TINKER WITH GADGETS, TAILOR THE FACTS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00965R000201170014-9
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
6
Document Creation Date: 
December 22, 2016
Document Release Date: 
January 20, 2012
Sequence Number: 
14
Case Number: 
Publication Date: 
April 1, 1985
Content Type: 
OPEN SOURCE
File: 
AttachmentSize
PDF icon CIA-RDP90-00965R000201170014-9.pdf555.33 KB
Body: 
ST"T -,- - ,.,..,.,,..,,.,. HARPERS April, 1985 TINKER WITH GADGETS TAILORTHE FACTS The spy as techno-bureaucrat By Andrew Cockburn Among the books discussed in this essay: The United States Intelligence Community, by Jeffrey Richelson. 384 pages. Ballinger Publishing. $39.95. The Puzzle Palace: A Report on America's Most Secret Agency, by James Bamford. 465 pages. Houghton Mifflin. $16.95. Secret Contenders: The Myth of Cold War Counterintelligence, by Melvin Beck. 158 pages. Sheridan Square Publications. $14.95. Warriors of the Night: Spies, Soldiers and American Intelligence, by Ernest Volkman. 443 pages. William Morrow. $17.95. % M16: British Secret Intelligence Service Operations 1909-1945, by Nigel West. 266 pages. Random House. $16.95. Enigma: How the German Machine Cipher Was Broken, and How It Was Read by the Allies in World War 11, by Waldyslaw Kozaczuk. 368 pages. University Publications of America. $24. British Intelligence in the Second World War, edited by F. H. Hinsley. 3 vols., 2,120 pages. Cambridge University Press. $126.50. Deadly Deceits: My 25 Years in the CIA, by Ralph W. McGehee. 250 pages. Sheridan Square Publications. $14.95. One of the problems of secret intelligence these days may be that it has only half gone public. Consider last fall's cu- rious episode of the shipload of MIG fighter planes that wasn't. Briefly, a Soviet cargo ship freighted with MIGs packed in crates was wide- ly reported, in the form of high-level leaks from the Pentagon and the State Department, to be nearing the coast of Nicaragua. How had this alarming situation been discovered? U.S. "in- telligence analysts" poring over satellite photo- graphs had detected crates, of a type previously used for transporting MIGs, piled on the dock in the Black Sea port of Nikolayev near where the aforementioned cargo ship had been moored. Clouds over the port prevented the an- alysts from actually watching the crates being loaded onto the ship. But when the weather cleared, both crates and ship were gone. Ergo, the MIGs were on the ship. By the time this process of reasoning and de- Andrew Cockburn is the author of The Threat: Inside the Soviet Military Machine. He is writing a book on intelligence analysis. duction had been carefully explained in the newspapers and on television the American pub- lic knew a lot about the significance of packing crates and clouds-and a lot about circumstan- tial evidence. Yet curiously, the Reagan Admin- istration and the intelligence agencies failed to take the matter to its logical conclusion. Hav- ing gone so far, why did they not throw the whole intelligence-gathering process open to the public? The evening news could have dis- played not only the original satellite. pictures of the crates at dockside but also the relevant pages of the "P. I. Key" (photo interpretation key), a standard tool for this kind of analysis. It is a catalogue of illustrations showing what a crated MIG or an intercontinental missile or whatever is likely to look like in a satellite pho- tograph. Viewers could have been treated to a briefing on the relative effect on a ship's water- line of a cargo of planes, helicopters, or trac- tors. Perhaps anchormen could have told those interested where to mail away for defense atta- che reports and significant articles in the Soviet or Nicaraguan press, the perusal of which would Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 have allowed do-it-yourselfers to conduct their own analysis. Since most people are endowed with the normal human ability to make things up, they are as well equipped as any intelligence officer to invent the necessary facts and thus provide the Administration with what it wants. As a matter of fact, the format for this kind of exercise in participatory democracy is already well established. The nightly intelligence round- up could segue directly from the weather report: "...however that cold front moving down from Canada that you can see on our satellite picture may make for a chilly weekend. You can also see on the satellite picture a rather impressive buildup of Soviet ar- mor near the West German border. A sample selection of decrypted radio traf- fic on the Warsaw Pact command-and- control channels in- dicates that this is no ordinary exer- cise. So the outlook for Saturday and Sunday is an 85 per- cent chance of war. Now back to Chuck and Bob." Considering the very, very large sums of money currently being expended by the Administration on various U.S. in- telligence activities (realistic guesses hover around the $20 billion a year mark), allowing the ublic to participate p in the process might be an easy way of giving it some value for its tax dollars. While the exact sum is likely to remain secret (it is entirely pos- sible that no one, in or out of government, knows precisely how much is involved), the sheer size of the machine that has to he fed indi- cates that the amount is huge. It is not, after all, just a question of the