INTELLIGENCE FOR NAVAL OFFICERS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85G00105R000100210002-9
Release Decision: 
RIPPUB
Original Classification: 
C
Document Page Count: 
413
Document Creation Date: 
December 15, 2016
Document Release Date: 
December 2, 2003
Sequence Number: 
2
Case Number: 
Publication Date: 
January 1, 1954
Content Type: 
IS
File: 
AttachmentSize
PDF icon CIA-RDP85G00105R000100210002-9.pdf40.65 MB
Body: 
Approved For Release 2003/12/09 : CIA-RDP85G00105R0001 INTELLIGENCE FOR NAVAL OFFICERS Prepared by U. S. NAVAL INTELLIGENCE SCHOOL For BUREAU OF NAVAL PERSONNEL NAVY Declassification/Release Instructions on File NAVPERS 10889 Approved For IlafAigekibg93/ NAVPERS 10889 /09: CIA-RDP85G00105R0001002' INTELLIGENCE FOR NAVAL OFFICERS Prepared by U. S. NAVAL INTELLIGENCE SCHOOL For BUREAU OF NAVAL PERSONNEL 1954 0002-9 CONFIDENTIAL CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL ACKNOWLEDGMENTS The following material is reproduced by permission of the copyright owners: Chapter Page Author(s) Publication Publishers 1 2 J. F. C. Fuller "The Pattern of Future War," Brassey's Annual, The Armed The Macmillan Co., New York, N.Y. Forces Yearbook, 1951. 1 2 "The Living Thoughts of Clause- wits," Infantry Journal. David McKay Co., Inc., New York, N. Y. 1 4 Editor, Thomas R. Phillips Roots of Strategy Military Service Publishing Co., Harrisburg, Pa. 1 11 Omar N. Bradley A Soldier's Story Henry Holt & Co., New York, N.Y. 1 12 Sherman Kent Strategic Intelligence Princeton University Press, Prince- ton, N. J. 1 16 "The Living Thoughts of Clause- wits," Infantry Journal. David McKay Co., Inc., New York, N.Y. 2 19 Editor, Thomas R. Phillips_ _ Roots of Strategy Military Service Publishing Co., Harrisburg, Pa. 2 23 Flavius Vegetius Renatres__ _ The Military Institutions of the Do. Romans. 2 36 Corey Ford and Alastair Mac- Cloak and Dagger Random House, New York, N. Y. Bain. 2 44 Ian Colvin Master Spy McGraw-Hill Book Co., Inc., New York, N. Y. 2 46 Ralph Ingersoll Top Secret Harcourt, Brace & Co., New York, N.Y. 2 49 Corey Ford and Alastair Mac- Cloak and Dagger Random House, New York, N. Y. Bain. 2 58 Donald Robinson "They Fight the Cold War Under Cover," Saturday Evening Post. Curtis Publishing Co., Philadelphia, Pa. 4 99 George F. Kennan American Diplomacy, 1900-1950_ The University of Chicago Press, Chicago, Ill. 4 100 B. H. Liddell-Hart "Strategy", 14th edition, vol. 21__ Encyclopedia Britannica, Inc., Chi- cago, Ill. 4 103 Hugh Gibson The Road to Foreign Policy Doubleday, Doran & Co., Inc., Garden City, N. Y. 4 105 Hugo Fernandez Artucio__ _ _ The Nazi Underground in South America. Farrar & Rinehart, Inc., New York, N.Y. 4 112 John R. Deane The Strange Alliance The Viking Press, New York, N. Y. 4 114 Walter Lippmann In his column, of the New York New York Herald Tribune, Inc., Herald Tribune of Mar. 29,1947. New York, N. Y. 4 121 Roger Hilsman, Jr "Intelligence and Policy-Making in Foreign Affairs," World Poli- tics, vol. 5, No. 1, October 1952. Princeton University Press, Prince- ton, N. J. 5 126 Dwight D. Eisenhower Crusade in Europe Doubleday, Doran & Co., Inc., Garden City, N. Y. 5 145 B. H. Liddell-Hart The Revolution in Warfare Yale University Press, New Haven, Conn. 5 156 H. G. Thursfield "Brassey's Annual: The Armed The Macmillan Co., New York, Forces Yearbook, 1951." N.Y. 10 260 John McDonald "The War of Wits," Fortune, March 1951. Time, Inc., New York, N. Y. 10 260 do "A Theory of Strategy," Fortune, June 1949. Do. 10 260 do "The War of Wits," Fortune, March 1951. Do. 111 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL Chapter Page Author) ACKNOWLEDGMENTS Publication Publishers 13 323 Dispatch datelined Dayton, Ohio, Nov. 3, 1951. Associated Press, New York, N. Y. 14 350 Hans Speier "Psychological Warfare Reconsid- ered," in the book "Propaganda in War and Crisis," edited by George W. Stewart Publishers, New York, N. Y. Daniel Lerner. 14 351 Harold D. Lasswell "Political and Psychological War- fare," in the book Propaganda in War and Crisis, edited by Do. Daniel Lerner. 14 354 Daniel Lerner Sykewar Do. 14 356 Article, "Daily Crop of Annoy- ances," New York Times, Nov. New York Times, New York, N. Y. 17, 1952. 14 358 Ellsworth Huntington Mainsprings of Civilization John Wiley & Sons, Inc., New York, N. Y. 14 359 Alex Inkeles Public Opinion in Soviet Russia__ Harvard University Press, Cam- bridge, Mass. 14 360 Daniel Lerner "Effective Propaganda Conditions and Evaluation," in the book George W. Stewart Publishers, New York, N. Y. Propaganda in War and Crisis, edited by Daniel Lerner. 14 361 do Sy kewar Do. 15 374 Nathaniel Weyl The Battle Against Disloyalty _ _ _ Thomas Y. Crowell Co., New York, N.Y. 15 374 Philip Selznick The Organizational Weapon: A McGraw-Hill Book Co., Inc., New Study of Bolshevik Strategy and York ,N. Y. Tactics. 15 376, do The Organizational Weapon: A McGraw-Hill Book Co., Inc., New 377 Study of Bolshevik Strategy and York, N. Y. Tactics. 15 379 Louis Francis Budenz Men Without Faces_ Harper & Bros., New York, N. Y. 15 379 Eugene Lyons The Red Decade The Bobbs-Merrill Co., New York, N.Y. 15 380 Philip Selznick The Organizational Weapon: A McGraw-Hill Book Co., Inc., New Study of Bolshevik Strategy and York, N. Y. Tactics. 15 388 J. Edgar Hoover "How to Fight Communism," Newsweek, New York, N. Y. Newsweek, June 9, 1947. 15 389 "Don't Be Duped by the Commu- nists," Redbook Magazine, June Redbook Magazine, New York, N.Y. 1948. 15 393 Harry Soderman and John J. O'Connell. Modern Criminal Investigation__ _ Funk & Wagnalls Co., New York, N.Y. 15 393 Jacob Fisher The Art of Detection Sterling Publishing Co., Inc., New York, N. Y. CONFIDENTIAL iv Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL PREFACE Intelligence is an indispensable element in the successful operation of any modern navy. World War II and the subsequent hostilities in Korea have more than demonstrated the value to planning and executing naval operations of sound, properly interpreted information about the character of the enemy?the product of naval intelligence. This value is even greater in periods of peace or in the twilight zone between war and peace such as we have experienced since the end of World War II. The extent, direction, and timing of our naval preparedness in these years depend directly on the depth and accuracy of our understanding of the hostile or potentially hostile forces that confront us. Accordingly the training of capable intelligence officers is one of the Navy's primary tasks. A good intelligence officer must first be a good naval officer; but, in addition, he must have spent long hours learning and perfecting the specialized skills that make it possible for him to penetrate the curtain of secrecy that enshrouds an enemy. Naturally these skills cannot be acquired simply by reading this or any other single book. At the postgraduate level the Navy trains its intelligence officers at the Naval Intelligence School. This text, which covers in a general way the major aspects of naval intelli- gence and their relationships to the other functions of our naval establishment, meets two significant needs. First, for those officers assigned to intelligence duties for the first time, or with prior experience in one or another of the various components of naval intelligence, it provides a greater understanding of intelli- gence as a whole. Second, to the general line officer preparing himself for more responsible operational commands, it gives an intimate acquaintance with the capabilities and limitations of one of the most important supporting elements in successful operational command, with the result that he will find himself better equipped to make use of the services which intelligence is qualified to perform for him. This text makes no claim to being an exhaustive treatise. Neither is it a book of rules and regulations, since that particular need is covered by the Naval Intelligence Manual and the Naval Intelligence Directives issued by the Office of Naval Intelligence. This is a textbook issued by the Standards and Curriculum Branch of the Training Division of the Bureau of Naval Personnel to bring to the officers and men of the Navy and the Naval Reserve such infor- mation about the functions of Naval Intelligence as can appropriately be disseminated through the medium of a training text. This is the second revision of the original text, NavPers 16047, published in February 1946 and reissued in 1948. It was prepared by the staff of the United States Naval School (Naval Intelligence), Washington, D. C., and reviewed by the Office of Naval Intelligence. Suggestions, comments and criticisms are invited. CARL F. ESPE, Rear Admiral, USN, Director of Naval Intelligence. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CONTENTS Chapter Page 1. Intelligence: A General Orientation 1 2. The Development of Intelligence 19 3. U. S. Organizations for National Security. 63 4. An Intelligence Perspective in a Changing World_ 97 5. Components of Intelligence Knowledge 123 6. Elements of World Power_. 163 7. The United States and the World 179 8. World Communism and the U. S. S. R 197 9. The Intelligence Cycle: Collection 215 10. The Intelligence Cycle: Processing 247 11. The Intelligence Cycle: Dissemination 263 12. Intelligence Staff Procedures 273 13. Intelligence in Support of Operational Command 301 14. Intelligence in Support of Special Activities 335 15. Counterintelligence 363 Summary and Conclusions 404 vii CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 1 INTELLIGENCE: A GENERAL ORIENTATION INTRODUCTION The word "intelligence" has a long history in the English language. In the sixteenth century, in addition to its primary meanings denoting the power, capacity, and product of the intellect, it began to signify "information, news, or advice," and this secondary meaning implied that such in- formation was secret, obtained through the clan- destine efforts of spies employed by rulers or gov- ernments. These agents were called intelligen- cers, a word now obsolete, and the organization in which they operated came to be known as the Intelligence of the directing authority. In mod- ern professional usage the word in its secondary sense has come to have three connotations: first, a body of knowledge; second, the formal organi- zations engaged in producing this knowledge; and third, the activity or processes by which the knowl- edge is produced by the organizations. When re- ferring to a formal organization the word is usually capitalized. The popular concept of intelligence as a mys- terious, glamorous, and hazardous activity has in part been derived from fictional accounts of in- ternational intrigue on the Riviera, as described in the novels of E. Phillips Oppenheim, or from the published "cloak and dagger" exploits of two World Wars, both truth and fiction. Indeed, in- telligence cannot be denuded of all mystery, glamor, and hazard for they are inherent to some degree in the work of all intelligence organiza- tions. However, the aura of mystery is caused in greater part by the fact that the nature and purpose of intelligence activity are always guarded from public scrutiny by stringent se- curity measures. In general, Intelligence is sim- ilar to any other military staff section or govern- mental agency performing tasks in the national interest. Because of the essential security of its opera- tions, and the somewhat sinister quality attributed to it by popular literature, intelligence has long 26910e-54 2 1 been considered an activity foreign to American custom and procedure. Not until World War II was there a real national interest in intelligence and a universal appreciation of its functions in military command and civil leadership. Even in the postwar period there has not always been com- plete general agreement as to what intelligence means and what it can or should do. When prop- erly forged, intelligence is a potent weapon, and its efficient use is based on certain indispensable principles and procedures. It is an exciting ad- venture in forecasting what men and nations might do; in both offensive and defensive actions it is a sword and a shield. Under the stimulus of world events, America has become "intelligence-conscious," for experi- ences of the past two decades have demonstrated that intelligence is essential, not only to military command, but also to the government of any na- tion with worldwide interests and responsibilities. The phenomenal success of Nazi and Fascist dic- tators in the years preceding World War II, the disaster at Pearl Harbor, and the forward march of Soviet communism in the postwar period have indicated the need for coordinated intelligence upon which to base policy and decision to insure the national welfare. There has been a growing realization that America cannot afford to be caught off guard or be forced into an unfavorable defensive position in the world scene. This new appreciation and support of its en- deavors has given the intelligence profession more stature, and increasing use has been found for its products in solving a greater variety of problems. Intelligence has also acquired a technical vocabu- lary to explain its processes and concepts, and for the first time in American history qualified persons, civilian and military, are being encour- aged to make it a lifetime career. This study will describe the milieu in which intelligence operates, the concepts and principles CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS that govern its employment, and the professional tools which modern science and technology have made available to its personnel. To the profes- sional intelligence officer, it can be no more than a review of what he has learned through training and experience; to the uninitiated it can serve only as an introduction. But to all concerned it will show the inseparable intermeshing of the activities of Naval Intelligence with those of other military and national intelligence organizations, and the corresponding interaction and cooperation that continually links intelligence with planning, policymaking, and operations at every level? from the White House to the foxhole. Naval Intelligence represents only one part of the na- tional intelligence effort. To see the activity of his own service in proper perspective the naval officer must understand and appreciate the vast body of intelligence knowledge, the agencies which produce it, and the methods by which it is made usable. Our first consideration is the significance of intelligence today, its total meaning, and the scope of its interests, activities, and responsibilities. THE CHANGING NATURE OF WAR The changing nature of war itself has created an increased need for intelligence. Men and weapons within the area of conflict have always been primary considerations, but by the 20th cen- tury nations began to give attention to achieving their aims through influencing the minds of other men. By the written and spoken word nations now strive to affect the opinions, emotions, attitudes, and behaviors of the peoples of other nations, both friendly and hostile. During World War I, three theories of warfare were developed, all of which emphasized the psychological rather than the physical objective, and which were made practical by the development of the aircraft and the radio. The first theory shifted the purpose of the attack from physical destruction to demoralization of the opposing force by paralyzing its command. The second, "strategic bombing," not only was directed against the enemy's economic capabilities, but also aimed to overthrow the political govern- ment by destroying the morale of the civilian population behind the battle lines. The third was based on a delay in physical attack until the moral CONFIDENTIAL 2 disintegration and internal decay of the enemy had been accomplished by propaganda and other means of psychological operations. In World War II these theories were put to use and greatly refined. The mobility of tanks and aircraft was utilized to overwhelm enemy com- mand. Aircraft and aircraft carriers turned space into speedways of conquest. Guerrilla war- fare and the submarine were utilized to exploit enemy weakness. Amphibious warfare developed a new means of invasion. Radio propaganda was employed to confuse and to demoralize. The new strategy, or large-scale planning and directing of operations, used political, economic, and psycho- logical as well as military warfare against entire enemy populations to accomplish ultimate objectives. In the modern era, as trade in finished indus- trial products and raw materials was extended to all parts of the world, so likewise military con- flict assumed world dimensions. War became total, directed against total populations and all human activities. Both Nazis and Communists have demonstrated consummate skill in using eco- nomic, psychological, and subversive, rather than military weapons, to accomplish their basic objec- tives. War by conventional military weapons has become only one aspect of total war; while so- called "peace" has become a period when the other weapons have been used with devastating results. Though the war of shot and shell was over, the war of words and ideas was rigorously continued by Russia and directed against all noncommunist countries, and in particular (those of) her wartime allies. Within 5 years this bloodless war enabled the Soviet Union to establish an ideological empire cov- ering nearly a third of the land surface of the globe and including 40 percent of its inhabit- ants, a conquest unequalled in history (J. F. C. Fuller, Brassey's 1951 Annual, p. 138) . By the middle of the 20th century, the well- known Clausewitz definition that "war is the con- tinuation of state policy by other means" had been reversed by the Soviet Communist Party. Soviet state policy had become the continuation of war by other means. A more appropriate definition at the current stage of history might be: "War is the imposition of one State's policy on another in such a manner that freedom of group will is lost." Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002.9 uunFIDENTIAL INTELLIGENCE: A GENERAL ORIENTATION The key to the definition of any period as war or peace may well be found in the means employed and the effect of those means. In considering the changing nature of war it is significant to note that the strategy of total war differs completely in its fundamental premise from the old strategy of limited or battlefield war- fare. As Fletcher Pratt points out in his book America and Total War, the old strategy was to attack the enemy where his strength lay. When his strongest force was defeated, the remainder fell with it. The new concept is to concentrate on weakness and not to encounter the enemy's strength, if at all possible. The point of view of the Soviet Union is indicated by Lenin's statement that "the soundest strategy of war is to postpone operations until the moral disintegration of the enemy renders the delivery of the mortal blow both possible and easy." As a result, the Soviets have employed political, psychological, economic, and technical means to achieve warlike objectives, wholly or in part, without the more expensive re- sort to military force. By utilizing these means as part of a total subversive effort, the interna- tional communists have fatally weakened certain of their target states, notably Czechoslovakia. Subversion, therefore, has been demonstrated as a new instrumentality for making war. The strategy of total war makes it increasingly diffi- cult for any state to remain neutral in the struggle for power between dominant groups of nations. In the post-World War II period, world com- munism has continued to emphasize the weapon of ideas in preference to, although supported by, the traditional weapon of physical force. Just when or if there may be a shift in emphasis, and how the United States should conduct its national poli- cies to meet and thwart any means employed by its adversaries, are vital questions we face today. A survey of current international conditions, to- gether with a clear understanding of the pattern and methods of total war, gives unmistakable meaning to the popular term, "cold war." In this situation at least two factors, other than the nature of total war, have given emphasis to the funda- mental importance of intelligence and the need for its use: the increased scope and speed of war and the world commitments of the United States. 3 Increased Scope and Speed of War No longer is space itself a conclusive element for defense, nor are geographic features of the earth's surface impassable barriers to enemy at- tack. The awesome technical improvements with which scientists are transforming the aircraft and the radio of World War II have given the speed of sound to the initiation of military attack. In World War II the German Blitzkrieg combined the use of planes and tanks to conquer France in 35 days, while in the Pacific, the aircraft carrier brought naval forces separated by hundreds of sea miles into decisive conflict. At the same time de- velopments in submarine and amphibious war- fare withered the extended sea power of Japan and brought men, guns, and supplies over thousands of miles of ocean to overwhelm her vital defenses within a relatively short period. Strategic bombing, guerrilla, submarine, and psychological warfare carried the war far behind the battlefronts to entire civilian populations, vital industries, sources of the raw materials of war, and communications systems. The master plan of the two major Axis partners, Germany and Japan, encompassed the globe. To meet this threat, the United States fought in the far reaches of the Atlantic and the Pacific and sent forces to distant continents. All parts of the world felt the direct or indirect impact of a world at war. World Commitments of the United States In the interests of its own security and national welfare, the United States has assumed world- wide commitments, both military and economic. The decisions which must be made are funda- mental, far-reaching, and exceedingly complex. The problems involve such intricately related questions as economics, finance, national politics, raw materials, industrial capacities, communica- tions, manpower, weapons, and scientific and tech- nological developments. The growing interrela- tion of political and military decisions has made it impossible for the responsible leaders in either field to take action without the closest coordina- tion of effort, based on a full and mutual under- standing. The decisions of the military com- mander are no longer so directly circumscribed by the elements involved in a tactical field of action. The factors of total war, the increased scope and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR speed of war, and interlocking world commitments have added to the complexity of both staff and field decisions. Obviously, the effect of these fac- tors on the commander varies in degree with the echelon of his command. But at any echelon in- telligence has become a necessity. Intelligence?An Essential Function More than 2,400 years ago a Chinese general named Sun Tzu is reported to have said: "Hostile armies may face each other for years striving for victory which is decided in a single day. This being so, to remain in ignorance of the enemy's condition . . . is the height of inhumanity. One who acts thus is no leader of men, no present help to his sovereign, no master of victory. Thus, what enables the wise sovereign and the good general to strike and to conquer, and achieve things be- yond the reach of ordinary men, is foreknowl- edge." Intelligence, properly performed, can provide foreknowledge both for government and for mili- tary commanders. It can reduce the possibilities of surprise, give estimates regarding both the po- tential enemy and the area in which he might op- erate, and so aid in reaching sound decisions which are vital not only to the security and welfare of the nation but also to success in combat. Intelli- gence, properly used, has its place not only in war or preparation for war, but also in peace and keep- ing the peace. INTELLIGENCE AS KNOWLEDGE "Intelligence regarding the loyalty of the aver- age indigenous peasant to the present hostile gov- ernment of . . . is important (1) to an evalua- tion of the stability of that government and its capacity to extend its influence and (2) to the selection of an area along its coast for the landing of amphibious forces." By this hypothetical statement, the following charactertistics of intelligence are illustrated: (1) it is a body of knowledge; (2) it deals with a pos- sible enemy state; (3) it affects a possible area of operations; (4) it can be used by top-level plan- ners in government and on military staffs; and (5) it can aid the military commander in the planning of a specific operation. Knowledge regarding the "average indigenous CONFIDENTIAL 4 NAVAL OFFICERS peasant" is much more than the sum of bits of information regarding few or many peasants, gathered from every conceivable source. Some of these bits of information may be true or false; some may be detailed or fragmentary; some may be general or factual in nature; some may come from sources which are accurate and reliable, some from sources which are inaccurate and unreliable. At any rate, many bits of information regarding the "indigenous peasant" must be gathered to- gether and evaluated; they must be carefully analyzed and compared to see that they are plaus- ible; and, after having been boiled down to an essence most closely approximating probable truth, they will provide a conclusion which is meaning- ful. From the facts or information comes some- thing new, called knowledge or intelligence. Information, then, includes such things as facts, documents, and observations, but is not intelli- gence until it has been carefully screened and digested to provide accurate meaning. Intelligence, however, does not include the total substance of human knowledge, but only that which military and civilian leaders must have to make the vital decisions for today and tomorrow. It is the basis for a country's foreign relations, and, as a function of command, it is also essential for the planning and execution of military operations. In either case, it is knowledge upon which a suc- cessful course of action can be based. It has been aptly stated that intelligence ideally is that knowl- edge which a potential enemy has about himself. The scope of American national intelligence is exceedingly broad because the United States in the interests of its own welfare must know a great deal concerning the attitudes, activities, in- terests, and long-range plans of all other states in the world. The concentration of interest, of course, will depend upon the conditions of inter- national relations at any given time. Since it is impossible for any nation to attain the ideal of having all pertinent knowledge about potential enemies, certain gaps always exist. Intelligence, therefore, resembles a vast collection of jigsaw puzzle pieces. Some pieces belong to different puzzles, some will not fit any apparent gap in the picture, and some obviously belong but must be patiently fitted into the picture in order to solve the puzzle. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE : A GENERAL ORIENTATION CONFIDENTIAL Component Parts In assembling this comprehensive knowledge it is essential to break it down into component parts for better understanding and ease in handling. A systematic classification is achieved by a detailed compilation of, first, all the factors of physical environment and, second, of the characteristics that govern human behavior in a given country. Eight major divisions are generally used: military geography, transportation and telecommunica- tions, sociological, political, economic, armed forces, technical and scientific, and biographical. Each of these components, discussed in detail in chapter 5, are indicative of the tremendous range of intelligence subject matter. All components are closely interrelated; no one can be considered separately. A valid estimate can be reached only by considering each in relation to the others. For the intelligence officer a similar comprehen- sive knowledge about his own country is a neces- sary tool, since only with this accurate and more familiar yardstick can he make valid comparisons and relative estimates. The Factor of Time The components listed above represent a divi- sion of the subject matter of intelligence into broad fields of knowledge. A consideration of the fac- tor of time produces a further breakdown into relative elements, labelled as follows: Basic, which is descriptive of the more permanent and signifi- cant past; Current, which deals with the present; and Estimative, which concerns future develop- ments. The truly significant element of intelli- gence is, of course, the Estimative which projects situations and trends into the future. This fore- casting, however, must be built up accu- rately and painstakingly from both past and cur- rent knowledge. The basic element is encyclopedic in nature and includes geographical and historical data. It provides the broad background against which to interpret the present and predict the future. It is a part of all the components already mentioned, but especially of those which cover the area of operations and the sociological, political, and eco- nomic background of a people. As in the pre- vious example of the "average indigenous peasant," in order to predict his reactions at some future time, the analyst must have a comprehen- sive knowledge of the peasant's past attitudes, group habits, environment, and responses. Also, in deciding on possible landing beaches on the coast of the country in question, the intelligence officer must present to his commander a complete description of the beaches along the entire coast. The geographic knowledge must include soil; exits from beaches, topography behind the beaches; ac- cessibility to roads, rail-lines, towns, water, build- ing materials; recognizable features of the coast- line; the slope of the beach, the sea bottom off the beaches, the surf, currents, tide, underwater ob- stacles, sea approaches, and so forth. When it is realized that there may be a number of possible beaches along the coastline of a given country, the quantity of knowledge required becomes apparent. During World War II, the monographs and area studies prepared by Naval Intelligence provided detailed background knowledge of an encyclopedic nature which was indispensable to the planning of operations all over the world. The Joint Army-Navy Intelligence Studies (JANIS) were also developed to provide background knowledge of areas about which little was previously known. The extensive encyclopedic documentation on heavy industry within Germany, for example, en- abled intelligence personnel to note change or ex- pansion, and to estimate the effectiveness of strategic bombing. The experience gained and lessons learned from these wartime studies have emphasized the need for continued coordinated efforts on the part of all intelligence activities in developing and maintaining a fund of basic knowledge in order that the day-to-day situation can be better interpreted. The National Intelli- gence Survey program is a more recent step to- ward meeting that need. The current element records the changes con- tinually occurring among all groups of peoples, as well as those which may occur in the physical geography of the world. Knowledge about the past must be brought up to date. The significance of change lies in the possibilities not only of progress but also of decay. For example, in con- sidering any other state, friendly or unfriendly, our military and civilian leaders are vitally in- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS terested in knowing whether its steel production has increased or decreased to a significant degree; what changes have occurred in population, espe- cially in the distribution of age groups; or whether there is a decided swing in popular support from one political doctrine to another. In considering financial aid to the Nationalist Chinese Government after World War II, United States leaders needed to know details about such matters as current economic conditions in China, and how they were affected by government poli- cies; the needs of the people for food, clothing and shelter; the morale and status of equipment of the military forces; and the effectiveness of military and political opposition forces. From an infinitely complex situation an accurate esti- mate was required in order to determine if finan- cial aid would be of assistance and, if so, in what manner it should be given. Even the most limited description of the basic and current elements of intelligence indicates the enormous quantity and variety of details involved. It becomes readily apparent that there is a physi- cal limit to the production of such a volume of knowledge. The question quickly arises: Since it is impossible to achieve the ideal, how should the effort be distributed? The only possible answer is to concentrate on those areas which are most directly related to the present and future deci- sions of military commanders and civilian leaders. In any event, the basic and current elements of intelligence must be formulated so as to provide an accurate basis for the estimative. The estimative element deals with the future. It is knowledge of what a state or a military force of that state can or might do. In respect to in- ternational politics, it includes the influence which any state can exert in the world and what forms that influence may take. In respect to a military force, it considers the effectiveness of that force at a given place and time and the objectives that force is capable of gaining, or might try to gain. In effect, this element of intelligence represents inferences from past and current knowledge which may or may not be complete. Involved in the estimative element are four pri- mary factors: situations which exist or may eventually exist; vulnerabilities or specific weak- nesses which may be exploited; capabilities; and CONFIDENTIAL 6 probable courses of action. An intelligence esti- mate, to have real meaning, must relate to a situa- tion, that is, to a possible enemy, to a possible place, to a possible time, and to the probable means which may be employed. No estimative knowledge can have meaning in a vacuum. Given the concept of total war, the vulnerabili- ties of another state are particularly significant. Weaknesses may exist in any aspect of its national life?political, sociological, or economic. They may be found in its military forces or in its geo- graphic position. The skillful exploitation of weaknesses may produce results out of all propor- tion to the means employed. Conversely, failure to exploit them because of lack of knowledge can be costly to a disastrous degree. In both World Wars, Great Britain's insularity was a vulnera- bility upon which Germany concentrated by means of its submarine force. Extremely serious situations resulted from this underwater warfare directed against the shipping which carried food to Britain's population and raw materials to her industries. In World War II, one of Hitler's blunders was his failure to invade England after the withdrawal from Dunkerque, an admirable illustration of failure to take advantage of a mili- tary vulnerability because of lack of knowledge and planning. In the case of France, on the other hand, the moral weakening of her political struc- ture, and internal dissension and corruption helped to create a vulnerability which the Ger- mans exploited to the full. The capabilities of a state relate to its qualities of strength. The fundamental?and ultimate? capability is that of military power, expressed in time and force, which includes not only men and guns, but also economic and industrial strength. Other strength factors include: geographical po- sition; population, especially of military age; raw materials and industrial plants; transportation facilities; the stability of political structure; and the moral fibre of the people. During World War II, the German and Japanese Governments underestimated both the industrial capability of the United States and the strength and determi- nation of the American people. In planning military operations, the following additional factors of strength or weakness are con- sidered: numerical military strength, effect of Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL time and distance, efficiency of personnel, quality of equipment, special weapons, and logistic sup- port and reinforcement. Given the situation, together with the enemy's vulnerabilities and capabilities, the estimative ele- ment of intelligence takes the form of probable courses of action. It may be deduced, therefore, that this element of intelligence represents guesses or opinions rather than verifiable facts and hence is of doubtful value. It is true that estimative knowledge is not absolute nor as exact as basic and current. However, if based on accurate informa- tion carefully analyzed, it constitutes an educated guess and a carefully considered opinion of a much more valid nature than that derived from an in- dividual "hunch" or snap judgment. Intelligence, then, is a body of knowledge which encompasses in greater or less degree, all world states, and all possible areas of operation. Its ele- ments and component parts are interrelated and intermeshed. Its infinite volume of detail re- quires emphasis only on those portions of knowl- edge which are or will be needed by military com- manders and civilian leaders. It is knowledge for a purpose. The only justification for its col- lection and interpretation is to assist those who will use it in reaching vital decisions. Those who produce intelligence must keep this purpose fore- most in mind. Use for Strategic Purposes Military commanders at all echelons of com- mand draw upon the body of intelligence knowl- edge in solving particular problems and in reach- ing command decisions. Those in top echelons of command, and top-level leaders in government, use areas of this knowledge in formulating plans and policies and reaching decisions affecting the security and welfare of the entire nation. In time of peace, top-level commanders determine how best to dispose and utilize available military forces for the national security and assist the top-level ci- vilian leaders who formulate the national policy toward other nations of the world. In addition, in time of war, these military commanders are re- sponsible for the conduct of total military opera- tions. This employment of intelligence is called Strategic Use. Strategic Use furthers the master plan of the nation's world relationships in both 7 war and peace?its grand strategy, which encom- passes both military planning and foreign policy, and has an inevitable impact on domestic policy as well. From the military point of view, strategy does two things: it determines and assigns objectives which, if achieved, will aid in winning a war and strengthening the peace; and it allocates and gets to the right place at the right time an adequate and suitable force to accomplish each objective against enemy resistance. In respect to national policy, strategy is positive when it aims to im- prove a current situation in world affairs; it is defensive when it strives to prevent a situation from becoming more unfavorable. When the na- tion has a choice of several favorable policies, it then has the strategic initiative. In the restricted military sense, strategy con- notes the application of armed force or the threat of that force; in a broader military-political sense, it includes the use of economic-political- psychological activities to gain diplomatic or trade advantages or to influence the group think- ing of another nation in a manner which will promote the welfare of our own Nation. The strategic role of intelligence when there is no armed conflict is to aid the chiefs of state in formulating grand strategy and to enable military leaders to plan in such a way as to support the decisions of the chiefs of state. An example of the use of intelligence for the purposes of grand strategy is afforded by Hitler's early development of a world-wide system for gathering information which was scientifically analyzed and evaluated. With this weapon he was able to implement his revolutionary methods of warfare, which took economic, political, and psychological forms during the years from 1938 to 1940. It made possible his "fifth-column" ac- tivities, his "war of nerves," and the corruption of high public officials. It was the basis for a succession of historic events: the annexation of Austria, the occupation of Czechoslovakia, Nor- way, the Netherlands, and Belgium, the diplo- matic isolation of the Balkan countries, and the fall of France. Through intelligence activities the Nazis probed the defenses of the Maginot Line, and through a skillful "war of nerves," followed by the ultimate CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS "blitzkrieg," 200,000 men were enabled to defeat a nation with 5,000,000 men under arms. In modern war, strategic bombing has increased the requirements for intelligence knowledge upon which military planners are dependent for target selection. In World War II the bombing of Ger- man industrial targets required information about basic war industries and the thousands of industrial plants involved. For example, a great deal of study preceded the Allied decision. to bomb plants producing aircraft and their compo- nent parts, ball bearings, synthetic rubber and oil, and thus to cripple a most important segment of German war production. The term, "Strategic Intelligence," then, is de- scriptive of one use of intelligence knowledge. Other terms, commonly employed, relate not only to a use of this knowledge but also to the user. "National Intelligence" describes the knowledge used as a basis for reaching comprehe:asive deci- sions regarding national policy, welfare, and se- curity. It also identifies the users as top-level governmental groups whose interests are broader than those of any one department or agency. "Departmental Intelligence" identifies the user as a department of the federal government and re- fers to the knowledge used in the carrying out of its mission and assigned responsibilities. "Naval Intelligence," for example, is one kind of "departmental intelligence." "Interdepartmental Intelligence," which lacks the scope of "National Intelligence," describes knowledge of. common concern to more than one department. Finally, other terms are employed to describe many of the component parts of intelligence knowledge ac- cording to their content: such as "political intelli- gence," "economic intelligence," and "technical intelligence." A. problem in the use of terms such as these has been the resulting erroneous impression that each represents a kind of intelligence that is different from all others. While these various terms are quite acceptable for convenient reference, the point to remember is that they do not describe separate, distinct or compartmented kinds of intelligence. All kinds are irrevocably interrelated; the mean- ing of each, as well as the meaning of the total, is complete only when all are considered together. Regardless of terminology, intelligence can be only CONFIDENTIAL 8 one body of knowledge with component parts and elements which are drawn upon according to the needs of the user. Use for Operational Purposes While toplevel military commanders use intelli- gence for broad planning purposes, they can never lose sight of the fact that their policies and deci- sions must be translated into action by the lower echelons of command. Hence the knowledge used by all echelons is both broad and specific. The only difference is one of emphasis, which stems from the problem to be solved by the user. For example, the knowledge used becomes less broad and more specific as the toplevel decision is trans- ferred for action to the theater commander, down to the task force commander, and so on to the com- manders of the operatng fleet units. Thus intel- ligence is used specifically for operational pur- poses when it is a basis for decisions involving the physical employment of particular men and mate- riel against a particular adversary. Here the current element of intelligence plays a most im- portant part. As one illustration, in the latter days of World War II, the decision to drop an atomic bomb on Hiroshima was made at the highest policy and command levels on the basis of the most compre- hensive available intelligence in view of the stra- tegic implications for the entire Pacific war. At the same time, potential Japanese air opposition required the use of intelligence for specific opera- tional considerations in determining whether or not such a mission could be successfuly carried out. It has often been said that intelligence is used for strategic purposes in time of peace and for operational purposes in time of war. Such a statement might have been approximately correct prior to World War I, when periods of war and of peace could be more accurately labeled. How- ever, just as the pattern of total war has materially reduced the distinction between strategy and tactics so likewise has it resulted in a merging of the uses of intelligence for strategic and opera- tional purposes. In time of peace, or when widespread military conflict is not involved, intelligence may be used for operational purposes, as well as stra- tegic. The ideological war waged by the Soviet Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL Union against many nonCommunist countries, in- cluding the United States since 1945, is illustra- tive. The weapon of ideas has been employed in an effort to incite unrest among labor and racial groups, and to capture the minds of men with false words. To take action against this weapon, radio programs, such as those produced by the Voice of America, have been instituted as a means of pre- senting a true picture of American life and aims. Intelligence has an operational use when it serves as a basis for decisions regarding such matters as audience targets. In times of armed conflict, intelligence has many varied and vital operational uses. In planning and executing a large amphibious operation, such as that at Okinawa, the responsible commanders required the most detailed and comprehensive knowledge concerning the Japanese forces and de- fenses on those islands, the physical area of opera- tions, and enemy forces in adjacent areas which would be capable of interference. In a smaller specific combat situation, such as a submarine mis- sion in the Formosa straits, the submarine com- mander required specific knowledge as to when and where Japanese naval and merchant ships could be expected and which were the best targets. If a merchant ship carrying rice from Saigon to Tokyo was given first priority, that selection might well have represented a strategic as well as an operational use of intelligence. The knowl- edge required as a basis for operations involving aircraft carriers separated by hundreds of miles may be both operational and strategic. For operational purposes, then, there is a need for the most detailed and specific knowledge about the enemy and the anticipated area of conflict. This is true for all types of military operations, amphibious, submarine, antisubmarine, mining, air, fleet, and reconnaissance patrols, to mention only a few. Similar knowledge is also required for the action phase of other types of modern war- fare such as economic, political, and psychological. For convenience of reference in operational ac- tivities, the knowledge involved has been labelled according to its use and its user. For example, the following terms are common: operational intelli- gence, amphibious intelligence, air intelligence, and fleet intelligence. During World War II the term "operational intelligence" was defined as "in- 9 telligence needed by naval commanders in plan- ning and executing operations, including battle," and referred to operations of an extensive and time-consuming nature. A second term, "combat intelligence" was used to describe that part of naval operational intelligence required by naval commanders actually engaging enemy forces dur- ing the comparatively short time of a naval battle. As in the case of the various terms applied to the strategic use of intelligence, it must be pointed out again that no separate or distinctive kinds of in- telligence are involved. The parts or elements of the total body of knowledge are simply being used for a particular purpose which, in this instance, is operational. In connection with military operations, it must be emphasized that intelligence has one primary function: to aid the commander in resolving his mission and supervising the planned action against the enemy. This function, together with the role of the intelligence officer on an operational staff, will be discussed in chapter 12. Use for Countering Purposes A third major use of intelligence arises from the need for countering the positive efforts of poten- tial enemies to carry out against a nation certain inimical activities known as espionage, sabotage, and subversion. In general, these activities have the common objectives of weakening or destroying any or all elements of a nation's total power and warmaking potential, thereby increasing the power advantage of the nation initiating them. Simply stated, espionage is the clandestine collec- tion of information about a foreign country. To a degree, it is the art of spying. However, it may also be any unobserved or unapproved collection of information which, when gained, is used to the disadvantage of the subject nation. The target of espionage is particular information which will aid in determining a nation's capabilities and inten- tions, its strengths and weaknesses. Sabotage is activity directed toward the damage or destruction of physical facilities vital to a na- tion's total power, such as its industrial system and military establishment. Sabotage, however, is not only physical. It may be nonphysical, though just as effective, if its objective is the weakening or destruction of a program or a policy, domestic CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR or foreign, related to a nation's strength, security, and general welfare. This type of sabotage in- cludes enemy activities which have as their result the creating of terror, panic, and civil disorders. Subversion may be described as activity aimed at attacking men's minds for such purposes as destroying primary loyalties and faith in consti- tuted authority, encouraging continued dissension between social and racial groups, or causing in- dividuals and groups to act consistently contrary to the best interests of a nation's government. As an ultimate objective, subversive activities are di- rected toward transforming social institutions and eventually altering a form of government through unconstitutional means. While it is often difficult to differentiate between the activities of nonphysi- cal sabotage and subversion, one point of distinc- tion is the fact that subversion involves a com- plete change in attitudes and points of view, a permanent transfer of loyalties and faith. A dif- ference, then, is to be found in the degree of finality of the results achieved. Because of the common objective and related methods of espio- nage, sabotage, and subversion, the term "subver- sion" is sometimes used to include all of these detrimental activities. Quite naturally, every nation actively endeavors to prevent any other from carrying out success- fully such activities. These opposing efforts are called counterespionage, camtersabotage, and countersubversion. Since it is apparent that some nations of the world have organizations trained to carry out espionage, sabotage, and subversion, the United States Government and its military services must be prepared to counter them in at least two ways. First, adequate security control measures must be established and maintained to safeguard informa- tion, personnel, equipment, and installations against these inimical activities of foreign nations and of disaffected or dissident groups or individ- uals which constitute a threat to the national se- curity; and second, both the foreign organizations and the groups or individuals involved must be actively opposed and prevented from accomplish- ing their objectives. In order to achieve maxi- mum success, our responsible departments and agencies require both comprehensive and detailed knowledge regarding the objectives, plans, and CONFIDENTIAL 10 NAVAL OFFICERS methods of the enemy, and particularly the or- ganizations, groups, and individuals trained in and assigned to the specialized activities described above. The knowledge used to counter these ac- tivities may be called counterintelligence. How- ever, it must be noted immediately that the term "counterintelligence" means much more than "knowledge"; it encompasses both organization and activity. In its comprehensive sense, there- fore, counterintelligence is a specialized phase of intelligence related specifically to security control measures applied against the enemy's activities of espionage, sabotage, and subversion. A more com- plete discussion of this subject will be given in chapter 15. The use of counterintelligence knowledge is closely and continuously related to the uses of in- telligence for strategic and operational purposes. Regardless of the purpose, information concern- ing it must be denied to the enemy, and his efforts to interfere by means of espionage, sabotage, or subversion must be opposed. This is essential in both peace and war. In time of peace for example, information regarding the grand strategy of the United States must be most carefully guarded. In time of war, the military commander usually includes a counterintelligence plan with his opera- tions plan or order. Hence, while intelligence is being used for other purposes, it is being used concurrently to protect those purposes. The na- ture and form of security control measures depend upon knowledge of the enemy and of the particu- lar activities to be countered. The vital part which counterintelligence must play in time of peace is well illustrated by the Gouzenko incident in Canada in 1945. Through the voluntary confession of a cipher clerk in the Soviet Embassy at Ottawa, evidence was revealed that a Soviet spy ring had obtained much vital technical information regarding the atomic bomb. Subsequent additional evidence pointed to the probability that the Soviet Union, profiting from extensive espionage activities, was much further advanced in its atomic research program than had been considered possible. An immediate result of this information was a reduction in the world power advantage of the United States and her allies, maintained as long as she was in exclusive possession of the secrets of the atomic bomb. In Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL view of this newly determined Soviet capability, both our national and military planning and poli- cies became subject to revision. The deficiencies of counterintelligence in this instance had ob- viously significant effects on a worldwide scale. Preparatory to the Allied invasion of Nor- mandy counterintelligence was needed by appro- priate authority to formulate protective, decep- tive, and aggressive measures in the United States, the United Kingdom, and in enemy-occupied' France in order to thwart Nazi efforts to gain vital information regarding invasion plans. It may be assumed that the enemy concentrated his espio- nage activities on finding out the time and place of the Allied landings, and the numbers and disposi- tions of ground, air, and naval units involved; fur- ther, that every effort was made by means of sabotage and subversion to disrupt the imple- mentation of Allied plans. The responsibilities of counterintelligence were tremendous and its contributions substantially effective. These illustrations indicate that knowledge prior to enemy action is of inestimable value. Even more, they imply that positive action in ad- vance which will deny to an enemy the opportunity to commit the act is of even greater value. This action feature of counterintelligence sets it some- what apart from the uses of knowledge already mentioned. As was true of the other two major uses of in- telligence knowledge, various descriptive terms have been applied to counterintelligence in order to define it. For example, it has been labelled as "domestic intelligence," "negative intelligence," "security intelligence," or "passive intelligence." Since these terms are not entirely accurate or com- plete they should be noted only for reference pur- poses. To be remembered is the fact that knowl- edge used for countering purposes is still a part of the total body of knowledge, deriving its full meaning only when considered in the light of the whole. Other Uses There is frequent need for specific items of knowledge; in some cases, merely factual data or information .from which is derived the encyclo- pedic or basic element of knowledge. For ex- ample, in the formulation of a new policy or in the solution of a military problem, an agency or a commander may need to know the cargo unloading capacity of a certain port, the depth of water alongside a particular pier, the source of water for a town, or the lowest recorded temperature at the South Pole. Various departments or agen- cies concentrate on specific areas of knowledge and must be prepared to provide reference service to organizations working on related problems. When knowledge or information is used for this purpose it is known as Spot Intelligence or Spot Informa- tion. It is usually obtained by intelligence agen- cies or collection units in response to a specific re- quest. Important as this use is, care must be taken to ensure that concentration on the requirements of Spot Intelligence does not result in a neglect of the overall requirements of the intelligence mission. Other uses of intelligence may well arise in years to come. Since 1945 a concept of world state communities has been growing out of the activities of the United Nations and its associated regional pacts. As the United States increases its participation in these activities it is quite possible that there will be new uses for intelligence in such joint enterprises. But regardless of any new uses, or special terms to describe them, the knowledge involved will still remain a part of the total body of intelligence as far as the United States is concerned. In discussing various uses of intelligence, the users have been described in general terms. They include not only civilian leaders within the federal government and military leaders in all echelons of command, but also individual military person- nel with specialized jobs?such as pilots, boat- swain's mates, and tank drivers. Even those who produce intelligence must use it in order to con- tinue the orderly expansion of the total body of knowledge. It is the organization of these pro- ducers that gives a second connotation to the word intelligence. INTELLIGENCE AS ORGANIZATION In his book, A Soldier's Story, General of the Army Omar N. Bradley makes the following com- ment: "Later in the War, I often explained to my Staff that 0-2 (Intelligence) existed to tell me what should be done on the basis of his in- 11 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR formation concerning the enemy." In this statement, General Bradley is referring to the or- ganiZation which produces the knowledge he, as a commander, must have for his use. When spelled with a capital "I," Intelligence means organi- zation. The historical development of intelligence or- ganizations, and characteristics of the United States intelligence system are more fully discussed in chapters 2 and 3, but it is pertinent here to stress the impact of the pattern of total war on all intelligence organizations. Not only has to- tal war caused a tremendous expansion of the total body of knowledge needed by civil government and military command, but it has also forced an intensive development of organizations specializ- ing in many fields to gather and to produce that knowledge. Some nations, having maintained intelligence organizations for hundreds of years, have a substantial background upon which to draw. The United States, however, has a much more limited background; and only in recent years has it endeavored to stabilize the structure of its national intelligence system. The poten- tialities of this system, in peace and in war, are great indeed; its youth is a limiting factor which will be overcome only by inspired leadership, hard work, and continuous years of experience. Prior to, during, and even after World War I, intelligence production was handled on an indi- vidual basis, with little coordination of effort. Total war, however, has brought about require- ments for knowledge based on information of such complexity and pervasiveness throughout the total of man's activities that it cannot be encom- passed by individuals working singly. Meaning- ful intelligence requires the group effort of many individuals whose activities must be carefully directed and coordinated. Therefore, efficient organization and skillful production have as- sumed great importance. Sherman Kent has aptly stated that good in- telligence organizations must possess certain char- acteristics of a large university faculty, a great metropolitan newspaper, and a good commercial business organization. First, management must appreciate and tolerate broad individual freedom in the search for truth by personnel selected for their abilities in research and analysis. Second, CONFIDENTIAL 12 NAVAL OFFICERS organizational doctrine must emphasize rigid ad- herence to the time requirements for completion of assignments, an observance of editorial policy, and an individual responsibility for accuracy, completeness, and clarity of meaning And third, the producers must be sure that the product is prepared and packaged in accordance with the needs and wishes of the consumer. They must also consider its value in relation to its cost. Like 'a good business, Intelligence must stress plan- ning; it must study the market, consumer reaction to its product, and new consumer problems which will require the development of new products. Intelligence must be a carefully defined, smoothly operating organization which remains sufficiently flexible to permit adjustment to emergencies. Continued application of the principles of mod- ern management will aid in streamlining intelli- gence organizations to reduce duplication of effort, without sacrificing complete coverage. Special efforts of management must be directed toward the development of a sense of purpose for each organization, an understanding of the over- all intelligence production problems, and an ap- preciation of the interdependence of the various producing organizations. Close coordination of the intelligence production of the various serv- ices, departments and agencies, together with the greatest care in selection and training of person- nel, can do much to develop smoothly operating organizations. Many problems of United States intelligence organizations stem from inexperience and from the inevitable fact that much information collected is incomplete and imperfect. Still others arise from the techniques employed to refine the infor- mation. It should be clearly understood that, since this information relates substantially to the variables of human behavior, its processing into intelligence cannot apply fully the techniques of scientific research and laboratory method used by the exact sciences. An appreciation of various basic reasons for some of the problems of intelli- gence organization can, in itself, benefit both the producers and the consumers of intelligence. Of necessity, intelligence work has become a profession, deriving its substance from other pro- fessional fields, especially from the exact sciences and the social studies, but also requiring the con- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL tributions of the historian, economist, lawyer, and linguist. No longer is it desirable for individuals to be impressed into Intelligence service with the hope that they can "pick it up." The require- ments for each worker include an accurate fund of knowledge which is not only broad, but also specific (in at least one field) . In addition, cer- tain basic personal qualities are indispensable. Basic Attributes of Personnel Intelligence is an organization made up of peo- ple; its effectiveness and success rest upon them. What then should be some. of their personal qual- ities? First of all is flexibility of mind, which may be defined as the ability to meet new situa- tions effectively as they arise. One who possesses this quality is capable of bold and original thought, and he does not hesitate when the need arises to depart from traditional procedure. A second quality is the ability to assimilate quickly a large and perhaps diverse number of facts into a comprehensive whole, from which sig- nificant meanings may be drawn. This quality obviously implies others, such as a faculty for ab- sorption and retention of background information, a natural curiosity, well-ordered mental processes, and imagination tempered by common sense. The ability to speak and write clearly, concisely, and accurately is essential if the information or intelligence is to be successfully transmitted to those who need to know. Personal enthusiasm, a strong sense of balance and proportion, and a wholehearted spirit of co- operation rank high on the list. Because intelli- gence work represents group effort, no one person should depreciate the work of others and magnify his own; he must recognize that there is much he can give and much he can receive in the total pro- duction effort. He should never lose sight of the fact that he is contributing to overall objectives and meanings which may be vital for his country- men's survival. Loyalty, then, is also basic. Intellectual honesty is that quality which will compel the intelligence work& to transmit the true meaning of his knowledge as he sees it, and not as the potential user would like to hear it. Emo- tional stability is essential to continued good judg- ment as well as to the indispensable quality of re- liability. The significance of these qualities is well illustrated by the case of Col. Alfred Redl, head of all Austrian espionage during the days of the Old Austro-Hungarian Empire prior to World War I. Because of his homosexuality, he was successfully blackmailed by a Russian agent who obtained Austrian secret war plans, military codes, and a list of Austrian agents in Russia. The appalling defeats suffered by the Austrians in Galicia early in World War I were partly attrib- utable to Redl's vulnerability. Other qualities and abilities are required in in- telligence work, varying in degree according to the particular duties assigned. They will be dis- cussed as appropriate in later sections of this text. The intelligence officer must possess qualities of leadership commensurate with the responsibilities of his billet. In general, he must have a minimum amount of knowledge in all fields relating to his work so that he may recognize the existence and general nature of any problem. For example, he must know enough about an area of operations to appreciate any conditions which might give rise to problems of health for a landing force. He must be able to coordinate the precise technical knowledge of the staff expert with his own general knowledge about the enemy in order to evaluate the full implications correctly. Finally, he must be able to integrate subsidiary conclusions in order to reach the essential overall estimate. It becomes apparent that the requirements for the intelligence officer are highly exacting. The body of knowledge with which he must concern himself is both comprehensive and widely varied. The question immediately arises as to where such personnel may be found and how they should be selected. Selection of Personnel In the case of officers for Naval Intelligence bil- lets, a basic knowledge regarding the United States Navy is a first requirement. This knowl- edge can best be obtained from active naval serv- ice, although good training at naval schools can be an emergency substitute. The importance of this requirement has been indicated previously, when it was noted that the production of knowledge about the enemy and the area of operations is often facilitated by knowledge of our own forces and our methods in comparable operations. In addi- 13 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS tion to naval knowledge and training, officers must be carefully selected on the basis of the personal attributes described above and the particular re- quirements of the billet for which they are being considered. Specialized intelligence training is also essential. In general, intelligence personnel should be se- lected from those who have specialized in fields of knowledge to which intelligence is related, such as architecture, archeology, engineering, geology, cartology, hydrography, photogrammetry, law, transportation and shipping, languages, the nat- ural and physical sciencies, and the social studies. Valuable experience includes extensive foreign travel, investigative work with federal and state agencies, research and analysis, executive and ad- ministrative. While it is true that the selected specialists are well versed in their own fields, they are entering a new field, and must learn to perform their assigned duties in Intelligence in accordance with new techniques. Training of all personnel is imperative. The Value of Training At least two facts emphasize the necessity for the most exacting training: First, the production of intelligence involves an intricate developmental process for which all pertinent material is seldom available; and second, the finished product may be vital to the welfare and security of the Nation and to the very lives of fellow countrymen. In order to contribute effectively to this produc- tion, intelligence personnel must fully explore all possible sources for information; they must know when and how to explore; they must thoroughly understand the process for refining this informa- tion: the adding, subtracting, tempering, and test- ing which go into the forging of intelligence. In this refining process, they need experience to ap- preciate the degree of improvising possible when essential items are missing, and the logical se- quence to be followed in interpretation of informa- tion. Above all, they must never forget that the product has no value unless it can be used. The critical factors of time and space in modern war- fare subject them to a great amount of production under pressure. To say that intelligence workers are made, not born, implies that there are no substitutes for CONFIDENTIAL 14 training, continuous study, conscientious effort, and years of experience. As in other fields, the mechanics of training are not enough; the motiva- tion must come from the worker himself. No out- side assistance can be of real value without a determination on the part of the individual to become not just another intelligence worker but the very best. Although he may be a specialist in a particular field, the intelligence officer must develop an ap- preciation of the other fields which comprise the sum total of intelligence knowledge. With this appreciation, he can more effectively direct his own efforts. Training must encourage that har- mony of effort so important for the success of any organization. Learning through doing is another important training requirement. Painstaking, detailed work is part of the routine, a necessary preliminary to exciting accomplishment. A continuous training program can help to define the goals and objec- tives. Such a program must also include Reserve personnel. Indoctrination in security measures for han- dling classified material is an essential part of training. The intelligence officer must not only be thoroughly familiar with the regulations as set forth in the Navy's Security Manual for Classified Matter, but he must also have a real appreciation of their guiding principle, that classified material is made available only on a "need to know" basis. Intelligence personnel can provide accurate knowl- edge regarding a problem only if they have access to all data bearing on that problem. If the clas- sification of certain data restricts availability, knowledge will be incomplete and false conclu- sions may be drawn. Intelligence officers, there- fore, rank high on the list of those who need to know. There seems to be no question but that training, and continued training, is of inestimable value for developing the highest caliber of personnel to produce the highest caliber of intelligence. A program of training for reserve military person- nel in peacetime has assumed more importance because of the rapidity with which the military services must expand in the event of total war. If military intelligence organizations are to be sufficiently flexible to continue adequate and effi- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL cient production of intelligence under wartime con- ditions, there must be a substantial reserve force, well trained, which can be activated in a minimum time interval. Since World War II, the develop- ment of a permanent intelligence corps in each branch of the Armed Forces represents a step toward improving this situation. While the ac- complishments of reserve personnel in World War II were phenomenal, considering the fact that their training was carried out "on the job," mis- takes were made. Modern warfare has reduced materially the available time to recover from mis- takes. Only training can maintain reserve mili- tary personnel at a degree of efficiency which will permit them when called upon to contribute ef- fectively to the production of intelligence. Undoubtedly, one of the most difficult aspects of training is that of method in intelligence produc- tion. This term, production, brings our discus- sion to the third connotation of the word "intelligence." INTELLIGENCE AS PRODUCTION "Intelligence involves the collecting of infor- mation, its processing, and the disseminating of the resultant knowledge to those who need it." In this illustrative statement, intelligence means production. The production effort, known as the intelligence cycle, includes collection, processing, and dissemination. Since the cycle is the subject of later chapters, only certain general comments need to be made here. A technical intelligence vocabulary has been developed to apply to the various phases of production. Different terms are sometimes used by different organizations to describe the same working tools, working proce- dures, and mental processes, but if the basic proc- esses involved are kept clearly in mind, confusion over definitions can easily be avoided. If the intelligence cycle is to be effective, there must be careful planning and firm direction to the production effort. Priorities in collection must be established, and a continuing program of guidance instituted for economic and efficient op- eration throughout all phases of the cycle. Intel- ligence organizations must be kept informed of overall plans and policies so that everything they do will have meaning and value. 15 Emphasis on the collection phase of intelligence production has resulted in the use of special terms to describe sources of information. For example, covert intelligence refers to information obtained by secret means, through spies or undercover agents, without the consent of the country in- volved. While it is this type of collection which has given intelligence activity the flavor of ad- venture and mystery, by far the greater amount of information is derived from sources available to anyone who knows how and where to look. Such sources include the newspapers, periodicals, governmental and business reports, radio broad- casts, and diplomatic representatives. Informa- tion gained from such sources is often called overt intelligence. Intelligence Collection in Time of Peace It is readily apparent that the collection of in- formation and the production of intelligence in peacetime is facilitated because information is customarily more easily available than in war- time. With the exception of some areas con- trolled by totalitarian states, data can be collected the world over to provide the encyclopedic knowl- edge which forms the broad base of intelligence. It is in such periods that Intelligence can make its greatest contribution to the nation by pro- ducing knowledge which can be used to thwart the nonmilitary aggression of other states, to pre- vent surprise, and to avoid devastating military conflict. In preparing for total war and avoiding sur- prise, collecting information, and developing knowledge regarding the scientific and technical advances of other nations assume particular sig- nificance. Science has always been applied to the perfecting of weapons of war. The improvement of old weapons and the invention of new ones have progressed rapidly since World War II. Never before has the fate of nations been sus- pended so precariously in the balance or depended so completely on the efforts of scientists racing against time. The increasing range of weapons and new tactics in their employment have brought home to the United States the awesome prospect of being caught by surprise. Ignorance might be a deciding factor in total war; intelligence is the weapon which must combat it. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The importance of intelligence in peacetime is well known to the French. The Prussian collec- tion effort, prior to the Franco-Prussian War of 1870, was so thorough that Bismarck's armies practically walked into Paris. The Nazi suc- cesses prior to World War II provide more recent and equally appropriate examples. Intelligence Collection in Time of War The collection of information in time of war is accomplished by methods which are usually more costly in terms of men, money, and materiel. The enemy, once identified, expends even greater efforts to deny information regarding himself or to con- trovert this information for the purposes of deception. Clausewitz pointed out the difficulties of war- time collection when he said: "A great part of the information obtained in war is contradictory, a still greater part is false, and by far the greatest part is somewhat doubtful. What is required of an officer in this case is a certain power of dis- crimination, which only knowledge of men and things and good judgment can give. The law of probability must be his guide." In time of war, collection is aided by such opera- tional means as aircraft, submarines, reconnais- sance patrols, ships, and by the interrogation of prisoners. Photography then becomes an indis- pensable means of collection, and a source of knowledge for both strategic and operational pur- poses. The accurate interpretation of photo- graphs reveals both the activities of the enemy and the terrain characteristics of the area of opera- tions. Because the factor of time has assumed such importance, continuing efforts are being made to develop techniques which will speed the trans- mission of photographic information from its source to those who can interpret and dissem- inate it. The numerical requirements for trained intelli- gence personnel rise sharply in wartime. In the case of the Navy alone, hundreds of additional officers and enlisted men must be assigned to the expanded fleet organization, flag staffs, motor tor- pedo boat, and air squadrons; to intelligence cen- ters and advanced base units; to sea frontiers and naval districts; to naval attache posts; and to joint or combined military staffs. Rapid expan- CONFIDENTIAL 16 sion can be accomplished only if there are sub- stantial well trained reserve groups which can be quickly activated. To insure the continuous flow of intelligence production, however, adequate numbers must be employed at all times, in peace as well as war. The curtailment of this produc- tion can be as disastrous to the nation as the failure to keep pace with the development of physical weapons. Processing Information The collection of information is a time-consum- ing and expensive operation. It can be an almost futile effort unless its results can be converted into usable knowledge. This conversion phase is much more than the physical handling or rearrangement of information received; it involves original think- ing as well as logical thought processes. Ob- viously, many difficulties arise in large organi- zations where volumes of factual material must be so catalogued and disposed that interrelation- ships can be studied and new meanings derived. Processing data may be compared to refining crude oil. The oil is subjected to many stages of cracking; at each stage a different substance is developed; until, at the final stage, a new product is created. So it is with the processing of in- formation. When received, the original informa- tion is studied. From this study, first conclusions are drawn. These conclusions are then studied in connection with those supplied by other basic data. At each stage of study, the subject material is transformed into a new conclusion. As in the oil cracking process, each stage must follow a logi- cal sequence. For ready reference at each stage of production, a complete and systematic filing system is essential. At no point, however, can any study or solution be considered as irrevocably definitive, in view of the fact that it concerns the activities of men in which there is constant change. Therefore, no conclusion may be said to be final; each is subject to possible change. Of course, material dealing with certain physical con- ditions, such as terrain, are the least subject to change. A basic problem of production is that the in- formation received may be incomplete and con- tradictory, requiring the application of the most searching standards of proof for all conclusions. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE: A GENERAL ORIENTATION CONFIDENTIAL The processing phase itself is a delicate operation and subject to errors resulting from the omission of necessary comparisons, the inclusion of false data, or failure to follow a logical sequence. The problems of processing and the application of scientific methods in intelligence production will be discussed at more length in a later chapter. Intelligence Action In the military services, intelligence is a staff function operating as an adjunct of the com- mander. Intelligence takes a vigorous part in helping to formulate the action which will be taken by or in the name of the commander. In- telligence, therefore, is not an action agency, if by the term is meant chain of command authority. However, action, and plenty of it, is involved constantly in the collection of information and in the prompt dissemination of intelligence to those who need it. Skillful action also is required in countering the intelligence efforts of potential ene- mies, as exemplified by the activities of the Army's Counter Intelligence Corps. To be stressed is the fact that Intelligence must maintain a positive and aggressive point of view, together with a keen sense of responsibility for its part in any action which will be taken. Intel- ligence personnel can never retire from the scene of decision after presenting their recommenda- tions; they continue to function after decisions are made and often become a part of action taken. CONCLUSION The purpose of this chapter has been to acquaint the naval officer with the meaning and significance of intelligence. It has been emphasized that in- telligence is one great body of knowledge, used for a variety of vital purposes. It is the result of skillful production by organizations composed of carefully trained personnel, and in the right hands at the right time, it provides a sound basis for diplomatic and military decisions affecting the welfare and security of the nation. Such intel- ligence, coordinated at the highest governmental level, is of common concern to more than one or- ganization and transcends the exclusive com- petence of any one part of the total system. It must not be assumed, however, that Intel- ligence is infallible or that it can provide all neces- sary knowledge. The most desirable situation would be the presentation of the precise intentions of potential enemies: when and where and with what means they plan to strike. Because such precise knowledge is seldom obtainable, Intelli- gence strives to provide the closest approximation. Limitations of Intelligence Intelligence is not without its limitations, the first being that information regarding potential enemies is often incomplete and inaccurate. While a vast amount of information is available for col- lection, the most vital is obviously concealed to the greatest degree possible. Often, incorrect in- formation is made available for purposes of de- ception, and its true identification requires both skill and experience. Since he seldom knows the enemy's specific objectives, the collector of infor- mation does not always grasp the significance of what he gathers, and his reports become meaning- ful only when collated with other data by the intelligence producing unit. A second limitation arises from incomplete un- derstanding of our own plans and objectives. In the field of national affairs, this limitation is caused by the fact that the United States is still trying to interpret its own position of world lead- ership and to formulate specific objectives which can aid the world today in the struggle against the threat of global conflict. In the field of mili- tary command, Intelligence will be limited by the extent of its knowledge of the commanders' plans and problems. A third limitation is that of personnel with suffi- cient skills and experience. Only in recent years has Intelligence been considered as a professional field, and its personnel in general require more training and more practical experience. Its doc- trines of method and procedure are still in the de- velopmental stage. In the military services, there has been additional limitation of numbers, for in the past, Intelligence has been manned almost ex- clusively by reservists called to duty in time of actual conflict. In time of so-called peace, it has been skeletonized to the degree that production has been critically limited. A fourth limitation of intelligence lies in the research process itself. An error in basic data, if not recognized, can become magnified progres- 17 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS sively to produce entirely false conclusions. In intelligence work the cost of such errors may be measured in human life. Recognizing this limi- tation, intelligence workers must exercise every effort to avoid the use of incorrect data and to re- view most carefully the conclusions reached at each stage of the production effort. Other more specific limitations, such as those of the physical equipment sometimes used in the collection of information, will be noted in other sections of this text. In connection with the gen- eral limitations indicated above, it is apparent that several can be reduced to a minimum and perhaps eliminated. The controlling factors include time, with its accumulation of experience, and an in- creased understanding of the problems involved in intelligence production. The Place of Naval Intelligence The comprehensive body of intelligence knowl- edge may be compared to a large pyramid, at the top of which are placed the most highly refined estimates needed for national policy decisions. Each contributing organization is represented by a cross section of the pyramid. Into these sec- tions is channeled the raw data acquired from thousands of sources at home and abroad. There is a descending as well as an ascending flow of knowledge within this pyramid, as specific re- quests for estimates are passed from the top down. The same holds true even within the organiza- tional levels. There is also movement horizon- tally between organizations on the same level. The speed with which the knowledge flows within and to the top of the pyramid depends upon the efficiency of the various organizations which make CONFIDENTIAL 18 up the pyramid. Because of the changing nature of war itself there can no longer be watertight compartments of knowledge nor can any one of these organizations be considered self-sufficient. Each contributes to and receives from the total body of knowledge. Naval Intelligence is an integral part of this pyramid. It produces what is known as depart- mental intelligence. It contributes to the total body of knowledge through the use of the pro- fessional naval training and experience of its per- sonnel in interpreting and evaluating data con- cerning an enemy. It provides specialized naval agencies particularly adaptable for the collection of certain types of information. It gives guid- ance to the collection effort to assure that the in- formation procured is relevant to the needs of naval planners and policy makers. It produces intelligence which will directly serve naval com- manders in the solutions of their problems and the reaching of decisions both for overall plan- ning and specific operations. While Naval Intelligence must therefore con- tribute to the total body of knowledge, it must also utilize those parts of the total body of knowledge which directly or indirectly affect the successful accomplishment of its assigned respon- sibilities. The same applies to all other organi- zations of our national intelligence system. The only difference is one of emphasis. For these reasons, the scope of this text is neces- sarily large, in order that it may serve at least two purposes: to indicate to the naval officer the broad body of knowledge with which he must be familiar, and to point out the specific naval uses of this knowledge. