"AMERICAN SECRET INTELLIGENCE: PROBLEMS OF POLICY, ORGANIZATION AND CONTROL," BY HARRY HOWE RANSOM, VANDERBILT UNIVERSITY

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80R01580R001603320030-6
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
34
Document Creation Date: 
December 23, 2016
Document Release Date: 
May 9, 2013
Sequence Number: 
30
Case Number: 
Publication Date: 
September 7, 1962
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP80R01580R001603320030-6.pdf1.72 MB
Body: 
Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 SUBJECT: Speech by Prof. Harry A. Ransom of Vanderbilt University at the Meeting of the American Political Science Association On b September 1962, the American Political Science Association presented a panel discussion entitled "The Right and the Left Hand of Gov- ernment. " Thia was one of several panels in connection with the Associa- tion's annual meeting which was being held in Washington. The panel was chaired by Mr. Field Haviland of the Brookings Institute. A paper entitled American Secret Intelligence: Problems of Policy, Organization and Control was presented by Prof. Harry Howe Ransom of Vanderbilt University. It will be recalled that while he was associated in 1958 with the Defense Policy Seminar at Harvard University's Graduate School of Public Administration, Prof. Ransom published his book entitled Central Intelligence and National Security. The second formal paper presented to the panel was entitled "The Analysis of Cold Warfare by Prof. Andrew 1V1. Scott of the University of North Carolina. A copy of Prof. Scott's paper is attached. In introducing Prof. Ransom, Prof. Haviland stated that Ransom had had considerable experience in the field of intelligence ae a practical con- sultant and as a scholar. In his remarks, Ransom stated that he had never been a consultant to intelligence agencies, taken a pay check from them, or had access to classified information, a denial which is also included in foot- note 7 to the Ransom text. In view of these statements, it ie difficult to understand why the Washington Post indicates that Ransom served in Mili- tary Intelligence from 1946 to 1956 (7 September 1962, page BS). At his pre- sentation to the panel, Ransom, in effect, presented a condensed version of his prepared speech, the full text of which is attached herewith. He opened on a jovial note by stating that if there were any CIA men in the audience they might want to leave, because he would be discussing secret information. He then went on to say that it was presumptuous for him to discuss C1A, as he had never been in the building. He then went on to~quote the inscription that he had been told was on the entrance wall and followed this up with a quotation (page 1 of text) which he designated as coming from "a CIA public relations brochure. " The point he tried to make was that if 'ire shall know the truth and the truth shall make you free, " it follows that as CIA refuses to give out any information to the public, the public cannot be free, because Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 it is not permitted to know the truth. He then went on to make the point that, nevertheless, students of government should make an analysis of the intelligence function and quoted what he describes as "Ransom's Law" which states that it is all right to talk about intelligence as long as you don't know anything about it. The thrust of the Ransom text is that the existence of a large secret organization createe problems, particularly as a potential force of invisible government (pages 1, 3). On the other hand, he states that "America cannot do without an intelligence apparatus" (page 3). In Ransom's text, he stresses heavily the possible role of intelligence in formulating policy, stating that "An agency charged with supplying secret information about the state of affairs . obviously can be a source of great influence is the policy process. Yet the rapidly changing, in- creasingly complex nature of world politics seems to be leading to more and more Intelligence influence in national decisions . (Page 5 of text. ) In this connection he then cited the situation in Laos, stating that the "tragi- comic opera that.ensued can be laid in part to poor information, supplied by the C1A, which produced faulty policies in Washington for nearly a decade. " (Text, page 6.) - In his discussion of CIA''s Congressional relations, Ransom makes the point that Congress voluntarily walled itself off from information on CIA by the authorities it wrote into the CIA statutes and "that the Executive has not usurped monopolistic control of CIA. Rather Congress voluntarily delegated extraordinary control to the Presidency. Congress handed to the President a kind of blank check authority regarding secret intelligence. " (Text, pages 10-15.) Ransom also discussed the various boards sad com- missions which have looked into CIA. He dates the Dulles Survey in 1951 rather than in 1948, citing it as "the springboard'Ior Dulles" entry into the CIA. The President's Board of Consultants he described in his talk as rather like a "polite alumni visiting committee. " Thus, Ransom concludes that the public's interest in CIA is represented by the President and the National Security Council, the President's Board, our Congressional sub- committees, and the special investigating groups. He then asked the ques- tion in his talk whether this was adequate oversight and concluded that there should be a more independent check, preferably by a joist Congressional Committee on Intelligence. He subsequently remarked is his talk that Congress might well overhaul its own structure and establish a joint committee on na tional security, of which Intelligence might be asub-committee. Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 r One point which Ransom made in his talk was the necessity of sepa- rating the information services from espionage, although not necessarily putting them in different departments. He referred to this point more than once but always on a very confused basis. One point which Ransom emphasized strongly in hie talk was that CIA's leadership must not succumb to the temptation to mount the public rostrum. He noted a great improvement in this connection in the new regime. He then listed the awards which Mr. Dulles had received in 1961 and stated that he should have refused them all. The DCI, he felt, must not become a political figure and Mr, Dulles was out of hie element in making public speeches. Prof. Scott's paper and his condensed presentation of.it at the panel were both highly theoretical, and subsequent panel discussions hinged largely on two factors. First, the absence of an adequate definition of "cold war, "which was defined in these discussions as an area between war and peace, and second, Prof. Scott's contention that the cold war is a poet World War II development. This latter point was hit not only by the panelists but by participants from the audience who cited all sorts of early historical incidents of cold war type activities. Prof. Scott took the position that, of course, there had been these earlier historical events, but that the point he was making was that they had never been of the size and scope and scale of what was necessary at the present time, where even a small country could perhaps bring havoc on a larger country through cold W8r act1V1t1C a. Following the presentation of the two main papers, the three "Dis- cussants" were introduced to make remarks and to participate in replying to questions from the floor. The first of these was Walter Millis, former- ly Chief Editorial Writer of the New York Herald Tribune and now associ- ated in California with the Center for the Study of Democratic Institutions, which is headed by Robert M. Hutchins, formerly president of the Univer- sity of Chicago. He severely blasted various elements of Prof. Scott's speech and deplored Winston Churchill's creation of the phrase "the cold war," (Did he not mean the iron curtain?), which he claims did~a great disservice in that it militarized almost everything in the field of inter- national relations ever since. When i~t: came to a discussion of Prof. Ransom's paper and intelligence, Millie was surprisingly mild. He first questioned whether it was really useful to discuss the gigantic intelligence organization in terms of cold war, as he felt that CIA would be is existence whether or not there had been a cold war. He pointed out that, while some people felt that C1A was in existence because of cold war problems and the actions of the Soviet Union, actually the establishment of CIA had sprung Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 Y U out of shortcomings shown by World War II before the cold war had crystallized. (In support of this point, he strongly recommended a book entitled Pearl Harbor: Warning and Decision by Roberta Wohletetter, which he elated gave the best analysis of the role of intelligence Millis went on to state that there are obvious perils and difficulties in establish- ing democratic controls over an intelligence organization but that he was not competent to pass on the remedy'suggeated by Prof. Ransom. He was doubtful that you could separate the various intelligence collection and es- timating functions into separate organizations because, in hie opinion, intelligence must have an operational capability and be able to act on the basis of clandestine information. He, therefore, tended to fall back on the principle that you must back up the chief of such an intelligence organiza- tion and that if you didn't you should fire him. He also disclaimed compe- tence to comment, on Ransom's proposal for a joint Congressional committee ;orb on the possibility of strengthening the State Department, which could then exercise some greater measure of control over intelligence. However, he felt personally that people tended to over-value intelligence and that perhaps it didn't need quite as much secrecy as it was given. The second Discussant was Prof. Paul Blackstoek of the University of South Carolina who was formerly a member of the staff of the Office of the Chief of Special Warfare of the Department of the Army. Prof. Biack- stock stated that he wished to talk on covert operations on the basis of material previously cleared both at DIA and CIA and he very much left the impression that he had "been in it. " He stated that, in this field, the problem of documentation for the political scientist was very difficult and that, as far as covert operations were concerned, nothing serious had as yet been published. Prof. Blackatock pointed out that there was abuilt- in possibility in an intelligence organization of polit:y:?sabotage and that there was no effective counter to this. He cited two examples -Laos and Cuba. He felt that only when a covert organization got an independent mili- tary and logistical support function was there a real danger and that this was not likely to happen in America, particularly after Cuba. On the other hand, he cited with die approval what he felt to be the built-in orientation of the foreign service officer who was not "combat minded" but was much too prone to negotiate or seek solutions. By "combat minded" he was thinking in terms of mental toughness to face up to problems. He then cited the fact that the British, for 400 years, had had its covert operations integrated into the Foreign Office but that this still raised problems of in- dependence, and that these problems became very tough when an independent agency Beta operational functions. Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 _ ~ The third member of the "Discussants" group was Prof. George S. Pettee, the author of a 1946 book The Future of American Secret Intelli- gence. Prof. Pettee was formerly a member of the staff of the House Foreign Affairs Committee and the Army-supported Office of Research Operations at Johns Hopkins University and is now with the Research Analysis Corporation, also supported by the military. Addressing himself to those speakers who had urged the need for greater public information in the intelligence field, Pettee pointed out that he could not advocate diplo- macy in a goldfish bowl or support those who advocate that nothing should be secret from the press. ("How many people, " he asked, "knew that the Washington Post would buy the Washington Times Herald the day before the sale? ") He also cited the old slogan that Macy's doesn't tell Gimbel'e and that individuals and corporations had a certain right of privacy on the one hand, and that you must have a certain amount of secrecy in intelli- gence on the other. He felt that people had a tendency to think only in black and white and thus to polarize secrecy on one hand and the people's right to know on the other. But, Pettee pointed out, this was only a way of thinking and not because it was the way things actually were. He stated that the problem of control of secrecy in the Government was twenty years old and that it had been wrestled with by such experts as the late Senator Brian McMahon in connection with atomic energy. He said many, including himself, had been concerned in 1945-6 about salvag- ing acentral intelligence organization before demobilization reduced it to zero. He thought that outsiders who arc deprived of information are over- conacioua about it, including those who write books about intelligence. He also felt that there were more checks on intelligence than people sometimes felt, citing the Congressional committees who are privy to our information and who, in effect, can take responsibility on behalf of the electorate. Fur- thermore, he said that there are many scholars who have one foot in the secret world and the other foot in the scholarly world, including consultants and members of organizations such as RAND and RAC. Insofar ae a joint Congressional committee oa intelligence is concerned, he felt that it was an idea worthy of exploration, if only to get some final determination of accept- ance or rejection of the idea and lay it to rest, The questions from the floor dealt almost exclusively with the quea- tiona raised by Prof. Scott's paper. The two queationa dealing largely with intelligence were both asked by foreigners. One was an Asiatic (either from Manila or Southeast Asia) who was difficult to understand because of his accent. Thin gentleman urged more accurate ways of securing informa- tion, felt that there were many defects in a large intelligence organization i Declassified in Part -Sanitized Copy Approved for Release 2013/05/09 :CIA-RDP80R01580R001603320030-6 p C ) (mentioning something about corruption in a bureaucracy and servant taking over the master) and that CIA appeared to be using too many Central Europeans in its anti-Soviet work and too many anti-Castroitee for esti- mates oa Cuba, which resulted in built-in biases making accurate intelli- gence estimates impossible. The second foreigner identified himself as a former Israeli intelligence officer who asked why everybody insisted on scrutinizing everything and stated that secret operations must be secret. Prof. Ransom then agreed on the need for secrecy but questioned whether we had adequate control mechanisms so that we could go forward in secrecy. ' In summation, I came away with the feeling that this had all been a battle of adjectives - "secret" bureaucracy, "invisible" government, "gigantic" size of the intelligence organization. The main thesis insofar as intelligence was concerned in these presentations was the desire of the political a cientiat to know what was going on in a "gigantic" organization which admittedly had to operate in secret but which needed some control, the nature of which the political scientist was unable to determine. a ter o eim r . ~ STAT Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 s~ i i AN.ERICAIIi SECRET INTELLIGENCE; PROBLEISS Or FOLICY, ORGAidIZATION AND CONTROL Harry Howe Ransom Vanderbilt University 'rrepared for delivery at tho 1962 Annual Meeting of The Amerioan Political Science Association, Washington, A.C. Mayflower Hotel September 6, J.962 The Cold War role of the United States produces hazards for the American democratic system. Numerous paradoxes stem from conflicts bettreen security and liberty. The Central Inte'llig'ence Agency offers a particular paradox.. To illustrate, note an interesting contrast. At the entrance to CIA's new headquarters building near Washington is the Biblical inscription: "Ye shall lcnoY~r the truth and the truth shall make you free."1 Were he permitted through the entranco so decora- ted, s seriously inquiring citizen would, however, soon dis- cover the agency~a operating principles: . the Central Intelligence Agency does not con- firm or deny published reports, whether good or bad; never alibis; never explains its organization; never identifies its personnel (except for a few in the top echelons); snd will not discuss its budget, its methods of operations, or its sources of information.2 So that you, as far ea CIA's ma.nagera are concerned, cannot in fact ltnocJ "the truth" e.bout a very large, expensive, and increasingly important government agency, the directorship of which has been described s.s "second in importance only to the President."3 It follows from CIA's favorite