Central Intelligence I Agency. The "community," as it cozily terms itself, also includes the National Security Agency; the National Reconnaissance Office; the Defense Mapping Agency; the Air Force, Navy, Army, and Marine intelligence organiza- tions; the State Department's Intelligence and Research Bureau; the FBI; the intelligence divi- sions of the Departments of Commerce, Agricul- ture, and the Treasury; the Drug Enforcement Administration; and the Federal Research Divi- sion of the Library of Congress. Jeffrey Richelson, a professional student of intelligence organizations, makes a practice of correlating information from public sources, such as Aviation Week & Space gy, deducing therefrom conclusions that the au- thorities would prefer to keep secret. The United States Intelligence Community, a painstaking and fascinating portrait, details complexity past cal- culation. For exam- ple, those working for the Defense Me- teorological Satellite Program, which falls within the purlieus of the First Space Wing of the Air Force Space Command, spend much of their time telling the Na- tional Reconnais- sanceOfice (NRO), which operates all U.S. Photo satel- lites, when places of interest like Moscow or Odessa are ob- scured by clouds and thus not worth the at- tentions of the NRO's space-borne cam- eras. Meanwhile, the First Space Wing's Space Defense Oper- ations Center, better known as SPADOC, includes among its responsibilities the monitoring of en- emy satellite activi- ties. This monitor- ing is done so that SPADOC might better issue fast and accurate SATRANs (Satellite Reconnaissance Advance Notices), warnings to those who have some- thing to hide that a Soviet satellite is due over- head. Elsewhere in the community's acronym galaxy the FOSICs (Fleet Ocean Surveillance Information Centers) of the U.S. Navy gather information from satellites, ships, land stations, aircraft, and underwater sensors in order to pro- duce CASPERs (Contact Area Summary Posi- tion Reports) on shipping around the world; when FOSICs aren't busy with CASPERs, there remain to he done DEPLOCs (Daily Esti- mated Position Locators) on ships both at sea and in port. Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Satellites not only take ordinary photo- graphs. They also take infrared pictures, which depict objects by means of the heat they emit. Infrared pictures can easily be taken at night. Information can also be gathered after dark by using "image intensification," which works much the same way a night scope does on a sniper's rifle. Moreover, it is possible to "see" objects on the ground by using radar. All this being so, it may seem strange that simple every- day clouds were able to prevent Our Side from seeing what happened to those crates on the dockside. The problem is that infrared cameras can see through clouds only slightly better than the human eye. One might think that radar sat- ellites are the answer. Unfortunately, pictures taken through clouds by radar are hopelessly fuzzy. Without getting too technical, the shorter the wavelength of the radar used to scan a target territory, the better the pictures. But radar can see through clouds only if the wavelength employed is substantially bigger than a raindrop-which results in a picture too fuzzy to be useful. While a great deal of intelligence gathering involves looking at things, even more effort is devoted to listening to things (people, mostly). Thus we have SIGINT satellites for picking up signals intelligence, which may consist of the godless Bolsheviki communicating with each other (COMINT) or else simply emitting elec- tronic signals of one kind or another (ELINT). ELINT shelters under its wing a whole brood of subcategories, including RADINT, monitoring enemy radars, and-this is a hard one to guess at-FISINT, which stands for Foreign Instru- mentation Signals Intelligence and means pick- ing up statements uttered by other people's machines. Back on the ground, the National Security Agency, which is responsible for SIGINT, feels it incumbent upon itself to intercept all tele- phone calls transmitted on microwave radio cir- cuits, which means practically all international calls. Happily, the agency has so far failed to de- velop a computer that can follow normal hu- man speech in a reliable fashion, so it continues to rely on plain old-fashioned human operatives to listen to tapes of your telephone calls in the hopes of picking up indicators of subversion or espionage like "Lenin" or "Ed Meese." James Bamford, in The Puzzle Palace, makes the agen- cy sound so unpleasantly nosy that it has been nice to observe the frightful tizzy into which its officials were thrown by his book. Admiral Bob- by Inman, NSA director during the period of Bamford's researches, actually wrote to accuse him of "holding the NSA [annual budget: $10 billion plus] hostage," and when Bamford went on Larry King's radio call-in show in Washing- ton, the agency went so far as to tape and tran- scribe the entire program. Using the NSA's resources to listen in on a late-night talk show is hardly more futile than the kind of operations recalled by Melvin Beck in his splendid little memoir, Secret Contenders. There was the time, for example, when the CIA station chief in Mexico City succeeded in bugging the apartment of the top KGB opera- tive in all of Mexico (who of course operated under diplomatic cover from the