations of certain mistakes and misdeeds, con- cern about presidential misuse of intelligence agencies, media exposures of activities cutting close to the bone of constitutional and ethical muscle, and attendant pub- lication of heretofore privileged information have all prompted the faculty and students in institutions of higher learning to scrutinize the intelligence factor. Housed in established academic frameworks, a new, broad- er focus and an aggressive curiosity can now be satis- fied to a substantial degree. This monograph reports on a survey, under the sponsorship of the National Intelligence Study Center (NISC), of mayor colleges and universities in the United States, and a few elsewhere, to identify cur- rent course offerings related to any aspect of the intelligence process. The survey grew out of a panel on "Teaching Intelligence" convened at the March 1979 Annual Convention of the International Studies Associ- ation (TSA) in Toronto. To enrich the exchange of data and insights begun at that meeting, it seemed useful to determine who was teaching intelligence courses, Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 to whom, where, how, and why. Gleanings from this relatively brief experience suggest the nature of improvements needed in materials supporting intelli- gence sources. The basic tool of the survey was a questionnaire designed to be "value free." Questions avoided ref- erence to controversial issues in the intelligence field and were meant to be neutral on the matter of how intelligence should be taught. While the thrust of the questionnaire was toward identifying and de- scribing '4ahole intelligence courses," or courses entirely devoted to intelligence, our interest encom- passed "component courses," or courses on a broad subject only partially devoted to intelligence. Bibliographic data noted on the questionnaire's responses is extensive but incomplete, except for those courses on which syllabi were submitted. How- ever, syllabi were received for most whole intelli- gence courses and probably represent accurately the readings generally in use. The survey did not seek explicit evaluative data or comment. It requested average student enrollment to determine levels of interest and participation as well as instructional techniques used by course di- rectors. Responses, on the whole, give the impression of faculty and student satisfaction with the educa- tional product. A few report ameliorative revisions, in the light of continuing review, to make an improve- ment in the product. Educational institutions offering either whole intelligence courses or intelligence components in Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 broader courses run the gamut in terms of location, size, prestige, academic philosophy, and auspices. State universities, small private liberal arts and venerable "Ivy-League" colleges, as well as service academies, are inserting intelligence studies into their curricula. Undergraduate whole intelligence courses are most often housed in departments of po- litical science. A few are administered by depart- ments of government or history. The graduate offerings are usually in international relations institutes or related special programs. Intelligence components appear in courses across a spectrum from foreign po- licy to national security studies and military history. This monograph summarizes the responses to the questionnaire, provides names and addresses of in- volved persons, and offers concluding observations and an agenda for academic support development. We hope these findings nourish interest in the teaching of intelligence, stimulate a continuing exchange of per- tinent information, and evoke constructive ideas about how to do it better. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Intelligence: A Process Within a Process Intelligence, produced by a somewhat idiosyn- cratic process, is properly viewed in academia as an input to a larger process culminating in policy and, ultimately, i:n action or deliberate inaction. The educational olijectiwe, often explicitly stated in course sy11ab3:, is to understand how intelligence is produced, how it affects the nation-state's conduct of its external relations, and, thus, how intelli- gence fits into the total fabric of world affairs. The teaching of intelligence in academic insti- tutions places the subject within the broader frame- works of national security, foreign policy, or inter- national relations. This is generally the case fn an intellectual sense whether or not classroom treatment occurs in courses labelled "intelligence" or some other rubric. It further follows that teaching highlights the relationship of intelligence to policy. Ancillary attention is paid to how raw intelligence is acquired, combined, and refined by analysis into substantive reports, including national intelligence estimates. There is a natural fascination with the techniques and skills involved in the often romanticized craft of espionage. In the military service schools, the policy Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 perspective also prevails, but there is much greater interest in the intricacies of human and technical collection systems, as students expect some involve- ment in these functions during their careers. There is a persisting preoccupation in academic and professional intelligence circles with the phe- nomenon called "intelligence failure." This sub- aubject accommodates a growing interest in the psy- chological and sociological ingredients of research and analysis--i.e., the resultant intelligence product --and the ability of the policy system to exploit the product or, indeed, to evaluate it as an element in exploitation. Survey Courses. The majority of whole intelligence courses are described by respondents as "survey courses." Both a comprehensive and eclectic quality is evident. The courses offered range widely. They convey the his- tory, structure, and dynamics of the United States intelligence community and review the American ex- perience in intelligence. A few courses reach back to World War I and take the student through the sparse chronicles of American intelligence efforts between the wars. The story picks up a beat as the country enters World War II, and the Office of Strategic Ser- vices (OSS) becomes a vital and particularly exciting arm of the nation's wartime interest. The typical survey course then moves quickly to describe the contemporary intelligence community em- phasizing the Central Intelligence Agency (CIA), its original chartering in 1947, its evolution in the 1950s and 1960s, its trials and tribulations played Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 out in the i~nvesti~gations and reforms of the 1970s. Most courses project these historical cum in- stitutional features as backdrop fvr subsequent units which select among several options depending on the instructor's ideas and interests. The policy rela- tionship, as noted, dominates. Another option hones the double edges of espionage, counterintelligence, subversion, and covert action. This takes the class squarely into the more controversial, clandestine do- main where value judgments can weigh heavily on how the material is handled and received. In this option, the students wrestle with the issue of "Tntelligence in a Democratic Society." Virtually all courses surveyed spend some time on the multiple and interrelated problems to which the United States Government and body politic have turned during the past several years. Thus, the students debate the conflict between the inherent need for secrecy in intelligence work and the citizen's "right to know." They confront the tension between national security requirements, especially counterintelligence, to pro- tect vital secrets, and the constitutional rights of individuals. They strive to resolve the stress cre- ated by the President's prerogatives to conduct for- eign policy and intelligence operations and the U.S. Congress's obligation to review policy results, mon- itor performance, and appropriate funds. Certain survey courses interlace all of the above, or supplement it, with a comparative study of --with at least a look at--a few foreign intelligence services. The Soviet Union's Committee for State Security (KGB), the Chief Intelligence Directorate Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 of the Soviet General Staff (GRU), the Soviet satel- lite services, the British, French, German, and, in- creasingly, the Israeli intelligence systems are discussed. Due to the relative paucity of open lit- erature and direct professorial experience, the study of these foreign institutions is necessarily brief and superficial. Nevertheless, the attempt at comparisons and the inclusion of material on the "opposition" sug- gest an awareness of the cross-cultural aspects of the intelligence function in the international system and the relevance of the threat to national interests em- anating from acknowledged adversaries. Variations.on the Survey Approach. A few courses depart from the broad survey con- cept and focus on a particular facet of the intelli- gence field. One such course addresses the utility of covert action as practiced by both the KGB and the CIA. Another, reflecting the overall purposes of the graduate institution in which it is offered, is at- tempting to describe and analyze the intrinsic prob- lems of command, control, communications, and intel- ligence as confronted by both government and industry. This scrutiny of the generic phenomenon whereby all organizations require, collect, process, and utilize intelligence is especially pertinent to the quest for a "theory of intelligence." The Academic Thirst for Theory. Several professors teaching intelligence courses are keen to introduce theoretical concepts into the educational experience. Theoretical work meeting academic standards is available on "intelligence 8 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 failure," and in related areas of crisis management, decision-making, and policy formulation. An all- encompassing view of intelligence from one end of the cycle to the other expressed in psychological, organ- izational, and political--in effect, in systemic-- terms has not emerged either from the world of prac- tice or scholarship. Intelligence "Components." Academic treatment of the intelligence process has favored the component formula rather than the whole intelligence course approach. This is the traditional preference and is still widely held. Ac- cording to this school, intelligence, despite its unique characteristics, does not merit vertical, al- beit disciplined study. It exists by definition to serve policy, its making and its execution. Fascin- ating in a special way, even compellingly so, it is only one of many critical inputs to the policy pro- cess. Granting that newly available data on its in- ner workings enhances understanding, to remove "in- telligence" from its total anatomy for curriculum packaging bestows on it an unwarranted and even mis- leading importance. On a more mundane level, component treatment re- flects limited resources. Academic budgets are tight. Department chairmen and professors, forced to choose among courses on foreign policy, national security policy formulation, international relations, and a new course dealing exclusively with intelligence, will generally opt for the broader program. More- over, university faculty may feel somewhat less com- fortable with the latter subject, despite newly avail- able open sources, than with established, fundamental Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 core subjects in the general field. Until an inter- ested faculty member can immerse himself or herself in the subject, there may be some hesitance to teach in- telligence in the light of the premium put on direct experience as an ingredient of authority. In still other cases, and this is a subtle point, skepticism about, or downright hostility to, what has been learn- ed of the American intelligence practice may inhibit instructor enthusiasm for course development. This deep concern can, of course, have the opposite effect. Whatever the reason, conviction or convenience, the component formula continues to prevail on most campuses. It puts intelligence in most instances within courses on American foreign policy or national security studies. In the latter, strategic and de- fense factors, and the related intelligence ones, are covered in more detail than in the former. Both ad- dress the govertmnent's decision-making process and, in so doing, include the "intelligence factor" as a substantive input to rational, bureaucratic politics, and other models. Teachers of diplomatic and military history, international relations, and international politics are weaving the intelligence thread into their par- ticular tapestries. When viewing the overall sweep of history, the interplay of diplomacy, or the for- tunes of war, the role of intelligence can be iden- tified and evaluated from the 1917 telegram of Ger- man Foreign Secretary Alfred Zimmerman to his Ambas- sador in Mexico, to ULTRA, and the discovery in the 1950s of Soviet espionage agents, Julius and Ethel Rosenberg. When dissecting the contemporary international Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 system and analyzing the instruments by which states protect and advance