Biblical saying, then, that neither ca.n you be free. Such an infer- ence prompts our concern hors. The existence of a large, secret bureaucracy, sometimes pivotally important in tusking and implementing national policies and strategies raises special problems. At the level of democratic ideals, the problem is the existence of a poten- tial source of invisible government. This is not a problem unique to secret intelligence in the American system; it is but ? one aspect of the conduct of foreign affairs in a democracy. Yet in degree it is one of the moat serious. The problem raised atythe level of representatives of the people - Executive and Legislative - is primarily how to control discreetly A dimly seen instrument, so hot that if not handled with great s1ci11 it can burn its user rather than its adversary. The problem for the scholar la accoea to verifiable information for objective analysis. The secrecy officially proclaimed by the CIA and af- filiated intelligence agencies, and required by the statutes establishing them, quite obviously has not been absolutely Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 . ~ ~ (~ ~ ~ Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 Secret Intelligence maintained. Arerica's open society, particularly the separa- tion of gover~nm~hta'1 powers, the pluralism of the adminiatr?a- tive bureaucracy; and a free press, have made complete secrecy impossible. Journalists and scholars have been able to pro- duce ~ considerable amount of literature, much of it specula- tive. The volume has increased as a result'of a aeries of misfortunes or misadventurea in recent yeera, particularly tho U-2 incident, the d.efectiorr to Moscow of two National Security Agency employees, and the abortive attempt to invade Cuba. To an unprecedented degree these events removed, temporarily at lee.st, the cloe:t of secrecy. Even with these bizarre dis- closures, however, our view remains a partial one; the 'truth" remains elusive. One simply cannot apply to this subject the . usual rigorous standards of data gathering and documentation. Cvncedely, the sub,Ject may not be "researchable" by these standards, The purpose here is to analyze, within these limita- tions, some of the problems and dilemmas presented by the ex- istence of a secret intelligence apparatus in a democratic society. Some say this is not a aub~ect fit for public discus- sion. Senator Henry M. Jackson has stated that "details with respect to intelligence should not be discussed on the floor of the Senate" because it "may be unwittingly giving; aid and comfort to the onemy. .~'5 Prosidant Kennedy, in a message to Congress in 1961, said intelligence "ia not a matter on which public discussion la useful.' Admittedly, government leaders or officials with legitimately secret information should 'not discuss it publicly, Students of government must, however, analyze any source of power within government to the extent that such analysis ~an proceed outside of the boundaries of classified information, Disclosures in recent years make it clear that the large secret intelligence apparatus now maintained by the government can have a profound impact on the quality and effectiveness of America's role in international affairs. Certainly the existence of such an apparatus creates problems of policy, organization and control. These problems arise largely because CIA?a three mayor functions - the collection of information, the analysis, interpretation and production of this mesa of data into ''intelligence," and cle.ndestine political operations overeoae - are ell secretly performed. In gathering information, Intelligence8 must have the objectivity and detachment from policy that will assure the moat forthright possible reporting on world affairs. But this detachment should not bo such that Intelligence either develops its osan policy prefer encea or loses contact with the informs- . tional needs of the policy r~iakers. In its informing function its duty is to report the objective facts without regard to whether they spell good or bad news for existing policy pre- Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 . n _ Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 . - ~..~ _ 3 _ Ransom Secret Intelligence ferences, but with appropriate regard for the meaningful policy alternatives, In its operational (political warfare or over- seas counter-intelligence) missions Intelligence must serve always as an instrument of foreign policy, and never be allow- ed to make its own foreign policy. Knowledge, hocaever, conveys power. Secret knowledge ca.n beco.^.!e secret power. A secret intelligence?apparatus, claim- ing superior knowledge from undisclosed sources, and operating - because of legitimate secrecy c'laima - outside the normal checkreins of the American governmental system is a potential source of invisible government.-"Invisible power ca.n be wield- .. ed either- in~-the policy making process or in clandestine opera-- tions in other countries. The American democratic system, on the other Yiand, is inspired by the ideal of visible, identifiable power, subject constitutionally to the checks and balances of popular govern- ment. In pursuit of this ideal Congressional representatives of both parties are obliged to oversee and utlimately"legiti- mize the executive power of government. Congress should act both as the public's'eye'and the public's purse. But without adequate information, the people's representatives would re- semble rich blindmen at the mercy of persuasive suppliants. Con~reas cannot perform effectively'ita important role with regard to any governmental function, the scope and operations of which are mostly invisible. Obviously, America cannot do without an intelligence apparatus. S?7orld-wide