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 2 THE DEVELOPMENT OF INTELLIGENCE INTRODUCTION Intelligence is neither new nor peculiar to mod- ern times, whether it be interpreted as knowledge, as organization, or as production. While the em- phasis on its many aspects has varied from time to time, intelligence has always existed in one form or another. Ever since men organized themselves into community groups they have sought for var- ious reasons to dominate other groups, by means of military force or by political or economic measures backed by military force. Whatever the means employed, advance information about the enemy, when collected and processed, has been used to advantage from time to time throughout re- corded history. The story of armed combat is fundamentally a record of the historical evolution of military or- ganization: from primitive men who fought as independent individuals with stones and clubs to modern men who fight as part of an intricate mass machine. As the organizations grew in size, so did the battles fought, requiring more and more the use of military staffs to assist the commanders in planning and carrying out their decisions. The history of this military growth has been divided into three periods: the first, from the beginning of written records to the fall of the Roman Em- pire, a period when military methods evolved from mob action into a recognized art, including prac- tically all of the modern principles of war; the second, the Middle Ages, when there was almost no progressive military thought; and the third, from about 1632, the time of Gustavus Adolphus, to the 20th century, when modern military ma- chines emerged. As military organization has de- veloped, so has Intelligence. Thus Intelligence has a military origin. Full knowledge has always been essential for the suc- cessful general. The French Marshal Maurice de Saxe, in recording his experiences, commented: "You cannot give too much attention to spies and guides . . . They are as useful as the eyes in your head and, to a general, are quite as indispensable." To be found in one form or another in the ancient writings about war is the maxim: "Other things being equal, victory goes to the commander with the latest and the best information." Political leaders and the governments of nations have also made use of intelligence since the beginning of recorded history. While both military and political leaders have long recognized the importance of gaining ad- vance information, there have been times when they either failed to obtain it or neglected to make use of it. A study of military history reveals that many defeats in battle have resulted from failures to use intelligence. Indeed, there are indications that intelligence has had a marked effect on the shaping of world events. Illustrative of a failure to use intelligence, and the effect on later events, is the case of the British Admiral De Robeck whose Anglo-French fleet won a complete victory in the Dardenelles during World War I. As a result the Turkish Govern- ment began the evacuation of Constantinople, and the Allies might have taken the city, had De Ro- beck made any effort to obtain information about the enemy. In ignorance he withdrew, and con- sequently the ill-fated and disastrous Gallipoli campaign was undertaken. A striking feature of the historical development of intelligence is its slow progress, shown by the similarity of ancient and modern methods. There is little difference between the instructions of Moses to his 12 spies who were to go into the land of Canaan and those of Stieber, Bismarck's In- telligence Chief, to his agents who were to infil- trate France. The difference is merely in the numbers involved. In fact, modern intelligence seems to have little that is really new, although the character of intelligence has changed from time to time. Before the rise of nationalism, the collecting of information was a trade carried on 19 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS by those whose services were at the disposal of the highest bidder. With the upsurge of the modern states, patriotism gave new motivation to the ac- tivities of the collector. In recent times, some of those engaged in intelligence activities are moti- vated solely by an ideological fanaticism which recognizes no national boundaries. It is obviously quite difficult to trace the his- torical development of intelligence. It is seldom exposed to the public eye, and for reasons of se- curity, those making use of intelligence cannot disclose methods, sources of information, and ex- tent of knowledge. Available records, therefore, are relatively few and incomplete. It is clear, however, that intelligence has not only been the first line of any nation's defense, but also the springboard of offensive action aimed at surprise and deception. At times it has taken the form of a shadowy undercover war of world-wide proportions. As a result, the outcome of great battles involving armies, navies, and air forces, has depended upon the result of conflicts between intelligence organizations. These have often taken place long before a declaration of war, and have continued after the signing of an armistice. The intensity of the total intelligence effort be- fore and after World War II indicates that intelli- gence activity is of a long range and continuing nature. Intelligence has served many purposes. From earliest times tyrants have subverted intelligence organizations into repressive systems of political police, thus placing exaggerated emphasis upon domestic espionage and counterespionage. Free people, too, have used intelligence to advantage in promoting and maintaining their national inter- ests. Historically speaking, Intelligence has not been the exclusive tool of armies and governments, for it has also been used by revolutionaries, church- men, bankers, trade unions, and criminals. In this historical review, the intelligence activi- ties of armies and governments are of primary interest. Much can be learned from past experi- ences for contemporary application. EARLY HISTORY The desire for advance information about a prospective adversary is an instinctive character- istic of man. Even primitive tribes, with only CONFIDENTIAL the crudest weapons and no appreciable sense of group discipline, carried out reconnaissance of their enemies. For example, before a band of forest Indians set forth on the warpath, their chiefs sent the most able warriors to learn about the trails and streams in the area of attack and to discover the numbers, disposition, and state of preparedness of the enemy. The early successes of the American Indians against numerically su- perior and better armed white men were often the result of the Indians' superior, though primitive, system of intelligence. 20 Intelligence in Antiquity Intelligence activity is as old as war. One of the earliest and best known records may be found in the Bible. Moses selected men from each of the twelve tribes and sent them into Canaan with these instructions: "See the land, what it is; and the people that dwelleth therein, whether they be strong or weak, few or many; And what the land is that they dwell in, whether it be good or bad; and what cities they be that they dwell in, whether in tents, or in strongholds; And what the land is, whether it be fat or lean, whether there be wood therein or not." It is to be noted that he chose leading men to do the job, and that their instructions included both the characteristics of the enemy and the area of potential operations. But long before Moses, the Pharaohs of Egypt were receiving regular intelligence reports from their agents scattered beyond the valley of the Nile. The Egyptian army had a rudimentary staff organization which included an intelligence function, that of receiving reports from recon- naissance units. With the Assyrian armies as models, the Persians under Darius made further advances in military organization and planning. Herodotus' account of their invasion of Greece describes the extensive preparation that preceded their military campaigns. A system of staff or- ganization was developed, and there is evidence of the functional existence, at least, of intelligence officers. The soldier kings, apparently, did not delegate any operational functions, but kept them inherent in command and so they have remained ever since. It is also most likely that the so-called "intelligence officers" were primarily collectors, and that the early military commanders who led Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT their followers into battle solved their own intelli- gence problems and did not rely on intermediaries to digest information reports. However, they did develop extensive courier services for the rapid transmittal of intelligence and administrative reports. Alexander the Great inherited an efficient mili- tary machine from his father and for thirteen years carried on continuous campaigns throughout the then-known world. While the basis for a military staff existed in the form of several officers under his personal direction, Alexander appears to have been his own intelligence and operations officer. He relied heavily on reconnaissance, which was essentially on operational function. Military postal censorship is reported to have orig- inated with this Greek conqueror. During one of his expeditions into Asia he heard rumors of dis- affection among his allies and mercenaries. In order to determine the true situation, he announced that he was writing home and encouraged his officers to do likewise. When all the messages had been collected, he examined them and proceeded to correct such conditions as appeared to have been justly criticized. Intelligence in Ancient India At about the same time that Alexander was ex- tending his conquests, the famous Brahman, Kautilya, is reputed to have overthrown the Nanda dynasty and established the first Mauryan king on the throne of India. Kautilya is known not only as a kingmaker but also as the greatest Indian exponent of the art of government, the duties of kings, ministers, and officials, and the methods of diplomacy. A Sanskrit book of ad- vice to rulers, attributed to him, reads in part almost as a modern manual on military and polit- ical intelligence. It emphasizes the fact that a highly organized intelligence service is essential to the state and of first consideration in both peace and war. In discussing the expansion and se- curity of the state Kautilya says, " . . . he who has the eye of knowledge . . . can, with little ef- fort, make use of his skill for intrigue, and can succeed by means of conciliation and other strate- gic means and by spies . . . in overreaching even those kings who are possessed of enthusiasm and power." OF INTELLIGENCE 21 CONFIDENTIAL Kautilya recommends that his ruler should first strike the enemy at his weak points by means of spies. In describing the means to conquer an en- emy's stronghold, he lists first "intrigue, spies," and "winning over the enemy's people." "Siege and assault" are last on the list. Although his terminology is a bit obscure, he accurately de- scribes the modern fifth column and Soviet sub- versive activities when he says: "The arrow shot by the archer may or may not kill a single man; but skillful intrigue devised by wise men can kill even those as yet unborn." Distrust and suspi- cion are powerful weapons when forged within an enemy country. Before beginning a military operation, Kautilya advises: "The conqueror should know the compar- ative strength and weakness of himself and his enemy" and no war should be undertaken without a careful examination of all the factors as reported by the king's spies. These factors could well serve as an outline for an estimate of the situation pre- pared by a modern military staff. "Having ascer- tained the power, place, time, the time of march- ing and of recruiting the army, the consequences, the loss of men and money, and profits and dan- ger," the conqueror "should march with his full force." Kautilya divides the king's army into five parts: elephants, chariots, horsemen, archers, and spies and of these he considers the spies the most important. The spy system of the Mauryans apparently rivaled that of the modern Soviets. It included many classes, both military and political, operat- ing within India and in adjoining countries. One class shadowed the king's ministers and officials and attempted to determine their very thoughts. Another, drawn from the merchants and farmers, reported on the wrongdoings of the people. A third, whose sons and wives were kept at home as hostages, operated secretly in foreign countries, spreading unrest, committing acts of sabotage, and even assassinating political and military leaders. Official envoys to foreign kings were instructed to make friends with officials of the enemy, to con- trast military stations, war material and enemy strongholds with those of their master, to deter- mine the size and location of forts, to identify local intrigues, to sow dissension, and to determine en- emy intentions. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Counterspies and watchmen were employed; there were border guards to check on all who attempted to enter or to leave; and travelers had to have passes. In order to dispose of seditious persons who opposed the king, these persons were secretly incited to reckless action and then con- demned. Kautilya reminded his king that he would be able to know all things through his spy system, and that his information should be con- sidered reliable if received from three different sources in exactly the same version. He also em- phasized the importance of the speedy transmis- sion of information. The Mauryan Empire of India appears to have been a police state in the most modern sense. Kautilya's book seems to have been a standard manual for the Mauryan rulers, and to have been based on experience. A study of the methods of this ancient dynasty, which was able to conquer and hold a greater part of India, sheds consider- able light on the intelligence operations of any despotic state. Intelligence and War in Ancient China It is indicative of the early development of civilization in Asia that outstanding military and political leaders were recording their experiences and knowledge long before the same was done in Europe. About Kautilya's time in India, a Chinese General named Sun Tzu wrote a treatise on the Art of War which was so sound that its principles may be easily adapted to modern war- fare. Sun Tzu discussed the fundamentals of war and the influence of politics and human na- ture on military operations. His writings indi- cate, in a striking manner, how unchanging these fundamentals are. Writing as a field commander on the subject of strategy and tactics, Sun Tzu emphasized the im- portance of terrain study and accurate informa- tion about enemy strength and intentions. He stressed maneuver and deception and the attain- ment of victory by indirect methods. Like Kautilya, he recommended battle only as a final resort and placed primary importance on a good intelligence service: "A hundred ounces of silver spent for information may save ten thousand spent on war." His formula for victory aptly states the basic reason for maintaining an intelli- CONFIDENTIAL 22 gence service: "If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor your- self, you will succumb in every battle." Sun Tzu warns against information derived from appearances alone, and accepts only that which is obtained from intelligence agents. Most effective are those who have penetrated the high councils of the enemy and the operators whom we now term "double-agents." In addition, it is profitable to employ inhabitants of an enemy country to act as local spies, and to have other agents spreading false rumors for purposes of de- ception. Finally, there must be spies in the enemy forces to be firsthand sources of informa- tion. In selecting intelligence personnel Sun Tzu would employ only those with natural abil- ity and of high mental caliber. He continues with the observation that if military warfare be- comes necessary, "spies are a most important ele- ment, because on them depends an army's ability to move." Another Sun Tzu maxim has been heeded by both Nazi and Soviet leaders of recent years: "To fight and conquer in all your battles is not supreme excellence; supreme excellence consists in breaking the enemy's resistance with- out fighting." Developments by the Romans Quite independent of the Oriental generals, but about the same time, the Romans were developing their own military organization and doctrine in Europe. By the time of Julius Caesar the staff of each legion included ten "speculatores" who served as an information collecting agency. Caesar's successful campaign against the Helve- tians was aided materially by advance information he acquired about their strength, movements, and plans. The "speculatores" are the first intel- ligence personnel to appear definitely in a military staff organization, and there is evidence that the Romans differentiated between the staff functions of intelligence and operations. This early dis- tinction was not "re-discovered" by military com- manders until relatively modern times. The military success of the Romans was also aided by their communications system. Frontinus Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL and Lipsius, in their writings, describe the train- ing of swallows as long distance messengers and the use of carrier pigeons, which explains the amazing speed with which the intelligence of Im- perial Rome was transmitted. An efficient intel- ligence organization was thus able to give warning of an impending surprise offensive by Hannibal and Antiochus in Asia Minor in time to enable Lucius Scipio to regroup his forces and administer a crushing defeat at Lydia. The Romans also em- ployed ciphers to ensure the secrecy of communica- tions. Skillful covert operations were of positive mili- tary value. Scipio Africanus used his officers dis- guised as menials and servants to secure reliable data on the strength of the opposing Numidian army. His methods have a peculiarly modern flavor since, in order to gain time for accurate ob- servations, he entered into negotiations with the Numidians, presumably to arrange a treaty. In the following centuries of Roman imperial- ism, intelligence continued to be fostered by the emperors, and covert activities were practised to an unscrupulous and vicious degree in palace cir- cles. Vegetius, in his advice to the Emperor Vu- lentinian, states that a general may avoid defeat if he employs spies on whose intelligence he can depend. Like the military writers of Asia, he em- phasized the importance of trying to sow dis- sension among enemy peoples, and comments that no enemy nation, regardless of how weak, can be completely ruined "unless its fall be facilitated by its own distraction." The professional army of the Byzantine Empire also had a well organized intelligence service. Much more colorful, however, was the elaborate spy system of the Empress Theodora which per- meated the entire governmental structure of the Empire. It should be noted that the oriental mind has always appeared to stress political over mili- tary intelligence. The Middle Ages Military intelligence in this period of chivalry was of little consequence to warriors for whom fighting was an individual sport. On the other hand, the Mongol conquerors who swept into east- ern Europe from Asia during the 13th century made use of not only an efficient intelligence sys- tem but also of an effective propaganda machine. Agents of the Mongol commanders ranged far in front of the invading hordes spreading rumors of Mongol terrors and collecting information on the weaknesses and rivalries of Europe. Local citizens were used to advantage. The Venetians, for example, striving to gain superiority over their rivals, supplied information to the Mongols in return for help in ousting Genoese traders from the Crimea. In addition to agents disguised as merchants, the Mongol commanders maintained a screen of scouts in front of each column of soldiers. They appreciated the need for the rapid transmission of information, and established a pony post system across the whole of eastern Europe. The code of laws set up by Genghis Khan instructed his gen- erals to send out spies and to bring in prisoners who would be forced to give information which could be checked against the reports of the spies. The Mongols provided for Western Europe an un- heeded example of an effective military intelli- gence and staff communication system. They greatly influenced the Mogul Emperors of India who perfected an amazing political intelligence service. Among the personnel of this service were spies who visited houses twice daily for the osten- sible purpose of removing refuse and trash. Although the knights of medieval Europe scorned the advance collection of information about their enemies, the churchmen had no such scruples. They not only utilized already known intelligence collection methods but contributed variations of their own. De Torquemada, head of the Spanish Inquisition, developed a political intelligence system which has scarcely been equalled. Thousands of intimidated men, women, and children were encouraged to give information which would incriminate their own relatives and acquaintances. Large groups of spies were care- fully trained, and a manual of instructions was prepared for their guidance. The Renaissance of Intelligence With the rise of nationalism and the develop- ment of modern armies the need for intelligence became apparent to the larger states. Following 23 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS an Italian lead, the principal courts of Europe be- gan to exchange resident ambassadors, one of whose functions was to collect information on the political and diplomatic activities, the plans, and the military strength of potential enemies. As time progressed an increasing volume of political and military intelligence, collected by covert as well as overt means, flowed into the various capi- tals of Europe to be processed and filed for use in making important strategic decisions. As early as the 15th century French and German military organizations known as "Landsknechts," meaning "men of the country" as opposed to for- eign mercenary troops, were developed. The staffs of these armies embodied the principal char- acteristics of the modern regimental staff. Be- cause the quartermaster general had to precede the troops on the march in order to arrange for quartering and feeding, he also became responsible for reconnaissance. This functional development exerted considerable influence on the German and English staff systems. Gustavus Adolphus of Sweden created a "Chief of Scouts" on his Su- preme Staff, indicating both his awareness of the importance of intelligence and his realization that intelligence as a staff function should be separate from operations and logistics. It is generally agreed that the military organization developed by Gustavus served as a pattern in Europe until the 20th century. With him, therefore, modern military history began. While there are records of intelligence activities throughout English history and especially from the time of Cromwell and Henry VII, it was Sir Francis Walsingham, under Elizabeth, who gave England its first national intelligence service. His crowning achievement was the employment of a spy on the staff of the Admiral in command of the Spanish Armada. Thus he was able to ob- tain the most detailed information regarding the state of readiness of the Armada, its ships, equip- ment, forces, and stores. In addition, under Wal- singham's guidance, the English Government per- suaded the bankers of Genoa to withhold certain loans to Philip of Spain which delayed his naval offensive against the English. In France, the crafty Cardinal Richelieu de- veloped an effective intelligence organization. It CONFIDENTIAL 04 included a network of covert collectors who trans- mitted prompt and accurate information to Paris regarding the activities of the many rebellious and dissident elements of the kingdom. An ex- pert in political intrigue and diplomatic maneuver, Richelieu used his intelligence forces to strengthen the central government of France. After him, Louis XIV consolidated his personal power by means of a systematized political police, continu- ous surveillance, postal censorship, and a peace- time military intelligence organization. The famous French general, Maurice de Saxe, organ- ized an intelligence service which represented a considerable improvement over others of his time. Unlike the Germans, the French based their mili- tary staff organization on Roman theories. As a result, the French staff included officers charged with the separate functions of supply, administra- tion, operations, and intelligence. By 1700 the pattern was set for the French staff system of World War I, and consequently for the system used by the United States Army. The French military writers of this early period appreciated the value of reconnaissance in major military plan- ning and stressed professional knowledge as in- dispensable to national military power. Intelligence activity appeared in other coun- tries during the 18th century. In Russia it took the form of a political police system under the personal supervision of the Tzar. The forerunner of the dreaded Ochrana was the "Special Office," later called the "Secret Office," which was used extensively by Peter the Great. In colonial Amer- ica, Baron von Steuben served as an intelligence and operations officer on Washington's staff. His recorded intelligence activities include an analysis of British and American capabilities and limita- tions and a personal reconnaissance of General Clinton's forces before the battle of Monmouth. All of the great European military leaders, in- cluding Marlborough, Prince Eugene, Maurice de Saxe, and Frederick the Great, appear to have recognized the importance of intelligence and used it. Each, in his own way, contributed to its de- velopment. Frederick the Great, for example, established four classes of agents for the collec- tion of information and set up careful rules for selecting and training them. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL Expansion of Intelligence Activities Under Napoleon Napoleon once said: "One spy in the right place is worth 20,000 men in the field." The truth of his remark was amply substantiated by one of his own agents, a man named Schulmeister, who man- aged to become the Chief of Intelligence for the Austrian general in command of armies opposing the French. Every Austrian plan and move was carefully reported to Napoleon, while false infor- mation was supplied to the Austrians. Undoubt- edly the clever machinations of Schulmeister contributed materially to the brilliant French vic- tories at Ulm and Austerlitz, which led to the sur- render of Austria. It is of interest to speculate on what might have been the historical results had Napoleon's agent failed in his efforts. Napoleon's personal staff included two bureaus of interest. The first, and most important, was the Bureau of Intelligence, staffed by two officers and an unknown number of agents. Its function was to consolidate all incoming information re- garding the enemy for presentation to the Em- peror, and to obtain such special information as he desired. The second, closely related to the first, was called the Topographic Bureau. Here was maintained a large situation map covering the latest information regarding both enemy and friendly forces. In the field the French Head- quarters Staff was divided into four sections, one of which was responsible for reconnaissance, op- erational planning, communications, postal serv- ice, and the employment of guide companies. It was at the beginning of the 19th century that large conscript armies came into general use, and with them large scale military maneuvers. Napoleon's genius for efficient military organiza- tion brought him resounding successes and tre- mendously influenced modern military theory and tactics. His military staff system was much more effective than that of the Prussians, and Intelli- gence served him well during a part of his spec- tacular career. It should be noted that during the wars between the French and the Germans, in 1806 and again in 1870, victory came to the side which had the superior staff system. It may also be said that victory at Waterloo came to the gen- eral who had advance information concerning the enemy and the area of operations. 289196-54-3 25 In addition to his military intelligence organi- zation, Napoleon maintained an effective secret political police service over all of Europe. Under the shrewd and remorseless direction of Joseph Fouche, and later of Savary, this service was held in fear and terror. It was during this period that the system of spying upon spies reached such pro- portions that the term "counterespionage" came into popular usage. Like England, France has had a governmental intelligence system almost continuously since the 15th century. But only during the time of Napo- leon, and during and after the First World War, did the French system achieve the international scope of the English. The Status of Intelligence in the United States As already mentioned there is evidence that General Washington made some use of intelli- gence methods; however, there was no organiza- tional development in the United States until the late 19th century. At the beginning of the Civil War the Federal forces had no intelligence organi- zation, and Gen. George B. McClellan relied al- most entirely on the Pinkerton Detective Agency to collect and evaluate information for him. Pinkerton himself served as a staff Intelligence Officer to McClellan, although he proved to be a poor substitute for a trained military observer. For example, in July 1862, McClellan based his military plans on Pinkerton's inaccurate estimate of Lee's strength at more than 200,000, while the actual opposing strength was less than 90,000. During the Civil War both the North and the South made use of spies. The tapping of tele- graphic wires was employed for the first time. One writer of this period, while acknowledging the importance of intelligence and listing a num- ber of recognized collection methods, felt it neces- sary to justify them as "honorable means of secur- ing victory over the foe." It was during the Civil War that the United States Secret Service was or- ganized, first as a military activity, and later as a Federal Government function. Wilhelm Stieber and Modern Intelligence Systems Together with the Frenchman Schulmeister, Stieber, who served as Prussian Minister of Police under Bismarck, developed the pattern for mod- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR ern intelligence systems. His claim to fame in this field is based both on the quality and the ex- tensiveness of his organization. His influence throughout Europe was tremendous, especially in France and Russia. With Stieber's assistance Bismarck was able with lightning speed to over- whelm Denmark in 1861, Austria in 1866, and France in 1870. Even the great German General Moltke was amazed at the vast amount of perti- nent military information supplied by Stieber for facilitating the rapid advance of the German armies, to the extent of making possible an accu- rate timetable for the victorious march into Austria. Stieber's activities in Austria for the 2 years prior to the invasion are an early modern example of the German fifth column technique. Methodi- cally he gathered information on fortifications, troop concentrations, and supply capacities, and recruited agents and saboteurs. By the time of the Franco-Prussian War he had an estimated 12,000 spies scattered throughout Europe, and boasted that some 85 writers on French news- papers were under his control, not to mention paid sympathizers among Italian, Austrian, and Eng- lish journalists. He set up a system of military censorship and organized a Central Information Bureau for propaganda purposes. He concen- trated on developing statistical and biographical knowledge, including the industrial potentials of possible enemy states and detailed data regarding their politicians, diplomats, and higher civil em- ployees. In addition to gathering information about roads, bridges, arsenals, fortifications, and lines of communication, he was interested in data on population, commerce and agriculture, local politics, and patriotism. Imitating Napoleon, he established the first formal system of German counterespionage. As one of Bismarck's most trusted advisers, Stieber organized an effective secret police system. He was also adept in the field of political intelli- gence. His work in alienating Russia and France prior to the war with France in 1870 was highly effective. In 1867 he arranged for an attempt to be made on the life of Alexander of Russia who was on a diplomatic mission to Paris, but he also arranged to frustrate and capture the assassin. To cap it all, at the trial he bribed the French CONFIDENTIAL 26 NAVAL OFFICERS jury and obtained an acquittal. The ultimate ef- fect was that the Russians were antagonized and canceled further efforts to form an alliance with France. Stieber created for Germany a superior intelli- gence system which was feared and respected throughout the continent of Europe. Because of his influence, however, the German intelligence system always retained some of the characteristics of a police organization. Beginnings of Japanese Intelligence The Japanese early applied their imitative tal- ents to the organization of up-to-date intelligence systems for both their Army and Navy. As a re- sult, they were able to use Intelligence as an effec- tive offensive instrument in the Russo-Japanese War of 1904-5 and to overwhelm its Russian coun- terpart. The Japanese victory in this war has been attributed in large measure to the effective- ness of their intelligence activities. For example, at Port Arthur advance information was obtained regarding the Russian minefields and the power station, transmission lines, and powerful search- lights designed to blind the attackers. With this knowledge, the Japanese fleet captured the port with minimum losses in a remarkably short time. The Japanese were particularly successful in the speed with which they collected and transmitted information. During the 18th and 19th centuries, intelligence was centralized and systematized primarily at the highest governmental levels. It therefore had a political emphasis and often a secret police bias. In the military field, each general often served as his own intelligence officer and directed his own intelligence system. With the increasing com- plexity of modern warfare, together with the added burdens imposed by larger, more diverse armies, greater logistical support and expanding areas of operations, commanders came to require better staff organizations, including adequate in- telligence sections. The impact of the striking Prussian victories of 1867 and 1870 had a tremen- dous effect on European military thinking and gave credence to the writings of such theorists as Berthier and Clausewitz. By 1900 the major European powers had developed modern staff sys- tems and had placed intelligence on the same level Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE with personnel, operations, and logistics, designed to function in times of peace and war. The Development of the United States Intelligence Organization?Navy The improvements and expansion of the world's navies during the latter years of the 19th century caused the Navy Department to realize its need for information from abroad. The building of new ships of steel instead of wood had begun, and the best available technical data were required in order that these ships might incorporate the latest methods of construction and the most up-to-date equipment. Accordingly, in March 1882 the Sec- retary of the Navy established by General Order an Office of Intelligence under the Bureau of Navi- gation for the purpose of "systematizing the collec- tion and classification of information for the use of the department, in relation to the strength and resources of foreign navies." The following year the Secretary emphasized two functions for the Office of Intelligence: the collection of informa- tion regarding the progress of naval science and the dissemination of that information. Not only commanders, but all other officers, were directed to collect and submit appropriate professional ma- terial to Intelligence. From the beginning, there- fore, Intelligence was given the primary mission of collecting, interpreting, and disseminating in- formation of value to the Navy. Commanders in chief were also directed to appoint an officer, pref- erably of their personal staffs, to perform the duties of fleet intelligence officer; and com- manders of ships were to appoint an officer of their command for similar duties. The emphasis was on positive foreign intelligence and on technical information such as ship construction and ord- nance. There was some initial opposition to the new intelligence office from some of the Bureaus, but the office was soon accepted. Lt. T. B. B. Mason was selected to head the new office and was designated as the "Chief In- telligence Officer." To him is due much credit for the early organization of the Office of Naval In- telligence. He was assisted by two other officers in Washington, with one naval attache in London. In view of the fact that the office was not estab- lished by congressional action, there were no ap- propriations for maintenance; accordingly, clerks 27 CONFIDENTIAL and equipment were borrowed from other offices and bureaus. This situation existed until after the Spanish-American War. The activities of Naval Intelligence during the Spanish-American War are of particular interest. There was a broadening of responsibilities, with a shift in emphasis to intelligence for strategic and operational use. The Office of Intelligence prepared data on the strength of the Spanish Navy and the condition of Spanish home and colonial ports. At the same time, the attaches were au- thorized to negotiate abroad for the purchase of ships and munitions of war, and six cruisers were purchased in this manner. In order to strengthen the position of attaches in collecting information abroad, requests for information by official for- eign representatives in Washington were chan- neled through the office. After 17 years of operation, the Office of Intelli- gence was established on a permanent basis by Congress in 1899, with regular appropriations for carrying on its work. It was charged with ob- taining information concerning the latest con- struction and equipment of warships during peacetime, and producing knowledge of the strength and disposition of enemy forces in time of war. It was to assist in maintaining the Navy in a proper state of readiness for naval operations and in providing knowledge to aid in the conduct of hostilities. The administrative responsibility for the Of- fice of Intelligence was shifted a number of times during the first 30 years of its existence: from the Bureau of Navigation, to the Office of the Secre- tary, to the Office of the Assistant Secretary, back to the Bureau of Navigation, and to the Office of the Aide for Operations. Finally, in 1915, when a Chief of Naval Operations was created by law, the Office of Naval Intelligence was established permanently as one of the divisions under Naval Operations. During its formative years the Office of Naval Intelligence was organized on the basis of the sub- ject matter with which it was concerned: there were desks devoted to ships, ordnance, personnel, communications, and steam engineering and elec- tricity. At this time technical information took precedence. One early Intelligence publication was entitled "Coal, Docking and Repair Facilities CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS of the Ports of the World: With Analysis of Dif- ferent Kinds of Coal." At various times prior to 1900 the Chief Intel- ligence Officer had additional responsibilities, such as: translation of foreign documents, preparation of the War Plans of the Navy and the Auxiliary Naval Force. Intelligence also prepared various kinds of information reports for the Naval Bu- reaus and for the Naval committees of Congress. In 1889 the regular report of the Secretary of the Navy included the following comment regarding Intelligence: "Its value to naval legislation and to naval administration is now fully recognized." Prior to World War I the development of a com- prehensive intelligence organization was slow, and serious problems arose in connection with the availability of trained officer personnel. As a re- sult civilian employees were used as much as pos- sible to permit continuity of effort. Since collection was a basic responsibility of Naval Intelligence, the collectors assumed an early importance. The United States Navy sent its first attache to London in 1882, the year the Office of Intelligence was established. One additional at- tache was later accredited to France, Russia, and Germany. As late as World War I, the Director of Naval Intelligence expressed the opinion that his office existed largely for the support of the at- tache system. As official agents for collection purposes, the naval attaches were cautioned to use reputable business methods. Adequate financial support was a major problem, and officers volun- teered for attache duty with full knowledge that their expenses would exceed their pay and allow- ances. This situation soon created a prejudice against these posts and rendered difficult the as- signment of qualified officers. The Development of the United States Intelligence Organization?Army The Army's Attache System dates from 1889. However, prior to World War I, the military at- taches received little guidance or support; nor is it certain that the information they collected was properly disseminated. As in the case of the Navy, financial support was a serious problem and the selection of officers as attaches was often a haphazard matter governed either by personal ac- quaintance or by the availability of an officer with CONFIDENTIAL 28 a personal income which would enable him to meet the expenses of diplomatic life in a foreign capital. The importance of intelligence to the Army was emphasized by Mr. Elihu Root when in 1902, as Secretary of War, he argued for the creation of an Army General Staff. In this connection he said: The Commanding Officer "must determine at what points and by what routes the place shall be ap- proached, and at what points his troops shall land . . . ; and for this purpose he must be in- formed about the various harbors of the island and the depth of their channels; what classes of vessels can enter them; what the facilities for landing are; how they are to be attacked; the character of the intervening country; how far it is healthful or unhealthful; what the climate is likely to be at the season of the proposed move- ment; the temper and sympathies of the inhabit- ants . . ." Primarily as a result of Mr. Root's efforts, the Congress created in 1903 an Army General Staff with three major divisions: Administration, Mili- tary Information, and War College and Military Studies. In subsequent years new divisions were established and Intelligence was placed under the War College. The few officers assigned to Intel- ligence before World War I had a constant strug- gle against prejudice, a half-hostile tradition, and inadequacies of operating facilities. Such intel- ligence effort as was possible was confined to col- lection, with little processing or dissemination. As late as April 1917 the Army's Intelligence Sec- tion consisted of only 2 officers and 2 clerks. Such was the status of military intelligence in the United States just prior to the First World War. By contrast, the major European powers at the same time had military intelligence organi- zations operating as general staff divisions. WORLD WAR I The many tensions which had been building up for 50 years finally exploded in World War I. Perhaps some of them were observed by various intelligence groups, especially during the fateful year of 1913. Some writers have suggested that certain situations, such as the Austro-Balkan con- flicts, might have been averted had intelligence Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL knowledge and organization been properly ex- ploited. In any event, the various military intelligence services of Europe all believed themselves to be prepared to handle any situation, but they were not prepared for a long general war. Suddenly they found themselves short of trained personnel, and without sufficient funds. Their peace-time efforts had not been adequate. The German sys- tem was coasting on its past reputation, while the Russians had never developed a modern or ef- ficient system. Although British Intelligence was small, it had a nucleus of organization and a back- ground of experience capable of rapid expansion. French Intelligence, in the first critical days of the war, failed in its estimate of enemy strength. It did not anticipate the possibility of early German use of reserves, which put twice as many troops against the French armies as had been estimated. General Joffre's battle plan was based on this erroneous estimate and had to be completely re- vised, practically at the time of actual conflict. Belgian Intelligence, activated as late as 1912, collected vital information on the new German siege guns, the capabilities of which indicated serious weaknesses in the Belgian defenses at Ant- werp, Liege, and Namur. However, the General Staff considered the reconstruction of these de- fenses too expensive and too time-consuming to be worth the effort. In addition, it was believed inadvisable to disturb their popular King with such bad news. The high command was also in- formed by Intelligence of the presence near the Belgian border of a German force of six brigades with a mass of artillery. The German tactical surprise at Liege, therefore, cannot be credited as much as a German success as an Allied failure to take proper countermeasures. Failures attributed to Intelligence have often been failures of a high command to utilize the intelligence available to it. As an additional example, at the Battle of St. Quentin the British Army suffered its most shat- tering defeat of World War I. At the same time, it had available the most elaborate collection sys- tem to be found in an area of combat. The nature of this war, of course, determined the pattern of intelligence activities. Develop- ments in transportation?the railroad and the motor truck?made possible the use of large ar- 29 mies and permitted the movement of sufficient ammunition and supplies to support the great ar- tillery battles and the masses of men engaged in trench warfare. This tactical situation, in which the defensive position was stronger than the of- fensive, resulted in the static kind of warfare characteristic of World War I. Discipline, train- ing, and tactics were important factors in deter- mining victory. Intelligence, therefore, concen- trated on information about the armed forces of the enemy and their capabilities. The introduction of aircraft as implements of war added a new method of collection: aerial reconnaissance. Both the area of operations and the activities of the enemy behind the battlelines were brought into focus for observation, report- ing, and use. A Cryptographers' War The employment of great armies over broad areas increased the requirements of communica- tions. These were met by the perfection of wire- less telegraphy. Codes and ciphers assumed a new significance and intelligence found an ex- panded field of operations. In fact, from the intelligence standpoint, World War I has been described as a cryptographers' war. At times the outcome of land and sea battles was determined in advance of actual conflict by those who inter- cepted and broke the enciphered operational mes- sages of the enemy. Several examples will be given in a later dis- cussion of communications intelligence, but two can be mentioned here because of their particular impact on the course of the war. At an early stage of hostilities two Russian armies, the First and the Second, were advancing separately against East Prussia, with the objective of joining forces for an attack against Hindenburg's army which was numerically superior to each, but inferior to their combined strength. The First Army failed to receive the field communications code which both were to use and was forced to send in plain language a message advising that it would be delayed three days in joining the Second. On the basis of this intercepted information, Hinden- burg attacked and massacred the Second Army in the famous Battle of Tannenberg; then crushed the First Army 3 weeks later. Russia never re- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR covered from this action and gradually slid into ruin and revolution. Early in 1917 the German ambassador to Mexico was given secret instructions to negotiate an al- liance with Japan in order to promote an attack by that country on the United States, with the aid of Mexico. As her reward Mexico was to receive three of the American States. This secret mess- age known as the Zimmerman note, was intercepted and broken by the British who gave it to the Amer- icans. This incident had much to do with bring- ing the United States into the war. A War of Spies and Agents Many tales have been told of the colorful per- sonalities in World War I who worked secretly to obtain information or to protect it. The story of Mata Hari, the exotic dancer and condemned spy, has come to epitomize the romantic and ad- venturous secret operative and to give the general public its strongest impression of those associated with intelligence activity. In spite of this fact, her actual effectiveness as an agent is considered questionable. There were agents, however, whose work was of considerable importance. One of the better known was Capt. Franz von Rintelen, a German agent who contributed in no small measure to impeding the flow of American supplies to the British prior to the entry of the United States into the war. With a talent for or- ganization, he promoted pro-German and anti- British sentiment in this country. His efforts on the New York waterfront were particularly suc- cessful. There his ingenious sabotage caused ships bound for England to blow up or catch fire. Labor unions were goaded into crippling strikes against production and war shipping. A phoney supply firm was organized which took several million dollars of Russian money for war material which was subsequently destroyed at sea. The Middle East was the scene of widespread and significant underground activity, German ver- sus British. In Persia a German agent named Wassmuss was so effective that four B ritish war- ships and several thousand troops were eventually dispatched to curtail his efforts. On the other hand, Lawrence of Arabia organized and con- trolled local tribes so effectively that he had more CONFIDENTIAL A?r-yrifilekr 79/1 30 I?? ro*: is I rill is III _? NAVAL OFFICERS value to the British than many thousands of soldiers. According to Gen. Maximilian Ronge, director of the Austrian Intelligence Service, secret agents were able to advise the enemy well in advance of every major attack that was projected in World War I. However, military high commands re- peatedly failed to take advantage of this vital in- formation. One interesting example is the Battle of Caporetto which the Austrians mounted against the Itrilians in October 1917. From the Austrian point of view, this battle was their most successful surprise attack of the entire war. It combined sound military judgment and thorough prepara- tions with a skillful offensive use of intelligence. Weeks in advance of the battle information was gathered regarding critical adverse political con- ditions existing within the civilian population in northern Italy. This information was dissemi- nated to the Italian front line troops just before the battle by means of carefully initiated Italian newspapers. Espionage, counterespionage, cen- sorship, and propaganda were all employed in this operation. The effect was devastating and the Italians lost 600,000 men as casualties and pris- oners. The success of this engagement, however was not the result of surprise. The Italian gen- eral had been fully warned of the intentions of the Austrians from several sources, including Ameri- can Military Intelligence. It was successful be- cause the Italians failed to act. The Myth of German Intelligence In 1914 German Intelligence still enjoyed a high reputation for offensive effectiveness throughout Europe. However, in the absence of strong lead- ership supported by the government in power, the formidable organization created by Steiber under Bismarck had deteriorated badly. In addition, the German Imperial Staff was so confident of a quick victory that it could see no need for Intelligence. Actually, at the outset of the war the German military intelligence system broke down. From 1906 it had concentrated its collection efforts in Russia and France. Its work was seriously handi- capped by inadequate financial support, lack of trained personnel, and active opposition from the diplomatic corps and other groups within the gov- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE ernment. When Col. Walther Nicolai was ap- pointed Chief of the Intelligence Service for the High Command in 1913, he found that there was no top level guidance for military intelligence. As a result, his organization did not understand the political and economic factors involved in its work. Apparently Naval Intelligence was more effective, but liaison was poor and there was no coordination. When war began, unlimited funds were allo- cated to Intelligence; but, Nicolai commented afterward, "money alone will not build up an In- telligence Service." The German collection effort in the British Isles had been neglected because the High Command did not believe Britain would enter the war. In addition, British counterintel- ligence was quickly able to apprehend the few German agents who were operating in the home islands. German Intelligence immediately suf- fered a black-out of information and had no ad- vance knowledge of the arrival in France of the British Expeditionary Force which joined with the French Army to defeat the Germans at the First Battle of the Marne. Nicolai found it necessary to reorganize military intelligence under the most adverse conditions. When appointed to his post he held the rank of major, and he soon found that his junior status was a real handicap. When war started his best officers were transferred to staff duty with the vari- ous armies. The commanding general of the army marching through Belgium considered his intel- ligence officers so unnecessary that he left them behind at Liege. Reasons for the initial failures of German Intel- ligence included lack of preparedness, general neglect of overall responsibilities, and lack of foresight. Military and political leaders failed to recognize the importance of developing a good intelligence service at the right time and over- looked the vital necessity for coordination of ef- fort. Counterintelligence was also understaffed and handicapped at the start of the war, with no central direction, especially within Germany itself. In spite of its weaknesses and initial failures, German Intelligence improved materially as the war progressed. It achieved considerable success in its espionage and sabotage activities in the 31 CONFIDENTIAL United States under the direction of von Rintelen, and completely disrupted the French Intelligence Service prior to the Battle of Verdun. It aided the Russian revolutionary movement by transport- ing Lenin across Germany into Russia. After the war was over, Nicolai wrote a de- tailed account of the wartime problems of German Intelligence and the conditions under which it operated, stating: "Its character and methods . . . should be generally known if it is ever to succeed both in carrying out its own tasks and in thwarting the activities of the opposing Intelli- gence Services. This applies also to States which possess no Intelligence Service, have no adequate idea of its importance, and do not realize how their people and their political freedom are threatened . . ." On the basis of subsequent developments, there is reason to believe that Adolf Hitler read Nicolai's book most carefully. French Intelligence The influence of Stieber in France was tremen- dous. By 1900 the Deuxieme Bureau had been established as part of the General Staff System and made responsible for all enemy information and the topographical service of the command. The staff was composed of the following divisions: administration, intelligence, operations, and sup- ply. This French system was to exert a strong influence on the development of the United States Army Staff during World War I. French naval attaches, unlike the British, were given direct con- trol of the Naval Secret Service operating in their areas. A Civil Intelligence Service operated under the chiefs of police of the various larger cities, with headquarters at Paris. This service was based on the organization established under Napoleon III. Nicolai considered France as the "perfect master" in the field of political and military intelligence, "directed by a strong and deliberate power policy." Russian Intelligence Under the Tzars, Russian military intelligence had no centralized administration and suffered be- cause of an inadequate number of personnel and no system for training. Full use was made of military attaches in the collection of information, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS although some were compromised by disclosure of their undercover activities. The incompetence of the General Staff had a direct effect on the work of Intelligence which was far from consistent in performance. It failed in Germany, while it suc- ceeded in Austro-Hungary. By means of black- mail, the Russians obtained from the Chief of Austrian Intelligence, prior to the war, a list of Austrian agents operating in Russia and, more im- portant, the complete Austrian battle plans. However, the Russian High Command, relying on this accurate information, failed to anticipate the probability of any changes in plans by the Aus- trians when they learned of the treachery of their Chief of Intelligence. As a result the Russians al- most lost the Battle of Lemberg in Galicia. Spying has always been a specialty of the Rus- sians and they have been adept in the arts of counterintelligence. Using the informer system established in France under Napoleon as a model, the Ochrana perfected the employment of the "agent provocateur" for purposes of internal se- curity and political repression. Some of the most active Russian revolutionaries were trained by the Ochrana. In addition, the so-called Black Cab- inet served as a private censorship office of the Tzar and for a time brought under its cognizance even officials of the Ochrana. British Intelligence The statement has been made that the British entered World War I with the worst intelligence system in Europe and ended with the best. Whether the first part of the statement is true or not, it is apparent that the initial organization was small, with limited funds available. At the be- ginning of 1914 there was a total staff of 14 to handle the counterintelligence section of military intelligence. Only 2 years earlier military staff doctrine had been formalized to include operations and intelligence functions within the same branch. Still earlier, the modern British Secret Service Department had been founded in more or less its present form. At the outset, however, the British were able to capitalize on the weaknesses of their opponents and to counter successfully the intelli- gence activities of the Germans. In an amazingly short time sources of vital information were being exploited with significant results. It is quite pos- CONFIDENTIAL 32 sible that the economic and financial organizations of the far-flung British Empire were helpful in developing many of these sources. Naval Intelligence expanded rapidly along with the total British Intelligence Service, achieving its greatest successes by means of censorship and its code room, the celebrated Room 40 0. B. With these means were combined a skillful use of covert agents. For example, an agent was placed in the German Admiralty where he had access to secret codes. On this agent's initiative, Admiral von Spec was ordered to attack the Falkland Islands. When the German squadron arrived it was met and destroyed by the waiting British. Illustrative of the work of the code room was an intercepted message which warned the British of an impend- ing German naval attack on the eastern coast of England. The result was the Battle of Jutland which forestalled the coastal attack and crippled the German Grand Fleet to the extent that it re- mained in its home ports for the balance of the war. The unfailing ability of Room 40 0. B. to break the enemy's codes aided immeasurably in the war against German submarines. By early 1918 the British Intelligence Service had reached a new peak of efficiency in the col- lection of information and the production of in- telligence. Nicolai, commenting later on British Intelligence, expressed the opinion that its work was unique and unsurpassed. The American Forces in Europe, which depended greatly on British Intelligence, regarded it as the best service in the world. The amazing accuracy of British information may be attributed in part to the ex- treme care with which all reports were checked. The reporting records of all agents were kept in great detail in order to determine their degree of accuracy and reliability over long periods of time. Some agents, known to be employed by the enemy, were left at large in order that the British might know what the enemy wanted them to believe. Another basis for the strength of the British Service may have been its reported corps of covert agents scattered throughout Europe, quite independent of its recognized attache system. The British record in World War I was not without blemish. One failure occurred at the Battle of Jutland when vital information failed to reach the commanding officer in time to be of use. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL As a result the German fleet managed to escape destruction. In retrospect, the British com- mander commented that the shore intelligence or- ganization and the command afloat must be more closely linked "to insure mutual confidence and service." The problem, in this case, appeared to be one of coordination and communications. United States Naval Intelligence When war broke out in Europe the Office of Naval Intelligence was an organization inadequate for war purposes. Its personnel included 8 offi- cers, 10 civilians, and 6 attache's. In an effort to keep abreast of rapidly changing conditions, Naval Intelligence, in 1915, established a War Informa- tion Service to obtain military, political, and eco- nomic information regarding potential enemies. At the same time, the office was reorganized on a functional rather than a subject matter basis. Four major sections were created. Section A was given administrative responsibilities and the con- trol of the collection of confidential information at home and abroad. Section B included crypto- graphic activities and a clipping service. Section C acted as a processing agency, while section D handled dissemination, archives, and a reference center. There were other sections concerned with translation, disbursing, filming, printing, and mail. For the first time, funds to carry on confi- dential work were provided by the Congress. Immediately upon the entry of the United States into the war there was a great expansion in the organization and activity of Naval Intel- ligence. The number of officers on duty jumped from 8 to 300, and the number of attaches was doubled. Since it was apparent that the intel- ligence services of the Allies could supply full information regarding the enemy in the European theater, domestic counterintelligence became a principal activity. This work was delegated to Aides for Infor- mation, now known as District Intelligence Of- ficers, who were assigned to each of the Naval Districts. Their responsibilities included investi- gations, plant protection, ship inspection, and naval personnel, both military and civilian. Branch Intelligence Offices were established as undercover agencies in large seaports and manu- facturing centers. These offices grew to consider- 269196 54- 4 33 able size and accomplished much useful work. As an indication of the extent of naval counterintel- ligence in the United States, over 3,000 individuals were actively engaged in its various activities at the peak of the war. Although cable and radio censorship was under the cognizance of Naval Communications, Intelligence provided consider- able assistance. In the domestic field there was some conflict of interests between Naval Intel- ligence and such other Government agencies as Military Intelligence, the Departments of Justice and Treasury, the Emergency Fleet Corporation, and the War Industries Board. Abroad, the naval attaches continued to have as their primary responsibility the collection of in- formation. The quality of their work during the war was subject to considerable criticism, espe- cially by staff officers assigned to United States Naval Forces, Europe, with headquarters in Lon- don. Adm. W. S. Sims, in command of this force, was also critical of the evaluation of initial reports by Intelligence headquarters in Washington. At the same time, he fully recognized the importance of intelligence and stated that the "efficient and intelligent exercise of command is entirely de- pendent upon information." It was his expressed point of view that there should be an entirely sepa- rate Intelligence Section on a naval staff which would work in the closest cooperation with the other staff sections. He stressed the opinion that Intelligence should be prepared to be the first in the field in the event of war. Some of the criticism of the work of the naval attaches can undoubtedly be attributed to the fact that the number of per- sonnel was inadequate to permit the satisfactory performance of their assigned responsibilities. It was also found that the personalities of officers per- forming attache duties and their ability to work easily with representatives of foreign intelligence services were of great importance. United States Military Intelligence Col. Ralph H. van Deman, called the "father of American Military Intelligence," played an im- portant role in the postwar recognition of Intel- ligence as a separate function of the Army's Gen- eral Staff. He was materially aided by the Sec- retary of War, the Army's Chief of Staff, and Gen- eral Pershing himself. The latter made Intel- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS ligence a coordinate section of his staff even before his forces landed in England in June 1917. The British, and especially the French staff systems influenced the staff organization of the American Expeditionary Forces in Europe, with the result that Intelligence sections were created at both higher and intermediate echelons. When America entered the war, Army Intelligence was rapidly expanded. The central office in Washington was organized into three branches. The positive branch was as- signed the functions of collection, evaluation, and dissemination. Its responsibilities included prep- aration of situation estimates and translation of documents. The negative branch carried out counterintelligence functions, including investi- gations regarding disloyalty and sedition, enemy activities, and graft and fraud in organizations under the control of the War Department. Thousands of officers and men were engaged in this field. The Geographic Branch was concerned with the production of maps, photographs, and terrain studies. In addition there were sections for administration, collection of information by attaches and troops, and codes and ciphers. In connection with MIS, the code and cipher section, it should be noted that this type of work was almost unknown to the War Department prior to World War I. Its activities were many and varied and have been recorded in some detail by II. 0. Yardley in his book, The American Black Chamber. However, this section was regarded only as a wartime agency by the Director of Mili- tary Intelligence and high Government officials, and was discontinued shortly after the war was over. During its relatively short existence, it demonstrated the importance of cryptography as an intelligence procedure essential to the success- ful prosecution of war. In the European Theater there are interesting examples of the effectiveness of Army Intelli- gence. One concerns the discovery of vital in- formation on German submarine operations in the North Sea and around the British Isles. In Oc- tober 1917, after a successful raid over England, the German zeppelin L-49 was forced down in France. Scraps of an operational map were ob- tained through the persistent efforts of an Ameri- can colonel who waded through a swamp over CONFIDENTIAL 34 which the zeppelin had traveled. The map con- tained a code covering the North Sea and British Isles area. It meant little, however, until a code book was recovered from two American souvenir hunters who had rifled the cabin of the L-49 prior to the arrival of Intelligence representatives. With the map and the code book, the Allies gained complete data on German submarine operations and were able to surprise and destroy a large num- ber of U-boats at their designated rendezvous. The activities of the military attaches in Eu- rope and the military observers attached to the European armies during the first part of the war appear to have been handicapped by organiza- tional deficiencies. In the War Department's Annual Report for the year 1919, the Chief of Staff commented that the valuable information gathered by these military observers was never properly used. During this period, the attaches were involved in counterintelligence work which proved both difficult and delicate. It was not until August 1918 that the Military Intelligence Division was established officially as coequal with the other Divisions of the Army General Staff. In commenting upon this devel- opment, the Director of Military Intelligence stated that correct military information can be obtained only as the result of correct staff organi- zation. He added: "Our Army now has its eyes open. It is the duty of every officer to study and support our intelligence organization in order that our Army eyes may never again be closed." At the height of its activity, near the close of the war, the Division in Washington was staffed by more than 1,200 highly specialized persons, of whom the majority were civilian employees. The field force was enlarged and improved, with rep- resentatives in all important foreign countries, in the major cities of the United States, and in each military unit at home and overseas. Army Intelligence personnel were utilized by the Ameri- can Commission during the peace negotiations in Paris. By the end of this war, there was apparent rec- ognition of the close relationships which should exist between intelligence and national strategy and between intelligence and war planning. Brig. Gen. Marlborough Churchill, Director of Military Intelligence, wrote that national policy is based Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE on accurate predictions regarding the interna- tional future and that war plans must be grounded on correct detailed information. "There is hardly an officer who does not realize that at a G. H. Q. and at the headquarters of every army, corps, di- vision, and similar unit, G-3 cannot make good plans unless G-2 furnishes good information." A strikingly similar statement was to be made more than 30 years later by the Army's Chief of Staff, Gen. Omar Bradley, in relating his personal ex- periences in World War II. Perhaps the most important single contribution made by the United States to the development of offensive intelligence method was the employment of aircraft to transport covert agents over the battlelines to and from areas under enemy control. In this connection, however, it should be noted that the head of Army Intelligence, at the end of the war, believed that covert agents could not be justified by the military in time of peace. In this belief he appears to have reflected the thinking then current among Washington officials. THE INTERWAR PERIOD In the period between World Wars I and II, political developments in each of the major na- tions distinctively shaped the emphasis on and therefore the results of intelligence. Having fought a war to end all wars, the United States sharply curtailed its military expenditures and em- barked upon a program of world peace. Public opinion was such that there was a necessary and rapid demobilization of both civilian and tempo- rarily commissioned personnel. A similar situa- tion existed in Great Britain, where a conservative government sought a return to the status quo. In France, Intelligence suffered increasingly from growing political corruption. On the other hand, restrictive political police systems became the foundation and support of autocratic govern- ments in Germany, Italy, and Soviet Russia, not to mention other smaller countries in central and eastern Europe. The Neglect of Intelligence in the United States The intelligence organization which had begun to assume some form by the close of World War I deteriorated rapidly. Military Intelligence, such as it was, suffered from insufficient funds, lack of 35 CONFIDENTIAL appreciation or sense of responsibility on the part of the State, War, and Navy Departments, and, most of all, from a feeling by most officers that an Intelligence assignment was undesirable. For the most part, Intelligence billets were filled by officers awaiting retirement. Such capable officers as were assigned found little opportunity or en- couragement to improve the situation. There was no successful effort to recruit or train new personnel. The organization of Naval Intelligence prac- tically fell to pieces. Contributing factors were the general desire to return to "normalcy," and a feeling of antagonism toward any organization involving classified activities. In 1920 the Secre- tary of the Navy assured the Congress that the activities of Naval Intelligence in the collection of information at home had been restricted and the office reduced to its prewar status. At the same time, the Director of Naval Intelligence was constrained to state that the activities of his of- fice were now the same as they had been in 1882. The number of attaches abroad was cut dras- tically. By 1938 world political conditions had stimu- lated an increase in the number of naval attaches. However, the collection of information was in- adequate and there were too few trained persons to process what was collected. By late 1941 the organization of Naval Intelligence had been ex- panded in Washington, in the naval districts, and overseas. The volume of incoming information increased correspondingly, but the years of neg- lect and inactivity could not be overcome so quickly. The Condition of British Intelligence The published records of expenditures ap- proved by Parliament for governmental intelli- gence organizations indicate roughly their status during the period from 1919 to 1939. More than $5,000,000 were appropriated in 1919. The fol- lowing year operating funds were cut to about one fifth of that amount, and during succeeding years there were still further reductions. Al- though the British had developed the best intelli- gence organization in Europe during World War I, they soon found themselves with little more than a skeleton force, incapable of much CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS productive action. Fortunately, however, the vital nucleus was retained upon which to build again. By 1935 there were indications that British Na- val Intelligence was active once more in the Mediterranean area. One of its self-revealed agents, Dod Orsborne, has given an interesting ac- count of his own assignment. His purpose was to obtain and to transmit information about Mus- solini's activities in Ethiopia and about the prog- ress of events in Spain. He was disguised as the skipper of a boat whose appearance could be radically altered from sailing vessel to steam trawler to diesel-driven fishing boat. He landed agents in Spain, the Balearic Islands, Morocco, Algeria, and Libya and brought back vital infor- mation to his contact at Gibraltar. His story is not only colorful, but also indicative of one type of intelligence operations in the Mediterranean during the period of increasing tension some years before the outbreak of war. By 1939 the funds reported as available to Brit- ish Intelligence had been increased to more than $2,000,000. Once again the British were to de- velop the most efficient intelligence organization in the world. Two of their initial and basic problems were those of personnel and training. For the im- pending war, therefore, their early intelligence efforts were necessarily defensive. Their success has been attributed, in part at least, to qualities of discipline, imagination, and improvisation. The Decline of French Intelligence At the close of World War I, France had one of the most efficient and extensive intelligence sys- tems in Europe. The head of Military Intelli- gence, through his membership on one of the important Allied commissions, was able to expand his organization of covert agents throughout Eu- rope during the early postwar period. As the newly created national states of central and east- ern Europe developed their own governmental structures, their intelligence systems were closely coordinated with that of France. By this in- genious method France was able to advance and to protect its national interests and to maintain an intricate network of agents and informers. The resulting organization was superior to that of Stieber and the equal, at least, of that of Napoleon. CONFIDENTIAL 36 In the decade before the Second World War, this organization was fatally weakened by the germs of internal corruption which spread throughout the nation, and which eventually aided the Germans in infiltrating both the political and military structure of France, thus further weak- ening the French intelligence system. The Expansion of German Intelligence As early as 1924 the Chief of German Military Intelligence, Nicolai, declared: "Now that inten- sive military, political, and economic espionage, after its successes in the World War, has become an official organ of the state, it is time that the public should recognize the fact." While the United States and Great Britain sought peace through the reduction Of their wartime organiza- tions, the Germans strove to profit by their mis- takes and to forge invincible weapons for military victory. The growth of a dictatorship under Adolph Hitler and the National Socialist Party encouraged, promoted, and soon absorbed this ef- fort of the German militarists. The militarists, including Ludendorff, were con- vinced that World War I had been lost because of a failure to organize the country for total war, behind the battlelines as well as at the front. Acutely aware that this war had shifted the em- phasis of attack to the minds and emotions of both soldiers and civilians, they recognized the great importance of propaganda. Lenin had enunciated the idea of an initial moral disintegra- tion of the enemy before attempting physical at- tack; and Hitler was in complete agreement. In Nein Kampf, he wrote, "In the future, the place of the artillery barrage as preparation for an in- fantry attack will be taken by revolutionary propa- ganda, designed to break down the enemy psy- chologically before the armies begin to function at all." To carry out this new type of warfare a new armament of knowledge was required. As soon as Hitler assumed power he gave high priority to the organization necessary to produce that knowl- edge. By 1937 the new German intelligence sys- tem was operating at peak efficiency with all of its many branches carefully coordinated by a Liai- son Staff, of which Rudolph Hess was the chair- man and Nicolai a permanent member. Included Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL in this system were: the Intelligence Service of the War ministry, under the direction of Nicolai ; the Abwehr, or Military Intelligence, under Ad- miral Canaris ; the Auslands Organization (AO), or Organization of Germans Living Abroad, headed by Ernst Bohle ; the Special Service of the Foreign Office, headed by von Ribbentrop; the Foreign Department of the Propaganda Min- istry, under Goebbels; Rosenberg's Foreign Polit- ical Office; the Foreign Department of the Min- istry of Economics and Finance; the Reich Colonial Office; and the Foreign Department of the Gestapo, under Himmler and Heydrich. Hitler's personal plan for world conquest was based upon means which were not only military, but also economic, political, and psychological. To make it effective, full information and accurate estimates were required concerning the entire re- sistance capability, both actual and potential, of prospective enemies. Knowledge of actual re- armament was not as important as rearmament potential; the capacity of an enemy's war industry was not as significant as the total industrial po- tential which could be geared to war purposes. Prof. Karl Haushofer's Geopolitical Institute at the University of Munich thus became an ad- ditional important branch of the German system devoted to the collection of information and the production of intelligence. With unlimited funds available, Haushofer employed more than a thou- sand research workers at home and abroad, in- cluding historians and economic statisticians. De- tailed analyses of the more important countries of the world were prepared from the point of view of their political, economic, and sociological struc- tures. Both geographic vulnerabilities and mi- nority group problems were included in these studies. Such was the comprehensive and complex Ger- man intelligence system. It was a worldwide or- ganization for the gathering of vast quantities of information, with elaborate facilities for classify- ing, evaluating, and converting that information into intelligence. Under the Nazis, intelligence as an activity was a huge enterprise, operating with the precision of a modern machine. No longer was intelligence a matter of individual ac- complishment but rather the combined achieve- ment of many groups. The dimensions of the new organization were drawn to accommodate the re- quirements of global war, fought by many means. It was a system new to the modern world. In developing this organization the Nazis were influenced considerably by Soviet methods. For example, the machinery of diplomacy was care- fully geared to intelligence operations. Special agents were attached to embassies, legations, and consulates throughout the world under the guise of military, naval, air, commercial, and press at- taches. Networks of covert agents were tied in with these special groups. The worldwide or- ganization of German-born men and women was exploited wherever possible. Its potentialities were great, as indicated by the size of its mem- bership which was officially reported in 1937 to be 3 million, and an additional 100,000 sailors serving on German ships. Special organizations in Ger- many were utilized, such as the Students' Bureau, the Bureau for Educators and Teachers, and var- ious labor and cultural groups. Even the Ger- man youth were carefully organized and trained to believe that sabotage, murder, and spying were natural expressions of loyalty to the State and Per Filehrer. Every conceivable method was employed to gain information. One of the more technical was the breaking of diplomatic codes. A clever device of the German Foreign Ministry was the delivery of an important note to foreign embassies on a quiet weekend which would require the embassy to re- quest instructions from its government. When such enciphered messages were presented to the Reichspost for transmittal, German cryptanalysts would attempt to break the codes used, capitaliz- ing on the possibility that the message had not been paraphrased and would contain the German note verbatim. Whether or not this particular device was used against the Belgians, it is true that their diplomatic code was known to German Intelligence before the outbreak of World War II. Initially at least, within the War Ministry, Nicolai was able to coordinate all Military Intel- ligence activities?army, navy and air?and to achieve an overall political guidance through liai- son with the Foreign Office. Under Hitler, there- fore, Nicolai's theories became practice for a lim- ited period of time. In addition, he was able to expand the field of military intelligence interest 87 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS to include not only fortifications, military person- nel, and materiel, but also such behind-the-line matters as communications systems, public utili- ties, and scientific and technical developments. Careful and early planning was a key feature of the German system. For example, the Abwehr, under Admiral Canaris, had selected its foreign listening posts and personnel with the greatest of care years before war came. There are indications that even the isolation of Germany by its enemies was given consideration, and well-laid plans were prepared by the Abwehr to permit the continued flow of information into Berlin from various areas outside of Europe. Intensive advance planning, in which Intelli- gence played a vital part, found its most startling expression in Hitler's development of the modern offensive weapon which came to be known, after the Spanish Civil War, as the fifth column. Highly effective in a number of foreign countries, this weapon consisted of corrupt, politically dissatis- fied, self-interested people who were won to the Nazi cause by means of propaganda and master- race doctrines. Many of these people remained in- active and unknown, to be used for special pur- poses when military conflict began. Then bridges were seized and road blocks formed by men in civilian clothes or local uniforms; and planned sabotage threw into confusion local defenses, sup- ply systems, and transportation and telecommuni- cations. German Intelligence operations abroad were many and met with varying degrees of success. In France the political and moral disintegration provided the Nazis with a most rewarding oppor- tunity for fifth-column activities. A number of Frenchmen whose loyalties were bought by Ger- man gold and promises held important positions in government and came from some of the first fami- lies of the land. The frequency of trials for trea- son in the prewar period revealed the gravity of the situation. Involved in some of these trials was betrayal to the Germans of secrets of the Maginot Line, the Belfort fortifications, and plans of the Metz fortress and the Toulon Naval Base. In other countries of Europe the appearance of the quislings after war began revealed the success of earlier German operations. Fully aware of the failure of German Intelli- CONFIDENTIAL 38 gence in Great Britain in 1914, the Nazis were determined that it should not fail again. Accord- ingly, large numbers of agents were sent into Eng- land years before Poland was invaded. The extensiveness of their activities is indicated by the number of espionage cases which were uncovered during the years from 1935 to 1939. Not all were caught, however. One successful agent who went by the name of Van Schullermann first arrived in England in 1927. By 1932 he had become a natu- ralized citizen, well established in a modest busi- ness near the naval base at Scapa Flow. Over a considerable period of time he seems to have gath- ered accurate information about the antisubmarine defenses for this base. At any rate, to his efforts is attributed the German success in penetrating Scapa Flow and sinking H. M. S. Royal Oak early in the war. At the outset of their intelligence efforts in Britain the Germans were able to take advantage of the fact that the British were in no way prepared for hostilities, either in fact or in. spirit. But again, in 1939 as in 1914, the Germans were unable to cope successfully with British counterintelligence. Emphasis on quantity rather than quality of effort, and stereotyped methods, again were important factors in the German failure. Nazi intelligence activities in the United States began in 1933, soon after Hitler came to power. German shipping was utilized to introduce covert agents into the country and to transmit informa- tion back to Berlin. By 1938 vital defense secrets were reaching German Intelligence files. Among them were blueprints for new bombers and fighters, stolen from aircraft plants in New York and Pennsylvania; key designs of naval ships, re- vealing possible weaknesses; and certain codes of the Army Air Force. On the west coast German agents were relaying information to the Japanese; and members of the German-American Bund were striving to obtain classified maps of fortifications in the Panama Canal Zone. Within Germany itself, Hitler's intelligence sys- tem was equally comprehensive. The Nazi leaders fully realized that they must- establish absolute control over the German people if they were to control the world. Accordingly, even before Hitler came to power his henchmen had laid plans for a secret police system. In 1932 there were Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210Q02-9 THE DEVELOPMENT OF INTELLIGENCE C 0 11 Fl DENTIAL 138,000 German police; a year and a half later there were 437,000, of whom almost half were members of the Nazi Elite Guard, called the Schutz-Staffel, or SS. By 1940 the SS alone totaled 432,000 men, organized into 36 divisions of 12,000 men each. During war this army was des- ignated to hold the inner front. A significant part of the SS was the secret police force called the Gestapo, a name which came to strike fear and terror into the minds of men. The Gestapo was not only inquisitive in nature; it was an inquisi- tion. Its purpose was to hunt out, repress, and destroy all enemies of the Nazi State. Its meth- ods were characterized by brutality, if not bestial- ity. Its eyes and ears gradually penetrated all phases of German life. It must have seemed to the Nazis that they had indeed forged an invincible weapon for their com- plete success. It was well made; and Hitler soon put it to triumphant use in Austria, Czechoslo- vakia, and other areas of Europe. However, the Nazis failed to control the inevitable human factor which eventually led to the serious weakening of their entire Intelligence apparatus. Distrust arose and increased between the leaders of the Gestapo and those of the Abwehr of the Army General Staff. There were conflicts between the secret police and military intelligence, especially as to spheres of authority and responsibility. Rivalries became intense, with much personal jealousy and animosity. By 1938 Hitler found it expedient to form a high command of the armed forces and to relieve the general staff of any responsibility for the interpretation of intelligence. The political direction, urged by Nicolai, became political domination. Italian Intelligence Mussolini's major military intelligence effort was demonstrated briefly during his campaign into Ethiopia in 1935. It took the form of sub- version of the Coptic priests in order to render even easier the overthrow of their government. The principal Italian Intelligence organization was the Fascist Secret Police, known as the OVRA, established officially in 1926 as a direct result of the insecurity of the Fascist government and a succession of attempts to assassinate Mussolini himself. Its weapons, applied with liberality against the Italian people, were fear, terror, and absolute power over life and death. The OVRA, as part of the state militia, devoted itself to ob- taining information about all enemies of the state, both within Italy and abroad. Agents provoca- teurs were active in Europe and in North and South America, where they attempted to hunt down and destroy Italian antifascists. One of their effective weapons against those who managed to escape from the country was holding as hostages families who had been left behind. In 1938, when Mussolini entrusted his political fortunes to Hitler, the German Gestapo entered Italy in force and rapidly replaced OVRA with its own organization. The Rapid Growth of Japanese Intelligence Even before Hitler began to implement his con- cept of total war in Europe, the Japanese were putting many of the same theories to use in Asia. For example, the political and moral disintegra- tion within Manchuria?an early objective for ag- gression?provided an excellent opportunity for the use of the fifth column technique. For many years the head of the Army's Bureau of Military Information, Colonel Doihara, had been active in China. Using many disguises, from peddlar to priest, he had traveled about the country, gathering information and enlisting the services of dissident elements and criminal groups. He was particularly successful in utilizing agents provocateurs to create incidents which would jus- tify interference in China by Japanese military forces. In the summer of 1931, for example, he arranged for the kidnapping of the commander of the Manchurian Infantry. Several days later, a group of men dressed in uniforms of the Man- churian Infantry provoked an argument with a Japanese officer on the streets of Mukden and bru- tally killed him before a crowd of onlookers. Taken into custody, these men stated that they had acted under the direct orders of their com- mander. When an explanation was demanded by the Japanese Government, the commander, of course, could not be found. Immediately the Manchurian Government was accused of protect- ing this officer and encouraging atrocities against the Japanese. After diplomatic denials were pre- sented, the officer in question reappeared. Hay- 39 CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 ADDroved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTML INTELLIGENCE FOR NAVAL OFFICERS ing been well treated, he was unable to support his story of kidnapping and was completely discredited. In addition to this type of direct pressure, the Japanese employed more subtle, though equally effective, methods. The Chinese opium industry was exploited and the sale of its product promoted among the people, with the double-edged result of further destroying their moral fiber and at the same time providing financial support for the whole operation. As Japanese plans for expansion in Asia devel- oped, so did her requirements for information to be used to support conquest by military, economic, political, and psychological means. The alloca- tion of more than $3,000,000 to official Japanese in- telligence services for the fiscal year 1934-35 is indicative of the attention given to their develop- ment. Listening posts and personnel were gradu- ally established in Malaya, Singapore, Burma, Java, the Philippines, Morotai, French In do- China, and India. After the "China Incident" of 1937 the activities of military intelligence mate- rially increased. With Manchuria and Korea as bases for operation, the collection effort against Soviet Siberia was intensified. Long before their attack against Pearl Harbor, the Japanese had ex- tended their intelligence network throughout the world, utilizing agents of many types. Trained agents were provided in part by the Army General Staff. As the demand for personnel increased, it became necessary to establish secretly in 1938 a Rear Area Service Personnel Training Center, which was soon expanded into an Army Intelligence School. Officers trained at this school were sent abroad as military attach4s, diplomats, newspaper reporters, businessmen, or special agents. Their activities included: the collection of information and liaison work; the organiza- tion of small guerrilla groups, especially in China, for scouting and undercover operations; and sab- otage and subversion, which was concentrated in southeast Asia and the islands of the Pacific. These officers were the vanguard for Japanese mil- itary action, paving the way for the occupation of various areas by Japanese troops. Naval officers also acted as special intelligence agents and were distributed throughout the mer- chant marine and fishing fleets disguised as wire- CONFIDENTIAL 40 less operators, crew members, and ships' officers, especially in the Pacific. Thus training maneu- vers of the United States Fleet, for example, were watched by expert eyes from nearby Japanese cargo ships or fishing craft. There were, of course, many situations in which Japanese person- nel could not be used because of their oriental appearance. As a result, Caucasians were often employed, particularly Germans, in such areas as Hawaii, the United States, and South America. In addition to their trained personnel, the In- telligence services had available literally thousands of amateur collectors of information, for one char- acteristic of the Japanese is careful and conscien- tious observation. More important, they feel impelled to report their observations to proper authorities. As a result, great quantities of in- formation were channeled into Tokyo from trav- elers, tourists, Japanese living abroad, and business firms operating in foreign countries. These amateurs usually had cameras and made the most of their opportunities to photograph war- ships, naval bases, and other subjects of possible military interest. Reports and photographs were turned over to military authorities, either directly or through consulates, special messengers, or rep- resentatives of the merchant marine. While much of this information was inaccurate or with- out value, it was all carefully classified and proc- essed by the Intelligence agencies of the Army and Navy and the Information Bureau of the For- eign Office. This technique of capitalizing on the mass collection of information is a Japanese con- tribution to the modern development of intelli- gence activity. The collection procedures of the Japanese in the prewar period also indicate their appreciation of the importance of peacetime planning and preparation, years in advance of actual conflict. An excellent illustration is provided by one of their agents, a Dr. Kuehn and his family, who came to Oahu, T. H., from Germany in 1935. Dr. Kuehn posed as a scientist interested in the an- cient history of the islands. About 1939 his daughter, Ruth, opened a beauty shop, which served as an excellent source of information gath- ered from its patrons who were the wives of United States Navy personnel. As Japanese require- ments for information became more definite, Dr. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL Kuehn began to forward through the Japanese and German consulates specific information re- garding naval ships at Pearl Harbor. On De- cember 2, 1941, a complete report on the number, types, and exact locations of United States naval ships in the Hawaiian area was prepared for the Japanese consul who transmitted it by short-wave radio to Japanese Naval Intelligence Headquar- ters. At the appropriate time, the Kuehns were to be evacuated to Tokyo by submarine; but this plan failed to materialize because they were appre- hended and taken into custody as the result of action by the United States Naval Intelligence. The Trend of Soviet Intelligence During the early years between the two World Wars, the development and consolidation of power within Russia consumed much of the attention and energies of the revolutionists who had seized con- trol of the government in 1917. For this reason Soviet Intelligence was, first of all, a security po- lice system, with military intelligence occupying a position of secondary importance. Conditioned to an atmosphere of distrust and suspicion while they were revolutionary conspirators, the Soviet leaders fully appreciated the need for a highly organized and pervasive Intelligence system to maintain rigid controls over the actions and even the thoughts of the Russian people. Within 3 weeks after the revolution had become an accom- plished fact, they established the Cheka which con- tinued not only the tradition but also the methods of the Tzarist Oehrana. The Ch,eka was given great independence of ac- tion, with the power to carry out searches, arrests, and executions. Its ruthless and brutal methods inspired such fear and terror that it became the object of widespread opposition within a few short years. As a result, in 1922, when the Union of Soviet Socialist Republics was established, the Ch,eka was abolished. It was quickly replaced, however, by the 0. G. P. U., which had its head- quarters in Moscow, with branches known as G. P. U. in each of the member republics. The purposes, powers, and methods of this new or- ganization were substantially the same as those of the Ckeka, but its jurisdiction was expanded. The border and internal security troops were placed under its control, and a military section was created to insure the political allegiance of the Army and the Navy. In 1934, the 0. G. P. U. was replaced by the N. K. V. D. At this time there was further centralization of authority and a reorganization to include all police and firemen engaged in overt security duties. New sections were added to direct the surveillance of the civil- ian population and of foreign espionage agents. Soviet Intelligence had now become a full-scale commissariat of the government, far more com- prehensive and powerful than anything ever en- visioned by the Tzars. Its stability and deadly influence were fully demonstrated by its bloody purge of Red Army personnel in 1937. The record of Soviet Intelligence within Russia during the period from 1917 to 1939 is one of steady expansion and increasing influence in every aspect of Russian society. Abroad it became more and more active, developing networks of agents and informers by many means. The inter- national organization of Communists, the Comin- tern, provided excellent opportunities for intelligence activities in many countries. Diplo- matic and trade channels were exploited for the collection of information by carefully placed in- telligence agents. For example, more extensive Soviet intelligence activities in the United States are believed to date from 1933 when diplomatic relations were reestablished between the two coun- tries. In fact, every conceivable situation was skillfully turned to the advantage of intelligence operations. In 1929 when Stalin expelled Trot- sky from the Soviet Union, the N. K. V. D. made use of this situation to send abroad a number of covert agents posing as escaped sympathizers. Some legitimate sympathizers were permitted to leave the U. S. S. R. only after they had agreed to serve the N. K. V. D. The double result of this procedure was to provide a good cover for intelli- gence personnel and to confuse and discredit anti- Soviet groups outside the country. The Spanish Civil War was also used to good advantage for intelligence purposes. Not only did Soviet personnel receive excellent practical training, but also valuable information was gained regarding the capabilities of other coun- tries involved. One seemingly insignificant, but important, procedure initiated by the Soviets in this war was the careful collection of the pass- 41 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS ports of volunteers who came from many coun- tries to fight in Spain. The passports of those killed were saved for later use by Soviet agents in other parts of the world. This procedure pro- vides a good illustration of long-range planning. There are indications that Soviet Intelligence, or the use of intelligence, was not always success- ful in the pre-World War II period. At the out- set of the Russo-Finnish War of 1939, Soviet forces suffered some amazing defeats at the hands of inferior Finnish armies. There was subse- quent speculation that the Kremlin may well have been led by Finnish Communists to believe that their country's armies would not materially resist Soviet military maneuvers. If this was true, then Soviet Intelligence may have suffered from a tendency to place too much reliance upon infor- mation derived from affiliated foreign Communist organizations. During the early part of World War II, a fur- ther reorganization of the Soviet Intelligence System resulted in the establishment of the Peo- ple's Commissariat of State Security, called the N. K. G. B. This new agency relieved the N. K. V. D. of its functions in internal surveil- lance and the collection of information abroad. WORLD WAR II The Second World War has been described as one of unparalleled mobility, tremendous destruc- tiveness, and intense savagery. The technologi- cal improvements in tanks and aircraft, when used in combination, made possible the lightning war, or "Blitzkrieg," so successfully employed by Hit- ler. Poland was conquered in 18 days and France fell in 35. The French General Staff, complacent and unprepared, was paralyzed by this new war- fare of fluid movement. The techniques de- veloped by the Germans were later used with equal success by General Patton in his drive on Paris. Other methods of warfare were developed with notable effectiveness. Strategic bombing brought destruction behind the battlelines to all parts of enemy countries, while transport aircraft carried conquering airborne forces across geographical barriers. Amphibious craft made possible the launching of land attacks from the sea which had been considered too difficult in previous wars. In- ventions in the field of electronics produced such CONFIDENTIAL 42 weapons as radar and guided missiles for long- range battle use. The aircraft carrier replaced the battleship as the capital ship and made pos- sible the waging of sea battles across hundreds of miles. Guerrilla warfare sprang out of internal resistance movements and was exploited on a wide scale. The submarine harassed lines of communi- cations and committed sizable organized forces to its pursuit. The radio permitted an intensifi- cation of propaganda and the waging of psycho- logical warfare in all parts of the world, a type of "strategic bombing" of equal effectiveness in peace or war. World War II was much more than a series of battles between armies and navies; it was a gi- gantic struggle between peoples for survival and for the perpetuation of their economies and ways of life. Hitler's intelligence weapon had to be improved upon and surpassed by the opposing nations. The variety of the modern methods of warfare imposed even greater demands upon In- telligence, for it had to cover not only the armed forces of the enemy, their discipline, training, and tactics; in addition, it had to be conversant with industrial capacity, technological abili ties, trans- portation and communication facilities, internal political situations, and the will of the people to resist. The speed of this war placed a premium on the time factor in the collection of information and the dissemination of intelligence. The com- plexity and scope of military action increased the problems of preparing accurate intelligence esti- mates which in turn led to the demand for more highly trained personnel. The sheer volume of advance knowledge required for success in battle forced the expansion of organizations to a size adequate for its production. The resistance move- ments in occupied and enemy countries aided ma- terially in the collection of information. The un- precedented number of covert agents stepped up the work of both intelligence and counterintel- ligence. Radio and aircraft facilitated the trans- mission of information. The total impact of all of this intelligence activity rendered doubly im- portant the most stringent security measures. At the beginning of World War II, the pre- ponderance of land and air military strength was in the hands of Germany, Japan, and the Soviet Union. Likewise, the offensive intelligence Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL strength of Germany and Japan was superior. On the other hand, for over 2 years the Western Al- lies were harassed, driven back, and on the de- fensive, while they took time to prepare a counter- offensive. The Effectiveness of German Intelligence The Nazis began the war with the world's best organized intelligence service. Without detract- ing from the effectiveness of the German military forces, it is generally agreed that their early rapid progress was greatly facilitated by the advance preparations of Intelligence, which preceded and accompanied troop movements. Polish resistance was paralyzed by the Nazi fifth column which spread false rumors, issued conflicting orders, and transmitted vital operational information to the German General Staff. France, from the military point of view, was potentially much more power- ful than Poland, yet fifth column activities had fatally weakened her ability to fight and, even worse, her will to resist. Greece and Yugoslavia were able to prolong their resistance to German covert penetration. Time and the examples of Poland and France were of some assistance to them. In addition, the Italian OVRA, which had assumed some responsi- bilities to prepare these countries for invasion, failed miserably. In Greece, for example, Ger- man forces were required to save Mussolini from being thrown back into the Adriatic. The German intelligence service had available unlimited funds, an army of agents, and a net- work of collection centers. At the beginning of the war $200,000,000 were reportedly being spent annually on intelligence organization and propaganda. In 1943 the Abwehr was allocated $11,700,000 and had a personnel strength of 30,000 including 7,000 officers. In Denmark alone there were 750 Nazi agents. The four major Intelli- gence centers established by the Abwehr for the collection of world information were located at Konigsberg, Munich, Cologne, and Hamburg. Madrid, Lisbon, Berne, Ankara, Stockholm, Buda- pest, and the Vatican were centers for the collec- tion of information on a long-range basis. Brussels, Warsaw, Sofia, Bucharest, The Hague, and Paris were considered short-term centers. One network of agents was distributed among the 43 various diplomatic, consular, and commercial posts in these capitals. A second network worked inde- pendently in the collecting and transmitting of in- formation for strategic and tactical use. One of the specialized types of collectors was a group of deaf-mutes who were skilled in the reading of lips and the recording of conversations seen but not heard. In Great Britain, during the early months of the war, the Germans achieved some successes. The transmittal of vital information regarding war factories in Birmingham and Coventry aided in the bombing of those areas. The German lega- tion at Dublin served as one collection center; while Lisbon and Oslo were relay points between England and Berlin. However, British counter- intelligence soon proved more than a match for German Intelligence, whose effectiveness rapidly dwindled in the British Isles. In fact the British success in forwarding inaccurate information, ostensibly from German agents who had actually been taken into custody, confused and bewildered headquarters in Berlin. The entire Middle East was the scene of inten- sive intelligence activities by German agents lo- cated in Syria, Iraq, Saudi Arabia, Turkey, and Afghanistan. The total organization extended from the Mediterranean coast of North Africa to the Indian Ocean. The objectives were to under- mine British influence among the Arab peoples and to prepare them for German domination by means of corruption and subversion. In these ef- forts the Germans had the active assistance of the Grand Mufti of Jerusalem. The German com- mercial attache at Ankara was instrumental in fomenting an unsuccessful rebellion against the pro-British government of Iraq. The German ambassador at Ankara, Franz von Papen, was pro- vided with more than $4,000,000 in gold to finance his work in the Middle East. But in spite of this well-organized and numerically superior machine, German Intelligence failed in its efforts. It also failed to forecast the Allied invasion of North Africa. Of particular interest is the "Cicero" affair which took place in Turkey during late 1943 and early 1944. "Cicero" was the code name of an employee in the British Embassy at Ankara. He became a German spy, motivated by a desire for CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS money and possibly an old hatred of the British. As a result of his efforts the Germans were pro- vided with highly classified material of incredible value: a record of official messages passing be- tween the British Ambassador and the Foreign Office in London. In this manner it is believed that the German Government was fully informed of the latest figures of American lend-lease deliveries and anticipated shipments; the minutes of the Allied Casablanca Conference; a resume of Allied conversations at Moscow between Stalin, Anthony Eden, and Cordell Hull, including a re- port of the Russian demand for a second front in. Europe; decisions reached between Roosevelt, Churchill, and Chiang Kai-shek at Cairo; and, finally, the conclusions of the Teheran Conference, including decisions of the military staffs of the Big Three. But even more incredible than the nature of the information itself is the apparent fact that the German military and political lead- ers failed to make use of it. Von Ribbentrop seems to have questioned the accuracy of the in- formation and the source remained suspect. The only real value to the Germans of "Cicero's" work was the breaking of the British diplomatic code. In South American countries, German Intelli- gence exploited important sources of information. The German Ambassador to Argentina, Baron von Thermann, coordinated the collection effort in this part of the world. For transmittal pur- poses he had available 12 powerful secret radio stations, operating with the knowledge of Argen- tine authorities. As of 1942, over $2,000,000 were being spent annually in Argentina to subsidize German cultural organizations. There can be little doubt that information derived from Buenos Aires and various other ports in South America aided the operations of German submarine warfare in the Atlantic. Weaknesses in the German intelligence service rapidly diminished its overall effectiveness. Its elaborate mass training of agents resulted in a standardized type of operation and response which facilitated detection, and overcentralization of or- ganization tended to reduce individual initiative. Political considerations were an increasingly lim- iting factor. Tension and distrust grew between political and military leaders on the one hand and Army General Staff Intelligence personnel on the CONFIDENTIAL 44 other. As the war progressed actual leadership was concentrated in the hands of political leaders and military men chosen and influenced by them. Vital decisions were reached more and more by Hitler himself on the basis of intuition, rather than intelligence. This was particularly true in the campaign against the Soviet Union. Hitler and his henchmen often refused to accept unfavor- able reports, even though well documented. As a result, intelligence personnel on all echelons came to color their reports, emphasizing the favorable factors and withholding or mitigating the unfavorable. There is some evidence to support the conten- tion that Admiral Canaris, Chief of the Army Intelligence Section, was in active sympathy with those German military leaders whose opposition to the Hitler regime resulted in an abortive at- tempt to assassinate Der Fuehrer in 1944. At the Nurnberg trials following the war, Ernst Kalten- brunner, the head of the German Security Police, stated: "I had to accept this post (the Reich Se- curity Office) at a time when suspicion fell on Admiral Canaris of having collaborated with the enemy for years . . . In a short time I ascer- tained the treason of Canaris to a most frightful extent." Whether or not the individual involved was Canaris himself will probably never be de- termined. It is known, however, that the British gained possession of information which could have come from very few other sources. For ex- ample, all German plans for aggressive action prior to the invasion of France were reported to the British. They were warned of the impending attack on Norway in 1940. Winston Churchill had some knowledge of the plans for the invasion of England at a time when only a few highly placed officers of the German General Staff had similar information. It is of interest to note that much of this information gained by the Brit- ish was disregarded, perhaps for lack of con- firmation. Suspicion against Canaris reached such propor- tions that he was relieved of command of the Abwehr in 1941 when Hitler established a unified secret intelligence service more directly under his personal control. German military intelligence was weakened by the attitude of the officer group toward it. In the Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL German staff organization, Intelligence was sub- ordinated to Operations. While intelligence of- ficers were expected to have a clear understanding of tactical situations, no particular specialization of knowledge or training was considered essen- tial. German officers did not regard an intelli- gence assignment worthy of a soldier and, conse- quently, endeavored to avoid it whenever possible. However, the performance of military intelli- gence must not be underrated. It remained a formidable weapon during World War II. The relationship of Intelligence to Operations kept the study of the enemy situation on an immedi- ately applicable basis. All officers had been care- fully trained to develop qualities of thoroughness, sense of duty, logical approach to problems, and accuracy. In spite of no special training, they became competent in these assignments as a re- sult of hard work and careful study. Their abil- ity to gather facts and piece together an accurate picture of the enemy situation was often amaz- ing. They were most successful in the interroga- tion of captured enemy personnel. Their radio intercept work was of a high order and a profit- able source of information, especially after the Germans lost their air superiority. It was un- fortunate for military intelligence that those officers who had trained themselves in intelligence were transferred in due time to other assignments more to their liking and ambition. But, as far as results were concerned, German military in- telligence, which had been only mediocre in World War I, performed rather successfully in World War II, especially when permitted to func- tion without the blight of political interference. The Errors of Japanese Intelligence The remarkable mass collection system of the Japanese provided Tokyo with a wealth of vital information prior to the outbreak of war. For example, when it was ready to move troops into Southeast Asia, the Imperial High Command had complete and accurate models of the defenses of Hong Kong down to the last gun position. Its detailed information regarding ship positions and movements in and around Pearl Harbor was used with devastating effect. However, the Japanese intelligence organization was not provided with a sufficient number of trained personnel at the higher echelons to assemble and evaluate the mass of material which had been collected. At the time of Pearl Harbor the Intelligence Section of the Army General Staff included only 17 officers. Its growth was negligible until early in 1945 when 40 additional officers were assigned to be trained for duty with the armies organized for the defense of the Japanese islands. The de- velopment of Naval Intelligence was equally slow. Beginning with 29 officers attached to the Naval General Staff, the total number was increased to 97 by early 1945. The Kempeitai, or secret police, was primarily responsible for counterintelligence and was well organized, with trained personnel to carry out this function. It achieved a reputa- tion similar to that of the German Gestapo, and many of its methods were comparable. The slow and limited development of Japanese Intelligence appears to have resulted from the high command's concept of a short war, defensive in nature, following the initial conquests. Based on the possibilities of an early German victory in Europe and the rapid consolidation of her own newly won territories, Japan believed that the United States would settle for an advantageous compromise peace. As a result, neither the Army nor the Navy expanded their intelligence organi- zations to make possible the production of intel- ligence for dissemination throughout all levels of command. At the headquarters level, intelligence for both the Army and the Navy was subordinated to the war plans sections and responsible prima- rily for the production of background intelligence. There was apparently little coordination between the intelligence effort at headquarters and at the operational levels. In the field, intelligence units were utilized by military commanders for such purposes as the collection of tactical information, penetration and subversion of native peoples, and the exploitation of economic sabotage. These units often worked with the military governments established for con- quered territories. The unit attached to the Nan- king Government Military Affairs Committee, for example, was particularly active in the prepara- tion of surveys and statistics and in attempting to influence and control the activities of the local Chinese. In general, however, these units were not effective, for a variety of reasons. In the first 45 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS place they were not organized in sufficient time to permit the accomplishment of their responsibil- ities. One unit, created for the battle of the Pacific islands, became operational just 2 months before hostilities began. Another reason was the Japanese failure to appreciate the customs and habits of other peoples and an attempt to impose their own, without change. They alienated those whom they sought to control, and operated by means of intimidation and threats. There was continuous conflict over responsibility and author- ity between military commanders, intelligence units, and representatives of the secret police. Finally, many operational commanders had no appreciation of the potential value or use of the intelligence units assigned to them, particularly from a long-range point of view. When Japan's diplomatic relations with many countries were broken, her primary sources of in- formation were reduced to Allied communications transmissions, short wave and medium wave radio broadcasts, and newspapers and magazines pro- cured through neutral sources. Special agents planted in the Western Hemi- sphere continued to supply some information, with diminishing degrees of success as the war pro- gressed. The case of one American citizen who served as an agent is illustrative of the use made of the nationals of various countries for espio- nage purposes and, incidentally, of the devious means employed for the transmittal of informa- tion. Mrs. Velvalee Dickinson, owner of an ex- clusive doll shop in New York City, made use of her occupation and clientele to transmit infor- mation regarding the movement of United States Navy ships. Various kinds of dolls provided an ingenious code. Her messages were transmitted via a contact in Buenos Aires. The suspicion which led to her discovery was aroused when one of her letters to Argentina was returned to the United States, addressee unknown. The Japanese had failed to notify her that her contact had moved. This incident has been popularized as "The Case of the Talking Dolls." These, then, were some of the errors of Japanese Intelligence, which were in turn errors of the Japanese High Command. They contributed to heavy losses in Japanese manpower and materiel and were factors in Japan's eventual defeat. CONFIDENTIAL 46 The Resiliency of British Intelligence Although decidedly inferior to that of the Ger- mans in numbers and resources at the beginning of the war, British Intelligence made maximum use of its available strength and centuries of ex- perience. Much of the German Intelligence ac- tivity in Britain had been carefully followed and its organization penetrated. When the Germans marched into Poland, therefore, it was compara- tively easy, by means of extensive raids and ar- rests, to destroy the overall effectiveness of Ger- man Intelligence in Britain in much the same way as it had been accomplished early in World War I. After Dunkirk, when the British faced one of the most precarious and dangerous situations of their history, Intelligence proved to be a bul- wark of defense. Appalling weaknesses were suc- cessfully concealed from the Germans and accu- rate information made possible the skillful use of inferior military forces. In his book, Top Secret, Robert Ingersoll has aptly commented: "Intelli- gence was always the Empire's ace in the hole. When British fortunes were at the lowest ebb, it was their Intelligence organization which saved them." Once the country was on a war basis, ample funds and personnel became available, but the training of personnel required considerable time. It was not until several years had passed that Brit- ish Intelligence was able to develop its outstand- ing organization, again conceded to be the "world's best." By that time many covert agents of Brit- ish, French, and German nationality were active within Germany itself. Innumerable bits of in- formation, often irrelevant in themselves, flowed regularly into London for analysis by various in- telligence agencies. Through the European gov- ernments-in-exile, in London, encouragement was given to the underground resistance movements which sprang up against the Germans all over Europe. The time came when British Intelli- gence was able to operate fifth columns in many countries of Europe as effective as those of Hitler. The British had many assets upon which their intelligence organization could draw. In addi- tion to comprehensive experience, internationally educated, politically informed soldiers and civil- ians were available who were adept in dealing Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL with foreign peoples. Their basic research and available source material were tangible assets. Their military and political leaders had a real and full appreciation not only of the value of intelligence, but also of long-range planning. Typical of British Intelligence personnel was a young man named Rankin who had lived all of his life in the inaccessible Chin hills of Burma. He knew the Burmese, Chin, and Manipur lan- guages, dressed and lived like the natives, and had a sincere affection for them. Even though the na- tives in these hills were anti-British, Rankin was able to influence them to support the Allied cause. A more intangible asset was the ability of the British to improvise. When their armies were driven off the continent and their channels of in- formation blocked, they devised a means of ex- tracting military information from photographs taken over enemy-held territory. In a relatively short time the results obtained were successful to a spectacular degree. The development of photo- graphic interpretation as a technique for the col- lection of information was a significant British contribution to intelligence in World War II. A further asset was the control of the informa- tion upon which military decisions were made. This control, as well as effectiveness of presenta- tion, was well demonstrated at the major political and military conferences held by the Allies during the war. In the European theater, for example, their intelligence organization was so complete that they were given primary responsibility for enemy intelligence in that theater. In the Middle East, British agents, experienced in local customs and traditions, surpassed the Germans in winning the support of those peoples. As is often true in the Orient, the bribe was the key to support, and it was often a case of outbidding the Germans. One of the real achievements of Intelligence was a delay in the German use of V-bombs against Britain. Preliminary reports about German de- velopment of V-weapons were received as early as 1942, and a female special agent was able to trans- mit vital information concerning the activities and installations of the main research station at Peene- muende. As a result of her work, one of the most effective Allied air raids of the war was carried out against this area at a time when some of Ger- many's key scientists were there. Over 200 per- 47 sons were killed during this raid, including the director of the station and the Chief of Staff of the Luftwaffe. The raid substantially retarded the production of these new weapons. British Intelligence, however, was not always successful. One of its failures contributed to the defeat of General Montgomery's forces at Am- helm. Just prior to this engagement Intelligence lost track of one German Panzer corps and was unable to determine its location, which unfortu- nately was Arnheim. The well-guarded move- ment of this corps is reported to have resulted from a betrayal of Montgomery's plans by a Dutch traitor. In any event, British losses were heavy. Some of the troops who managed to es- cape were aided by British agents in that area. Throughout the war, Intelligence continued to underestimate German production capabilities, re- cuperative powers, and capacity to wage war. Basing its decisions on such estimates, the British General Staff discouraged an invasion of the con- tinent from the west, believing that Germany's surrender could be brought about by aerial bomb- ing. Opposition to invasion plans was further strengthened as a result of overestimating the strength of German fortifications along the chan- nel coast. Captured German generals later pointed out that this overestimate had been caused by effective propaganda. A much earlier failure of Intelligence was its incorrect appraisal of Ger- man intentions in Norway, just prior to the occu- pation of that country. For a short period during the war there was intense rivalry between the Intelligence and Oper- ations staffs, which temporarily blocked the inter- change of important information. As a result, on one occasion, both groups put agents ashore at the same place on the coast of Norway within an interval of 3 days. The agents from Operations destroyed vital targets in the area and withdrew. When the Intelligence agents arrived they re- ceived a warm welcome from the German field police. In the field of counterintelligence the British were of considerable assistance to the Federal Bu- reau of Investigation in both North and South America, and this mutual cooperation was of real value in smashing the Nazi espionage activities there. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The Rapid Growth of a United States Intelligence Organization Surprised and dismayed by the progress of world events leading up to World War II, the United States gradually became aware of the in- adequacy of its intelligence agencies which it had so pointedly neglected. The success of the Jap- anese attack at Pearl Harbor disclosed the tragic results of this neglect. Even more, it revealed a lack of coordination of effort in the collection of information, interdepartmental jealousies which stymied effective exchange of information, and in- correct estimates of the war capabilities of the enemy. As a result, the older intelligence agencies were expanded and strengthened, and new agencies were created to develop sources of information and new techniques. Among these agencies were: a foreign propaganda agency, an economic warfare agency, a war production agency, the Office of Strategic Services, a branch of the foreign eco- nomic administration, and special units in the De- partments of Justice, Interior, and Agriculture. Founded in 1908 and reorganized in 1924, the Federal Bureau of Investigation was officially given responsibilities for counterintelligence in 1939. After the war began its personnel expanded to more than 15,000. It had a tremendous task in weeding out potentially dangerous aliens, as is indicated by the fact that over 7,000 Germans and 5,000 Japanese were detained or imprisoned after war was declared. The size of the job can be estimated somewhat from a partial list of ma- terial collected from the hiding places of enemy agents: 4,626 firearms, including modern auto- matics and submachine guns; 307,506 rounds of ammunition, 2,340 sticks of dynamite, 2,800 dyna- mite caps, 3,787 feet of fuse, 1,700 items such as time bombs, teller mines and boohytraps ; over 3,000 illegal radio receivers and shortwave trans- mitters; 4,000 cameras, navigational instruments, naval charts, aeronautical maps, tens of thousands of detailed photographs of coastlines, ports, in- dustrial plants; and thousands of feet of micro- film containing vital records prepared by covert agents. Aided by Naval and Army Intelligence, the Federal Bureau of Investigation was emi- nently successful in thwarting sabotage efforts. Although the sabotage of American factories was CONFIDENTIAL a part of the Nazi plan, there is no definite evi- dence that organized German sabotage achieved any major destruction. One of the most clever counterintelligence feats of the Federal Bureau of Investigation was made possible by a German-born American citizen named Wilhelm Sebold, who was employed as an engineer by the Consolidated Aircraft Co. In 1939 Sebold made a trip to Germany to visit his parents and relatives. While there he was de- tained by the Gestapo and "persuaded" to become an undercover agent in the United States, with his family held as hostages in Germany. After train- ing in espionage and radio transmission at a Nazi spy school, he was permitted to return to America with instructions to gather detailed statistics on aircraft and poison-gas production. He had been able to advise the FBI of his predicament through the American consul in Germany. Upon his re- turn, Sebold was established by the FBI at Center- port, Long Island, where the most modern short- wave transmitter equipment was made available for his use. For a period of 16 months both fake and genuine information was transmitted to the unsuspecting Germans. By means of Sebold and his shortwave transmitters, the Nazis were thor- oughly deceived as to the number of aircraft avail- able to the British for the Battle of Britain and the FBI was able to round up over 30 Nazi agents in the United States and to gain information about others located in Cuba, Brazil, Argentina, and Chile. 48 The Office of Strategic Services The establishment of the Office of Strategic Services in 1941 under Maj. Gen. William J. Dono- van was an unprecedented act on the part of the United States Government. Its early functions included research and analysis of military, politi- cal, and economic information us it affected the security of the country. After Pearl Harbor it was placed under the Joint Chiefs of Staff. Its mission was twofold: to act in support of the Army and Navy in the collection and analysis of strategic information; and to be responsible for the plan- ning and operating of special services. These special services involved covert operations which would not normally be carried on by the armed forces. Personnel were selected for this work only Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 THE DEVELOPMENT after the most intensive screening and psychologi- cal testing for mental aptitude and emotional sta- bility. Their training in subversive warfare was rigorous, extensive, and carried on under condi- tions of the greatest secrecy. Altogether, during the war, thousands of OSS operators made their way into enemy countries to engage in black war fare, a term applied to the often unrecorded yet decisive struggle between spies and counterspies. Their weapons were bribery, treachery, and sub- version. Although inexperience resulted in some mistakes, the agents of the OSS were able to achieve considerable success and to measure up favorably to the professional agents of the European powers. Early success marked the efforts of the OSS agents who helped to pave the way for the invasion of North Africa. A total of 15 men were in North Africa for almost a year before the actual invasion, operating 5 secret radio stations, transmitting vital information which facilitated the movement of troops ashore, and arranging the contacts between representatives of the Allies and friendly elements in that area. The Jedburgh Mission, developed in 1943 by the OSS and its British opposite num- ber, proved most successful in integrating the ac- tivities of friendly European underground resist- ance groups with the overall plans of the Allied Command. The program of this mission was to parachute scores of three-men teams into France, Belgium, and Holland on D-day ahead of ad- vancing Allied armies, to provide resistance groups with military supplies, and to lead them in coordinated guerrilla activities designed to create confusion and havoc behind the German lines. In commenting on the success of the Jed- burgh Mission, General Eisenhower said: "In no previous war, and in no other theater of this war, have resistance forces been so closely harnessed to the main military effort." OSS agents encouraged the labor resistance movement in the occupied countries of Europe, while in Germany itself 80 separate contacts were established and workers were organized even in the factories of the Ruhr. When Allied troops reached the Rhine German bargemen were avail- able to help them cross the river. In the Balkan countries the OSS helped to set up successful escape and evasion operations. Shortly after the 49 : CIA-RDP85G00105R000100210002-9 OF INTELLIGENCE CONFIDENTIAL surrender of Rumania a total of 1,050 airmen were rescued from prison camps around Bucharest. The extraordinary heroism and bravery of one OSS agent, Corp. Frederic A. Mayer, resulted in the declaration of Innsbruk, Austria, as an open city and its capture by American troops without a fight. In Burma, OSS personnel helped to organ- ize a guerrilla warfare campaign against the Japa- nese. The intelligence they gathered provided the basis for almost all of the combat missions flown in that area by the 19th Air Force. In 2i/2 years of operations, the Kachin guerrilla forces in Burma killed over 5,000 Japanese troops, dis- rupted their lines of communications, and spear- headed the advances of the Allies under the com- mand of Gen. Stillwell. Further American Expansion In addition to the establishment of new intelli- gence agencies, there was a tremendous expansion of the older military intelligence organizations. For example, at the peak of its wartime effort the Office of Naval Intelligence had a sizable number of officers, enlisted men, and civilian personnel in the United States and scattered throughout the world. After the Battle of Midway, naval com- manders came to appreciate more fully the value of Intelligence officers attached to their staffs for operational purposes. Accordingly, the demand quickly exceeded the supply available. A more detailed discussion of the development of naval operational intelligence will be found in chapter 13. However, it should be noted here that intelli- gence was recognized as an essential function of the staffs of the operating forces afloat. The surface naval forces themselves were often valuable sources of information. For example, in June 1944 the aircraft carrier, Guadcalanal, captured a German submarine undamaged off Cape Blanco, French West Africa, and obtained five German acoustic torpedoes, submarine code books and the key to their changes, and every chart, publication, and general order that an oper- ating German submarine carried. These items were, of course, of great value to Intelligence. One of the greatest contributions of the United States to the general development of intelligence was in the field of amphibious warfare, where the closest coordination of many types of intelligence CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS activities was required to provide adequate knowl- edge upon which to base the successful operation of a complex military force transported over water with the objective of establishing itself on an enemy-held shore against opposition. The mere fact that such an operation involved Army, Navy, and Air Forces required the greatest ingenuity and diligence on the part of Intelligence to coordi- nate and to consolidate all the diversified knowl- edge into a package which was comprehensible, usable, and effective. The successes of United States Intelligence in World War II were particularly notable because they were achieved primarily by personnel drawn from the civilian population: business and profes- sional men and women with an infinite variety of vocations. At the outset urgent personnel re- quirements permitted only cursory initial train- ing; it had to be done on the job. Therefore mis- takes were made, not through lack of industry and devotion, but because of inexperience. In the winter of 1944, for example, Intelligence failed to interpret correctly the movements of von Rund- stedt's troops on the western front, and the Ger- mans broke through the Allied defenses in the Battle of the Bulge to inflict heavy losses of men and materiel. Despite its failures and frustrations, Intelli- gence gained recognition from military and politi- cal leaders in the United States to a degree never before attained. The Contribution of Chinese Intelligence At the beginning of war in the Pacific, United States Navy planners recognized the importance of cooperation from the Nationalist Government of China for ultimate victory over Japan. In March 1942 Comdr. Milton E. Miles, now Rear Admiral, left for Chungking to solicit the assist- ance of Generalissimo Chiang Kai-Shek in obtain- ing information regarding weather and other matters of vital intelligence value to the United States Pacific Fleet. The result of Miles' mis- sion was the formation of the Sino-American Cooperative Organization (SACO) , of which he was Deputy Director. The Director of SACO was Lt. Gen. Tai Li, Chief of the Bureau of Investigation and Statis- tics (BIS) of the National Military Council of CONFIDENTIAL 50 China, an intimate friend and adviser of the Gen- eralissimo. Tai Li, known for many years as a mystery man of Asia, had tremendous power and a reputation which inspired more fear and hatred than admiration. As early as 1926 he had asso- ciated himself with Chiang when the latter took command of the Nationalist Armies at Canton. During the march into North China Tai Li acted as an advance agent, collecting information about popular sentiment, military and political devel- opments, and advantageous routes of approach. The intelligence he produced was an important factor in the successive victories which led to the unification of China under the Nationalist Gov- ernment. When Chiang was captured by the Communists, Tai Li aided in his rescue. In 1937, as commander of the loyal patriotic army, Tai Li held Shanghai for 3 months in the face of over- whelmingly superior Japanese forces. He had almost unlimited energy and stamina and acted with a directness that was more western than Oriental. Because he had escaped death so often he was considered invulnerable, and his avoidance of all personal publicity added to the aura of mystery which surrounded him. Tai Li organized China's secret police, the BIS, in 1932, and directed its activities until his death in 1946. During this period he established a complex network of covert agents not only throughout China but also in Indo-China, Burma, India, Bali, Borneo, Formosa, and the Philip- pines. He controlled the uniformed police in Free and Occupied China, as well as the Chinese puppets of the Japanese. Smuggling and anti- smuggling activities came under his jurisdiction. He was Director of the Bureau of Communica- tions and Transportation and Head of the Office of Freight Transportation Control. Thus he wore many different hats which gave him a power not only far-reaching but even paradoxical. A major function of the BIS was espionage and counterespionage directed against Japanese spies and Chinese Communists. Some of its agents were high ranking officers, well educated and well trained. Others were peasants, recruited from Chinese families which had suffered from Japa- nese mistreatment. Representatives were located in the smallest villages and largest cities of China. The BIS formed the nucleus of an effective guer- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL rilla army aimed at driving the Japanese out of China and combatting subversive elements. As the Director of SACO, Tai Li contributed to it the full support of the Chinese Intelligence Or- ganization, which made possible the activities of almost 3,000 Americans (Navy, Army, Marine Corps, and Coast Guard) assigned to SACO, known as Naval Group, China. Their responsi- bilities included weather reporting, coastwatch- ing, guerrilla training, and combat operations. Their activities were made effective by the estab- lishment of a radio communications network. Weather data supplied by SACO was of signif- icant value to the first air attacks on the Japanese home islands and to the attacks on Iwo Jima and Okinawa. Information provided by SACO coastwatchers on Japanese naval and merchant shipping was the basis for the successful sweep of the South China Sea and its ports in January 1945 by the United States Fleet. SACO also made possible the sensational destruction of Japa- nese ships by the United States submarine Barb, as well as the sinking of thousands of tons of Japanese shipping by other American submarines. Tai Li and his organization made a significant contribution to the successful prosecution of the Pacific war. His untimely death shortly after the war was a serious blow not only to Chinese Intelligence but to the Nationalist Government itself. The Expansion of Soviet Intelligence Occupied as they were with military and politi- cal developments in western Europe prior to the outbreak of the war, the leaders of Soviet In- telligence in no way neglected the situation in the Far East. The clever and adroit activities of their spy ring in China and Japan during the period from 1937 to 1941 give some indication of Soviet operating techniques. The principal figure was Dr. Richard Sorge, a German national who was sent as a covert agent by German Intelligence to the Far East in 1933 posing as a foreign news- paper correspondent. Among his close friends and associates were the German Ambassador to Tokyo and Ozaki Hozumi, a Japanese newspaper man prominent in government circles and a friend of various members of the Imperial Cabinet. Together, Sorge and Hozumi cultivated a num- 51 ber of important sources of information, includ- ing the German, British, American, and French Embassies, the Dutch Legation, the Japanese War Ministry, and the Japanese cabinet itself. From them they gathered invaluable data including esti- mates and opinions at the highest official levels, which they evaluated and forwarded not to Berlin but to Moscow by means of radio, by courier through Shanghai, or through the Soviet Em- bassy in Tokyo. The significance of their efforts is revealed by some of the reports transmitted to the Kremlin. In 1937, when the Japanese attacked China, Sorge reported that there would be no attack against the U. S. S. R. in Siberia. In May 1941, Moscow was warned that the Germans would attack the U. S. S. R. along the entire western frontier on 20 June with a force of from 170 to 190 divisions, the major objective being Moscow. The actual attack came on 22 June. In October 1941, Sorge forwarded his well-documented con- clusion that the Japanese would attack to the south in Asia and that there was no serious danger of any attack along the Siberian frontier. On the basis of this information the Soviets were able to transfer large units of their forces in eastern Si- beria to the western front to strengthen their de- fenses against the Nazi invasion. It is somewhat ironic that Sorge's activities were revealed by a Japanese Communist. A tendency of the Soviet leaders to permit the reports of their Communist friends in foreign countries to override the reports of other units in their intelligence system is shown by their initial reaction to indications of Hitler's decision to attack the U. S. S. R. The Communists inside Germany are believed to have reported that the Germans would refuse to march into the Soviet Union. When the attack actually came, the Soviets were taken by surprise. As the war progressed, the Soviets were able to take full advantage of association with their wartime partners in the expansion and extension of their intelligence activities. In the United States since 1924 there had been an organization known as Amtorg, created for the purpose of pur- chasing all kinds of material for the Soviet Union. During the war the activities of this organization were intensified, together with those of the Soviet Purchasing Commission which worked closely with CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Amtorg. In addition to the procurement of mate- rial, the collection of detailed information con- cerning American industry was stepped up. Factory techniques, production statistics and labor relations were all matters of great interest, in addition to any fact which might have future in- telligence value. As one example, all of the Amer- ican patents concerned with carbon compounds were purchased?a total of about 30,000 in this field alone. By 1946 a comprehensive catalogue had been compiled of every mill, factory, refinery, and engineering plant in the United States. The Four Continent Book Corporation in New York City was developed as an agency for the purchase and transmittal of American technical publica- tions, trade papers, and patents. In addition, it handled Communist propaganda literature in English and Spanish, forwarding the latter to various Latin American countries. By 1944 Soviet intelligence and propaganda ac- tivities were expanded in Latin American coun- tries through Soviet diplomatic representatives. In Mexico an extensive organization was devel- oped for the purpose of destroying American in- fluence first in Mexico and later in other countries of South America. As a part of this process, the Soviets aimed at the elimination of American busi- ness interests and the eventual domination of the economies of these countries. Various cultural organizations were fostered, such as the Russian- Mexican Clubs, to serve as propaganda media and sources of information. In Europe, during the war, a new counterintelli- gence agency was created. It was known as "Smersh"?from the Russian words: "death to spies." It seems to have been organized originally in connection with the administration of the Soviet occupied areas of Europe, and was concerned with disaffection among Soviet troops and anticommu- nism in any form. By painstaking processes it attempted to liquidate all individuals who were not proCommunist, including those active in any democratic-type parties, throughout Poland, Czechoslovakia, Hungary, Rumania, and the Carpatho-Ukraine. Its carefully selected person- nel, intensely loyal to the Soviet State, showed no mercy or compassion in their work. While positive information is not available, "Smersh" appears to have been organized into five CONFIDENTIAL 52 major departments: administration, operations, investigations, prosecution, and personnel. With central headquarters in Moscow, there were sub- divisions established for each military district in Russia, as well as in Europe. Agents were at- tached to all units of the Soviet Army, and net- works of spies and informers were set up in the occupied countries, to make particular note of trends in political thought. The investigations department developed the science of interrogation to a high degree of perfection, while the prosecu- tion department utilized three men courts to dis- pose of those found guilty. Prior to World War II many improvements had been made in the functional organization of the Soviet military staff. One of these was an in- creased emphasis on intelligence, notable because this function was weak in the staff organizations of both the Tzarist and early Soviet armies. Re- vised military doctrine now included a reconnais- sance, or intelligence, section at the division level, headed by a chief of section. He was responsible for the preparation of the reconnaissance plan, including air reconnaissance; the assignment of missions to subordinate agencies; the maintenance of the enemy situation map; the collection and analysis of information; keeping the commander and chief of staff informed of all intelligence in- formation; and the dissemination of information to higher, coordinate, and subordinate units. Dur- ing the war the intelligence organizations of the Army and the Navy apparently functioned sep- arately; however, by 1946, there was some evidence that they had been combined. The pattern of Soviet Intelligence operations which seemed to emerge during the war period was that of comprehensive, overlapping informer networks within all countries under Soviet rule and of burrowing, multiplying systems of sym- pathizers and agents within foreign countries of exploitable interest. The extensiveness of its op- erations abroad was to be clearly demonstrated in the postwar period. THE POSTWAR PERIOD Great enthusiasm throughout most of the world greeted the unconditional surrender of Germany and Japan, the inauguration of the United Na- tions Organization, and prospects for world peace. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL Amidst the glow of military victories the wartime Allies frequently met to chart a new world of freedom and prosperity. But many boldly pro- jected plans failed to materialize, diametrically opposed points of view were bared, and even peace treaties were delayed interminably by disagree- ments or failed completely of final approval by all concerned, as in the cases of Germany, Austria, and Japan. Two contrary concepts of world re- lationships became more clearly defined in the opposing policies of the United States and the U. S. S. R. Gradually the peoples of the western world, especially in the United States, became aware of a new threat to their political and social institutions and their way of life. The aggressive ideology and world power ob- jectives of the Soviet Government found expres- sion in the absorption of the countries of Eastern Europe, a closely knit alliance with Communist China, and the encouragement of Communist or- ganizations throughout the rest of the world. In an effort to counter these activities, the United States assumed world leadership to aid in reestab- lishing the economic stability of those countries ravaged by the war but as yet free of Communist domination. Economic stability was considered to be fundamental to political and military sta- bility, and through the improvement of standards of living the United States sought to destroy the conditions of poverty upon which Soviet propa- ganda most effectively feeds. The Truman Doc- trine of 1947 brought economic and military assistance to Greece and Turkey threatened by Soviet penetration. The European Recovery Program of 1948, popularly known as the Mar- shall Plan, had as its objective the restoration of the economic productivity of Europe and the healthy employment of all its peoples. This am- bitious program was gradually extended in a les- ser degree to other parts of the world. In 1951 the United States frankly embarked on a Mutual Security Program which tied together economic assistance and military cooperation. The outbreak of the war in Korea in June 1950 brought into clearer focus the grim realities of the so-called "cold war," a term descriptive of various forms of the conflict between Communist and non-Communist countries which had been un- derway for a number of years but which became 58 more apparent after World War II. In the light of postwar experience, some earlier events as- sumed even greater significance than they did at the time. In 1943, for example, a group of young physicists working in the radiation laboratory of the University of California turned over to a Communist agent technical data for transmittal to a Soviet Vice-Consul. In 1944 Soviet representa- tives in South and Central America were ordered back to Moscow for retraining. By that time the military defeat of Germany was assured, so that Soviet emphasis could again be directed toward bringing about the political and economic collapse of the non-Communist countries of the west. To achieve this ultimate objective, the Soviet Government has employed, initially at least, methods other than the force of arms. Penetra- tion and subversion, propaganda and detailed organization have proved to be highly effective in various countries. The use of nationals as agents within their own countries has presented a most difficult problem for the counterintelligence agen- cies of those countries. The Soviets have imple- mented a plan to collect great quantities of information about non-Communist countries, ob- viously in order to determine strengths and weak- nesses. During this "cold war" Intelligence has assumed even greater importance than during World War II. The scope and methods of Soviet Intelligence in the postwar period have been indi- cated by the disclosure of some of its activities in various parts of the world. Soviet Intelligence in Canada In September 1945 Igor Gouzenko, a cipher clerk in the Soviet Embassy at Ottawa, deter- mined to expose the activities of Soviet agents and sympathizers in Canada. The documented information which he was able to furnish to the Royal Commission finally appointed to conduct a full investigation was a startling revelation of the extensiveness of the Soviet intelligence system in Canada, the type of individuals who were in- volved, and the nature of the information which was being transmitted to Moscow. The impor- tance attached by the Soviet Embassy to Gou- zenko's testimony and substantiating documents was indicated by the strenuous efforts made to re- gain custody of both. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR The evidence uncovered by the Royal Commis- sion definitely revealed the existence in Canada of a fifth column, organized and directed by Soviet agents. Within this fifth column were a number of spy rings, possibly as many as five, of which de- tailed information was available only on the one headed by Col. Nicolai Zabotin, Soviet Military Attache in Ottawa. Additional rings appeared to be operated by the MVD, the Naval Attache, the commercial and political representatives, and the Embassy itself. Each of these rings was com- pletely independent of the others, using separate codes and agents, and was apparently organized rather simply into various cells composed of agents working on similar tasks. Only one agent in each cell had contact with a Soviet representa- tive and each made use of a "cover" name. The Royal Commission concluded that the Soviet or- ganization in Canada was the product of careful and detailed preparation by trained men. Of sig- nificance were the indications that the Canadian organizations were associated with similar ones in other countries, notably Great Britain and the United States. In Zabotin's ring only two individuals were Rus- sian-born, and these had become naturalized Ca- nadian citizens: Sam Carr, the Organizing Sec- retary of the Canadian Communist Party, and Fred Rose, a member of Parliament. The re- mainder were Canadian or British by birth and were motivated by Communist sympathies. Money was apparently of only incidental concern. Scientists and civil servants were especially cul- tivated by Zabotin who approached them through local Communists, fellow travellers, and sym- pathizers attending study-groups and special lec- tures. The care with which prospective agents were selected is indicated by the positions held by those found guilty of turning over classified in- formation to Soviet representatives: a senior worker with the National Research Council; two additional members of this Council who supplied information regarding explosives, atomic energy, and aircraft development; an employee in the Of- fice of the High Commissioner of the United King- dom; an employee in the Department of Muni- tions and Supply; and a staff member of the cipher division of the Canadian Department of External Affairs. The most prominent individual involved CONFIDENTIAL 54 NAVAL OFFICERS was Dr. Allan Nunn May, a nuclear scientist em- ployed in research for the Canadian Atomic En- ergy project at Montreal. The investigation dis- closed that he had been a Communist before coming to Canada. The Royal Commission was particu- larly astounded by the success of the Soviets in enlisting Canadians in positions of responsibility and trust who were willing to betray their country. Since the activities of Soviet Intelligence had been going on for some years, it was difficult to determine the amount of information which the Soviets had managed to accumulate. The evi- dence indicated, however, that a considerable quantity of classified information had been trans- mitted with regularity from various Government departments and agencies. Specific information included samples of uranium ore; data about atomic plants and processes; 'details of Asdic, a submarine detection device; formula of new ex- plosives and blueprints of fuzes, such as the V. T. fuze; economic reports; and political reports, in- cluding diplomatic messages exchanged with Great Britain and the United States. Of particular significance was the fact that much of the infor- mation sought was technical and concerned the postwar defenses of Canada, Great Britain, and the United States. Two interesting Soviet Intelligence procedures were revealed by Gouzenko. The first was Zabo- tin's plan to arrange for the entry into Canada of additional agents under the guise of personnel attached to a proposed Soviet Trade Mission. The second was the use of forged passports to permit the entry of agents into other countries from Canada. Soviet Intelligence in the United States The Report of the Canadian Royal Commission, published in June 1946, excited worldwide atten- tion and particularly, attention was given to it in the United States where the evidence indicated that similar Soviet organizations were operating. Several Congressional committees found new sources of information regarding un-American activities and accumulated volumes of data. These committees were aided materially by a few repentant American Communists who, like Gou- zenko, found themselves completely disillusioned by the wide gulf between Communist promises and Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE practices. Louis F. Budenz, editor of the official newspaper of the American Communist Party, the Daily Worker, was one such person. His testi- mony, given in November 1946, disclosed the close relationship between American and Soviet Com- munists. Further, it gave clues to the activities of Soviet agents operating in the United States. Gerhart Eisler, for example, was pointed out as the representative of International Communism in the United States and, as such, the boss of all American Communists. His true position could not be determined, but his status as a representa- tive was substantiated. Eisler, a professional revolutionist, was active in the United States dur- ing the 1930's, speaking before many groups, help- ing to organize Communists and Communist sym- pathizers, and identifying those who might be en- couraged to aid the Communist cause. During the war years he may well have headed a Soviet spy network. In the late 1940's he evidently con- centrated on artists, writers, and intellectuals. He was reported to have said that New York City would become the center of International Com- munism outside of Russia. Because of the dis- closures before the House Un-American Activities Committee in early 1947, Eisler was no longer use- ful to the Soviet effort in this country. He es- caped to Europe and later turned up as an official for the East German Government, operating under direct Soviet control. In July 1948 Elizabeth Bentley testified on her activities as a courier for a Soviet espionage system in the United States during the war. She col- lected information from various Government em- ployees in Washington, and turned it over to Soviet representatives in New York for transmit- tal to Moscow. Her contacts in Washington were individuals employed by such Federal Depart- ments as State, Treasury, Army, the War Produc- tion Board, and the Office of Strategic Services. Among those she incriminated was William W. Remington who was first employed by the War Production Board and later by the Department of Commerce. In both these positions he had access to secret information, and in Commerce he headed a committee responsible for the clearance of mate- rials for export to the Soviet Union. Unlike Gouzenko in Canada, Bentley was unable to docu- ment her testimony. 55 CONFIDENTIAL During the summer of 1948 Whittaker Cham- bers, reformed American Communist and a senior editor of Time magazine, appeared before the House Un-American Activities Committee in Washington. He described in detail his activities as a Communist from 1924 until 1938, when, dis- illusioned and embittered, he renounced com- munism and determined to expose the Soviet ac- tivities of which he had been a part. Of primary interest was his work as an underground courier for a Communist cell, from 1934 to 1938, collecting classified information in Washington and carrying it to a Soviet agent named Colonel Bykoff in New York City. The purpose of this cell was the col- lection of military and political information from the State Department. The sensational aspect of Chambers' testimony was his ability to produce documentary evidence which included copies and photographs of highly important British naval papers and extremely confidential reports from China, Yugoslavia, and Poland. The keys to cer- tain secret American diplomatic codes were also involved. These substantiating documents proved beyond question that in 1938 some individual in the State Department had made important classi- fied information available to him. That individ- ual, according to Chambers, was Alger Hiss, a brilliant young man in the State Department, a prominent figure in the creation of the United Nations, and president of the Carnegie Endow- ment for International Peace. Volumes of evi- dence were accumulated in the succeeding sensa- tional Hiss-Chambers legal actions which finally resulted in the conviction of Alger Hiss for per- jury and a sentence of 5 years imprisonment. Additional cases involving suspected Soviet es- pionage and Communist activities continued to be brought to light in the United States. In the spring of 1949 the Federal Bureau of Investi- gation released evidence against Judith Coplon, first employed by the Justice Department in its economic warfare section and later assigned to its internal security section as a political analyst. She was accused on two counts: taking unlawful possession of Government documents and spying for a foreign power. Her contact was a Soviet engineer employed by the United Nations secre- tariat in New York. Her sensationalized trial on the first count in Washington resulted in convic- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR tion, although subsequent trials on the second count in New York City failed of conviction be- cause of certain legal technicalities. During 1949 and 1950, while the Justice De- partment was prosecuting the leaders of the American Communist Party for conspiracy against the United States Government, the FBI was accumulating evidence against other individ- uals suspected of treason in connection with the atomic bomb and military uses of atomic energy. In May 1950 Harry Gold confessed that, in 1944 and 1945, he had acted as a courier in relaying atomic information to a Soviet agent for transmis- sion to the U. S. S. R. His motives appeared to be basically ideological. His confession involved Al- fred Dean Slack, a chemist, and David Greenglass, a New York machinist. The former was charged with revealing details of the manufacture of RDX, a secret high explosive developed during the war, and supplying a sample. The latter con- fessed to turning over sketches and descriptions of the atomic bomb while he was employed at Los Alamos, N. Mex., working on the top secret Man- hattan project. These men in turn incriminated other individuals including Ethel and Julius Rosenberg and Martin Sobell. These were accused of complicity in espionage work for Soviet Intel- ligence, transmitting information concerning the atomic bomb. The evidence presented during these trials was startling. It became apparent that the Soviet Union had gained considerable information about the Manhattan project and the work of some of its scientists during the latter months of 1941; fur- ther, that the schedule for the explosion of the first atomic bomb at Alamagordo was known at least a month in advance. Months before the first bomb was dropped on Hiroshima the Soviets had learned the principles of its construction. Rosen- berg stated that he had procured information per- taining to the use of atomic energy for aircraft. The series of shocking disclosures in the postwar period clearly indicated that Soviet Intelligence had developed intricate systems of covert agents in the United States for the purpose of channeling vital information of a political, military and scien- tific nature to Moscow through both official and unofficial representatives. CONFIDENTIAL 56 NAVAL OFFICERS Soviet Intelligence in Great Britain The Canadian Spy Case and the disclosures in the United States had eventual repercussions in Great Britain. Tipped off by the FBI, Scotland Yard initiated investigations which resulted in 1950 in the apprehension of Dr. Emil Julius Klaus Fuchs, head of the Ministry of Supply's Theo- retical Physics Division and the deputy chief scientific officer at Harwell, England's principal atomic installation. Fuchs was accused of releas- ing American atomic secrets to Soviet representa- tives in 1945 and British secrets in 1947. His con- fession left no doubt as to his guilt. While the amount of information he had given was not pub- licly announced for security reasons, it was appar- ent that Fuchs had detailed knowledge of the con- struction of atomic bombs and, further, that he was conversant with the initial studies for the hy- drogen bomb. The tremendous advantages accru- ing to the Soviets from this information are diffi- cult to estimate, although it is obvious that their atomic program was greatly advanced. At the same time irreparable harm was done to the na- tional security of both Great Britain and the United States. The investigations of Fuchs revealed that he had been a Communist for many years and that his motivation, like so many others already men- tioned, was ideological. He was the scientist from whom Harry Gold had received his information, and his confession was of material assistance in the prosecution of Gold, Greenglass, and others. Soviet Intelligence in Sweden In September 1951 the long suspected activities of Soviet espionage in Sweden were dramatically exposed. A 42-year-old petty officer in the Royal Swedish Navy, Ernst Hilding Andersson, was accused of betraying military secrets to a foreign power, found guilty of treason, and sentenced to life imprisonment. From 1949 to 1951 he had pre- pared and transmitted reports and maps of the defenses of naval bases at Stockholm and Karls- krona, and of an air base, naval station, and the Boden fortress in northern Sweden. His three contact men were: a former Soviet Embassy sec- retary, a former Tass news-agency correspondent, and an assistant to the Soviet Naval Attach6. While small money payments were made for in- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RIOPM920105R00010021 THE DEVELOPMENT OF INTELLi MFMENTIAL formation delivered, Andersson's motivation was to aid communism. Investigation showed that he had become a Communist in 1928, but that his first assignment in espionage was not made until 1949. According to the Swedish Chief of Staff, incal- culable damage to Sweden's security had been caused by Andersson's activities. Even more harmful, perhaps, were the similar efforts of Fritiof Enborn, a Swedish journalist, discovered. in February 1952. Sweden faced a new threat to her security and national defense system. Soviet Activities in South America In Mexico the Communist group appeared to fall into three categories: the professional agents, carefully trained in the art of collecting informa- tion and spreading Soviet propaganda; the ideal- ists, motivated by the propaganda; and the fellow travelers, inspired by their own liberalism. The Soviet Embassy in Mexico City made use of each category to promote its primary objectives of propaganda, penetration, and the destruction of the economic position of the United States and its favorable pan-American relationships. The Mexican pattern was apparent in other countries. In Guatemala in 1951 there were charges that the Communists were infiltrating both the government and labor. A primary target was the United Fruit Co. which was harassed by strikes and one-sided labor laws. In Chile the large and active Communist Party encouraged a series of strikes in the copper mines which helped precipitate a copper shortage crisis in the rearma- ment program of the United States. In Panama the Communists attempted to capitalize on the po- litical unrest in the country. In the postwar period, there were other positive indications and significant disclosures of Soviet Intelligence activities in various trouble spots of the world. The United States and her Allies found themselves faced with the necessity of com- batting diverse problems of major proportions. The Readjustment of the United States Intelligence Effort At the end of World War II the demobilization of the Armed Forces was accelerated almost to a point of disintegration, at least from the point of 269190-54----5 view of ready effectiveness. The drastic reduction in personnel seriously affected all military activi- ties and especially those of Intelligence. For ex- ample, by 1946 the strength of Naval Intelligence had dropped sharply from its wartime peak. Pre- war problems of Intelligence, such as personnel and production, once again developed, though to a lesser degree because of what appeared to be a positive if gradual change in both the popular and official point of view towards Intelligence. Even before the end of the war, top level plan- ners had become convinced of the need for a perma- nent well coordinated national Intelligence system. The result was the passage of the National Se- curity Act of 1947 which for the first time in the history of the Nation, outlined the structure of such a system to operate in times of war and peace. The deterioration of the international political situation created urgent demands upon all intelli- gence agencies. Moving into Greece to aid in the defense of that country, the United States Army was immediately involved in problems arising from guerrilla warfare and the infiltration of communist groups from the Sovietized Balkan countries. In Western Europe, advance informa- tion concerning the trends of Soviet activities was essential to the formulation of any military or foreign policies which would effectively protect the interests of the United States in that area. Months in advance information was obtained regarding Soviet plans to blockade Berlin. The communist coup in Czechoslovakia was anticipated by 3 months. Evidence was accumulated to show that the Soviet Union was supplying arms and am- munition to Communist groups in France and Italy. In the spring of 1948 events in Europe gave rise to serious misgivings that the Soviet Union might be contemplating offensive military action. Under terrific pressure, the Central Intelligence Agency produced an estimate that such action would not take place within the next 2 months and, in all probability, not within a year. With the outbreak of war in Korea the Navy, Army, and Air Force were faced with many se- rious problems, including an acute shortage of Intelligence personnel and data. Drawing sub- stantially upon their reserve organizations, the military services overcame these shortages and 57 CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS rapidly increased the production of intelligence for operational purposes. Once again the need for intelligence was clearly demonstrated. POSTWAR INTELLIGENCE ORGANIZATIONS The impact of the cold war in the postwar period is shown by the emphasis given to intelli- gence organizations and activities by both larger and smaller nations of the world. The United States intelligence system is dis- cussed in detail in chapter 3 of this text, but certain general developments in military intelli- gence should be mentioned here. Intelligence ac- tivities have been expanded in order to provide the intelligence required for strategic planning. Broad programs involving research and special studies of foreign powers have been undertaken. Increasing importance has been placed on person- nel training through the encouragement of reserve intelligence units and an emphasis on training schools for both regular and reserve officers. There has been some indication of a trend in the Army and the Navy to encourage officer personnel to spe- cialize in intelligence work. Gen. Omar N. Brad- ley, Army Chief of Staff, has been quoted as say- ing: "I am recommending to the General Staff that the Army establish an Intelligence Corps in which personnel can specialize in Intelligence just as artillery men concentrate on guns, and armored corps men on tanks." The training of personnel assigned to attache posts has been improved. The work of counterintelligence has received more and more attention. As a newcomer to the field of intelligence, the United States has learned much in a relatively short period of time. Intelligence organizations have improved the quality of their product, and despite "growing-pains" have accomplished a great deal. The British Intelligence Service The British intelligence service is composed of several intelligence agencies. Of special impor- tance is the British secret service whose operations and organization are closely guarded secrets. For budgetary purposes it is sponsored in Parliament by the British foreign office. Appropriations for the secret service are usually passed without com- ment, and if a question is ever raised, the foreign CONFIDENTIAL 58 secretary replies that the matter is a secret of state which, if revealed, would no longer be secret. The British secret service corresponds, in many of its functions, to the United States Central Intelligence Agency. The war office, the admiralty and the air minis- tries have separate intelligence agencies which co- operate closely with the British secret service and other agencies. The military intelligence division (MID) is divided into some 20 different depart- ments. In addition to purely military matters, sections of MID deal with the problems of spies at home, in the dominions and British possessions, and in foreign countries. The naval intelligence division is also divided into several departments for specialized work, as is the air intelligence division. Another organization of the British intelligence service is generally referred to as MI 5. This organization is devoted to counterespionage and security. It has jurisdiction in the British Isles and in the British