Soviet Embas- sy). How many pages of convoluted musings might such a counterintelligence triumph pro- vide John le Carre? But reality proved more prosaic, according to Beck: What was the grade, value or level of the intelli- gence we collected? I blush to put the question now, because at the time it hadn't occurred to me to raise it.... We had an exact tally on the love life of the Colonel, toilet training Soviet style, shopping lists and supermarket prices, husband- wife spats and all the trivia of folksy apartment liv- ing. When the Colonel and his wife had visitors, there was reams of small talk to plough through. But the secrets of running the KGB intelligence ef- fort in Mexico remained locked up in the head of the Colonel. As should be clear by now, machines play a dominant role in the collection of intelligence. The NSA counts its computers by the acre and burns forty tons of classified waste paper a week (unlike the U.S. Embassy in Tehran, which shredded its secret documents as the mob beat on the doors; the resulting confetti has been recon- structed into, so far, thirty volumes detailing the bureaucratic operations of the "nest of spies"). The National Reconnaissance Office produces more photographs than anyone could ever look at. The human/machine interface, as one might say in this sort of context, breaks down in other ways as well. Ernest Volkman, in Warriors of the Night, a lively tour d'horizon of U.S. intelligence, tells the story of a handbag- sized electronic listening device planted by CIA agents in a forest near Moscow. The bug was ca- pable of picking up Soviet microwave transmis- sions and broadcasting them to an orbiting satellite. The device was concealed in a fake pine tree stump. This stump was then deposited by the apparently arboreally ignorant agents in a grove of aspens-which sadly (for the CIA) excited the suspicious attention of Muscovite tree fanciers out for a walk in the woods. Whether doomed to such SNAFUs or not, a system that relies on machines of ever greater complexity is bound to engender grim pyramids of bureaucracy. Richelson chronicles the luxur- iant proliferation of interagency committees like COMIREX (Committee on Imagery Re- Continued Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 'j quirements and Exploitation), which was born of COMOR (Committee on Overhead Recon- naissance) and which adjudicates on the thorny question of which among the different agencies gets to use satellites when and for what purpose. The organizational complexity of the intelli- gence community is so dense these days that fledgling CIA analysts spend much of their early careers being taught how to navigate the maze of agencies and committees, or, to put it another way, how to be bureaucrats. Vastly expensive, dominated by machines that demand the services of armies of managers and accountants, geared, as Melvin Beck aptly observes, to conducting "operations for oper- ations' sake," modem intelligence has come to resemble modem medicine. It is hard to say exactly how this came about, but it probably began on the very day the Truman Administra- tion decided to institutionalize and fund a huge peacetime intelligence organization on the alto- gether spurious grounds that it was vital to U.S. security. The fact that the United States had become the dominant world power was certain- ly no justification for the move. Despite an as- siduously maintained myth to the contrary, Britain got along quite nicely without an intel- ligence community for most of the time it was Top Nation. As Nigel West informs us in M 16, his study of British intelligence in the years be- fore World War 11, the British Secret Service was not created until 1909, or long after the empire had been established and secured. But back to the medical analogy: the medical-indus- trial complex-promotes itself by giving away ar- tificial hearts while infant mortality rates in the ghettos continue to be high; the intelligence- industrial complex advertises its surveillance satellites as being able to read license plates from outer space, but has to learn about the death of Yuri Andropov from the Moscow cor- respondent of the Washington Post. In both areas of 'endeavor the ends, be they a healthy populace or well-informed policymakers, exist only to justify the costly and bureaucrat-inten- sive means. It is therefore a huge relief to read about the dawn of machine intelligence and be brought back to a simpler era. In Enigma, Waldyslaw Kozaczuk tells the story of the tiny group of Pol- ish mathematicians who broke Enigma, the machine for enciphering communications that was developed by the Germans before and dur- ing World War II. Marian Rejewski, Jerzy Ro- zycki, and Henryk Zygalski were recruited to work on codes and ciphers by the Polish.Gener- al Staff because they were exceptionally bril- liant mathematicians. Not only did they discover a method for reading Enigma (at a time when British cryptanalysts had given up the task as hopeless); they also devised what amounted to a primitive computer, which helped with some of the necessary calculations. (They christened their machine "the bombe" after a particularly delicious chocolate pudding they happened to be consuming in a Warsaw restaurant when they had theed idea.) intelli- gence codebreakers supplied perfect gence about the disposition of the German in- vaders to the Polish high