responsibilities and commitments of the Jr~ited States require a system for keeping the complex details of world affs.irs under constant surveillance, sometimes by eapionee?e or other techniques of the clandestine "bla.ck arts." These F.re of course ancient instruments of power and policy in international affairs.9 In addition to an enormous end growing need for information, America's new world position also re- quires e.n instrument for counter-intelligence and secret poli- tical action overseas, although its proper use must remain a troublesome question. National policy decisions will be based increasingly upon predictions of foreign political, eoonomic and military trends P.nd developments next week, month and year, and five to ten or r^ore years hence. This fact offers both a challenge to Intelligence and an opportunity for it to exercise ma,~or in- fluence in decision making. The need to make the most economical use of finite reaoureea in implementing long-range national and foreign policy obJectivea also places heavy re- liance on intelligence estimates. As a result, the intelligence system ie called upon to answer avast range of questions. S?a'hat is the future of the NATO alliance? what course will Sino-Soviet relations take? 4that will be the course of the Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 . n Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 new nationr~lis;_is in various regions of the globe? 4Jhat will be the probable consequences of various possible foreign policy actions? The a.nsvrcrs to these can be obtained, if at all, only by a. massive research effort and sometimes only by illegal methods. The.Vride-spectrum of~information required to' _sup.pl-y ansvre"ra- explains, in addition to any bureaucracy a tenflency to amoebic growth, the rapid increase in the size and cost of Intelligence since 1~iorld War II, so that certainly Sts annual budget and perhaps the number of its employees exceed those of the Department of State. Accurate intelligence information, rapidly transmitted, is also an absolute requirement for an effective strategy of deterrence to rrhich this country ha.s committed itself. Stra- tegic striking forces must have accurate data on potential enemy tar,ets. ?Essential elements of information? ea indica- tors of a potential enemy~a military position must constantly be available to thwart either an enemy~e possible surprise knockout bioYr or his attempts to use claimed striking power for diplomatic blackmail. With hundreds of mega-death inter- continental missiles positioned for attack, Intelligence as- sumes a terrifying role of informational responsibility. Nuch essential military and political information le held in tight security by national governments, particularly those behind the Iron and Bamboo Curtains. Comparable infor- mation is freely available to the Communists for the asking from Americana relatively open society and from our a111ea.10 This creates a serious strategic imbalance. It can be argued that the espionage requirements of the United States are greater than those of the Soviet Union. i A policy maker must contend with three maJor questions in reaching a mayor decision; First, What are the policy objectives or goals being sought? t9hat are the risks or pro- bable costa in seeking them, in terms of alternative values which might have to be sacrificed? In other words, if a per- tain value is placed on military security as an objective, must, in seas calculable degree, other policy ob,Jectives be sacri- ficed, such as self-determination end economic development? Second, what are the pressures and forces likely to shape world effaire whatever course of action is adopted? Put another way, what are the calculable facts and the most pro- bable trends in ~?rorld' affairs? Third, how may one sasses the potentialities and limitations of the alternative instruments by which the environment may be influenced in the most favored direction? Tn other words, with national ob~ectivea and world trends in mind, how can be beat go about attaining our ends? Traditionally, the intelligence services are concerned Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 5 - Rs.naom Secret Intelligence only v;ith the second of these end not faith national value a, ends or means. Yut they ere all inextricably entwined. hiax :!illikan, trho served as an assistant director of the CIA in the early 19$Os, illustrated the problem when he said, dis- cussing predictions of Russian developments: A study of what is happening in Soviet society trill be useful to the policy maker only if it' is written in the "light both of what he would like to ':lave happen there and of the inatruinenta he can use to affect what happen e. Equally, he cannot even state his goals o'r enumera.te his in- atx~uments with clarity except in terms of an iin- pllcit or explicit theory of Soviet evolution.jl An agency charged with supplying secret information about the state of affe.irs in, say, the Soviet Union, obviously can be a source of great influence in the policy process. For ex- ample, to assume that the U.S.S.R. is "mellowing" in its ob~ectivea calls for one American foreign policy; quite another if one assumes that she intends to conquer the world soon, either by surprise attack or otherwise. There are, to be sure, checks on the growing influence of secret intelligence. These checks exist in the American governmental system, in which long-range policies or maJor shifts in existing policy are determined normally only after an elaborate consensus-building effort. An intelligence estimate, no matter whe..t its assumed degree of accuracy, can- not alone determine mayor policy outcomes. Yet the rapidly changing, increasingly complex nature of world politics seems to be leading to more