possessions overseas. Many of its functions are similar to those of the United States Federal Bureau of Investigation. MI 5 cooperates closely with the special branch of Scot- land Yard as well as with the British secret service and the military intelligence agencies. The special branch of Scotland Yard, which may be included as a part of the British intelli- gence service, is charged with guarding the Royal Family and important British officials and visiting foreign dignitaries. It is also concerned with counterespionage and problems of national secu- rity. Some of its functions are similar to those of the United States Secret Service and the United States Federal Bureau of Investigation. There are several British joint intelligence com- mittees and boards which include representatives from the major British intelligence agencies, mil- itary and civilian. These joint committees and boards are subordinate to the British military chiefs of staff, though they contain civilian repre- sentation. These committees and boards prepare estimates of all kinds and serve all interested min- istries of the British Government. The French Intelligence System The principal French intelligence organization is the Service de Documentation Exterieure et de Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE CONFIDENTIAL Contre Espionenage (SDECE.). It was established under this name in December 1945 and is a devel- opment of intelligence organizations which oper- ated under General de Gaulle from 1940 to 1945. General de Gaulle set up the Bureau Central de 1?enseignements et d'Action (BCRA) in London in 1940. This was an expansion of the Service de Renseignements (SR) , a part of the old Deuxieme Bureau of the French General Staff. After Gen- eral de Gaulle left London and went to Algiers, he combined the BCRA with an intelligence organi- zation of General Giraud and created a new intel- ligence organization called the Direction Generale des Services Speciaux (DGSS) . The DGSS was replaced shortly after the liberation of most of France by an intelligence organization called the Direction Generale des Etudes et de Recherches (DGER), out of which SDECE directly evolved. Historically, the Deuxieme Bureau of the French general staff has been the most important French intelligence organization. In the post World War II organization of French Intelli- gence, the SDECE appears to have taken over most of the functions of the traditional general staff Deuxieme Bureau, leaving to the Deuxiemes Bureaux of the armed services responsibility mainly for operational military intelligence. The SDECE is subordinate to the French national de- fense ministry and is divided into two main sec- tions (called by the French, Offensive and Defen- sive) which are concerned respectively with stra- tegic intelligence and counterintelligence. The Surete Nationale, under the French interior min- istry, is also a part of the French Intelligence system. The Surete is similar in some respects to the United States Federal Bureau of Investigation and the British Scotland Yard. The Soviet Intelligence System Often described as omnipotent and omnipresent, the Soviet intelligence system is in many respects unique in the postwar world. It is a vast, intri- cate organization with an incredible amount of duplication and involving literally millions of people. With its two-pronged objective of inter- nal security and external espionage, it maintains agents in every village of the U. S. S. R. and agents or potential agents in all countries of the 59 world where there are Soviet diplomats, trade rep- resentatives or Communist Party groups. Within the U. S. S. R., the intelligence-security system is the cornerstone of the police state, re- sponsible for insuring rigid political and eco- nomic controls and rooting out all dissident ele- ments. It can be assumed that the average So- viet citizen is aware of the secret police to the ex- tent that he knows he must remain where he is registered, perform his work satisfactorily, and refrain from any criticism of the government. He must also hope that his relatives and friends will do likewise. Should there be any deviation from the established pattern, he can anticipate severe punishment including death or hard labor in a penal camp. Within the borders of the coun- try, the closest observation is maintained not only over all citizens but also over all visitors. Abroad, the strength of Soviet Intelligence lies basically in the worldwide organization of the Communist Party. As already indicated, the So- viets have emphasized the use of agents who are citizens of the country in which they are to oper- ate. These prospective collectors of information, recruited by the regular Communist Party organ- ization, are fellow travellers and sympathizers not known as Communists. Either they are already in an exploitable position or possess the necessary qualifications. Sold on the basic doctrines of com- munism, these individuals transfer their loyalties from their own country to the U. S. S. R. They are given small sums of money for "expenses" and so become subject to blackmail. Each new recruit becomes the member of an independent cell, but only the leader of the cell has a direct Soviet con- tact. Thus this system is capable of almost in- definite expansion and, of even greater impor- tance, is subject to a minimum risk of exposure. In connection with this recruitment program, So- viet Intelligence has an amazingly complete dos- sier coverage of individuals all over the world: their appearance, interests, weaknesses, and politi- cal inclinations. The counterintelligence activity of the Soviets is particularly noteworthy. Its defensive effec- tiveness makes the term "Iron Curtain" most ap- propriate. No one may cross the borders of the U. S. S. R. without great hazards of detection. All means of communications are rigidly con- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS trolled, and the gathering of any information in- side the country by foreign agents is notoriously difficult. The offensive aspects of Soviet counter- intelligence are even more unique and constitute a Russian contribution to modern intelligence. The objective is the dissemination of false infor- mation designed to mislead and confuse opponents and prospective victims. Seemingly "anti-Com- munist" propaganda and individuals are skillfully utilized in a cleverly organized program. The controls of this tremendous organization were further overhauled and centralized at the top level in 1946. As a result, the major agencies pri- marily concerned with intelligence activities from 1946 to 1953 were: Military Intelligence, and the Ministry of State Security, or MG-B, formerly known as NKGB. During this period the MVD, Ministry of Internal Affairs (the former NKVD), appeared to have lost most of its police and intel- ligence functions. Currently, the Military Intelligence organiza- tion, known as GRU, is a part of the Soviet gen- eral staff. From the military point of view, it is interested in political events and economic con- ditions abroad and so collects information for in- telligence purposes all over the world, It also di- rects foreign sabotage. It maintains networks of agents, directed both by military attaches and by special agents assigned cover positions in Soviet diplomatic and consular posts. From 1946 to 1953 MGB had broad responsi- bilities for political espionage and propaganda abroad and for the control of espionage activities of foreign Communist Parties. Its foreign de- partment, known as INO, maintained an agent in every Soviet diplomatic, consular, and trading mission abroad. KRU, another department, had the objective of countering foreign political es- pionage in the Soviet Union and the activities of anti-Soviet groups abroad. EKU, the economic department, was organized originally to control foreign economic activity within the U. S. S. R. Later it was composed of two sections: the first exercised political control over the domestic econ- omy by means of secret police; the second directed external economic espionage and encouraged class warfare, industrial crises, and strikes. Two other departments, SPU and DTU, had responsibilities within the U. S. S. R. and were charged, respec- CONFIDENTIAL 60 tively, with purging counterrevolutionary activi- ties and suppressing espionage or sabotage activi- ties directed against transportation. The careful correlation of all foreign intelligence at the top level was accomplished to formulate or to revise Soviet foreign policies. The personnel of MGB included: border guards and internal troops; specially trained spies and covert agents; highly placed Soviet citizens, who were not only specialists in such fields as econom- ics, foreign trade, education and cultural activi- ties, but also were well-trained in the work of in- telligence; unofficial Soviet citizens who were na- tionals of various satellite governments; and for- eign Communist Party members. The Soviet Union has maintained the largest diplomatic corps of any country in the world, and the size of indi- vidual missions has been far in excess of normal requirements. For example, in Ottawa the U. S. S. R. has maintained a diplomatic staff of 70, as compared with maximums of 12 to 24 main- tained by other countries. In Cairo the Soviet Ambassador has had a staff of more than 300; while the Egyptian Ambassador in Moscow has had fewer than 12. In London the U. S. S. R. has had more than 250 persons representing various agencies; while in Washington it has had approxi- mately 1,100 official representatives. At the same time, in Moscow Great Britain was limited to 32 representatives and the United States to about 175. The MVD cooperated with the MGB and con- trolled the administration of the slave labor camps. It had its own troops, politically reliable and ready to crush any armed revolt within the country. Its activities were primarily internal. However, shortly after the dramatic announce- ments of Stalin's serious illness and death in March 1953, news releases from Moscow revealed an important administrative reorganization of the Soviet Intelligence System. The MGB and the MVD were combined as the Ministry of Internal Affairs. There are several possible weaknesses of Soviet Intelligence. The most vital may be that of inter- nal suspicion. In striving for the greatest possi- ble efficiency, Soviet leaders place little trust in their operatives, whom they keep under careful surveillance, including even their diplomatic rep- resentatives. Complete thoroughness may, in it- Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE DEVELOPMENT OF INTELLIGENCE self, become a weakness. A second possible weak- ness, similar to that of the Nazi Germans, is an emphasis on intensive training for their agents which has led to standardized methods and reac- tions. While there is no way to determine the degree of success of Soviet agents, the fact that some of them have been discovered, especially in the United States, indicates that they are not com- pletely successful. Since it must answer to only a small group of Communist leaders, Soviet Intelligence has almost absolute power. It acts as the eyes, ears, and punishing arm of the government in authority. Fear is one of its most effective weapons. There are, however, indications of an underground op- position movement, especially in satellite areas, en- gaged in sabotage and propaganda warfare on a considerable scale. The organization of Soviet Intelligence is fur- ther strengthened by the intelligence agencies of the various satellite countries, including Poland, Hungary, Rumania, and Czechoslovakia. Each of these countries is engaged in intelligence activi- ties which seem to be geared to those of the Soviet Union. The extent of these activities is illus- trated by Hungary, for example, which has an or- ganization out of all proportion to its size, inter- est, and national income. The Rebirth of German Intelligence The political and economic conditions in post- war Germany, divided as it has been into eastern and western zones, have led to underground re- sistance movements with several intelligence or- ganizations, each active in espionage, sabotage, and propaganda. The "Fighters Against Inhu- manity" and the "Investigating Committee of Free Jurists in the Soviet Zone" are two such groups directing their activities against the Soviet occupation forces and the Soviet-sponsored Com- munist Government in East Germany. The "Red Gestapo" is a security service organized by the East German Government to combat the covert activities of the West German groups. CONCLUSIONS A review of the development of the intelligence activities and organizations of various countries of the world throughout recorded history points CONFIDENTIAL up certain general principles and significant les- sons. First of all, intelligence as activity is a product of war and the fear of war. In one form or another, it has always been an inevitable ad- junct of military activity and command. Its de- velopment, therefore, has been associated with that of military forces. History has shown that no major military endeavor has been better than the staff responsible for its direction. At the same time, the degree of the success of any major staff effort has often been proportionate to the knowl- edge, or intelligence, upon which that effort was based. Intelligence has been used for other purposes as well. Wisely employed, it has given direction and meaning to the foreign policies of nations. Basely subverted, it has supported and maintained the autocratic power and authority of police states. There are many lessons of importance to be learned from the history of intelligence. Of these there are six which seem to have particular sig- nificance. The first is the demonstrated need for continuity of performance. No successful organi- zation can be improvised overnight: years of ad- vance planning and preparation are required. Collection and production are effective only on a longterm basis. This means that intelligence ac- tivity must be continuous in times of peace and times of war. The closest possible relationship exists between intelligence operations in peace- time and their effectiveness in wartime. History has demonstrated time and again that adequate peacetime preparations have given a significant offensive advantage when military operations be- gan. Associated with this lesson of history are two others: trained personnel are essential to in- telligence organization; and adequate funds must be made available to maintain the personnel and the organization. The lavish outlay of funds for intelligence in times of crisis is not sufficient. Only longterm support, regardless of the apparent requirements of the moment, can assure continued success. A fourth lesson is the importance of unified di- rection to coordinate and to concentrate the total intelligence effort of a nation. The failures of German Intelligence in World Wars I and II give particular emphasis to this point. 61 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Fifth, the effectiveness of intelligence rests upon the speed of its dissemination and the adequacy of the communications systems upon which it must rely. Finally, intelligence must be used. Its func- tions must be understood and its value appreciated by potential consumers. Time and again in mili- tary and political history failures of intelligence have actually been failures to make use of it. The development of intelligence has been grad- ual, almost imperceptible at times, and paced by the historical trends of nations and peoples. It would be difficult to determine with any finality the extent of its influence on historical events. There seems to be evidence, however, that intelli- gence activity has had a marked effect upon the outcome of specific situations which have influ- enced significant world events. In the broadest CONFIDENTIAL sense, therefore, the lessons to be learned from a study of the history of intelligence merit the most attentive consideration of those military and po- litical leaders of any nation who bear in large measure responsibility for its security, its well- being, and its destiny. Since this chapter has dealt with development, there has been an emphasis on intelligence in re- lation to both military and political history. The illustrations of covert operations may have excited the particular interest of the reader, but the pur- pose of this chapter has not been to give an exag- gerated build-up for intelligence, nor to suggest that it is the answer to all military and political problems. In considering its importance the reader must see it in proper perspective. He must also recognize clearly that covert operations are but one aspect of its total activity. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 3 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY INTRODUCTION A study of its historical development has re- vealed how and why, by the middle of the 20th century, intelligence has become exceedingly im- portant to government and its supporting armed forces in their mutual objective of promoting and maintaining the security and welfare of any na- tion in its relations with other nations. Foreign policies, to be sound and constructive, must be based on realism and fact. Military policies, as part of foreign policies, are subject to the same requirements. Since foreign and military policies are a product of the world environment interact- ing with national aspirations and objectives, they are affected necessarily by the increasing complex- ities of international relations. In recent years as a part of its foreign policy, the United States has assumed additional respon- sibilities under various treaty and pact arrange- ments with other nations on a world, regional, or bilateral basis. Thus special organizations have been required to carry out these new international tasks and new missions and responsibilities have been created for the armed forces. For these rea- sons, the United States has found it imperative to reorganize and expand the agencies responsible for the formulation and direction of plans and policies relating to the national security. The organizations which produce the intelligence re- quired by these agencies have likewise been sub- jected to frequent change in order to carry out the tasks of new responsibilities. This chapter will review the organization of the various United States agencies which have respon- sibilities in connection with foreign policy and will show how Intelligence is related to them. Two concepts must be kept in mind: first, that Intelligence is a service organization, not an end in itself; and second, that Intelligence is a unity and is not the exclusive province of any one agen- cy. By tracing the interrelationships of these agencies and their Intelligence subdivisions, these 63 concepts should become clear and the intelligence officer should better understand his own position and functions. By reason of the frequency of joint operations, he must also be informed of the detailed organization of the army and air force. NATIONAL SECURITY ORGANIZATION The National Security Act of 1947, and the leg- islation supplementing or amending it in 1949, produced fundamental and far-reaching changes in the organization and relationships of the armed forces of the United States. The pumpose of the Act was stated as being: To promote the national security by pro- viding for a Secretary of Defense; for a -De- partment of Defense, for a Department of the Army, a Department of the Navy, and a De- partment of the Air Force; and for the co- ordination of the activities of the Department of Defense with other departments and agen- cies of the Government concerned with the national security. The policy expressed in the Act and its subse- quent amendments was stated by the Congress as follows: In enacting this legislation, it is the intent of Congress to provide a comprehensive pro- gram for the future security of the United States: to provide for the establishment on integrated policies and procedures for the departments, agencies, and functions of the government re- lating to the national security; to provide three military departments, sep- arately administered, for the operation and administration of the Army, the Navy (in- cluding naval aviation and the United States Marine Corps), and the Air Force, with their assigned combat and service components; to provide for their authoritative coordina- tion and unified direction under civilian con- .. trol of the Secretary of Defense, but not to merge them; CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS to provide for the effective strategic direc- tion of the armed forces and for their opera- tion under unified control and for their integration into an efficient team of land, naval and air forces; but not to establish a single Chief of Staff over the Armed Forces nor an Armed Forces general staff (but this is not to be interpreted as applying to the Joint Chiefs of Staff or Joint Staff) . Major Features of the National Security Legislation The major features of the Act were the establish- ment of: (a) the National Security Council, the National Security Resources Board, and the Cen- tral Intelligence Agency; (b) a Department and a Secretary of Defense to provide unified control over the Armed Forces; (c) the Department of the Air Force as a separate command under the Department of Defense; ( d) the following agen- cies under the Department of Defense (in addi- tion to the three military departments) : the Joint Chiefs of Staff and the Joint Staff, the Munitions Board, the Research and Development Board, and the Armed Forces Policy Council. The 1949 Amendments to the Act increased the authority previously granted to the Secretary of Defense to exercise further centralized control of the military departments, and created the posi- tions of Deputy and Assistant Secretaries of De- fense, and the position of Chairman, Joint Chiefs of Staff. The Air Force Organization Act of 1951 further clarified the organization and command structure of the Department of the Air Force, the Chief of Staff and the Air Staff, and the United States Air Force. By mid-1953, various Presidential Reorganiza- tion plans had resulted in a number of changes in some of the agencies and offices created by the National Security Act of 1947. It also resulted in the redistribution of some functions originally as- signed them. For example; Reorganization Plan No. 3 of 1953 abolished the National Security Re- sources Board and transferred its responsibilities to the Office of Defense Mobilization. Within the Department of Defense there was a reorganization of some of its subordinate agencies and offices as the ? result of Presidential Reorganization Plan No. 6 of 1953. CONFIDENTIAL 64 Continuing efforts are made within the executive branch of the Government to increase efficiency of operations and to insure the greatest coordination of its widely varied activities, particularly as re- lated to problems of national security. The National Security Council (NSC) The NSC is composed of officials specifically designated by statute. Among these are: the President of the United States; the Vice Presi- dent; the Secretary of State; the Secretary of De- fense; the Director of Defense Mobilization; and the Secretary of the Treasury. The President acts as chairman. In addition to the foregoing officials, the Presi- dent is given authority to appoint (subject to the advice and consent of the Senate) as additional members of the Council other administrative gov- ernment officials, including the Secretaries and Under Secretaries of other Executive Departments and of the Military Departments. The law provides that it shall have a staff headed by a civilian executive secretary. The function of the NSC is stated as follows: to advise the President with respect to the integration of domestic, foreign and military policies relating to the national security so as to enable the military services and the other departments and agencies of the Government to cooperate more effectively in matters in- volving the national security. In addition to performing such other func- tions as the President may direct, for the pur- pose of more effectively coordinating the poli- cies and functions of the departments and agencies of the Government relating to the national security, it shall, subject to the direc- tion of the President, be the duty of the Council? (1) to assess and appraise the objectives, commitments, and risks of the United States in relation to our actual and potential military power, in the interest of national security, for the purpose of making recommendations to the President in connection therewith; and (2) to consider policies on matters of com- mon interest to the departments and agencies of the Government concerned with the na- tional security, and to make recommendations to the President in connection therewith. The NSC is concerned with the ultimate correla- tion of the Government's best military and diplo- Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL matic thought on problems relating to the position of the United States in the world society of na- tions, and has the additional responsibility of making sure that our commitments do not exceed our abilities to carry theM out. The Secretary of State and his Department continue to exercise leadership in charting our foreign policy, but other branches of Government, including the military, have a chance to state their views before decisions are made. The NSC does not seek publicity but works quietly and secretly. When the President or one of the members of the NSC asks for advice on a particular situation, the Director of the Central Intelligence Agency has a summary of the situation prepared, which includes an appraisal of world reactions to it. A working group made up of representatives from each department recommends a course of action which may be acted upon with dispatch by the NSC itself. Disagreements not resolved are settled by Presidential decision. The long range purpose of the NSC is to provide a thoughtfully developed and clearly stated foreign policy in balance with military strength so as to give continuity to policies even as administrations change. The NS C also specifically guides the ac- tivities of the Central Intelligence Agency. THE DEPARTMENT OF DEFENSE The National Security Act of 1947 created the "National Military Establishment" under the Sec- retary of Defense; the 1949 amendments changed the organizational title to the "Department of De- fense." The latter statute also made the Depart- ment of Defense one of the "executive" depart- ments of the Government equal to the other departments headed by cabinet officers; the De- partments of the Army, the Navy, and the Air Force became "military" rather than "executive" departments, the Secretaries no longer being cabi- net members. The current organization of the Department of Defense is indicated in figure 1. Office of the Secretary of Defense The Secretary of Defense is the principal as- sistant to the President in all matters relating to the Department of Defense. He is normally a 269196-54 6 65 civilian and cannot have been a regular commis- sioned officer within 10 years of appointment to the Secretary's post. A special congressional act waived this restriction in the case of General of the Army George C. Marshall. Congress has restricted the Secretary's powers to change through administrative acts the func- tions of any of the military services that have been fixed by legislation. Further, each of the three military departments is separately admin- istered, and their respective Secretaries as well as members of the Joint Chiefs of Staff have the right, after informing the Secretary of Defense, to express freely their recommendations on defense needs to the Congress. The Joint Chiefs of Staff (JCS) and the Joint Staff Although a body bearing the title Joint Chiefs of Staff has operated since 1942, the official per- manent organization was not established until 1917. At that time the position of Chief of Staff to the President was replaced by that of the Chair- man, Joint Chiefs of Staff, the other members being the Chief of Staff of the United States Army, the Chief of Naval Operations, the Chief of Staff of the United States Air Force, and the Commandant of the United States Marine Corps. The Joint Chiefs of Staff, frequently termed the JCS, are the "principal military advisers" of the President, the NSC, and the Secretary of De- fense. Their duties specifically include: (1) preparation of strategic plans and provision for the strategic direction of the military forces; preparation of joint plans and assignment to the military services of logistic respon- sibilities in accordance with such plans; establishment of unified commands in stra- tegic areas; review of major material and personnel re- quirements of the military forces in accord- ance with strategic and logistic plans; formulation of policies for joint training of the military forces; formulation of policies for coordinating the military education of members of the mili- tary forces; and providing United States representation on the Military Staff Committee of the United (2) (3) (4) (5) (6) (7) CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 roved For Releawaqmp igikAIRDE85@pilalgR000100210002-9 CONFIDENIff CONFIDENTIAL I LI L J < ..1?11=110 66 ...111???1111? RTMENT OF THE N DEPARTMENT OF THE ARMY Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL Nations in accordance with the provisions of the Charter of the United Nations. The chairman, selected from among regular of- ficers by the President, has no vote and exercises no command over the JCS or any service. He serves as presiding officer, provides the agenda for meetings, and informs the Secretary of Defense or President when the JCS has been unable to reach agreement on issues. He is appointed for a 2-year term renewable only once, unless a state of war would make change unwise. The Joint Chiefs have a Joint Staff not to ex- ceed 210 officers drawn from the three services and headed by a Director appointed by the JCS. This relatively small, compact body in no way usurps the direct operational functioning of the individ- ual armed services, but plans and coordinates. If the JCS must undertake operational functions, the service Chief most directly concerned acts as "Ex- ecutive Agent" to control field and other agencies. The JCS exercise command authority as a body; they do not decide questions by majority rule. Most questions are satisfactorily resolved, but re- maining differences of opinion are decided by higher authority. The Joint Staff is divided into three groups: the Joint Strategic Plans Group, the Joint Logistics Plans Group and the Joint Intelligence Group. Of necessity most studies involve intergroup col- laboration. The Staff works full time for the JCS, and its members are not responsible to their own services. Since considerable amounts of JCS work involve detail that must be provided by the in- dividual services, a number of Joint Committees have been established to work with the Joint Staff. The principal ones are the Joint Strategic Survey Committee, Joint Strategic Plans Committee, Joint Intelligence Committee, and Joint Logistics Plans Committee. The first of these committees is the senior policy planning and advisory group for the JCS, dealing with broad political-military problems from a mil- itary viewpoint. The other three committees are part-time, staffed by officers with regular duties in their own departments closely related to their com- mittee assignments. Plans prepared by any of the groups are reviewed by the appropriate com- mittee before submission to the JCS and com- mittee members are able to call upon their respec- 67 tive services for advice. Thus the particular requirements and problems of the various services are coordinated in the planning of the Joint Staff. There are of course, still other specialized com- mittees as depicted in figure 2. And ad hoc com- mittees are also created to meet specific additional needs. The responsibilities of the JCS have been de- lineated in the excerpt from the law given earlier in this section. The JCS contribute to the estab- lishment of priorities to insure the meeting of military needs. Increasingly, too, they are work- ing on budget allocations of the three services to be sure they match the strategic and logistics plans agreed upon. Specific questions come to them from the Services, cabinet secretaries, other Gov- ernment departments, or from one of their own joint staff groups. The complexity of the problems of the JCS can be quite readily illustrated. For example, they have to consider the problem of stockpiling: How much will we require of certain specific materials? Other typical problems might be: How great is the threat of submarine warfare? How much oil and gas will be required in war and how long will the war last? Are reserves adequate? Is ration- ing feasible? What is the availability of men and weapons? In planning the need for bases they must evaluate requirements in relation to avail- ability, defense, and cost of acquisition. Of great importance are intelligence estimates regarding both enemies and allies, what they may or can do. Since planning can never be on the basis of un- limited strength, the JCS must decide what risks can be accepted, what ones are unavoidable, and how these policies or positions interact upon each other. Future weapons planning is also an un- certain and complex problem with tremendous consequences at stake. Many of these weighty problems hinge upon estimates of future interna- tional developments, a matter of good intelligence assessment. All of the planning must be done within the limits of available money appropria- tions. When the JCS finally prepare a strategic plan, it consists of four essentials: (1) a statement of national war objectives; (2) a statement of enemy capabilities; (3) a broad general concept of op- erations; and (4) a statement of a number of time- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 71111113010103 NOTE: BOXES INCLOSED BY BROKEN UNE INDICATE THE JOINT STAFF JOINT STRATEGIC SURVEY COMMITTEE CHAIRMAN'S STAFF GROUP REPRESENTATIVE OF J.C.S. ON SENIOR STAFF OF N.S.C. SECRETARIAT OFFICE OF THE SECRETARY OF DEFENSE JOINT CHIEFS OF STAFF JOINT CHIEFS OF STAFF OFFICE OF THE CHAIRMAN UNITED STATES DELEGATION UNITED NATIONS MILITARY STAFF COMMITTEE 1........ UNITED STATES DELEGATION INTER-AMERICAN DEFENSE BD. HISTORICAL SECTION }-- JOINT MIUTARY TRANS- PORTATION COMMITTEE HUNITED STATES MIUTARY COOPERATION COMMITTEE JOINT METEOROLOGICAL COMMITTEE JOINT MUNITIONS ALLOCATIONS COMMITTEE JOINT COMMUNICATIONS- ELECTRONICS COMMITTEE OFFICE OF THE DIRECTOR OF COMMUNICATIONS ELECTRONICS JOINT INTELLIGENCE OBJECTIVES AGENCY JOINT MATERIEL INTELLIGENCE AGENCY JOINT STAFF ????1 OFFICE OF THE DIRECTOR JOINT STAFF JOINT STRATEGIC PLANS COMMITTEE JOINT STRATEGIC PLANS GROUP JOINT INTELLIGENCE COMMITTEE JOINT INTELLIGENCE GROUP JOINT LOGISTICS PLANS COMMITTEE JOINT ADVANCED STUDY COMMITTEE JOINT LOGISTICS PLANS GROUP L - J Figure 2.?Organization Chart?Joint Chiefs of Staff. September 1952 INTELLIGENCE FOR NAVAL OFFICERS Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL phased military tasks to be undertaken by the military forces, including the major tactical units to perform the tasks. The importance of the intelligence function in such planning is evident. THE DEPARTMENT OF THE NAVY. An understanding of the organization of the Navy Department is important to the intelligence officer for at least two reasons. In the first place, since Intelligence must supply many kinds of in- formation required by the planners and command- ers, its ability to supply meaningful information in no small measure depends upon its understand- ing of the organization it serves. Secondly, In- telligence is dependent upon its whole parent organization for most of the raw material which it is to process into finished intelligence. Like- wise, since the same information may be of use to all three services, and any part of another service may be a source of intelligence useful to the Navy, an understanding of the other national security agencies is also important. The National Security Act of 1947 describes the functional organization of the Department of the Navy as follows: The term "Department of the Navy" as used in this Act shall be construed to mean the Department of the Navy at the seat of government; the headquarters, United States Marine Corps; the entire operating forces of the United States Navy, including naval avia- tion, and of the United States Marine Corps, including the reserve components of such forces; all field activities, headquarters, forces, bases, installations, activities, and functions under the control or supervision of the De- partment of the Navy; and the United States Coast Guard when operating as a part of the Navy pursuant to law. In general the United States Navy, within the Department of the Navy, shall include naval combat and service forces and such avia- tion as may be organic therein. It shall be organized, trained, and equipped primarily for prompt and sustained combat incident to operations at sea. It shall be responsible for the preparation of naval forces necessary for the effective prosecution of war except as otherwise assigned, and, in accordance with integrated joint mobilization plans, for the expansion of the peacetime components of the Navy to meet the needs of war. All naval aviation shall be integrated with the naval service as part thereof within the Department of the Navy. Naval aviation shall consist of combat and service and train- ing forces, and shall include land-based naval aviation, air transport essential for naval operations, all air weapons and air techniques involved ,in the operations and activities of the United States Navy, and the entire re- mainder of the aeronautical organization of the United States Navy, together with the personnel necessary therefore. The Navy shall be generally responsible for naval reconnaissance, anti-submarine warfare, and protection of shipping. The Navy shall develop aircraft, weapons, tactics, technique, organization and equipment of naval combat and service elements; matters of joint concern as to these functions shall be coordinated between the Army, the Air Force, and the Navy. It also describes the organization and functions of the Marine Corps: The United States Marine Corps, within the Department of the Navy, shall include land combat and service forces and such aviation as may be organic therein. The Marine Corps shall be organized, trained and equipped to provide fleet marine forces of combined arms, together with supporting air components, for service with the fleet in the seizure or defense of advanced naval bases and for the conduct of such land operations as may be essential to the prosecution of a naval campaign. It shall be the duty of the Marine Corps to develop, in coordination with the Army and the Air Force, those phases of amphibious operations which pertain to the tactics, technique, and equipment employed by landing forces. In addition, the Marine Corps shall provide de- tachments and organizations for service on armed vessels of the Navy, shall provide security detachments for the protection of naval property at naval stations and bases, and shall perform such other duties as the President may direct: Provided, That such additional duties shall not detract from or interfere with the operations for which the Marine Corps is primarily organized. The Marine Corps shall be responsible, in accord- ance with integrated joint mobilization plans, for the expansion of peacetime components of the Marine Corps to meet the needs of war. Historical Development On April 30, 1798, Congress established the De- partment of the Navy and the Office of the Score- 69 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR tary. Before that time the Secretary of War was responsible for naval affairs. After 1815 the or- ganization was modified to include a board of three naval officers to serve as professional assist- ants to the Secretary. Then in 1842 this board of Navy commissioners was abolished, and the system of technical bureaus was established. By the time of World War I, the post of Chief of Naval Opera- tions was established, and between the two world wars an Assistant Secretary for Air was also ap- pointed. The immense new responsibilities de- veloped during World War II were formalized in the legislation now governing Navy organization. Present-Day Navy Organization and Functions Although the National Security Act of 1947 set forth basic Navy responsibilities, later amplifica- tions have been promulgated. The President and the JCS issued a paper on April 21, 1948, entitled "Functions of the Armed Forces and the Joint Chiefs of Staff." It specifies four purposes com- mon to all three services for military operations: (1) to support and defend the Constitution of the United States against all enemies, foreign or domestic; (2) to maintain, by timely and effective military action, the security of the United States, its possessions, and areas vital to its interest; (3) to uphold and advance the national policies and interests of the United States; and (4) to safe- guard the internal security of the United States. Among the more specific functions this document describes is that of providing adequate, timely, and reliable intelligence for use within the Na- tional military establishment. Using this 1948 document as an authority, the Department of the Navy, in General Order No. 5, established three principal organizational com- ponents and enumerated four principal tasks. The principal components are: 1. The Operating Forces: the several fleets, seagoing forces, sea frontier forces, district forces, and such of the shore establishments of the Navy and other forces and activities as may be assigned to the operating forces by the Presi- dent or Secretary of the Navy. 2. The Navy Department: the executive part of the naval establishment located at the seat of the government, which comprises the bureaus, boards and offices of the Navy Department; the Headquarters of the Marine Corps; and the CONFIDENTIAL 70 NAVAL OFFICERS Headquarters of the Coast Guard (when as- signed to the Navy). 3. The Shore Establishment: all other activi- ties of the naval establishment including all shore activities not assigned to the operating forces. It is fundamental naval policy to "maintain the Navy as a thoroughly integrated entity in suffi- cient strength on the sea and in the air to uphold, in conjunction with our other Armed Forces, our national policies and interests, to support our com- merce and our international obligations, and to guard the United States including its overseas possessions and dependencies." The implementa- tion of this policy imposes upon the administra- tion of the naval establishment four principal tasks: 1. First, to interpret, apply and uphold the national policies and interests in the develop- ment and use of the naval establishment. This task may be described as the "policy control" of the naval establishment. 2. Second, to command the operating forces, and to maintain them in a state of readiness to conduct war; and to promulgate to the naval establishment directives embracing matters of operations, security, intelligence, discipline, naval communications, and similar matters of naval administration. This task may be de- scribed as the "naval command" of the naval establishment. 3. Third, to coordinate and direct the effort of the Navy Department and the shore establish- ment in order to assure the development, pro- curement, production and distribution of mate- rial, facilities and personnel to the operating forces. This task may be described as the "logis- tics administration and control" of the naval establishment. 4. Fourth, to develop and maintain efficiency and economy in the operation of the naval estab- lishment with particular regard to matters of organization, staffing, administrative proce- dures, the utilization of personnel, materials and facilities, and the budgeting and expenditure of funds. This task may be described as the "business administration" of the naval establish- ment. The first and third tasks require additional com- ment. Policy control includes guidance of the Navy as a whole, appraisal of its overall perform- ance, and public relations in the broadest sense. Logistics is further described in General Order No. 5 as having two phases: consumer logistics, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL and producer logistics. The former involves the planning and forecasting of requirements on the basis of operational plans, a responsibility of the Chief of Naval Operations. The latter involves the developing and procuring of these require- ments. Consumer logistics is intimately asso- ciated with naval command while producer logistics is a matter of business adminstration, although, of course, the two are intimately related. Distribution of Executive Responsibilities Figure 3 outlines the principal subdivisions of the Department of the Navy. It will be noted that the secretary has 4 civilian executive assist- ants and a larger number of naval professional assistants, including the naval command assistant (Chief of Naval Operations) and up to 12 naval technical assistants (counting the Chief of Naval Reserve, Chief of Naval Material, and, when so as- signed, the commandant of the Coast Guard). The Secretary directs and controls the entire naval establishment and retains immediate respon- sibility for policy control, public relations, morale, and budget. The civilian executive assistants handle business administration and producer logistics, exercising top management coordination of the work of the many bureaus and offices in the Navy Department. Bureau heads, however, have direct liaison with the Secretary, although routinely most of their business is transacted either through the Chief of Naval Operations or one of the civilian executive assistants. The bal- ancing of military with civilian authority and responsibility within the Navy is shown by the division between the naval command assistant with his subordinates and the civilian executive assist- ants with their staffs. Office of the Chief of Naval Operations (CNO) The Chief of Naval Operations is the highest ranking officer in the Department of the Navy. As such he is a member of the JCS and is the prin- cipal naval adviser to the President, Secretary of Defense, and Secretary of the Navy. He is in command of the operating forces and includes among his responsibilities their training, readi- ness, and war planning. He is required to deter- mine the personnel and material requirements of the operating forces and to this end coordinates 71 and directs the efforts of the various bureaus and offices of the Navy Department. His Vice Chief of Naval Operations (VCNO) supervises the General Planning Group and the work of the five Deputy Chiefs of Naval Opera- tions (DCNO) : Personnel, Administration, Op- erations, Logistics, and Air. There is also an Assistant Chief of Naval Operations (Naval Re- serve) advanced from his former position under the Deputy Chief of Naval Operations (Person- nel). The General Planning Group prepares broad strategic plans and aids in developing logis- tics requirements in support of such plans. These naval plans are based on overall plans received from the JCS. Another more recent change is the Progress Analysis Group to report on Navywide progress and readiness for war. Both the Com- mandant of the Marine Corps and the Comman- dant of the Coast Guard (in wartime) deal di- rectly with the Chief of Naval Operations on matters of common interest. The office of the Chief of Naval Operations is or- ganized along the same lines as the general staff of the Army, although different titles are used and there are some variations. For example, per- sonnel and administration are separate sections. The latter directs United States naval missions, Navy participation in pan-American affairs, naval records and history, the Naval Observatory, the Naval Hydrographic Office, and the Naval Com- munications Service. Air also has its separate organization to develop aircraft and guided mis- siles, to organize aviation logistics, and to develop air warfare operating plans. The DCNO (Opera- tions) Division includes intelligence and plans, so that the Director of Naval Intelligence is subordi- nate to the Deputy Chief of Naval Operations. This same subordination exists in the Air Force. Training responsibilities are allocated as fol- lows: individual training to the Chief of Naval Personnel, group training to the Deputy Chief of Naval Operations (operations) , and aviation to the Deputy Chief of Naval Operations (Air). By general policy either the Chief or the Vice Chief of Naval Operations must be a naval aviator to insure full representation of aviation needs. The Vice and Deputy Chiefs derive their authority solely from the Chief of Naval Operations, in the same manner as with staffs afloat. Although not in- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 1VIIN3011N00 DEPARTMENT OF THE NAVY I TIE SECRETARY OF THE NAVY SUM= OF AIL NAVAL MORS NAVAL COMMAND ASSISTANT OM OF 1LAVAL OPULA110145 Or On.n. rOof vc ow Of NAM 0PIRA106 oma OF THE CHILI OF NAVAL OPERATIONS I' ON NLIO-1 TT.? PT LOGISnr MOO10, COMA ? ? 12. CIVRIAN EXECUTIVE ASSISTANTS OWN SECRETARY OF 1111 NAVY MIAMI SE011TARY ASSISUMT SECRETARY FOR MN EXECUTIVE OFFICE OF THE SECRETARY .0.00snan Foc ? ? Orr.. on. Mr. Of TNT COMPTROLLO of. MIMAGMEM sTATI Oft. Cf COOM/I. off Cf HON. mATER. PIELAnOTO ort. Or XT... 1111101.LUM Room. ICI of OFTP2 of .OLISIS .VIDO InnTRAL Onflf? nOARD OTT . of .nOinT boon. NAT. o.?05 THE OPERATING FORCES OF THE NAVY fu,m COMMON,' =g..? COM OM/ 'row. f TEO j.a.STRAT.n ? 0.01/01 FLIT'S OR 1?1173 scoop. rum AND 0.0.0?Wen MICE 1.6TFON moon. .001.11.3 woo.. ITONMS Stlinvol C0.1.06 0.11,106 Of5TO MART AMMO 03?05 APOLTRIA NOTTROTO AMOCO N.. no0C6- "ZeTY"TC'TO"' SICTIT TATT4an% TT LANTK COTTFCearr'S liTGir,..L.T=T fa,SJ SZTACNT. 74.7fr TYPE 001.1003 INSTROVCOS pjg? kairi=p3 ATM% C503.5 TATTiblon-CAO.E. TC4iCfS late. CON?tudd 110.00144 ccom.TNTS COTT... MOTS ".laulgtrsoonCT T.12 answolp "rvti?'"Co.0.00: MEMIRTA ATIOATIC MST 114.1 TLII1 tave. TCWCES ALM. SCA MON CIATIO.F.0 TROn 'TTIT Tor MID .1 TORCE TT./ REIT RC.? nal VON TIM 41011,1 flOCT Prmarei By: Noy Ilmagemeel Slag DeWitt d the Navy I AUGUST 1953 1""' 13 13 0 MARINE CORPS COMMAND ASSISTANT 0- ? COMMANDANT MAME OWE 0 NAVAL TKIINKAL ASSISTANTS ONIf Of NAVAL MUM ? OLIU OF NAVAL ASLEEP -ONUS OF SNUANS ? AWE ADVOCATE GENERAL Of Tina .401.5 MK. MO MATTO LOME .3.1.1 MCAMP PI ?MOM. neCOAL.151 rpopotTOO. OKTIONITOTI LoPS ALM. atinuAICE St??106 Amp T.CCOO B.A.T eniscammi. COCKS ATTE nt 40?fainCAL ?TSET TTC 4106. TOOBS. 01.00[3 FOC.T TIC ?00.5.16 orCol? 0.6 M... 0 LOCO. MM. InnlorT cit KOSOn.a. Fro 07.1 =IA " 71. OCCS LTC /11.1Mit VIA SEA MGM COMAIMIVIRS MKT C CONM ITC THE SHORE ESTABLISHMENT nt MOW, NM, IN Tom n APTI, miXTAIM. ormol Calown105 aloaCTO.4.1 MO sof OLT MTOTIMI. WPC. '4".jiKat PROPRT.O. PL.005 510.41 .POTS TESTI/. AC/man. n[10 PoTC.51. 1001 OnoT6 ? .01CT Of s PMM, KCOUNT NO 0 Ow* COMO MIMM. MSC.. ? '241741.? ToTainT.S. VATTLOT..S. SE..5 awarataa M.S. ETC *RESPONSIBLE TO CNO WHEN CNO IS ACTING IN HIS CAPACITY AS NAVAL EXECUTIVE TO SECNAV **COLLATERAL RESPONSIBILITIES TO SECNAV ***DUAL RESPONSIBILITIES TO SECNAV AND CNO Figure 3.?Organization Chart?Department of the Navy. APProved- IL S. MINE COWS mmpSTRAT gm, Tomoo. COPEMEXT. StlerLT 1 ',INEEL7 ^ s1.1 CON ACTIN!, ^ IMOCO Lowry el tio Noy INTELLIGENCE FOR NAVAL OFFICERS Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY flexible or fixed by formal regulations, the most frequent relationships between CNO and the Bu- reaus are found as follows: DCNO (Logistics) with Yards and Docks, Ordnance, Supplies and Accounts, Ships, Medicine and Surgery; DCNO (Personnel) with Personnel; and DCNO (Air) with Aeronautics. The Naval Inspector General reports both to the Chief of Naval Operations and to the Secre- tary of the Navy. He investigates and reports on all matters affecting the discipline and military efficiency of the Navy, making such recommenda- tions as are required. In his work he has great latitude, and every part of the service is open to his scrutiny. His investigations are not to be confused with those made by the Office of Naval Intelligence which relate to security and are made only on request of competent authority. The Operating Forces Since World War II, all United States forces outside the continental limits have been organized under unified area commands. Each is under a commander-in-chief who has control over all United States forces?Army, Navy, and Air Force in his area?as assigned by the Joint Chiefs of Staff. Under the Executive Agent concept men- tioned earlier, the Chief of Naval Operations holds that JCS position for the Pacific, Atlantic, and Eastern Atlantic-Mediterranean commands. The Chief of Staff, United States Army, is the Execu- tive Agent for the Far East (FEC) , Caribbean, and European (EuCom) commands as well as United States Forces in Austria. The Chief of Staff, United States Air Force, is the Executive Agent for the Alaskan and Northeast commands, the United States Air Force Europe, and the Stra- tegic Air Command (SAC). The Chief of Naval Operations has under his direct control the Pacific Fleet, Atlantic Fleet, and Naval Forces Eastern Atlantic and Mediter- ranean. Each fleet has type components: Am- phibious, Fleet Marine, Air, Battleships and Cruisers, Destroyers and Destroyer Escorts, Mine, Submarine, Service Force, and Training Com- mands. Under Commander-in-Chief, Pacific Fleet (Cin- CPac) is the First Fleet, operating in the Eastern Pacific, and the Seventh Fleet, in the Western 73 CONFIDENTIAL Pacific. However, during the Korean fighting operational control of the latter fleet has been held by the Commander-in-Chief, Far East (Army) exercised through Commander Naval Forces, Far East (ComNavFE). The Commander-in-Chief, Atlantic Fleet ( CinCLant) , has the Second Fleet, and the Operational Development Force for evalu- ation tests. Commander-in-Chief Eastern At- lantic and Mediterranean (CinCNELM) has the Sixth Fleet in the Mediterranean, receiving logis- tic support from CinCLantFlt. Each of these fleets is composed of appropriate ships tempo- rarily assigned from type commands, and each is a purely operational command, the administration remaining under the type commander. Naval Forces, Germany (NavForGer) is under Commander-in-Chief, Europe (Army) . The Mili- tary Sea Transportation Service (MSTS) is under the Chief of Naval Operations. In addition there are Pacific and Atlantic Reserve Fleets made up of the "moth-ball" ships. The Commanders of the Western and Eastern Sea Frontiers respec- tively command these fleets as additional duty. Sea Frontiers Sea Frontier forces are part of the Operating Forces of the Navy. Geographically there are five such forces. The Eastern Sea Frontier (East- SeaFron) includes waters off the Atlantic and Gulf Coasts and the 1st, 3d, 4th, 5th, 6th, 8th, and 9th Naval Districts, plus Naval Commands of the Potomac and Severn Rivers. This sea frontier command is under CinCLant. The Caribbean Sea Frontier, under the Commander- in-Chief, Caribbean (Army), includes the 10th and 15th Naval Districts, plus adjacent waters in the Caribbean and nearby Pacific. The Western Sea Frontier (WesSeaFron) under CinCPac in- cludes the 11th, 12th, and 13th Naval Districts, as well as eastern Pacific waters. The Hawaiian Sea Frontier also under CinCPac includes the 14th Naval District and central Pacific waters. The Alaskan Sea Frontier is under Commander-in- Chief Alaska (Air Force) and includes the 17th Naval District and north Pacific waters. These command relationships are in the field of military operations. Sea Frontier commanders are responsible for maintaining adequate plans for the defense of their respective areas, both of a CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS naval and a joint nature. They also must be ready to expedite and protect merchant shipping in their areas. Naval participation in search and rescue operations is under their control. In addition to operational duties, Sea Frontier commanders are administratively in the chain of command between the Chief of Naval Operations and the District Commandants. This is military command and coordination control in the interests of uniformity of action and avoidance of duplica- tion among the districts. District Commandants still can deal directly with the Navy Department on matters not involving coordination or the mili- tary readiness of their forces. The Shore Establishment The shore establishment includes the field ac- tivities of the bureaus and offices of the Navy De- partment and all shore activities not assigned to the operating forces. These activities are largely involved in producer logistics for the support of the operating forces. Although located princi- pally in coastal areas, they may be scattered any- where throughout the United States and its terri- tories. It is appropriate at this point to provide an ex- planation of the formal command relationships which apply specifically to the Shore Establish- ment, based on General Order No. 19 which gives the official definitions. Command is the authoritative direction exer- cised over a unit or individual of the Naval Estab- lishment in all matters pertaining to the conduct of naval affairs not specifically expected by higher authority and is commensurate with the responsi- bility imposed. Inherent in command are prec- edence over all personnel serving with the com- mand, the responsibility for coordinating the ef- forts of the units or individuals commanded, the power to enforce the official will of the commander through the exercise of the necessary military di- rections, the authority to make inspections to in- sure compliance with such directions, and the initiation or application of authorized discipli- nary measures incident thereto. A commander, within his discretion, may delegate the execution of the details to be performed by his authority to appropriate subordinates, but such delegation does not relieve him of the overall responsibility for CONFIDENTIAL 74 the performance of the personnel or units under his command. In General Order No. 19 "command" is subdi- vided into four components which are defined as follows: Military Command is the authoritative di- rection exercised over activities of the Naval Establishment in military matters together with the power to exercise authoritative direc- tion in all matters when circumstances dictate. Military command stems from the Chief of Naval Operations, and is exercised over activities of the shore establishment through the Sea Frontier Com- manders and the District Commandants, the Chief of Naval Air Training, and the Comman- dant of the Marine Corps. It includes matters characteristic of a military organization, as con- trasted to matters of the type provided for under Management Control in industry or business. Coordination Control is that necessary di- rection of separate units of the naval estab- lishment to insure adequately integrated relationships between all of these units. Coordination Control is a responsibility of the Chief of Naval Operations, exercised through the Sea Frontier Commanders and the District Com- mandants, over shore activities located within the several districts. It fulfills the twofold purpose of providing for orderly and complete service in support of the operating forces and coordination between shore activities under different commands. Management Control is the direction exer- cised, in other than military matters, by an authority of the Naval Establishment over a unit of the naval shore establishment in the administration of its local operating func- tions. Management Control is exercised by the desig- nated bureau or office of the Navy Department over a field activity in the non-military adminis- tration of its functions. Bureau management re- flects the policies and procedures of the Civilian Executive Assistants in the fields of Business Ad- ministration and Producer Logistics, and includes overall responsibility for the work performed. It is to be noted that in the operating forces Man- agement Control is included in "Command" and is always the responsibility of the Chief of Naval Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY Operations. Command in the operating forces is not divided into the four components specified in General Order No. 19; however, commands of the operating forces which control activities of the Shore Establishment exercise that control in ac- cordance with these four components. Technical Control is the specialized or pro- fessional guidance or direction exercised by an authority of the naval establishment in technical matters. Technical Control is exercised by the bureaus and offices of the Navy Department according to their specialized technical responsibilities. This con- trol extends throughout the naval establishment. The shore establishment consists of district ac- tivities, fleet activities based ashore, Marine Corps supporting activities, and the Naval Air Training Command. Their relationships with the districts, sea frontiers, fleet commands, and bureaus, are governed by the regulations indicated above. A District Commandant is an officer of the line qualified for command at sea. In his naval dis- trict he acts as the representative of the Secretary of the Navy, Chief of Naval Operations, Sea Frontier Commander, and the various bureaus of the Navy Department. His responsibilities in- clude support of the operating forces, defense of the district, control of public relations, mainte- nance of industrial mobilization plans, control of naval reserve matters, and maintenance of an ef- ficient intelligence service both for security and operational purposes. Additional duties include operation of naval communications, collaboration with other Government authorities, supervision of legal matters, public works, and transportation. Each major harbor or operating area within a district has a Naval Base Commander, with pri- mary responsibility to support the operating forces. A Naval Shipyard is but one component of a Naval Base. There are also Naval Air Base Commands with appropriate subordinate oom- mands, including all aviation activities within a district with the exception of training commands, Marine Air commands, and weather centrals. The United States Marine Corps The Marine Corps, whose mission has been stated earlier, is divided like the Navy into three com- ponents: the headquarters, the operating forces, CONFIDENTIAL and the supporting establishment. Headquarters include the Offices of the Commandant, the Supply Department, and the Personnel Department. In the Offices of the Commandant, the Division of Plans and Policies formulates intelligence plans. The major commands of the operating forces are Fleet Marine Forces, Atlantic, and Fleet Ma- rine Forces, Pacific, each under a Commanding General, located respectively at Norfolk, Va., and at Honolulu. These forces contain balanced land, air, and service elements. The Marine Corps Se- curity Forces guard naval shore activities, with a Marine Barracks established at each. Ship de- tachments, actually a part of the security force, serve as gun crews and small-sized landing parties. The supporting establishment includes the quar- termaster depots and other facilities required to service the Operating Forces. OTHER DEFENSE DEPARTMENTS The Department of the Army and Department of the Air Force resemble the Department of the Navy in structure, but different histories and mis- sions have brought about somewhat different solu- tions to their organizational problems. The Department of the Army This title refers both to the whole Army estab- lishment and to the executive offices in Washington. The Department of War, created in 1789, became the Department of the Army in 1947 at which time the Department of the Air Force was established. The Secretary of the Army has responsibilities and an organization similar to those of the Secre- tary of the Navy. His department includes a Chief of Staff, a General Staff, a Special Staff, various administrative and technical staffs and services, the Office of the Chief of Army Field Forces, the continental armies, and the overseas commands. The mission of the Army places its primary interest in all operations on land, but its forces include also such aviation and water transporta- tion as may be organic to its land combat and service forces. Figure 4 shows the Washington offices of the Department of the Army. Most of the titles are self-explanatory. The chiefs of the technical serv- ices, however, have a dual role. They not only 75 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 1V11N3011N00 ADMINISTRATIVE ASSISTANT 1 DEPARTMENT COUNSELOR DEPARTMENT OF THE ARMY SECRETARY OF THE ARMY ASSISTANT SECRETARY OF THE ARMY (General Management) ASSISTANT SECRETARY OF THE ARMY (Manpower & Res Forces) UNDER SECRETARY OF THE ARMY CHIEF OF STAFF VICE CHIEF OF STAFF SECRETARY OF THE GENERAL STAFF COMPTROLLER OF THE ARMY DEPUTY CHIEF OF STAFF FOR OPERATIONS & ADMINISTRATION GENERAL STAFF COMMITTEE ON NATIONAL GUARD AND RESERVE POLICY DEPUTY CHIEF OF STAFF FOR PLANS ACCOUNTING 8, FINANCIAL POLICY DIVISION AUDIT DIVISION ASSISTANT CHIEF OF STAFF G-1, PERSONNEL BUDGET DIVISION MANAGEMENT DIVISION PROGRAM REVIEW & ANALYSIS DIVISION ASSISTANT CHIEF OF STAFF G-2, INTELLIGENCE GENERAL SPECIAL CHIEF OF INFORMATION STAFF STAFF CHIEF OF LEGISLATIVE LIAISON ASSISTANT CHIEF OF STAFF G.3, OPERATIONS ASSISTANT CHIEF OF STAFF G.4, LOGISTICS PSYCHOLOGICAL WARFARE CHIEF OF FINANCE INSPECTOR GENERAL CHIEF OF AtILJTARY HISTORY ADMINISTRATIVE STAFFS AND SERVICES THE ADJUTANT GENERAL PROVOST MARSHAL GENERAL CHIEF OF CHAPLAINS THE JUDGE ADVOCATE GENERAL CHIEF NATIONAL GUARD BUREAU TECHNICAL STAFFS AND SERVICES OFFICE OF THE EXEC FOR RES & ROTC AFFAIRS 1 SURGEON GENERAL CHIEF OF ORDNANCE CHIEF OF ENGINEERS QUARTERMASTER GENERAL Figure 4.?Organization Chart?Department of the Army CHIEF OF TRANSPORTATION CHIEF SIGNAL I OFFICER CHIEF CHEMICAL OFFICER Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL serve in the manner of the chiefs of technical bu- reaus in the Navy in determination of require- ments, procurement, and storage of supplies, under the direction of the Assistant Chief of Staff 0-1 Logistics, but they also command their technical branches and certain installations. For example, the Chief of Transportation commands Ports of Embarkation, Railway Repair Depots, and other Transportation Corps facilities. The Army organization provides for each mili- tary commander a staff to aid him in his work. Divisions and larger units have a Chief of Staff to direct and coordinate a General Staff which in its four divisions, G-1 Personnel, G-2 Intelligence, G-3 Operations, and 0-4 Logistics, includes all functions of command. Under the coordinating General Staff is such Special Staff organization as may be required, including all other staff officers in a headquarters not specifically part of the General Staff. In brigades or smaller units the director and coordinator for the commander is called the. Executive, and there is no special staff, but there is an equivalent of the General Staff, known as S-1 Adjutant, S-2 Intelligence, S-3 Operations and Training, S-4 Supply, and such other staff officers as may be required. Since the same pattern of organization appears at every level of the Army, there is no loss of efficiency when officers are transferred from one unit to another or between levels, for their respon- sibilities are clearly defined and understood. The American General Staff system has one interesting variation from that of other countries, such as Germany. The United States Army rotates offi- cers between staff and command assignments; the Germans built a preferential elite corps ear- marked almost solely for staff assignment. The Office, Chief of Army Field Forces, is the field operating agency of the Department of the Army for the continental United States and is located at Fort Monroe, Va. The Army Field Forces are responsible for training, development of doctrine, and equipment. Its responsibility for overseas forces is limited to setting training standards and doctrine, and determining opera- tional readiness. Orders to overseas commands are issued through the Department of the Army. The United States is divided geographically into six Army Areas and a Military District of Washington. The Commanding General of each area, or district, commands all units and activities within his area except those specifically com- manded by one of the Technical Services or other agencies of the Department of the Army. Army Territorial and Troop Organization The Army refers to any land, sea, and air masses involved in the conduct of war as theaters of war. A theater of operations refers to an area where actual tactical operations are or can be conducted," and it may be subdivided into a combat zone and a communications zone. The combat zone may include division areas at the front, behind them corps service areas, and behind those in turn army service areas. The communications zone relieves combat commanders of responsibility for logistics and security operations not concerned with their primary combat missions. It is divided into an advance section, an intermediate section, and a base section. That part of the theater of war not included in the theater of operations is called the zone of the interior?a term usually applied to the United States, but on occasion also to foreign territory whether allied, neutral, or hostile. Army troop organizations range from the army group down to the rifle squad. An army group is primarily a tactical command made up of sev- eral field armies. A field army includes a head- quarters, certain organic troops, and a variable number of corps and divisions. The army is both administrative and tactical. A corps also includes a headquarters and certain organic troops plus a variable number of divisions. It is primarily a tactical unit but can be administrative. A divi- sion is the basic unit of combined arms, includ- ing headquarters, infantry, armored or airborne units, artillery, and other units as required. It is both administrative and tactical. There are smaller units such as the brigade, a tactical unit of two or more regiments, headquar- ters and other small units; a group, a flexible organization with various attached units to ac- complish a particular mission; a regiment, with headquarters, service company, and two or more battalions, or other smaller units; a battalion, the basic tactical unit; a company or battery, the basic administrative unit; a rifle platoon; a weapons 77 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS section; and a squad. An army rifle squad has 9 men; in contrast, the Marines divide their 13-man squads into three 4-man fire teams. The rifle pla- toon is the smallest infantry unit commanded by a commissioned officer. Such personnel and equip- ment as are not required consistently by a particu- lar unit are pooled and assigned to a higher unit. When particular tactical groupings are re- quired, special task forces are created, preserv- ing as much as possible the integrity of compo- nent units. Armored divisions sometimes have combat commands with their own headquarters companies to direct temporary tactical groupings. The infantry division frequently uses a combat team consisting of an infantry regiment, support- ing artillery, and engineers, or possibly also a signal detachment, medical battalion, and so forth. This is called a regimental combat team (RCT) . The Army classifies as "arms": the Infantry, Armored Cavalry, Field Artillery, Coast Artil- lery, Corps of Engineers, and Signal Corps. It classes as "administrative services": the Adjutant General's Department, the Chaplains, the Corps of Military Police, the Inspector General's De- partment, the Judge Advocate General's Depart- ment, and the Finance Department. It classes as "technical services": the Chemical Corps, the Corps of Engineers, the Quartermaster Corps, the Transportation Corps, the Ordnance Depart- ment, the Signal Corps, and the Medical Depart- ment. Department of the Air Force From a modest beginning in 1907 as the aero- nautical division in the Office of the Chief Signal Officer, the United States air arm has developed tremendously under the impetus of two world wars. In World War I the Army Air Corps was used in combat operations, and during World War II the Army Air Forces expanded to nearly 21/2 million men operating 80,000 aircraft. After the war there was a reduction in size, but by 1950 the objective was a total of 143 wings as a result of the Korean War and the world situation. The National Security Act of 1947 and its sub- sequent amendments created an Air Force Estab- lishment, a Department of the Air Force, and the United States Air Force. The civilian Secretary and his assistants have functions comparable to CONFIDENTIAL 78 their counterparts in the Department of the Navy and Army. The Chief of Staff, United States Air Force, is the principal military adviser to the Sec- retary and exercises command over the Air Force. His Air Staff includes a Vice Chief and Deputy Chiefs as shown in figure 5. The five deputies are for Comptrolling, Personnel, Development, Operations, and Materiel. As was pointed out earlier, Intelligence is under Operations, together with Plans, Communications, Manpower, and Organization. The Air Force is charged with the responsi- bility of being "organized, trained, and equipped primarily for prompt and sustained offensive and defensive air operations." Its missions as for- mally defined include (1) defense of the United States against air attack; (2) the defeat of enemy air forces and the control of vital air areas; (3) the interdiction of enemy land power and communi- cations; (4) the furnishing of combat and logisti- cal air support to the Army, including air lift and resupply of airborne operations, close combat air support, aerial photography, tactical reconnais- sance, etc.; (5) the carrying out of a campaign of progressive planned destruction of the enemy's war-making capacity; and (6) the providing of air transport for the Armed Forces. There are also the collateral duties of interdiction of enemy sea power, antisubmarine warfare, protection of shipping, and aerial minelaying. The latter are closely coordinated with naval efforts. Major Air Commands There are 13 major commands in the United States and 5 overseas, all under the Chief of Staff, United States Air Force. Those in the United States are grouped functionally as follows: (a) operational: Strategic Air Command, Tactical Air Command, Air Defense Command; (b) sup- portive operational: Military Air Transport Serv- ice, USAF Security Service, Headquarters Com- mand; (c) training: Air University, Air Training Command, Continental Air Command; (d) de- velopmental and logistic: Research and Develop- ment Command, Air Materiel Command, Air Proving Ground Command, Special Weapons Command. The Strategic Air Command (SAC) includes heavy and medium bombers, long and medium Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 1VIIN3011N00 SURGEON GENERAL THE INSPECTOR GENERAL THE JUDGE ADVOCATE GENERAL CHIEF OF STAFF VICE CHIEF OF STAFF ASS'T VICE CHIEF OF STAFF AIR ADJUTANT GENERAL SCIENTIFIC ADVISORY BOARD SECRETARY OF THE AIR STAFF SPECIAL ASST FOR RESERVE FORCES DEPUTY CHIEF OF STAFF COMPTROLLER DEPUTY CHIEF OF STAFF PERSONNEL DEPUTY CHIEF OF STAFF DEVELOPMENT DEPUTY CHIEF OF STAFF OPERATIONS DEPUTY CHIEF Or 5TAFF MATERIEL ASSISTANT FOR PLANS AND INTERNATIONAL AFFAIRS ASSISTANT FOR GROUND SAFETY SPECIAL ASSISTANT FOR AIR FORCE ACADEMY MATTERS ASSISTANT FOR DEVELOPMENT PLANNING ASSISTANT FOR ATOMIC ENERGY ASSISTANT FOR PROGRAMMING ASSISTANT FOR MATERIEL PROGRAM CONTROL ASSISTANT FOR LOGISTICS PLANS AUDITOR GENERAL DIRECTOR, WAN CHIEF OF AF CHAPLAINS ASSISTANT FOR - DEVELOPMENT PROGRAMMING ASSISTANT FOR MUTUAL SECURITY DIRECTOR OF ACCOUNTING DIRECTOR OF PERSONNEL PLANNING DIRECTOR OF REQUIREMENTS DIRECTOR OF INSTALLATIONS DIRECTOR OF MAINTENANCE ENGINEERING DIRECTOR OF STATISTICAL SERVICES DIRECTOR OF RESEARCH & DEVELOPMENT DIRECTOR OF INTELLIGENCE DIRECTOR OF SUPPLY & SERVICES DIRECTOR OF MILITARY PERSONNEL DIRECTOR OF PLANS DIRECTOR OF BUDGET DIRECTOR OF INDUSTRIAL RESOURCES DIRECTOR OF COMMUNICATIONS DIRECTOR OF MANAGEMENT ANALYSIS SERVICE DIRECTOR OF CIVILIAN PERSONNEL DIRECTOR OF TRANSPORTATION DIRECTOR OF MAVOWER AND ORGANIZATION '1 DIRECTOR OF 'PROCUREMENT AND PRODUCTION ENGINEERING DIRECTOR OF FINANCE DIRECTOR OF TRAINING DIRECTOR OF OPERATIONS Figure 5.?Organization Chart?Department of the Air Force. Approvefh,h90,91?(*gg gpfaigtgpokcikgzig,gglip 002100Q2a- vunrIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS range reconnaissance aircraft, transports, and jet fighters. Organizationally it includes the 2d, 8th, and 15th Air Forces, each with several air divi- sions; overseas it maintains the 5th and 7th Air Divisions. Its missions may carry it to any part of the globe. The Tactical Air Command includes fighter- bombers, light bombers, reconnaissance aircraft, and troop carriers. Organizationally it includes the 9th and 18th Air Forces. It works closely with the Army Field Forces in developing tactical air support doctrines. The Air Defense Command (ADC) controls fighter-interceptor units, air bases, and radar sta- tions along the possible air attack routes in this country. It consists of three regional forces, the Eastern, Central, and Western, each made up of several air divisions, supplemented by Air Na- tional Guard wings. Their operations are closely integrated with the Navy Sea Frontier system and the respective Army Anti-Aircraft Artillery com- mands. Elements of ADC may be assigned to commands outside the United States by the Joint Chiefs of Staff. The Military Air Transport Service (MATS) combines the former Air Transport Command and Naval Air Transport Service. Its routes extend around the world, and it can provide military air lift as required. It provides supplementary serv- ices such as airways communications, weather reporting, air and sea rescue. It includes person- nel of the Navy as well as of the Air -.Force. A special operation of MATS is the Air Resupply and Communication Service (ARCS) which trains Air Force units in the preparations and dropping of psychological warfare pamphlets. The USAF Security Service produces and dis- seminates communications intelligence and main- tains communications security within the Air Force. The Headquarters Command is primarily an administrative adjunct of the Headquarters, United States Air Force, and operates the base for the heavy traffic in and out of Washington. The Air University includes a variety of schools and institutes ranging from the Air War College to the Extension Course Institute. The Air Train- ing Command is responsible for all training below the Air University level from recruit to flying offi- cer, and for this purpose uses the Flying Training CONFIDENTIAL 80 Air Force and the Technical Training Air Force. The Continental Air Command constructs and maintains air bases and other facilities within the United States, using as subcommands the 1st, 4th, 10th, and 14th Air Forces. The six research centers of the Research and Development Command work on aircraft, mis- siles, and armament. The Air Materiel Command buys, supplies, and maintains Air Force equip- ment throughout the world. The Air Proving Ground Command develops operational tech- niques and makes recommendations on require- ments for equipment. The Special Weapons Com- mand is part of the joint Army-Navy-Air Force atomic weapons organization. Overseas there are five air commands. The gen- erals of the Alaskan and Northeast Commands are also theater commanders over all three services in their areas. The Caribbean Air Command and Far Eastern Air Force (FEAF) are under Army theater commanders and the United States Air Force in Europe (USAFE) operates under the North Atlantic Treaty Organization. Although the preceding discussion of organi- zations for United States security is relatively brief, it provides a necessary background in nomenclature and functions. The balance of this chapter will deal with supporting intelligence subdivisions, emphasizing those within the De- partment of Defense, but including others which are of interest. NAVAL INTELLIGENCE Naval Intelligence includes all the organizations that carry out the intelligence and counterintelli- gence missions of the naval establishment. The responsibilities of the Director of Naval Intelli- gence are: (1) to provide the naval elements re- quired in the production of national intelligence; (2) to produce for naval commanders adequate and timely intelligence needed both for planning and conducting operations, and for estimating the capabilities, vulnerabilities, and proper courses of action of foreign nations; (3) to warn naval com- manders of threats to the security of their commands. The components of Naval Intelligence are: (a) the Office of Naval Intelligence; (b) Intelligence foreign posts (Attaches, Observers, and Liaison Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL Officers) ; (c) Naval District and River Command Intelligence organizations; (d) Intelligence sec- tions and units of the operating forces including outlying bases; and (e) joint and combined In- telligence and liaison activities. Each of these components will be discussed in turn. It will clarify our point of view to think of all naval intelligence officers as serving on the intelli- gence section of some commander's staff, the size and organization of the section depending on the needs of the command. On lower echelons, the intelligence section may consist of a single officer who also performs other duties, such as that of assistant operations officer; and the commander? for example, the captain of a ship or an air squad- ron?may not be normally thought of as having an organized staff at all. On higher echelons, in- telligence duties may require the full time services of many officers. The higher the echelon of com- mand, the more extensive the staff organization, and the larger and more complex the intelligence section. The highest echelon of the United States Naval Command is that of the Chief of Naval Operations (CNO) . CNO's Intelligence Officer is the Direc- tor of Naval Intelligence (DNI) , and his intelli- gence section is the Office of Naval Intelligence (ONI) . Office of Naval Intelligence (ONI) Under the Director and Assistant Director of Naval Intelligence, ONI (0P-32) is divided into three branches which carry out the various objec- tives necessary for the accomplishment of the gen- eral mission of Naval Intelligence. Each branch of ONI is subdivided into sections, which are fur- ther divided into units and desks. Figure 6 indi- cates the current ONI organization. As the counterintelligence arm of the Navy, the Security Branch (OP 321) is charged with the safeguarding and security of naval information, personnel, equipment, and naval installations. Its five sections are: Investigations; Sabotage, Es- pionage and Counter-Subversion (SEC) ; Secu- rity Control; Commerce and Travel; and Censorship. Of particular interest are the Investigations Section and the SEC Section. The Investigations Section conducts investigations as required to pro- 81 tect the Naval Establishment against espionage, sabotage, subversion and unauthorized disclosure of classified information. It also conducts other types of investigations upon request by competent authority?for example, investigations of appli- cants for naval employment. The SEC Section functions as a research and evaluation unit, co- ordinating and disseminating intelligence relating to sabotage, espionage, and counter-subversion. These two sections work as a team. The SEC Sec- tion keeps track of the danger spots; its work is primarily a desk job. The Investigations Section acts as the hands and feet of the SEC Section. The Intelligence Branch (OP 322) is responsible for strategic and operational intelligence, specifi- cally including air intelligence, and for the coordi- nation of naval intelligence activities on foreign posts. It is required to collect and process infor- mation, and to disseminate intelligence produced or received; to maintain liaison with other Federal intelligence agencies; and to direct and coordinate the preparation of intelligence directives, plans, and manuals. Its five sections are Estimates, Collection and Dissemination, Foreign, Operational, and Air. The Collection and Dissemination Section main- tains official intelligence liaison with the Army, Air Force, State Department, and the Central In- telligence Agency. This Section also discharges the responsibility of the Intelligence Branch for the collection of information by Naval Intelli- gence foreign posts. One of its subsections main- tains the CNO Chart Room; another provides maps, charts, photographs, and related material for intelligence purposes. The Foreign Section is responsible for supplying intelligence on foreign powers to the policy, planning, operational, and logistics agencies of the Navy. The Operational Section insures that timely intelligence, both basic and current, is disseminated within ONI and to the operating forces. The Air Section provides intelligence on foreign air power and coordinates the naval aspects of the joint air production intel- ligence activities of ONI and the Air Force. The Administrative Branch (OP 323) super- vises all management activities within and for ONI. Its five sections are: Field Activities, Gen- eral Services, Personnel, Fiscal, and Training. General services include such matters as: publica- CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Co OFFICE OF NAVAL INTELLIGENCE DIRECTOR OF NAVAL INTELLIGENCE ASSISTANT DIRECTOR OF NAVAL INTELLIGENCE POLICY AND PLANS I COORoINATION FOREIGN LIAISON HEAD OF SECURITY BRANCH ADMINISTRATIVE ASSISTANT HEAD OF INTELLIGENCE BRANCH ASSISTANT TO BRANCH HEAD SECURITY POLICY HEAD OF ADMINISTRATIVE BRANCH 1 ASSISTANT TO BRANCH HEAD FOREIGN SECT! ON COLLECTION & DISSEMINATION SECTI ON CENSORSHI P SECTI ON INVESTI GATI OHS SECTI ON SEC SECTION ____L____ (OMIERCE & TRAVEL SECT! ON ESTIMATES SECTI ON AIR SECTION OPERATIONAL iNTELLIGENCE " SECTION SECUR I TY CONTROL SECTION ASSISTANT TO BRANCH HEAD FIELD ACTIVITIES SECTION GENERAL SERVICES SECTION Figure 6.?Organization chart?Office of Naval Intelligence, PERSONNEL SECTION FISCAL SECTION TRAINING SECTION INTELLIGENCE FOR NAVAL OFFICERS Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL tions, editorial review, reproduction, mail, files, and translation. The Personnel Section is re- sponsible for the Naval Intelligence Reserve Program. Included within ONI are also offices responsible for Plans and Policies, Foreign Liaison, and Sec- retariat. The Plans and Policies office prepares and coordinates Naval Intelligence plans. The Foreign Liaison office maintains official liaison be- tween? ONI and foreign attaches, missions, and distinguished visitors. It also advises United States Naval officers in matters of protocol. The Secretariat reviews correspondence, reports and messages and otherwise relieves DNI of admin- istrative details. Intelligence Foreign Posts (Attaches, Observers and Liaison Officers) Naval Attaches and their staffs who reside abroad are officially a part of ONI and thus under the cognizance of DNI. At the same time, at- taches and assistant attaches have diplomatic status and report for duty to the ambassador or minister who is the chief of the diplomatic mis- sion to which they are assigned. Naval Attaches are in command of naval attache offices whose size is determined by ONI in accord- ance with the importance of the area controlled by the governments to which the attaches are accredited. The primary function of Naval In- telligence officers stationed abroad is to collect information in accordance with the official delimi- tation of topical material between the Navy, Army, Air Force, and State Department, and to forward it, after preliminary evaluation, to the Collection and Dissemination Section of ONI. Foreign Posts are supported by the Intelligence Branch. Naval District and River Command Intelligence Organizations General Order No. 19 states in part: ". . . The Commandant shall maintain within the district an efficient intelligence service, including such in- telligence matters as affect the security of naval activities within the district, and such operational intelligence matters as are required by the com- mander of the sea frontier in which the district is located . . ." Accordingly, in each District and River com- mand, a District Intelligence Officer (DIO) serves on the staff of the Commandant, just as DNI serves on the staff of CNO. In certain designated dis- tricts, the DIO has additional duty on the staff of the Sea Frontier Commander. The District Intelligence Office under the DIO is thus the Intelligence Section of the commandant's staff. While each District Intelligence Office is under the military command of the Commandant, its activities are coordinated by ONI which provides administrative support. Each District Intelli- gence Office is organized in a manner similar to ONI although its primary mission is in the field of counterintelligence. Just as the Intelligence Branch of ONI supports naval attaches and other naval intelligence officers on foreign duty, the Security Branch supports the DIOs and their or- ganizations. The relationships and responsibili- ties of the DIO to DNI and to the Commandant are comparable to those of the naval attache to DNI and to the Chief of Mission. The District Intelligence organization consists of a headquarters office, zone and subordinate of- fices as required, and intelligence units at naval stations and other naval activities as designated by the Commandant. The personnel of zone and subordinate offices are directly under the DIO. Intelligence officers assigned to naval stations and other naval activities are members of the staffs of those commands. Under the technical guidance of the DI0s, the various naval districts and river commands con- duct specialized intelligence training programs for officers of the Naval Intelligence Reserve. Intelligence Sections and Units of the Operating Forces, Including Outlying Bases In the fleet, as in the district and river com- mands, the basic pattern of the intelligence or- ganization is that of the staff section. On the staff of each area, fleet, type, and task force commander, and on the staffs of all flag officers exercising com- mand, there is an intelligence section headed by a flag Intelligence Officer. Sections 0504 (4) and 0506 (1), Navy Regula- tions, 1948, provide, respectively, that a com- mander in Chief, or commander of any other or- ganization or unit of the Operating Forces shall "maintain an effective intelligence organization and keep himself informed of the political and 83 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS military aspects of the national and international situation" and shall "keep his immediate superior appropriately informed of . . . intelligence infor- mation which may be of value." These two articles make each commander re- sponsible for the collection, processing, and dis- semination of intelligence within his own com- mand, and the dissemination of intelligence to higher echelons. Because of the complexity of present-day naval operations, and the consequent need for a steady and voluminous flow of intelli- gence, a commander must rely on his staff to carry out most of his intelligence responsibilities. Wartime intelligence organization in the oper- ating forces was by no means uniform. This di- versity was due in part to the relative independ- ence of the various commands, and in part to their widely differing needs. Late in World War II, considerable progress was made toward uniform- ity. Nevertheless, the exigencies of any future war are likely to result in intelligence organiza- tions quite different from those of peacetime, since each commander must bear the responsibility for organizing his intelligence section to meet his par- ticular needs. But no future development will alter the responsibility incumbent upon intelli- gence officers with the operating forces--as upon all members of Naval Intelligence?to see that all intelligence received or produced flows upward to the higher echelons where it can be properly evalu- ated and disseminated and so, ultimately, reaches the Office of Naval Intelligence. For background purposes, the organization of fleet intelligence during World War II need be only summarized. In general, the area command- ers were served by large intelligence centers, which later set up offices in forward sectors for more rapid collection and dissemination. These intelli- gence centers proved their usefulness, and counter- parts of them are likely to be established in any future war. They were intelligence agencies, usu- ally large, which served the commander and all subordinate units of his command, but were sep- arate from the relatively small intelligence section of the staff itself. So far as practicable, they were joint activities of the Navy and the other armed forces. Their normal work included photog- raphy, photo-interpretation, hydrography, car- tography, target and flak analysis, interrogation CONFIDENTIAL 84 and translation. On the lower echelons of the area command, an intelligence officer?sometimes with one or more assistants?was assigned to each flag afloat, including fleet air wings. Intelligence officers were also assigned to battleships, cruisers, destroyer and motor torpedo boat squadrons, all major amphibious units and all carriers, air groups and air squadrons. Since World War II, ONI and the Bureau of Naval Personnel have had the objective of plac- ing trained intelligence officers in all echelons of command. In practice, however, on many staffs, no trained intelligence officer is available, and a staff officer is given additional duty in intelligence. Shipboard intelligence organizations also have suffered from a lack of personnel. Article 0916, Navy Regulations, 1948, provides that the opera- tions officer of a ship, under the commanding offi- cer, shall be responsible for the collection and analysis of intelligence information. Accord- ingly an intelligence officer, when available, is as- signed to the operations department of every capital ship and of other ships as conditions warrant. The primary responsibility of intelligence offi- cers assigned to the operating forces is to meet the intelligence requirements of their immediate commander. However, they have an added re- sponsibility, through their commander to ONI, in collecting information for not only their im- mediate command but also the Naval Establish- ment as a whole. Intelligence Sections and units of the operating forces are supported by the In- telligence Branch of ONI. Joint and Combined Intelligence and Liaison Activities During World War II the scope and diversity of the fighting required an unprecedented degree of joint and combined activity and hence joint and combined intelligence. United States naval intelligence officers served as observers with the British Fleet. British personnel were attached to American armed forces. Amphibious opera- tions in both the Pacific and the European theaters were planned and supervised jointly by sea, ground, and air specialists. Naval Intelligence participated in joint intelli- gence activities on all echelons during World War Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ApprovecLfor Re Lease. ZQQ3(12/09 : CIA-RDP85G00105R000100210002.9 u.N.r.reo h.vrATEb outinivizATIONS FOR NATIONAL SECURITY uuNFIDENTIAL II, from the Joint Intelligence Committee, the in- telligence agency of the Joint Chiefs of Staff, down to small field units engaged in such tasks as the exploitation of captured documents and the interrogation of prisoners of war. Less than a dozen of these joint intelligence activities sur- vived the peace. Several trends initiated in wartime have con- tinued in the postwar period?namely, the trends toward joint and combined scientific research and development, joint and combined intelligence pro- duction, and joint and combined staff training. All commanders of naval operating forces are authorized and directed, subject to the prior ap- proval of DNI, to conduct or participate in joint intelligence activities which they believe are re- quired for successful execution of their missions. Among the assignments open to naval intelligence officers are participation in the work of the Joint Staff, under the Joint Chiefs of Staff, and duty in the Central Intelligence Agency. MARINE CORPS INTELLIGENCE While the United States Marine Corps draws its intelligence information from the Navy, it pat- terns its Intelligence organization after the Army. The Commandant of the Marine Corps has a staff Intelligence Officer (G-2) and a headquarters in- telligence section which produces intelligence of interest to the Corps on such subjects as foreign coasts, landing beaches, and associated subjects. Most strategic intelligence is obtained directly from ONI. During joint operations the Marine Corps also obtains intelligence from the Army. Intelligence Officers are assigned to all Marine operating units of battalion level and higher. The size of the intelligence section varies with the size and needs of the unit. For example, a battalion has but one intelligence officer, while a division may have five officers in its intelligence section. Marine intelligence officers are also assigned to duty in ONI, in Naval Attache billets, on naval operating staffs and with the Central Intelligence Agency. ARMY INTELLIGENCE The Army intelligence organization is officially called the "Office of the Assistant Chief of Staff, 85 0-2, Intelligence, General Staff, United States Army." The Assistant Chief of Staff, G-2, is a member of the General Staff, United States Army, and is coequal with the heads of the other General Staff divisions. He is thus an echelon higher than his naval counterpart, the Director of Naval In- telligence, but his responsibilities are substantially the same. As shown in figure 7, there are five operating di- visions in the Army's 0-2 organization: Adminis- trative, Collection and Dissemination, Production, Security, and Training. Each consists of several branches. The Administrative Division contains the following Branches: Attache, Fiscal, Message Center (communications), Personnel, and Service (including records and translation). The Collec- tion and Dissemination Division operates the War Room, is responsible for intelligence requirements and publications, and maintains the 0-2 Docu- ment Library. The Production Division is com- posed of the Estimates Branch, three geographic branches?Eastern, Western, and Eurasian?the Technical and Special Research Branches, Area Resources Branch, and the Air Intelligence Com- ponent which works with the Air Force. In the Security Division are the three branches respon- sible for censorship, personnel security, and the security of military information. The Training Division is concerned with regular and reserve in- telligence training, and also operates the Map and Photo Branch. The Army Security Agency (ASA) and the Counter-Intelligence Corps (CIC) are specialized organizations of importance. ASA is responsible for communications intelligence and security. CIC is the counterintelligence agency of the Army; it makes all investigations for which the Army is responsible under the Delimitation Agree- ment, and also investigates compromises of mili- tary information and cases involving foreign na- tionals both in the United States and abroad. Each of these agencies takes care of its own ad- ministration, including the procurement, training and assignment of personnel, and the development of equipment and doctrine. Their work, however, comes within the purview of G-2, and close liaison and coordination is maintained. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 6-Z0001Z001?000t1901.00998dCIU-VIO : 60/ZI./COOZ eseeleu Jod peAwddv STRATEGIC INTELLIGENCE SCHOOL ASSISTANT CHIEF OF STAFF, G-2 DEPUTY for Intelligence DEPUTY for Operations EXECUTIVE SPECIAL ASSISTANT LIAISON OFFICERS (Army Security Agency) (Counter Intel. Corps) MANAGEMENT OFFICE FOREIGN LIAISON OFFICE POLICY AND COORDINATING OFFICE PRODUCTION DIVISION Branches: Eastern Estimates Eurasian Western Technical Special Research Area Resources AFOIN component ADMINISTRATIVE DIVISION Branches: Attache Fiscal Message Center Personnel Service COLLECTION & DISSEMINATION Branches: Requirements Operations Plans & Research Document Library Publications SECURITY DIVISION Branches: Censorship Personnel Security S. M. I. TRAINING DIVISION Branches: Organisation & Training' Reserve Components Map & Photo Figure 7.?Organization Chart?Office of the Assistant Chief of Staff, G-2, Intelligence, General Staff, U. S. Army. APPr?v&M21; M??ReoiRAN 0 30200N il[A) oslocnosroyo 1 00210002-9 CONFIDENTIAL AIR FORCE INTELLIGENCE The Directorate of Intelligence under the Dep- uty Chief of Staff for Operations, Headquarters, USAF, is usually abbreviated "D/I" and desig- nated AFOIN?literally Air Force Operations /Ntelligence?a term corresponding to "Op 32" in the Navy. In command structure, the Air Force follows the Navy, rather than the Army, in making Intelligence subordinate to Operations. This Air Force organization deserves special com- ment for several reasons. It differs from ONI and 0-2 in that it has no responsibility for counter- intelligence; it formulates no policy for safeguard- ing military information; and it specifically pro- duces intelligence for the other military services. The Navy and the Army provide approximately one-third of the personnel in the intelligence pro- ducing divisions of the Directorate in return for processed air intelligence for the Army, Navy, and Marine air arms. Figure 8 indicates that Air Force Intelligence is headed by a Director of Intelligence assisted by three Deputy Directors: for Collection and Dissemination, Estimates, and Targets. The Di- rector also administers the Air Technical Intelli- gence Center. The Director's responsibilities include collect- ing information on the air potential and air forces of foreign countries; producing intelligence from this information; and disseminating this material not only within the Air Force, but also to the Joint Chiefs of Staff, the Central Intelligence Agency, and other departments and agencies as appropriate. He directs and controls all USAF intelligence activities, including the Air Attache system. He sets up the air intelligence require- ments for USAF photo reconnaissance, mapping and charting and geodetic surveying programs. He is further responsible for meeting the intelli- gence requirements of the continental and over- seas air commands, and the air administrative and technical services. The Director also repre- sents the Air Force on intelligence matters with other departments and agencies of the United States Government and with foreign governments. The Office of the Director of Special Investiga- tions, an agency under the USAF Inspector Gen- eral, is the counterintelligence agency of the Air Force. It is responsible for safeguarding military 87 information, and for investigating all cases of espionage, sabotage, treason, subversion, etc., within the Air Force. FEDERAL BUREAU OF INVESTIGATION (FBI) The FBI is the chief internal security agency of the Federal Government. It is now responsible for investigating violations of more than 100 Fed- eral laws. Under some of these laws, such as the Atomic Energy Act and the Federal Em- ployees Loyalty Program, specific responsibility has been given to the FBI by the law itself or by Presidential Directive. Under others, the FBI exercises its general investigative functions in all cases where the United States is or may become a party in interest. The FBI also promotes scien- tific crime detection by means of its laboratory, its fingerprint files, and the FBI National Acad- emy for law-enforcement officers. The FBI is organized in seven Divisions: (1) Identification; (2) Training and Inspection; (3) Administration; (4) Records and Communica- tions; (5) General Investigations; (6) Labora- tory; and (7) Security. The latter division is of primary interest to Naval Intelligence because of mutual counterintelligence responsibilities. THE DELIMITATION AGREEMENT The Delimitation Agreement originated in a Presidential directive of 26 June 1939, which pro- vided that investigations of all matters concerning espionage, counterespionage, subversion, and sab- otage (the "four categories") should be conducted and controlled emclusively by Naval Intelligence, Military Intelligence, and the FBI. The heads of these three agencies were directed to form a committee to pool information and coordinate ac- tivities. This became the Interdepartmental In- telligence Conference (IIC), which worked out the Delimitation Agreement, prescribing the juris- diction and investigative duties of each of the three agencies. Under the original Agreement, the Navy assumed responsibility for the investi- gation and disposal of cases in the "four cate- gories" involving (a) personnel of the Naval Establishment, including civilians employed by the Navy, and (b) personnel in areas under its administrative control: Guam, Samoa, Palmyra, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 1V11N3OHNO0 DIRECTOR OF INTELLIGENCE AIR TECHNICAL INTELLIGENCE CENTER (Wright-Patterson AFB, Ohio) Policy & Management Group jDEPUTY DIRECTOR for COLLECTION & DISSEMINATION Policy & Mgmt Group COLLECTION OPERATIONS DIVISION Branches: Collection Control Reconnaissance Supplemental Research Air Attache DISSEMINATION CONTROL DIVISION Branches: Processing Dissemination Documents Foreign Liaison DEPUTY DIRECTOR for ESTIMATES Policy & Mgmt Group TOPICAL INTELLIGENCE DIVISION Branches: Indications Current Intelligence Intel. Exploitation Air Intel. Digest INTEL INTEGRATION DIVISION Branches: Analysis & Review Military Services National Estimates Survey Planning Estimates MILITARY CAPABILITIES DIVISION, WEST Branches: Analysis & Review Western Establishments Western Air Facilities Western Support MILITARY CAPABILITIES DIVISION, EAST Branches: Analysis & Review Eastern Establishments Eastern Air Facilities Eastern Support Weapons Analysis (World Wide) DEPUTY DIRECTOR for TARGETS Policy & Mgmt Group Special Studies Group TARGET ANALYSIS DIV. Branches: Military Vulnerability Industrial Vulnerability General Vulnerability PHYSICAL VULNERABILITY DIVISION Branches: Weapons Application Weapons Effects Mathematical Analysis TARGET MATERIALS DIV. Branches: Production Target Integration Radar Target Intel. Figure 8.?Organization Chart?Directorate of Intelligence, Deputy Chief of Staff for Operations, Headquarters, USAF Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL Johnson, Wake, and Midway. In Japan, the Navy and FBI had joint responsibility. After the War, changes in the Delimitation Agreement were necessitated by the Atomic En- ergy Act of 1946, which provided that everyone authorized to have access to "restricted" atomic data should have been investigated by the FBI. Some of the people for whom such authorization was desired wore Army or Navy uniforms. Ac- cordingly, the FBI was required to conduct in- vestigations of all Armed Forces personnel for "Q clearances" for access to "restricted" atomic data. However, as a result of the Agreement of February 1951, Armed Forces personnel are now given access to "restricted" atomic data on the strength of their military security clearances, ex- cept in cases involving contractors with the Atomic Energy Commission or their employees. The Delimitation Agreement was also affected by the Federal Employees Loyalty Program (Ex- ecutive Order 9835 of March 21,1947). Although this applied mainly to civilian employees in the Executive Branch of the Government, it directed the Armed Forces to take such steps as necessary to ensure the loyalty of their own personnel. It also directed the FBI to make all investigations. Accordingly, the Navy is no longer responsible for investigations in the "four categories" of civilians whom it employs or over whom it has administra- tive control. Nevertheless, in areas under Naval Administrative control, the Navy in practice still does the job for the FBI, and also investigates all cases involving personnel of the Military Sea Transportation Service. For purposes of the De- limitation Agreement, Reserve personnel on in- active duty are civilians. To sum up, in the "four categories", the Navy now restricted to investigations involving ac- duty and retired naval and marine personnel, the exceptions stated above. However, its Iction to make general security investigations the "four categories" is not restricted either 3 Delimitation Agreement or any other regu- 17 document; and it still makes many investi- ions involving civilians, for example, in cases Involving its own employees, applicants for naval employment, and employees of naval contractors. By provision of the National Security Act of 1947, the Director of Special Investigations, 269196-54----7 USAF, joined the Director, FBI, the Assistant Chief of Staff, G-2, and the Director of Naval Intelligence on the Interdepartmental Intelligence Conference. Thus the Air Force is governed by and participates in the provisions of the Delimita- tion Agreement. STATE DEPARTMENT INTELLIGENCE The Special Assistant to the Secretary of State, Intelligence, has the rank of Assistant Secretary of State. His office provides the departmental intelligence of the State Department. In the field of national intelligence, it is primarily, though not exclusively, responsible for political, cultural, and sociological matters, by NSC directive. In practice, it has also produced most economic in- telligence and considerable scientific intelligence. It has a special responsibility for coordinating overt intelligence activities abroad, since, by NSC directive, the Chiefs of Mission are the coordina- tors of such activities. As shown in figure 9, the State Department Office of Intelligence has two major suboffices, each of which has a number of divisions. The Office of Intelligence Research (OIR) plans and de- velops an intelligence research program along regional and functional lines, and coordinates it with that of other Federal agencies. In this manner the Department is provided with the in- telligence necessary for the formulation and exe- cution of foreign policy. On the other hand, information pertinent to national security is fur- nished to the Security Council, the Central Intel- ligence Agency, and the Department of Defense. In addition to carrying on intelligence research, OIR prepares or participates in the preparation of studies and spot intelligence for authorized recipients in the Department and other Federal agencies. It continuously scrutinizes world situa- tions and deals with intelligence problems sub- mitted to it by the Secretary, Under Secretary, Planning Adviser, and other State Department officials, as well as the Central Intelligence Agency and the Department of Defense. It directs De- partment of State participation in the National Intelligence Survey basic research program and works in close cooperation with the Central In- telligence Agency and other governmental agen- 89 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS OFFICE OF SPECIAL ASSISTANT ? INTELLIGENCE r-- ISPECIAL PROJECTS STAFF EXECUTIVE STAFF OFFICE OF LIBRARIES & INTELLIGENCE ACQUISITION (OLI) DIRECTOR ACQUISITION & DISTRIBUTION BIOGRAPHIC INFORMATION LIBRARY & REFERENCE SERVICES OFFICE OF INTELLIGENCE RESEARCH (01R) DIRECTOR FAR EAST HWESTERN EUROPE HNEAR EAST, SOUTH ASIA & AFRICA USSR 8, EASTERN EUROPE AMERICAN REPUBLICS FUNCTIONAL INTELLIGENCE Figure 9,?Organization Chart?Office of Intelligence, Department of State. cies engaged in the production of National Intelligence Survey materials. The Office of Libraries and Intelligence Ac- quisition (OLI) has a collection responsibility and also maintains a library program for the Depart- ment, which includes policy guidance and assist- ance to the libraries of the Foreign Service establishments overseas. It collects and evaluates biographic information on foreign individuals, involving the preparation of analytical biographic studies as well as the maintenance of the Depart- ment's central collection of biographic and sem- rity information of foreign persons, It collects, processes, and evaluates security intelligence per- taining to foreigners and organizations abroad. The security program of the State Department and the Foreign Service is supervised by the Office of Security and Consular Affairs, in large part through the Division of Security. The functions of this Division include development of security policy for the Department and the Foreign Service CONFIDENTIAL 90 and provision for their personnel and physical security by: (1) conducting investigations of ap- plicants for employment in the Department and Foreign Service; (2) directing those investiga- tions requiring coverage overseas in connection with the President's Loyalty Program; (3) evalu- ating investigative reports and making recom- mendations to the Loyalty and Security Board in appropriate cases; (4) establishing and supervi' ing control measures for documentary, commr cations, and building security for the Depart, in Washington; (5) directing, through appi ate channels, the security program in Service establishments. Further, it furnishes additional investigt. services for the Department with respect to: passport, visa, munitions control, and other cases, (2) individuals, organizations, situations, trends, and developments constituting a threat to the security of the United States; (3) other matters, as requested. Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY The Security Division also provides security protection for official guests of the United States Government and other distinguished visitors, and for international conferences in the United States. It maintains official liaison with the Federal Bureau of Investigation, the Treasury Depart- ment, the Post Office Department, and other do- mestic security and law enforcement agencies. It cooperates with Department of Justice on ques- tions of policy in connection with the Foreign Agents Registration Act. No foreigner can get a visa for entry into the United States unless he has been cleared through the Visa Division. Such clearance is effected or denied on the basis of information gathered by the Department and other governmental intelligence agencies with which it maintains close liaison. ATOMIC ENERGY COMMISSION INTELLIGENCE Because of the importance of intelligence con- cerning the military applications of nuclear power, the Atomic Energy Commission (AEC) has an Office of Intelligence and a Division of Security. The Atomic Energy Act of 1946 first provided four divisions, Research, Production, Engineer- ing, and Military Applications, to aid the General Manager in carrying out his duties. Other divi- sions were needed, and in 1948 a Division of Security and Intelligence was created. Shortly thereafter, this division became the Division of Security when a separate Office of Intelligence was formed with a Director. The Office of Intelligence has no collection function, but it may request information from other agencies. When information of atomic and thermonuclear interest is received by any govern- ment agency (including the non-intelligence agen- cies such as Commerce), it is forwarded to the AEC where a group of highly trained scientists in the Office of Intelligence evaluates the incoming information. The Director of Intelligence may also call upon the leading scientists in the country for consultation on the proper evaluation of in- formation received. The resultant intelligence is disseminated to the President, the National Se- curity Council, the Department of Defense, CIA, and others as appropriate. This evaluation is AEC's important contribution to intelligence. 91 CONFIDENTIAL A great and continuing concern of the Atomic Energy Commission is the safeguarding of our atomic program from espionage, sabotage, theft, and destruction. This counterintelligence func- tion is taken care of by the Division of Security. In Washington, on the General Manager's staff, the Division of Security has four sections: Physi- cal Security, Personnel Security, Document Con- trol, Violations and Visitor Control. The functions of each section are essentially what the names imply. The Division also supervises field security offices at nine installations in the United States. Internal security investigations are ini- tiated by these offices, but if it appears that a regulation of the Atomic Energy Act has been violated, it becomes a case for the FBI. INTERDEPARTMENTAL INTELLIGENCE AGENCIES There are many areas of activity and interest where the intelligence requirements of two or more government agencies or departments coin- cide; therefore, in the interests of efficiency and the coordination of effort interdepartmental in- telligence agencies are established. If all the par- ticipating departments are military, the agency is called "joint." Intelligence Organization for the Joint Chiefs of Staff The Joint Intelligence Committee (JIC) , to- gether with its full-time staff, the Joint Intelli- gence Group (JIG) , is the intelligence agency of the Joint Chiefs of Staff. As such, it is the high- est-level intelligence agency within the Depart- ment of Defense. Its members are: the Assistant Chief of Staff, G-2, General Staff, U. S. Army; the Director of Naval Intelligence; the Director of Intelligence, USAF; and the Deputy Director of the Joint Staff for Intelligence. In short, the Joint Intelligence Committee is composed of the intelligence chiefs of all the armed forces, plus a fourth member who directs the Joint Intelligence Group. The JIC is charged with: (a) the preparation of joint intelligence estimates for the Joint Chiefs of Staff and their subordinate committees; (b) the coordination of photographic, mapping, and charting activities of the Department of Defense; and (c) security matters within JCS jurisdiction. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Since the three departmental committee mem- bers devote only a part of their time to JIC mat- ters, a full-time working staff is required to prepare joint estimates, reports, plans and policies for Committee approval. This staff is the Joint Intelligence Group of the Joint Staff. The JIC/JIG differs from other intelligence organizations relating to the national security in that it is neither a collecting nor a disseminating agency. It does not duplicate the work of the departmental agencies or the CIA, but merely uses the intelligence material of those agencies to meet the intelligence requirements of the JCS and their supporting committees and groups. Interdepartmental Coordinating Committees Where the intelligence requirements of two or more departments coincide, the necessary collec- tion and production operations are brought into common action by special-purpose committees. There are a number of such coordinating commit- tees, the most important being the Interdepart- mental Intelligence Conference (TIC), discussed in connection with the FBI, the Intelligence Ad- visory Committee (IAC), which serves to coordi- nate the Central Intelligence Agency (CIA) with the other Federal intelligence agencies concerned with the national security, and the National In- telligence Survey (NIS) Committee. The IAC is composed of the intelligence directors of the Justice Department (FBI) ,the State Department, the Atomic Energy Commission, the Army, the Navy, the Air Force and the Joint Staff, in addi- tion to the Director of Central Intelligence, who acts as chairman. During World War II, the main source of basic intelligence for the armed forces was a series of handbooks known as Joint Army-Navy Intelli- gence Studies (JANIS). The deficiencies of the JANIS series emphasized the fact that basic in- telligence must be produced on a much broader scale, over a longer period, and, as far as possible, in time of peace. Therefore, on 13 January 1948, the NIS program was initiated. The NIS Program represents the combined in- telligence efforts of the CIA, the Army, the Navy, the Air Force, and the State Department. It is supervised by the NIS Committee, which consists of representatives of all the contributing agencies, CONFIDENTIAL 92 and is coordinated by the CIA. Its purpose is to produce a concise digest of basic intelligence, such as, encyclopedic knowledge of the geographic, eco- nomic, socio-political and military characteristics of every foreign country. CENTRAL INTELLIGENCE AGENCY During World War II, intelligence-coordinat- ing agencies including the Office of -War Infor- mation (0W1) and the Office of Strategic Serv- ices (OSS) were created by Presidential directive and a Joint Intelligence C ommittee (JIC) was es- tablished under the Joint Chiefs of Staff. The JIC soon recognized the need for, and proposed, a national agency to coordinate intelligence produced by the various Departments. Its pro- posal resulted in the Presidential letter of 22 Jan- uary 1946, which created the National Intelligence Authority, and the Central Intelligence Group as its operating agency. The Authority was di- rected to plan, develop, and coordinate all Federal intelligence activities "so as to assure the most effective accomplishment of the intelligence mis- sion related to the national security." The National Security Act of 1947 established the National Security Council (NSC) which took the place of the National Intelligence Authority, specifically abolished by the act. The Central In- telligence Agency (CIA) was established under the Council as the statutory successor of the Cen- tral Intelligence Group. The Director of CIA The Act specifically provides for a Director of Central Intelligence, appointed by the President with the advice and consent of the Senate. The Director may be either a civilian or an officer of one of the armed forces. In the latter event, the Act provides the safeguard that, during his tenure, the Director shall be subject to no greater military control than would any civilian; nor shall he have or exercise any control, other than as Director, over any component of the armed forces. Service as Director is to have no effect, except as described above, on the status, office or rank in the Armed Forces of any military man so appointed. One of the most important provisions of the Act gives the Director the right in his discretion to "terminate the employment of any officer or em- Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL ployee of the Agency whenever he shall deem such termination necessary or advisable in the interests of the United States." This provision frees the director from civil service restrictions. In an in- telligence agency, where security is paramount, freedom in dismissing employees is an obvious necessity. The duties of the CIA are set forth in section 102 of the Act, as follows: (1) to advise the National Security Coun- cil in matters concerning such intelligence activities of the Government departments and agencies as relate to the national security; (2) to make recommendations to the Na- tional Security Council for the coordination of such intelligence activities of the depart- ments and agencies of the Government as re- late to the national security; (3) to correlate and evaluate intelligence relating to the national security, and provide for the appropriate dissemination of such in- formation within the Government using where appropriate existing agencies and fa- cilities: Provided, That the _Agency shall have no police, subpoena, law-enforcement powers, or internal security functions: Provided fur- ther, That the departments and other agencies of the Government shall continue to collect, evaluate, correlate, and disseminate depart- mental intelligence: And provided further, That the Director of Central Intelligence shall be responsible for protecting intelligence sources and methods from unauthorized- dis- closure; (4) to perform, for the benefit of the exist- ing intelligence agencies, such additional services of common concern as the National Security Council determines can be more effi- ciently accomplished centrally; (5) to perform such other functions and duties related to intelligence affecting the na- tional security as the National Security Coun- cil may from time to time direct. The first paragraph of Section 102 directs and authorizes the CIA to serve as intelligence ad- viser to the NSC on all matters relating to the national security. The second paragraph requires the CIA to make recommendations to the NSC for coordinating such intelligence activities of the Government as relate to the national security. In performing its duties under this paragraph the CIA has the coun- sel of the Intelligence Advisory Committee de- scribed in the preceding section. Through the IAC, the CIA is able to maintain close contact with all the departmental intelligence agencies concerned with the national security; it can bene- fit from their knowledge, experience and judg- ment, and keep itself informed of their intelli- gence requirements. Their views can serve as the basis for recommendations made by the CIA to the NSC. In particular, the IAC can help the CIA determine the primary fields of intelligence responsibility of the various departments and agencies. Thus it can help in promoting efficiency by the elimination of duplicate missions, func- tions, and services. The third paragraph of Section 102 provides for the correlation and evaluation of intelligence re- lating to the national security. This task involves the production of national intelligence. Just as the NSC integrates national policies that could not be integrated by either the State or the De- fense Department alone, so the CIA draws upon the intelligence produced by the various depart- ments, supplements it, and integrates it into a product which is suitable in content and form for national planning. However, the CIA does not interfere with the production of departmental in- telligence. Each department must still evaluate, correlate, and interpret that intelligence which is within its own exclusive competence and is needed for its own use. The CIA is further charged with the dissemi- nation of national intelligence within the Gov- ernment. Because of this responsibility, CIA must at all times know the intelligence require- ments of the various Government departments and agencies. This function of disseminating na- tional intelligence to the departments that need it is clearly essential. Owing to the volume and complexity of intelligence information available, it should be a centralized function; and the proper place for centralizing it is the focal point where all the streams of incoming intelligence converge. Thus the Act gives the CIA two major functions of intelligence?production and dissemination. It makes no explicit provision for the third major function?collection. Nevertheless, the duties of the CIA under the second paragraph of Section 102, with respect to the coordination of depart- mental intelligence activities, entail the coordina- tion of foreign intelligence collection. As to col- 93 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS lection, then, the role of the CIA is at least to pre- vent gaps, cross-purposes, and wasteful duplica- tion among the various departments and agencies. On the one hand, to give a fictitious example, some department or agency should collect economic in- telligence information. On the other hand, the Air Force should not concern itself with the col- lection of detailed sociological information about Java. The fourth paragraph of this Section gives the CIA a further warrant for foreign intelligence collection by authorizing it to perform "such addi- tional services of common concern as the National Security Council determines can be more efficiently accomplished centrally." In eliminating waste- ful duplication of collection functions, therefore, the CIA can use either of two methods. It can discontinue the overlapping collection efforts of all but one of the departments, and arrange for that one to serve all the others. In doing so, it would merely be coordinating. Or, instead, it may supplant the collection efforts of all the depart- ments with its own collection effort, and perform the collection function itself as a service of com- mon concern to the existing intelligence agencies. Which, if either, method is used in any given case is of course determined by the NSO. To sum up, then, the National Security Act rec- ognized the need for departmental intelligence, and in fact specifically provided for its continu- ance; at the same time, the Act recognized the need for the coordination of departmental intelligence, and for the production and dissemination of na- tional intelligence, and created the CIA to per- form these functions; and, finally, the Act pro- vided that certain unspecified intelligence func- tions should be centralized in the interests of efficiency. OTHER UNITED STATES AGENCIES PRODUCING INTELLIGENCE Although it is not possible to trace in detail the organizations of all agencies of government that collect information and process it into intelli- gence, it is most important for the naval officer engaged in intelligence work to realize that his sources are not limited to the national security agencies alone. With proper liaison he will dis- cover that there are available vast analytical and CONFIDENTIAL 94 cataloguing resources in the federal government, and also many operating agencies with functions closely allied to security. Department of the Treasury A number of offices and bureaus within the Treasury have intelligence functions. The Office of International Finance studies foreign econ- omies, international capital movements, gold movements, and exchange controls. It can block the movement of foreign assets under United States jurisdiction. The Bureau of Customs not only collects duties on imports but is concerned with preventing smuggling, registering vessels, and stopping the export of controlled materials. The Bureau of Narcotics controls trade in nar- cotic drugs and of necessity works closely with some foreign governments. The Alcohol Tax Unit may become involved in blocking illegal al- cohol operations if of an international scope. The United States Secret Service tries to prevent counterfeiting, and provides various protective services including guarding the President and his family. The United States Coast Guard, though a part of the Department of the Navy in wartime, is nor- mally under the Treasury. It not only saves lives at sea, provides navigation aids, and sets safety standards for merchant ships, but also has major responsibility for port security and checking on the loyalty of seamen. Department of Commerce This is another department of interest to In- telligence. It contains the Bureau of Foreign and Domestic Commerce with a subordinate Office of International Trade, a major collector and proces- sor of economic and commercial intelligence from the whole world. The Federal Maritime Board has to study foreign costs of ship construction and operation, and approve any international rate agreements that involve United States steamship companies. The Civil Aeronautics Board makes many studies of world aviation developments, and works closely with the International Civil Avia- tion Organization of the United Nations. The Patent Office collects and analyzes the official jour- nals of all foreign patent offices. The Weather Bureau collects weather reports from all over the world to add to its domestic analyses. The Coast Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 UNITED STATES ORGANIZATIONS FOR NATIONAL SECURITY CONFIDENTIAL and Geodetic Survey collects data on United States territorial waters and on a number of overseas areas that are important to naval operations. The Bureau of the Census as a service agency manipu- lates data fed to it by government offices, and these include foreign trade statistics and international statistics in general. Other Agencies There are additional agencies. Some of the more obvious include: (1) the Office of Interna- tional Labor Affairs in the Department of Labor, which watches developments abroad in use and behavior of labor and labor organizations; (2) the Office of Alien Property in the Department of Justice, which keeps track of foreign assets under our jurisdiction and possible trading with the enemy; (3) the Immigration and Naturaliza- tion Service, also in the Department of Justice, which watches for violations of immigration laws and maintains border patrols; (4) the Depart- ment of Agriculture's Office of Foreign Agricul- tural Relations which has attaches abroad to collect data and makes analyses of world-wide de- velopments in agriculture; (5) the same De- partment's Bureau of Entomology and Plant Quarantine, which like the United States Public Health Service may be in the forefront of detect- ing biological warfare attacks upon the United States; (6) the Post Office Department's Bureau of the Chief Post Office Inspector, whose studies of postal law violations may turn up much informa- tion of intelligence interest; (7) the Department of Interior's Office of Territories and many special commissions and corporations which serve as sources of intelligence on our own territories; (8) the Federal Communications Commission, which tracks down clandestine radio stations and keeps 95 track of use of frequencies by transmitters both at home and abroad; (9) the Federal Reserve Board, which makes studies of international fi- nance; (10) the Tariff Commission, which studies foreign costs, protective measures, and other re- trictions ; (11) the Smithsonian Institution, which collects and studies scientific data the world over, and its subsidiary International Exchange Service which trades scientific publications with foreign countries; (12) the Library of Congress, which also has exchange and collection functions; (13) the Office of Civil Defense with its physical security functions; and (14) such quasi-official or private groups as the National Geographic Society, which can send expeditions to remote places, and prepare finished maps based upon data collected, and the Bureau of Railway Economics, which also has very wide collection and processing facilities. The above list, by no means exhaustive, indicates the variety of agencies that are in some way useful to Intelligence, although they are not intelligence agencies in the strict sense of the term. In any review of United States Organizations for National Security it must be kept in mind that, in actuality, they are not inanimate spaces on a formal chart but rather living vital composites of many individuals each of whom is daily contribut- ing his talents and energies toward the production of a total coordinated product. The best finished product is possible only when each individual con- tributor has a clear perspective of the total field of which he is a part so that his own efforts will blend effectively and harmoniously. Therefore, in order to aid the naval intelligence officer to carry out his assigned duties and responsibilities most effectively, the following chapter will be de- voted to a consideration of the proper intelligence perspective he must have. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 4 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD The iob of Intelligence is "to winnow the extraneous data from the vital facts and to set these facts In proper perspective . . ." This statement was made following World War II by Rear Admiral Roscoe H. Hillenkoetter in describing the function of intelligence to produce usable knowledge. Its key words, "proper per- spective" aptly describe the central theme of this chapter. Cause and effect, action and counter-action are woven into an unending pattern of conditions and situations which must be followed with infinite care the world over. The relentless continuity of events makes it impossible to consider them singly or outside their frame of reference. Mili- tary policies and international politics are inter- dependent and neither can be effective without the other. Similarly, the strategies of nations may begin and end within a period of war, or they may be conducted, with or without change, continuously between wars. The intelligence officer must be schooled in the field of international relations in order that he may develop a broad sense of world affairs and recognize the trends which will give the fullest meaning to emerging situations. In de- veloping this sensitivity he must keep in mind the functions of intelligence, its past influence on world events, and the purposes of the various agen- cies which it supports. In chapter lit was stated that Intelligence has three primary functions: first, to give warning of any hostile plans directed against a nation or a military force; second, to provide the knowl- edge upon which policies and plans can be based; and third, to counter the intelligence efforts of opposing nations. The very nature of military warfare maximizes the opportunity of Intelligence to predict the time and place of attack. The greater variables in time of peace, however, re- quire Intelligence to evaluate with care the par- ticular factors which may produce specific developments within certain periods of time. The importance of such evaluations was stressed by Maj. Gen. William J. Donovan when he said: 269196-54-8 97 "Government policy must be based upon a tested knowledge of the facts. What facts? The capa- bilities, the intentions, and the policies of other nations . . (Intelligence is) just the careful gathering and analysis and interpretation of many bits of evidence." The need for intelligence in time of war has been generally recognized; its importance in time of peace is still a topic of considerable argument among some political leaders and students of government. A British writer recently com- mented that, prior to World War II, intelligence seemed to have little purpose as long as the vital interests of the nation did not appear to be threat- ened. As late as August 1952, a well-known American, in describing United States intelligence organizations, remarked that they would be un- necessary if American relations with the Soviet Union were normal. This failure to understand the need for continuity in intelligence activity arises from a misconception of the terms "war" and "peace." Certainly they are not exclusive concepts. For example, it is almost impossible to pin-point the causes of wars and the exact times when each really began. Since basic national in- terests remain relatively the same, the transition from war to peace is merely a shift in emphasis on the means employed to promote those interests. Instead of military force, the means may be poli- tical, economic, psychological, or a combination of all three. Likewise for intelligence the end of a war means only a shift in major interests. Instead of the numbers and movements of troops and ships, in- terest centers on the capabilities of new weapons, the acquisition of new strategic bases, and the development of new areas of political influence. Political machinations in the world's trouble spots, exploitation of markets for manufactured goods, and the control of strategic materials become sub- jects of concern. Knowledge of these matters may CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR alter relationships and determine the attitudes of one nation toward another at international confer- ences or at meetings of the United Nations. In- telligence has the responsibility not only to acquire such positive information regarding other nations of the world, but also to perform its equally im- portant function of preventing the disclosures of vital information and countering foreign es- pionage. Consideration of the historical development in chapter 2 led to the conclusion that Intelligence has often influenced the outcome of military and political events which had world-wide repercus- sions. The intelligence officer, therefore, must be fully aware of the scope of his interests and the implications of his activities. The guerrilla war- fare carried on by Lawrence of Arabia in World War I had a strategic significance out of all pro- portion to the size, area of combat, and equipment of his modest forces. The German agent, Wass- muss, held southern Persia under his personal influence and did much to prolong the British mili- tary campaign in that area. Early in World War II, a cipher clerk in the American Embassy at London provided Germany with vital diplomatic information passing between Washington and London. When his treachery was finally discov- ered, during the dark days of Dunkirk and the fall of France, all classified communications of the American State Department had to be sus- pended until new codes were prepared and. distributed. The impact of this failure of counterintelligence was brought out at the Nurem- berg trials when various Nazi leaders stated that the information derived through the American cipher clerk influenced their decision to curtail military activity during the winter of 1939-40 while they prepared for the spring offensive against France. The use of the Italian Embassy in London for the transmittal of this information may well have influenced Italy's decision to post- pone her entry into the war for about ten months. In the preceding chapter, the purpose of the discussion was to review the various government agencies responsible for planning and formulating the foreign policies of the United States and to describe their supporting Intelligence subdivi- sions. The Office of Naval Intelligence, as one of these subdivisions, contributes significantly to CONFIDENTIAL 98 NAVAL OFFICERS the production of the total knowledge used as the basis for national policy decisions which guide relationships with other nations in times of war and peace. This knowledge is also a fundamental source of support to the military commander in the area of operations and to both military and political agencies at all levels in their efforts to oppose the intelligence activities of other nations. When used at the national planning level, this knowledge is called Strategic Intelligence; at the naval planning level, it is called Naval Strategic Intelligence, the importance of which to any na- tion depends upon the extent of that nation's sea power. At the operational level, this knowledge is termed Operational Intelligence. To be emphasized is the fact that, regardless of the level or echelon by which intelligence is used, those engaged in its activities, whether mili- tary or civilian, cannot properly perform their duties without a comprehensive understanding of the world scene, from which is derived a clearer view of relationships between events wherever and whenever they occur. As early as World. War I, Brigadier General Marlborough Churchill, then Director of Military Intelligence, made this pertinent comment The reason why we have decided to study the whole world is that we believe it to be impossible correctly to predict the points which are going to be sensitive in the future, unless we take the trouble to find out the sit- uation in all countries, and all the factors which go to make up an international situa- tion. . . . If it is remembered that the assas- sination of an Austrian Prince in 1914 started a conflagration which our Army was called upon to play a major part in extinguishing, it will be seen that MID is not doing its full duty if it does not attempt correctly to re- cord and promptly to bring to the attention of the proper authority everything that is going on in the world. He also made the observation that, prior to World War I, Regular Army officers tended to limit their interest and training to matters of specific military content. We failed to realize that it is the duty of every Army officer to follow the example set so many years ago by the Navy, and make himself not only a fighting man, but also a well-informed man of the world. Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL Important contributory elements which are the basis for a clear and proper perspective for in- telligence personnel include an understanding of basic national interests and objectives, a knowl- edge of the place and meaning of strategy and the resulting foreign policy, and an appreciation of the ultimate purposes of operational activities to implement both strategy and policy. The intelli- gence perspective cannot be static: it must be ca- pable of rapid adjustment to changing conditions and altered circumstances. It must always be positive, with a clear and unbiased view of its own purposes and responsibilities. The following dis- cussion of these elements, although by no means exhaustive, should serve to portray the perspective which all intelligence personnel must acquire if they are to perform their duties successfully. It should also serve to indicate the necessity for further reading and continuous study. NATIONAL INTERESTS AND OBJECTIVES In view of the vast amount of knowledge about the world and its peoples, guidance is essential if intelligence activities are to be economically con- centrated. Normally, specific guidance emanates from higher authority, but it is important to rec- ognize that ultimate guidance is provided by the fundamental national interests and objectives which must form the basis for national strategy and policy. Our own national interests have never been more succinctly expressed than in the words of the Dec- laration of Independence: "Life, Liberty, and the Pursuit of Happiness"; other expressions repre- sent only the means toward these ends. Over the years these fundamental interests have gradually been broadened to include the preservation of na- tional independence, freedom from war and the threat of war, improvement in standards of living so that everyone may have the opportunity to earn an even better and more secure livelihood, and the maintenance of friendly relations with all peoples of the world. From such interests come national objectives which include the protection of the American form of government and way of life at any cost from every challenge, the support of endeavors aimed at the peaceful resolution of all international prob- lems, the encouragement of a healthy world econ- omy, and the championship of nations threatened by any ruthless imperialistic aggressor. Em- bodied in these objectives are certain definite social values, such as those enunciated as the Four Free- doms by Roosevelt and Churchill. Of particular importance is the value of popular power which emphasizes the orderly process of making decisions through democratic participation. Few can find fault with these interests and ob- jectives; the problems lie in their interpretation and implementation. For many complex reasons interpretations vary between various social groups within the nation and the power of one group may permit it to dominate the expression of national objectives at a given time. Historically, the popu- lar power value when applied to foreign relations has resulted in the implementation of the objective of national security through international law and organization, a sincere effort to deter aggressive nations from their intentions by bargaining and persuasion. In his book, American Diplomacy, 1900-1950, George F. Kennan has pointed out what appear to be not only certain theoretical deficien- cies in this approach, but also the serious implica- tions of its resultant theory of "unconditional surrender": It is a curious thing . . . that the legalistic approach to world affairs, rooted as it unques- tionably is in a desire to do away with war and violence, makes violence more enduring, more terrible, and more destructive to politi- cal stability than did the older motives of national interest. A war fought in the name of high moral principle finds no early end short of some form of total domination. If our national objectives as they relate to the rest of the world imply a defense of free countries of the world so that they may remain free, there is the added implication of an ability to wage war when necessary. However, atomic warfare of the present and the future could well bring ruin to a degree never before experienced and with it the destruction of what the war was fought to pro- tect. For this reason alone, national objectives must transcend the mere winning of wars; they must include the realization of the purposes for which war is waged. These purposes, when de- fined and understood, might well control the tac- tics, targets, and even the weapons used; even more, they might alter the concept of total victory. 99 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS In the past, American objectives, expressed as abstract moral principles, have led to some mis- understanding and disappointment. In. the pres- ent world crisis, there have been suggestions that they be more concretely defined: what are our spe- cific objectives, our capabilities for reaching them, our plans for carrying them out? Various stu- dents of government have raised the problem of what they describe as an American tendency to- ward a negative approach to objectives; that is, expressing them in terms of opposition to those of another nation. They recommend a positive ap- proach to objectives which might provide greater illumination and stimulation, not only to the American people, but also to the rest of the world. To point out the problems in connection with the interpretation and implementation of national objectives is easy; to solve them is a matter in- finitely more difficult. Dr. William L. Langer, long associated with government agencies con- cerned with national planning, has suggested the possibilities of a special staff, under the National Security Council, specifically charged with the long-range study of national objectives, together with provisions for the close exchange of ideas and coordination of action between the executive and legislative branches of the government. It is his belief that, by such means, greater unity of pur- pose and action might be achieved. Without ques- tion, clearly defined and well understood national objectives are fundamental to a national grand strategy aimed at encouraging our allies and dis- couraging our adversaries. GRAND STRATEGY As a term, strategy has long been associated with war as an art of military command, but as a result of the modern complexities of war and of the-so- ciety from which it stems, the strategy of today has come to embrace many factors other than mili- tary: political, economic, technological, moral, and psychological. It has come to embrace activi- ties of government and diplomacy aimed at the control and utilization of a nation's total resources, of which military forces is only one, for the pur- pose of promoting and protecting national inter- ests against actual or potential enemies. The di- mensions of modern strategy become even more profoundly impressive when groups of nations CONFIDENTIAL band together for the promotion and protection of common interests. Simply defined, strategy is the basic pattern for employing instruments of power. In its broadest sense, therefore, it is known as grand strategy. In chapter 1 grand strategy was defined as the master plan of a nation in both war and peace, in- cluding not only military planning but domestic and foreign policy as well. A more complete definition by B. H. Liddell-Hart is given in the Encyclopedia Britannica (14th edition) : Grand Strategy should both calculate and develop the economic resources and manpower of the nation in order to sustain the fighting services. So also with the moral resources? for to foster and fortify the will to win, and to endure, is as important as to possess the more concrete forms of power. And it should reg- ulate the distribution of power between the several services, and between the services and industry. Nor is that all, for fighting power is but one of the instruments of grand strat- egy. It should take account of and and apply the power of financial pressure, diplomatic pressure, commercial pressure, and, not least, ethical pressure to weaken the opponent's will. A good cause is a sword and a buckler. Fur- thermore, while the horizon of strategy is bounded by the war, grand strategy looks be- yond the war to the subsequent peace. It should not only combine the various instru- ments, but so regulate their use as to avoid damage to the future state of peacefulness, se- cure and prosperous. There are other terms with which the intelli- gence officer should be familiar in order to under- stand this element of the intelligence perspective more thoroughly. Combined Strategy refers to the common strategy of coalitions of nations. Na- tional Strategy is used interchangeably with strat- egy and grand strategy, while Military Strategy is a more restrictive term, denoting the art and science of employing the armed forces of a nation to secure the objectives of national policy by the application of force, or the threat of force. Naval Strategy is the result of planning for the effective employment of naval power in support of national objectives. Other military terms have been found useful in describing the activities of nations. Strategic offensive, strategic defensive, and stra- tegic initiative?all defined in chapter 1?apply to nations as well as to combat units. 100 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL Interrelationships of Military and Political Factors The interchange of vocabulary is but one indi- cation of how closely interwoven the military and political factors of our Nation's strategy have be- come. Another indication is the reliance placed on the opinions of the Joint Chiefs of Staff by the Chief Executive and by the National Security Council, and the fact that the nation's military leaders are included in consultations involving top- level planning in many areas which are not di- rectly of a military nature. As shown in the pre- ceding chapter, Congress has officially recognized the role of the military forces in connection with national strategy. World conditions, of course, have exerted a tre- mendous influence in bringing about this situa- uation in the United States. Specifically, the emphasis on force and the threat of force in the foreign policies of the Soviet Union has strongly affected the international relationships of nations. The problem of Korea provides a good illustration of the interplay of military and political factors. As early as 1947, $510,000,000 in military aid for South Korea was proposed. When the Soviet Union suggested a conference on Korean unity, the United States State Department dropped the military aid program. Later, when the U. S. S. R. took the strategic offensive and formally withdrew from Korea, leaving behind a trained North Ko- rean Army, the United States had no alternative but to withdraw also, leaving no comparable army behind. When South Korea was invaded in the summer of 1950, it was the State Department, not the Department of Defense, which encouraged military support of the South Koreans. Having committed military units to Korea, the military leaders found their planning sharply circum- scribed by strategic political considerations. Admiral Mahan set forth the proposition that "The strategist is he who always keeps the ob- jective of the war in sight and the objective of the war is never military and is always political." In the past, the leaders of American military forces have tended to overlook this dictum, undoubtedly because of the meritorious, long-established, and deeply-rooted American conviction that overall civilian control of the Nation's military forces must be maintained at all costs. The Military Point of View The American military mind in the past has con- centrated on the military factors involved in achieving victory and avoiding defeat; it has not associated itself officially with a consideration of the political implications of victory or the political situations which might lead to further conflict. As a result, when called upon, it has tended to concentrate on the use of direct, overpowering force to accomplish its objectives, leaving to other agencies the considerations of other means to carry out strategic plans. The developments following World War II, however, have had a profound effect on the think- ing of both military and political leaders in the United States. It has become apparent that throughout that war the Soviets were guided in their strategic military planning by their postwar political objectives. For example, it has been sug- gested that Soviet insistence on committing Allied forces in Italy to an invasion of southern France was based primarily on an effort to keep them out of the Balkan countries. As a result, there were no substantial British or American military units in Romania, Bulgaria, and Hungary to retard the extension of Soviet control over those countries in the postwar period. The military objectives of the Korean war from 1950 to 1952 were obviously limited by broad political considerations. The American system of government and way of life will always assure civilian control of its military forces. The military themselves will be the first to reject any suggestion that they assume leadership in formulating national strategy and directing foreign policy. Since, however, our mil- itary leaders are involved in national strategy, they must be thoroughly conversant with all the politi- cal factors in order to contribute effectively to overall planning for the welfare and security of our Nation. Basic Considerations in the Formulation of Strategy Four concepts should be basic in the thinking of all those responsible for planning national strat- egy. The first is that modern strategy is global. The interdependence of all parts of the world has increased to the extent that a changed condition in one area is quickly felt in many others. The 101 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Soviet "war by satellite" strategy has made clear the fact that many widely separated parts of the world are vital to our national security; while Stalin's comment that victory in Europe may first be won in Asia gives added significance to the drain on the military strength of France caused by the situation in Indo-China. An appreciation of this concept can serve as a constant warning not to concentrate on the security of one area without a full awareness of the possibilities of weakening the security of another. The second concept is that international rela- tions are unstable; hence the strategic planner must be prepared to adjust rapidly to the prob- abilities of change, perhaps even radical change. American relations with the Soviet Union, chang- ing from allies in World War II to adversaries in the postwar period, illustrate the validity of this concept. It should be remembered also that the United States and Great Britain have not always been allies. The situation in postwar Eu- rope demonstrates all too well the instability and delicate balance of relations between countries: an unfavorable resolution of internal conflicts within Germany, France, and Italy might sharply alter our relationships with those countries; and cer- tainly the position of Yugoslavia has changed radically in a few short years. The Communist purges in the Soviet satellite countries during 1951 and 1952 might indicate that the Soviet Union has not yet achieved complete stability in its relations with its involuntary associates. The significance of this concept is two-fold: fixation on a particu- lar situation which exists at any given time can distort the evaluation of developing events and throw long-term planning off balance; strategic planning must be dynamic, sensitive to indications of change, and prepared to take the initiative as changes occur. The third concept is that of consistency to prin- ciple. American goals and ideals have long been a source of inspiration to all people of the world who see in the United States a land of opportunity and a haven from tyranny where freedom has real meaning for the individual. Consistency in the championship of human liberty, wherever it is sought, is essential to any long-term success in strategic planning; inconsistency contains the seeds of self-destruction. In itself, this concept CONFIDENTIAL 102 poses some exceedingly difficult problems in a world where force is a constant threat. However, simply stated, it means that those responsible for national strategy must never lose sight of basic national objectives. The fourth concept is that the various means available to strategy are employed in varying de- grees at all times to strengthen the master plan of one nation while restricting the plans of another. The availability of military force is a factor which constantly affects the formulation of strategies, as is illustrated by the effect of the postwar ac- tivities of the Soviet Union in Europe and in Asia. Diplomacy, which pursues a more peaceful ap- proach to the solution of world problems, endeav- ors at all times to win friends and to create condi- tions favorable to its own objectives. Economic power is exerted to strengthen and to destroy. In postwar Europe, the United States has used its economic resources to restore war-ravaged coun- tries; while at the same time, in China, it has em- ployed this power to weaken the Communist con- trolled government. Similarly, the sociological instruments of emotion and culture are being ex- ploited by opposing forces all over the world, on the one hand to build and on the other to tear down. In more recent years, science and tech- nology have become powerful weapons; the atom bomb alone has played a significant part in the planning of world strategies. The essential point of this concept is that war and peace are relative terms and that no wise strategist can consider them to be mutually exclu- sive with particular instruments appropriate only to one or the other. Such a point of view might lead to the sacrifice of long-term objectives for short-term advantages. A keen appreciation of this concept can immeasurably strengthen a na- tion's grand strategy by permitting the skillful employment of all available instruments in the right degree at the proper place and time. All of these concepts can be reduced to the sim- ple fact that strategy must be based on realities, and hence requires the availability of all perti- nent knowledge. The approach to this require- ment involves: first, a continuous awareness of the unknown. factors and an effort to uncover them; second, a full appreciation of the known factors and their realistic application to the solu- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002A AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD ouNFIDENTIAL tion of the many problems of planning; and third, the conscientious use of logical reasoning. Success in the formulation of strategy is achieved when the resultant policies are so inte- grated with available instruments that war be- comes either unnecessary or is undertaken with the optimum assurance of victory. POLICY IN FOREIGN AFFAIRS The net product of grand strategy, which is based on national interests and objectives, is called "policy"; when that policy concerns relationships with foreign countries it is called "foreign policy." Obviously policy cannot be established in the best interests of a nation without a great deal of care- ful advance study and planning; thus it represents the last step in a nation's strategic planning proc- ess and gives expression to its master plan. For- eign policy is that element of the total plan, devel- oped from experience and knowledge, which aids in the conduct of government business with other governments. In the postwar period there has been a notable growth of popular interest in American foreign policy, and much has been written on the subject. There has been criticism of certain aspects, such as the lack of realism, the absence of continuity, and excessive improvisation. In his book, The Road to Foreign Policy, Hugh Gibson, a long- time career diplomat, refers to the "Open Door" policy in China, "Dollar Diplomacy," and the "Monroe Doctrine," among others, as "fragments of foreign policy" and suggests that some Ameri- can foreign policies "can be described not too un- kindly as hobbies of successive secretaries of state." From such discussions and criticisms it may be concluded that a real need exists for a better un- derstanding of what foreign policies are, the proc- esses from which they are derived, and an expres- sion of the policies themselves in language unmistakably clear, with no possibility for mis- interpretation. Such an understanding is aided by a recognition of the fundamental character- istics and qualities which all policies should have. Foreign policies are rooted in the historical background of nations; they develop gradually, are the result of objective thinking, and have qual- ities of stability and permanence. They never 103 spring suddenly into being and can seldom arise out of the emotional excitement of the moment. George Washington, in his Farewell Address, was encouraging the idea of objectivity when he warned against "passionate attachments." In dis- cussing basic policy in his book, Mr. Gibson com- ments that, in the light of subsequent events the post-World War II policy of the Allies to destroy the power of Germany was not a true policy be- cause it was emotionally conceived and lacked the quality of Objectivity. The term "policy" should be applied only to something that is fundamental and of a long-range nature; it should not be con- fused with tactical devices used to implement the basic plan. The Marshall Plan, for example, has been merely a device for implementing a basic policy of denying the control of Europe to one aggressor nation. However, it gives continuity to that policy and should not be misunderstood as an improvisation. Obviously, a policy is never one-sided; it always involves other nations and other peoples who have much to do with its effectiveness or ineffectiveness. The success of the balance of power policy in Europe depends upon the whole-hearted response and cooperation of various countries participating in the Marshall Plan, the North Atlantic Treaty Organization, and the European Defense Com- munity. The success of any policy depends also on the high caliber of those responsible for its ad- ministration, their training, experience, and sen- sitive perception of its many aspects and impli- cations. The measure of success should never be gauged by spectacular immediate results, because the results achieved over a period of years are often much more significant. Since a policy must be judged on a long-term basis as it grows and develops, it cannot always be evaluated at a given time; rather, the degree of its effectiveness will be demonstrated by the manner in which it influences subsequent events. Since a true basic policy grows out of national objectives which are the common interest of all groups within a nation, it does not represent a partisan point of view. On the other hand, the implementing tactics or devices may well origi- nate from the elected representatives of the people in control of the government at a given time. Finally, all policies are not of equal importance. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR The defense of American policy in China, for ex- ample, would not elicit the same immediate re- sponse as the defense of our policy to protect the Western Hemisphere from aggression. A review of common characteristics should lead to the conclusion that foreign policies are the re- sult of long-range planning and that shifting re- lationships between nations will affect their execu- tion, so that adaptability is essential to successful operation. An understanding of these character- istics should do much to sharpen the intelligence perspective in identifying the broad patterns of policy, often obscured by tactical devices which are no more than implementations. Even more, it becomes apparent that the successful execution of policy requires at every step a great amount of knowledge and a full appreciation of cause and effect relationships. While the instruments of policy and strategy are the same, it must be reemphasized that they are the machinery through which policies operate and that their effective use is necessary if any policy is to have real meaning or ultimate value. Diplo- macy and military forces are two basic instruments whose significance merits further consideration. Diplomacy is not a function limited to the diplo- matic service. It is carried on through any official or unofficial activities which affect foreign rela- tionships such as: a restrictive tariff act or a gen- erous foreign aid measure passed by Congress; the movements of the 6th Fleet in the Mediterranean; the behavior of American citizens, military or ci- vilian, in a foreign capital; formal addresses or off-the-cuff remarks by high Government officials. It is true that the diplomatic service itself must be a highly trained body of devoted men and women capable of administering policy wisely in a con- fused and troubled world. At the same time, pub- lic opinion has much to do with diplomacy as an instrument of policy; the more enlightened it is, the more advantageously effective it can be. The importance of this instrument is self-evident; its failure results inevitably in war. Military forces are not only an exceedingly im- portant instrument of policy, but also affect policy directly or indirectly. United States Army oc- cupation and control in Germany, for example, will have an effect on American policies in Europe for many years, and likewise our occupation and CONFIDENTIAL 104 NAVAL OFFICERS subsequent retention of military bases in Japan have given a definite pattern to American policies in the Far East. Close coordination of military and political policies, therefore, becomes essential to the national interest. To be remembered also is the fact that military power as an instrument of policy must be adequate to support that policy; further, that the knowledge required to determine what constitutes adequacy must be supplied by an effective intelligence service. THE ROLE OF INTELLIGENCE Since modern nations can scarcely afford to maintain military forces sufficient to meet all even- tualities, the production of knowledge from which to determine adequacy becomes a contribution of major consequence. Intelligence can also have great value in helping to compensate for certain deficiencies in military instruments available to carry out strategy and policy. Prior to World War II, one of the German military theorists, Captain von Gadow, recognized this value in an article prepared for Militaerevessenschaftliche Rundschau We must be far-sighted in our policies. The next war will depend on the success or failure of the great sea powers. Germany is not and cannot become a great sea power. But we can protect certain interests by erecting effi- ciently working outposts which would have to fulfill highly important tasks in the sphere of naval strategy and may also often play a de- cisive part in our foreign policy . . . In evaluating the military factor, Intelligence must inevitably assess the relevant political, eco- nomic, psychological, moral, and technological factors. In so doing, it produces knowledge which can be used as the basis for the successful employ- ment of these additional factors in total war. The preceding discussion of the planning of strategy and the formulation and execution of policy has indicated the quantity and scope of knowledge required. It has also suggested in general terms the necessary breadth of the intelli- gence perspective. A review of some of the strat- egies, policies, and tactical operations of Germany, Japan, and the Allied Nations before and during World War II and of the Soviet Union after- wards will more specifically illustrate the vital Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL role played by Intelligence and the perspective its personnel must have in support of that role. Dur- ing this review it will be well to keep in mind the intelligence organizations developed by these na- tions as described in the latter sections of chap- ter 2. GERMAN STRATEGY BEFORE AND DURING WORLD WAR II The grand strategies of the Axis powers were formulated separately in the 1920's and were im- plemented and combined in the 1930's. Their tenuous roots may be traced to Mussolini's march on Rome and his establishment of the first dic- tatorship; the Japanese fortification of their newly acquired Mandated Islands in the Pacific; and Hitler's dramatic presentation of himself and his scheme for world conquest in Mein Kampf. When Hitler became Chancellor of Germany in 1933, Nazism was established as a political and military force and secret preparation for war was begun. Germany, however, did not take the stra- tegic offensive in the international arena until 7 March 1936, when she reoccupied the Rhineland. A year earlier Italy had taken the strategic of- fensive when she moved against helpless Ethiopia. By 1936 Hitler had created the "Rome-Berlin Axis" and, with Mussolini, had intervened in the Spanish Civil War for the purpose of testing new weapons and tactics, to say nothing of further undermining the stability of that country. By 1936 he also had evolved and put into action the new Nazi strategy, which utilized not only mili- tary but also economic-political-psychological means. Because he held the strategic initiative, Hitler was able to a large extent to predict and determine the course of events. In the period from 1936 to 1940 it became in- creasingly clear that the grand strategy of the Nazi regime was territorial aggrandizement by means short of war, and the forging of armed might against the day when conflict with major powers could no longer be avoided. During this period Mussolini played second fiddle to Hitler; his ambition was perhaps not so grandiose, and certainly his resources were not comparable. He basked, however, in the reflected glory of the Nazi state as it gradually assumed hegemony over one European country after another from 1938 to 1940. 