national interests vis-a-vis oth- er sovereign states, the function of both intelli- gence and covert action figures strongly. Teachers of international relations recognize that intelli- gence, in all of its institutional and behavioral aspects, is an attribute of the system, as is armed conflict. They also recognize that there are cer- tain discernible practices, unwritten rules, and codes, which subtly govern intelligence conduct within the system. The Rationale for "Whole Intelligence Courses_." Advocates of whole intelligence courses reason as follows: Dealing with the complex intelligence function in discrete courses labelled "intelligence" is logical in the light of the unique characteristics acknowledged by component advocates. As an element of national power--i.e., the state's capacity to pur- sue its interests, and especially as applied to great power portfolios--intelligence has heretofore not been subject to the disciplined scrutiny given to the diplomatic, military, economic, geographic, and cul- tural aspects of state power and craft. A reasonably disciplined scrutiny is now feasible from reasonably authenticated sources. Finally, whole course champions note that the broad controversy surrounding the U.S. intelligence establishment has touched many vital parts of our socio-political system. That controversy is signi- ficant for our politics and our values. It can best be organized for study and informed discussion if given separate, somewhat extended, treatment includ- ing appropriate references to history and comparative Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 phenomena. At the same time, the central and powerful point of the component school cannot be and is not ignored. Studying intelligence can only be accomplished sen- sibly if intelligence is viewed within larger con- texts, namely, the culture, the government, the de- cision process, and, indeed, the whole systemic environment in which it operates. A successful aca- demic course, whole or component, will never isolate the intelligence function even as it examines its internal dynamics. Intelligence Education in the Official.Community. Government officials concerned with national security affairs are either producers or consumers of intelligence, or both. Exposed to intelligence courses at various points in their continuing career education, these officials are essentially being trained to perform their jobs more ably. There is a strong common denominator in courses designed to analyze the intelligence relationship to policy as it appears from inside the government and similar courses conducted in the academic community. It is interesting to note that the "thirst for theory" ob- served in academia is beginning to parch the throats of practitioners who are unanimous in their view that such abstractions must be manifestly tied to actual experience and, in turn, be useful to it. The Central Intelligence Agency and the U.S. Department of Defense maintain sophisticated educa- tional/training programs. An employee may be study- ing--or training--for as little as a few weeks or as Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 long as two years and at various stages of his or her career. Courses can be general or c y specific. As a collective enterprise, the intelligence commun- ity offers an elaborate array of courses in all phases of the intelligence process. Care is taken in official institutions to under- line the point made at the beginning of this discus- sion concerning concepts and content. Intelligence cannot be isolated. It must be set soundly in its policy and management contexts. Moreover, in recent years, the public debate and legislative outcomes have prompted appropriate attention to placing the intelligence function in its even broader societal and philosophical framework. Needless to say, there is little argument in official circles about the priority requirement to "get the job done" on behalf of compelling national interests. The stress is on the latter, the essential task of professional edu- cation in this field. In both the CIA and the Defense intelligence complex, there is positive interest in nourishing the disciplined teaching of intelligence in the aca- demic community. There is, also, a desire to be sup- portive in appropriate ways. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 The veritable explosion in the literature of in- telligence during the past ten years has supported and nourished the teaching of intelligence. The nour- ishment has titilated the professorial palate but has not satisfied the collective academic appetite. There is no single published book which has achieved general acceptance as a quasi-textbook on the overall subject. There are, however, several works which are gaining favor as contributing primary sources for the recur- ring elements in the sources described elsewhere in this report. The volumes of testimony and findings published by the Government Printing Office in the wake of Senate and House committee investigations have been used selectively by many course directors. Books I and II of the Church Committee Reports are now, un- fortunately, out of print. A commercially edited compilation of key items from this source has proved to be a convenient, one volume package. It was pub- lished by R. R. Bowker in 1977 in the Public Docu- ments Series. The literature serving academic courses on in- telligence--whole or component--may be placed into several categories, according to the background of authors. They have come from three principal direc- tions: intelligence and policy professionals, i.e., Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 practitioners, agents, case officers, analysts, senior managers, and policymakers; academicians; and finally, writers and journalists. In a few notable cases, producers of intelligence literature have moved from the practice of the craft to schol- arship and teaching and, occasionally, to the media. There is, of course, the rather special cate- gory of the "make believe" and the somewhat more il- luminating roman a clef. Intelligence fiction has embellished the modicum of romance in the second oldest profession. In the post World War II period spy fiction provided bountiful evidence of its appeal to the general public. Teachers of intelligence seem aware of its limitations as a serious source of knowledge about the intelligence business. At the same time, they are finding imaginative ways to ex- ploit fiction for human and other insights, and they have used it as a dramatic foil to clarify the dif- ference between pre-course images of intelligence and newly discovered reality. Practitioner's Product. Practitioners are turning out material, includ- ing spy fiction, of great variety and quality. A few have attempted what might be described as road maps for neophytes covering the topography of the intel- ligence world. The Craft of Intelligence by Allen Dulles was an early example. Despite its lucidity, this opus by a highly experienced officer has dimin- ishing appeal to today's intelligence academics as it predates the more revealing and dramatic outpourings of subsequent professional writers. It is, of course, Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 unabashed in its advocacy of a strong American Intel- ligence program. Later, highly placed veterans, loyal but hardly uncritical intelligence officials--Lyman Kirkpatrick, Sherman Kent, Ray Cline, Harry Rositzke, David Phillips, William Colby--to mention only afew--offered a rich assortment of history, memoirs, essays, and post- career distillations of their experience. Other former intelligence and policy officials have vented their di s- approval and disdain for the mission, performance, and personnel of the intelligence/policy sector. The dis- affection of men like Victor Marchetti, John Marks, John Stockwell, "Little Joe" Smith, Morton Halperin, and what many term the defection of Philip Agee, have put into the public domain a mixture of fact, heretofore secret, and sharp allegation, frequently self-serving. This collection of dissident writing is being heavily exploited in whole intelligence courses. It feeds the debate concerning legitimate issues enjoying prominent place in intelligence-related curricula. A few course directors seem to weight reading lists with the work of protagonists reflecting a particular point of view. How- ever, in most courses described in this report an attempt is made to expose the student to competing positions and perspectives. Academic Contribution. Formidable contributions to the literature have come from the academic sector. These have been essen- tially in the realms of decision-making, intelligence/ policy dynamics, and intelligence failure. The schol- arship of Roberta Wohlstetter, Klaus Knorr, Graham Allison, Richard Betts, and many others is recognized and used to advantage by course directors. As the cur- rent crop of younger faculty interested in intelligence Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 deepen their grasp of the field, identify gaps in the literature, mature their course offerings, and sharpen the research tools of graduate students, fresh contributions can be expected. Media Sources. For many years journalists were fascinated and frustrated by the "intelligence story." Aggressive investigative reporting, much of it not verifiable in the 1950s and 1960x, produced provocative and, as in the case of practitioner memoirs, mixed results. As the environment changed, the tight lid of secrecy loosened. The merits of this development aside, journalists and other writers on intelligence are now able to obtain documentary material, to interview former intelligence officers willing to impart infor- mation, and, in general, to confirm their findings more often than previously. Intelligence courses are using, in appropriate ways, the work of David Kahn, John Barron, and the well-received book by 'Thomas Powers on Richard Helms and the CIA. Data available from the questionnaire responses does not reveal a broad and systematic utilization of press and periodical literature. However, students are probably being directed to these items on an ad hoc basis as the courses unfold. While much of this coverage tends to sensationalism or is perishable, there are some interesting contributions in both scholarly and popular journals and, occasionally, in the daily and weekly press. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 STUDENT REQUIREMENTS AND TEACHING METHODOLOGIES Whole intelligence courses, in general, are hew- ing to traditional procedures and techniques used in college and university teaching. Lectures by the professor, sometimes supplemented by visitations from outside experts, are followed by class discussion. Students demonstrate acquired knowledge by taking tests--short quizzes, midterm and/or final examina- tions. They are almost always required to produce other written documents--short essays, book reviews, or, as is most often the case, longer, researched, annotated term papers. Demands are often heavy, but fair, and consistent with normal burdens imposed by credit courses. A few intelligence course directors are using techniques, not unique to the total academic experi- ence, but not yet widely employed by their colleagues teaching about intelligence. These approaches put the student as squarely as possible into the practi- tioners harness. They attempt to build appreciation for the special pressures of the real intelligence world and to concretize the abstractions and general- izations necessarily deriving from classroom study. To illustrate? Professor Harry Howe Ransom, one of the early teachers of intelligence, puts his classes at Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Vanderbilt University into a Congressional hearing mode. Each student assumes the identity of a well- known witness, legislator, or staff aide. The stu- dent addresses the issue before the committee in real life terms, advocates and defends his role viewpoint, and deals with the interrogation of other role players. Dr. Ray S. Cline, a former Deputy Director for Intel- ligence, CIA, teaching at Georgetown University, poses a hypothetical, but realistic task for a student na- tional intelligence estimator. The challenge forms the framework for a required term paper, forces anal- ysis within the discipline imposed by the intelligence/ policy relationship. Lyman Kirkpatrick, a former senior intelligence executive, now at Brown Univer- sity, illuminates cumulating principles and conclu- sions by actual case studies, some drawn from his own extensive experience. While somewhat different from the oral role playing used by Professor Ransom, Peter Beckman, teaching at Hobart and William Smith colleges, confronts his students during examinations with rigor- ous, analytical, practical problems which push them to extract critical material from course presentations and respond from practitioner perspectives. Experimentation, including scenarios and simu- lations with built-in intelligence factors, is oc- curring elsewhere. The net impression is left, how- ever, that the instructional approach to teaching intelligence is, in the main, relatively straight- forward at this time. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 PERCEIVED NEEDS FOR IMPROVED COURSE SUPPORT MATERIALS A central aim of this survey is the identifica- tion of gaps in the portfolio of instructional aids to sound teaching about intelligence. While the qual- ity of teaching and learning is ultimately dictated by the quality of the individual teacher and the motiva- tion of individual students, the relative newness of intelligence subjects on the university scene makes support saterials, especially the literature, very important. Appreciating that many courses have been recently designed, that the literature, while expand- ing, is incomplete and often inspired by non-academic interests, and that classification has necessarily inhibited case-study development in the public sector, the questionnaire solicited views on what is needed to enhance the educational experience for students of intelligence. Respondents have confirmed some pre-survey as- sumptions and offered specific, creative suggestions. The recommendations have come both from teachers of whole intelligence courses and from many professors incorporating intelligence components in broader courses. Support needs may be grouped in a few Qeneral categories: bibliographies and reading lists, case studies and simulations, adiunct expertise and pro- fessional/academic conferences. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 The Literature. With regard to reading material, syllabi indi- cate that familiarity with the literature is growing. Some requests for authoritative, tailored bibliogra- phies have been made, however. There are, in fact, several published bibliographies, and one superior, annotated list of intelligence literature produced regularly in official circles. It has received limited distribution in academic circles. One res- pondent suggested that a special book list be drawn up "geared to undergraduate use." Annotations would indicate which of the "classics" remain valid given the passage of time since original publication, and which of the anti-CIA books are "least irresponsible." The suggestions for future intelligence writing in the educational context are evenly divided be- tween those calling for a single work to serve as a standard textbook--"a short, cheap, reliable basic text"--and for "more scholarly works." One respon- dent solicits writing which is "analytical...not mem- oirs, histories, and polemics; we are at a stage where we need to be more conceptual, analytical, in- deed, 'scientific. "' Still other professors state their needs are either difficult to acquire or unavailable. For ex- ample, they suggest a requirement for additional data on foreign intelligence systems; for a solid publica- tion on international legal rights and responsibilities associated with intelligence collection; for studies on how information is turned into intelligence analysis; and for an unbiased treatment of covert operations. These are gaps in the literature noted by the res- pondents. They invite production of a compendium Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 of articles on collection of information, on intel- ligence failure--or success--and on covert actions with illustrations of the utility and disutility of this instrument of foreign policy. In short, there is widespread enthusiasm for something convenient and comprehensive. Case Studies and Simulations. The interest in case studies is virtually unan- imous and follows the pattern noted in the literary agenda. Recognizing that concreteness and actual ex- perience can illuminate principle and generalization, the academic respondents express keen interest in case studies concerning the linkage between intelligence and policy, i.e., when is intelligence "good" or "bad" and is it utilized in given decisions? One professor will welcome cases which exemplify the conflict be- tween secrecy and disclosure pressures, which drama- tize the on-the-ground ethical issues involved in all phases of intelligence work, and which make meaningful the complexities of bureaucratic organization and pol- itics in the intelligence community. To repeat a re- curring theme another thoughtful educator offered the opinion that even the concrete case studies should be "theoretically informed." The recommendation to construct a reader combin- ing essays and case studies reflected a broadly as- serted set of requirements. In this category of practical applications, the idea of designing innovative simulations or "intel- ligence war games" found clear resonance. The "game" Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 would, of course, be one of multi-dimensional inter- state conflict, rather than oriented simply to use of military force. There is strong interest in this "hands on" platform for both educating and evaluating students. Experts and Conferences. In the third set of perceived needs, there is receptivity to exploiting the insights of professional intelligence and/or policy officers, working or re- tired, who might add a dimension to the class readings, case studies, lectures, and discussions. Interested professors also generally observe that inadequate budgets constrain their ability to extend invitations offering travel expenses or honoraria. This openness to outside ideas and expertise also manifests itself in suggestions for small, well- prepared conferences of qualified scholars and practi- tioners to examine outstanding analytical problems, to exchange information about teaching experiences, and to obtain up-to-date material from the official intelligence community on how the community's busi- ness is organized and executed. Visuals. An increasing supply of relevant film and video production exists, much of it available for loan, rent, or purchase. Ranging across a wide spectrum of topic, objectivity, and quality, this body of visual intelligence literature requires selectivity and dis- cipline in its exploitation, but is clearly under- exploited at the moment in the educational arena. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Research. The survey attempted to identify intelligence re- lated research recently completed or underway at above the undergraduate level. Such activity can itself en- rich the course reading-lists. Responses to this item were scarce. A few academicians involved in teaching are also researching in the field and are preparing manuscripts and books. One survey respondent, in com- menting on course support needs, aptly noted the lack of special grants and fellowships for graduate stu- dents interested in intelligence. Expansion .of such resources would spur research, and, thus augment the literature supporting education on the subject. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Academic sponsorship of study and teaching about "intelligence" is expanding. As noted at the outset, this apparent trend was a stimulus for the survey and has been sub- stantiated by its findings. Student interest, expressed in course enrollment, is high. (Courses are uniformly electives.) Professorial enthusiasm is less pervasive, but the vigor and vivaciousness of those faculty members initiating intelligence courses are remarkable. Certain responses--or, indeed, a possible factor in the failure to respond--connote continuing resis- tance to bestowing the bonafides of academe on a func- tion Long thought to be operationally dominated, of- ficially sheltered, and impervious to disciplined or theoretical examination from outside its own profes- sional ranks. Parallel-to-lingering skepticism is increas- ing receptivity to the idea that intelligence courses, whole or component, merit objective con- sideration. Many negative responses seemed to solicit survey results and further data with this in mind. The courses identified contain many common fea- tures, especially when constructed as broad surveys. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 These relate to the history of the United States intelligence community, the intelligence cycle, the special functions of counterintelli- gence and covert action, the central issues of intelligence/policy relationships and, of course, the problems attendant on recent investigations, reorganizations, and reforms. While commonality exists, so also do varied themes and foci. There is a pronounced eclectic quality to many courses on intelligence. One senses a certain groping for an optimum introductory course structure. This could be an abortive search or even counterproductive. Va- riety is natural and healthy. Courses must re- flect the special interests of professors, the thrust of the sponsoring departmental disciplines, and, to a reasonable degree, student orientations. Basic concepts aside, a comparison of syllabi reveals some courses as being more coherent and logical in their internal progression than others. Some appear more probing than others; some demand more student intellectual effort than others. The quest for theories, if not to embrace the universe of intelligence, at least to explain its seg- mented mysteries, is a legitimate concomitant of aca- demic courses and research. Wide dissemination of work in this vein, even if tentative and controversial, should be made. Thoughtful practitioners will benefit from theories firmly rooted in the soil of ex- perience. To the extent possible, practitioners, Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 serving or retired, should be encouraged to under- take introspection and retrospection targetted at theory. Their collaboration with individuals or small groups of informed academicians exploiting the complementary analytical skills and greater detachment of the latter could sharpen the search for provable hypotheses. Overall, coverage of the subiect of intelligence in colleges and universities remains at a rudimentary stage. Rarely does one find more than one discrete course offered at any university, and two courses appear to be maximum at this time. A few re- sponses state that references to intelligence occur in all relevant courses. However, no aca- demic institution responding to this survey has elaborated fts catalogue to provide a complemen- tary portfolio of intelligence related courses. Such a portfolio might include such offerings as: The History of Intelligence in International Pol- itics and American Foreign Policy; Cognitive and Behavioral Factors in Intelligence Analysis; Es- pionage and Covert Action as Instruments of For- eign Policy; and Managing Intelligence Collection, Flow, and Use in Public and Private Sectors. Such a cluster, possibly scheduled seriatim over two academic years, would provide more sophisti- cated and profound treatment than is possible with the current reliance on the single survey courses described herein. This modest elaboration of intelligence courses would be responsive to the professional aspirations of students planning careers in the intelligence sector. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Zhe issue of whole intelligence courses versus _components is neither false nor crucial. There is _merit in both preferences in terms of philosophy and pedagogy. Faculty and student interest, resources available, and the nature of existing programs in relevant disciplines will dictate decisions at each institution on whether and how to pro- ject teaching about intelligence. The lrnowledge, ingenuity, and open-mindedness of course direc- tors are more important than how the course is labelled and how much time is exclusively devoted to intelligence per se. As stated elsewhere, intelligence cannot be properly studied in a vacuum, divorced from its cultural and political environment, or from its raison d'etre of policy formulation, execution, and evaluation. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 1. Steps should be taken to improve general access to the useful bibliographies already in circulation. However, a teaching oriented bibliography is needed. Amply annotated with intelligence teaching in mind, constructed around key subtopics addressed in intelligence courses, with appropriate cross-listings under each topic, such a bibliography would provide a service to educators. The optimum version of the list would go beyond books and include major articles and monographs in serious journals reviewed for sound content and low perishability. 2. The perceived textbook gap should be filled on several tracks. A textbook, Webster reminds his readers, is nothing more or less than a "book used in the study of a subject...containing a presentation of the prin- ciples of a subject...." Several books already in use might qualify, technically speaking. Nevertheless, no single work appears to satisfy the desire for a comprehensive, convenient volume, or series of volumes, treating with recognizable authority and judicious balance, the subject of intelligence as it is being defined in the college and university forum. This need should be filled, and undoubtedly will Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 be, not by a single, cosmic publication but by dif- fering, equally valid projects. A straightforward "textbook" can be written, perhaps by a former profes- sional intelligence officer with special qualifications by dint of broad experience. This might be accom- plished in collaboration with a knowledgable academic person. An annotated "intelligence reader" can be com- piled although, if it contains only previously pub- lished works, the problem of perishability must be met. A third formula for intelligence texts would involve newly commissioned contributions to a multi- suthored, edited collection in which the complementary expertise and perspectives of the contributors would enhance the product's overall bonafides. A more ambitious version of the latter approach would establish a series of intelligence studies and would organize single volumes around major subtopics such as history, espionage, technical collection, covert action, counterintelligence, analysis, intel- ligence and policy, legal and legislative issues, management, and so forth, including a volume on com- parative intelligence studies dealing with key foreign systems. The Consortium for the Study of Intelligence is publishing four volumes of papers and discussions deriving from symposia held under its auspices on four major topics. This set, when completed, will partially service the need outlined in this survey. 