and more Intelligence influence in national decisions. The senior intelligence`profesaionals in the inter-departmental policy planning units, though in theory they "advise' and do not "recommend," already have come to have great influence. And since intelligence profesaione.ls are usually more permanent members of the advisory and policy planning units than are representatives from tho State Depart- ment or the armed servlcsa, who are constantly "rotated" through such assignments, their prestige and influence in- crease all the more. The Laoa affair is a good example of the potential pow- er of suppliers of "blue-chip" information to government policy ma_yera. Early in January 1961 the United States gov- ernment publicly disclosed "hard evidence" of Soviet Russian and North Viet Nam participation in what the State Department in Washington announced as "Communist military operations a.gainet the Royal Lao Government and Lao people.ii12 T.he State Department Segued a detailed chronology of the "illegal Soviet and North Viot Nameae airlift into Lana," even listing the registration numbsrs of the aircraft, which, it said, were also.used by Russia in the Congo in the previous year. Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ..~.. O ~ r Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 Ransom Secret Intelligence This announcement came at a tine when most United Ste.tes' allies in the SouthePat Asian defense compact (SEATO) . ore re mFl:ing knorm their doubts that such evidence existed. . In fact, the Associated Press reported from Bangkok two days later that "many United States dipiomate in Asia ~hioh in- cluded men in Laos and neighboring Thailand? doubt the charges of their or;n government that substantial numbers of outside Communist forces have intervened in Laos. .One Ylestern diplomat said it appears United States diplomats and intel- ligence agents are uispatching conflicting reports to Washing- ton and the CTA rigporta have gained credence in the United States capital." jj S4hatever were the truefacta, it is clear that informs-? tion can be decisive in determining United States reaction to events. This reaction, in turn, has its impact on the situa- tion. Tn the Laos case this has been demonstrated since 195w, when Lsos ryas created out of a fragmented Indo-China, leaving behind in the tiny Laotian kingdom unreconciled pro-Communist Pathet Lao rebel forces. Tlie tragi-comic opera that ensued can be laid in part to poor information, supplied by the CIA, o~hich produced fsulty policies in t9ashinaton for nearly a decade. Specifically, in one episode, a decision was made to support Gen, Phoumi 1Qosovan, apparently on the principal ground thst he was anti-Communist. But ae it turned out he eras politically unpopular in Laos, and his army nearly worth- less. This policy had to be abruptly chane~ed. Inadequate or misguided policies, in turn, aggravated the situation in which the United States; because of basic misunderstanding of the true alternatives, was again backing the wrong regime. The coat to the American taxpayer ran into the hundreds of millions of dollars: The chief beneficiaries appear to have been the Communists, who appeared to be closer in touch with the resli- tiea. Responsibility all along for policy ob~ectivea was the President's and the State Department's. Yet policies could be no better than the information on which they were based; their implementation no better than the undercover political instrument for this purpose - the CIA. A_seoond example of the importance of in- telligence is the decision made by President Kennedy in 1962 to reaizme nuclear testing in the atmosphere. The decision hinged, finally, on evidence of Soviet progress in nuclear and weapons technology; Since this secret information could not be precisely known, it was the task of Intelli ence to make an "estimate." Quite obviously the nature of this estimate was pivotal in the decision to resume teats. The ultimate power and the ultimate restraint of democratic government is an informed electorate. While it mould make no sense to publish information about legitimately secret intelligence or overseas covert operations, the principle must be main~ained that the citizen, or at least hie repreaenta- Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 - - - ~~- Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 V Ransom Secret Intelligence tives, needs to be P.s completoly informed ae possible. A corollary requirement is that the citizen must know something of the source and the process by o.*hich intelligence is pro- duced. There ought to be a m~.nimuri of public confidence in the professional competence of the intelligence aervicos, end an assurance that the intelligence syate;^ ia~under the firm, constant and purposeful control of responsible political authority. This confidence was badly shattered in recent years. The product generated by the vast mac~iinery of a loosely-confederated "intelligence community" W is distributed according; to a governmental 'need to know" concept. With a few exceptions neither the intelligence product nor the system's organization, functions and coats era matters of authenticated public record. Herein lies n problem for democratic govern- msnt. The rationale for aecrecy.is that intelligence activi- ties are particularly sensitive in three mayor respects: First, sources of certain types of data would immediately ''dry up" if disclosed. Second, espionage and other illegal forms of information-gathering should not be officially ac-- knorrledged as a governmental function. In the intelligence tradition, governments always strive to be in a position to ?plausibly disavow' espionage. Avowal by top United States cfficials, in I~4ay 1960, of U-2 espionage flights over