105 Hitler's spectacular successes were in large meas- ure due to his "combined strategy" which adapted grand strategy to the purposes of a ruthless dic- tatorship in which total mobilization could be en- forced immediately for the waging of total war. That the Nazi grand strategy was truly global in scale, and was directed, among other objectives, at gaining a foothold in Latin America, was rec- ognized in 1942 by Hugo Fernandez Artucio, who wrote in his "The Nazi Underground in South America": An undeclared war is being waged in Latin America today against the democratic insti- tutions and the independence of the New World Republics. The war is being con- ducted with fearful efficiency by the soldiers of the Third German Empire, who have been distributed by the thousands throughout the political underground of this continent. They are the agents of Adolph Hitler, whose mission it is to put into practice here, as in Holland and Belgium, Czechoslovakia and Norway, Austria and France, the principles of totalitarian warfare. In this concept of war, actual armed invasion becomes merely a link in a long chain of underground prepa- ration . . . A political scheme of international implica- tions has been set afoot on the American con- tinent . . . Its object is to set up a govern- ment as nearly like the totalitarian regime as possible, and the method employed is "the war of nerves." Its creators know, with Machiavellian cunning, the political function of fear. Nazi strategy was ably supported by the world- wide German Intelligence Service, the concepts of which were broadened in order to implement new and revolutionary methods of warfare, such as the "blitzkrieg," the "war of nerves," and the "fifth column." The effectiveness of German In- telligence in contributing to Nazi strategic pur- poses in Spain is described by Hansjurgen Koehler in his book Inside the Gestapo. The particular device used was the Hagenbeck Circus which was sent to Spain to roam the countryside for months. Gestapo agents were included among the large numbers of circus employees. With this excellent "cover," these agents had little difficulty in obtain- ing a great variety of important information. This circus also provided a means whereby Nazi propaganda could be distributed with little or no CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR difficulty. As a result of the Nazi intelligence ef- fort in Spain, anti-German elements were almost completely eliminated, Germans residing in the country were enlisted as collaborators, and vital strategic data on Spain was collected. Tremendous sums of money, estimated at $200,- 000,000 annually, were allocated for intelligence purposes, including the creation of fifth columns and the conduct of propaganda activities. Such expenditures were possible because of the Nazi planned economy in Germany, and, from their point of view, it was money well spent--except in England and the United States. Although the ruthless aggressions of the Axis powers were in open defiance of existing treaties and international law, the western democracies were impotent, and could only helplessly observe the progress of events. For some time Hitler was not taken seriously, certainly not by Ramsay Mac- Donald and Stanley Baldwin, although as early as 1934, Winston Churchill had begun to issue solemn warnings of the new peril which was taking shape beyond the Rhine. Thus England remained on the strategic defensive, and Neville Chamberlain's policy of appeasement did not im- prove the situation. England was not alone, how- ever, for the other democracies shared this unfavorable position. One problem was that England and France were getting very little intelligence out of Germany, because it was a part of the Nazi strategy to infest the homeland with armies of counterspies, to pun- ish betrayal of military or industrial secrets by well-publicized beheading, and to employ torture and execution to stamp out disaffection whenever and wherever detected. But a greater problem was lethargy in the British Government and cor- ruption in the Government of France which pre- vented the right kind of action from being taken in response to such intelligence as was received regarding the German rearmament. As can be seen, the advantage of strategic ini- tiative, and hence the advantage of surprise, lay with the totalitarian states dedicated to world conquest. Innumerable acts of aggression, almost imperceptible at their inception and fully identi- fied only after they were accomplished facts, were carried out in times of ostensible peace by scores of fanatical and capable agents. Powerful nations CONFIDENTIAL 106 NAVAL OFFICERS were lulled by skillful propaganda into a false sense of security; while others, less powerful, were threatened, coerced, and attacked. The Axis powers sought to change the existing world situa- tion to one more favorable to themselves and, up to a certain point, each succeeded remarkably well. Failures in German Strategy The period up to and including the fall of France was characterized by brilliant Nazi suc- cesses; thereafter, when Hitler was forced into war with both England and the United States while still embroiled on the continent of Europe, Nazi blunders were the order of the day. Of par- ticular interest are the failures in strategy which led to failures on the field of battle and on the diplomatic front. The publication of war his- tories, memoirs of key political and military fig- ures, the texts of hitherto top secret international agreements, and "post-mortems" obtained through the interrogation of high-ranking prisoners of war, all shed light on different facets of German planning and strategy. The "post-mortems" are very illuminating although compensation must be made for personal bias. There is evidence that no war with England or the United States was contemplated by the Ger- man High Command during the period of initial Nazi successes. An essay by Admirals Schniewind and Schuster includes this statement: A war on such a tremendous scale?or even with England?was in 1939 quite beyond the range of the preparations and intentions of the Government. But the policy of the Gov- ernment and its political negotiations did not make any provision for this idea, as subse- quent developments showed. They completely failed to realize the determination on the part of those who were later to become her enemies to declare war in the event that Germany car- ried out any further activities similar to the occupation of Austria, Sudetenland, or Czech- oslovakia. Germany, her armed forces and especially her navy, were thereafter taken un- aware and had to enter the war inadequately equipped. Additional evidence is found in an article by Vice Admiral Hellmuth Heye, entitled, "From Panzer- schiffe to E-Boats :" Foreign politics were of particular impor- tance from the naval point of view. The re- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL lease of Germany from the Versailles Treaty . . . was . . . a hopeful development. Ad- miral Raeder, in common with all the best naval opinion, held the view that the war of 1914-18 was lost as a result of Anglo-Ameri- can sea power. The land decision was only a result of Anglo-American superiority at sea. The Navy therefore held the view that the waging of modern warfare is only possible, especially in the air age, when there is no de- termining enemy superiority at sea. Natu- rally all the necessary conditions appertaining to the use of the sea in an essentially conti- nental country like Germany were difficult to achieve. From the to downward all im- portant offices in the Ministry of War and in the air arm were occupied by persons who were essentially land-trained. The Navy found it impossible to introduce qualified of- ficers into either the Air Ministry or the War Ministry. Naturally this state of affairs could not but have an influence on the decision taken on all questions connected with the sea and sea war- fare. Nevertheless, every effort was made on the highest level to avoid under all circum- stances hostilities with England. This hope, as I see it, remained up to the very day of the declaration of war by England. There is no better evidence on this than the fact that until close up to the outbreak of war, I believe 1938, the Navy was expressly forbidden to study or consider the problems presented by a war with England. This almost incredible failure in German basic planning was to have costly results in 1940 when the opportunity arose to invade the long-invulner- able British Isles. Detailed plans for Operation Sealion had been prepared and were ready to be put into effect, but Nazi strategy had failed to foresee and prepare for this opportunity, and Ger- many lacked the necessary landing craft and other naval units to carry out an invasion. Air power and land armies had been highly developed while sea power had been neglected. This crucial error in strategy seems to have resulted in part from a failure of German Intelligence to predict in ad- vance the psychological factors which would make England a belligerent. Even this error might have been counterbalanced by a skillful diplomatic effort directed toward gaining and preserving an attitude of neutrality in England, but the Nazis lacked this capability and Hitler's personal short- comings were reflected in the conduct of his foreign policy. The first major error in strategy involved Hitler in a land war and a sea war simultaneously and prevented him from mounting an invasion of Eng- land in her weakest hour. A second, equally se- rious, resulted in an all-out offensive against the U. S. S. R. in the winter of 1941-42. The land war now had to be fought on two widely separated fronts, a situation particularly dreaded by the members of the German General Staff. From the very first, Hitler underestimated Soviet strength and miscalculated Soviet intentions. Interesting comments on these failures in strategy were made by Colonel Gottschling, Chief of Staff of the Ger- man Air Staff in Italy, during interrogation: Hitler's "idee fixe" was to wage war against Russia. The failure to invade Great Britain, the ever-increasing amount of aircraft Britain was receiving from the United States and Germany's ever-increasing number of aircraft losses served to spur Hitler on and in his ob- session drove him to attack Russia. Luftwaffe fighter and bomber units needed in western Europe were dispatched to Bul- garia, Rumania, etc. FIitler overruled every objection of the General Staff with his gift of persuasion. . . . I would summarize Germany's war mistakes as follows: a. Overestimation of England's ability to resist invasion. b. Underestimation of Russia. c. Overestimation of Germany' s allies, such as Italy. d. Our failure to treat France as an equal and obtain full use of the wealth and resources of the French colonial em- pire. This could have been a stepping stone for the invasion of Great Britain. e. Declaring war on America. The High Command should and must have known that America's entry into the war meant Germany's defeat. ?Defeat, Headquarters Army Air Forces, January 1946. A theme which reappears time and again in the various "post-mortems" is the disastrous result of Hitler's personal and complete control over Ger- man grand strategy, particularly after the war began. Colonel Gottschling stated: 107 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR I have seen the most brilliant and deter- mined men of my acquaintance go before Hit- ler, determined not to acquiesce to his whims. These brainy and critical men returned fasci- nated and for weeks remained under the spell of Hitler's charms or hypnosis. Thus, Hit- ler exercised his influence on his General Staff. Vice Admiral Heye is quoted again in this connection: During the preparations for the operations in Norway I was only once present at a con- ference with Adolf Hitler. In the course of this he emphasized the importance of the oc- cupation of Norway for the whole conduct of the war and said he was the only man who could assume responsibility for such an opera- tion. In the course of the war, as is well- known, he on many occasions acted against the advice of his military chiefs and sometimes he met with successes. This fact may have caused him and many officers to regard him not only as a statesman but also as a superior general in the field. His intervention in mil- itary operations grew at all events noticeably more pronounced. The German High Command progressively lost its freedom to reach military decisions of a strategic nature; more and more these were made by Hit- ler himself on the basis of "intuition." It would appear that the major errors already listed, and some of their far-reaching consequences, might have been avoided if Hitler had been persuaded from exercising complete control over German grand strategy, and if more comprehensive and more accurate intelligence had been available to the High Command. Fortunately for the Allies, much of the information collected by the Nazis was unreliable and inadequately processed; even more, either the resulting intelligence was not disseminated to those who needed to know, or, if disseminated, was not used. Strategy, when for- mulated by one individual on the basis of intui- tion rather than fact, cannot fail to reflect not only the brilliance but also the faults of that in- dividual. Further, when faulty intelligence is in- volved, the errors are compounded and magnified. Other errors in German strategy included the failure to bring Spain into the Axis camp, a lack of appreciation for the advantages of joint opera- tions in battle, and miscalculation of the enemy's total industrial capacity. Regarding the latter two, General von Senger was most outspoken i CONFIDENTIAL 108 NAVAL OFFICERS The General Staff failed to understand the modern idea of warfare. It still thought in terms of Nineteenth century land battles, whereas we should have had a combined staff like Italy. Our General Staff was primarily occupied with army strategy rather than co- ordination with the navy and air force. . . . The tragedy of the General Staff is historical rather than military. It saw its enemy in the Allied field soldier?whereas the real enemy was Allied industrial capacity far beyond the front, out of reach of bombs or the range of artillery. ?Defeat, Headquarters Army Air Forces, July 1945. The turning of the tide against the Germans is generally agreed to have occurred in the fall of 1942 when the Allies landed in North Africa and went on to defeat Rommel and to invade Italy. The Allied advantage lay in the important ele- ment of surprise, not only in tactics, but also in the employment of many new types of landing craft and weapons. Initial military success led to a major political triumph, the fall of Mussolini. The way lay open to the "soft underbelly of Eu- rope," but the Allied strategic initiative in the Mediterranean theater, except for long-range bombing of the Rumanian oil fields, dwindled in the face of stubborn German resistance and diffi- cult terrain. Elsewhere in Europe, however, the success of air operations from bases in England, and the advance of Soviet armies following the defense of Stalingrad, gave the Allies the strate- gic initiative on both western and eastern fronts. Meanwhile, in the Atlantic, the strategic offen- sive maintained by Nazi submarine warfare was reduced to the defensive, and as the situation became more desperate it should have been ap- parent to Hitler that victory was beyond his grasp. The landing in Normandy, the devastating sweep through France, and the junction with Soviet forces in Berlin were but the final stages of suc- cessful Allied grand strategy in Europe. Japanese Strategy Before and During World War II Japan took the strategic initiative on the main- land of Asia on 18 September 1931 when she ar- ranged the Mukden Incident as a pretext for the invasion of Manchuria. Thereafter, she became deeply involved in a land war in China. How- ever, unlike Hitler, who initially at least had a Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL healthy respect for the military and industrial potential of the United States, the Japanese com- pletely underestimated America's war-making capability and deliberately provoked a conflict. The attack on Pearl Harbor exploited surprise, the range of carrier task forces, and the power of aircraft to sink surface vessels. Not only did it surprise the United States but also Nazi Germany, for it now appeared that Japan was determined to fight her own war independently, without more than a perfunctory liaison with the Third Reich. Thus an early failure of the combined strategy of the Axis powers was the lack of effective coor- dination?a problem which continuously plagued the German High Command. The final decision of Japan to make war, reached with the full concurrence and active con- sent of Japanese military and civilian leaders, was based upon the following evaluation which is very well presented in the Summary Report (Pacific War), published by the United States Strategic Bombing Survey: a. The threat of Russia on the Manchurian flank had been neutralized by the decisive victories of Germany in Europe which might eventually lead to the complete collapse of the Soviet Union. b. Great Britain was in such an irretriev- ably defensive position that, even if she sur- vived, her entire war-making potential would be spent in a desperate attempt to protect her home islands. c. The forces which the United States and her Allies could immediately deploy in the Pacific, particularly in the air, were insuffi- cient to prevent the fully trained and mobil- ized forces of Japan from occupying within 3 or 4 months the entire area enclosed within a perimeter consisting of Burma, Sumatra, Java northern New Guinea, the Bismarck Archipelago, the Gilbert and Marshall Islands, Wake, and from there north to the Kuriles. d. China, with the Burma Road severed, would be isolated and forced to negotiate. e. The United States_, committed to aiding Great Britain, and weakened by the attack on Pearl Harbor, would be unable to mobilize sufficient strength to go on the offensive for 18 months to 2 years. During this time, the perimeter could be fortified and the required forward air fields and bases established.. So strengthened, this perimeter would be backed by a mobile carrier striking force based on Truk. f. While the stubborn defense of the cap- tured perimeter was undermining American determination to support the war, the Jap- anese would speedily extract bauxite, oil, rub- ber, and metals from Malaya, Burma, the Philippines and the Dutch East Indies, and ship these materials to Japan for processing, to. sustain and strengthen her industrial and military machine. g. The weakness of the United States as a democracy would make it impossible for her to continue all-out offensive action in the face of the losses which would be imposed by fa- natically resisting Japanese soldiers, sailors, and airmen, and the elimination of its Allies. The United States in consequence would com- promise and allow Japan to retain a substan- tial portion of her initial territorial gains. Most of this evaluation was incorrect, because it was based on faulty intelligence. At the very outset of the Pacific War, therefore, the seeds for Japan's eventual defeat were sown. She was unable to comprehend or to predict those psychological and moral factors which bolstered the Allied cause in a time of severe trial and mis- fortune. Since the Japanese concept of the state involved ruthless tyranny and the complete sub- jugation of the individual, she was also unable to appreciate the power potential of the Allies in obtaining a supreme voluntary effort from the in- dividual, whether on the field of battle or on the production front. Individual response to a noble cause is one of the great strengths of a democ- racy. Before a democracy fights, however, the enemy has usually gained the strategic offensive. The magnitude of their early successes at Pearl Harbor, in Malaya, in the Philippines, and at Wake, Guam, and Rabaul, encouraged the Japa- nese to commit an outstanding error in grand strategy?expansion beyond the perimeter origi- nally planned. The nature of this new plan and its inherent weaknesses are also described in the Summary Report (Pacific War) : Accordingly, a new plan was approved, pro- viding for (a) an advance into the Solomons and Port Moresby., to be followed, if success- ful, by a further advance into New Caledonia, Samoa, and the Fiji Islands; (b) the capture of Midway; and (c) the temporary occupa- tion of the Aleutians. Accomplishment of such a program would cut the line of com- 109 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR munication between Australia and the United States, reduce the threat from Alaska, and deny the United States all major staging areas more advanced than Pearl Harbor. By stretching and overextending her line of advance, Japan was committed to an expen- sive and exacting supply problem. She de- layed the fortification of the perimeter origi- nally decided upon, jeopardized her economic program for exploiting the resources of the area already captured, and laid herself open to early counterattack in far advanced and, as yet, weak positions. It should be pointed out, however, that this new plan was partially successful; for example, sig- nificant strategic gains were achieved by the tem- porary occupation of Kiska in the Aleutians. The United States was immediately placed on the de- fensive in an area from which it had planned to take the offensive. The Japanese action denied to the United States Fleet advance bases for opera- tions in the northwest Pacific and the Bering Sea, from which aerial reconnaissance could be main- tained over the northernmost Japanese Islands. Furthermore, it was a threat to the shipping routes between the west coast of the United States and the east coast of Siberia; it endangered sealing and fishing in the Bering Sea, and imperilled the northwestern area of Alaska. The influence of Japanese technical intelligence on this decision to move into the Aleutians is indicated by the fol- lowing quotation from the United States Strategic Bombing Survey (Pacific) : In Commander Hashimoto's opinion the Japanese move into the Aleutians was con- ceived as a flanking operation to the occupa- tion of Midway. Once Kiska and Attu were occupied it was decided to hold them for the purpose of blocking a United States amphibi- ous advance toward the Empire via the Aleu- tian Chain, and also to deny the use of the western Aleutians as bases from which long- range bombers might operate. He said that the Japanese were aware in the latter part of 1942 that the United States had plans for a high altitude, long-range bomber, and, in about February 1943, had information con- cerning the B-29. This information was later confirmed in a radio broadcast by an Ameri- can general. He went on to say that the B-29 appeared in operation 8 months later than the Japanese had estimated it might ap- pear. When Attu was re-taken by the United CONFIDENTIAL NAVAL OFFICERS States, the Japanese expected long-range bomber operations from Massacre Bay. ?Interrogations of J a p anese Officials (Vol. I) The operation launched against Midway, also a part of this new plan, was far from successful. In fact, in the words of Captain Tsuda : The Battle of Midway was the beginning of the Japanese failure in the war, I do not mean that this was the decisive battle of the war, but the loss of our carriers and some of our best pilots and officers affected us throughout the war. It called for the reorganization of the carrier divisions and the Naval Air Force in general. Due to the loss of ships we were unable to meet the Americans in force in the Solomons. ?Interrogation of Jap an e se Officials (Vol. I) United. States Strategic Bombing Survey (Pacific) The explanation for this fatal error to expand the original perimeter may be found in the com- ments of Admiral Toyada, one of her top naval leaders: I think the decision to expand the area of operations so widely might be attributed to a feeling on the part of the Japanese authorities at the time that the state of mind under which you fought the war and the state of mind under which we fought the war were very different, in that to us this was the war for our very national existence, whereas in your case it was merely a case of national honor or per- haps protection of your economic interests in the Far East; and, because to you the war under such conditions would be of relatively slight significance compared with ours, there might have been a feeling on the part of our leaders that, should the war continue a little longer, you would lose your will to fight, and with that idea we might have continued spreading the battleline. ?Interrogations of Jap an es e Officials (vol. II) United States Strategic Bombing Survey (Pacific) If this explanation can be accepted as authorita- tive, the cause for such a fundamental error in strategy was an incorrect understanding of the psychology of the American people. Here again inaccurate intelligence had repercussions of the first magnitude. 110 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL Although the United States had early been placed on the strategic defensive, by the end of 1942 precarious footholds had been consolidated and reinforced in the southwest Pacific, thus up- setting the enemy's strategic plan. The Battle of Midway dealt a heavy blow to the Imperial Fleet, and the strategic initiative passed to the American forces. Thereafter, having ousted the Japanese from Attu and Kiska, the north Pacific units were employed as a holding and diversionary force, while the major Allied attacks were carried out by carrier task force raids, amphibious operations, and strategic long-range bombing always aimed at the final target, the Japanese home islands. ALLIED STRATEGY BEFORE AND DURING WORLD WAR II Allied strategy in its entirety during this par- ticular period serves to illustrate two points: the tremendous ultimate value in coordinating the strategies of allied nations; and the long term effectiveness of strategy formulated in times of peace as well as war. As has been mentioned, the grand strategy of the Axis was sharply divided, so that effective concentration of power against major objectives was never possible. On the other hand, the war effort of Great Britain and the United States was most closely coordinated. Varying degrees of co- ordination were achieved from time to time with the U. S. S. R., and with other Allied nations. Perhaps the outstanding feature of Allied grand strategy was the early implementation of the prin- ciple of combined British and American conduct of the war. Gen. George C. Marshall has com- mented on this feature as follows: On December 23, 1941, Winston Churchill, Prime Minister of Great Britain, accompanied by the British Chiefs of Staff, arrived in Washington to confer with the President and the American Chiefs of Staff. Out of the series of discussions which then followed re- sulted an agreement, not only regarding the immediate strategy of our combined conduct of the war, but also for the organization of a method for the strategical command and con- trol of British and American military re- sources. Probably no other Allied action, in the field or otherwise, has exerted as power- ful an effect on the conduct of the war as the prompt establishment of a prescribed pro- cedure for achieving unit of effort through the medium of the Combined Chiefs of Staff acting under the direction of the leaders of their respective Governments. ?Biennial Report of the Chief of Staff of the United States Army, July 1, 1939 to June 30, 1941. The pooling of resources and ideas generated a total power which swept the Axis countries into defeat. This concentration of power also included the use of Army, Navy, and Marine Corps in joint operations, especially in the Pacific. Joint and combined intelligence activities contributed substantially to strategic planning. For example, the results of British experiments in photographic interpretation were made available to the United States, while air intelligence methods, and operat- ing procedures aboard United States carriers were provided the British Fleet through special train- ing and liaison arrangements. This mutual ex- change at many echelons was invaluable to the combined allied strategy. It has already been suggested that grana strat- egy is conducted in time of ostensible peace as well as in wartime. This is well illustrated by the fact that the United States began to cooperate with Great Britain in her war effort more than 3 years before Pearl Harbor, and was actually at war with Germany long before formal declarations were made. Arrangements for the exchange of de- stroyers for bases under 99-year lease agreements, the convoying of merchant shipping, and the American Lend-Lease program were all early in- dications of combined strategy and military planning. NATIONAL STRATEGIES IN THE POSTWAR PERIOD The events of the postwar period, which have their roots in past decades, will continue to influ- ence the events of the future. The fate of the world, or of civilization as it is now known, con- tinues to hang in the balance, years after the termi- nation of World War II. Former enemies and former allies have united into new combinations in peacetime, striving to achieve their objectives. New strategies are being implemented and new pressures applied in support of them. The confusion and turbulence in relationships between nations, both large and small, all over 111 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 _Anproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS the world, and the crises caused by many diver- gent often delicate situations, tend to obscure a clear view of national strategies. However, it is apparent that a dominant influence upon them has been the fact that only two nations emerged from the war with the full stature of major powers-- the United States and the U. S. S. R. It is neither possible nor practicable to consider current events in detail, or to speculate on developments in the immediate future, but there are indications now which shed light on the postwar strategies of these major powers. United States Strategy In his book, The Price of Power, Hanson W. Baldwin presents an interesting discussion of United States strategy. His thesis is that in con- tinuing to strive for the fulfillment of her objec- tives in support of democracy and a just and last- ing peace for the world, the United States aims to preserve the political integrity of the "fringe- lands" of Europe and Asia in order to prevent the extension of Communist influence either to the Atlantic in Europe or to the East and South China Seas in Asia. This implies the restoration of a balance of power. There are, of course, many subsidiary aspects to this strategic purpose. Bald- win goes on to describe the United States as "home base" for operations with additional advanced and intermediate bases, both fixed and mobile, required because of the limitations of even the latest weap- ons of warfare. Okinawa is illustrative of a fixed base, while the United States Navy provides stra- tegic mobile bases. Such a system of widely dis- persed military bases becomes fundamental to strategic planning. Of equal importance is the development of "positions-in-readiness," that is, friendly and allied countries who can contribute to strategic purposes, both military and political. The necessity for advance military bases was dis- cussed by Colonel Clifford J. Heflin in the Air University Quarterly, Fall 1947: The idea of operating from home bases, without the burden of establishing and main- taining advanced and intermediate bases, would be welcomed by every Air Force officer, if it could be realized without paying too pro- hibitive a price. From the inherent character- istics of the airplane as developed during the last 40 years, however, it appears probable CONFIDENTIAL 112 that the price of such a method of operating will continue to be extremely high in the meas- urable future. Even if aircraft had attained the range necessary to launch bombing at- tacks from a distance of 6,000 to 8,000 miles, it would be likely to remain much more eco- nomical in materiel, and therefore more effi- cient, to operate from nearer bases, wherever they could be obtained . . . If the coastal areas of Europe and Asia are of most importance in United States strategic plan- ning, then the significance of both sea and air power, becomes readily apparent. The Atlantic and Pacific Oceans are American sea frontiers which must be protected, for only across them can the United States exert its strength, whether it be military, economic, or cultural. Strategic air power is expressed by planes, both land and car- rier based, capable of transporting atomic weap- ons. Logistic superiority involves not only the American industrial system, but also the capacity of the United States and her allies to move their products throughout the world by means of su- perior sea power and merchant marine. Other aspects of United States strategic planning may well include an ideological offensive and a highly mobile military force capable of almost immediate retaliation against any aggressive action. The Strategy of the Soviet Union In his book, The Strange Alliance, John R. Deane, formerly a Brigadier General in charge of the United States Military Mission to the U. S. S. R., says: In my opinion there can no longer be any doubt that the Soviet leadership has always been motivated by the belief that communism and capitalism cannot coexist. Nor is there any doubt in my mind that present-day Soviet leaders have determined upon a program pointed toward imposing communism on those countries under their control, and, elsewhere, creating conditions favorable to the triumph of communism in the war against capitalism which they consider to be inevitable . . . The program of the Soviet leaders is being carried out with equal aggressiveness in two ways: First, by the introduction and compul- sory acceptance of communism in those coun- tries which the Soviet Union controls either by force or by the threat of force; and second, by the infiltration of Communist ideology into Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPE those countries which, for the moment, are beyond the orbit of Soviet control. In be- tween are some nations that are subject both to Soviet threat of force and ideological in- filtration. Among these are Greece, Turkey, Iraq, and to some extent China. It is safe to predict that these countries will be subjected to a war of nerves which they will be able to resist only by the firm support of the western democracies . . . The program of infiltration is world-wide. It is evident throughout Latin America, Canada, the British Empire, Asia, and not least?the United States. In attempting to achieve world domination the Soviet Union aims to exert pressures in many areas by many means in order to extend her political influence and to weaken her adversaries by causing them to overextend and to dissipate their strength and power. Subsidiary elements of her strategic planning include substantial military forces in being, the threat of attack with atomic weapons, propaganda and subversion. In propaganda and subversion the Soviets have been highly successful. Their strategic purposes have been well served by the widespread employ- ment of radio broadcasts to disseminate the com- munist point of view and to vilify the western democracies. The Nazi techniques of the "war of nerves" and the "fifth column" have been most effectively employed. Intensive effort has been directed toward the development of new weapons and electronic equipment, the large scale produc- tion of interceptor and long-range aircraft, and the expansion of a submarine fleet. In attempting to combat the logistic superiority of the democracies, the Soviets have concentrated the production of their heavy industry on arma- ments. In addition, it is of vital interest to the U. S. S. R. to prevent the translation of Ameri- ca's tremendous war potential into actual strength. The tortuous course of the Soviet "peace" offen- sive seems to be directed toward this end. A po- tentially much more dangerous approach has been the suggestion of the availability of the Russian market for the sale of the products of foreign industry: a proposition particularly attractive to the business interests of the western democracies beset by economic problems and the urgent need for expanding foreign trade. CTIVE IN A CHANGING WORLD CONFIDENTIAL The Atomic Bomb The successful adaptation of the principle of nuclear fission to war purposes has had a marked effect on national strategies in the postwar period. Just how marked the effect has been is a matter of personal opinion. Some writers have felt that the initial possession of the atomic bomb gave to the United States a dominant world power posi- tion. Winston Churchill, speaking before a Tory party conference in Wales in 1948, solemnly observed: It is my belief?and I say it with deep sor- row?that . . . the only sure foundation of peace and of the prevention of actual war rests upon strength. If it were not for the stocks of atomic bombs now in the trusteeship of the United States, there would be no means of stopping the subjugation of Western Europe . . . If the United States were to consent, in reliance upon any paper agreement, to destroy the stocks of atomic bombs . . . they would be guilty of murdering human freedom . . . In connection with the development of an atomic bomb, the strategic initiative was first held by Germany. It was the knowledge that the Nazis were engaged in intensive atomic research that prompted the United States to undertake its own program and to expend nearly $2,000,000,000 in order to gain the strategic initiative in atomic power. Secretary of War Stimson considered the success of this program to be a great historical achievement attained through the integrated ef- forts of scientists, industrialists, labor, and mili- tary personnel. The fact that the United States alone possessed the atomic bomb was a great, if temporary, advantage and undoubtedly influenced strategic planning. The announcement in September 1949 that there was evidence of a recent atomic explosion within the U. S. S. R. and subsequent similar announce- ments in 1951 have had a profound effect on na- tional strategies and no longer does the United States have its unique power advantage. The part played by Soviet Intelligence in bringing about this change has been described in chapter 2. However, the development of tactical atomic weapons for offensive use in war makes the concen- tration of military forces or supplies extremely hazardous, and what was once a capability be- 113 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS comes a vulnerability. Thus, the Soviet capabil- ity to mass large military forces is not now as significant strategically as it was prior to 1952. On the other hand, Soviet progress in the harness- ing of atomic energy has been much more rapid than was expected and, even if the United States maintains its production lead, the time might come when the Soviet Union would have enough atomic weapons for an attempted knock-out blow against American industry. Progress in the development of the hydrogen bomb represents a new factor in strategic plan- ning, as do other scientific projects in related fields. As a result, the most detailed knowledge possible regarding scientific activities in the atomic age becomes a matter of great importance to grand strategy and represents a grave responsibility for intelligence. Indications of Strategies in the Postwar Period After 1945, disturbing reports from Soviet zones .of occupation revealed that these areas were being drawn into the Soviet orbit along the typical lines of Communist-operated countries. The guaran- tees of free elections in the Balkan countries and the promise of the ultimate unification of Korea were brushed aside. Red Army garrisons were re- duced or withdrawn only after communist dom- ination and control of the various coalition governments were assured. The drive for extension of Soviet influence into the eastern Mediterranean, a centuries-old Russian objective, was renewed in several indirect ways. Occupation forces in Iran were withdrawn only in the face of stern threats of action by the United Nations. The Soviet Foreign Minister advanced the proposal of Soviet trusteeship of the former Italian colony of Libya. Pressure was exerted on Turkey to agree to joint control of the Turkish Straits, and Communist guerrilla activities were intensified in Greece, weakened by the Nazi occu- pation, internal dissension, and admitted British inability to provide a stabilizing influence. Amer- ican planes, lost over Yugoslavia, were shot down. It was apparent that Soviet strategy aimed at the exploitation of political and military weaknesses whenever and wherever they could be found. In the light of Soviet intransigence and double- dealing on many major issues throughout the CONFIDENTIAL 114 world, the United States evaluation of this situa- tion was that Soviet domination in the eastern Mediterranean would threaten the independence of other states in the Middle East, vital supply routes through the Suez Canal, and important sources of oil upon which the United States Navy depends for a sizable proportion of its fuel sup- ply. Accordingly, as a counterstrategic move, the Truman Plan was promulgated to provide mili- tary and economic aid to Turkey and Greece. The strategic aspects of this plan were summarized by Walter Lippmann in March 1947: The reason for intervening in Greece and Turkey is that of all places in the world they are the best suited strategically for the em- ployment of American military power to check the expansion of Soviet military power. The power of the Soviet Union is in its inex- haustible reserves of infantry capable of pressing upon its wide land frontiers in Eu- rope and Asia. There is no other power or group of powers capable of mobilizing the troops to hold, much less push back, the masses of the Red Army on land. The power of the United States is on the sea and in the air. This kind of power can be exerted to check the Red Army only if it can be brought within striking distance of the vital centers of the Soviet Union. The obvious and unique strategic approach, as all history proves and the Russians are most keenly aware, is across the Black Sea to the Ukraine and the Caucasus. The en- trance to the Black Sea is in the eastern Med- iterranean through the Aegean Sea and the Dardanelles, that is to say between Greece and Turkey . . . Insofar as we are able to exert American sea and air power in the Black Sea, we have the means of checking the advance of the Red Army westward into Europe. We are on its flank and in its rear, and we are able to main- tain a balance of power, without which serious diplomatic negotiation is impossible. Since the sea and air power of the United States Navy is intimately associated with the strategic situation in the Mediterranean, it follows that Naval Intelligence can and must make a signifi- cant contribution to strategic planning. American success in Greece, strengthened rela- tionships with Turkey, and the deviation of Tito from the Moscow orbit have all combined to serve the strategic purposes of the United States. How- ever, it should be pointed out that there is still Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL little room for complacency or undue optimism. The oil supply was cut off from Iran in 1951 and the unstable government of that country is seri- ously threatened by Soviet subversive efforts; while, at the same time, the nationalistic aspira- tions and racial prejudices of the Arab peoples throughout the Mediterranean basin are being ex- ploited as a means of weakening the position of the United States, Great Britain, and France in that area. This development has been particu- larly serious in that it poses a threat to the chain of United States strategic air bases located along the North African coast. In the fall of 1952, the purging of presumably dissident elements in Czechoslovakia appeared to be serving the double purpose of stabilizing Communist control in that country and appealing to the anti-semitic preju- dices of the Arab world. In view of the general unrest, the United States Gth Fleet has played a major strategic role in the Mediterranean, show- ing its flag in ports from Trieste to Istanbul, thus bolstering local confidence and deterring overt Soviet action. The Soviet land blockade of Berlin in 1948-49 represented a major test of strength. Although the airlift was very costly to the western democ- racies, its strategic significance was tremendous. In the first place, it showed that the United States was not ready to be driven out of Germany; and, even more important, it strengthened the will of the Germans and other peoples of western Europe to resist Soviet aggression. Economic support to the anti-Communist nations of western Europe further aided United States interests, while influ- ence was effectively applied in support of anti- Communist political parties in a series of crucial national elections in France and Italy. In Asia, Communist control was gradually ex- tended over all of China, with the exception of a few offshore islands and Formosa. Even inacces- sible Tibet fell under the domination of the Com- munist government in Peking, thus posing a po- tential threat to India. The control of China, plus that of Sakhalin and the Kuriles, gave the Soviet Union the strategic initiative in Asia. Not only did it make possible the application of strong pressures on the large resident Chinese popula- tion in many areas of the Far East, but it also pro- vided a strategic support base for guerrilla war- 115 fare and Communist encouraged nationalist re- volts in Indo-China, Malaya, Burma, and Indo- nesia. The strategic position of the United States in the Philippines, Okinawa, and Japan was im- mediately threatened. If Soviet influence were extended to Southeast Asia and the Persian Gulf area, India and Pakistan would be in a very pre- carious position. Faced with mounting commitments all over the world and with Soviet pressures exerted at many points from one extreme of the Eurasian continent to the other, the United States did not have ade- quate military or political strength to support its commitments fully or summarily resist all pres- sures. In Japan, for example, in June 1950, there were only four inexperienced American divisions, all understrength, engaged primarily in routine occupation duties. When the military blow was finally struck in Korea, the United States was un- prepared to support the political integrity of that country. However, its strategic significance re- sulted in action by the United Nations. The Korean war, from the strategic point of view, has indicated on the one hand that World Communism will resort to military force to achieve its objectives when other means prove un- successful. On the other hand, it has shown that the United States will employ the most vigorous defensive measures to halt Soviet penetration and control of the coastal littorals of Asia. An exten- sive rearmament program has been initiated in an effort to attain military strength consonant with world commitments and adequate to deter the mil- itary power which the Soviets have maintained and increased since World War II. In this re- spect, the war in Korea may eventually prove to be an event of tremendous consequence to the na- tional welfare and security of the United States. This brief review of postwar strategies shows that planning and intelligence are closely linked, for Intelligence must provide the knowledge for the planners. It must aid in the assessment of Soviet actions wherever they take place and pre- pare realistic estimates. Timing and method are of tremendous importance. Are the Soviets pre- pared to exert military force in several areas, and, if so, where and when? Will they continue to hope for military, political, and economic decay in the western democracies, or will they strike CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS while their military strength is relatively sups. nor? Do they feel that the extension of their influence by nonmilitary means is fast enough, or will they decide in favor of open war even at the risk of the atomic destruction of their population centers? A great number of diverse elements are involved in finding answers to any of these ques- tions: the progress of Soviet technology, the tem- perament of individuals in the Kremlin, increased exploitation of natural resources, the morale of the peoples of western Europe, and economic problems in all parts of the world. To find the right an- swers, the resources and skills of the personnel of all United States Intelligence agencies will be taxed to the utmost. IMPLEMENTATION OF STRATEGY In an effort to prepare neat definitions, much has been said and written on the subjects of strat- egy and tactics, although the nature of modern warfare has led to the inevitable conclusion that the differences between the two cannot be drawn as clearly today as they were formerly?just as the distinctions between war and peace are no longer clear-cut. Tactics, as a military term, re- fers to the employment of units in combat and to their ordered arrangement and maneuver in rela- tion to each other or to the enemy. In connection with the employment of the nonmilitary factors of strategy, tactics is simply descriptive of the various implementations of a nation's master plan. Strategy and tactics are directly related to strate- gic intelligence and operational intelligence, the meanings of which have been discussed in chapter 1. In brief the intelligence officer, in his perspec- tive of the world scene, must recognize that strat- egy is the forest, tactics are the trees, and neither has meaning without the other. He must not only understand the relationships between world events as they occur, but also be able to predict how an enemy may react in a given situation. In con- sidering the matter of tactics, he must realize that although operations may vary in size and intensity, they are always designed to further the strategic plan and national objectives. Thus far it has been emphasized that intelli- gence materially serves strategy, and that it has an important responsibility in assisting the im- CONFIDENTIAL plementation of strategy by non-military means. In a tactical or operational military situation in- telligence plays an equally significant part. Here, the intelligence officer must have a professional competence in matters relating to military opera- tions and their component elements. This involves knowledge of the characteristics, capabilities, and new developments of ships, aircraft, weapons, technical equipment, personnel, and materiel, to- gether with procedures, methods of employment, and techniques. His professional competence will be further increased by study of the art, theories, and history of warfare. Principles of Warfare The Principles of War, or general truths adopted as guides for action, are based upon the writings of theorists and the experiences of suc- cessful military men from ancient to modern times. The many books on this subject merit the attention of intelligence officers, because they are basic guides to the organization, maintenance, and application of all types of military forces. These principles influence tactics, and an understanding of their application gives greater meaning to the procedures involved in developing operational sit- uations. They can serve as a check-list for analyti- cal purposes, but it must be remembered that they cannot be considered individually since they are all closely interrelated. The Principle of Objective emphasizes the need for relating all tactical objectives to national ob- jectives and has been mentioned in the preceding discussion. The Principle of Offensive means concentration of all possible effort toward obtain- ing the objective by successful offensive action; it is based on the truism that military victory can only result from offensive action. An offensive has the advantages of initiative and freedom of action, and compels the enemy to disperse his strength, thereby limiting concentration of forces for effective action. Finally, an offensive raises the morale and determination of both the fighting force and the supporting civilian force; while, at the same time, it may effectively lower the morale of opposing forces. Defensive action is not con- sidered a principle of war, because it is tolerated only for purposes of security or for gaining ad- vantages leading to ultimate offensive action. 116 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL The Principle of Mass includes a concentration of combat power, proper timing and placement, a sufficient number of personnel who are carefully trained and thoroughly indoctrinated for preci- sion work, the availability of weapons and mate- riel for fire power in adequate quantity and of proper quality, and the facility to move both men and materiel as required. Accumulative mass is based on a systematic plan and timetable to re- duce the enemy's power of resistance effectively. To the physical shock effect of mass attack must be added the psychological effect in creating anx- iety and fear in the minds of both troops and civilians. Related to this principle is that of the Economy of Force which directs the distribution and alignment of forces for combat to achieve de- cisive results. This principle does not mean the saving or non-commitment of military force. Marshal Foch once made some pertinent com- ments on this subject: There is a proverb which says you cannot hunt two hares at the same time. You would catch neither of them. Efforts must be con- centrated. Those who would say economy means sparing one's own forces being careful not to disperse one's own efforts would only state part of the truth. Those would come closer to the truth who could assimilate the other art of knowing how to expend usefully and profitably to make the best possible use of all available resources. The appropriate distribution of force reduces the element of risk; forces are not committed to battle before sufficient strength has been gained to in- sure success. This principle acts as a check and a balance on the others. The Principle of Movement concerns the mobile qualities of combat units and their proper and prompt logistic support; it conditions and limits the principles of offensive, mass, and economy of force. Mobility involves not only the speed, range, and maneuverability of equipment, but also the ability to transport combat units as entities with a minimum loss of time. The security of lines of movement becomes a vital factor in a successful operation. For example, in the North African campaign of World War II, logistic support was denied the Nazis by Allied naval and air forces which sank German ships and shot down German transports which were attempting to bring in addi- tional troops and materiel. This principle largely determines the possibility of Surprise which is an- other principle of war. The employment of sur- prise permits the more effective use of combat forces when the enemy is unaware of the time and place of their impending effort. Surprise is often possible as a result of security, rapidity of move- ment, deception, and the audacity of the com- mander in striking under conditions which appear unusually difficult and therefore unlikely. New weapons and new or different methods of making use of current weapons may also make surprise possible. Obviously, surprise can magnify the effects of an offensive or a mass attack. However, advantageous as surprise may be, it must be kept in mind that the enemy may employ it too, so that all preparations must be taken to guard against surprise. The Principle of Security is applicable in times of peace as well as war and is closely associated with the warning function of intelligence and the activities of counterintelligence. In an opera- tional situation close attention must be given to such matters as camouflage, dispersion, antiair- craft weapons, radio and radar countermeasures, early warning networks, and defensive armament. The Principle of Simplicity recognizes the great importance of clear-cut military organization and easily understood administrative procedures in order to obtain the greatest degree of cooperation and coordination. Simplicity reduces to a min- imum the possibilities of faulty execution through misunderstanding and makes easier the handling of an unexpected situation. Clarity in command responsibilities and relationships and the publica- tion of Standard Operating Procedures contribute to the required simplicity of military operations. Confidence, a minimum of confusion, and a max- imum of efficiency are qualities which can be de- rived from careful attention to this principle. The Principle of Cooperation provides for unified ef- fort toward a common goal; unified command, joint training, economy of joint effort, and self- lessness of interests are all contributory factors. 117 World War II Battles in the Pacific The use of intelligence for operational purposes is discussed in detail in later chapters, but in order to assess the part played by intelligence in the im- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS plementation of strategy, a consideration of spe- cific operations which took place in the Pacific during World War II is most helpful. The suc- cesses and the failures of the opposing forces were directly related to the effectiveness of their re- spective intelligence efforts. For the attack on Pearl Harbor the Japanese commanders were provided with intelligence which was amazingly complete, accurate, and usable. The contribution of intelligence to their success is well summarized in the United States Strategic Bombing Survey, Japanese Military and Naval Intelligence Division: The shocking success of the Japanese attack on Pearl Harbor was due to careful planning based upon nearly complete intelligence as to the position, movements, and strength of United States forces in the area . . . The Japanese had a large amount of de- tailed information concerning United States fleet units, air strength, and other military in- stallations at Pearl Harbor which was put to effective use in the surprise attack. After the raid, crashed Japanese planes and a beach midget submarine yielded annotated charts and other documents which set forth the United States situation in fairly accurate The midget submarine had on board a United States Navy hydrographic chart which had been used as a track chart for the sub's intended transit of the harbor. It was annotated with detailed navigational data, with the names and positions of major units expected to be in the harbor, and with the berthing areas of minor units and auxiliaries. Similar intelligence concerning ship anchor- ages? charts for aircraft torpedo runs against specified targets, and data on Honolulu radio frequencies were found in crashed planes. The leader of the first attacking flight, Cap- tain Fuchida, has reported the careful prep- arations which accounted for the effectiveness of the attack. The attacking pilots were briefed on 23 November, 3 December, 7 De- cember, and at a final session two hours before the attack on 8 December (Tokyo time). At the briefing the day prior to the attack, the re- vised estimate of the major units at Pearl was announced as no carriers, 7 battleships and 7 cruisers. Actually there were 8 battleships and 8 cruisers. At the final briefing, the pilots were given mimeographed sheets indicating? with names in most cases and with substan- tial accuracy?the probable positions of the CONFIDENTIAL 118 warships berthed around Ford Island and at the Navy Yard. Conditions affecting the United States Forces during the period immediately following the at- tack are discussed in the Report of the Joint Com,- mittee on the Investigation of the Pearl Harbor Attack : While it appears that some planes under Navy direction were assigned to search the sector to the north of Oahu, generally re- garded as the dangerous sector from the standpoint of an air attack, they were diverted to the southwest by reason of a false report that the Japanese carriers were in that direction. Admiral Smith, Chief of Staff to Admiral Kimmel, said he did not get the information as to the probable location from which the Japanese carriers launched the attack for some 2 days. There is a great deal of con- fusion including false civilian reports of troop parachute landings and a false report from one of our own planes concerning an enemy carrier to the south. A chart showing the position of the Japanese carriers was taken from a Japanese plane by the Army on De- cember 7 but was not shown the Navy until the afternoon. The deplorable feature of the action follow- ing the attack was the failure of the Navy and Army to coordinate their efforts through in- telligence at hand. The same Army radar unit that had tracked the Japanese force in, plotted it back out to the north. Yet this vital information, which would have made possible an effective search, was employed by neither service. The situation in connection with the Japanese occupation of the Philippine Islands was some- what similar. Here again, accurate intelligence regarding American forces on Luzon made pos- sible effective operational planning, which was coupled with the element of surprise. The Jap- anese estimate of the situation in the Philippines proved to be substantially correct and their forces enjoyed early and economical success in spite of the fact that the United States ground forces main- tained organized resistance longer than had been anticipated. The basis of Japanese success in this operation was the destruction within a week of American air strength by the Japanese 11th Air Fleet based in Formosa. According to information brought Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 AN INTELLIGENCE PERSPECTIVE IN A CHANGING WORLD CONFIDENTIAL out by the interrogation of Vice Admiral Shirai- chi, then Chief of Staff of the 2d Fleet, and of Captain Takahashi, then on the 11th Air Fleet Staff, the Japanese began their attacks on 8 De- cember with almost exact information regarding the strength and disposition of the American air forces. Making use of surprise, the invaders were able to destroy most of the American planes on the ground. This vital information was obtained by reconnaissance aircraft on 24-25 November which reported 300 planes in the Luzon area?there were actually 317. Prior to the Battle of Midway in mid-1942 there was a tremendous decline in the efficiency of Jap- anese Intelligence, with the result that the Jap- anese commanders entered into this battle with an abysmal lack of anything approaching accurate knowledge. The Japanese Estimate of the Situa- tion, discussed in the ONI Review for May 1947, included the following specific points: (1) Al- though the U. S. Navy "lacks the will to fight," it will counterattack if Midway is occupied; (2) "The enemy is not aware of our plans ;" (3) the United States has no carrier force in the vicinity; and (4) after attacking Midway by air and de- stroying American shore-based strength, the Jap- anese Striking Force will still have enough planes "to destroy any enemy task force which may choose to attack." On the other hand, the United States forces had available a rather accurate estimate of Japanese plans and preparations drawn up by Intelligence from various items of information derived from many sources. One of the vital decisions of the Pacific War was made by Admiral Nimitz when he accepted the estimate of his intelligence section that Midway and the Aleutians were primary ob- jectives of the enemy. By 23 May, Rear Admiral Bellinger, Naval Air Commander at Pearl, was able to predict the Japanese plan of attack, the composition, approximate routes, and timetable of the forces which were threatening Midway. This battle was a major success for U. S. Intelligence; the "United States Strategic Bombing Survey" comments: The battle of Midway was a notable early occasion where United States intelligence con- cerning the enemy was superior to the enemy's intelligence concerning the United States, thus affording an opportunity to organize and employ our forces effectively and achieve a victory of decisive importance. Just as the Battle of Midway is generally con- sidered to have been a turning point in the war, so it was also a turning point in the intelligence effort. As the war progressed, American intelli- gence increased in quality and quantity while that of the Japanese decreased. The Imperial Staff continued to underestimate United States strength and capabilities and concluded that no major op- erations could be attempted before the end of 1912 because of American naval losses at Pearl Harbor and heavy shipping losses in the Atlantic. These faulty estimates were partially responsi- ble for the success of the Allied counterattack through the Solomons area which marked a change in pace from the defensive to the offensive. The American landings in the Guadalcanal area in August 1942 caught the Japanese completely by surprise at the particular time when they were not prepared to defend the area or to mount an effective counteroffensive. Their difficulties were compounded by two disastrous errors: the first was an initial intelligence report that less than 1,000 American troops were involved in the land- ings, while actually there were more than 19,000, including the 1st Marine Division and two Army battalions; the second was an underestimate of troops required to recapture Guadalcanal, based upon experience in China and in Malaya. Using this inaccurate and incomplete informa- tion, the Japanese made a number of attempts to regain the island with insufficient forces which were destroyed one after the other. In August, 1 battalion was committed and destroyed; in Sep- tember, 3 battalions mounted an unsuccessful as- sault; in October, after the extent of United States strength was realized, a joint Army-Navy opera- tion involving two divisions of 29,000 troops was carried out which also failed. Further attempts were equally ineffective and Guadalcanal was finally abandoned in January 1943. By continu- ing to underestimate the strength of the American forces, the Japanese gave them the invaluable op- portunity to strengthen their position gradually so that each attack was successfully repulsed. The glaring error of the Japanese during the Solomons campaign in underestimating United States strength resulted in a serious weakening of 119 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDEifirved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS their air and naval power by piecemeal commit- ment in a series of ineffective counterattacks. Their best carrier air groups were decimated, and their warship strength in all categories was ma- terially reduced in the long series of naval actions. At the same time, heavy transport shipping losses progressively curtailed their offensive operations, not only in the Solomons-New Guinea area, but later in other areas as well. The effects of this poorly conceived plan of operations in the Solo- mons were far-reaching. Since the carrier air groups had been drawn from the Combined Fleet based at Truk, their destruction made it impossible for the fleet to support Japanese positions in the Gilbert and Marshall Islands either by surface or air action. Before replacements were possible, American forces were able to over-run those is- lands. These persisting losses had a deteriorating effect on Japan's total military strength from which she was never able to recover. At the battle for Leyte Gulf the Japanese naval operation, carried out by means of a three-pronged attack, was planned and executed with almost no intelligence available. In numerous instances in- dividual commanders could not employ their units effectively because of the lack of knowledge re- garding their opposition. The effect on the out- come of the battle is summarized in the United States Strategic Bombing Survey: Investigation shows that a continuing basic weakness in the Japanese position throughout this action was the lack of adequate opera- tional intelligence. This is seen to have con- tributed to their other difficulties and to have compounded them. They were unable to get adequate timely information as to the strength, location, and movements of the United States forces, and as a consequence were operating a large part of the time by guess and chance. The chief cause of the lack of adequate intelligence in this situation was the recurring failure to maintain air recon- naissance, which was admittedly a cardinal weakness. There is no indication that there was any effective Japanese submarine scout- ing in these actions. In this battle, as was later the case at Iwo Jima and Okinawa, United States naval commanders were able to base their operations on much better intelligence regarding the strength, disposition, and composition of opposing forces. CONFIDENTIAL 120 It is true that in the latter stages of the Pacific war the Japanese were able frequently to prepare fairly accurate estimates of impending Allied op- erations; but it is equally true that the number of possible objectives was rapidly reduced as the Allied forces approached their ultimate objective. The campaigns at Midway, in the Solomons, and in the Gilbert and Marshall Islands each reflected progressively sharper drops in the quantity and quality of intelligence available to the Japanese operational commanders. As a result, they were forced more and more to rely on professional spec- ulation which contributed to defeat rather than to victory. From a review of the various Pacific campaigns, it is concluded that intelligence con- tributed materially to successful military opera- tions, while a severe and sometimes insurmount- able handicap was imposed upon the commander who did not have it, or who failed to use it. DYNAMICS OF STRATEGY, TACTICS AND INTELLIGENCE Just as strategy and tactics are formulated in part from the knowledge provided by Intelligence, intelligence activities are likewise affected by de- velopments arising from strategies and tactics. The intelligence perspective, therefore, must have flexibility and the capacity to adapt itself to changing conditions and circumstances. Events can and do take place in the world scene and in operational situations which have a direct and immediate impact on planning, so that Intelli- gence must be prepared to react promptly if it is to make its full contribution. During the course of their long history, British planners have shown a remarkable capacity to make use of changing events, extracting the ad- vantages presented and adapting their plans and policies accordingly. Such a procedure at the higher planning levels might be critically de- scribed as improvisation and opportunism; how- ever, since the British have not deviated from their basic national objectives, its merit has been his- torically demonstrated. In this connection, Churchill has commented: "We assign a large importance to opportunism and improvisation, seeking rather to live and conquer in accordance with the unfolding event than to aspire to domi- nate it often by fundamental decisions." Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 AN INTELLIGENCE PERSPECTIV World War II is replete with examples of the ability of American commanders in the field to adapt themselves readily to changing circum- stances; the ingenuity of the individual American soldier, sailor, and airman has reflected a common national characteristic. American top-level plan- ning in the past has tended to differ from that of the British. In noting this difference, Churchill again has said that "in the military as in the com- mercial or production spheres, the American mind runs naturally to broad, sweeping logical conclu- sions on the largest scale. . . . They feel that once the foundation has been planned on true and com- prehensive lines, all other stages will follow natu- rally and almost inevitably." The approach of American planners has been to prepare several carefully analyzed plans each of which, if selected, will lead to inevitable conclusions. The success of this approach has also been amply demonstrated. In view of the trends of modern warfare, however, it is entirely possible that American planners may now find it advantageous, if not necessary, to make full use of developing situations. Whenever this is true, Intelligence can make a substantial contribution. For the greatest success of their mutual effort, the relationships between policy-makers and In- telligence should be closely scrutinized at frequent intervals. In his provocative article, Intelligence and Policy-Making in Foreign Affairs, Roger Hilsman, Jr., serving with the Joint Military Ad- visory Group in Europe in 1952, has analyzed these relationships and found a division of labor which, in his opinion, may not be the best. Intelligence on the one hand and policy- making and action on the other are separated physically, organizationally, chronologically, functionally, and by skills?separated in every possible way. His suggestion, in part, is a reconsideration of or- ganizational structure. Regardless of what sug- gestions may be offered, it is true that the dy- namics of strategy, tactics, and intelligence can best operate under the most carefully coordinated conditions in an atmosphere of mutual understanding. Attitudes for Intelligence In assuming its share of responsibility, Intelli- gence must maintain a perspective that is positive, 269196-54--9 : CIA-RDP85G00105R000100210002-9 E IN A CHANGING WORLD CONFIDENTIAL clear, and keenly alert; it must never lose sight of its own purposes and objectives as determined by the requirements of those responsible for na- tional strategy and its implementation. In Mr. Hilsman's opinion, . . . the important step for intelligence is an intellectual reorientation designed to create a new set of attitudes?a frame of mind which is manipulative, instrumental, action-con- scious, policy oriented. The major task before the researchers is one of recasting their thought to the context of action, and adapting their tools to the needs of policy. Ultimately, both operators and researchers must move from hunch and intuition to an im- proved capacity for explicit and disciplined policy analysis. If at the same time the re- searchers become policy-oriented, there may develop a more effective integration of knowl- edge and action . . ? The first problem is one of attitudes and skills. ?World Politics, 0 ctober 1952. Although critical, this statement serves a good purpose in that it stimulates a thoughtful con. sideration of appropriate attitudes. Two things merit special attention. The first is that planners must recognize that intelligence is a continuous activity and that planning must be grounded on fact rather than on conjecture. The second, is that Intelligence personnel must con- sider their work in time of peace as important as in time of war, if not more so. General Donovan has appropriately said: It is much more difficult to prevent war than to wage it. It is even more important in peacetime, in a sense, to know what people are up to, and what's going on, so that the peace can be preserved. If you want to have peace in the world, you've got to know the truth of what is happening and not be forced to rely on rumor. Rumor might make us act in one way, and knowledge would compel us to act in another. Shortly after World War I, Colonel Nicolai, well- known German intelligence officer, urged that the peacetime functions of Intelligence be maintained and said, "But if even today certain circles believe that nations can cooperate, they ought to make sure the way of cooperation is illuminated by a good Intelligence Service . . ." Nicolai also summarized the role of intelligence in the world scene when he said: "The Intelligence 121 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Service moves ahead of developments into the dark future, in order to discover what it will be and to influence it." This discussion has stressed the importance of accurate, pertinent knowledge as it relates to the fields of strategy and tactics. The tremendous volume and scope of such knowledge require that CONFIDENTIAL 122 it be reduced, for the sake of manageability, to its logical component parts in order that it may be efficiently collected, carefully evaluated, and made available in usable form. The following chapter will outline by component parts the con- tent of intelligence used by strategic and opera- tional planners. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 5 COMPONENTS OF INTELLIGENCE KNOWLEDGE Intelligence knowledge is generally divided into eight component parts: geographic, transporta- tion and telecommunications, sociological, politi- cal, economic, technical and scientific, armed forces, and biographical. Each part is then often identified as a type of intelligence. While this division is not completely standardized and varia- tions can be debated, it is agreed that no one com- ponent can stand alone. Each is interdependent and interrelated with one or more of the others. In order to gain a proper perspective when using this knowledge, all parts must be integrated into a well-balanced whole. In connection with use, two points must be em- phasized: first, for purposes of planning and reaching decisions at almost any command level, the user can seldom confine himself to only one component; and second, depending upon the par- ticular problem at hand, he will usually select various items from different components in deter- mining the best answer. In other words, point of view and particular needs govern the use of in- telligence knowledge and the parts thereof. In estimating the capabilities of an opposing military force, for example, the commander must know more than its size and fire-power, as gained from enemy order of battle reports. He must also be informed of the enemy's economic and technical resources and the personal characteristics of op- posing commanders and personnel. Under some circumstances, political and social forces govern- ing enemy behavior may be important. Thus knowledge not encompassed by the category of Armed Forces Intelligence may be of inestimable value to a subordinate command in carrying out its assigned task and represent a vital saving in time and lives. An Underwater Demolition Team is greatly aided by advance geographic knowledge regarding such matters as beach gradient; avia- tors need meteorological data as well as target information; and those responsible for logistics require a wide range of intelligence knowledge in 128 order to perform their responsibilities efficiently and economically. Since these various components are mutually supporting, the intelligence officer cannot wisely confine his energies to the mastery of only one, as will be pointed out in the ensuing discussion. GEOGRAPHIC INTELLIGENCE Geographic intelligence is the military evalua- tion of all the geographic factors which may in any way influence a military operation. Military geography embraces all aspects of the physical en- vironment of man, both natural and artificial: the position, size, shape, boundaries, weather, climate, water characteristics, land forms, drainage, vege- tation, and surface materials of all parts of the earth; also the cultural or man-made features such as cities, transportation routes, industries, mines, and farms. Frontiers The problems of location, size, shape, and fron- tiers for a territory are largely strategic. Loca- tion basically affects the economic, political, and social nature of a country because of its relation to markets, to agricultural and mineral resources, to terrain and climate, and to transport. Military problems grow out of the economic, political, and social. Size and shape and frontiers have mili- tary significance, for great size may afford an opportunity to trade space for time. Air power may shrink distances but size will still give min- utes or hours of warning of conventional air at- tack to centrally located industrial sites. On the other hand, size is a weakness when there is waste or undeveloped land that requires expensive long hauls for industry and long military movements of materiel and personnel from one frontier region to another. The shape of a country, of course, determines the relative amount of frontier to be defended. Frontiers have multiple significance. Strong natural frontiers as opposed to artificial CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR ones may tend to isolate countries from other peo- ples and ideas and hamper trade. Purely politi- cal frontiers that shift with the fortunes of war will affect the military and political views and behaviors of nations. Sea frontiers will influence the growth of seapower. The military study of frontiers must consider man-made features such as fortifications and bridges. In a time of cold war, the fact that satellite frontiers have been de- nuded of farms and villages, stripped bare of vegetation at the boundary itself, and protected by electrified wire, mine fields, and patrols with dogs is no small intelligence consideration. In the planning of conventional military campaigns, frontiers may be studied for their tank traps, dragons' teeth, bunkers, and access roads, as well as for their natural physical elements. Topography Land forms, drainage, surface materials, and vegetation, all elements related to topography, are of more than army interest. The general char- acter of continents and islands, even of plains, mountains, and plateaus, are of strategic interest. For example, the broad sweep of the North Ger- man plain across Germany, Poland, and into Russia, as well as the Pyrenees barrier, are of importance in assessing the potentialities of Soviet military advance in Europe. But whether col- lected in strategic encyclopedias or observed in field operations, military concern extends to in- dividual valleys, basins, ridges, cliffs, hills, and other features. In this age of joint operations, all three services are concerned with these elements of topography. Of special importance to the Navy are the detailed characteristics of coasts and land- ing beaches. All these topographic features affect the movement and supply of forces, the types of equipment that can be used, the methods of attack and defense, the possibilities of concealment and surprise, and many other operational matters. Land forms and drainage conditions are so closely related that it is almost impossible to con- sider one to the exclusion of the other. Whether an area is fully or partially drained, the number, width, depth, and direction of rivers and streams, and the condition of their banks and crossing- places, are determining factors in the movements of troops and the tactics employed in any given CONFIDENTIAL 124 NAVAL OFFICERS area. The number, size, and distribution of lakes, ponds, lagoons, swamps, and marshes are elements that may play an important part in military oper- ations. Subsurface water is a principal source of water supply, and in many areas constiutes a ma- jor drainage problem in excavation and construc- tion. In recent years rivers and swamps have many times shaped military actions. Examples are the causeway from Johore to Singapore's back door, the Remagen bridge across the Rhine, the Yalu river, which freezes over to allow troops to cross without bridges, and the Rapido in Italy which was a barrier for so long. Military interest extends to soils analysis as well as to land form. The materials of the surface of the earth determine, among other things, what kind of vehicles can move over it, whether it is suitable for entrenchments, how quickly it will drain, and the effect of frost. Surface materials have a definite significance concerning the con- struction and maintenance of roads, airdromes, and other engineering problems. In addition, in the broader picture, soils affect agriculture, min- ing, and basic transportation routes. There are many regions where seasonal weather changes re- lated to local soils bar virtually all movement ex- cept along established railways and better roads. Japanese ability to honeycomb some of their war- time positions proved to be a major factor in slow- ing the reduction of their military power. This was noted in such places as Iwo Jima and Okinawa where soft rock allowed relatively rapid digging. The coral of some south Pacific atolls proved to be a superb construction material for airstrip run- ways. The muck of Attu rendered inefficient much of our artillery fire in the landing at Massacre Bay. Coasts and landing beach intelligence, of special naval interest, is now becoming so specialized and requires such development that its detailed discus- sion is reserved for the amphibious section of chapter 13. It involves a study of the sea ap- proaches, the coastal terrain, the beaches them- selves, the beach exits, and adjacent terrain. The presence or absence of forests, brush, grass- land, cultivated crops, and other forms of vegeta- tion has a vital effect on military operations. Vegetation may be in either the primeval state or the result of cultivation. In any case, its charac- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL ter, distribution, and seasonal variation have im- portant bearings on cross-country movements, deployment, concealment, and visibility. Local supplies of food, forage, and timber are also re- lated to the nature of existing vegetation. Exten- sive areas of dense vegetation, such as woods and jungles, or the relative absence of vegetation, as in the desert areas, may be a major consideration in strategic and logistics planning. They may result in a need for special types of organization, equipment, and methods of supply. When these areas are not too extensive, they are considered primarily from the tactical point of view. How different were the wars of the Burma jungle with small units filing through the brush and the great armored sweeps of the Afrika Korps and the opposing "Desert Rats" between El Alamein and Bizerte Hydrography Hydrography, and especially its subdivision, oceanography, is of particular naval concern when detailed information is required. Amphibious operations are especially affected by hydrographic considerations. Hydrography, of course, refers to the measurement and charting of all bodies of water; oceanography is concerned more specifi- cally with phenomena of the oceans and seas, in- cluding gulfs, bays, and estuaries. Naval con- cern includes tides and currents, sea and swell, sea water characteristics of salinity and temperature, bottom topography, sediments, and marine life. Knowledge of ocean currents, tides, sea, and swell is important to all ships at sea, but particularly to craft engaged in amphibious operations. The significant and costly effect of a lack of such knowledge is illustrated by the unhappy position of landing craft stranded off Tarawa in the Pacific during World War II when a change in the wind varied the depth of water over offshore reefs and the Marines had to wade ashore in the face of withering enemy fire. The needs for detailed hy- drographic data were again sharply demonstrated prior to the Inchon landing in Korea in 1951, when landing craft had to thread their way through restricted waters to land in a harbor where tides were all-important and the existence of extensive mud flats directly affected the types of landing equipment which could be used. 125 Studies of temperature, salinity, and density of sea water are especially important to the use of sonar in submarine and anti-submarine warfare. Again, in the broader sphere, warm and cold cur- rents strongly affect the habitability of many re- gions of the world. The Gulf Stream makes northwestern Europe important in one sense, while the Labrador current has quite different ef- fects across the Atlantic. The configuration of the ocean bottom, depth of water, type and distribution of bottom sedi- ments are important elements in navigation in- structions and in the location of anchorages. These conditions together with information on reefs, shoals, and other obstructions, help to deter- mine the location of naval bases, and the planning of naval and amphibious operations. Someday when the means are found to exploit the seas for more than fisheries and offshore oil wells, control of marine resources may become a compelling stra- tegic issue. Even marine biology is of naval concern in a variety of ways. Whales or other sea creatures may be mistaken for submarines. Some forms of marine life create enough noise to obscure more significant sounds on the sensitive hydrophones used in submarine and antisubmarine warfare. In a number of parts of the world a ship or snorkel- ing submarine may leave a tell-tale fiery wake be- cause of the bioluminescence from the plankton growing in the water. All military personnel, whether sailing or flying over the seas, or wading ashore in a landing, need some knowledge of the habitat and habits of poisonous or savage marine life. This applies to TJDT's who work in the water and to those involuntarily brought into the water due to aircraft failure or ship sinking. There are stinging jellyfish and some nonedible fish that may poison the unwary, as well as the well-publicised sharks that infest many regions. Aerology Aerology or meteorology refers to the study of the atmosphere, especially its variations of heat and moisture, its winds, and so forth. Weather refers to the meteorological conditions such as wind, temperature, rain, snow, and cloud, that affect an area at a given time or for a short period of time. Climate, on the other hand, refers to the CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR average and range of meteorological conditions affecting an area over a long period of time. In a sense climate is strategic in nature since it af- fects the basic planning of military operations and of course affects the economic and social life of an area through the crops that can be raised and the density of the population. Operations of a military nature frequently must be planned in the light of known seasonal changes of weather based on climate studies. It is impossible to read military history without an awareness of the im- portance of weather to operations planning. The Japanese carriers that hit Pearl Harbor came in behind a cold front with heavy clouds and rain that shielded their approach. General Eisen- hower's Crusade in Europe makes constant ref- erence to aerology and hydrography : There was unusual operational hazard con- nected with the Casablanca project. During the late fall and winter the northwest African coast is a forbidding one from the standpoint of small boat landings. The long Atlantic swells break up on the beaches in terrifying fashion and even in relatively good autumn weather this condition exists, on the average, four days out of five. . . . After the abandonment of the May target date, the next combination of moon, tide, and time of sunrise that we considered practicable for the attack (on Normandie) occurred June 5, 6, and 7. We wanted to cross the channel with our convoys at night so that darkness would conceal the strength and di- rection of our several attacks. We wanted a moon for our airborne assaults. We needed approximately forty minutes of daylight pre- ceding the ground assault to complete our bombing and preparatory bombardment. We had to attack on a relatively low tide because of beach obstacles which had to be removed while uncovered. These principal factors dictated the general period; but the selection of the actual day would depend upon weather forecasts. If none of the three days should prove sat- isfactory from the standpoint of weather, con- sequences would ensue that were almost terri- fying to contemplate . . . When the commanders assembled on the morning of June 4 the report we received was discouraging. Low clouds, high winds, and formidable wave action were predicted to make landing a most hazardous affair. The meteorologists said that air support would be impossible, naval gunfire would be ineffi- CONFIDENTIAL 126 NAVAL OFFICERS cient, and even the handling of small boats would be rendered difficult . . . When the conference started the first re- ort given us by group Captain Staff and the Meteorological Staff was that the bad condi- tions predicted the day before for the coast of France were actually prevailing then and that if we had persisted in the attempt to land on June 5 a major disaster would almost certainly have resulted. Aerology as a science is becoming much more complex because of the heavier demands upon it. Although a physical science, it has so many var- iables that predictions on weather have some of the indeterminate character of the social sciences. We no longer are interested in the "weather" alone. We need to know what conditions are at many different altitudes. Close to the ground much more detail is needed in order to prepare defenses against use of toxic warfare. Aloft flying weather, headwinds, and tailwinds are quite dif- ferent at various altitudes and such reports are routinely required for all flying operations. Now research into weather is extending into the upper atmosphere never before explored, in order to pre- pare the way for turbojet and rocket flight of aircraft and missiles. Collection of weather data in war is so impor- tant that very considerable efforts are made to obtain it. German weather stations were set up in Greenland to give advance warning of condi- tions in the Atlantic and Europe, since weather moves generally eastward. To support our own carrier operations in the Pacific we had to estab- lish stations in Siberia and also in China. Naval Group, China, operated literally hundreds of se- cret weather stations deep behind the Japanese lines to report the weather that later would gov- ern our carrier strikes in the Pacific. Today we would face some difficulties in weather data col- lection from the vast Soviet territories if war were to come. One solution made public is a robot weather station that can be dropped from an air- craft. On parachuting down, it would automati- cally rise on extensible legs, push out an antenna, and broadcast coded radio signals on the weather in the same way as telemetering missiles. Weather reporting is now so technical that trained meteorologists must make detailed fore- casts. But the intelligence officer, being responsi- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL ble for reporting on the area of operations, must have some familiarity with the subject. He must at least be able to read weather maps, station models, sequence reports, and to interpret their meaning. Urban Geography A subdivision of military geography is con- cerned with cities and other cultural factors. The applications of this information are numerous. Strategic targets of factories, transport, and hous- ing need study. Tactics frequently involve seiz- ure of a town, and require detailed information on construction of buildings, possible strong- points, main thoroughfares, power, water, and communications facilities. Later there may be questions of billeting space in what is left. Cer- tainly vulnerabilq. to fire, high xplosive, or atomic attack 9kiley consideration Descriptive Analysis of Military Regions In practically all nations except the very small- est, sufficient variation in geographical character exists to make it impractical to confine a study to the geography of a nation as a whole. Conse- quently, studies are often broken down into re- gions having geographical characteristics which would exert a definite influence on military oper- ations. By definition, a military region is a re- gion of any size in which the combination of geographic conditions is relatively uniform, and, as a result, permits the use of the same types of equipment, organization, and mode of operations throughout the region. These may be areas where mountains, plains, river systems, deserts, indus- trialized areas, or other factors are predominant and thereby establish the nature of the region. Local minor variations in geographical conditions are treated as subregions. In preparing the de- scriptive analysis of a military region, the area is first considered from the over-all viewpoint and then is broken down into appropriate subregions for detailed consideration. This type of encyclo- pedic information used for general military plan- ning usually needs additional detailed analysis and current reporting to meet tactical needs. Preparing Geographic Intelligence The importance of peacetime efforts in acquir- ing the data needed for strategic studies has been 127 emphasized, and this is certainly true of geo- graphic intelligence. Compilation of good charts and maps, painstaking analysis of soil surveys and other data from a variety of sources, and the matching of aerial photographs with existing charts is time consuming work that should go on continuously. Inevitably in war there are new demands and many of these processes must be speeded up. As potential areas of operations be- come actual areas, the emphasis shifts from stra- tegic to operational intelligence. The strategic area studies and surveys prepared by United States Armed Forces in World War II merit special mention here. In ONI, in the Naval Districts and River Commands, and at intelligence centers and joint intelligence collection agencies in operational areas, whole sections of specialists devoted their entire time to the evaluation, com- pilation, and distribution of reports. Often, like the Joint Army-Navy Intelligence Studies (JANIS) , these reports were the result of joint effort. The surveys drew upon many divergent sources for their material. They contained data collected by aerial photographs over enemy territory, often supplemented by information gained from inter- viewing engineers who had built or managed the installations photographed. Beach gradients were calculated from photographs taken from warplanes and even from snapshots taken by tour- ists and missionaries; these pictures were supple- mented by the notes of American geologists, nat- uralists, and conchologists who had worked in the area, and by the reports of friendly natives or guerrillas. New Horizons of Geographic Intelligence The horizons of geographic intelligence have been pushed farther in several directions as a re- sult of technological progress and political change. This of course, as is amply demonstrated else- where in this book, applies to all intelligence. These geographic changes are easily illustrated by reference both to the World Wars and to more re- cent events. World War I was largely fought in traditionally strategic areas, but included opera- tions in places as remote as the Falkland Islands, Tanganyika, the Hejaz, and Cocos Islands. Much more striking were the changes of World War II CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS that took hundreds of thousands of Americans to such unlikely spots as Ulithi Atoll, that make commonplace in American thought the Hump, Kasserine Pass, Eniwetok, and Coral Sea. Cur- rently we have become vitally concerned with new names: Abadan's refineries, Shinkolobwe's pitch- blende, and the oil of Leduc. The turn of events has given America and consequently her Armed Forces heavier responsibilities than ever before. The new technology demands much greater geo- graphical detail and accuracy. The long range guided missile, when it acquires range, command, speed, destructive power and accuracy, must still find the right targets. Since existing charts and maps have errors of many miles in some parts of the world, finding the target becomes a major problem, and constitutes a challenge to the geo- graphic intelligence of the future. Polar Intelligence One of the expanded horizons of geographic in- telligence is in the north polar regions. The old Mercator view of the world of sailing ships has been amplified by polar projections and the realis- tic views of Richard Edes Harrison, well-known cartographer. The fact that the United States and Canada are really polar neighbors of the So- viet Union is a familiar theme both of the Sunday supplements and military strategic estimates. The implementing of plans to meet this new challenge of the air age is a greater task than the mere recog- nition of new problems. An immediate require- ment since World War II has been to collect new geographic intelligence and operational experi- ence on cold weather operations to overcome the admitted Soviet lead in this field. Such opera- tions as Muskox, Frostbite, Icebox, Frigid, and Williwaw in the Arctic, and Higkjump in the Antarctic, have been directed to that end, as have also the daily weather flights from Ladd Field to the North Pole. Our general strategy has been revised to strengthen Alaska, string radar barriers and weather stations in belts across Canada, and to rebuild base facilities in Greenland and Iceland. We have mapped the Arctic, learned to sail in the northern seas, to cross tundra and ice, and devel- oped clothing, fuels, lubricants, housing, and elec- tronic gear suitable to the extreme temperatures and raging storms that are common to the north. CONFIDENTIAL We have also found out with guidance from vet- eran Arctic explorers that operations in extreme latitudes are entirely possible with proper prepa- ration. Though the likelihood of large land cam- paigns in the polar area is not great, the extension of aircraft range and the advent of guided missiles make it imperative that intelligence officers have an awareness of the new problems of Arctic war- fare and their influence on strategy and tactics. The Arctic cannot be defined by merely drawing the Arctic circle around the globe at latitude 66?30'. A more descriptive line is the northern limit of trees, above which there is only tundra or ice. Below this the subarctic begins, and in- cludes the northern limit of cereals, the continental taiga of all but southern Canada, much of northern Russia, and certainly the eastern half of Siberia. The low latitude Tibetan plateau is Arctic-type tundra, and winter operations even in the conti- nental forest areas such as the Great Lakes, St. Lawrence Valley, Hokkaido, the Baltic, and Cen- tral Russia, involve "Arctic" problems for mili- tary purposes. The topography of the Arctic varies from the broad plains in Russia, parts of Siberia, and around Hudson Bay to the high plateaus of Green- land and Tibet, and towering mountain ranges. often poorly mapped, in the Yukon, Alaska, northeastern Siberia, Kamchatka, the Himalayas, Pamirs, Altai, and Hindu Kush. The Antarctic, largely ice covered like Greenland, includes high plateaus and towering mountain ranges in some areas. Drainage is a major geographical factor in the Arctic. Many of the greatest rivers of the world, such as the Mackenzie, Yukon, Ob, Yenesei, and Lena, are not only Arctic but flow in a generally northerly direction. Many major rivers of China, Southeast Asia, and India-Pakistan have their sources in Tibet. Overland travel in the Arctic is generally easier in winter than in summer, for tractor trains can travel on the frozen rivers. With the coming of summer the river mouths to the north are still frozen while the southerly reaches thaw and overrun the banks to form vast lakes in the valleys. Canoes with portage from one body of water to the next are a principal means of transport. The frozen surface of winter turns into an impassable bog for tracked vehicles 128 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL in the summer because the frozen subsoil prevents adequate drainage. Roads or railways built across such terrain need new ballast season after season and even so trains frequently are derailed. The epic struggle of the Canadian Government in building the Hudson Bay Railway to Port Churchill is an example of transport difficulties. Coasts and landing beaches in the Arctic vary from those which are eminently suitable in all re- spects for amphibious landings to those which are impossible because of forbidding overhanging cliffs. Most are open and exposed, although Greenland, Iceland, and Norway have deep fjords. By our definition the true Arctic areas are de- void of forest cover. Some are glacial like the interior of Greenland, northern Baffinland, North- ern Novaya Zemlya, Ellesmere Land, and Ant- arctica; more are tundra that offers no real cover, but in the summer may include edible berries and a profusion of wild flowers. The subarctic's forests are scrub growth and often extremely diffi- cult of passage either for vehicles or men on foot. The hydrographic conditions of the Arctic are of special naval concern. In contrast to the con- tinental land mass at the South Pole surrounded by shelf ice and stormy seas, the Arctic is a shal- low sea basin surrounded by land with entrances at Bering Straits, through the northern Canadian archipelago or from the Atlantic approaches near Greenland, Spitzbergen, and Novaya Zemlya. The great ice pack is virtually impassable to ships. Those caught in it, if they escape destruction, over a period of many months may move hundreds of miles with the clockwise drift of the ice and emerge at another point. Due to the pressures of current and wind the ice piles in ridges and irregu- lar masses. A few parts of the pack are flat and thick and the possibility of using them as floating air bases has been exploited by both the Russians and ourselves. Winter shore ice builds out from bays in virtually all of the Arctic Ocean to meet the permanent ice pack and also closes much of Bering Sea, the Sea of Okhotsk, Hudson Bay, the Baltic and even parts of the Caspian and Sea of Azov. Icebergs from Greenland's fjords move far south and constitute a hazard in the North At- lantic shipping lanes. The classic example was the Titanic disaster. In the short summer season cracks open in the 289196-54 ---10 129 ice pack near shore, and ships may be able to make their way through the northwest passage around North America and the northeast passage around Eurasia. Usually, such ships are specially strengthened, are of shallow draft to allow them to use the primitive ports, and are preceded by powerful icebreakers to clear the way. Aerial reconnaissance minimizes the chances of being caught and crushed, but a change in the wind may often bring that threat. Amphibious landings can be quite difficult if ice close to shore will not support heavy equipment, or if storms have blown up a great barrier of tumbled ice on the beach. A sudden storm may trap both big ships and landing craft by driving the ice pack toward shore and thus removing the frequently limited open water. The life forms found in the Arctic are of special interest to men awaiting rescue. In the extreme north there may be polar bears, walrus, and seals, but the interior of Antarctica offers little. Es- kimos manage to live in good health on meat and blubber, and so can military personnel if it is necessary. Farther south there are many small animals, fish, and in summer birds that can be trapped or shot by the trained men. It is the weather of course, that offers the great- est challenge to military operations and survival. The temperature range is from over 90? F. in the summer in the Yukon Valley to a winter ? 