3. A basic intelligence documents file should be compiled covering the American experience. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 This project would primarly service the histori- cal components in intelligence courses. Under certain conditions, it could also provide excellent material for units concerned with analysis, policy relation- ships, and legislation. The basic documents file would include texts and reproductions of presidential and executive orders, landmark judicial rulings, laws and charters, declassified National Security Council di- rectives, exemplars of declassified or unclassified intelligence production, and other illustrative items from outside the official community. The documents could be used by students, not merely as an informa- tion source, but as subjects for critical, comparative analysis. 4. Case studies eniov high priority on everyone's list_of desiderata, and new ones should be constructed. Several professors, especially those with pro- fessional intelligence backgrounds, have already in- corporated a case approach into their curricula es- sentially using material in the public domain. The cases deal mostly with "failures" in analysis and co- vert action, or unresolved conundrums in counterintel- ligence. Enterprising instructors can continue in this fashion with profit. More expedient would be concerted and collaborative work on a group of actual cases chosen to illustrate key points across the spectrum of intelligence topics. These studies would adhere to the same format, designed to support active stu- dent involvement in addressing the case in writing, orally, individually, and in a group. Such case studies would benefit from inputs by the official Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 intelligence establishment even if constrained by classification. As an instructional aid, certain past cases, especially illuminating as to principle but still sensitive, should be acceptable in steril- ized form. The case studies should be circulated or made available from a central clearing house location. 5. Intelligence game scenarios should be developed, highlighted with intelligence inputs to interstate conflict situations and with intelligence actors play- ing leading roles. These exercises could be from a half day to three or four days in duration. As in the matter of case studies, it seems obvious that interaction between academic and official sectors in simulation develop- ment would enhance the product. The games should be widely shared. 6. The recevtivity of academic course directors to contributions by outside experts serving as visiting lecturers should be exploited. A list of qualified former intelligence and policy officers willing to participate in classroom activity should be sent to intelligence educators. The list would include addresses, telephone numbers, and acceptable conditions (whether solicits or waives honorarium, travel, and per diem expenses, etc.). Given the geographical spread of retired professional officers and their motivation for sharing experiences in responsible fashion, it is likely that such a ros- ter will prove to be a valuable resource. 7. A master list of "intelligence visuals" should be compiled. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Films, video tapes, and slides are available from widely diverse sources and under varying condi- tions. A master list with acquisition data would fa- cilitate their incorporation into intelligence courses. The optimum visuals locator would be succinctly anno- tated for content and thrust, as this material tends to be even more value-laden than printed literature. 8. A collo uium on "Teachin Intelli ence" shou d e convened at an early date. Such a conclave would partially fulfill the wide- spread interest in a continuing exchange of information and ideas. The meeting would be part and parcel of an ongoing clearing house function which is in order. Participants in the proposed colloquium would primarily consist of persons naw directing or planning to direct courses of the kind described in this report. The pro- ceedings would combine discussions of substantive ques- tions, including up-dates on the state of the intelli- gence community, with a comparison of teaching experi- ences, i.e,., what works, what doesn't work. Panels and workshops on course concepts and structure, on case study development. and classroom techniques, on simu- lations, on research agenda, and on other educationally relevant topics would be held along with plenary ses- sions to hear top officials, observers, and critics on major issues. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 In conclusion, a few words appear to be necessary about the somewhat special and provocative teaching/ learning environment in which intelligence studies have grown in recent years. Observations are made with appreciation for the deeply felt concerns of professors, students, researchers, writers, journal- ists, and those intelligence practitioners who are either in career-related training assignments or in post-career academic settings. There are allusions in this report to academic skepticism, to disaffected intelligence officers, to press sensationalism, to prolonged controversies a- bout ethics, oversight, and reform. Debate on these issues was probably inevitable in our society at some point in our history. Engagement has been wide both within and outside of the official intelligence and policy communities. Academics, administrators, teachers, and students have joined the fray with en- ergy, passion, and point. As previously stated, the acceleration in intel- ligence course development is partly traceable to these very issues. The process sparked interest and provided the fuel of new information, including some undisputed facts, heretofore unavailable. As academic treatment matures, both in the classroom and in pub- lished research, it seems reasonable to examine that treatment in terms of the authenticity of data Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 projected as "fact" and the evenhandedness of the argument presented on persisting issues. The survey did not purport to address this matter. Impressions gained as by-product are, in general, positive. The responses do suggest the obvious, however; the potential for polemic is high. It exists in the classrooms of serious realpolitik oriented practition- ers turned professors, of equally serious civil lib- erties-oriented faculty, and, in perhaps less obvious form, in the classes of instructors whose attitude to- ward intelligence tends to be a function of their political Weltanschauung. This is not to suggest that persona offering courses on intelligence should fail to share with stu- dents either a world view of politics or a viewpoint on intelligence in toto or any part thereof. The greatest teachers have not been known for weak or shy- ly expressed opinions about their special fields. The teacher's obligation to share conviction is clear. Is there not an equal obligation to encourage the student to observe and weigh competing viewpoints and to seek contrary information from equally admissable sources? Academic interest in intelligence as a facet of broader disciplines--whether approached discretely or integrally--offers an opportunity to illuminate a sub- ject long confined to the shadows. The light of the truth seekers will serve better than the fire of the partisan. To search out veritas in such a manner is to honor a central commandment shared by academe and the intelligence profession. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 U ~ A vE~~ ~AA~ P4 ~ ?rl r-I Ul ~x r-1 o a UUUW ~ D W a .u o a ~ N o a +~ a~ ro -~ a a~ ro a~ ?~ >a a~ro ~o~~ .?I -o W 1+UaC O U roma?~1 ?N?~3 ro N O IA u o 3 ~ `~ s a o -+ laaaaao O I N N U 3.1 ~ N .'7 U C N N R'i N Q a+ ~?zvoo+ ~-I tr+ O FC v+~i O~-I +QI ~ qA +i~ ti~ NO ~C H ~ ?.~ ~ tll O ?,.I w ?r~l ro H U U W ~ Oln ++NUDAO ~ U -rl LI O~ N ro r-Q-1 b +~ W N >.'O N A 3Q4 U ~ ro~ N ro~ m~ b~ N S-1 W f-1 U ?'i N ~ O ll a m ? a~?~~ ~ ro ?' a ro? a~i.?u~o~o~~~ aoa +~ saoa~ Nm 3~i a~ O U+I y~I N N 0 A Ha a~iro~mv?am 'o H roa~rn -roa~~ v N~ 3~oC~7v~m ~ LI ?.Qi U ~ ~ ~ N ~ Ul O N S%i t~C ,~ .~ ~ C N U fx P. +~ +1 +1 ???I ?.i W a~ ~ ro w >.~o sa o +~ ro +.~ ?~1 m 3 ?a m ?.~ o+~s~o xNa~a q D ?.~ a a~ ~ ~DH ~O>r o+lvro h Uri ?.i N b Sa ? sa ro o ~ ?~ >?, a~ AAaoa v 1 N U q O ?u a l a~ a ~ rowaa'~ia s~ N s+ a 3 aUi N Ow N W 7 H ~ ~ a >?+ m ?.~ ro U dNbwro ?~ CT A ??1 y U .~ ?.i Gl rl S?1 ~ rl b~ ~ 3-I v r-1 ?.?1 ~, u1 0 ~ ~ ~ w w H q 0 0 I!1 W ~ ~ M q U o w ?a ~+ v ?.a ~ do?'?na'~i a?N ~~~wN ~~ ~aNi~a~?a E ?.i Gl ?.i .C N rl N U 11 b+ uia? ~>?+ro>.~ m ?.?1 f1. r+ r-1 O %.~0-'roiq U W w +~ U ?.i G1 U N .~{ U N .--I ro U .,.1 {J N ?.i r-I rl 01 Q N a o w ?3 O ~ ro ~ ~ x ~ m Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 0o i o W Nrltd~O lJ ?d G) ?rl 11 U x w 11?.~?v p m o>,~?a~o u' ua,o~`~~ ?~ u 1+ ?rl td (: ?rl P. GIN 11 .C ~ ~ j ?~ ~ w ~ ~ .~ai u ~O oUA V~ ?~ va v u D, I.i ?~ H ~ m >nl W :7 w v ~a~gouoo~o x '? a~ w m ?~ ,~ o ~ o ?a ~ ?~ x v a1 AG v.l ~gvoq~ xi .[ U~~~4aq ~ H 1111bWOtU ?~o~omx 'a ;~ Q 00 v1 as ~ oA y, A to S." Gl Gl ?rl Cl A fA u a~ a~ ?v 9 ~ u N a~i v ? a aoi ~ w ?a~i mu a"i N OOrI OD W N 11 N ~-1 a~a~~?a~ a vi OH H U 4-1 N b ~ 11 ~ ~ O ~ ~ 3 a~'i u a? ~ 0 0o wo a~i x o x a ~ ,~ .~ o `nu o?~ ~ ~ ~w u ~u aagi6~~ 6 a"io ~ ?a 3 ~UHa ~ ~,~ ~ cif W 6~i ~ ?rl m ~ a- m Gl ~ t/1 H 41 d W GI H 1x1 6! r~l ~ ?rl ~ ~ ~~P+ d~?~ V ~ Hkr ~ ~~ ?~ ~ UH O p ?.a U C9 a~ u cd rl ,eL ?rl N .-1 11 '.trn W W 11 U U rl V U 1.1 'J r-i N U ~ N ~ 11 1?~ 11 11 ?~ 1-~ IJ 1.1 N ?v o~+~a~a?+~u~gd ~t . C C!1 Pw cd H (d 111 F3 d' N H N i~?+ ?r~l ~ H 1x1 1x1 H U ~ b P4 U p!. D4 dG aG ~ PG Coo 3~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 b ro i i ~ i a~ ro a ?.~ . a ~+ ro r~l N Gl H Q -+ Ol O v1 +~ ?ri ~r ~ H U ?.?I a a av .C W ~ ?rl.I?~ " -~OroN N ~ v ~ >~~ ~ ro ~o?~~+a x Dr +~ O ro?1 E E ~ 0+ G:U H N ?.~ H ~ ~ .-i b U N .-1 A b fA ~ ~ +~ ro U O ?.~ Dr f. A A N w H~ N?~Oa1W w ro ~ o ?.~ ~+?.~ ro O ~ N,~ roHw y ro wq?V~ A 2 q ~ N ~ ~ U ~ Ol 0+ N N O l~ i~ f. N S?1 ri N Cl O a 5oa3io?> aNi v va~>~con w N ?rl ~ 1 Y-1 O ?~ o ?.a +~ ~ 1.1 N ?rl 3-t -~ N ~ a~ d N O +~ H D N a A U 3+ ro ~ ?.a w a~ N q N .u o a .-~ ro ?~ ro ~-1 +~ N 7 ?~?~ ~ a ~ ?o_ ~ a~i ?~ a~i ~ ~ ~ A .H?rOR ~ro N ~qro ~ro Gl N A N U w N ro ro Gl N O ~ N ~ ?a ~ ~ ~ ~ +~ .-?I O N N ~ r-I LI ?.I rl ?.?1 .C N N O b U M ?4~ ~ ~ N 3?a N 'b N IT O~ p1 N N N ,~ !~1 b N ~,ro v U ?~ A -1 '-I 3.1 7 ri ~ rorob~ o+U v a~'ro~v a~ x -~ o~ ~~ M 3 r+ >r N ~-1 ~+ z 0 ~ wx N O ~+ ?~+ o x ~. ~ a~ +~ w tn?~+ 3 +~ O N N N +~ ~ s+ z a~ +~ ~ v N ~ a o ~ ~O GEIU?rl ~ Ny~Na?~~i ~w ro a~i ~~ b ~ ~ ~ ~~ caacaaUw Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N 1 - N O b ?, v~ uOirn.N ~ v; N+~x+~N~ro o a+o~v~~oa,v+~+ai 3 U H C ?u o ?~ b~ N U ro ua?~'?'a~ON?~roa v .?~ v ?., N H ~ a ~+~+ ro~ ~ v u ~ ro N ?rl W g N A N N 3-I r-I ?~ ~ ~ ?'~ ?N o~?o a w? w v rl X ?~i r-I ~?.I N O A N rl N ro r-1 H 'O U W ~ ro (. U1 N 1.i ro H O tT ~ ?ri +~ N 1a +~ G N b N ?.?I N H a+.~ roa~q ro+.~~.cav U .. U~ ~aroi? o'~N ~wN vi ro b~N N~ to NO 7 roH ~ ?~ ~ v a~ ro a1 N -~ w u~ ?.a ro o +~ N ri ~~ N N N v Sd tr~ a ?.~ ro N a~ ro ~ a~ ?.?i ~ ~ q ~ N~ > W U N H O ?.~ ?i A +~ O) ~ O O~ ri H U N Sa A ?'i ~ 3 a~ ~ o +~~?~ ro a> N N ~ b ?? O +~ ~ ?rl H ?.1 +~ 3 ~ FI ~ N +~ Gl v a ro w er ~ ?.~ a~ ~ x~ a .u N 7 U~ O 3~1 'L3 +~ N +~ +i N U }.i b~ .~ Cl+ U r-I ro N N N ~ ro ~ o q ~+ s~ ro ~. to a~ ,~ O Sa +~ ~ G) q W O +~ q b~ O 1.1 N U c~NV~.oo3Nrow.u a m b cn ~ b~ ~ ~ ~ ~ ~ ~ ~ ~~ H U Nv i S N a~ N a W N N U ro N U LL +~ +~ -N O a~ ro o aNi~ ?1 ~ am N tq N ri N 3 N Gl ~ 3 G1o ~+~ via?a roma mm H ~x~ 7 U i-i ? ,~ .C N .C Uvi3 NwH.gE ~ W S-I U N N W Gl N OW Na O~ ~ HH O O O ~ UUU' a a ~, ro q U ?ri E r-1 U ~ O +~ O U N W a?aa~io~ ~ w ?.a s~ to W O N J~ ~O a Ns~aoro +~OxU ro Nv ?a~id+ U ?.I Gl .'7 b~ N N U '^I N ?.01 ~ ?~ ~q~~0 ~+ ro o?a~~ ~ ~ ?ar+ U ro qy., UUO~?~ H U N O H N b~ cOn ?~' b a s~ ~ a~i~-+ ~ ro ?3 q O C ~ O U'O U wo a+~ro~W ?? ro N ~ f-I ~ O mz a~>va 3?a ?.i ?.i O U O O Gl N I, ?.O?I dl U ca ro ~ N ?., Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 HzFwaaH~wzuw Uo~acnwcn v Sa W 1-I ~ ~ 3 ~ a~ i O q ~ w ~ i o ? E o N ro ~ ~ +~ N ~ C b~ N .C Cn C g N C q U ro ro~ 7 W~ +i ro ?.i ro O ?.i N w ro 0 A (.1 ro ?.1 N rl ~ W ~ U ?.a ?~ U 11 H~ .i +~ O O O ro ~+ ~OF, H g~ N U U N Gl ~-N-I O b ~ Cam,' ro O~ ?.i g W C ro ?.-1 q O~ ~~ 3.~w~L~U?.~ .uro c O N U O O G 3~ ?-~ 3~ q U b+++ ~+?~ c~ab+~vro -+ro q N U OO?~+~A Ob N?.I 00 ~ a3 ro ?.~gs~uw ~ N N U~ N N Gl w ,C .