Russia sharply violated this precedent. Third, secrecy must also en- eelop underground political actions, which since 1947, also have been within 'the jurisdiction of the CIA, although such activities, strictly specking, are not a positive intelligence function but rather a "strategic service." Inevitably and perhaps logically, the Executive Branch' monopolizes the control bf information on all these activities, and trithin the Executive, the intelligence community has its own inner-circle monopoly on information. This inner-circle can dole out intelligence reports or information on clandestine activities to groups or individuals having, in the opinion of leaders of the intelligence establishment, a need to know. Although intelligence reports and estimates go regularly and routinely to important decision-making units, their flow ie tightly controlled. Information on some sources and some activities, it may be assumed, is nevsr communicated beyond a small inner circle.' Some very high-ranking government offi- cials, it turns out, did not know of the U-2 flights. Often it is argued that many aspects of Intelligence must be accepted on faith. In 1954, Allen W. Dulles declared: "In intelligence you have to take certain things on faith. You have to look to the man who is directing the organization and the result he achieves. If you haven't got someone who can be trusted, or who doesn't get ~esults, you'd better throw him out and get someone else.il Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ? e~ Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ? v = 8 - Ransom Secret Intelligence _-.___. -- ~~ But this seriously contradicts one of the working hy- potheses of denocra.tic government: that you do not neces:aarily ' accept the mane.gement of important foreign-military a.ffaira on "faith." By rrhe.t criterie. can one ~udae such invisible "results" as the role of CIA in ousting Premier idoesadegh in Iran in 1953, its role in the coup d'etat in~Guatemala in 195, in the Hungarian uprisings in 1956, in Laos, in Berlin, and in numer- ous other clandestine activities, some of which apparently were failures? On these specific events, speculation is the only recourse avaliable to the outsider. Indeed, when asked about CIA's role in the ill-fated invasion of Cuba in 1961, the new Director of Central Intelligence in 1962 told enatora he could not anaorer because "I do not have the facts."l~ This situation confronts the American system of demo- cratic govern,^!ent with a two-aided problem: How can there be public control over functions that require secrecy,; and hour can tine effective operation of a two-party ay stem of government be assured when control of the. Executive Branch gives the party in power a potentially exclusive access to essential information in the field of foreign-military policy? Prior to the'i11-feted flight of a CIA U-2 reconnais- sance plane on yay 1, 1960, moat citizens could name only one American spy: Nathan Hale, Now all Americans know the name of rre.ncis Gary Poorer a, convicted as a peace-time spy by a Russian tribunal but unlikely to loin Nathan Hale on the hero pedestal because of the unusual circumstances of his exposure and trial in Noscow. Clearly the cases of Hale and Powers are separate and distinct. Hale was a war-time spy, apprehended while carry- ing~out an ancient mission in warfare: Poorly trained as a spy, but we'll trained as a technician, Powers was carrying out a cold-war mission. He became a paom in international politics. He aras not executed by his captors, even thoup~h he was engaged in illegal activity of a nature most serious to the Soviet Union; he oras in fact released early in 1962 in exchange for a Russian spy '?ield by the'United States. A Board of Inquiry, orhich reviewed his case, concluded that Powers "lived up to the terms of his employment and instructions in connection with hie mission and in his obligations as an American. .r17 Again, the outsider had to accept this verdict on faith. But if Powers' performance had been inadequate due to poor training by CIA, one could never be sure that the CIA was not protecting Powers in order to protect itself. American secret operations - both information gathering and political action - have long been well known to the Kremlin and to sophisticates in Urorld affairs. But such activities on a large scale in peacetime are unfamiliar in the American tra- dition. President Eisenhower expressed a popular sentiment trhen he described espionage as "distasteful." But he also called it a "vital necessity." Taken literally the President vas saying that the nation's life depends upon the distasteful, .i1-4 Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ~ ^ Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 - 9 - Ransom Secret?Intelligence this is so, fesv functions of American government are .of such critical importance. No longer a secret, thanks to the accidents of recent years, are the facts that: eepiona_a_e activities anfl clandestine political action overseas on a large scale and by every possible rr,eans have been an expanding American Governmental function since 194.7; under the cover of weather research and in the ostensible employment of a large private aircraft corporation, American Central Intelligence Agency operatives spied on the Soviet Union frith long-range aerial cameras and other devices bettreen 1956 and 1g60;.and in a le.rge and complex organization comparable in estimated size a.nd coat to the Central Intelligence Agency, the National Security Agency for some years has been operating or supervising a massive network for electronic eavesdropping on adversaries and allies as Drell. 