90? F. in northeastern Siberia. In the subarctic, summer is a time of torment because of flies and mosquitoes. Snow and fog may cut visibility for many days or weeks on end, affording cover but also limiting travel or navigation. The aurora borealis (or australis at the south pole) restricts radio recep- tion. Compasses are unreliable and it is to be remembered that the magnetic poles neither coin- cide with the geographic nor are they entirely fixed. Daylight and darkness conditions, reach- ing the extreme of 6 months of day and 6 of dark have important implications both for observation and for morale. In winter cold, all human move- ments are slowed by the protective clothing worn. Logistics needs are increased by the kind of hous- ing required and the greater quantities of fuel and food consumed. Urban geography of the Arctic is largely Soviet, for the only cities of importance in the area are CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Russian and Siberian. They have tried to develop mining, lumbering, and commerce along the north- east passage as well as building military bases. Aside from some Alaskan and Canadian mining and trapping, and the new military bases, perhaps the most important economic development in the free world Arctic has been the uranium discoveries near Great Bear Lake. In the approaches of the Antarctic it is the international rivalries of the whaling industry that are of particular interest. In summary, the great circle routes across the Arctic represent the most direct flight lines for strategic bombers and guided missiles to reach the key populated and industrial regions on earth. The Arctic then is of great concern for aviators who must navigate across it and who may be forced down in it. It is of further concern as an area for detection and interception of such air strikes. It is also an area rich in mineral resources awaiting exploitation. Finally, it requires continued study as a route of travel and invasion by military forces. Its problems are being solved with growing skill, ingenuity, and confidence. The requirements of its climate have produced new developments in housing and weapons. TRANSPORTATION AND TELECOMMUNICATIONS INTELLIGENCE A second major component of intelligence knowledge is that of transportation and telecom- munications. Information about these facilities in all parts of the world is needed for planning both our strategy at the highest echelons and tac- tics at lower command levels. All forms of such intelligence are used on occasion by the Navy, even though other agencies collect and process much of the information. Ports and Harbors Port and harbor intelligence includes every con- ceivable type of information on these facilities. Harbors refer to natural locations that may be used as anchorages by ships or as protection and setting for man-made port facilities. Harbors may be bays, rivers, or combinations of both. When a port completely lacks protection and shoreside berthing facilities, it is called a roadstead. Some ports have been created by means of artificial har- bors. In the broad sense, a port includes not only CONFIDENTIAL 130 the piers and wharves used by shipping, but also all the transfer, storage, and land transportation facilities used in connection with shipping. In fact a port area includes frequently a considerable tributary area with manufacturing, fuel and water facilities, banking and customs houses; that is, the whole range of the appurtenances of modern commerce. Sources of information on ports are numerous. Naval observers, as described in chapter 9, can col- lect some port information. Commercial steam- ship companies collect much information, too, for their own operations. Individual masters and sometimes crew members make reports to their governments as needed to supplement collection. There are various chamber of commerce and port commission studies available for the asking, as well as tourist guides, foreign government maps, com- mercial photographs, and data from business houses supplying foreign orders. All are useful sources of information. Port data are so complex and detailed that most naval powers prepare specific port studies on in- dividual foreign ports. This is a Navy responsi- bility in our country, but the Navy is not the sole user. The Army needs such data for establishing ports of embarkation. The Navy needs to know what servicing facilities would be available to the fleet. Some foreign ports are studied for their military or commercial importance and vulnerabil- ity to attack. During wartime the individual uses of ports may give many clues to the enemy's activities. Shipping Ocean shipping is the principal means for the bulk movement of freight internationally. It is characterized by the large tonnage carried by in- dividual ships at very low ton-mile costs, fre- quently over very great distances. The routes most vital to this commerce of the world are: (1) the North Atlantic from Canada and the United States to the English Channel, North Sea or Medi- terranean areas; (2) the Suez route through the Mediterranean to India, Australia or the Far East; (3) the South Atlantic route from Europe and North America to Argentina; (4) the South Africa run from Europe or North America to South and East Africa with extensions to Aus- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL tralia and Indian Ocean points; (5) the trans- pacific routes from North America to Asia; (6) the Panama routes linking many continents and several coasts. A handful of countries build most ships and these same countries are the principal operators of substantial numbers of ships. The United States, Britain, and Norway are the three big operators, though in time Japan and Germany may regain their former positions. The Navy is concerned not only with the areas where ships operate and with the total carrying capacity of various merchant fleets, but also with the building capacity of various shipyards and the repair facilities. Because of its operational and strategic needs, it must also know the speed, age, tonnage, dimensions, appearance, fuel, draft, ownership, location, and use of every individual merchant ship in the world. Collection of most shipping information is largely a matter of organization and thoroughness, and most of it can be derived from regular com- mercial information services. Lloyd's Register provides ship particulars and Lloyd's List gives vessel movements. A series of trade journals in Britain, the United States, France, Japan, and other countries report building, give vessel plans and pictures, discuss trends in chartering, marine insurance, rates, conference agreements, and so forth. It is only the Iron Curtain countries which hide or disguise their shipping information thus requiring other nations to take special measures in order to develop comprehensive worldwide re- ports on merchant vessels. Shipping intelligence has many forms. It may be absorbed into other intelligence as a part of a larger subject. Summary statistics of all sorts are prepared, and card indexes of vessel activity and large wall plots showing estimated location of all vessels are used for operational purposes. The uses of shipping intelligence are many. Any blockade operations require detailed ship movement information together with manifest data. Protection of shipping against submarines and aircraft requires location data. When an H- bomb hidden in a nondescript neutral freighter becomes a possibility, shipping intelligence needs will be further increased. Railways Since railways represent the principal arteries of land transport and have the greatest tonnage capacity for movement overland from place to place, they are of considerable military interest. The Transportation Corps of the Army is chiefly responsible for collection and processing of land transportation data. Essential informational needs include detailed maps of the lines, descrip- tions of bridges and tunnels, a working timetable, a gradient profile chart, and lists of motive power and rolling stock. Even though a railway may seem relatively static, its capacity is affected by many factors: the maintenance and improvement of the right of way (including ballast, ties, rails), the addition of automatic block signals or train control, the realinement of track to ease ruling grades and reduce curvature, the strengthening of bridges, the switch to new motive power such as dieselization or electrification, and the traffic load with its seasonal and directional differences. Data may come from newspaper stories, the order books of equipment manufacturers, trade statistics, and trade journals such as the Railway Gazette published in London, which is the best for world coverage. Information from behind the Iron Curtain is harder to obtain, but there are publicly announced 5-year plans, radio broadcasts of new construction and attainment of traffic goals, and the reports of refugees. The use to which such information is put varies. It may contribute to a strategic estimate involving a country's capability to meet overall war require- ments or provide specific data concerning the coun- try's ability to move forces to a particular front. The Navy is interested in many details on rail- ways, arising out of such matters as the movement of landing craft or submarine subassemblies over particular lines that may or may not have limited clearances. Preliminary to an amphibious land- ing the Navy may have air support missions which will include selecting railway targets such as tun- nels, bridges, and yards. For both amphibious and land operations, similar targets are sometimes involved in connection with naval gunfire support. The success of naval ships in providing gunfire support to land operations during the Korean War illustrates naval use of intelligence regarding both railway systems and roads. 131 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Roads Roads generally serve as feeders to railway lines, although in a few parts of the world they constitute an independent, fairly usable network. They have the military advantages of reaching more places than railways and being more flexible in alternate routes. If trees block a road, vehicles occasionally can drive through fields around the obstacle. Most military transport organic to land units is intended for road use. In most foreign countries roads are typically poor by American standards, having a low tonnage capacity and a rapid deterioration rate. Maintenance thus be- comes a problem when they are used for heavy military traffic. Road maps are available in most foreign coun- tries, but they are frequently inaccurate, and their condition is subject to change with the seasons. Road reports should not only describe the seasonal condition of roads, bridges, and shoulders, but should also note the availability of surfacing mate- rials, local labor, and repair machinery. Bridges, steep grades, and narrow single lanes are typical limiting factors to the usefulness of a road. Pipelines The bulk movement of petroleum, gas, and water is increasingly being accomplished by pipeline. Modern technology permits the dispatching of several different products in succession through a line with metering, sampling, and water plugs to keep each one separate. A recent development is the use of radioactive isotopes to identify particu- lar shipments by Geiger counter. Pipelines represent a mass means of delivery relatively free from interference by weather. Underground lines are reasonably safe from at- tack, but the pumping stations, storage tank farms, and other surface installations remain vulnerable points. Pipelines may have more than economic signifi- cance. Some United States lines, for example, represented a countermove against German sub- marine attacks. Others in Burma, France, and Alaska provided direct tactical support. Aerial reconnaissance will usually reveal the construction of new lines, but lacking that opportunity, infor- mation on the manufacture and delivery of the necessary pipes and pumps will give many clues. CONFIDENTIAL 132 Inland Waterways Inland waterways in many foreign countries are a major element in the transportation system. Their usefulness depends upon their general loca- tion and direction of flow. The current, control- ling depth, turns, constancy of channel, subjec- tivity to freezing, bridge clearances, and cargo transfer facilities are important details. Reports on foreign waterways are processed primarily by the Army Transportation Corps, and the sources of information are official documents of foreign governments and direct observation. From them are obtained answers to logistics questions. Aerial mining of waterways, and destruction of locks or dams by bombing can be made possible through adequate intelligence. Aviation Civil aviation rightly comes under the general cognizance of air intelligence. Although avia- tion competes with railways only in countries where railways are lacking, it is important to know the role it plays in the rapid movement of critical freight and personnel. Today, airlines under many flags not only blanket their home countries, but extend internationally into far reaches of the earth. Thus they also provide a unique instrument for observation and collection of information. Our own widespread aviation interests are in a position to report on foreign aviation progress everywhere this side of the Iron Curtain. Trade journals in many languages are likewise extremely helpful. We are interested in new transport air- craft performance and production, the frequency, reliability, and control of air lines, the provision of navigation aids and. airfields, and the training of personnel. In time of war or other emergencies, commercial aircraft and aviation facilities play important auxiliary roles. The degree of subsi- dization of aviation may give clues to intended use. Deutsche Lufthansa went so far as to con- vert "commercial" Ju-52's into bombers and para- troop transports when war came. Italy's commer- cial air service to Rio de Janeiro reported ship movements off Brazil to German raiders in the early days of the war. Considerable aviation intelligence is assembled in convenient form by such unofficial yearbooks as Jane's All The World's Aircraft. The Navy's Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL own large interests in aviation make all such in- telligence of considerable interest. Telecommunications Telecommunications include telegraph, tele- phone, radio, television, cable, and all related serv- ices and equipment. Each type of signal has its own advantages and disadvantages of cost, avail- ability, secrecy, range, number of channels, and so forth. While the National Security Agency is the agency with direct cognizance over intelli- gence in this field, earlier references to the collec- tion of intelligence from communication sources indicate the importance of such information to all branches of the military service. The interruption of communications in any mod- ern state, especially a highly centralized one, can bring its national life to a standstill. Such sys- tems thus become prime targets in war. Further, an understanding of the various channels of sig- nal traffic is basic to maintaining the security of classified information. Therefore, knowledge of a nation's telecommunications is helpful for a variety of purposes. Information on world systems comes from such sources as trade journals, records of purchases of new equipment from leading manufacturers, and, of course, observation and the piecing together of many bits of information. SOCIOLOGICAL INTELLIGENCE Sociology is the study of man and his human environment. It deals with all the phenomena arising out of the group relations of human beings. There is still some disagreement whether sociology has reached a stage of development which would entitle it to rank as a science, but it is uniformly recognized that the methods used in sociological research and the conclusions reached may be strictly scientific when based on extensive observa- tion and careful analysis. In the introduction to this chapter it was stated that no one of the eight components of strategic intelligence can be considered alone; they are all interdependent and closely interwoven. This is particularly true of the sociological component which is closely allied to the geographical, politi- cal, and economic, and which strongly affects armed forces, particularly with relation to man- 1,33 power. The cultural traditions of a people and their intellectual achievements based on a sound educational program, have tremendous effect on their scientific capabilities. Sociological assess- ment of a nation also embraces anthropological and psychological factors. The aspects of sociological intelligence which are important to military planners are those which determine the military potential of a nation, but the analyst will soon find that his task is in no way restricted. True interpretation must weigh all facets of sociological significance, and it is im- possible to ignore any of them. The importance of sociological intelligence has never been more clearly evident to Americans than in recent years, for the understanding of foreign peoples has become essential to the successful ad- ministration of American aid programs all over the world, both civil and military. Throughout their service careers naval personnel visit many foreign ports, and those on special naval missions, stationed at bases abroad, and on attache duty are intimately associated in their daily life, profes- sionally and socially, with people whose culture, customs, and traditions are different from their own. An appreciation of the forces and factors which govern the behavior of foreign peoples is therefore a prime objective of sociological intelli- gence. All naval officers, and particularly those in intelligence activities, can with profit be avid stu- dents of sociology as it applies to the assessment of the capabilities, vulnerabilities, and probable courses of action of a foreign country. The sociological component comprises the fol- lowing major considerations: Population; charac- teristics of the people; religion, education, and public information; morale and public opinion; health and public welfare. A brief examination will be made of the significance of these elements in sociological intelligence. Population Intelligence on the population of a country is much more than a mere numerical count. To be valuable it must provide data on density and geographical distribution; classification by age groups and sex; growth or decline; immigration and emigration; future trends and government policies which affect population problems. Sta- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR tistics are given meaning through interpretation by averages and percentages, and by comparison with familiar standards. Populations in many countries of the world since World War II show marked departure from the patterns of past dec- ades, and it has become increasingly important to obtain up-to-date information before coming to any conclusions. Lt. Col. Robert C. White makes some pertinent observations on population change in an article entitled "Sociological Factors in Strategic Intel- ligence" published in the Military Review, No- vember 1949: From an intelligence standpoint, it is the increase, stability, or decline in the size of a population upon which we first focus our in- terest. The future size of the population of a foreign nation may be of more importance to us than its present size. Knowledge of future size will help us keep our estimate of a foreign power's war potential correct. Consider what has been happening to the world's population in the past 150 years. We are living in a period of unparalleled (but uneven) growth in the world's population. Since 1800, the population of the world as a whole has more than doubled. This rapid, almost explosive, growth first started in Europe, where the population since 1800 has trebled. The number of Chinese and Jap- anese has increased greatly, also, but their increase did not commence until well after the middle of the nineteenth century. In other regions, the timing of rapid population growth has varied. The clue to rapid population growth is to be found in the changing relationship be- tween birth rates and death rates. Before the Industrial Revolution, high birth rates al- most negated high death rates, and there was little natural growth in population. The ef- fects of the Industrial Revolution?in raising standards of living, sanitation, and health, and therefore in reducing infant mortality and in increasing life expectancy?were felt first in Western Europe, the United States, and Canada. Therefore, the populations of these areas increased rapidly during the nine- teenth century. However, in more recent decades, because of cultural changes, such as the decline of the large family ideal, for ex- ample, there has been a drop in the birth rate. Thus, the margin between birth and death rates has been narrowing. The tendencies in these areas, therefore, is for population to level off, even to decline. With the extension CONFIDENTIAL 134 NAVAL OFFICERS of modern industrialization, sanitation, and. medical care to other parts of the world, this same pattern of changing death and birth rate has appeared. Thus, China, India, the Soviet Union, and other areas more recently affected by industrialization are now in the stage of population growth that was characteristic of Western Europe several generations ago. It is likely that they, too, will in time pass into the stage of stable or even declining popu- lation. The intelligence analyst is also concerned with a nation's labor force and available military man- power. He must know the age-sex distribution of the population, the number of males and females of a given age or within a certain age group. The labor force is found between the ages of 15 and 65, while military manpower can be derived from the number of males between the ages of 15 and 45, with particular emphasis on the 18 to 35 group. There can be considerable margin of error in these statistics if account is not taken of those who may be disqualified for either labor or military service by reason of physical disability. The geographical distribution and density of population are further vital considerations in so- ciological intelligence. The density of population per square mile of arable land has much more in- telligence significance than the density per square mile of total land. The concentration of popula- tion in certain areas of a country is likewise valu- able knowledge. Since, for example, a sixth of the population of Argentina is located in Buenos Aires, destruction of her capital city would be a crippling blow to that country. Population analysis (demography) requires ex- pert understanding of statistical terms and the methods employed in the compilation of data. Progressive countries of the world have govern- ment sponsored census bureaus and keep popula- tion registers, but less than a third of the world's population has ever been officially counted or reg- istered. Some peoples of the world are just not age conscious. An American or European child when questioned will readily report his age to the fine degree of 61/4 or 13 years 5 months. In the villages of the Orient the same question will be greeted with either a blank stare or a smiling: "I don't know." Experiences of World War II in the enlistment of women both in the Armed Forces and on the Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL home front have placed new emphasis upon their contribution to the usable portion or manpower factor of a nation's total population. This brings us to a consideration of the entire situation with respect to labor in the country: wages, working conditions, organization, legislation, and control. The government policies on population control often are responsible in many countries for con- siderable shifts in population. The development of new industries or the exploitation of newly discovered resources can also cause internal move- ments of large numbers of people, and will require reassessment of population distribution. Characteristics of the People In studying a nation's people, the intelligence officer must identify and evaluate those racial, ethnic, and cultural characteristics which are sources of national strength or weakness. He must determine the sociological forces which cause dis- sension among them, resentment against the gov- ernment, or susceptibility to psychological in- fluence from abroad. The latter will be discussed fully in the section of this text entitled Psycho- logical Operations. Race and nationality are not synonymous terms. There is no German race or French race or Chinese race. The anthropological classification of race is in three main divisions: Caucasian, Mongolian, and Negro. These are further divided into sub- races characterized by such physical characteristics as shape of skull, color of hair or complexion, stat- ure, facial structure, and physical vigor. Few nations of the world have a population of only one race. Most are a mixture; for example, the white population of the United States and European nations comprises a mixture of three of the Cau- casian subraces, and there are many Mongolian subraces in the Chinese nation. If a country's population is composed of more than one main race, there is always a possibility of internal strife and racial discrimination. Hitler, for example, effectively used the idea of an "Aryan" super-race to develop a feeling of racial superiority among the Germans. The tragic consequences of this doctrine are a blot on the history of Europe. Ethnic groups, another important consideration in sociological intelligence, are people bound to- gether by ties and traits of both race and nationality. In the United States, for example, there are large communities in various sections of the country composed of such ethnic groups as Czechs, Poles, Irish, Swedes, and Finns. Ethnic groups often maintain, at least for two or three generations even in America, the customs, tradi- tions, religion, and language of their forefathers, and assimilation into the nation to which they have migrated is completed only after several centuries. The countries of Europe provide similar examples: the Germans of Alsace-Lorraine, the Swedish eth- nic group in Finland, and the Serbs of the old Austro-Hungarian Empire. In Asia the Parsees of India are a striking example of how a people, originally Persian, have become a force in the com- mercial and industrial development of the country of their chosen residence. The presence of such groups in a nation may weaken national solidarity, or make a nation vul- nerable to psychological warfare. It may also re- sult in violent hatred and prejudice. During World War I, for example, German-Americans in many communities were the innocent victims of slander and even mob violence. The cultural characteristics of a people are those derived from language, social structure, social values and patterns of living, artistic and intel- lectual expression. Differences in thinking and acting occur to the extent to which such forces control or influence collective behavior. The presence in appreciable numbers of aristocrat and peasant, clergy of strongly opposed religious sects, intellectuals, artists, and illiterates in a nation's population are significant subjects for sociological intelligence. Careful examination of these ele- ments yields greater understanding of a people's history, customs, and traditions and is essential to evaluation of public opinion, attitudes toward foreigners, and national morale. Religion Religion has always been a potent force in the history of the world, and religious differences have caused much war and strife. "There is no God but Allah, and Mohammed is his prophet" became the war-cry of Moslem hosts, the bloody Thirty Years War between Catholic and Protestant arm- ies in 17th century Europe, and in our own time the Moslem-Jewish struggle for the control of 185 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Palestine, as well as the Moslem-Hindu riots in India and the formation of Pakistan attest to the influence religion has upon the actions of men. In many countries the constitution establishes a state religion, and religious sects are powerful political parties. The intelligence researcher often finds the an- swer to problems of national attitudes by analyz- ing the tenets of the religion of dominant or minority groups. Religion can determine the moral fiber of a nation or it can produce social handicaps which become strategic vulnerabilities. Often a well organized church or religious group supports numerous schools at all educational levels, and makes a valuable contribution to the improve- ment of social conditions and the rehabilitation of social unfortunates. Education Education has always been a measure of prog- ress. The strategic significance of education has become even more pronounced in this modern age of scientific and technical achievement. A na- tion's technical capabilities will be governed by the extent to which it can produce men and women with technical skill, and the cultural level of its people will be determined by the extent to which a spirit of scientific inquiry and academic freedom are fostered by its government and society. Intelligence on education must be specific in order to be usable: the number of schools at all levels of education; the number enrolled and the number graduated; the curricula and teaching methods; the qualifications of faculties; the con- trolling and accrediting agencies; and in the field of higher education, the distribution of graduates by subject of specialization. It is important to know, for example, that a given country is produc- ing engineers and physicists at an accelerated rate, or that there is a shortage of trained teachers in the secondary schools. Adult education by exten- sion courses and evening trade schools must also be evaluated. The number of students engaged in graduate study at institutions in other countries and the use which is made of them upon their return may be of great significance in a sociological estimate of a nation. This is of special interest to America, CONFIDENTIAL 136 since we have increasing numbers of foreign stu- dents attending our colleges and universities. The question is: What happens to them when they go home? Will their experience influence the thought of their fellow countrymen? Public Information and Opinion Intelligence interest here centers in the methods of disseminating news and the influence upon na- tional attitudes exercised by newspapers, maga- zines, radio programs, and motion pictures. Are the people left free to form their opinions on what they see, hear, and read or are true facts withheld through rigid government control of the press and other avenues of public information? Do foreign publications have a wide circulation and what is the extent of any foreign propaganda in the country? The answers to all these and similar questions are invaluable to the sociological analyst. Cer- tainly in this field he must be constantly aware of current trends and possess sufficient background to assess them in the light of the people's history and traditions. Health Information for intelligence on health condi- tions in a foreign country is concerned not only with the health of the indigenous population but also with the effect of health and sanitation con- ditions upon foreign troops which may operate in the area. Environmental factors such as to- pography and climate, nutrition and dietary hab- its, plant and animal life, and the food supply situation all pose problems for the military analyst. Can an invading force live off the land? Is there an abundance of potable water? Will special installations be necessary for garbage and waste disposal or are existing utilities adaptable? Medical intelligence has an important role to play in determining the prevalence of disease, par- ticularly those to which an invading army would be exposed. Will extensive malarial control be necessary? Are there certain health regulations, quarantine measures, or sanitary precautions to consider? The country's medical resources must be also evaluated in terms of the number of doc- tors and nurses, the quantity of medical supplies, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R00010021700.02zR COMPONENTS OF INTELLIGENCE KNOWLEDGE UNFluENTIAL hospitals, and medical training, research, and development. Public Welfare The status of public welfare in a country is an important element in sociological intelligence be- cause it so directly affects the happiness and mental attitudes of the people. The standard of living, housing, and opportunities for gainful employ- ment are factors which must be considered. Sweden, for example, has no slum areas in her large cities, and her government's achievement in providing clean and comfortable housing for the worker is notable. It has been attained, however/ only through high taxation, and many a Swede is unhappy because of the tax drain on his pocket- book. As a result, it may be easy for him to forget the great benefits to himself and to the nation which accrue from high standards of public health and sanitation. The evaluation of a standard of living is no easy task for the analyst, for the peoples of different countries do not place the same value upon certain human comforts and possession of certain advan- tages. The average American family needs an automobile; many Europeans consider the posses- sion of one not only unnecessary, but even a great nuisance. We put ice in our drinking water and keep our beer in the refrigerator. The average Britisher does not like either water or beer that cold. Comparison of wages in different countries has meaning only when such wages are expressed in terms of their buying power within each coun- try. A dozen eggs in one country may represent 5 hours of work by a machinist, while in another country a machinist would have to work only 1 hour to earn enough to buy 3 dozen eggs. Other commodities, however, may be so much more expen- sive in the latter country that the machinist may not enjoy as high a standard of living as he would in the country where eggs are dear. Assessment of living standards, therefore, cannot be based on limited observations, but must be made from aver- ages over periods of years, and evaluated in rela- tion to the entire socio-economic situation of the nation. Unemployment will always create problems for a nation. Crime has a higher incidence, and dis- satisfaction with the existing government grows with the misery of the unemployed. Communism feeds upon such conditions. Employment, of course, brings prosperity and its attendant com- fort and happiness. The manner in which a foreign country has met its public welfare problems is an indication to the analyst of strength, vulnerability, and morale. A people who enjoy social security and a happy daily life are not good subjects for propaganda influence from without, and they will combat any effort to change their satisfactory status, even to the point of armed resistance. Sociological intelligence is a fascinating field, and deserves more than the summary treatment it has received above. The intelligence officer should consider the aspects so briefly discussed as an introduction and inspiration for more intensive reading and study. The philosopher's observation that "the most interesting thing to man is man" has real significance in intelligence, and the study of foreign peoples in relation to one's own socio- logical heritage has its reward in furthering the cause of international understanding and peace. 137 POLITICAL INTELLIGENCE Political intelligence on a foreign country is an evaluation of the effectiveness of its government in achieving the national objectives of its people, both domestically and in foreign relations. It is an assessment of the political strength and inter- national influence of the nation in respect to unity, stability, and efficiency, as well as the determina- tion of the degree to which its government repre- sents the will of the people. The political com- ponent of strategic intelligence is closely associ- ated with the sociological and economic, for government exercises a profound influence on the economic and social life of a people, and con- versely its nature is to a large extent established by economic and social forces. The purpose of this section is to delineate the elements essential to a political estimate of any foreign country: the constitutional system, gov- ernmental structure, political dynamics, national policies, and the way in which its government pro- vides for public order, safety, and security, con- trols subversive activity, obtains intelligence, and disseminates information. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The Constitutional System Governments derive their powers from consti- tutions or codes of laws which set up the basic framework and describe the rights and privileges of the individual citizen. A constitution is not necessarily a single written document. The Brit- ish "constitution," for example, is largely an un- written code built upon custom and usage. A consideration of the constitutional system of a country begins with a study of its origin and devel- opment. What political, economic, or social groups dominated political thought at the time of its adoption? To what extent does it reflect the public opinion of that time? Oftentimes the circumstances under which a constitution was for- mulated endow it with lasting respect and author- ity. The principles of a constitution in theory are often quite different from its principles in practice. Attention must be given to its flexibility and the ease with which it can be amended. Have there been disagreements as to its interpretation? What economic and social provisions does it con- tain? Are there any unusual provisions? The American Constitution, which establishes execu- tive, legislative, and judicial branches of govern- ment, has served as a model for constitutional systems of later origin in all parts of the world, but in various countries, the powers granted to the different branches and the rights of citizens will vary widely. In some republics the chief executive may be a mere figurehead; in others he may have dictatorial power. Prime ministers often exercise much more leadership and have greater responsi- bilities than kings. The office of prime minister can be most precarious for it is usually dependent upon the support of a majority in the legislature and failure is followed by the resignation of the prime minister and his cabinet. Legislatures will vary in composition and effec- tiveness. When two houses are provided for by the constitution, one may be more advisory than legislative in function, and it may have a history of gradual weakness, such as the House of Lords in Great Britain. The Senate of the United States, on the other hand, has always had more power and prestige than the House of Representatives, but the Speaker of the House can succeed to the Presidency. A strong judicial branch of an established gov- CONFIDENTIAL 138 ernment will exercise tremendous influence in maintaining the spirit of the constitution, even though its interpretations will reflect the coun- try's economic and social changes. The strength of the judiciary will usually be determined by its independence of thought and action insofar as it can resist political pressure and the lobbying of special interest groups. The confidence of the people in government is largely controlled by the judgments of the courts when their powers are exercised in a way that is an effective check on both executive and legislative branches. The civil and religious rights of citizens guaran- teed by the constitution are important considera- tions in a political estimate, not only in theory but in practice. Freedom of speech, press, religion, and the rights of assembly and trial by jury so dear to the American citizen do not find exact counter- parts in the constitutions of all other countries. Important also are the rights and privileges ex- tended to foreigners in the country. Can they move about freely, and engage in business enter- prises with the same protection accorded to nationals? The Americans are very jealous of their "constitutional rights" and justly proud of their political heritage. The analyst must make an assessment of the presence or absence of similar feelings among foreign peoples and the extent to which they would tolerate any abrogation of par- ticular political rights. Structure of the Government The consideration here is of organization and procedure in central, regional, and local govern- ment. It is an evaluation of the government in operation. Are there any conditions or situations which have required special organizations or oper- ations by the government and are practices at vari- ance with the provisions of the constitution? What are the major agencies of each branch of the government and how do they operate? What are the significant features of regional and local gov- ernment organization? Often an understanding of the political forces of local government is essen- tial to the evaluation of the government as a whole. Many countries have colonies or dependencies which must also be examined in their relations to the mother country, including their own govern- mental structure. International relationships Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL such as participation and membership in the United Nations Organization or any regional pacts may have important influences on a political sys- tem through the creation of special commissions. The operations of such agencies can have a decided impact upon internal affairs as well as formulate national attitudes toward other countries and in- crease support for cooperative endeavors. Political Dynamics The extent to which the people participate in political activity, their fitness for political respon- sibility, the sources of political power, the electoral and political party systems are some of the main factors to assess in a political estimate of a foreign country. The major political parties must be eval- uated, taking into consideration their membership, program or special interests, organization, and methods of propaganda. Throughout his study of these aspects of politi- cal life, the analyst will find that comparisons with American counterparts will give meaning and perspective. He cannot merely ascertain the constitutional framework which sets up the party system, but must note actual practices, both his- torical and current. Pressure groups within par- ties, lobbying tactics, the amount of money avail- able and expended for promotional purposes, and the manner in which the objectives of such pres- sure groups affect American interests are essential considerations. The biographic component of strategic intelli- gence is here effectively applied. The personali- ties, qualities of leadership, and motivations of prominent politicians will provide the answer to many problems of changing political influence. National Policies The intelligence significance of knowledge of a country's domestic and foreign policies will be made apparent in succeeding chapters in their dis- cussion of the economic, sociological, and political factors which determine a country's position in the community of nations. The interplay of these factors will be shown in the examination of United States foreign policy and the relationship of party and government in the U. S. S. R. Detailed treat- ment of important elements of national policy is therefore superfluous here. 139 Suffice to say, military intelligence is particu- larly concerned with those policies pertaining to national defense and their influence on domestic and foreign policies. Are the military establish- ment and civilian lawmaking bodies in agreement on what defense policies should be? To what ex- tent do the various branches of government in- fluence or decide defense policies? What is the popular reaction to defense policies? Do the people accept rearmament programs, conscription, food rationing, and production controls with forti- tude or do such defense measures result in much grumbling, support of black markets, or actual rebellion? Again the influence of individual leaders, both within their own party and on the populace as a whole, can be studied with profit. Public Order and Safety Within the scope of political intelligence are those organizations which maintain public order and safety, that is, the police and penal systems. Is the police system adequate in size, well-organ- ized at all levels of government, and effective in protecting citizens against lawless elements of so.. ciety ? The strategic analyst would also be con- cerned with the morale of the police force, the in- tegrity of law-enforcement officers, and the extent to which the system is susceptible to political in- fluence. If the police of a large city, for example, are controlled by a certain politician and used for furthering his political ambitions, the fact should be carefully noted. The attitude of the average citizen towards law enforcement is also significant. Consideration of the penal system would in- clude not only its organization and operation, but also criminal codes, trial procedures, incidence of crime, conditions in prisons and reformatories, and the effort made by social forces in the country to rehabilitate felons and juvenile delinquents. In this respect there is considerable overlapping of the political and sociological components. Subversive Activity Active or latent subversive groups in a country are exceedingly important factors in the assess- ment of weaknesses in its political system. The presence of subversive activity in political parties, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS labor organizations, or government agencies can profoundly affect the operation of the political, economic, and social forces of the nation. In recent years we have seen the results achieved by Com- munist subversive activity in Poland, Czechoslo- vakia, Hungary, and Rumania. We have also seen in the case of Italy, how a people aroused to its menace can keep Communists from obtaining con- trol by defeating them at the polls. The extent to which subversive elements have penetrated or in- filtrated a country is thus the analyst's concern. He must identify the subversive groups and show how they operate. An innocuous appearing society for the improvement of cultural relations with the U. S. S. R., with a membership of several thousand students, may well be the front organi- zation of a growing Communist Party, the ulti- mate objective of which is the overthrow of the existing political system. The peoples' attitude, their traditions, and the economic and social conditions which foster sub- versive groups must be taken into account. If, like the Gallic tribes of Julius Caesar's time, they are "conspiring among themselves and eager for revolution," intelligence upon the nature, poten- tial strength, and leadership of such groups is es- sential. Finally, an estimate must be made of how subversive activity of any kind may affect the policies of the United States and other world powers towards that country. Intelligence System The United States intelligence system and the development of intelligence activity in other coun- tries of the world have been fully treated in pre- ceding chapters of this text, and are indicative of the scope of the information required. What is the mission of each intelligence agency? Are funds available for effective operations? What is the public attitude towards intelligence activities? What is the relationship of the various agencies, their methods of operation, and who are the key figures in their personnel? Propaganda Political propaganda may be defined as the dis- semination of information or ideas designed to in- fluence the political behavior of the people of a country by affecting their beliefs or attitudes con- CONFIDENTIAL 140 cerning facts or values. It may be either direct or indirect in approach. The source of control may be located in the country itself, such as at the permanent headquarters of a political party, or it may be directed from outside the country, as for example, in the case of Kremlin control of propa- ganda in a satellite country. For strategic intelligence purposes the assess- ment of political propaganda emphasizes an evalu- ation of its effectiveness. How much distortion of fact will the people accept? It will depend, of course, on the degree to which they have op- portunity for becoming aware of the true facts. In a country where the party in power maintains rigid control of press and radio the people may be kept completely in the dark. If freedom of speech is a jealously guarded national heritage, the people will be more enlightened and better educated politically. Propaganda may then be recognized for what it is and may have to be disseminated through more subtle media and by more indirect means. Political propaganda is never more clearly evi- dent than in an election campaign. The analyst can learn much from a careful study of the cam- paign speeches of leading candidates of opposing parties. Often a clever slogan or sobriquet has a tremendous psychological effect. The effectiveness of the propaganda factor in political intelligence can only be evaluated by consideration of certain sociological aspects of the nation, particularly those discussed in the preced- ing section entitled "Characteristics of the People." Good propaganda will always exploit the racial, ethnic, and cultural elements of which national character is composed. The principles and techniques of propaganda will be treated more fully in a later section dealing with psychological warfare. Political Factors in Strategy The ultimate purpose of strategy is to make it possible for a nation to approximate its basic goals. Its intentions, which are derived from these goals, are influenced by a variety of political factors. Inevitably, therefore, strategy is affected by the same political considerations. Initially, of course, those responsible for formulating na- tional strategy must choose objectives which are Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL in accord with the basic goals of their own nation and with those of its allies. Thereafter, political factors must be considered in such matters as esti- mating the dimensions and timing of war prepara- tions by a nation and its allies, considering the extent of possible losses by the military forces which might be acceptable at any given time, and selecting instruments of war and the use to be made of them. Conversely, in connection with the capabilities of the enemy, consideration must be given to the effect of political factors on his own strategic planning and how these factors may cause him to react to a state of war or measures short of war. Mr. Chester Wilmot, eminent Australian jour- nalist, has advanced the thesis that much of the tension following World War II might be at- tributed to a failure to take political factors into account in strategic planning. He has suggested that military strategy is affected both by political factors as they develop and by long term political objectives. By way of illustrating the influence of political factors he has cited the Mediterranean campaign of 1943 and the strategic decision of the allies to invade Italy. A decision to land troops on the Italian coast appeared advantageous be- cause of the enemy's inferior military strength. In addition, however, such a decision was made more attractive because Mussolini's political strength had become seriously impaired by 1943 and represented a real weakness in the Axis partnership. Thus developing political factors, when combined with the military situation, mate- rially supported the decision made. In illustrating the importance of considering long term political objectives in the planning of strategy, Mr. Wilmot has suggested that a great political advantage could have accrued to the western allies in the post-World War II period had they, rather than the Soviets, liberated Ber- lin, Prague, and Vienna. A significant power ad- vantage might have been retained in Germany, even if Berlin had been given up later as a result of zonal agreements. The effect in Czechoslovakia might have been even greater. The mere presence of the Red Army in Prague became a source of material strength to the Czech Communists and undoubtedly affected the negotiations conducted between the Benes government and the Soviet 141 leaders in Moscow in June 1945. Mr. Wilmot's point is that the decisions which resulted in the halting of the allied advance into Germany and Central Europe might well have taken into greater consideration the possible progress of events after the war was over. These illustrations suggest the importance of political intelligence and the variety of tasks which must be performed in connection with it. Since military strategy and politics are insepara- ble, the naval intelligence officer must understand the significance of politics in military decision. ECONOMIC INTELLIGENCE Economics, simply defined, is the study of how people make their living and satisfy their mate- rial wants. Economics thus represents a very sizable part of total activity, for most people are destined to spend the majority of their waking hours either earning their living or spending what they have received. Economics in practice is much broader in application than the definition first suggests because we live in organized societies, and therefore as a social science, economics is con- cerned with group behavior. As a discipline, eco- nomics attempts to explain and interpret this behavior and predict its consequences. Economic laws, like other social laws, are tendencies and trends, and thus the precise answers and controlled experiments common to the physical sciences are lacking in economics because of the difficulty in measuring all significant variables. The result is that the applications of economics in the field of intelligence may be ineffective or even dangerous in the hands of one who is not well grounded in its principles and who is unaware of the pitfalls in the use of data and concepts. Economic intelligence is concerned with the col- lection and processing of information relating to the extent and utilization of natural and human resources and the industrial potential of nations. Economic military intelligence is not a delimited part of the larger field; rather it is a viewpoint that gives full regard to the military implications of economic events. Specifically, this means that we want to know how strong other countries are? the limits to their economic capabilities for mak- ing war; also whether they are preparing for war and the extent of such preparation; and, finally, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS their economic vulnerabilities. When the need arises, such weaknesses may be attacked by mili- tary means or by the techniques of economic warfare. Sources of Economic Intelligence The Department of Commerce, Office of Inter- national Trade, receives reports from commercial attaches and consular agents all over the world. Its commodity and area specialists review large numbers of foreign periodicals and other reports in order that both private individuals or concerns and government agencies may have the best pos- sible information on conditions abroad for con- ducting business affairs. The State Department also has extensive interests in economic intelli- gence since its consuls do so much of the collecting, but some of its direct collection responsibilities have been reassigned to other agencies, particu- larly special types. The Tariff Commission is in- terested in foreign costs of production, foreign tariffs, and trade restrictions. The Treasury and the Federal Reserve Board are concerned with monetary and fiscal developments. The Depart- ments of Agriculture and Labor are active in their respective fields and have some representatives in our diplomatic missions overseas. Private agen- cies also have specialized interests in particular fields of economic intelligence and prepare reports used by business men. For example, some are con- cerned with petroleum, mining, construction, elec- tric power, foreign trade, manufacturing and, of course, transportation and communications which have been treated separately. Some of these private concerns do a very thorough job within their own fields. Even such popular magazines as Fortune and the London Economist make nota,- ble contributions in the reporting of foreign de- velopments. The military services have the responsibility for filling any gaps in the economic intelligence they need for their own planning, and the task of tap- ping what is already available in order to apply it to their own ends. Primary Military Interests in Economic Intelligence Military intelligence has the responsibility of keeping track of any change in economic factors that affect a country's ability to wage war. These CONFIDENTIAL 142 include new discoveries of mineral deposits, new crops and changing methods in agriculture, new industrial processes that affect the demands for labor and material and affect output and costs, changes in business, labor, and government that react on efficiency and allocation of resources, trends in capital investment, new depreciation and tax policies, trends in the price level, bank reserves, and inventory levels. Preparations for war become important to watch in an age when a sudden attack can be so crippling. Economic intelligence may well give warning of such action, for industry must also be mobilized for war. Clues may be provided by the stockpiling of critical materials, the develop- ment of higher cost substitutes and synthetics for what normally is imported, and conversion of civilian industry to the production of war goods. Such clues need coordination with political in- telligence to determine motivation. Since some economies are at all times regulated by the gov- ernment and "mobilized," the detailed study of all changes in their regulations, priorities, and al- locations may produce important leads in judging modifications of plans or timetables for military actions. Study of economic vulnerabilities is continuous also, for a dynamic economy is faced with chang- ing pressures and shortages. Especially when a war becomes hot, and military action and economic warfare are modifying the enemy's economy, a close watch is essential so that counteractions will have maximum effect. Considering the wartime hazards to collection, such an assessment will be possible only if a prior basic analysis was prepared when there was time to gather and assess the origi- nal set of facts. Analytical Criteria Assessment of economic data must include the application of many different criteria, all of which are important, such as the study of particular in- dustries with their problems of production and pricing; the whole fiscal and monetary system with questions of the price level, savings, investment, and employment; the problems of ownership and income distribution; the problems of consumption and of institutions. Micro-economics with its attention to supply and demand of particular Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL commodities and its concern with competition, monopoly, and monopolistic or monoposonistic competition is best known to the beginning student. Macro-economics is more recent, but offers some singularly effective analytical tools for intelli- gence purposes. The approach is in terms of the interactions of particular events on the economy as a whole. Some of the most useful results are ap- parent in the national income accounting analysis done by the Department of Commerce. In effect it is the old "Tableau Economique" of Quesnay brought up to date to combine modern accounting procedures with present economic thinking into a large number of mutually supporting tables. The intelligence significance is that even if a foreign country tries to hide its activities almost anything that it does in the economic sphere will have reper- cussions that will leave telltale signs. If it tries to hide much basic information, such data may be derived anyway by analytical techniques that have been developed so fully in the last decade or so in the United States. Some of them are highly com- plex and lie beyond the scope of this study, but their importance is not to be minimized. This sug- gests that the requests for certain types of eco- nomic data which may mean little to the layman frequently include keys to very big secrets. There- fore, the economic data collected by naval attach& or observers abroad may be ultimately as impor- tant as information on strictly naval subjects. European Illustrations Hitler's Mein Kampf made clear his political views and intentions long before he came to power, although its significance was not seen by the public at large. Once the Nazis came to power, however, economic intelligence disclosed German prepara- tions for war. Economic regimentation began as early as 1933, with many telltale signs. State- directed planning was the rule, and heavy arms orders were fed to industry. Labor was mobilized through the Deutsche Arbeitsfront and the pro- duction of civilian goods was progessively reduced. The conquest of Czechoslovakia was an important addition to German economic potential because of the acquisition of the Skoda works and an addi- tional labor supply. German ingenuity went to work on developing substitute materials for those that would be cut off by war. All of these de- 143 velopments pointed to a growing capability of carrying on a major war effort. The success of German preparations was indicated by the length of time they were able to fight against a coalition of nations numerically and industrially stronger. One of the most interesting exploits of economic intelligence involved the German oil industry. Especially after the dissolution of her friendship pact with the Soviet Union, Germany had only the Rumanian Ploesti fields and minor wells in Hun- gary and Poland as sources of petroleum. To take the place of natural petroleum, German chemists had developed new processes for extracting oil and gasoline from coal, which brought costs down to a fairly reasonable level. It was natural that the strategic nature of these German automotive fuels prompted special attention by allied intelligence and target specialists and it became most impor- tant that attacks be centered on all facilities of the industry to paralyze German transport and aviation. Planners remembered well that in World War I German transport came to a halt be- cause of a shortage of lubricants. Some excellent intelligence on German oil facilities came from secret sources, but the most accurate and com- plete was obtained from the Germans themselves. German rail tariffs, like our own, include not only class rates but specific commodity rates on a place to place basis. In order to subsidize the vitally needed synthetic oil industry, special commodity rates were set up for each oil refinery. Just as in America, German law required that these rates had to be published, and the Germans methodically printed such information in rate bulletins and in an obscure technical traffic magazine. Allied in- telligence subscribed to this magazine through a Swiss address, and regularly found each new secret oil refinery listed with information as to the open- ing date for the new rates,. It was then a simple matter to pinpoint the facility on the map and de- stroy it by bombing. Before the war was over, German aircraft were grounded in considerable de- gree by the shortage of fuel. Less successful were Allied attempts to cripple Germany's ball-bearing industry which was being augmented by supplies from neutral Sweden. The British, too, were getting considerable quan- tities of Swedish ball bearings, but attempts to buy up the entire production were unsuccessful. The CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Swedish SKF concern had expanded facilities, and deliveries were being made to Germany in return for safe conduct to Swedish ships bringing in es- sential imports to the homeland. Some of the most spectacular and costly Allied air attacks deep in Germany were aimed at destroying ball-bearing plants, notably at Schweinfurt, but the chief ob- jective was not gained. Germany restored pro- duction much more rapidly than anticipated and redesigned her war equipment to require fewer bearings. The war was almost over before the Swedes were persuaded to cut off further ship- ments, and by that time ball bearings were no longer a determining factor in the German war effort. The whole experience illustrated the im- portance of correct assessment of economic intelli- gence as well as its collection. German economic intelligence about the Allies was fairly good, notably in the data collected on Allied ocean convoys. Due to censorship leaks, secret radio broadcasts, and marine insurance re- insured in neutral countries, German U-boats were frequently able to pick off the most critical ships in our convoys with disastrous results. It took con- siderable effort to minimize these leaks. Pacific Illustrations Japan's military ambitions were made clear not only through the controversial "Tanaka Memo- rial," the activities of the Black Dragon Society, and the attacks on China, but also from economic intelligence. Some fundamental changes in the Japanese economy were noted and set forth in a Harvard University study by Mrs. E. B. Schum- peter (et al.), The Inclust2-ialization of Japan and Maneh,ukuo, that appeared just before the war. Although this was a study based on overt sources for public purposes, it revealed for the first time considerable detail on changes in the Japanese economy. In 1937, as a war measure, the Japa- nese had banned the publication of all economic data; they were aware of its great significance. A great void developed in year books, trade re- turns, periodicals, and industry publications. In fact, they were so successful in hiding informa- tion that their own planning was hampered, and postwar search of Japanese government records indicates that many vital economic records were not even maintained, and thus represent gaps that CONFIDENTIAL 144 interfere with analyses of Japan's position. The Schumpeter study did reveal, despite the incom- pleteness of data, that the Japanese economy was switching from primary dependence on export production of such items as textiles and ceramics to heavy industry, chemicals, and instruments, all needed for war purposes. Further, the study re- vealed that Japan had been converted during the late 1930's from an island kingdom to a conti- nental power, for much of the new industry was located in Korea and Manchuria. In passing, the pitfalls of jumping at too easy conclusions are evident in connection with postwar Japan. That defeated nation, hard hit by war and with shrunken boundaries, has faced major dilemmas. Some people have advocated concen- tration on light industries that use labor rather than imported raw materials, and thus minimize balance of payment difficulties. Unfortunately, however, from the Japanese point of view, these are the very industries being developed by the nations which are the chief potential markets for Japanese goods, so a weakened Japan, unlikely to be a military threat, is developing heavy indus- tries whose production will outstrip that achieved during the peak of her militaristic period. This has American encouragement. The military in- telligence assessment cannot be based upon eco- nomic data alone, as these economic facts of the new Japan must be linked to political and geo- graphic changes both in Japan and in the world as a whole before they attain real meaning. Current Problems Some details of the Soviet economy will be pre- sented later. Economic intelligence today from that area must be based on careful analysis of open Soviet broadcasts of information, statements in the Soviet press, study of Soviet foreign purchases, "Wringer" reports from all kinds of persons who have been behind the Iron Curtain, and such lim- ited observations as diplomatic personnel are al- lowed to make. What of Soviet activities here? We know that for a long time Soviet purchasing agents were able to tour our factories and buy our patents. The volume of economic data published by both government and private concerns is so tremendous that little is hidden, and that fact itself may give us partial protection because it Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL places a heavy burden of analysis on the Russians. Could we hide information from them? Un- doubtedly, there are many particulars easy for them to collect, but it should be emphasized that analytical techniques today are such that the hid- ing of the broad facts of our economy from the enemy would require repressive measures incom- patible with the efficient operation of a private enterprise economy. Hiding facts from ourselves could seriously cripple the planning and pricing activities of American businessmen. A competi- tive system is presupposed in economic analysis to be one with freedom of information. In conclu- sion, then, short of radical security measures, the United States must be reconciled to losing more information to totalitarian enemies than it gains, but much can be gained through intensive exploi- tation of available sources and careful analysis. TECHNICAL AND SCIENTIFIC INTELLIGENCE The developments in military science which have been produced in recent years by science and tech- nology constitute but one aspect of the profound change which the industrial revolution has caused in the environment of modern man. B. H. Lid- dell-Hart, the British military expert, analyzes the subject in his book, The Revolution in Warfare: Science and technology have produced a greater transformation of the physical condi- tions and apparatus of life in the past two hundred years than had taken place in the previous two thousand years. Yet when men turn these tremendous new powers to a war purpose, they employ them as recklessly as their ancestors employed the primitive means of the past, and they pursue the same tradi- tional ends without regard to the difference of effect. Indeed, the governments of modern nations at war have largely ceased to think of the postwar effects which earlier statesmen were wise enough to bear in mind?a consid- eration which led in the eighteenth century to a self-imposed limitation of methods. Mod- ern nations have reverted to a more primitive extreme?akin to the practices of warfare be- tween barbaric hordes that were armed with spear and sword?at the same time as they have become possessed of science-given in- struments for multiple destruction at long range. The revolution in warfare has thus been two-sided?on the one side, in the instruments, 145 the technique of warfare; on the other side, in the character of warfare. Technical and scientific intelligence are directly concerned with the "instruments and techniques" in which so profound a change has taken place. Consideration of a new instrument, or weapon, is meaningless without taking into account the con- ditions under which it is to be used and the method of its employment. To match the increased speed and scope of war, scientific research and development were, during World War II, expedited as never before, and in this postwar period of world tension they con- tinue to be pressed with the greatest possible ur- gency, particularly in the fields of atomic energy, jet propulsion, and guided missiles. Technical and scientific progress continue to force the revi- sion of ancient and time-tested military concepts, and to dictate even more revolutionary changes in the design of ships, planes, and tanks which for- merly embodied those concepts. Intelligence of a new weapon originated by an enemy perforce leads to feverish efforts to develop a counterweapon, in which the enemy in turn is vitally inter- ested. Tactical surprise, which in earlier wars had been achieved by novel dispositions of armies and fleets, was in World War II gained also by the unleashing of new weapons such as the atomic bomb, and by improvisation, such as skip bomb- ing, in the employment of weapons already de- veloped. Never before have the twin qualities of flexibility of mind and the ability to gaze in- telligently into the crystal ball of the future been so vital to military men and to the political leaders to whom the security of the nation is jointly entrusted. Science and technology were placed at the dis- posal of the ground, sea, and air forces of the United States during World War II, and in many cases new weapons and items of equipment de- signed for one specific branch of the armed forces were adopted by the others as well, or were fitted to the needs of more than one service. For ex- ample, new aircraft went to both Army and Navy to be used for different tactical purposes, and the principle of rocket power was used by the infan- try in the form of the bazooka, and by the Navy for antisubmarine warfare and for strafing enemy positions by LC (R) s; both Army and Navy em- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS ployed rocket-equipped aircraft. The VT fuze was utilized as an antipersonnel weapon by the Army and as an antiaircraft weapon by the Navy. Therefore, it is advisable not to consider the tech- nical and scientific category of strategic intelli- gence from the specialized viewpoint of but one branch of the armed forces. Although we are concerned primarily with naval strategic intelli- gence, the technical and scientific component em- braces the contributions of research and develop- ment to land, sea, and air power. Definitions The official Navy definition of the technical and scientific category of strategic intelligence is suffi- ciently broad to permit a general discussion. In terms of Naval Intelligence, technical and scien- tific intelligence is defined as: "Disclosing the development of new materials, techniques, and munitions of war." The words "technology," "science," "research," and "development" are too well known to require definition, as are the adjectives derived therefrom. However, it is advisable at this point to break down the term "scientific research" into three parts, and to define each of them. 'These three parts are: 1. Pure research. 2. Background research. 3. Applied research and development. For definition of these phrases we turn to appen- dix 3 of Science: The Endless Frontier, a report to the President, dated July 1945, by Vannevar Bush, wartime Director of the Office of Scientific Research and Development: 1. Pure research,.?Pure research is re- search without specific practical ends. It results in general knowledge and understand- ing of nature and its laws. This general knowledge provides the means of answering a large number of important practical prob- lems, though it may not give a specific solu- tion to any one of them. * * * The unpre- dictable nature of pure science makes desirable the provision of rather special cir- cumstances for its pursuit. Pure research de- mands from its followers the freedom of mind to look at familiar facts from unfamiliar points of view. It does not always lend itself to organized efforts and is refractory to direc- tion from above, in fact, nowhere else is the CONFIDENTIAL 146 principle of freedom more important for sig- nificant achievement. . . . 2. Background research,.?The preparation of accurate topographic and geologic maps, the collection of meteorological data, the de- termination of physical and chemical con- stants, the description of species of animals, plants, and minerals, the establishment of standards for hormones, drugs, and X-ray therapy; these and similar types of scientific work are here grouped together under the term background. research. Such background knowledge provides essential data for ad- vances in both pure and applied science. It is also widely used by the engineer, the physi- cian, and the public at large. In contrast to pure science, the objectives of this type of re- search and the methods to be used are reason- ably clear before an investigation is under- taken. Thus, comprehensive programs may be mapped out and the work carried on by relatively large numbers of trained personnel as a coordinated effort. . . . 