~ r-1 1?I O .tr, v Ns~?ao ~rov .~ 'b ?rl N +~ ~I N CT N O +~ 7 +~ ~, rl N w N 'd O N ~ C q roNN ~~.~+rororov?,C?~N FC ~1~ N ro ro rob Q+~ ~+i ~ ~ ~r U?H~ uao`~~ro~?aa'~iro .A ?.i O ?r{ ?.i N N Gl O D U b b N N ?.i 1~ S?i N ~ O ?ri G1 NroW aa+~NUroSa~E N q N ?.I N ?.?1 U N T O N b~ +~ N N E U +~ N N .-1 a'LS +~ ~ ro N ~ Q N~ ro a f. N ?rI S?~ v o koao~>aro~,o++ s~ U W U ?,.~ N ro W N~ N b~ N 0+ ~ N~b~gb~A~~A ?! Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ~ ro~+aro ?.i I U d O U r-I o ?~I ro ?~I 00 ~ .-I ~- .?~ rOO-I ?-~U~ANa ~ N O O tr+ u1 +~ ,~ +~ w~?a~+l?r-I N G1 U O N C. ~~aa.~ro ro ?.~I ro ro v aW'-IUro~ oroa w >a a zr?~I ro ~ a o o ~+ .-+ O ?.~I r?I r-I ~ N U +! O Gl .-. +I U.C W N O ~ q U q i-I ?.i N C) O ~ ?.i ~ N D w rA r-I R Gl v a w ?.~ a~ .~ ~a~ o ro v rn i~'~~~va"i~ O N to ~ ~ .A U 'd~v~AOa?.I rouNOO~?.i.1 ~+ a sa s~ ?.a x o ~v,roa~lu,a N 1 ~a~ ~ro ro~ ~ro N ~ W ~ ~ ~ U?.~ ~ ro o~ro ?~ O ~ q ro ~ W ~ ?.i +I O aC 1~ '-I W ?.~ ?rl 1~ T3 ?'1 C) ??i 1.1 +~ ?rl q .V q a~i ~~ S ro ro ?.i b ?.i U .-i 0~~3 rnUa~aro y O W i~ Gl I N U N 3?I U O ?-i wa~a~c ?., y a rn x v a+.u a~wmro~+>~a x~dUiU'-IAUO1 >~ ro ?.~ ?~ v ~ sa ~~~oa~?o U ?~ a?.~ .r~ V Gl ?.i 'O U +~oa~moo a?.+ a sa ro a~'iaW?r?loaro~ 3a CT ?~ 1~ ?.a ro ?.I ro O ?'I U ro +I i-I +~ .?-I N ?'i Sa ?.i Gl QI ?.~1 asa~opl v~ >+~~ wkw wo ~il ~?~ ?.~I o UU N ~i W ro ??~ ~o U ~ ul ??i fA er LI 11 ~ O ?.I E .-I v1 ~ ~d ~ u1 O ?rl x ~wa.~-~o aria o3 3 ~ ~ b a~ .rouaoiroz I'~ro~ ?.~ +~ ++ ro SUS-i11~ ~~R~A~ O N v O N a~ax~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N tT 1 ~! ~ O ~ O ?.a y ro oN +~ tr~Ob ~ N~?.iC ro ?.~a~roroai~ .q s~ - U O N 1~ N q roHaNia~o U~?rl ~ Nw a~iro~ox~ ..dl' S W N N 3 ~~ ~ m N U N1+ ?roq~ro ~30~-+~wU ~ ~ 1-i U ro .-?I ~ w O N?~+ a ro N ?w ?"o troro ~ ~r+ a?.1 ro v ~ ~?a~:~ +~ N S.i ~ ro ~ ?.i oUroU,c?.+ ~+o3NN+~N O N +~ N U a~i ?" ~ - aNi o a~i N q O +i ~ U ?~ sro3a++Nr1 --~Niq+~U7+~N v?oo~+~a a+~auNro?.~ 1 ~ C ro N O N O 1.1 N ??+ U ro ?rl 1 r.+ ?rl ? b+ CL'd C U ?~+ - U ?~+ O +~ S.i ri ~ ?.I 3 O N N +1 a +ILL'dON ~D rl U W ro O O ro NON U U U q rl tr~ r-1 N O ?--1 ?rl ?rl N H .C R3 ii nsro+3a~oro ~ NwUk3N`N ~ ~?.O~ N Nb ai ~ N 1-Oi tr+ N 3.1 N N N U -.~?I ~ ?~-i?Oi k o3'roOa ? ro ~ ro Nro aNi~~ b rn -.~ia~iroro~ ??0 0 ro a U ~ rl fa O OOSaN H k x ?~+ ?d N ?r?1 N a N va, ~roa~om~v A W ~ ~ tr+ ~ p, .~'i U b N ~ - sa r-1 q N N ?.1 ?.?i .C ~ ro N +1 N ~rNNNa?~+a+ q N N ?iN?'i U?.I N t?~ > r-1 N +~ N N r-1 N v can rt y a~a +1 aNi +? a Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 ?t3 ?? .k a ro ro ~ O U1 ro U b~ Sa eb o ~ o ~ ~ o as A v~ UI ?,~ ?.I W H W +~ PO U ororoa~ ?? U N ~ .~ ~ UI ~ 0 U .~ a~ ~H rl '~ O ro a ~ ?~ ~ U o O U ~ w W w ?~ O ?~ S?I rl O +~ U N ~ LI v ro 3 ~ ?rl N +~ s~ z N 1.1 ?i fA ..vro+~~ r-I N UI r-I b r-I O A 3-i r-I ro rl x v ?~ o ?~ ~~ as ~ x ~ ~ roro ro VI ~I N O N v?ao~rowro ~roUV?ia~ ~ ro~ a~~ hc~aawa .. ~ N ?~ C +~ ro o ~ ~ ?.a ~ v +~ a b ro A -~ O rl ~1 U ~ N N N Oa - USa w .COtn ~ 7 O U1 ?.I O l~ 1! N 7 ~v LI ?~ N G W `~>ro?a >~ ~ xoav ?~ro ?~ U ro ~ rn a~ D ,~ ~ U ri N N '~ N 1~ O G N N~ ?.?1 3 ~?~?~ N ~ U w ro~ m .c a W O U N+~ b C7 +~ C N N D4 A O ~ ~ N +i W o +~ ?~ o s~ ro ~w +~~CU oa o ro ~ N+~ ob U a~ a H 1~ b''?rl U1 ?rl N 1] U ro A~ ~ .~A v o a ~ a~ Ei .u v N O N U~ A ?? C ~ N N O N N ~ ~~rov z3 a M N O U O~ c co v o .~ U ~ ~ N .-I N ro H U N ?ri ~] Sa +~ O?~ ~3 N rl 1~ Ol s~ N o a~ ?~+ z v a~a rnN .. b o ? ' '~ _ ~ w a iae .--1 ~1 O r-I ~ U Ua+rU ~ 3 ?~ N ~ A N a+~vN a W U 3-I .-1 U1 W o ro a+ ~+ >,N aa~u 3 x?~Q$az Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 v 1 U ~ I ?rl N ~ U1 N Sa !A Ul N U C la rt U ?rl N +~ -~ N~rox N N N N ro q (0 q~+1 N C v +~ a >?+ v m .~ sr +~ a ro m a~ ro ?.~ v .s~ s~ v ro ro U H ?.?1 a ro ? +~ ?r., N o >a A al H r-I >. N al >~ q O w ~ro ro ~N H Nq >aa~v>oro N t-I s?, cn a ?~ H N [n ~ ?.1 0 ?~ .~ o w rr g v ro 00 +l o ro rl u o a s~ a~ o +~ U ~+ ro '~ 3 ~v~v ~ a w H(IS .ca ~o rlo x s?+o x?~ a~ ~ ro +~ N N N o a l .~ UxH+++~ vro H ~ acv N,k - 1 ro ? N ~ ~ .k ~ ,'~ ?? ~ N ~ A N rl N U G VI N H N f0 D N tr+ >t ?rl N N t0 ?? N ?rl O ?~ k~ +I N W N S-I ~ ty U QI N +~ Ya A ?r1 U ?r1 N W 1.1 > U U U N ?rl +i f?I ???1 3-I r?1 rl ~1 N N H ~ S-I C.? N N y ~ O ~ r-1 m oa~ro o?~ ~ o ~vv?.+o+~ zoo w ~w~ a3 H ~ cna~roroUa~ --Ua w a x 1?I H U s~ CL r?I H J~ N o a a, N ?~ O N ?ri M ~ ~ r?1 10 mod' .-1 ?rl O~ N N a >a vro rl > ?~ m ?~ a cas?+ oao ?.a w ~ ++ a~ ?~1 v b .u rl ~lartro r?1 fa +i U ?.i Gl V1 .. ,~ 'd ~ O O ~ H U U ?rl N N 3 ~ ?,.1 ?~ S.I U U rl O O O rlNbro tlf N S-i Sa .~ vww N W LI O ~ f~ ro>abro ~amcn a O H W W v o +~ ~ ro N +~ N O N ,~ ~ E b >~ V ~ ~?~ C N N O +I ?.I Gl 1~ D O b ,~ O O ?rl r-I d N +r ?.i C7 N O) W {.~ +~ LI P: ?.IV ro ro v a~ a+~ a >a ~ ~~ ro -1 ~ >~ ~aNi rn~~ ~ N U ?~ N O O i~ 1.01 ~ r-I N ?rl ~ O ?~ a ?.~ a~ N q s~w N+~ O O {~ N~ 0 0 .>~ 1~ Sa U ~ ?ri 1?I ~ C N roOONroN O O b~ U +~ b S~1 +~ ~ ??~ O Ul U ro ri t11 7 ro> O A W r-1 U O ~ O ?n b O N C U b A +,v ro ~a~ a~ a rnro N a N U ?~1 ~ ro U v v ~ ~ ~ O N to O 1~ N rl ?.~ ~ .V ~ H ?,., ?.~ v a~ v q>~ ro ?.I N v ++ > ~ ~ ro N +~ o >'+ ~ >?+ ~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ro v a I ~ q ~, ro ?.I " ro ~ ~ v v, a +~ a sa ~ N o a +~ N ro ? ro ro ~+ >,+ >~ o a I >?+ fa a~ .I o ~ ?? a~~ vo ro a~>.?o>.~ o s~ Nvroro.aNa~F v+~u o ?.~ v o s~++N b oar N x a +~ a a~ ?~+ ac a ?.~ N o N ~: J-ItUN qwN roEa-o~ o a+ tr o o ~ ~ a~ 01 ?.i CJ C N d? b N u .C ?~, ~ r?I ~ ?.?I .k a s+ w ro a H a rnrl ro.~ o qw+~ o o~ G rl a+ ~ a~ o ?.+ o b o w +~ ro ?.~ ro ?r?I +? o0 O I +~?ONANNOW +i }1rn .-I ao q ro ?.I b x w w 0~ ro o 'i1 o rl O rn c C7 .??I ?~ .-I ?.~ r-I N U1 0 O OOOW gOODGI N rn v roe' ?wm?~gro3ovro~ 3~ ?-I N b G1 ?.?i N .[ ? ro N Gl .-i b 1a q N +I?~IdroOhwt'a+~g1a N N UO3?IHAro row N Gl N a~ ?~I ~ a a a ~ s~ A ~ ~ +~ a a, ~ a v >~ ++ w ?~+ N to o~ ?.?I ?,~ w o a~ro~o.ava~Na ~ ~ o.v li b t11 W +I ?rl q +~ .-I N rl i-I U o roN ~ ++o~+ ?mro?~+ aw ~ ro rororoa~aNO?.~o~ A?t ~?~o.ai. ?baro~oro~ Nai ~ ?1?i U Gl +I ~-i ri U Cl .i.l 1?I ci :r rs+ w sa s~ v ro +.? .i N ?~i p 1~ o N aoarooa~asaa~?.~wW v ago S.I ?.I .-I N Gl ?.?i ?n ?.?I N 3 rl "~ ?.i Gl N U O O O O W ?.?I E N O N ?.i N N QO 1`I N v AoAN+INaaro3?~I>ro a ro U ro 0 a .,~ A b a ro~ 3 ~ ro N ~l o ? ~W N 3-I +~ O +~ h ???I ~ N r?i N y.~ O N ~ N O ~ O > .r~ .r~ IWD~ Uro1 I-I N ? N G l ro a++x~ W U N ~ +i I?I H N b O ~ H b ~W O O C W arovv xm~a~ H A H ~ H ~ro (~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 O +'~i ~ aiA O ro.?-~ b ro N O b O O H VUI ~ U U b S~?1 ~ Q. ro +~+~.~ b?~> arow a~i a N N >a N O sr ?? sa . ~ ~ ~ C~ +~ O W E O b W ~~ ?,, ONOaO?~N~ ~ aJ ~ >O~n .~OOro~. ro o a rooro~~oN3-?+ ~ O O LI U U U [*~ SO.1 ~-~i 0 A A +~o~++cNroO O ~o O 3 q~ tr~ d+ y O- y q ~ N O~ ~-~I ~ ?ri 7r W O U O U Sa ?.I O ?rl ri rl 1a N ?rl N O a ~ ++ ~~ ro a?~x O ~ o Oo a ro O a o sa++ la O v aU??~W+~roUaw a m D4I N,,I U N ~N LL ~ O O rl U Oro q ~ S-i O ?rl O W ???I +~ ~ U) O U O 1+ A ~n +~ tr~ ?~ cn w .-~ ,-~ s~ro ~ro ?rl b ?,.1 U In E W OC3?~1 G. ~ O 'A ro 0 -~i N 7r ~ r-I OHO b~ U U1 ?rl +~ ~ W b x s+3roo ?~1 O U w+~~UO q O~ ?~ fOi HE GEOEI W o ~ ~ wwb ?+1 0~0 }~ VI O W 1 A N S?1 NO ~ Oa~oOgp, A ?~ ~ '~-1roa~iy~ v a cq ~,q F ~ ai w z O U W N ~ .C d a4 ao ~~a o H H O ~ H z o ~ 0 Ob Uro a -+ Oo -~ ~ U O t!1 U ~ 3 ~m O+~ m ~ OUOroa~i A E ~+ EWb O b O 'C G31 3.1 ~ ~ N U U ~ ~O O ~ ?.Niroo'~imoi aNi U E?O1 O >.~ w 0 U w o rl ro ~ >~ 00 o ?~+ ~~ U ro ~o cn s~ o ~ ~ 00 0 O +> >r d' NOx S-i H U O ~ ~ ++b+~x W O C U roroOo a ac ~+ ~ >~ rA O U W O ?~,xroox D E ~ ro o ~ A , ~ +~ a >aa?~o +~ o ?~ N +~ N U Q O G U O ~ ?.?I >~ ~ ?~I x ?'i -rl C O Ica ~a Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N b N w Ul ~ m N q ~ O r-1 1 tr N 1.1 ?ri ~r N S~ ?rl ?ri +~ +~ U O U +~ U ro N +~ N N ?r?I U ?ri ?r?I ?r?I a'O sa U N ~ ?ir-I ~ W q +1 ~ ?r?I N 1-1 E N O N O O ~ ?~ N ro +~ r-I N G, N a .~ ro a ra a ~, N N O tr'?N O O ?+~ ~ ?~N N O 0.~ 1~ ~ U U a?ra N rl ro ?rl U O ?r?I N ?.~ }-i ?r?I ro b v ro +~ ro +~ +~ G N U >r ro 0 +1 ao ~>,N3roDaim+~~N v v?ra aUV N-.~ aHOV x tr~ +~ w ?~ ~ tT a) +~ ~ ro ro N ~ ?~1 ro r+ ?~1 ~ ?,~ ro o ro ro ~ '~ ? o ~ ?~1 try ?r? a ? +~ U ~ ~+ r~s~ Uc~ aov?voN>., ro vas s~ xa~saro ONNN ??$ +~++ a~~w?r?o ~~o>a~v rz H H ?rl ?ri N F U O N +1 U ?ri ~ ~ a 0 r--I Sa ? ,1] U ?r?I W >?1 ~ r-I r??I ro ? 'tr - r-i 7 N N r-I C U +~ b ?rl ro LI N to ~ o U N v +~ O ?~+ N ?~+ s~ k ro >a tT+l ?ro +~va~r~ a N+~roa~w ? 0O p C?' N U U 'O N N h ?.~ O U ?r?I O ?~ C b al w ~ ~ +~ ~ .-1 !x U) ?ri r-I ~I Uro f~ N O ?r?I ~-1 H (-.' ~r .A x+~ vroa roN U ro sa ?r?v H N ~~ N N ~.+~ U ro pq .s~ a~ +~oaUVVUU?r?a ?N b H ~ ?~ o a ~ rnN ro+~ ~++ a~ v ro N +~ ?~1 a~ tr? ro ?.+ a ro ?~1 ~ N +~ a~ m ? ~. ro +?~ rr?ra a~ b ~ ~+ a~ N ~ +.1 N N e ro ?ri ~ r-I ?r?1 U ro N N U ~+ D +~ H .s~ 3 0 O ?rt U N v ~ >avaraUONro~zssaU v r-1 o ~xva~var~aa~a~++~ s~ a~ U N+~ ~+~+~x ro rob A N N a N >~ O+~w.uw~G ~a~?cno saw ->,~ roasoN?~ ri N SaW NN rl L1 N a b ?rl ?~ h~ C]M'J.a E ro . tr, uo osav +~ W U ?~ U ~ S?a O N N O Sa ~ ?ri +~ ?ri O U ?ri ~ q ?ri N ~ o }~ ~ ~ N ro rori or-+o a~ roor-+~ >aa~Ov~ix ~ro~~~~ v N ~ o v o+~ N N O w> a G ?ri U N ~ ?r?I 1-1 N N O roUria ~ q ~ roa~ro~ ~?r~ ~ ro ro r-1 0 ~ a~ wax?, N H N r-I ~~a ~ v ro ~ ro m w w x ~ 3 w Nb o ~n ~ ro Ne as?a~ ?.~ w q ~ ?.~ W 1~ ro w aN o >?+ .~ N U N ~ k 7 ~v~ vb ro ~b N N ~m> r-I U ~ a ?.1 ?rl Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N 41 N x ~ +~ O N U 7r O U ~ N ?ri ?.I ~ b .[ O ~ +~ a ro ,-?a w cn 0o O U 1 ?r?I ~ E ~ ~ rn ~ N O r-I N h +~ ~ ~ roao +~ O ?,~ ?~ cn ~ ~~ b U U LI ?rUl N rU-1 ?n JU-~ Nwo~ a ro U N ro v U .[ ~ N O ro +~ N ,~ ~, ~.a,~ A w > w O b Sa q N N N ~ 1~ ~ G +~ U N ro ~~? a aNi w 3 ~ ro a ro A O Sa J-~ C cOn N A A O N N ~'O ~ .. r~ w ~ ro ?.~ ui wl o~w o G~ +~wU ?a~cv v1 >r +~ F ~ N 1J S-1 ~ M s~ +~ ~ ?.~ ro rr a vro,~NNv ~?.~ o s+ ~.aro UI U h N A ?rl b a con ~o ~ C OFCtADd'3U 1 N ~ ~ ~ U 'U ~ ro ?~ v v ~ ~ ~ b w ro w N N ro ~, o w 2 ~ +~ N N N ?.~ N N 1~ b a~~s~ro N U N ?ri ?ri H N CT U ~ 3 b~N -+ ~ wbval0~ A ?.?I ~ O -~ ?rl v N ~ a~ ?.+ a ~ ro a .v a orouroro.~ m ,~ s~ a o ro x ~ N 1~ U ?rl ~ U O,Corl N ~ U ~ H ao .~ a ?ri U1 J~ 01 ~ N ~-i a~ rr x ~ a ~ +~ ~ +~ N w a~ +~ a ~ +~+ N O N O~ 3 >, +~ ?~ +~ U U r?i A U ?.a a w b ro ?? y N N Gl +~ N~ N N E .G 41 U W U of ~ ~?.~~ ~w a ~ t!~ O O ~ ~ b~~rl+~ ro 1-i +~ ro ~ U ~ is ~ O A ro 0 u? N N+~w ~ ~ A C O m ro ~ ~+ ~ x s~ a~ +~ O ?1~ ?.I ro ? N ~ N ?.?1 ~" N H N ~w ros?a ?ao as ~U Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 O 1?+ O N ?~ ~ 3 ?~ uro o o ~ ~ ~3o a~ ?~ U UIbbW b m a~i~ ~ ~ ~ ro ~ 3 3 ~ ~ ?~ ~roxrt~~ ~ ?~ O ~ 3+i +~ 3?a U ?rl N ~?+ +~ aJ 'O +1 ~ O w ~~>,wroN ?> v a>>.a~ a~i+?~ o v o ro ro ~~ ro Gt w 3 +~ aka ai~~vaui b N -a O .-1 uiro ca~rt.~oN N ?.I O ~ f-I ?'1 ?rl ~ ~ ~~~~rom~ v w ro?~~i~.~w?~i .-~ U N 'b Abvvro.'~i Pq N F r7 H r-1 W v ~ ? a ~ a 11 UI ?.?1 N H N N i-~1 ~ U ~a~~ms~ a~a+~aro Ulr?CAW~ N A~ ~ Q y ~ ~ ~ a ~+~+ > a~i ~ ?? u o ~ m 3 N a o 2 U ?rl ~ ~ .~ td ~ p mrob ~ o91ok o ro~ ~; ro ~?' a~ ,ate C G~ I N 41 G ~ HH p~ ALL +~ ~o ~ .~ ni a~i a~ v ro .u ~ U ~ H ?H ~~O vii N.~ roz b ~ N ~ S?I PO N ~ fA '?I O N ?ri ?~ ~ ~d ~ G) fQf1 U W i1 ?,i .C r-1 U Ul N ~ ~ p.N ~S1?~ ..y v9,,~~N~ a~ ~ a- .a ~ x r+ ~ ~ O ~ ~ +~ ~ U J~?~V~t~ +~ qr vo ~o 0 Hrn ro a ~ ro .~, .~ +~ ~ a~ o a~ w ~ ?a ~~ v~ m U +~ O N M N r-i d-~ v N b+ H ?~ ~ U~ ~ +~ ~ .. roH U N .Lo1 ,,[ ~ w r~ b U O X Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ~ a~ N O U +~+ a~ii vo ~~ b U CT ??i ~ ro ?.1 v .~, u o rox .~, A Iw O ~ ro o~ ro a~i a~~ ro ~w ~~Ma~~ ~ ?oro?~?i>.~vc?1n ro tr~ q~tTUO+~N +~ U ro ~ fr LLr+ .~ '~O ~. ~ N .C N y N N U 7~ ro ?'i W' r?I ~ ~ U v> o1a .q roA 3 ?? ~+a v~ ~ro No ~N?.a ro o acH v~ UNaa ~++ x x~.ro U J~ U w N ?~ ,~ N q N~ O Ao o -N~OOHNA ~ roxH.~w +~L] ~NUNDOfaU ro O oro A~as?+o~'o~ ~ .ten "~?i ao ~r~i ~ ? v a~i b ao a~ N tnro ro ~u ro ro i ~ y~ a~i?.~~mvoroua~ a~i v la > +~ ~ N w ~ N U. N N ~ urooa s~~a v ~ O ~ S-i ?r?1 N +~ 0 0 Ul ~1 d U U1 U~ N H w U tT W fA Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ,, ~ -.?~ a ~ 1! ?rl U N ~ +~ w +~ U O ~ ~--~ N ~ N U ~- O N U [ to . ~- to ? ?.1 ?i A .-1 U ? ? N .-1 N a 1~i o ~ ro ~U a i N S?a C. ~ A O N a, -.a v x N ro NI U ~ ?~ ~ ro ro~ a v ~ v ? H .~ ?> tr~ N N ~A OU+i Q O +~ tr~ q 0?~ Nw ~ +~ ~ a ro +~ A ?.a V1.~ t!1 N G f11 U N N ?rl ~ O ro l~ N ~ rl N ?ri N ro ?? ~ ?.I ?rl ?rl N N 1~ N N ~ rtf ?r?I ~ ~ ~ N U 1?a .[ ~ r-1 U N N o ~o~m?~ s~ a~ U w U rowro a m a~ U C ~. ~ N+~N ?ri ?,.{ N U NOD !!~ }-~ O~ N ~ ~ r0 ?,i C U G O ?ri ~ 1~ ~~ ~ O ?rl ~ ~ U) r?~1 O ?rl 1?a N O +~ .[ va~a o~m tr~ow?~g ~~+ox ?~ a N~y, N N ~ S r0 .~ RS ~. S: tT ?.?I +~ ~1 C'. ro U Sa N ?rl "i O i0 +~ r-I w a~~, rowva~a~ ARCA3rA Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Uo~aozwzH HzHwaaHowzuw uoaamwv, N Vl ?.1 W N r0 t0 Sa O +~ N O ro -~ - ~ v a?~x ro v uoi.~ v?~ ro v ~b td Gl U O b ~?rl N W ~ O s~ ~~ ?.~ +i ~ o U U N ~O~q?. I+~U O O ?~ pa U U N 1Oq ~ UUl a .-, w a v w ~-+ ro~ a? ??roro~aoi??ro N ?~ ?~roo U q +~ aaro rn?`~ a ?.?i N ~ ~oa~i N 1~ rl aro~ H W ?rl t-I O roa o a U N +~ ?.~ o ro o D v N Ul ?~ao N U ?L~ O fn ~" ?.i 01 N N r-I ?rl 1.1 t0 ~o U N b C ~ cA D ?.~ O o ?a C 3 ~~N ro~o O t0 ?.I +~ U W ~ ~ v, ro ?.~ v ?.~ ro+~ ~A +~I~~+~U L1H ~ vcnw a ~ a ro ro .~ O N W O O~ ?.i U ~n+~o a+~ oh ~~ ro ro U -r l ~ U~ fA ro E O FO b U O ?.~ ?rl N ri i-I W h O O f,?i ,~ ~ rtf ?.i ?.I b+ ~n.c v v, ~ a ro.~ ~ w~voi~3 c?~a?ucroia~ O 3 N1~W ?~ O rl N N N S?1 ro ~ a~~ 7r U O O) U la la U ?.?I N a?/~ ? ~ a~ o o .~ ?~ l.i ~ U ? N b N v 3?a CL N S-i ovro?