command-and to absolutely no effect. They then escaped via Ru- mania to France. After the fall of France in June 1940, they embarked on one of the most extra- ordinary operations in the history of intelli- gence gathering. The Polish codebreakers, together with a group of exiled Spanish Repub- lican cryptanalysts, were put to work by the Re- sistance in a lonely chateau dubbed CADIX near Nimes. There they calmly intercepted and deciphered the secret messages of the German forces. Naturally, they could not litter the country- side with large antennae for intercepting radio transmissions. So Colonel Gustave Bertrand, a French intelligence officer and the Poles' pro- tector, arranged for tNe collaborationist Vichy government's listening posts to intercept Ger- man transmissions and pass them onto the cha- teau. In addition, the Poles strung aerials from the chateau's roof. Thus equipped, they were able to pick up high-level German communications from as far to the east as Russia and from Rommel's forces in distant Libya. As the estimable Colonel Ber- trand later pointed out, the success of the oper- ation demonstrated that "even with limited resources, given a team of determined people, in this field one can attain such goals as one wishes to set oneself"-a statement which would certainly sound foreign to the denizens of today's intelligence palaces sprawled around Washington, D.C. The cryptological cottage industry went out of business when the Germans occupied Vichy France in November 1942. The Poles fled just ahead of the Wehrmacht and made their way, via an internment in a Spanish jail, to England. But when they finally arrived there, in July 1943, no one wanted to be reminded that these nondescript refugees had originally provided the key to the otherwise impenetrable German ciphers. Just before the war broke out in 1939, the Polish government had given the secret of the bombe to the British. It was Poland's contri- bution to the alliance, passed on in the hope of winning favor with more powerful partners. The British radio intelligence operation had by 1943 become a big business centered on Bletch- ley Park, outside London, where thousands of Continued Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 men and women decrypted and translated Ger- man signals. Vital to the effort were hundreds of bombes, although the female naval personnel who tended them had no idea from where the name had come. The month before the Poles landed, the panjandrums of Bletchley Park had seen off a high-ranking U.S. military intelli- gence delegation, which had been tremendous- ly impressed by what it was given to believe was an exclusively British achievement. Bletchley Park, with its access to the German machine ciphers, was vital to the British war ef- fort. Its information gathering was of course crucial in fighting the Ger- mans. But it was also a major contribution to the alliance with the Americans- one that could he set against the undeni- able fact that by 1943 the United States was supplying most of the men, weapons, and mon- ey for the War With Germany. Thus the role of the Poles in making Bletchley Park possible was something better not discussed. This is made mournfully clear in the dense volumes of the offi- cial history of British intelligence in World War I l edited by F. H. Hinsley (himself an alumnus of Bletchley Park). Hinsley is de- cidedly sniffy about the Poles' contribu- tion to the breaking of Enigma, suggesting that their help was purely marginal: "the British bombe was of quite different design from the Polish and much more powerful." The Poles were consigned to an intelligence unit attached to the Polish exile army, and were not allowed to work on Enigma. After the war, Rejewski returned to Poland and lived in rea- sonably comfortable obscurity until he died in 1980. Rozycki died during the war, while Zy- galski stayed in England and worked as a lectur- er at Battersea College until his death in 1980. They had been victims of the fact that, since intelligence imparts the power to define reality for other people, states will guard their right to exclusive possession of that power very jealously indeed. Despite his relative reticence on the subject of the Poles, Hinsley offers a great deal of fasci- nating material about the operation of the first industrial-scale machine intelligence system-a system which, like its bloated successors in the United States today, depended on the enemy's use of machines on which its own machines could eavesdrop. Volume 3, for example, re- counts the instructive story of what happened to British intelligence gathering on the German antihomber defenses once the Germans stopped using radar to detect the Brit- ish bombers. Radar, which is essentially a radio transmitter that waits for an echo of its signal off a target, can be lo- cated and identified. By the end of 1943, however, the Ger- mans were tracking the British bombers' simply by listening for all the electronic noise coming from the planes' own navigational and de- fensive radars. Since the British had nothing to listen in on-you can't listen for a radio receiv- er-they had no idea how the Germans were shorting their bomber squadrons out of the night skies. The British were naturally reluc- tant to accept that all their elaborate antiradar devices were not only useless but actively dangerous, since they acted as beacons to attract