3ut ~~eae established facts represent only the top of the iceberg: Authenticated details regarding American secret intelligence a.ctivitiea must inevitably be conjectural. It is difficult to cite "solid" sources as evidence even for con~ect- ure. One must therefore speal: in vague terms of "undercover political action" and alleged CIA aid to various foreign re- bellions. And one must resort to citing anonymous sources, such as the folloiring comment from a retired foreign service officer of the Department of State: ? every senior officer of-the roreign Service has heard something of CIA's subversive efforts in foreign countries and probably most of them have some authentic information about CIA operations of this nature in some particule.r case. Unfortunately most of these e.ctivities seem to have been blunder- - ing affairs and most, if not all of them, seem to have resulted to the disadve.ntage of the ~J~ited States and sometimes in terrible failure. It is often asserted t2iat CIA he.s its own foreign policy. Little evidence can be brought forth to prove this. The more likely situation Sa that CIA has moved on its own in the face of a policy vacuum. Standard operating procedure is for the Ambassadors on the spot to be fully cognizant and in control of clandestine operations. It is hoped that this principle la forcefully applied and will always be. Any other procedure would be unacceptable. "Civilian control' ie as important here as with the uae of the military instrument for policy aims. Yet certain specific Questions need to be raised re- garding the control and management of secret operations in a democratic system: Y,rho sets the policies for such activities? Should Congress play n role in approving policies and specifio programs? Is existing Presidential and Department of State Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ? e~ Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ~Ranaom Secret Intelligence authority adequate for authorizing, controlling and auditing these 'rrighly sensitive and dangerous governmental functions? Tire Central Intelligence Agency's operations, like those of the National Security Agency, are financed by annual Congressional appropriations. Most members of the national legislature, hoe;ever, until the sensational disclosures of re- cent yezrs, '_znew little about the nature and functions of . either agency, particularly in the realm of espionage and secret operations. They know even leas about the amount of money annually expended. Congress as a whole ha.s voluntarily walled itself off from detailed informs.tion by statutes requiring secrecy at tyre discretion of CIA's Director. In establishing the CIA in 1947, Congress prescribed its organization and functions in general ' terms,'gi.ving the broadest possible definition to "intelligence," a term, in current usage, covering a number of distinctly dif- ferent functions; [tide discretion we.s left to the National Security Council, for which the agency was to work, end to the CIA Director. Congress made the Director responsible for "protecting intelligence sources and methods from unauthorized disclosure." In the CIA Act of 1949 Congress went even further, exempting the CIA from existing statutes requiring publice.tion or disolosure of "the organization, functions, names, official titles, salaries or numbers of personnel employed by the agency.o20 The Director of the Budget was proscribed from ? making the usue.l reports to Congress. The standard procedures regarding the expenditure of public funds were waived, and the Director'8 personal voucher alone is sufficient for''expendi- turea for purposes of a "confidential, extraordinary or emergen- cy reture." The Bureau of the Budget-has since established special revietr procedures for CIA, and some 4j par cent of CIA funds are said to be audited in a regular, albeit classified, manner by the General Accounting Office. The unvouchered funds expended at the discretion of the CIA Director, running to tens of millions of dollars annually, are said to be audited also, but by an ever: more secret process. In 19,56 Congress considered a concerted and responsible move to change the existing system for surveillance by establish- ing a Joint Committee on Foreign Intelligence.. Earlier and less responsible moves had been made in Congress, led by the late Senator Joseph i4cCarthy, to investigate the CIA on charges of "Communist infiltration, inefficiency, and waste.' The more re- aponsible move was led by Senator hiilce A4anafield. With 34 co- ? sponsors, N,anafield introduced a bill to establish a Joint Com.- Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 ? . n Declassified in Part -Sanitized Copy Approved for Release 2013/05/09: CIA-R DP80R01580R001603320030-6 V - 11 - Ransom Secret Intelligence mittee. This bill Trent as far as a floor debate and vote in 1956. But it eras defeated by a 59 to 27 vote, consequent to corlbinc:d opposition of the Executive Branch and senior Senate leaders trho felt they knew all they needed to know about in- telligence operations. Rather than risk public revelation of CIA's operations, a leadinS Senator declared, ? it would be better to abolish the Central Intelligence Agency end, by so doing, to save the money appropriated and the lives?of American citizens.i21 Since that date, each Congressional session has seen the reintroduction of proposals for a Joint Corsiittee, But through 1962, all died in committee. On lday 12, 1960, for ex- sample, the House Rules Cor.~mittee unanimously voted to shelve 17 resolutions ;?rhich orould establish a Congressional committee to oversee central intelligence. In 1961 the same committee de- voted ~:~ore serious attention to the issue by appointing a aub- comr:.ittee to consider whether there should be a special Congres- sional investigation of CIA following the Cuban misadventure in April 1961