~ A W m Q w ro b U O ~ ~ ?'i N a CL U s~ ?.~ v ?~ N ~ U A R; H r?I S.1 ~ U ;] N ?m~aa ~Nas~a+ ~ .-~ .~ ?.i N v N ooa~?~a s~ Pi F. U1L1H a ~~ O +~ U O vo vl U C1+ q N t6 LI ~ N +~ roro UW N ro ro -~ ro LI r-1 .???1 ~ ~ N +~roUa+oaro N U ~ O l1 ?.i N ?.?i ?.?I ?.i .-1 N b A O ?.~ +~ N Q U Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 a~ ~ oro ?ri N ~ 'Jt N P'1 N }~ ~ O ~ ?.d ?'1 O h N I.1 O~ YI A ~ v ro ro ~ ~ ?., q ?.I +~ O -.i q ?.?l f?I ?.~~ ~ >~ w N G1 N ??-I U +~ > .-I ro ?~ ro w+i RU xo~n~ .urowa; rza~aror+ ~ >a +~ d+ +i ++ O cn o N taw ,~ v ro ?.~ ~ G a.-I ~n m sa a~ ro .~ o woU~na N U I TS q .?i d N 'O Gl N CT rl +~ N Gl .'~???I S-I C. '~ S-I ~~Iig~IroUro ~ ~ 'd ??U?I b N m q C tr+ x w +~ a, U U R Gl C N I O Sa v ~ r?I N ?.?I b~ O N W U N b ?.~ q ???I 11 .1.1 R yc.~NroaO~ ~a~1q~CU3?~m 11 ?.I H ?.i ?.i lT N ?.i la O .~ U UH OAO.O?-I sa +~ ?.?I ~ +~ w a ~a~imaNirow>~a aHw~wow~ 3 ?'~.IaroNaro o o U ro ~a~~.+oaui H i3Nam w--~ iga ? ro ~ ?r?, a z ~ w'ro wu ~ ~ ~~a~ama~ w rooNwH~o ?.I +~ ?.~ U c9 >~ 3 x~b ?.lo O O b ?~ Gl U o ~owo~ro ~ ~ U ro~ A H N N ~ oi> q ~q O a~ a w .~ ~, +i +~ .A -.~ r?I a+ sa ro ro O t~A N -.?I ?.1 ? ?d ro O~ a H H~ h ~r a N Gl $ r-I i1 N 1?I b ro U .C m N+i ro ?.I x N N ?.?I ~?] N ?~I ?.I a b ~ c~ A O ~+ vx?~+x -, N ~+ . ~ a+ o x ~ ?~+ >`I q N ?rl H U N Y?I ~ z N ?.~I ro +, a ?~I ro a~ m ?"i~~ro~?i o ~ ? o 3 a~ ~+ 3 rl as o a E U H a N ri N ro ?.d b G! Sa N ~ N YOGI ~ ~ a ~ ~' >?+ o a N~ o >a b+ aoi m~ ~ ?~' ro A, ~ ~~ O a~ m+~ ?.I U Gl U W ?.Oi Im?I 101 O O +I Nom 3o0?~O+ Gl ?~?i ~r ?rl +r N N ~ S~-i H H ~ q ~ p, ai w ?.~ o o = o q.-~ahO-~+UNb ~ N H .tll +I f.l O ~ aoi aQ ro~~ o+ro H ~r m ?rl J~ ?rl q ~ _ .n ?.+ E o .a ro a~ U ?,.I m ax h >~ 0 .-I >+ ro q 3 ?.i d N ~ z O~ C) ?~i .-I ?,.I is W O 'O U O o O +~ .~ +~ W >r N to O ?wi 4Ui fx-i a! N m+~ 0 t~ONNN~ p r-I > ,C 3 b rl ?.~ d-I N rooo~z b 3?iUO~ ro~ w w ro +~ N >?I ~n o h ??~ a~ o ~'aroiox~a3i aahH~z Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N b~ x U I ~ 1a O ~ a~ o ?.~ ro N a~ U ,~ A x a~ ?~ x N . ?.a .u ro ro N N ro +~ x ~ v~ ~ a ~ O ~ b N A 3 ? ? C U ~ ~ ~ + i .N w o iro ~a --?% ?~+ a o a U a~ rl ~ ~ U ~ ~ ~ rl Val N N N N O ???I tS ~ r-1 ro N - a a~ v ro?~ a~ ?~+ N O ro H ?ri N N~ C" ro N ~' N `~ o ~ b iarorn roa?. ?.I U N r?i f. H ,~ r-I q ?ri J-~ ?.~ y7 ro ???I c E U ro r-I ~ z o aroi o a~i o ?.~~ b~ s~ a s+ ?~I N +~ = O +~ o ~ +~ +~ ? o ro a +~ ro a a~ ro v ro a w ?~+ -, U ~ o+ N ~ z +~ w o a ?~ ?.~ ~ ?.?I E ro +~ ?.~ +~ u; o ~ 1a N H 7 0 +~ S-I +~ +~ a~ >~ >~ ro a~ U m a vi b ~ ro o a ~, ro w vb A ~ O o-I w a~i ~ ~ N a rnro?~~~ro b ?? ui a~ ~ U ~ z tT ?'?I N rl a~ H ?? a~ N ro O b+ N N ?rl ~r-1 U G) 1~ ?~I sa ro ~, a N N rl N N ?~ N O ?~ ~ N >?+ >?+ v H z >?+ .v a U N .C N ~ ~ +I~ O ~ UR7NN+i N 0 o a o E o a o a a ?a ?~I >a U U H U C7 z U H w ro N -~ 3 a H x a~ a~ o U U ?.i ~ U t~ U +~ ~ ?. i ?r l r-I ~ U U o Sa ?rl !A U1 I~ N N ~O rl }~ LI ro t*1 ro ro H 'J u1 U M U ?.~ ?,.I o ?.~ rl ?.?I q b A o pro wi ~,x ~ ~ ro ~ +.~ s~ r-I a~ ~ a O ?'1 O O CT ?i U O U q ?rl +~ rao '~ cn a .~ N ~ wroo ~ o3+i tr q r?I N R O O (T ???I +~ O O Sa .~ 11ro.~ON O O U N ro PU C] to C~ 3 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 i.. 0 ro a~ oro a~i~ ~o .u o a ~ ~ ~ ~ U ?rl O O U U 4J ro O w ?.~ ?,~ GL VJ +~ 47 O N CN U~U .~ Uq ro 7 row U ?.i O U f!1 Ul O ?..{ LI ?,.~ aa,~o? ~a oar w ~ ~? N ~, v ~ ?. i a ro ~ ~ uroi o ~A O ~~ro aria a~u~ ro ? a~ ~~o a ia-~ ~ VI ~ v 3 ob x ~ z U +~ ~m aw v~ oa xro +~ N M O ~ ~ o +~ ?rl +~~o ro~u ?,~ N ro }1 N N ~ N +~ d -1 u1 q +i U ,C N 11 ~ UI ro f: q U ~ b ??.iroC mW D4 k m 0 +r U ~ o m a+ a~i ro roa~a~?~~i P?b IIaF~3 0 0 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 v ro U G a i ro U ro O ?rl 1.1 N ?rl .-I b~?~?i +1 N ?r~l r-1 v~+ro +~ a a +.~ .v o ~ H N N ro HzFwaaHc~wzUw uoxaNwcn v U r-i N N ~v ~I N N ro U N ~ U O~ tr~ ~ ~ ?rl N ?rl N +r ?rl ~ ?~ A to ~ N p +~ w ~ ?.a +~ ro ?~ +~ ?.~ a o v s~ w v +~ N v v?~ uNictdi?~~ ~???i ~ FI N N o+~ or+ N U ro N +~ ~ ~ U N a v U ro N ro N~ N tT fNl1 7 N `~ N ~ ri N C O LL ? r1 N N N ~ ro ro N +~ N ro FU ~~ ~+o -Nro ro ?~ ~ aa~~ro o.~a~a ~ ?+'ao?~~i~a~ ~ ~ ~'~vs~ ~ a ?~ uro ?~ s~ rom o ~ ro~ v ~ rn? ~ v N ? b y max ~+o?~+ ~ N aNaU ?~oro+~ro.A~ o ?~a ro ~ ~b ~ ro +~ i v o rob .c U ros~~cn ro U aNgD~xA o ?.~ ~ .u .u a cn ?~+ o 0 o ro h v +~ E x ~ a~ N ++ N q H ~ ~. ~+ v v .c ro ,A a~ ?.~ ?.a . ro ro N A S-i N N ~ ~ ~ 3 U ~ N tT >+ a ~+?~ i Rs ro v o ,a?., b H U a~ a 3 a m ~+ >. ~o ?~+ N a v H a~~ ro Ub?~ ~ ai a?-~ N U ~,?~w q a N ~ NN N N NS-1 S-IN7O0 N W N b O~ ?~?i N N U S N ?-1 r-I r-I N ~ "a? ro~ N U N ~ A U 'J ri ?ri U~ N H o ~+aa,a~ s~ o ovooro~ro s~ z U ~?.~ U?o a U U NU uw?~w a x d 0 r 3 W z +~ o ~ rn ~ U ?F1 ?ri 'b ~ S-1 , .' ro N ro U o ~o a ao N w ~c cao~ ro UI ~r'd N ~ U +~ ???I ?rl ro a?~s~o ?? ?rl N N v ~ N ?r?1 N .~ ?.i ?!~ CA .7 N r-I S?1 ?rl .C H ro ~ ~ +~ ~naroxs~ , ro U 0 0 U?.~1?~rl O~ U x o ~+ .[ cn U a .] ~o U ?~ ,~ uOi ~ O ?? ~ rno `n ro 3 .~u ?~ ~ u z ~ .i +~ OAUN N U ~ ro +~ N a ?.~ 1i N h a ?.~ ro ~r ro o .~a~a U H rorl ro q O .~ +~ ro +~ N .~ .~ E ro x -~U-I ~ N O r-1 S-I ? O A rnzo ~ o '?+ a ~+ ~ a a~ w++ tae o ?.+ ~. ro ~ N +~ ~ O .. a+ 0>~~3 ~ o?~ a?i oz H UIDfA~ H ~ ? o a~ae~ ax Nrooo?co rooro3?N33 w"a"~zz~z Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ro N N N 2} w NN't7N O N N N N U ?rl ?ri C qw O Uw N O O 1?+ ly ?.1 }~ N ro S?1 ~ N @ N ?n 3-i ~ O O N O ?rl rl ~ O s~ ax~roo+~ a o U U ?rl Y1 O ?rl +~ d) ?'i ?rl O O U ~ ?.i N sa a~ a oNaa?rox a ?~1 a~ a~ a s~ ro N N ?ri ro I N U LI N ~ ~ ~ -1 ?r?1 7 CP r-I O w,QUZT~O w ~ N ~ q law o a~w?.~w o N O N ?.~ b ~ N ?.~ +1 N S-1 ~ ~ ?ri N ro \ ro ?ri ~ w v O , ~ u i ~ c n ro +~rnoNV, U U >~ >?~ D O N +~ ~ ?rl ?rl N O U ~ U ro 0 ro ?.i ro N O ~ r-1 S -i N ~ S -1 ~ O .~ ~ o ro ~ a om+~u +~ ~ 4 ? - ro z ? ~ ? ~ ~ o ~ O Rl A ~ O~ N U S?1 U ?rl N ?rl +~ N N ~ U x a N N N O N O ?~ N .>~ w w ?~1 ro a ass ?~1 N~ w O .C O O ~ +~ N ?rl v N N ~ ~ U ~ ~ ~ N r-I ~ ~ x +~ ro ?,~ 0 ?~1 N ~ ?.~ x -~ +~ ~ s~ ?~1 ?.1 ~ A w 4 . ? OA~N~ H N o . b N N S-I S-1 1 H ~ }J b +~ N N +~ +~ O 0.5 N 't7 +~ a~i N N rUn S-1 ~ ~ ~ m w ai N N N ?ri D ro tr+ >~ U ~ H 2 ai Sa ~ 3 ~ N O N G) ~ N f?+ O ?ri N~ N N ~ O f~ N Sa a ~ w ~?.IAro v o~ a b r-I ~ O ~3 ro~ N ~ N 7r u ro oa~im ~ w ?~ 0. ~ m~ v a ?~ a ~ ~ v v1 q ro N ?.~ ?.?1 ~i ~ b ~ ~ v v 3 >r ~ ~ O ro w ~ p ~ ~ l..i N Q ?ri N N ~ ~ O N A ro b .. ~ '~ ~ N N H dl ~ ~H G) U c~i1 3 P+ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N ,--~ ~ ?rl I ro U .q G U ?r?I +~ O ?rl r-1 U +~ O s~ .,~ a ?~I ~ a rn ~ o W ?rl r-I ?rl a~~ o ro+~ N ~ fa ?.?I ro ao >-~ ro o +~ a rn U iT ~ p U o0 ~ O U ro ?.i rn rl ?r?I rl ?,.I +~ 3-I r-I ri N U O N~ O N f-I O ~ W W ~ N a aroi ?.~, ro ro ?~ I~ v ro U ~ >a W N >~ U U .a~ N U U Vl A 1~ ~ 1~ ~ ?ri r~i ~ U E Gl ~ N ?~rl ~ rl O R H UI r1 V1 7?I O +i ~ ?rO1 P4 ~ W O U oNO N GNU W O gONrn 3?a H 1~ N ?J U H U pl .?I LL N 7a ~ ?.~ 1~ ro ?,.I W N W S-1 r?C N U ?rl ?.?i q ~ 5 q a~ o b a~ is ro +~ v U ro ,-i S?a ~+I~nO cn r ob xro aoa vroogro ?~~ ?+~+ W ~+ o ~+ W O O oaaa, N U >~ N .,~ U ,--I ro U ?r?1 r-I ll O ?ri O r-1 t~ O ~ a >, u ~ N o w ?~I ro ,-?I O U1 k }.i N ~ ~ F ? ro ~?~ a `~?~~?O glaroNCn ,~rowU~ O .[ N ?rl O hUAax v N la O U ~,o~~ro ro +~ a~ a~ +Iro?~INU ?ri C r-I N C ?.i fA N N Q> >~ ~ -.~ 1~ ?ri ri ~ T3 'd ?'i .??i N ro N 1~ 41 i~ 1~ cr ?. ro u m ?rl H ~ a W ~ H U U O ~ ~ O S-I R m Gl 1?I O w ro ?r?I v a, +I ~n ~~?r~l Ub U A ] O ~ ?.NI rt la Ol N 3 ~ ro O +~ N N U ?~ S-I W N 'J U ?r?I dl ~ +I UI S-I q r-I r-I aJ Vl Gl ~ ?r?I O O ro d) f?+ Ul UI a~ L1 G A LL qw N ooa~s~ ~ s?~ ~ o N W N U rl ri N b~ N r-1 ?r?I ?~ m~3 y ?rl ,~ooo +~ N as N N ?rl ?.i cn~ax Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 b ~ N ro ~ X N y ~ ~ ~ N U ~ N O O U w U ~ N lll .~ tr~ U 1~ -.~I ?i ~ O i-I U N W rl ?rl CT N a ~ .~ ?.a N U \ S-i w tr~ SOU x o ?.a ?.~ ~ ?.~ ro v a~ m ro s+ ao a o aroa o w ro x ?~ ~ v ro ro > a ~ uNi ~ U ro +~ O ~ ?~ xN~ a u ro N v ro ~ ?'i Sa U O b ~ ~ ?'i N N W N U .~ U G U1 N 1~ v v S-i Sa .~ r-I N ~ ~ 1~ N .-1 N O O O N O 1a U U Pq 7 U W ,~ w a Uw a ? ,~ ~x b O N m ~ +~ U1 N ~ N N N w s~ ~ O ~ 41 1-i O Sa W U W s~ w O?~ ~3 N r-I 1J N ~+~nov?~z a~ va rnN ...~ w a~ ~ ?~ owe vx ~ I?+ O r-1 ~ U x a o ?.~ ?~ ?.VI N ~ U ~ N am~vNiu,~ W U 1.a ~ d) W oro~+~ ~.w a~+~ 3 a?~An?az +~ ~ 0 y ?~ ?~ +~ ro v~ ~ u v ~~ ?~I ro ~ ~ ~ O N ?rl +~ +~ ~ ro H f.' r-1 ro C O .~ ro a 0 ~ ~ a .~ H r b rn ro m vro ~ a~?~ s~ v ~ O ~ ~ +~ ~?-~ O w Ow b x W tr~U ~ ~ w O ~ C U 0 0 ?.~ ~ o ~~+rtUN+~ 3NVV~roo ~naa~~ Vl N aU N N w ?~ to ~ U .~ r%1 h W cnEU Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 N ~ ~ ro ai ro ?~ v ?~ ro Sa ~ b +~ ~ ~ U ro ~~ v ~a~rov Wa?aw W N ~ CT O ?.~ ~+ ~ 1-i ~?~ W~NGL ?~ ro o Nrl q a+~r+ m ro S ?~~ ~ro aUi ~ a~i N W N rl q Oa O ?n N CL ro gEw21 v NN a~ Q' +~a~~ o ba~a+ros~ O C ?.~i ~-%I 'C3 O N C O ~ N ?~+ ?~+~aaW x~~,NN N E Sa ro 0 +~ ro ,q +~ N ~-?i x ~~ m+~ ~wwA ~ .+ vwaas~ o N?rIN H ?d ?.i Oro ro +~ .C ro N a ~ ro u N aUi 1a o N aNi w O a a~ o N ro ~ ?r?I N dl o +~ a~ ?.~ U U R3 N O ~ w~Nw ov"i N ~ ro ,y N N o w~?N~~ oil ? ~v o ~~ ro a~ s+ a o w a~w"~ ?~ ro ~?, ~~w~ a~i b~ a o N ?.~ +~ N W ?~ O ~+ ro N O ?.-I U~ O H CA N N .~ NroUU spa a? ~N.ON ~ bo ~ '~~o~ ~ rob ?~ O O ~ w h ?.Ni >, i-I N ro H O ~ N -ri W O b~ ?-O-I A F O O ?~+ s~ ? o b H a~ a m > ~ a~ix m ~ ~?~ S-1 't3 +~ N H Gl N U E+w of O w D Hw z z w ."')- a m ~x a'a ~?.% ~ ?1~ a ~d ~, ro o +~ x a +~ a~ , v ~, o ro A +~ +~ ro o~ +~ N 3 A ~+ 3 ~.~ 0 3??U~ ~ as ~d N b 3 v ro?.aa~wa Ntrroro q N O N N ?.i CT U) O ?rl r-I N N W S-1 LI N ~ r-I ?rl ~ +~ U ~ ~ N O 7 A ro U ro N tT O Gl ~ O N ~ ~CUws~ro as~NN1J a E H x ~' H z w H F ~o ~o N x Sa +~ O ~ ~ N ~ >+ 3 ~ ~ a~ ~+ o z a~ ,~ ~ N o m?~ aim a"i ~' a x a~i ~ .C W W ~?-I ?.?I N ? ~ ? o a ?a .~ FC w U y [~ ~ I q a~roa~a~ro W+~U1~00 S-I ?r?I }i +~ ~a~a?~~ roa~roa~xro ~caacawv~ N +~ U ro vx ?.a s, U O ~~ ~ 3 c ro N t0 Uz N ?.?~ +~ W r-I ?.~ o .~ x o ~. s~ a~ ~~ 1~ Sa W N H aa~os~oro3 bro+~ ~roxz q ~ ?.i W ?i Otn N r,W?C N a~uOC~O b.-?i LOi O ro~ ~W ~+ N p, ro ~ w ONN+i ooh vhcacn pow Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 b U q Gl ro a N N ro N ~ ~ ?.?I r-1 1~ ?.?I W >, 3 q ~ O S-i ~ r-I N b ?.?I U LI +> > ~ O ?.~i N ~~ ~ UA ~~ roo~o 3-i U +~ a~ tu?~+ ro U r-I ?.i C b O .[ daa ~ro o ?~ v ro r-1 ? Ul U r-1 tll q ?.?I N q N 3-i +~ O W N H 11 b N U O ~ M ?rl d' U o0 ~ r ~, r ~~ ro ?.~ m U N ro ?~ ~+k 7-~ +~ Gl N O ?.~ > E 3a UI r-1 ?.i N N O O esva~a ~ O w ~ `Aw?~oro 4~ G 1~ aa~arocn +~ a~ .1 U LI N N r+ororo~ ~-+ ro axe amG1NO 3~AE-iU ~ ,G Uri VI 11 11 r-1 ~ U N FC o ? Oc E roo v i rn Lbw U N N N N ro ~ ~ ro ~ o R3 o W E O ?.i v~ N ~ N Y-I H ?rl ~ ~ 'd a~ ro +~ z ~ a ?.~~a ~ o roa~ro C7 ~ U ~ rl ? ?. ~ G +~ +~ ro O U UI +~ b ?rl q ro N U +~ +~ ro ~ x U ~ ~ w M U U O +Oi +~roa ci a a~i~b N ro ~ ro o o~a?~~a EUA~z ?.?i ~ Oro ax o ro~~ roo `~ co~~~n F1 r-1 ~ U L1+ C7 q b O O 4?+ O N ro +~ m U 3~?~iaNi NUw S-i U r-I w q O hoHU a ro~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ?.i E U r? id n x n ~ ro v ;n v ~ o a ~ , +~ ?,~ O ~ a~ '~ a~ a oro .~, o ~+ ~ ro .u ?.~ ?~ -~ s~ ~ S U N a. m +~ au,a .,~ .,.~ ~~ TSO+~N ?ri ri N +~ 4-1 ro N ro O ?,.{ N A S-i ~ 'C3 O +i O ~ ?r1 ro U ro 1.~ E ?~ 0 ~ ~i ?~ ?ri ~ x +~ ~ 0 o ro ~ ~ w h z v m ro ~ a ~ vi a o ?~ ro ~ s~ w ~ a~ ro ~ x r? w a q ~ +~ a~ o o ?~ o N ro ~ ro N ?~ a a a~ ~. a N z + ~ .c .~ ~ b ?~ ~ ?a? rom ca ~ rz ro x ro N ~, N w A ~ A N -~~ A vOi +~ W w a -i -i -~+ a ~ ?? ~ ?? N ~ Uri ~ N N O N N N N DC W f!~ 1J UI S.I N N ~ A 3O-i O 1a O ~ ~ q W U W U W H?'i W O 3-1 v a a~ ?.~ ~ ~ w q ?.~ o ?~ ?H N r~ ~i +~ q ~ N ~ F., N N {J 'd O ~ ro~ ro Uri as N v A~ro roa a~~ro U ro ri az~ v s~ ??iNro U N ~ ~ ~ ro r-1 +~ N q ro to ?ri ro U .-I ~+~ma ?.i ?.i ~ ro ro ~ ?,., a ?.~oaa ~Ua~~C Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 uo~aozwzE HzHwaaHC~wz~w uo~xmwcn a ~ N a I N ro ~ a~ ro~wa~~ro~~+roa ~ w .-+Ol.a~ CONS a) NN a wrnw?~+roroUwa~ ?.~~saro wax aa~ ~a rlsaaaoro o?~I ro= ?~ ww ~ Uw ~ ?~ a~~ arty N ?~I~ ~ ro .~ ??~ a a+.a a+.a o a w a N a o 1+?.i N a a a w O O b G N o,~?~~i mw N v ~~ ro ro ~ a ?a E >a ~ o ro.c ~ a~ a rl s ~ro N= U I Uw~~>?+Nw Nv as a~- aNa~ a a~Ua ~ v rt U w ~ o a~ >a a U a~ w ?.~ a~ v s.~ a s ?? a~ ?~I ?~I o o ?~I m a a?-?I b ~+ saa~ va~wUN~w sa I-loro ort i O ~ 3?+ b~ E a ~ ~ U tT ~ v a ? . Ua ?rlwwUU???INV1~aa O ~1 v ,~ ~+ ?~I o+ v o a+ w U ?~I ?.?I ro ?~I sa ~' w a+ r-I ro sa ?.+ b b a N ?s v w a~ 'G a~ U a a~ .~ U v] r-I ro U roN ?.a ?~I o >a w tr+~o O ??i >?+ O UI ~ O ~`'~ m O N a~ a c~ ro w ?~I a oww o~ uoiwOOO x a~ a++~ o w a~ ?.a hro~v, ?~I w >.~ N ?USaGIa D4Oro~N m a?.~ x ?NNaw aacao~c v a3?~ o ro ~,>?+ a v,w ro w w N rl ?~ Fr' ? rl ^~ r-I ~ U a ~ ~ a~ ?.I a .?+ ~ a ro w ?.a .ra a~ w o 0 w~rl ?.i O O O OU] a U U ow ~ a a~~ ow roa- ~ b v wO~Naro 1.i ='C3a NU owawa+ gmroro a?.I ?.?Ia v a 3?~+ -ow aa~ ro w w ?r,?ri a w v b ?~+ a w ?? w ?~I to Ero v f?1 a w N r?I ?.i ~= N ?,.I N N ~A W,~ ~ N N U~ N r-1 b e y w ?'?I a ?.i 1+ d1 N a A ~ N Sa vroro?.~?oa~w?.~v>arnoo Uwa ,a 1+ .O .C a a N p 1a N ?rl ?.?I ~ a a 0 Ftnvmrooa~trro3r+wa D?~U N U .~ w r-I ?.~ ro ~ ?.~ o U W+ O cn ro N a ~ b rt r a o ro w N a r-1 ~ 'd 'CY ~ ~roro O S?i .???I r-I ??i ro omro ro v ~z~ ?.~~?aaNioox a ?~+ w U s~ rooawa~ro ? ,a a~ a w a a ~ a ?.~ a~ -.a O U ~ N N a a~?~+ ~n w ~, d+ GIaN 3-INa~ >`I ?r?I ?r~ rt ~ rl ro U ?.?I U a 0 3~o caa~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 v v v ro ~ - ~ v +~ ro moo - + a~ o +~ o U 9 .-1 1ti ?r?I m p, U ~ 7r q ro ?~ ro ~,~ ? ~ o ?~ +~ o a s~ s~ o r+ ~ aoVa~ ?rl ?rl 1J ro> a a ro ?