the Germans. Ernest Volkman touches on the same phe- nomenon when he discusses the less than com- prehensive intelligence on the Iran-Iraq war being garnered by the United States. He reports in his book that the Iranians have been foiling the best efforts of American electronic espio- nage by sending sensitive military communi- cations by hand. The United States faces simi- lar problems in El Salvador, where the guerrillas no longer transmit much useful information by radio. The many and obvious failings of sophisti- Continued Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9 L, cared machine intelligence systems are bound to generate nostalgia for the certitudes of old- fashioned spying. Volkman makes this his bot- tom line, concluding his book with a good deal of harrumphing about the need for HUMINT, that is, Human Intelligence. There would seem to be good sense in this, especially when one contemplates the ever expanding technofanta- sies of the community's bureaucrats. The trou- ble is that HUMINT has just as great a potential for SNAFUs-albeit less costly ones -as the various technical means of gathering intelligence. Moreover, developing the sort of spies who will tell you something interesting-or merely recruiting ones who are not in fact working for the other side-is easier urged than done. In Deadly Deceits, Ralph W. McGehee recounts how thousands of CIA man-years went into re- cruiting one Chinese Communist official, all with total lack of success. It may be that the CIA has been slightly more successful at re- cruiting spies in the Soviet Union in recent years, but Oleg Penkovsky, by common agree- ment the most useful agent the CIA ever pos- sessed, was repeatedly rejected when he first offered his services and got in only on the strong recommendation of the more perspicacious (or hard-up) British. And yet this thought lingers: perhaps the community has no desire to find good spies-or even to monitor fine-tuned machines. The plain truth of the matter is that HUMINT and COMINT and ELINT and all the rest are really only elaborate covers for the most important source of all. IMAGININT. Though the role of "creativity" may be carefully obscured by the agencies, information about its operation does occasionally leak out. In September 1982, for example, the House Intelligence Committee published a report on U.S. intelligence activi- ties in Central America. The report discusses a "major intelligence briefing based primarily on an analysis of sensitive intelligence" that was delivered to the committee in March 1982. One of the forty-seven "viewgraphs" contained in the briefing, titled "Guerrilla Financing (Non-Arms)," suggested that the Salvadoran guerrillas were receiving money in addition to weapons, showing a total of some $17 million annually. The report explains how the "$17 million" figure was arrived at: This resulted from an extrapolation which, as out- lined by the briefer, seemed particularly tenuous. It was based on a single piece of evidence indicat- ing the monthly budget Ifor the Salvadoran guer- rilla) commander on one front. The extrapolation would have required that figure to be representa- tive of the budgets of the other four factions, and all five factions to be equally active on each of the five fronts. In a question for the record, the Committee asked about these assumptions. In its response, the intelligence community said it was unable to com- ment on whether the original monthly figure was representative, and instead explained that the bot- tom line of $17 million which appeared on the briefing slide was "not an estimate" but was in- tended only to indicate that "relatively large sums of currency" were going to the guerrillas. Experienced observers can spot traces of IMAGININT all through the official news these days, especially the news on Central America. Former CIA analyst David MacMi- chael has revealed that IMAGININT is the only source of intelligence on what President Reagan has decreed to be the "flood of arms" from Nicaragua to El Salvador. John Horton, the CIA's National Intelligence Officer for Lat- in America, resigned last year after being called on the carpet for his dereliction in not consult- ing IMAGININT while working on an impor- tant paper. The lack of IMAGININT input made it impossible for him to realize that Mexi- co was then on the verge of revolution. All this is not to say that intelligence agen- cies behave in this manner as a result of an im- mutable law of nature. In the wise words of Colonel Bertrand, "A team of determined peo- ple"-preferably small-can actually make the truth official. This was indeed the case with sec- tions of U.S. intelligence during World War II. But such determined teams are hard to find these days. It has long been a truism of intelligence anal- ysis that the information jigsaw can be put to- gether only by using all sources. Estimates of the movements of the Soviet leadership, for exam- ple, can be based both on a supersecret program to intercept their car-telephone conversations and on their appearances in Pravda. It is also a truism, or at least it should be, that the most inspirational source for an intelligence agency these days is the one that tells it which way the political wind blows. Which brings us back to our weatherman. ^ Declassified in Part - Sanitized Copy Approved for Release 2012/01/20: CIA-RDP90-00965R000201170014-9