~ ~ ro~ u~ ~ N m N O H A N .~ ?rl ro U +~ +~ +~ 1~ O 7 ~ ~ f-i b w ?~I ~ X U O O N ro roa~.~~a O b w~ U 0 ?rl O m ?.i ~ ro ~mrooo +~as~a~ m H ~ ~~ ~ N U ?rl H c v 't3 ?.a ~ ~ ?r?I ro >? b +~ +~ a~ ro ?~ ~ ~ +~ +~ U O }-I v Oro N 11 N m ?.~ U m .-i w ~ ~ ?~ ~ N o roro tr~ ~ N ~ ~ 0 ~ ~ . N +~ N ~r !p U N ro b~ U 1-I U C ?rl ?.?I v aa~i ~ ~ o N rl N ~ C ~ m ?r1 rn ~ r-I ~ ~ ~ N H +~ -.?I U O O O ~aa ~w ~ x ro~ o+~ m ro x aa~i o rox a ~ N~ H o ?z ~ m O ~ G, +~ ro ?rl O r-I U A O ?~ .~ U 3 0 m A ~ .-a ~ v ~ m u U ~ .. p +~ - +r N ?rl +i W Na ~?~ a~ ~ ~ v z 7 ~ b O +~ U~ N O 0 0 ~ ~+?~ a o s~ U U ro tTrl ?~ U a U r'~ (!~ ?rl a ~ a ?.~ ro ?.~ a U m CL ?~ m ?.~ +~ ?~ m ?~mm ~ H m ?.1 .~ w ~ umi ~ ?.a ~ 00 ~ ~~ C +~ +~ (!~ C. v ?rl ?ri ro ~ m m b ~ +~ Sa ~ .i la Sa N U1 ro-~roDD a ro a ?~ ?~+ o.~a~aa A U A A A U (l1 m roc ~a~n ro ~ U ~ O~ ?.a ro ao ~yb o -~ ro m~~ro vmoa~v ~waz~ +~ Oww U1 Haooz ? N ~ +~ m Uro~NCP 3 ?~ +~ 1a N N U 1?a 41 ~ -~oro> qs m p,?~ m ~~o~a v m U ro ~ ~ v N ?'i 'J .~ w s~ ,~ N ~ U ?rl U H ~vro ~ A m y U ro~ o ?~ ro s+ ~ m q O N O O a b ?~ ~ a +~ ~ ~ ro ~ +~ U q +~ f-1 ?^~1 W G 7 O ~ U I-I +i v ro ro s+ `~ ?~ a a r-I~. ?~ LL ~ rN w+ O ?? .c.~x~ N fUi~~ G. z roorov m" roro a~ ~ a N N O ~?~ m ?ri U o ~ ~ o w U Hv aro v o U ~ ~ ~ N ro N -rl C: U ?.I ~~ ro O ~ ~ ~ ?~ ro ro ~+ U V O ?.i F1 .{J ~ rS ?.~ +~ m U ~ ~ +~ O O .~ .~ a z a~ +~ ?~ s~ wwNO ooxz a~i +.~ ~ ~ ?~ ~ N ?.i ?ri H ro ro ~ m m r1 S-1 S-i N N ~ U?ri ro ~ 9 N N.[ N ~ ~ m C7UADA~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 ~ ~ O +~ O ?.1 O +~ +~ A ro v +~ 1-i O N U1 +~ ?,.1 +~ ?.?1 ~ roN ?.i ~ r-1 O ~ O N 1-i ?ri ?rl YI LI ~ +~ U) b U m +~ ~ ~ro~ >, ~ w rn ro w~ Na ?~+ ?~+ a~ o .u ~"o Coro U H Gl N VU] N ~ ~ q H ~ >r ro q rl la ?~~ a~ro~ ro W w N ~ o ?.I r-I N N ?rl ?.i O ~+~ v ~ N A ro ?~ 1-i a aNi .~ rt '~ ~..~ +~ w ..H ?gb? rn ~ ~ ro ~ ro ?> ~ O Gl ?.i ,~ U A U +i ?rI d U ~ O w rn ?~ F a~ ~ ~ ,~ O O H U pq vm U N q ` ~ tl) CT 3.1 .-1 U ?.a O ~ G rl .L, W N M N '+~ 3 rn +~ O q m to m N UI roU b A N D q ?.~ ro~ oamo ~a Uo~a ?w~ro 3arorn N w ++ o ?~1 a o 1 `m U U1 1 N 3-I N +~ d Gl U O UJ f?I ,~ U .C w ro U C +r ~la roa~ow ro a~ a+ o ~ U1 ~ J~ ?.i v o row .~,~_ ~v~ ro~ba ?aNi~ a??~~iro~ w ro ?a O ?ri q 1a ,C rn N W q ~ UJ ?rl O N U U~ N v S +i -.~i v +~ ~ w~ ro= Ual SO-i +~ E N N N q ~ ro ro a?o N o ~ W tf1 N 00 7 r-I }1 q,' +~ q ~ a ro U+i b +?~ ?a ~ ro ?.~ ~ ro FI fA N ?Nro~ Nrorl r~ H U ~. O N oro am ~ C9Hr o vw G +i U ww m ~?.?~?a aoio oox a?O~~ ~a N a~H U ?.I ~ O O N ?.~ 1~ ?'1 N O P4 UI ~ N ` ~ ~ 3.1 1~ N dl ~ LI f. W U) N q 41 tll Gl 11 N ?rl I U'd ~ ro N d W ro> ++ aro?.IN s+~oa?.la, CD~?~vi Uhanoa~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 ~ ~ U R N ?rl b~?r?I ??i ~ ?rl r-1 O R N W Y1 N ?rl 7?I ~ N d.i00~ N N w U N ~ ~0 ?r?I FC R ~ }-I ~t b~ N U O d4 ~ N N ?rl N 'O ri o~a~iu~,ma Nh~ ~ U ?~ w ?? R U p4 ?rl ONO S-i 3?a U ~ ~ ~ ?'aRim?`~aaoi I.1 b> >`I ~ b N N ?ri R ~~oN ~ +~ .-I U a ?. rts oN >?+~ +~ Nx ro o NR+~U3?rl N ?~I ro ro .u .~ O'7 ~ O ~ ~aa+oiaNio Ro>?+RN o?.~NO~N ?.?I +~ 21 ?r?I ro N b ?'~iN~rOU~ ~ T3~RNRU R rortsrosarom .,~ +~ R O U U ?ri I W O R O p, S-I N R +I .C U tT R +~ N ?,.I H ?~ 1-I R O f6 O ?~ w N ~ a~i m ~ b +~+ U O S?I O ?.i W N ~ ~ b N w CL R o ?~I ro N N N ~ ~ ?a x N ?ri J.~ U N N Orl O~ .~ a N +~ A fx O w O i ,~ r?I N I U C7 a ~"~ ~aNiw H o ~ ?~ a~ ~ N N .~ o .u ?~I ,~o?~ W U ,'~ r-i $ ~ ~ ~ +~ +~ W O O OUR O U U z1 ro ?~ H H N a H z R No U N R ?.i r-I N b ?-I ?~?I ro ro U ~ ~" fA I t0 Rio b ?~ O r R N U M rtSRNUi oro N U W R 3-1 N ?ri N?rlN N R +~ 3 ~ R O +~ 0 0 R NWri U ~ ao,~ U w >r r-I 3 O +~ .-I v ?.?I ro ~~ rn-N+x o A R .al ~ +~i ?.~ ro~?.~ aro ? N o R o ro W C] U D V] ~ R ro tr+ N ?,.I N }1 '.~ w? vii ?,.I N R b N ro N 'i7 U N 1a o ?~I ?~, ~ W U N N U H~ ~ ~v ?.I N ~ ~ rr o o ?~+ .a ai a ai r+ ro N N rl ~ ~ 1~ O O ~ U U F-I r-I ro ~ U b~ r ?.i R o Sd ~ ?rl (V O ?ri~ 00 R N rl O ?.?I N O ?i tT w N a 3 R w w ?.I .~ Oww ~ ~aO?~ ? N q ~ 3 z +~ N ?rl ~C ~ N N R ?.+ +~ tia ?r?I OU1?+N ~oro> R N a ?.+ >a NNNRro ac~AOa Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 w a ~ v+~~r ~?~~ +~ ~ ~ ~~rn rovrn a> N ?rl Q ~ ~ ao ~ N +~ ro U N tr~ tr+ C +~ ~ ~~ UV] UI v ~ ro b ~ 3 o~ oro+o~ x N U cnc ~nUV~?~aro s~wo~u,~ oro~oroa Vaaa3a ro~ b ~, ro +~ a a~ o +~ ~ ro ba +~ > N os~a?~~a w o v a ro v ro N ~ x ~ ~ roNw ro ~w ro Nrox oa~M3 ?~Nrou,v xaca~+Mz g w N +~ o O Sa !!1 U N U ~ ?.I ?.a U w +i ?~ la ?rl ~ +r N ~ O U +~ O >r ?rl Ul .. v a ~ m ~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 sa ~U I q?i tr~ ?~I ro t~ ?~I +~ N q ~ U ?rl .C ?rl N?rlWgroUa a~ a abb ~ ro o N W?.?I ro v m a~ w ro U v ,.+ ~ A~ ro U~ N U ~ .r-I+.~~aroU O~~NN'd7b ?.~ v N a~ q a~ ??~ ro U 1~ N 7~ N~ ro ~ W 11 rd N .,.{ N awrl+~~+.1 ?.~irN-I N G D-~OI 3 q o ?.+ o s~ ?~ ?~c'~iw~Nrowu ~`~ w? o ~.~ a~i NN~7rN+~ b~ ?r., U o a >a ?.?I rn?~I A ?'I U ro N 7~ r1 o > ~ a ?~I ?~I ~ ,cvroiv~ mro~ L1 1~ N rl U a~osaa~Nrox+~ '-I?~I ro s~ sa a w a ?.~ :~ a v o 0 0 3 NA+I U+~?rl a1 N I O IroN ~ a~ wa~vro U 'd ~ q l W roRaU 01~wU +INroaa roa ~ N H O ?.I .~ q Oro O N ?.i w a w O ?.~ +~ N ?.~ U rl r-I a~a~>~, ~rowovN c~Nw?a +I U ?.?I U ~ W D O N W b N O?~Nq ?.iNO ~a- oroa~ro H w q d O W I.1 0 U 3-I U U N wO++~ aaao rt w aro N U o K ~ ?.~ a~ -+ a w ~ a N a~ sa ro U .[ N a~ o b ?.?I ?.I >+- O U~ +I ?rl q N d ?-I Hal wSaN tr+q ?.IwWA +~ U 'O O a~ w G) rn ???I ++ ~n ?~lo ro ooa~rn oNao vx ow N o a~+lrl ro ?~ +~ a U +~ ?.~ ?~I - a~ .[ U x v ?v +~ w o >a~ N>,+~ ws~wa~ ?~ o U a~ w o w a~ a~ ?.~ o a .c a ~ w +. ?.~ a s .c +~ ++ o ?~ N o IUn 1a rt 3 ~ U~~ N E~ +~~ N N.~ x N Gl a C O N a?rl +~ 1-i N N +~ +~ U R +~ O+ O Gl > ?C ~ +I d +i ?rl q V] N ~ ?.a ?.?I N H ro rl U a o a a a u ++ ~ >a z a a~ w H uH a U v z CT H w ~ ~ ~ z H W A I N N ?.i ?.i ..~ y w ,?i H WO { ?? ~' ~ H A ???I a~ ro v~~~ O ~ U P O Cl 7 ?rl U ~+I U u]wN~ a~ o rl ro qrl C N d GJ 0 3-I tr~ ~ ?rl Gl .i U) ii U .-~ ro ?.?I a~+~ ~w +~ +I N b O 3.1 ~ b~ N N U Gl ?.i U +I N N.[ A U ANNd+r?I ,~ ?.~ a~ N AN 1J rl N sa od UH Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 I I .b ?rl ?r1 ?N .G ~d N O 1.1 I is ro G v~ ~" v?~~ Nw o v a G ?~ O r b U H C!' v1 N O 3-I G O +i al N U G G~ 7, ?~ G ~I N Gl ?r?I m '-I 1~ N '~ GJ ~'+ ?rl G U +~ m U to U i-I N U , ~ QO m 1J N u cli ?rl ?ri tti G ~ tC ?rI J-~ m ?.?I p m G ~ ~ a~ ~ bn w ?rl O E-~ 00 G v1 ,C O ?.a 1.1 u1 G F+ N ~, U N Cl Ol fA ?ri W ?rl ?ri '~ b !-I L.I ~ .. m ~ ~ m ~O ctf ~ 1-I Cl O A u 01 ~d H u bN ~bHOODcNV Gf0-IAGtNif~NN G~ U~ N O tb GJ 1~ ni O ?r?I c1f Gl ,~ bn L.I m cd ?n G s+ G 1+ m G v m CJ .~ +?i 6 ?~I W ?b G N b N ~ U ?b G .[ y u u iJ N tU ?.a u >r, ca w w G v o u u ?r?I o v N .~ ,.~ ~ u G >`I W o v ~ ?,~ G ao ~, a.l u G +~ G G G G +~ ono - on u > w v a~ .n G ?~+ v c~ O N U m m ?~ G ,1] D0 bn 1.1 m al G b U On O v cd G r-I b O G ?rl ~O b J-I o0 9,?rl ?.?I 4?i rl ~ ~o ~I N o ,~ G ?a r-I H a~ H ?~ rl p V1 0 1.1 N 3-I ?ri N O i-I 3-I r-1 J-1 N O rl $ N t0 v oNN r~iaJ~~NG uww+u-INUNV C~o~'0 ~~I ?~+ +-I ~, v u ~-+ >rl ?r?I v w G w H ~, u oD o. ~+ v +~ G~ u G~ u ~+ N o?.~ O~ G ~ v N N,a ?e~ ?ri Gl !-I GL U cd ?rl ,C b H b P+ .!] F3 ?.a ~+ a0 v o ?r?I N w rl N u G m ~y v 3-I ~, G ?r?I ?r?I G on m ~O O r-I Gl td N ?rl N N N Q U Cl U ~' r-1 d Gl N p ca }~ W to U U E m .~ a~ o ff oD v u m a~ cd ?rl w G v G G t o W a~ N ~+ u u~ >-I -d on oo W a~ H v v o ff C7 A~+ a+-IuG~+ GvG Ga~~n1W a~?~b0 ri W O ,~ a G .G al 1.1 O ?r?I cd o .C I?-I a~ v ~ u ?r?I D, a v n} ~ ?r?I +~ 00 m v W }.I p u A v~ A H cn .-I ~ ,,o a ~ H ~ o 0 U ~t N cn r\ G ~ O Cl O ~ U N O G U Gl ?b~nU iC .--I o rl A W N u - Ri G H O tl1 b Q! bn u G NG ~- -IC ~ h-?I p N ,C ,.ca w m v A 3 ?~~imu~ I ~ U ?rl ?r?I u D, ~ m r-I ,x NNcd m0 ~.I N ai ~ }~.I R. 1 C ~ ~ q m ~ N Gl ~ L.I N vJ W r1?rl H U ?rl a- ?r?I I '-~I G u G = G ?D On'b Gl m O ?rl rl ?rl b0 tq U O .-1 'J, ?r?I N Gl O r-I J-~ uwoo`~N~u H ',a~?rGl }~ U W N ?.?1 ~ u ?7 O e-1 N ~~4~-I N O G uvW N?a o uvuo u?,a ?rl VI 3?I ~ U ~ GHwO~GG d~fW?~G G O1 O O N to U ~ W ?rl O N ozuoa?a,~..l~ u U oUDO~ G N~ O1 r-I M bn~--1 O ?ri O N r-1 U G H cUNHU b ~3 rl H A N rl W W c0 - O G G O O N 3-I ?r1 1.1 O 1.1 bn d +~ N G ~u~z~ ~+ >?I v N xAt~3 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 U I b ~ ?rl U r?1 ?~ N 1~ ?ri 1 7r I. O N ro b N N 41 N fti >?1 N U W ro o b ?.i U ro U rl a ro ~ o?~I oar a~ ?~I oo qw az?.~ rnro ro ~ w ?o ?~I > ?.~ >?~ ro ~ o w v s~ ~ ~ rl +~ N ~ ro +~ a o a~ a~ >a ?.a o r-I U tr+ a~ ro s+ r-1 3 ~ a N q .C ~ b ?~+ q N N g D U ro N A??i O~ rl+I U ro+~ Uroo oroa~ o No?~w+~ ~+ a~a T3 b Ul .?-I b O 1~ J.I 7 W~ b O N N tT i-I o a~ ?,~ r-1 N q 'd ro -~ o N v ?.?I ?~ ~ ?~I tT a~ am a~ ?~I s+ o U a~ v +~ v roN U N?r1 O?~ 3 q N m +~ +I ro -+rn Nw U o ro w Nw ro~ rl ro a~ ???I a~ ~ rl o ~ a a ~+ s q +I N +~ U1 O N N g N ~ 3 i-I ~ aoi a ~ 3 sew aa"i ~ ro ro N rn>~w~ U v o +~ m o a~ w m U ?.a ?~I ?.I .u a~ q o .-Iroro ~+~N.-~ wv m++a~a~H~ x rl ~? W N N O b~ ?~ f. w i-I N U w H 0 H m 0 a W ~?WI U U O i-I >~ ~saaa~ NA U 0~ U~ N ?.?I ~~ w~ ~ w ~ a~ ~~,a~ O .?-I O ?rl ?'~ a + w drorox roi~~ a~ a o a+~ ~?roH+~~ OW?rl+I N ~ N o+l ~ a~b m rt~~~~?ro oro>a~i >rl >~ m w +I ???I +~ m~~ao~ ?.~+oia?i~ mam?`~rt~ roo?ro o a~w v v v+~~ O 1i A rl ro f!1 H N U N sa ?.I a~ ~ ro ~ >~ N o ro +~~~ 1..{ p M O ~ a+ U b U a cn ro ro ?.a wsa wa wd~+lsa roU+lroo ?~I ?,~ ~ w w sa b ?~ U w o ro .?I V1 O Gl fT U ? >~ to W rj ro N rl ~ O ?~ b U ~ a SN-I U LI +~ ~ ~ ~aroroo aUZZz Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ~ aa~oro~ .-+?~x .~rooa~ o ro v a~ o ro ~ +, v ,-, .r., ?.~ ro a >, ?.~ o Rs m y .u .a +.a wros~.~,+, ?.aroa ?.~aa ~m vmxx~ ~.oa~ b.~aa~ .. n m s~ a~ a~++au, ~ v art o.~ ro VI Gl Cl ~ Ul O t0 N ~ ~ ro Sa ~ +~ N ?.?I N U ~ .C 1?I ~ N N UJ ?.i N Gl O) Gl ~ ~ ro ca o ~ to ~ o N ?.~ a+ ~ ~ a > a+ ?.a ro ~ s~ ro ?.~ o s~om x~,?.~~, oar v a +~o vv ~ro a~ a E w u w i, ro F H ~?-~ N v ~+ 2s ?.~ m .a .n .?~ .A ro ~ N~~w ~ro v a a o ~ U i~ a ?.a ro N ~ x v ?,aa .u w ~~ a ~roga~ , +~ ro roa b ro a~ ~ ~ O b r-I N H Ul ?rl U ~ O ,~ .k W ro O F N U x~ b ro~ U O f.i r-I ?~NN~~gO +~ U ~ ~ GU N% O ?rl 4J +i N ~ q D tr+ 1+ ~ LI ?.i O N d-~ z N v ,-+ a ?.~ ro ?.~cn~ 3~ ~ N Gl N N ~ ~o~zcroim Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 ro ai a N ro I a ~ ?~ ~a~io a o ?~I N b ro. N ?~ +~ ro f-I >a tr~ A ? ?t~ H G +i I ~y U W U ?,.I ro s~ N N N +~ A N ro rl G U ?rl N N r-1 O O .i U G U .!~ ro N ?,.I O~ U ~ ~ .-I LI 00 N G >T Gl: W U rl ro >~ O G 0 0 ro rn ?~ N >~ q ?.i - O ~ N S-i ro +I ?r?I ~ .-i tr~??-I q O N .u rn a a~ W E q '~ N ro ?~+ A N ?~ ro >a N ?.+ w G ro g q N >., +~N~+a ao ~INO ~yN o N A o ??~ ?a ?~I r-I ?~I ro ?~ N W aroi~wro aro >x~ 1~1CrIN-IN x>rob osa roo,a ~nox~ +~ o G G ro o?~I N+I G O2 ro ro aaai ?NiA+~ ,G O'O 8 O O >~ +I U N H ?d LI f?1 .G ?rl +I ?rI 0 U N G a 0 0 G +~ a~ N ~ ?.~ ro >a w N N b ro?.l a a a? o N ro N 1~ U ??-I O ~ U N E W ~ W 'G a+ N N 1~ W ,G r-I +I ?~ b +I 3-I Fi U N N {~ +~ O U ro 1i a O G ~~= N ~a oa01o~ cOi1,CNN a U b N r0-I to ~ ~I +~ O ???I ?.~i r-1 Sa Q N .-1 ?ri a 0 0 U .G b~ 0 0 .-?I A x 0 O N A 3 I.I O a ??~ +~ O O sa U N O O~ ro U ?ri >?I 0 0 O N ,G W O G, aN+~a PqW ~W?rl H OUH' >~ 0 U .4~ N {~ U N N r.~ N tr 27 .G ?.~ N +~ +~ r-I ,t' Y-1 .-I N N W ~ r~?I O O CA U N ~~N ~~ a~iao~ ggOD ON +hN H b O?~ U~ ~ N ~A ~ W N c O N H ,G O O ?ri O N IU G OG ~N O'O a~ N ~~N_U N+~ ~ ~ 1~.1rN-1 ~W ~ ~'?~ U N -1 N +I TS N N N o?.o~~u'~i ~ ro.~~ ~ N '?+'rob.~ ~~ ~ I?n a ? o H ro g y G ro~ N N W ~ b roo O N+~ ??i ro~ H U O ~ N ~ i-I >`I r-I O N1ao roNO N~ ?[ ~ N N N N ?'?I A LOi W ~ rIaHG ~ ~ o ?~ ?.~ N ro ro 3 ro G U A F~ xa O N A ~ N Q q rn G i NNN;. z+~N ro o ?. +~ +~ a+~ q G ?~I ~ N N N 4a >a a ro ro ONO N Nrl A N O O O N ~ Q +~ ,~ U U S-I O +~ N ~ ~ +I ~ ?a N E N Q~ N H w ?.~ N+INN NN a~o~ orl q {~IWEWAF+~ aNN ~= W D !]~ H rn N rl G O W ?.I U ? o ?d s?I ~ N a N ro ?~I ?~I N W A x ?~oa ?o D S?I N A O N U .3] N ?'~?I ~ ~ ~ ~ U N r1 O N O tr+ +I U O G q rl H 3 N rl ?.~ o W z U U O ro~ to N v1 G q c+'1 N rl ~.1 ~ 1.1 ?rl N Q'i N S?1 V' ?,.I ~ r-I N N N N O r-I ro ~ >a 1'i 'O >~ ~ a o?~Ix o NU w aU ro o N ro a r+ >?+ c~ ~ ro ~~ N a ~W-HiD+ W ~A O yA OW v ro ~ 0 3 S O~ ~ ~ W H ~ O~~ xaez oa3o o~r+roo wq~x VI N ro N N O +I N ?.?I O O +I N U a a+~i+l ro o~ N~ o twi~~ ~ ~~ ~ 3 o >?+ >?+ s~ ~ ~n >a ~ ??~ ~ o N ?~+ ro s~ o N Ew aA a ~.ao N ?,q?.?Ir~ N U a3 ~ xNNON oNNro ooa~ro .~NOSa ~aAxc~ aca~3 aU~nr13 Ix caaow Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 ~ 1 aJ U R7 U ?~ N r--I ~ N O U1 1 N ?.a ?rl 7 sa sa ?ra N rob ?.~ w N .?~ a awix v N ?~~ ?' ~ ~ ro va ro a ~ ,~roN aNV?.asa +~ ?.1 w N ?.a N v N tr+?~1 ro k m O a U w?.a N?.I GIN N N ?41 b N N ?.a N W Ara O .[ vl U N O U) ~ r?I sa W r-I r?I a-1 N VI N sa O H O O O U N O s?i UA>+1?~tn +~m ro~OW>?+ a a o a v ~, b ?.~ - ?c ?~1 x ?.~1 0~ bvlvNrow ra sa u3?nv ~ U 7 ab N Nw N ro N 0 3 C ~+?~ O O~ tr~ -+ O~ q~ m vNNNSao xroa N o N w N +, a ?a N ?.a A m ro ?.a N sa ~~ N+~ ~ ~ O tr~O ~A N 7 N ~ o? ro N o N o ~.o ~?n~f~ 3a .C .>~ ?.1 w W sa Sa La ~ N ?.a ~ ~ N a v > a a N a o ~a a a, o ?~+ N -, N o o??a a N a a v RA 'd ro U !A ?.a N m U q ro ~ ~wrna~? ?w"'o wroN~oro la sa ?rl O ?rl +~ N q N rl N ~ U ,J~ ro ~ q k NOW ro> w x~a~~?w' as'iro~ a'aio.ca u~ N ?.a aJ v A aJ aJ o > ~ aJ > >~ o .c o a N o o a ro sy N C o?~1 N?.a H 0~??a ?n U U H b w V] ?rl A a-1 ~ W O w N 1:.' ?{~1 H a?l N vo a ~ ~ ~ -.oa ~ -wa m a-1 la m N a-1 tT sa v1 N O N ro a ~-.>+ ~ U >~ ~a~~aai~+ ~roobxro o ~ w sa ?r?1 ?.i o ro ~ sa ~.~ mo~ ~U xNU N ~ sa I o ?~1 1 >?a sa ?a N ?? sa w sa O ~~0 a U O OW ~ ~ ~ saroro P s~ ro~ ~?,g NNroN U a~ ro oAb N ???1 ~>'a aJ N ?ri A N U N O.[ 47 Nb ++ N ?a1 roN vrl va ~aq'Ci N+~ N x Nrl x o N+~ ro N 11 a-1 uI N q +1 +~ U N tll w to q +1 aw rnaaJ= pw >1-1 tA UW ro N o aNa N ro aro ?.~a 11 ~ N b~ N +~ r -I UI ro b a A ra sa b W Nb~NN~ O ?rla.+A?,.1 ONO N~ C N W N ?i U -.i ~ C!~ N O a~a'??N ro .~3 o {'., aJ l~ ~, N QNNI Gaon NGaNrI~ 7 N w ,i ?.N?1 ~+~ ~ NN N +r ~ roosa+~ ~W] ~ IWtl A aaHaN???1 bx ro a ~a~rn++ N N U O la sa ,r~ cn N CJ' N r C U w saN +~ U N a N O S ro3o a,a?o dl 0 a-1 rn 0 Nr+arly W ~ aJ N LI ?.a N v to N a a N o ???1 ro ?r~ +~ W o ra w U m ?.a w .~bvNN a?.aa a~va a - faro wrnroaai~ro i?a'v,ai .-~ q sa row b~ N ?,~ Ea ?,.1 ~ N ~ sa >a b id spa q w N ~ ?rNI aN-1 't3 w 3 ~ ~O !i l-~i E ?~ ~ N N U N ?.1 to m U U U m ?,~ ?,1 a~ w r-1 ?.a ?.a ro ra r-1 ?.~ O O U W W O V] 'LY N b N 1~ ~ q ~r b ro ~ ro r q o 0 ro ~ N ~ N ~a N R3 'ay N ro ro sro+~rom ~mm w ?>>s~as~a tiDNS~'a ??a roororo ororo rlroN N ~ ~q O Oxb 3o Ox a ??a w sa a o s, ?.[ ? a~a ro Aq~w a~o~?mN G00~NN ro v ?.a N :~ o ro N :~ o 3~AApU AADU bb~roUN~ b+ O +~ N .q N N aNip'cNi~o,awi~b~ Hoo~awrna> N h ?~ U -ro w~ w O ro ~a sa a tT?.a N A a~ r-1 b roq w ro vi a ~ ? ~ N ~o ~ A .?~ N a?OO ~ x ~x b U a?1 U ~ V1 ?.i ro ro m In fa /a N O N N ro rox ~~ rtaUi?~ - Nqb aw~W ?~ Nwro sa ?[ ~ N DEyF~ Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP9O-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 N U a ?? v v N .C ?.i N 3a ?.i .~ ~ ?,.I N +~ .L2 +~ N O r?C N .?-I N .-1 N ~ aid ?.[cnNN ?~N?~ +I~roalQ~a O NNN N ro Haw u~ ~U w q q N~ ro ~ ~ +I ++w ?.a U ,~ z ~n N N a~ ] 3 +~ N a N s~ o~ b~ a N ??~ a~ x ro H H a~ ~. ro ? a~ o a a~ ? b ~ a~ sa ? ?a v +~ as r-1 w ,A a v +~ ?~+ o w a v .r~ ro ro ro ,c ~ rI N .A o a~ ?~1 +~ ?.~ a o ro a H a~ a ++ z b ro N ro Nsaroro rlro ~+~+~ a Uv~no ro ~a?~1 rorowroa~~o ro?~1?~1 U NrooU ~ Upro -+ a.c ~ ~ o w sa ?~ w ???I N N q ao ?~1 a o0 +~ N ro A U q N +i o r-I - v o rn '^I a~ N N .C ?.~ ro H q N o o q -+ ?~I r-I o ~ .~ v ?rl ro AU~NrIb o?a+~ varoa+~ a A E+~ ?d roa ro+lro +~ A'dNN~U'O v >~aa wva~>NU ,~rl U roa?.~ro~,>.~a a roooa~ ON rrov?.i Uro a~ .-arox3a~roro o a~a?.~z Gl N O~ ~ ~ 3-1 11 ?n ?ri ro 11 ~ b rl S-I ~ a>a?.,~otrx rovA roa~a++a a~_ +~oDw O N N U W q 0 D U H H ~ U N ?.i U O ?,.I 'L7 N f?I r-I ~I N N N N ro a 0 N q N ro ~ U +~ q a~ o ro H a~ rn a~+~ w a~ a~ ~ 3 ~ro?~ ~, ro ro a~ w ~ sa a~ N tT o ~+ tr o a~ t~ .u w r-1 YI N ?.?I .-I ~I Sa ?ri ?.i C Gl ???I ?.i ~ ro O ?.?I ??~ . 0~ N ?~+ ro ~ o ro ~ o ~ rn tr~ r-I +~ U N ?.~ N s a~ ro U v a o ro N a a~ +~ ~+ ?~I ~ a~ ?-+ ro a v ?~ v .vaNi-,~aio+~ +~?roi a~ ~groovNgloii uoi p,Ntn?~~i .~ o .u N o ro o .ra +~ H m >y a~ o ff a~ v tr~ q ~+~wN?~loz zro--I ~= aa~a= a aG ~~~~ N ~ N I {1 1 N O N ~ A 1; I r-1 +~ ?rl N O N ro N rn ?.?I O ro r?i +r ??i ??~ v ~+ ~ a~ ro o +~ ro ro ++ +~ ~ w s+ 1 x > ~ ?r?I ro ~ ~ ?.~ G ?~1 +~ v t~ U rl U ro~ ~I b a a o ro -~ rn 0 a z a~ U] U D{". Sa N U) N N tT U .~ U N ri N +~ u1 >~ N ro ~ ?,., .,., N ro ?~ ~ N o U N N N U 1~ r?~ c! CA S-I 00 N f11 H O r~ r?I ~ ~ Ri ?-1 C O ~ rn ro ???I C ro it1 U 'OU UO0 U rl a N ro ?,~ ~ +.~ ,~ ?~1 ro rn ro ?~1 +~ tr+ U +~ b w w~ O q ?.I q q ?.~ ?.I ro ro U+~ ro o ~ o++x o a~ o a~b ~ ?.~ ?.~ q w a~ a aT N x .a a z ro ,~ w p b ?~+ r-I ~ ro q +r D U w p ro .-I tT w ?a 3 0 ++ w w a~ v)ONb+U ?.O~Om E~ c~v HOOz hb~uwi N~3~ w~ rl r-1 0 ~. v ?C h o ci aoi ?~i ro b~roaa~ S~atr~ +~ ~Ntr U>`++~~a >aN~ N ?,~roa??~N .~aroroo rova~a~ o >~q a~~ro rxUZZZ caca3oo h 3RCCa~a Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 SYLLABI RECEIVED WITH RESPONSES TO QUESTIONNAIRE Whole Intelligence Courses Institution Brown University Canisius College Georgetown University ~~ ~~ Harvard University Hobart and William Smith Colleges Occidental College Ohio University Rutgers University San Francisco State University University of Louisville University of Southern California United States Air Force Academy Vanderbilt University Western Washington University Correspondent Lyman B. Kirkpatrick Stafford T. Thomas Ray S. Cline Roy Godson Anthony G. Oettinger Peter R. Beckman William D. Brewer Harold Molineu Roy E. Licklider Jerald R. Yankee Andrew Strenk Captain Mark Ewig Harry Howe Ransom David W. Ziegler Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Component Intelligence Courses Institution Correspondent American Graduate School of International Management Richard D. Mahoney The Citadel John W. Gordon George Washington University Burton M. Sapin The Johns Hopkins University Richard K. Betts Loyola University of Chicago John A. Williams " " " " Sam C. Sarkesian Ohio State University Kenneth H. Watman Skidmore Mary E. Fischer and Patricia-Ann Lee State University of New York at Buffalo Jerome Slater University of Delaware James K. Oliver University of Mississippi Daniel S. Geller University of North Carolina at Asheville Gene Rainey University of Oklahoma Stephen Sloan U.S. Naval Academy R. M. Paone, John D. Stempel, Captain D. N. Mizell, USMC These syllabi are available at the National Intelli- gence Study Center. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Approximately 500 questionnaires were mailed to chief operating officers at colleges and universities, all but a few within the United States. We received 165 replies from a total of 162 institutions. Of the replies, 69 identified or mentioned courses totally devoted to intelligence or with intelligence compo- nents; 85 stated that no courses related to intelli- gence were offered; and 11 acknowledged the survey but gave no additional information. We identified 27 courses taught at a total of 24 institutions exclusively devoted to intelligence (termed "whole intelligence courses" in this report). This figure does not include courses taught at the U.S. Government senior service and professional schools which offer extensive work in the field. Whole intelligence courses are, for the most part, structured as "surveys" and cover a large ter- rain from history to current organization, from the intelligence cycle to policy requirements, from the law to problems of morality and ethics. We identified 50 courses organized around broad- er, more traditional concepts which contain "compo- nents" specifically devoted to the intelligence pro- cess or some facet thereof. In addition, 15 corres- pondents referred to but did not cite the title or describe at least one other course which deals, in part, with some aspect of intelligence. The courses Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 referred to and those actually identified are offered at a total of 42 institutions. In many instances the intelligence components are substantial and, in others, tangential. Courses on foreign policy and national security are the most frequently used rubrics for intelligence components. Sixty-four institutions responded negatively or stated the absence of attention focused on intelli- gence. In a number of these cases, it is likely that the individual respondent failed to check all perti- nent sources and that some existing courses in these institutions do, in fact, address "intelligence" inter alia. ZFaenty-one institutions in the above "negative" category expressed some interest in developing courses, in learning the survey results, and/or in communica- ting on the sub3ect of "teaching intelligence" at some future time. One semester is the normal duration of whole intelligence courses. Only one full-year course was reported. Student enrollment ranges from 15 for courses holding to a strict seminar format to more than 100 for the straightforward lecture course. Average enrollment in combined lecture/discussion classes is between 30 and 50. Strong student interest was noted in several responses which referred to "over- subscription." There is no bibliographic consensus, except per- haps on the utility of the Church Committee Reports, on the need for annotated teaching-oriented biblio- graphies, and on the potential value of case studies as an educational device. Literature in academic use covers the full spectrum from practitioner memoires and essays, to expose and critique from insiders and Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 and outside investigators, to the fruits of the lim- ited scholarship applied in the past as well as a smattering of intelligence fiction. Approximately 40 books make up the composite working bibliography of academic intelligence courses, i.e., publications used in at least one of the reported courses. About a dozen books appear in two or more of the full read- ing lists received. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 SELECTED FROM RESPONSES TO QUESTIONNAIRE Agee, Philip. Inside the Company: CIA Diary. New York: Bantam, 1975. Allison, Graham T. Essence of Decision: Explaining the Cuban Missile Crisis. Boston: Little, Brown and Company, 1971. Barnet, Richard J. The Roots of War: The Men and Institutions Behind U.S. Foreign Policy. Bal- timore: Penguin Books, 1972. Barron, John. KGB. The Secret Work of Soviet Secret Agents. New York: Reader's Digest Press, 1974. Brown, Anthony Cave. Bodyguard of Lies. New York: Bantam, 1975. (Church Committee Reports) Final Report of the Se- lect Committee to Study Governmental Operations With Respect to Intelligence Activities. United States Senate, 94th Congress, 2nd Session, Books 1-6. Cline, Ray S. Secrets, Spies, and Scholars. Wash- ington, D.C.: Acropolis Books, 1976. ---. World Power Assessment 1977. Boulder, Colorado: Westview Press, 1977. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Colby, William. Honorable Men: My Life in the CIA. New York: Simon and Schuster, 1978. Copeland, Miles. Without Cloak and Dagger. New York: Simon and Schuster, 1974. Dulles, Allen W. The Craft of Intelligence. New York: Harper and Row, 1963. Eisenberg, Dennis; Dan, Uri; and Landau, Eli. The Mossad: Israel's Secret Intelligence Service: Inside Stories. New York: Paddington Press, Ltd., 1978. Epstein, Edward J. Legend: The Secret World of Lee Harvey Oswald. New York: Reader's Digest Press (McGraw Hill), 1978 Felix, Christopher, pseudonym. A Short Course in th0 Secret War. New York: E. P. Dutton & Co., 1963. Frank, Thomas M., and Weisband, Edward, eds. Secrecy and Foreign Policy. New York: Oxford University Press, 1974. Godson, Roy, ed. Intelligence Requirements for the 1980s: Elements of Intelligence. Washington, D.C.: National Strategy Information Center, Inc., 1979. Halperin, Morton H.; Borman, Jerry J.; Borosage, Robert L.; and Marwick, Christine M. The Lawless State: The Crimes of the U.S. Intelligence Agencies. New York: Penguin, 1976. --- and Hoffman, Daniel. Top Secret: National Se- and the Right to Know. Washington, D. C.: New Republic Books, 1977. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Hougan, Jim. Spooks. The Haunting of America: The Private Use of Secret Agents. New York: Mor- row, 1978 Hughes, Thomas L. The Fate of Facts in a.World of Men: Foreign Policy and Intelligence Making. New York: Headline Series, 1976. Kahn, David. The Codebreakers: The Story of Secret Writing. New York: Macmillan, 1967. Kent, Sherman. Strategic Intelligence for World Policy. Princeton: Princeton University Press, 1949, 1966. Kirkpatrick, Lyman B. The Real CIA. New York: The Macmillan Company, 1968. ---. The U.S. Intelligence Community: Foreign Policy and. Domestic Activities. New York: Hill and Wang, 1973. ---. Captains Without Eyes: Major Intelligence Failures in World War II. New York: Macmillan, 1969. LeCarre, John. The Spy Who Came in From the Cold. New York: Coward McCann, Inc., 1963. ---. Tinker, Tailor, Soldier, Spy. London: Pan, 1975. Lee, William T. Understanding the Soviet Military Threat: How CIA Estimates Went Astray. New York: National Strategy Information Center, 1977. (Agenda Paper No. 6, 77 pp.) Marchetti, Victor and Marks, John D. The CIA and the Cult of Intelligence. New York: Alfred A. Knopf, 1974. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 McGarvey, Patrick. CIA: The Myth and the Madness. New York: Saturday Review, 1972. Mosley, Leonard. Dulles: A Biography of Eleanor, Allen, and John Foster Dulles and Their Family Network. New York: The Dial Press/James Wade, 1978. Powers, Thomas. The Man Who Kept the Secrets: Richard Helms and the CIA. New York: Alfred A. Knopf, 1979. Ransom, Harry Howe. The Intelligence Establishment. Cambridge, Massachusetts: Harvard University Press, 1970. (Rockefeller Commission) Commission on CIA Activities Within the United States. 1975. Rositzke, Harry. CIA's Secret Operations: Espionage, Counter Espionage, and Covert Action. New York: Reader's Digest Press, 1977. Rostow, W. W. The United States in the World Arena. New York: Simon and Schuster, 1969. Stevenson, William. A Man Called Intrepid. New York and London: Harcourt, Brace, Jovanovich, 1976. Tuchman, Barbara W. The Zimmerman Telegram. New York: Viking Press, 1958. Whaley, Barton. Codeword Barbarossa. Cambridge, Mas- sachusetts: MIT Press, 1973. Wilensky, Harold. Organizational Intelligence: Knowledge and Policy in Government and Industry. New York: Basic Books, 1967. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Winterbotham, F. W. The Ultra Secret. New York: Harper, 1974. Wise, David and Ross, Thomas. The Invisible Govern- ment. New York: Random, 1964. Wohlstetter, Roberta. Pearl Harbor: Warning and Decision. Stanford: Stanford, 1969. Wyden, Peter. The Bay of Pigs. New York: Simon and Schuster, 1979. Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5 Sanitized Copy Approved for Release 2010/08/06 :CIA-RDP90-008068000200750011-5