3. Applied research, and development.? Applied research and development differs in several important respects from pure science. Since the objective can often be definitely mapped out beforehand, the work lends itself to organized effort. If successful, the results of applied research are of a definitely practi- cal or commercial value. The very heavy ex- penses of such work are, therefore, undertaken by private organizations only in the hope of ultimately recovering the funds invested. . . . The distinction between applied and pure re- search is not a hard and fast one, and indus- trial scientists may tackle specific problems from broad fundamental viewpoints. But it is important to emphasize that there is a per- verse law governing research: Under the pressure for immediate results, and unless de- liberate policies are set up to guard against this, applied research invariably drives out pure. The moral is clear: It is pure research which deserves and requires special protec- tion and specially assured support. The Time Element in Research and Development The importance of scientific progress, which de- pends on basic scientific research, to our Nation in time of peace and war is summed up by Dr. Bush in his report as follows: Progress in the war against disease depends upon a flow of new scientific knowledge. New products, new industries, and more jobs re- quire continuous additions to knowledge of the laws of nature, and the application of that Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL knowledge to practical purposes. Similarly, our defense against aggression demands new knowledge so that we can, develop new and improved weapons. This essential new knowledge can be obtained only through basic scientific research. Science can be effective in the national wel- fare only as a member of a team, whether the condition be peace or war. But without sci- entific progress no amount of achievement in other directions can insure our health, pros- perity, and security as a nation in the modern world. Dr. Bush, in the above quotation, states that a form of warfare, war against disease, continues, in peacetime, and that our security against aggres- sion by other powers is intimately bound up with our prosperity and our national health. Research specialists in the medical field may be said to be intelligence officers of a certain kind, to whom the qualities of alertness, thoroughness, patience, and imagination are as essential as they are to mili- tary intelligence specialists. Now more than ever must scientific research specialists coordinate their effort with military intelligence specialists, in view, of the susceptibility of all nations to sudden attack directed against centers of population and industry. Developments in aircraft and guided missiles have increased the range and speed of de- livery of atomic bombs and toxic warfare agents. Thus scientists as well as specialists in strategic intelligence may be said to be today in our first line of defense. Not only must the state of our own scientific research and development be of interest to us, but we must also disclose, as promptly and completely as possible, the trends and achievements of sci- entific research and development in potential enemy nations. In his report, Dr. Bush empha- sizes the time element in modern war, and the necessity for peacetime scientific preparedness: The bitter and dangerous battle against the U-boat was a battle of scientific techniques? and our margin of success was dangerously small. The new eyes which radar has sup- plied can sometimes be blinded by new sci- entific developments. V-2 was countered only by capture of the launching sites. We cannot again rely on our Allies to hold off the enemy while we struggle to catch up. There must be more?and more adequate? military research in peacetime. It is essen- 147 tial that the civilian scientists continue in peacetime some portion of those contributions to national security which they have made so effectively during the war. This can best be done through a civilian controlled organiza- tion with close liaison with the Army and Navy, but with funds direct from Congress, and the clear power to initiate military re- search which will supplement and strengthen that carried on directly under the control of the Army and Navy. During peace, the time element in our own sci- entific research and development is closely related to the time element in obtaining strategic intelli- gence of scientific progress in other countries, in precisely the same way that the two were related during the war recently concluded. Furthermore, internal security and counterintelligence, as ap- plied to technology and science, are of continued importance. In World War II the deliberate and planned violation of security which took place in connec- tion with the atomic bomb was the disclosure to the world of the fact that it existed and that it worked. Security was also relaxed in connection with the VT fuze, one of the important new weap- ons produced by the Office of Scientific Research and Development. As in the case of the atomic bomb, a significant factor was the time element. Originally, the VT fuze had been allocated only to the Navy because of the possibility that the enemy might learn the secret if VT fuzed shells were fired over land. However, in the autumn of 1943, it became necessary to use VT fuzed shells for the protection of London and port areas in southern England which were eventually to serve as major staging areas for the Normandy invasion. The details of this situation are described by Dr. James P. Baxter III in his book, Scientists Against Time. Highly secret information re- ceived by the Allies indicated that the Germans intended to employ robot bombs against England. Some months before any were used, however, a detailed description of the new buzz bomb became available to OSRD. With this information, it was possible to construct a duplicate of the new German bomb and to conduct intensive tests. These tests revealed that the buzz bombs would activate the VT fuzes and that certain models of these fuzes could be effectively employed against the bombs. As a result of this new information CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Aoproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS developed by careful research, a high level deci- sion was made to utilize VT fuzes as a means of aiding in the protection of the threatened areas of England. This emergency decision made available a helpful countermeasure which was ready for use in ample time. The urgency of the situation and the time element dictated the decision. The importance of the time element in the grand strategy of the Allied Nations in 1942, and the reasons for selecting Germany as the main target for attack instead of Japan, were explained by Secretary of War Patterson in an address before the American Chemical Society, 8 April 1946. In his speech the Secretary gave the following rea- sons for assigning priority to the European War: One was to take advantage of the concen- tration of forces. Russia was fighting Ger- many, but not Japan. Another was the shorter distance to Germany; the shorter dis- tance meant shorter time in getting into ac- tion. But the reason that seemed to me as compelling as any was the danger of the Ger- man scientists, the risk that they would come up with new weapons of devastating de- structiveness. There was no time to lose in eliminating German science from the war. There was no comparable peril from Japanese science. The wisdom of this decision is seen now in retrospect when we ponder the remarkable ad- vances made by German research and development in the latter half of World War II, particularly with respect to rockets, jet propulsion, and guided missiles. The race for new weapons and counter- weapons was ultimately won by the Allies, largely because of better mobilization and organization of scientific brainpower and because of greater armed might and industrial capacity, but the margin was close. The secret of our success in developing many new and improved types of weapons and equip- ment during World War II, and producing them in quantity and delivering them in time to be effectively employed against the enemy, lies in the coordination of our scientific and industrial po- tential, in close cooperation with the armed serv- ices. Our top strategic planners allocated mate- rials, scientific brainpower, and industrial compe- tence in accordance with priorities dictated by the overall grand strategy, and, by means of technical and scientific intelligence, kept abreast of scientific CONFIDENTIAL 148 research and development in enemy countries, and assessed the performance of our new weapons in action as they were developed. The Technical Intelligence Center and Missions The vital interest of the Office of Naval Intelli- gence in technological and scientific fields led to the establishment of the Technical Intelligence Center to deal with foreign technical subjects, in- cluding ordnance in all its phases, electronics, naval vessels and merchant ships and their char- acteristics and equipment, chemicals, synthetics, medicines, and aircraft (in collaboration with the Technical Air Intelligence Center). During World War II the Technical Intelli- gence Center had a dual purpose: 1. To keep the strategic and operations planners and the Navy at sea and in forward areas informed at all times of such technical de- velopments on the part of the enemy as might affect operations, tactics, or planning in any phase of the war. 2. To make available to bureaus of the Navy and other interested technical and scientific activities any information on foreign tech- nology which might lead to development of effective countermeasures on our part, the perfection of Allied weapons, or the evolu- tion of new materials and techniques. The Technical Intelligence Center profited by constant use of all the normal sources of intelli- gence within and outside the country. Of unusual significance was the detailed interrogation of cap- tured personnel, particularly those with scientific or technical background, with the Center itself conducting an examination of some of the most important prisoners. In maintaining liaison with other technical ac- tivities, the Technical Intelligence Center was responsible for directing the collection of specific items in fields of intelligence of extraordinary importance to American scientific research and development. To this end, the center coordinated the activities of our naval representatives abroad, particularly those of naval technical missions eventually established first in Europe and later in Japan. With the successful invasion of the European continent on 6 June 1944, and the advance of Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL Allied forces into the German homeland, the ex- ploitation of German technical developments for possible use against Japan became a project of urgent importance in the final phase of the Euro- pean conflict. The determination of the nature and extent of German technical aid to Japan was in itself a project of vast significance. Strategic planners recognized that the rapid exploitation of this project, with correspondingly efficient development of countermeasures, might affect to a marked degree the duration of the war. There, the naval technical mission in Europe, working from lists of intelligence targets of prime impor- tance, was assigned the job of investigating and reporting on German technology; the Technical Intelligence Center in Washington coordinated the activities of the mission and assured proper distribution of its discoveries and reports. The detailed operation of NavTecMisEu teams in the European theater was an interesting and exciting chapter in the history of Naval Intelligence. The successful examination of German industrial plants, the painstaking and difficult search for records and files which were often partially de- stroyed or buried in cellars, and the continual and often dangerous hunt for key personnel by teams which travelled by air, train, jeep, and even on foot, resulted in an exceedingly valuable and com- prehensive record of German technological efforts. While the Japanese war ended too quickly thereafter for the United States to put into effect the countermeasures which resulted from this thoroughgoing investigation, the advantages ac- cruing to the American military and to private enterprise from a careful digest of German re- search, developments, and techniques can hardly be overestimated. An organization similar to NavTeeMisEu was created under the title, Naval Technical Mission Japan, with much the same ends in view. A brief account of the establish- ment, purpose and accomplishments of this group is contained in the following quotations from Summary Report, United States Naval Technical Mission to Japan: In the summer of 1945 . . . the United States Navy established a mission to deter- mine the position of the Japanese in the field of naval technology. How did the design and construction of their warships compare with ours ? What 149 range and power had their guns? How heavy was their armor and what was its metallurgy ? Were they ahead of us in electronics develop- ment ? The Navy wanted the answers to these and a thousand other technical questions. To obtain the desired information, investi- gators had to enter Japan with the occupation forces, before manufacturing plants, equip- ment, materials, and records could be de- stroyed and experienced personnel dispersed. NavTechJap, which became the abbreviated designation for the United States Naval Tech- nical Mission to Japan, was established on 14 August 1945 by directive of Commander in Chief and the Chief of Naval Operations . . . The purpose of the Mission was to survey all Japanese scientific and technological de- velopments of interest to the Navy and Marine Corps in the Japanese islands of Kyushu, Shikoku, Honshu, Hokkaido; in China; and in Korea south of latitude 38? N. This involved the seizure of intelligence mate- rial, its examination and study, the interroga- tion of personnel, and, finally, the preparation of reports which would appraise the techno- logical status of the Japanese Navy and Japa- nese industry. The mission remained in existence from 1 Sep- tember 1945 until 1 November 1946; its accom- plishments were stated to be as follows: A total of 185 separate reports comprising ap- proximately 10,000 printed pages were prepared and 500 copies of each were printed. Approximately 3,500 documents were seized and shipped to the Washington Document Center and the technical bureaus of the Navy Department. Approximately 15,000 pieces of equipment were seized and shipped to the United States for labora- tory investigation. The largest items were two 18.1-inch guns shipped from Kure, each 75 feet long and weighing 180 tons. The shipment to the United States of the 15,000 pieces of enemy equipment by the mission was but a continuation on a far larger scale of a pro- cedure established during the war, under which items of equipment captured in the field were for- warded to designated laboratories or test centers in the United States for detailed analysis and testing. In this phase of technical intelligence, the center served as a clearing house for items sent in, and for requests from Washington to forward areas for specific 'articles. By this means, the connection between reports of new weapons and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS the pieces themselves was maintained, and ade- quate exploitation of the information assured. Another responsibility assigned to the Techni- cal Intelligence Center was that of evaluating and processing information on naval and merchant ships and their characteristics. All possible sources of information were continually scanned for data, comprehensive or fragmentary, on the existence or characteristics of new ships, or for alterations in existing vessels. The collation of this kind of intelligence with a detailed analysis of all types of photographs, including aerial and surface shots, during the war resulted in far greater knowledge of enemy ships than had ever been available before. The size, probable per- formance, equipment, and appearance of the bat- tleships Tomato and Musash,i, secrets so closely guarded in Japan that even men who had worked aboard the vessels knew little about them, were revealed with amazing accuracy by this method. Another instance of the detailed processing of ship data occurred in connection with the conver- sion of the Japanese battleships Ise and Hyuga to carry aircraft on a "flight deck" abaft the main- mast. Prisoner-of-war reports were carefully checked with the Preliminary Design Section of the Bureau of Ships, and, without benefit of photo- graphs or sketches, a drawing was prepared of the possible appearance of the two vessels. The close similarity of the drawing to the ships them- selves, as revealed in the second battle of the Philippine Sea, is testimony to both the possibili- ties and value of expert processing of ship in- formation. Throughout the war the Technical Intelligence Center made available to strategic planners and to the fleet the latest information on the enemy's naval vessels, including such important factors as the speed, armament, armor, and specialized equip- ment of each enemy unit. As a means of assuring the distribution of in- formation on naval and merchant vessels, the Tech- nical Intelligence Center took over the basic work accomplished by the Identification and Charac- teristics Section in the publication field, and pre- pared standard reference manuals on the fleets of the world, together with a comprehensive volume on merchant vessels. The ONI 22 series on the naval vessels of Japan, Russia, Britain, and the CONFIDENTIAL 150 United States and other countries contains all available information on dimensions, armament, protection, and propulsion of each ship, as well as carefully prepared plan and profile drawings and detailed photographs. These publications serve innumerable uses as basic reference manuals and provide source material for recognition train- ing, naval staff work, and study at the Naval War College. ONI 209, A Manual of Merchant Ships, includes statistical information on over 13,000 vessels now afloat, in a convenient, readily avail- able index, and profiles of approximately 8,000 of these ships. Included also is a section originally designed to assist in the recognition of German raiders and blockade runners in the Atlantic, South Pacific, and Indian Oceans. In addition to these standard works, the center distributed other information on weapons and equipment through the medium of special publications, and also in articles in The ONI -Weekly and its suc- cessor, The ONI Review. As a result of the flood of information from the European theater subsequent to the Allied pene- tration of Germany, an expeditious method had to be promulgated to assure adequate distribution of vital intelligence data to those technical activi- ties best qualified to analyze the information and develop any latent value it might contain. At the same time it was apparent that much of the tech- nical data from abroad was of interest and im- portance concurrently to a number of widely scattered organizations, and, as mentioned above, to private industry. A technical library of all reports and related data was therefore established in the Technical In- telligence Center which permitted immediate ref- erence by subjects to all available information. A staff of experts was assigned the task of analyzing and briefing each incoming item of information. Members of the staff were required to know the needs of various technical organizations and to be familiar with projects being carried on by them, in order to make immediate distribution of needed data. At the same time accession lists were dis- seminated, containing brief abstracts of the con- tents of incoming documents, by means of which interested activities were apprised of the existence of these reports. Processing this type of informa- tion, translating, duplicating, and disseminating Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : COMPONENTS OF INTELL CIA-RDP85G00105R000100210002-9 IGENCE KNOWLEDGE CONFIDENTIAL was a tremendous task, and one in which the entire Office of Naval Intelligence participated, and of which it can be justifiably proud. ARMED FORCES INTELLIGENCE Even though nonmilitary methods of warfare? political, economic, and psychological ? have grown in use and importance, their ultimate suc- cess will be largely conditioned by physical force or the threat of fts use. Military strength has his- torically been the basis of national power, the hard core of all the elements through which a nation realizes its strategic objectives in peace and war. Armed forces intelligence is therefore derived from timely and accurate information of military strength, both in being and potential. It is an evaluation of the aggregate power of all the armed services, as well as a detailed analysis of each serv- ice. As a component of intelligence knowledge it has a particularly strong relationship to the other components, for armed forces are definitely influenced by a nation's geographic position, the adequacy of its transport and communications systems, its sociological, political, and economic structure, its scientific capabilities, and the per- sonalities of leaders in each arm of the military establishment. Because of these relationships; armed forces intelligence is most complex, and in order to make valid deductions the intelligence officer or strategic analyst must have not only pro- fessional competence in military matters, but also a wealth of background knowledge in those aspects of national life which govern military affairs. In an age of amphibious landings, combined operations, and "tri-elemental" warfare, Naval In- telligence is concerned with all the elements of land and air as well as sea power. Coastal zones may be dominated by either ground or naval forces, or by carrier-based or land-based air forces. Ex- tensive sea areas may also be controlled from the adjacent land. World War II provided striking examples of the effectiveness of close coordination of armies, fleets, and aircraft in achieving victory. The naval intelligence officer will often be as- signed to a joint or combined staff where he will be closely associated with his opposite numbers in the Army and Air Force. It is incumbent upon him, therefore, to become familiar with the mis- sion, organization, and professional nomenclature 151 of the other services. He should be a keen ob- server of their operations, learn the capabilities of their weapons, and appreciate their problems. The ensuing discussion of the armed forces will point out the various elements which must be con- sidered in the development of this component of intelligence knowledge. THE ARMED FORCES IN GENERAL Control Political, administrative, and command control must be clearly distinguished. They may be vested in the same officials or be separated by an elaborate system of checks and balances. In most countries a semblance of civilian control of the armed forces is preserved, but actual control is not always the same as that prescribed by the consti- tution. Usually in democracies a single cabinet member of the executive branch, a civilian, is in charge of all military affairs. In Latin American democracies, however, it is often true that civilian control over the army exists only in theory, for the military may have acquired control over the executive branch by force of arms. Civilian control of the military sometimes takes fantastic forms. During the past several years the Soviet Government has been trying to intro- duce a certain amount of "culture" into the officer corps of its armed services. It appears that "cul- ture" does not require an officer to become a con- noisseur of the arts but relates to neatness in dress and better table manners. The official officers' guide contains the following directives: Don't comb your hair during meals; don't stretch your legs out; and don't open your col- lar . . . The fork is held in the left hand, the knife in the right hand, and not vertically but horizontally . . . To eat with the knife alone is quite indecent. . . . Don't exhale into the faces of others. Any important change in the top control struc- ture effected in time of war must be carefully noted. If such a change involves the formulation of a joint general staff or other unified control, its composition and the methods whereby coordina- tion is achieved and differences resolved become significant. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Composition and Size The armed forces of a nation may include in addition to army, navy, and air, certain compo- nents with police and border security functions, which are integrated into the armed forces in time of war or emergency. The United States Coast Guard, for example, under the Treasury Depart- ment in peacetime becomes a part of the Navy in time of war. In East Germany the B ereit- sehaf ten or "Alert Police" constitutes the nucleus for an army, and the "Sea Police" can become a navy. An estimate of the armed forces of the U. S. S. R. will include consideration of the se- curity forces of the M. V. D. Data on the size of the armed forces consists of more than figures on the total personnel strength of each service. The relationship of the strength of the armed forces to total population must be shown, and significant trends in size and propor- tion indicated. Comparative figures over a pe- riod of years are essential. Position in the Nation The chief factors to consider in determining the position of the armed forces in the nation are the legal or constitutional basis for their existence and organization, the traditions responsible for popu- lar attitudes toward them, their role in political life, and the fiscal support they receive. When- ever the prestige and power of the armed forces appears to be due in part to foreign influences, the development of such influences should be care- fully traced. Knowledge of these matters will provide the researcher with the proper perspective for detailed study of individual arms and services. In many countries the size of the armed forces and the proportion of the total military budget allotted to each arm are specifically restricted by law. An examination of such laws will help to ascertain whether the present government pre- serves their letter and spirit or whether the armed forces have come to their present status without regard for legal basis. Public law may also pro- vide for organizational structure; for example, in the United States, the National Security Act of 1947 represented a fundamental change toward unification of the American military establish- ment. An understanding of our present military structure can only be gained through familiarity CONFIDENTIAL 152 with the provisions of this law and its amend- ments. The attitude of the people toward the armed forces is important in determining the position of the military as a whole or the prestige of an in- dividual arm. In Great Britain, for example, the Royal Navy is the senior service, the result, of course, of the place of sea power in British history and traditions. In America, the Army has been the senior service since the time oithe Revolution- ary War when national objectiv"& were achieved through effective use of ground forces. Reverence for military leaders and popular approval of stern military discipline have been important elements in the willingness of the German people to go to war. The victories or defeats of past wars may have contributed to the present attitude of the people of a nation toward war and military or naval affairs. National emergencies can likewise change the people's attitudes. In the United States, for example, popular enthusiasm for mili- tary matters and the prestige of military men have always been greater in wartime than in pe- riods between wars. In countries where conscrip- tion is resented the armed forces will not enjoy popular esteem, civilian control is apt to be more firmly established, and the efficiency of national defense may even be impaired. The morale and accomplishments of the military establishment or of an individual service may instill admiration and respect in the popular mind, and become an incentive for the most capable citizens to seek military service. In countries where citizen soldiers far outnumber professionals, the public attitude will be conditioned by the treatment ac- corded reservists while on active duty. The political influence of military men must also be assessed. Does the party in power take particu- lar steps to keep popular military figures removed from the political scene? Do political leaders re- quire military support to further their objectives? Associated with such considerations are the ex- istence of political factions within the services and the extent of political intrigue. Measures taken to insure the loyalty of members of the mili- tary establishment and the manner of dealing with subversive elements are important in respect to some countries. For example, in the U. S. S. R., political reliability is a requirement for promotion Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL in the officers corps, and a special organization within the military services is charged with the political indoctrination of enlisted personnel. In determining the national position of the armed forces the manner of allocation and control of appropriated funds are just as important as the amount of the appropriations themselves. What proportion of the total national budget is allotted to the armed services? Are any items for military purposes concealed in the budget figures as published? Often the executive branch of the government will have considerable funds available for expenditure without public accounting. The Manhattan project, for example, which developed the A-bomb during World War II, cost over two billion dollars, but the expenditures were never published as items in a military budget for secu- rity reasons. The national objectives of a country will be re- flected in its military budget. A striking example can be found in the present tremendous rise of United States military expenditures to meet the threat of aggression in Korea. It also reflects the growing realization that America can no longer rely on her ocean barriers. New problems of na- tional security require extensive funds for research to improve existing weapons and equipment. Manpower Analysis of a nation's manpower was initially treated in the preceding discussion of the sociologi- cal component. The same principles apply here, but more attention is given to manpower from the military point of view, differentiating between manpower as a whole and that section of it which is drawn upon for the armed forces. Statistics must be presented showing availability and quality of men fit for military service. How many young men annually reach military age, and what is the average number inducted? The basic military service laws and the general conscription system should be studied. What are the actual practices in granting deferments, and what proportion of the number available is affected by such reg- ulations? In estimating the quality of military manpower, attention must be given to physique, intelligence, education, amenability to hardship, aptitude for handling and maintaining technical or complex 269196-54--11 153 equipment, and general attitudes, such as accept- ance of discipline, esprit de corps, and loyalty. The discussion to this point has concerned armed forces as a whole. The balance of this section will deal with ground, naval, and air forces separately, and the detailed information regarding each which is needed in the production of accurate armed forces intelligence. GROUND FORCES Administration of the Army The best way to present overall organization is by a chart showing the main subdivisions of the War Ministry, or the Department of the Army, and the chain of command to territorial headquar- ters and field forces. The structure of the High Command should be included and comments made on the functions of main bureaus and staff divi- sions. Maps showing the boundaries of military districts and the location of headquarters are essential. The various arms and services of the Army must be accurately described, using nomenclature in the language of the country. Any distinctive insig- nia worn by certain troop units should be described or illustrated. Tactical Organization The overall organization of the Army into tacti- cal commands can also be presented in chart form, supplemented by a description of basic tactical units and field staffs. If there are any differences between the tactical organization in time of war and that of the peacetime Army, note should be made of them. Additional charts can be prepared to show the detailed organization of divisions and smaller independent combat units, including strengths and allotment of weapons and vehicles. Comparison with similar organizations in the United States Army is always helpful. Descrip- tions should be carried down to the smallest ele- ments, such as rifle squad or tank platoon. The organization of service units, engineers, signal, transportation, etc., should be given in the same detail as that of combat units. Nomencla- ture should be carefully recorded, for it varies considerably in armies of the world. American equivalents again serve as good standards of corn- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS parison. Therefore, for background purposes, the following brief discussion of United States Army divisions is appropriate. The Infantry Division An infantry division is typically composed of three regiments of infantry, a medium tank bat- talion, a combat engineer battalion, an antiaircraft artillery automatic weapons battalion, and four field artillery battalions. It is designed to hit hard, maneuver over any terrain, absorb reinforc- ing units easily, and show considerable staying power. In specific situations it may require addi- tional artillery, armor, engineers, or service units. It gives close support to armored units, seizes, holds, or envelops objectives, and engages in neces- sary close combat. The ratio of combat to service troops is 1 to 1. In its present composition it is a more powerful striking force than its World War II counterpart, for each regiment also has a medium tank company. The combat engineers can build roads, bridges, ferries; lay mine fields and obstacles; build shelters, landing strips, water- works; and in emergency fight as infantry. Infantry weapons include rifles, bayonets, auto- matic rifles, machine guns, mortars, carbines, pis- tols, grenades, light antitank weapons, recoilless rifles, flamethrowers, and tanks. Infantry has the advantage of being able to move inconspicuously in small groups, taking full advantage of terrain. Battle effectiveness over a period of time requires rotation of units, proper supply, and medical service. When Army infantry is used in amphibious operations, the battalion landing team is the basic organization. Necessary boats and amphibious vehicles take the place of much of the motor equipment. The Armored Division The armored division is the basic large armored unit, a balanced force of ground arms designed to be tactically and administratively self-sufficient for missions requiring great mobility and. fire- power. Typically, it is composed of 15 battalions: 4 tank, 4 armored infantry, 4 armored field artillery, 1 antiaircraft automatic weapon, 1 reconnais- sance, and 1 armored engineer. In addition, there are the necessary headquarters and service troops, including combat commands as required. It is very flexible in organization and employment. An armored division is especially suited for deep penetration and seizure operations, mobile defense, and destruction of hostile armor. If it cannot lead an assault, it can attack through an infantry division after obstacles have been breached or bridged. Maintaining its momentum is important to full effectiveness. CONFIDENTIAL 154 The Airborne Division Just as amphibious operations require special techniques and equipment, so too do airborne as- saults. All equipment must be transportable by air. The ground units depend upon the Air Force for airlift just as amphibious units depend on the Navy. Airborne divisions frequently are or- ganized in three combat teams, each with an in- fantry regiment, an artillery battalion, an engineer company, and a medical detachment. Other per- sonnel include a parachute maintenance company, antitank and pathfinder platoons. The airborne division enters combat in three echelons: an assault group, either parachuted or landed from assault transports; a followup group, landed in the air head either by assault or regular transports; and a rear echelon of maintenance and administrative personnel. The division is no more mobile than any other without its airlift. Its radius of action is deter- mined by the aircraft it uses. Typically, it re- quires 751 Fairchild Packets (C-119), 161 Chase Avitrucks (C--123) , and 16 Douglas Globemasters (0-421). Because of dependence on airlift, which in turn depends on good weather, airborne operations are usually limited to short duration strikes against key targets in the enemy rear where opposing forces will be weak or scattered. Operations are usually intended for early joining with other ground forces, raid and withdrawal, or special aid to guerrillas. An independent operation, such as the seizure and expansion of an air head, is possi- ble, but requires a major effort since medium tanks and heavy artillery are not available to an airborne unit. Sufficient air superiority must be main- tained to prevent the enemy from taking effective counteraction over a period of time. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002 9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE The strategic mobility of airborne forces, sub- ject to the command of the theater headquarters, is a threat to the enemy by its very presence in the theater of operations. At present the radius of action for large-scale airborne operations is about 730 miles; it could be extended to 1,000 miles with the aid of carrier-based aircraft. Order of Battle In time of war, a large part of the total military intelligence effort is devoted to enemy order of battle: specific information on the strength and disposition of opposing forces. Strength is meas- ured in terms of personnel, units, and armament. Disposition refers to the locations of identified units, their headquarters, and movements. For the operational commander such information on the enemy is imperative, and he must also try to keep from the enemy corresponding information on his own forces. This denial to the enemy of order of battle intelligence was well illustrated early in the Korean War when General Douglas MacArthur's headquarters asked correspondents to refrain from identifying military units in the Korean operations and reporting the whereabouts of headquarters or troop movements. Order of battle intelligence is expanded to in- clude tactical doctrines and methods, combat value of troops, records of performance of identified units, and personal data on unit commanders. If the information gathered by the intelligence re- searcher in peacetime is painstaking in attention to details, the task of the combat intelligence offi- cer in the field will be made easier. The need for including data on weapons and equipment in order of battle information is well illustrated by an experience of the United States Marines in Korea. The First Marine Division had made contact with an enemy unit. By inter- rogating a prisoner, the Marine Intelligence officer learned that this unit was a full North Korean di- vision. Consulting his order of battle file, he further learned that an artillery battalion is at- tached to each North Korean division and that its armament consists of 18 76-mm. guns and 18 122-mm. howitzers. Thus he was able to supply his commander with valuable combat intelligence on the firepower of the enemy. Order of battle data can be effectively recorded 155 CONFIDENTIAL on a situation plot for a given area of operations by pins and symbols as far as identifications and locations are concerned. A card file giving de- tails on individual units is an indispensable reference. Strategy and Tactics Since the strategic military problems of a nation are influenced by such factors as geographical position, nature of terrain, economic capabilities, and political system, the analyst's task is to study the land fortifications and costal defenses in the light of the nation's strategic concepts. Detailed information must be gathered on the location, pur- pose, characteristics, and manning of defense in- stallations. Presentation on a map will give a good graphic picture. Whenever possible, sketches or ground plans of individual fortifications should be included. The basic tactical doctrines of the Army offen- sively and defensively must be carefully studied in comparison with those of the United States Army. How is artillery used in support of ground forces? Cavalry? Tanks? Are there any pre- ferred types of field fortifications or ground ob- stacles? What use is made of reconnaissance? What tactics are employed in close combat? The doctrines established in special operations must also be included, such as amphibious landings, air- borne operations, and guerrilla warfare. Opera- tions in desert, jungle, or mountain terrain require special tactics. Similarities and differences with respect to United States doctrine should be pointed out. Personnel and Training The rank structure and system of pay and al- lowances of a foreign army can be presented in tabular form, with the United States equivalent providing a basis for comparison. Any particu- lar differences may require a descriptive explana- tion. When pay is given in the terms of the country's monetary system, the equivalent in dol- lars at a stated rate of exchange is necessary. Military pay should also be evaluated according to the standard of living in the country. Additional considerations with respect to per- sonnel are the methods of procurement, terms of service, and any quality factors not covered under manpower. An assessment of military leadership CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS against a background of the military history and traditions of the nation is valuable in a strategic estimate. Details on the ground forces training program should include training of the individual soldier as well as that of all types of units. The army school system for officers and enlisted men, regular and reserve, the character of training maneuvers, and the overall effectiveness of instruction are pertinent considerations. Closely allied to training are the reserve and mobilization systems. The total number of trained reserves should be presented by age groups. In regard to mobilization plans an estimate should be made of the actual numbers which could be called up and ready for field service on M-day, M plus 30, M plus 60, etc. Logistics Logistics enters into every phase of military activity: production, procurement, storage and issue, transport of supplies, maintenance and re- pair on the field, and evacuation of both equipment and personnel. Many a battle or war has been lost through logistics failures and contrariwise superb logistics support made victory possible for Ameri- can armies in the farflung campaigns of World War II. More recently the failure of Chinese Communist Forces in Korea to sustain offensives for long periods of time has been due to their in- ability to maintain the nesessary amount of ma- teriel at the front to support their operations. The better logistics of the United Nations, on the other hand, has enabled a numerically smaller force to contain the enemy attacks. The analyst or researcher thus considers all the factors of logistics in preparing an estimate of a foreign army. He very quickly finds that he needs accurate knowledge of industrial production and economic affairs in order to make his analysis complete. Army logistics are of particular concern to the Navy because the transport of men and supplies for any overseas operation is a naval responsi- bility. Logistic planning in the United States Army is based on the "division slice," that is, the total number of men in both combat and com- munications zones. For example, a theater di- vision slice totals 40,000 men: 30,000 in the combat CONFIDENTIAL 156 zone (20,000 in the division area, 10,000 in corps and army service areas) and 10,000 in the com- munications zone. H. G. Martin in Brassey's Annual for 1951 makes some interesting comparisons between the division slice of American and Soviet Armies: Within two months of the outbreak of war the Soviet Army could probably mobilize about 300 divisions; at the peak of its effort in the late war its total of divisions amounted to about 600. The Soviet Army achieves this multiplicity of divisions by a process of streamlining vigorously applied. Marshal Vasilevski believes that it is the men in the firing line who win battles. He sees to it, therefore, that in the Soviet Army there shall be as many men as possible in the firing line? at the expense of the rearward services?and that the ratio of weapons to men shall be higher than in Western armies. He has be- gun right down at rifle company level. Whereas in a rifle company in the United States Army there are thirty-seven men whose primary jobs are cooking, signalling, M. T. driving, or clerking, in a Soviet rifle company all but two are there for one purpose only? to shoot at the enemy . . . Clearly the West has something here to learn from Marshal Vasilevski's methods. Russia, with a plethora of cheap manpower, has given us, with our manpower shortage, a striking lesson in economy of administra- tive overheads. Clerical staffs, cooks, or- derlies, M. T. drivers, signals, engineering and medical services?Marshal Vasilevski prunes the lot ruthlessly. Of course, his is a comparatively simple problem. He can afford to cut overheads because he is dealing with men accustomed to conditions that more civilized Westerners would find intolerable. For instance, in the Soviet Army there is no personal documen- tation of soldiers below the rank of major; the medical battalion of a division is only eighty strong. Moreover, Vasirevski is faced by the fact that in Russia there is no educated class of minor technicians. Thus with the best will in the world he could not have provided the Soviet artillery with the men to do the sur- vey, work out the computations, and man the ? observation posts on a western scale. Per- force, he must there cut overheads at the sacrifice of some flexibility of fire of his ar- tillery. Finally, he has a comparatively small zone of communications to deal with. If war ? 41. ? V ? ? V I I 111 I Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL should come, the Soviet Army would advance from its bases in Occupied Eastern Europe in an attempt to overrun the western fringe. Throughout, Vasilevski would be fighting al- most on his own doorstep; but not so the United States or even the British armies? theirs would be an overseas campaign, fought through a zone of communications that must add greatly to the magnitude of the divisional slice. Nonetheless, when we have made all these allowances we still are left with our lesson to learn. The West cannot afford to put so few of its soldiers into battle.?Bras- my's Annual, The Armed Forces Yearbook, 1951, pp. 261-2. Materiel Intelligence on ground forces materiel is gained through detailed information on ordnance, signal, and engineer equipment, quartermaster, chemical, and medical supplies. Tables of characteristics must be prepared for specific items in each cate- gory of ordnance and quality as well as quantity described. Quartermaster supplies include uni- form, insignia, decorations, individual and unit equipment. Any experimentation with new items of materiel should be noted. Often the Quarter- master Corps is currently engaged in a number of research projects to determine the adaptability of such things as clothing for certain weather con- ditions, and the Engineers may be testing a new type of portable bridge. Information on medical supplies, facilities, and equipment are important in evaluating the combat effectiveness of the army in the field. The existence, for example, of a national blood bank for military use should not escape the analyst's notice. Obviously every nut and bolt cannot be de- scribed, and so the problem becomes one of se- lection of significant items representative of type and class. Photographs or sketches are always helpful. It is in this subdivision of armed forces intelligence that technical intelligence makes its greatest contribution. Conclusions reached by the technical evaluator often have far wider im- plications than those apparent from the examina- tion of an individual piece of equipment. NAVAL FORCES To make an appraisal of the naval forces of a foreign country the factors considered are in prin- ciple much the same as those for the ground forces. Organization, strength and disposition, strategic and tactical doctrine, personnel, training, logistics, and materiel have a similar bearing on the deter- mination of strengths and weaknesses. Com- parisons with the U. S. Navy and American equivalents of nomenclature will give proper per- spective to the study of foreign navies. Organization In addition to diagrams showing the overall command and administration of the navy, maps outlining the naval districts, and discussion of the functions of the more important department and staff components of the naval establishment, spe- cial attention should be given to naval communi- cations. The organization of naval communica- tions networks, and the various existing naval communications facilities can also be graphically presented on charts and maps. Tactical and administrative organization of the forces afloat should include shipboard organiza- tion of typical units. Shore support activities, and their relation to the fleet should be described. If quasi-naval organizations, such as Coast Guard, Coast Artillery, Coast Watchers, and Ma- rine Corps are not adequately covered in the pre- ceding sections on the armed forces as a whole, these should be properly included here. Strength and Disposition The disposition of ships into fleets and forces, names, types, and status of individual units can be presented in tabular form. Such information is never static, so the analyst should keep a card file on each naval vessel on which entries can be made to keep location and status up-to-date. The number of vessels in "mothballs," those used for reserve training, and those undergoing extensive repairs or alterations in shipyards should be clearly indicated. The total number of naval personnel should be broken down according to rank and rate, regular and reserve. The proportion serving in ships and at the shore activities of the naval establishment should be shown. Policy and Doctrine The capabilities of the navy in fulfilling its mis- sion with the forces available are fundamental con- 167 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR siderations in a strategic estimate. What factors influence naval thinking and strategic concepts? Are naval problems of real national concern, or must the navy wage annual battles with the legis- lature to obtain an adequate operating budget? How is naval doctrine formulated? Is it in- fluenced particularly by war experiences? Has the navy developed independent of foreign influ- ences? What are the naval traditions of the country? Every country which has a navy will also have a naval construction and development program. The political and economic factors bearing upon such plans must be noted. The Scandinavian countries, for example, are developing navies suit- able for coast defense and operation in restricted waters. The U. S. S. R. has been concentrating on submarines, destroyers, and light cruisers. Any foreign alliances the country may have will also influence naval policy and planning. Personnel The considerations which applied to army per- sonnel can serve as a guide to examination of the personnel of the navy: corps and services, rank and rate structure, procurement, conditions of serv- ice for both officers and enlisted men, uniforms and insignia. United States Navy equivalents of rank are important items of information in ob- serving naval honors when United States naval vessels are visiting foreign ports or when a foreign naval vessel comes to our shores. Reserve, Mobilization, and Training The recommissioning of ships in time of war, the naval reserve organization, the extent to which the merchant marine can augment the navy, and the adequacy of the mobilization system are major considerations. The effectiveness of the training system for officers and men must be assessed, in basic and specialist schools ashore, on shipboard, and in maneuvers of fleets and forces. Any spe- cial methods of instruction should be described; for example, the extent to which visual aids are employed, the realistic nature of exercises, or the use of educational facilities outside the navy. Logistics In addition to a description of the system of procurement and supply of naval materiel, the CONFIDENTIAL NAVAL OFFICERS policy in the construction, repair, and maintenance of naval vessels should be noted. Are naval or private shipyards in the country capable of doing all kinds of such work? Must the navy rely on foreign sources for any essential items? Where are the main naval depots located? Does the navy have fuel supply problems? Ship Design and Characteristics Of interest for strategic intelligence purposes is the adequacy of ship design for operations in certain areas. A ship designed for use in the waters of the North Sea may be entirely unsuited for tropical waters due to lack of an air condition- ing system. Arctic operations also require special ship design features. If amphibious operations are included in the navy's capabilities, careful at- tention should be given to the charactertistics of landing ships and craft. If there are aircraft carriers in the fleet, their strategic characteristics must be assessed in relation to the capabilities or vulnerablities of naval air forces. 158 Materiel Tabular summaries of the characteristics of all types of naval materiel are required: guns and ammunition, torpedoes, mines, antisubmarine weapons, electronic and communications equip- ment. Any deficiencies in quality or supply of particular items which affect the capabilities of certain ships, or of the navy as a whole, are significant considerations in strategic intelligence. AIR FORCE A strategic estimate of a nation's air forces must give consideration to the same factors as previously applied to the army and navy. The naval air arm, if such exists, can either be included with land-based air or discussed in connection with the navy. The analyst must take care to emphasize salient points of strength and weakness. In the light of the mission of the air forces, a careful study should be made of their capabilities, both as regards aircraft and personnel. Doctri- nal concepts in the utilization of available aircraft in time of war must be studied. Tactical Air Support Two types of tactical air support, close and general, must be considered. In close air sup- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COMPONENTS OF INTELLIGENCE KNOWLEDGE CONFIDENTIAL port, air action is integrated with the fire and movement of friendly ground forces against hos- tile targets or objectives. General air support comprises air operations against enemy air activi- ties, ground elements, installations, and lines of communication which assist the supported ground forces but are not in such proximity that inte- gration with their fire and movements is required. The capabilities of the air force in respect to both types of support, must be determined. The maxi- mum number and types of aircraft that can be assigned to such missions initially and on a sus- tained basis are important factors. Evaluation criteria will be performance in past wars and the emphasis given tactical air support in cur- rent training programs. The air forces doctrine in tactical air operations must be compared to that of the USAF and the USMC. Strategic Air Capabilities Here the analyst is concerned with the maxi- mum number and types of bombers available ini- tially and on a sustained basis. Range, bomb- load, maintenance of aircraft, availability of pilots and crews, location of bases, and many technical matters enter into such an estimate. The country's air defense system, that is, its ability to resist foreign air operations, is closely allied to offensive capabilities. Interest will cen- ter on the air defense organization, warning and intercept systems, including electronic equipment, types and deployment of aircraft defense units, and the effectiveness of antiaircraft artillery. De- tails will include types of radar, antiaircraft guns and fire control equipment, guided missiles, bal- loon barrage, searchlights, airborne electronic equipment, and techniques in electronic counter- measures. The average analysts will require a great deal of expert technical assistance in the compilation of such data. Another capability to which attention should be given is related to strategic air reconnaissance. With what types of planes is reconnaissance con- ducted? What types of cameras are used? How skillful are the nation's photographic technicians and photo interpreters? Air Order of Battle Air Order of Battle, similar to that of the army, provides data on identification, strength, and gen- 159 eral disposition of the units, personnel, and equip- ment of the air forces. Units are described by types, mission, and location, with comments on ex- tent of training, experience, and combat readiness. Aircraft and equipment are identified according to the numbering system, special markings, and insignia. Source and number of aircraft acqui- sitions are included. The background for order of battle data is a thorough study of the organizational relationship of major and subordinate commands and units, general control, and administrative and staff func- tions at all echelons. Again as a standard of com- parison it is helpful to have an understanding of the organizational components of the United States Air Force, the types of aircraft included in the complement of each, how service and supply functions are administered, and what facilities are needed for effective operation. Training The training program of a nation's air force is most significant for the strategic analyst. He must evaluate its effectiveness in meeting the cur- rent requirements of the air forces, its capability for wartime expansion, and the adequacy of train- ing equipment and facilities. Primary, basic, and advanced flight training are each considered with respect to duration in months, location of schools, curriculum content, number of trainees admitted annually, types of aircraft used, special training aids, and quality of instruction. A consideration of operational training will include such aspects as gunnery, rocketry, bombing, navigation, instru- ment training, night flying, and combat tactics for each type of aircraft. The training of ground offi- cers and airmen in such key specialties as opera- tions, weather, engineering, supply, communica- tions, and radar must not be overlooked. Many foreign countries have sent air forces per- sonnel to the United States for training or obser- vation. The analyst should attempt to determine the effect this contact with American training methods has had upon training policy and doctrine in the country from which the visitors have come. Often their experiences have strongly influenced relations between the two nations in areas other than military. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL Air Facilities INTELLIGENCE FOR Strategic intelligence regarding a foreign air force includes a complete description and assess- ment of the air facilities of the nation. Each fa- cility must be analyzed to determine its suitabil- ity for combat air operations and capability for airlift activity in support of combat operations. Maps, diagrams, and photos are necessary ad- juncts to a thorough appraisal. Current and pro- jected construction should be included, and special attention given to possibilities for extension of runways and general expansion of installations. Climate and topography are often controlling fac- tors in a nation's development of air facilities. Any limitations caused by these factors in certain areas should be ascertained. The meteorological services of the country and the use the air forces make of them are pertinent in this connection. Other Considerations The study and evaluation of personnel, reserve and mobilization systems, logistics, and materiel of foreign air forces will embody the same gen- eral considerations as were previously outlined for the army and navy, with variations in details as applicable. BIOGRAPHICAL INTELLIGENCE Biographical intelligence has the important function of providing information on individual persons in foreign countries and, as has been pre- viously suggested, this component of intelligence is essential to all of the others. Knowledge about leaders in government, politics, science, education, military services, and business will not only be helpful in evaluating aspects of these general fields, but also may provide valuable clues to prob- able courses of action. The background, person- ality, enthusiasms, and prejudices of such indi- viduals constitute vital considerations in an eval- uation of national strengths and weaknesses. In the sociological component the people are consid- ered collectively and characteristics common to groups are ascertained; biographic intelligence re- fines this study, centering interest on the dominant figures within the groups. Obviously the intelligence researcher cannot keep extensive data on all individuals. His pri- CONFIDENTIAL 160 NAVAL OFFICERS mary task is therefore one of selection, but he can- not be limited to only those prominent in the con- temporary scene. He should always be conscious of the fact that leaders of tomorrow may now be in relative obscurity, but there may be signs point- ing to rising eminence or power. The sources of biographical information are many. In a great number of countries volumes similar to the American "Who's Who" are pub- lished at regular intervals, and official registers list persons in government service. The daily newspapers and a great variety of periodicals will always contain additional information. Most valuable of all are character and personality esti- mates from those who know or have known the individual professionally and socially. The paragraphs below will serve as a guide to the content of the ideal biographical file. It will not always be possible to obtain all the data for every individual but the goal is defined. Vital Statistics The items to include are those usual for identi- fication purposes: full name, nationality, reli- gion, residence address, date and place of birth, general appearance, parents, etc. Uniformity in spelling geographical names and in trans-literat- ing from foreign languages which do not use the Latin alphabet is essential to a good biographical file. Valuable aids in this respect are standard gazeteers such as that published by the Board of Geographic Names of the Department of the In- terior, and the Style Manual of the United States Government Printing Office. Education The data here should include schools attended, degrees conferred, and academic honors. Extra- curricular activities can also be significant. If the individual became the disciple of a certain professor at an early age it may be reflected in his later thought and attitudes. His foreign language proficiency is another important consideration. Personality Thus far the biographical file has merely com- piled a vita for the selected individual. When we come to personality, intelligence begins to be produced. An evaluation must be made of the Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 ApprovedFeapoliqms,229,3ipietickeepe59g125R0001 0021 Quaza uunnuENTIAL personality traits which govern his behavior: moral force and character, intelligence, personal characteristics, opinions, and loyalty. Does he have marked qualities of leadership? Is he a man of strong convictions or are his opinions easily changed by others? Are his ideas of right and wrong well defined? Is he honest? Those who have associated with the individual can supply the best answers to questions concern- ing his mental abilities, but much can be derived also from any books or articles he has written or his published utterances. Does he quickly compre- hend new ideas and can he rise to the occasion when he meets the unusual? Is he well educated in the sense that he has a broad understanding of local and international affairs? Has his perspec- tive been enhanced by travel abroad and contacts with a great variety of people? Does he have cer- tain distinct prejudices? Is he pro- or anti- American? Personal characteristics comprise another con- sideration. Is he energetic or lazy? What are his drinking and eating habits? What are his usual forms of recreation? In what social circles does he move? Is he bold or cautious? What is the state of his health and does it affect his activity? Is he loyal to his country and his superiors? Does he inspire loyalty in others? Family Family position or influence must not be over- looked. Often an ambitious wife is "the power behind the throne." Family ties are important 269196-54 12 161 influences in the lives of men, and are often mir- rored in their careers. Is he a family man? Has he used family connections in any way to achieve certain goals or ambitions? Does he have children whom he is encouraging to follow in his footsteps? Relationship of Factors Only a final consideration of all the above fac- tors in the aggregate will give a complete picture of the individual's administrative ability, profes- sional competence, disposition, tact, sobriety, inter- national sympathies and attitudes. Biographical intelligence thus can be used to great advantage in strategic estimates. It is intimately related to any field where names make news. The objective of the foregoing discussion has been to outline broadly the logical division of in- telligence knowledge into component parts, and to indicate to a degree their nature, comprehen- siveness, interrelationships, importance, uses, and sources. The applicability and utility of this great body of knowledge in relation to current world problems is suggested by the following three chapters which are, in effect, topical summaries in the field of international relations: elements of world power, factors in the foreign relationships of the United States, and salient features of World Communism and the U. S. S. R. These chapters will also contribute to the development of the naval officer's perspective in his approach to mat- ters of intelligence concern. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002:9_ uuNFIDENTIAL CHAPTER 6 ELEMENTS OF WORLD POWER In approaching a study of international rela- tions a naval officer assigned to intelligence duties should keep in mind three basic points. First, a nation's power position in relation to other nations of the world is determined by its comparative strength in various of the categories described in the previous chapter as the components of intelli- gence knowledge. Second, a nation's strategy to- ward other nations is influenced directly or indirectly by its own relative standing in one or more of these categories. Third, in the exercise of national power there have developed in the course of modern history certain recognized procedural patterns which apply to relationships between nations. A valuable aid to such a study is an understanding of the elements of world power and their effect on the behavior of nations. For many years, problems of international power relations were viewed in a somewhat de- tached manner by the United States, and its peoples tended to adopt an idealistic approach. World War II and subsequent events had a tre- mendous impact on that point of view and ap- proach; the United States found itself directly involved in problems of world dimension and its idealism attacked. However, as an aid to finding solutions, America's idealism is a vital factor, a very real force that must be preserved, for it repre- sents the symbol of personal freedom and justice in a chaotic and frustrated world. But idealism is not to be confused with a denial of realities or of the basic facts relating to them. Perhaps for the first time in American and world history there is much more at stake than the survival of present political institutions. The very structure of our social life is threatened. Modern technology makes all parts of the world accessible to every other, and philosophies opposed to our own are for the first time organized and regimented on a world scale. Therefore, a sober concentration on solu- tions to problems of international relations is essential, not only for our own survival, but also for the survival of those peoples with whom we have kinship of spirit and tradition. 163 STRATEGIC GEOGRAPHY AND RESOURCE POTENTIAL Consideration of a nation's total power potential involves all elements of its national power and especially those of geography, resources, industrial capacity, manpower, and technology. In study- ing these elements separately, the intelligence offi- cer, whatever his individual role, must have an appreciation of the whole, an understanding of how the particular facts he collects and assesses ultimately compose the total estimate of a nation's power. It will be helpful to discuss the elements of world power from the point of view of the United States. Geographical Environment Let us begin with a consideration of our geo- graphical environment. In this world, man lives principally on the large scattered islands known as continents, and on lesser archipelagos. He has made his greatest progress and shows the greatest ambition in the temperate, lowland, regions. His growing numbers and changing technology have brought new stresses in the age-old fight for con- trol of resources. In ancient times, the struggle was for hunting, grazing, and agricultural lands. Historically speaking, as a newcomer on the planet, man has only recently developed written languages and a real technology. The industrial revolution and modern economic society date only from the time of our most immediate ancestors, within the last two centuries. Snowballing prog- ress and new ambitions have centered major rival- ries on control of natural resources, manpower, transport routes, strategic positions, and mass markets. We in America find ourselves occupying a rich continent newly settled in large numbers, with a culture largely western European, which was earlier subject to the civilizing influenced of Rome, Greece and the Middle East. Our continent, North America, in one sense is isolated by two great oceans from the principal land mass of the CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 CONFIDENTIAL INTELLIGENCE : CIA-RDP85G00105R000100210002-9 FOR NAVAL OFFICERS world: Eurasia-Africa. In another sense, our iso- lation is quite ephemeral when our map is not the traditional Mercator but a globe or polar projec- tion. In an age when jet aircraft, even following the traditional routes, cross the ocean in a few hours, and guided missiles on the drawing boards will cross it in a few minutes, any vestigial ideas of geographic isolation must be discarded. Our technology is now so complex that what- ever our military isolation or defenses at home may be, full exploitation of our industry and our acquired consumption habits require access to re- sources far from our own frontiers. Possibly only the United States and the Soviet Union would be capable of maintaining their present living pat- terns from the resources within their own bound- aries. Even then our own high standard of living would definitely be cut, and higher production costs would be accompanied by plaguing short- ages of key materials for which only inferior sub- stitutes would be available. Economic isolation is only one aspect of the problem, for should we retreat within our own walls, the smaller nations of the world, if organ- ized or dominated by an aggressive power, would in time far surpass even our own great industrial and military potential, and today's new weapons would banish any possibility of real defense in depth. War in devastating form would come to our own hearths. Geographical Patterns Let us then consider what are the geographic patterns that govern what we and other nations must defend for survival, and what are the routes of attack, for these patterns should be basic keys to conflict and strategy in the world, without re- gard to political organization or to ideology so long as mankind wars with his own species. We are concerned with the position, the terrain, the climate, the vegetation, the shape and size of land, the resources, and the population of each area or sovereign state. The power position of each nation will be affected in some degree by each of those elements. Power depends on mate- rial factors, such as resources, capital goods, tech- nology, and manpower; it also depends on in- tangible factors that are harder to measure objec- tively, such as the energy and central driving pur- CONFIDENTIAL 164 pose, the steadfastness and traditions of a nation. Some peoples, who by every objective test should have disappeared long ago from the earth, have a staying power that has helped them to survive oc- cupation, dismemberment, and deportation. Our first concern is with the tangible factors, the physical patterns. The reader should refer to a globe, if possible, and also to a good atlas, in- cluding maps of physical relief, climate, and re- sources distribution. Space here will not permit particular study, region by region, but the ap- proach and viewpoint can be delineated. Think- ing of the military and political and economic aspects, study your maps to observe the land and the water pattern of the world. Where are the land bridges that armies use? Where are water trade routes channelized for contending naval powers to dispute control? The patterns of mountain ranges, and of deserts are important, as well as the vegetation lines that indicate the shifts from tropical rain forest to savannahs to desert to steppe to temperate forest, and so on until the tree line and the various crop lines mark the polar or high central Asian regions. These changes give clues to the significance of regions in their poten- tial for supporting man and his crops and ani- mals, and for their effects on military movement. Throughout history military barriers to traffic- ability and movement have dominated campaigns and their outcome. Changing technology has modified this only in part, for as men have in- vented devices to overcome these barriers, so have they frequently found other tools to neutralize these advances. Deserts are of prime importance as barriers, whether they be dry deserts of the temperate and tropic areas or the frozen wastes where survival is always a problem. Mountains serve as great defense lines against military move- ment, though, of course, the test of the barrier lies in the passes through it, not in the individual peaks of the main ramparts. Even open plains are a major obstacle when by season they alter- nate between soft mud and windswept snow or cold. In some degree, swamps and marshes, jungles and rain forests, oceans and rivers chan- nelize and restrict military movement, unless the means to bridge them are at hand. Invading forces from the sea find that coasts are not uni- form in nature, and that only a few beaches and Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ELEMENTS OF WORLD POWER ports lend themselves to mass invasion. Of course, there are man-made obstacles to military movement, but in contrast with nature's, they de- serve scant attention here. With these general clues to factors affecting military movement, both history and the contem- porary scene can be viewed in a new light as one studies problems of military and naval campaigns. A good grasp of the general position of countries, the barriers of terrain, vegetation, und climate that aid or hinder them, is basic to an understand- ing of their power position. Clear recognition of the difference between oceanic and continental climates may give clues to the success or failure of campaigns. As a further uid to full under- standing, one should study maps from several approaches. The geographic position of coun- tries takes on new meaning when maps are turned in unconventional directions. It is only custom and convenience that makes us consider north as "up.,, Controlling Resources Historians theorize that modern civilization be- gan as the last ice age receded, allowing the two keys of geography and resources to open the door to progress. In the ancient world of Egypt and Mesopotamia in the west, and in the protected val- leys of Sinkiang and Kokonor in the east, simple communal living rapidly blossomed into complex civilizations. In the Middle East, rich alluvial plains with wild rice in abundance led to settled farming and the further domestication of animals which had begun in nomadic days on the grass lands of Asia. Sedentary living led to building cities, codifying laws, and written communica- tion. In time, smelting metals, farming, and trade became widespread. Today the controlling resources include more than plentiful food, for the age of reason, ex- perimentation, and exploration brought mechani- cal inventions that depend on a wide range of natural resources. The key to national power today is not alone food, but energy derived from coal, oil, and, to a lesser extent, water power, and iron, which is still the chief metal, since the bronze age was left behind thousands of years ago. These are then the major elements of real power, but there are a host of others, strategic in nature, 165 CONFIDENTIAL whose particular properties support the alloys and specialties of metallurgy, the growing chemi- cal, plastics, and electronic industries, newly dis- covered methods in agriculture, and, of course, that new key to power, the development of nuclear energy. Food patterns are still important, for indus- trialization and modern transport have developed dense concentrations of population which depend for survival upon orderly flow of their sustenance. Wheat, rice, corn, barley, sugar, fats and oils, fruits, beans, fish, meat and dairy products fill thousands of ships on the ocean highways of the world, and load the great rail networks across the continents. Shipments of tea, coffee, tobacco, and chocolate may also be considered essential, for they contribute to morale, one of the intangibles in national power. Industrial Location Modern economics has given importance to the theory of location of industrial activity. In simple terms, it recognizes that locations of raw materials, power, labor supply, and markets all interact with transport costs and material char- acteristics to determine where industry is to be found. Changing technology alters the force of the various elements in the equation, but generally speaking, industry is drawn to the source of the materials it uses (if they are weight-losing in processing) , to save transport costs. Thus the modern dependence on mechanical power derived from coal, oil, or hydro-electricity tends to draw industry to these materials. Pittsburgh, the Ruhr, Manchuria, the English Midlands all dem- onstrate this tendency. Some countries by strenuous efforts have tried to overcome their natural deficiencies, but they face a losing battle. Italy's large industrial popu- lation tries to earn enough through trade to pay for imported coal. Japan, now restricted to her home islands, also depends heavily on imported materials. Even the United States, though well supplied with fuel, must consider the full military implications of replacing the ore from the nearly exhausted Mesabi range with ores from abroad, thus losing the advantage of cheap haul through the Great Lakes. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Coal is still the dominant fuel of the world and must be ranked highest among essential mate- rials for economic, and consequently military, strength. It generates steam to provide electric- ity, has a major role in metallurgy, and can be used to make a host of chemical products including gasoline. Oil is a second important source, as a principal source of fuel for millions of internal combustion engines, and also as a raw material for the chemical industry which, among other things, supplies rubber substitutes. Iron and steel follow closely after fuel as major essentials, but the dominance of these particular resources should not make us disregard the vital though smaller role of copper, lead, manganese, sulphur, zinc, aluminum, nickel, and tin. Modern industry is built upon a great number of major and minor materials. Salt, phosphate, potash, mica, asbestos, industrial diamonds, graphite, nitrates, mercury?all are essentials. The metals that alloy with iron must be available if tools are to keep their cutting edges, if armor plate is to stop projectiles, or if springs are to keep their resilience. Likewise tungsten, antimony, chromium, palladium, and molybdenum must be added to manganese and nickel to expand the list of essential alloys. From our fields and plantations, in addition to food, come cotton, flax, and other hard and bast fibres?jute, abaca, sisal, ramie, and hemp. We also depend on wool, leather, hides, and bone. Rubber, though increasingly available in syn- thetic form, is provided from the tropics. Our temperate area forests, wastefully cut until re- cently, provide us with principal building mate- rials, with paper, a modern-day essential, with raw materials for plastics, with distillates, and naval stores. Even water is an important resource, not only to quench our thirst and to water- our crops, but also for industry which consumes it in enormous quantities. It provides transport routes and hy- dro-electric power, the latter of which can create nitrates for fertilizer and explosives directly from the atmosphere. Our electric power system, draw- ing upon the energy of water, coal, oil, and gas, is a prime target for any enemy, and its growing size is an index of our strength. CONFIDENTIAL 166 Our resources are of two types: replaceable and irreplaceable. To date, modern technology and field exploration have kept our standard of living rising despite a profligate waste of irreplaceable resources. Perhaps the sea can be made to yield what can no longer be found on dry land, but defi- nite dangers to our economic and military strength loom not far ahead. Strategic Materials We define strategic materials as those critically short in relation to our need for them. One of the prices of World War II was that it greatly ex- panded the list of strategic materials the United States should stockpile or protect overseas, if our security is to be maintained. The appearance of an item on the strategic list should immediately set in motion measures to offset the potential dan- ger of shortage. What steps are taken depend upon circumstances at the time, but among the possibilities are new searches at home for these materials, production controls and consumption restrictions, measures to assure overseas supply sources, creation of import stimulants and export quotas, assignment of necessary manpower to ex- ploit sources of these materials, initiation of con- servation and recovery measures, the adoption of special measures to prevent crippling sabotage of our limited supply, and the development of sub- stitutes. Actually, in the case of many materials which are running short in usable form, there may be marginal and submarginal deposits that can be exploited, but the cost may well be inordi- nate in time, manpower, and capital equipment. Resources in the ground or in the forest do not of themselves make for strength. Many richly potential stores of materials lie in undeveloped and weak countries. It is only with capital ac- cumulation, know-how, manpower, and transport, that these resources are translated into power through production and delivery for use. Capacity To Produce 0 ur assessment of a country's power must there- fore measure not only its stores of materials but also its actual capacity to produce. Quantitative data of major semimanufactures and finished products give a part of the answer. These data in turn must be linked to plant capacity indices. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ELEMENTS OF WORLD POWER Are all plants operating at full capacity ? Are trained manpower, raw materials, power, and transport available to work more shifts? Next, we ask, can any of these plants readily be converted to the production of war goods? Tractor plants may make tanks. Automobile plants may switch to aircraft engines or subassemblies, or it may be that plant expansion will provide the answer to real military strength. If the building materials and machine tools can be set aside for use in new factories, rather than go directly into war produc- tion, the eventual output of war goods may be very high. All of these matters are interrelated and very complex. Knowledge is still too inadequate concerning the relative effectiveness of price and tax incentives, or of government orders and con- trols, to give categorical answers in all situations. It should be stressed that military power is not measured alone by the production indices of out- put, capacity, conversion, and expansion, for civilian consumption may compete with military requirements. Thirty million tons of steel in one country may count for more militarily than one hundred million in another, if the latter country uses virtually all of its steel for civilian consump- tion, as against heavy military use in the first. On the other hand, given a big enough crisis, the rich consumer country has a bigger cushion that can be diverted to military ends, or may at least launch a great program of plant expansion. These are imponderables that are solved only by careful and qualified analysis, not by catch phrases and popu- lar fancy. For the length of the war, the sud- denness of its coming, the temper of the people, the dispersion of facilities as protection against surprise air attack, are all variables that affect the answer. There have been numerous examples of the complexity of a partial mobilization in the time since the Korean War began. How far can taxes be pushed to curb inflation without drying up needed capital for expansion or reducing tra- ditional incentives? Will controls aid fair dis- tribution at low prices, or will they create a huge bureaucracy and reduce total supply? Well- informed and patriotic Americans find themselves arriving at different answers. A number of agencies and offices of the executive branch of the United States Government, assisted by private research groups and congressional staff 167 CONFIDENTIAL studies, are involved in guiding the planning for war mobilization. From their work come the plans that direct stockpiling of essential materials, the mobilization manufacturing and control plans, and the assessments of national strength. A com- plete assessment of our power must be compared step by step with that of our allies and our rivals to draw up the balance sheet that will indicate where there is need to expand, to divert, and to contract for national security essential to survival, but at the same time saving the mainsprings of long-range progress and traditional patterns of living. These agencies study agriculture, giving consideration to the methods used, manpower and materials demands, regularity and quantity of various crops, and availability of additional lands for expansion. The extractive industries of min- ing, forestry, and fisheries yield data on output per worker, capital requirements, availability of re- serves, and new processes becoming available. The basic metallurgical and chemical industries have indices of production, changing methods, and varying efficiencies; for example, blast furnaces serve as an index of productive capacity, yet one country may run them harder and faster than another to increase current yield of pig iron even at the expense of destruction of capital equipment. Study of the permanent munitions industries is important to the total picture, too. The shipyards, the explosives manufacturers and arsenals, and the atomic plants, are typical cases. Certain civil- ian goods industries are particularly susceptible to military conversion. The television industry of America may have given civilians home receivers instead of those same resources going into a com- plete air defense radar net, but at the same time, the existence of a huge electronics industry will supply the conversion capacity in war for radar on an immense scale, and the coaxial cables and microwave relay networks may speed military communications. The engineering and machine tool industries are important, because their ability to produce will determine ability to turn out novel weapons of war in time to use on a mass basis. Economic Vulnerability Once such broad, general studies have been made of our own resources, and, with the aid of intelli- gence, of those of other countries, there are spe- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS cific studies and individual conclusions which must next be undertaken. One area of concern is that of vulnerabilities, both here and in foreign countries. Is the flow of raw material subject to interruption, as, for example, the Soo Locks or the TAP line? Are there technological bottle- necks in such industries as ball bearings or avia- tion gas? Is capacity limited by poor transport facilities; for example, the Baku oil fields and Ven- ezuelan iron ore? Is a specialized labor force available? Can watchmakers work on precision instruments? Do we have sufficient oil well rig- gers? In what degree are different industries in- terdependent or are they competing for a common labor or power supply? Is steel available for final products or for steel plant expansion? National power, too, is linked with defenses, for a great industrial machine unguarded is an invi- tation to attack. Defenses may be active, made up of radar nets, jet fighters, balloon barrages, and AA guns, or they may be passive and equally effective, such as duplication of facilities, region- ally decentralized into far reaches of the country, or locally dispersed from the center of urban areas to offer targets of lower density and therefore less attractiveness. In some cases facilities may re- treat to hilly country or even underground. Transport Assessment Increasingly, transport is being subjected to analysis and study, for it is a major factor in power. Britain's plan for agricultural develop- ment in Tanganyika, many other "backward" area development plans, and Soviet strength all have suffered from poor transport. Even the United States must consider the repercussions in the long run of low railway earnings, and of inadequate highway modernization. Assessments must there- fore be made of facilities, as to capacity, efficiency in ton-miles per day, and per worker, repair and fuel needs, the bottlenecks in marshalling yards, bridges, tunnels, and steep grades. It is difficult to measure foreign progress ade- quately due to incomplete statistics. Figures are rarely comparable, frequently are withheld, and often lack meaning due to inadequate qualification and definition. If only a few figures are to be chosen, the key ones for national power should in- clude electric energy production, steel production, CONFIDENTIAL 168 and transport data such as car loadings, and ton- miles hauled. Manpower Assessment Manpower has already been mentioned; it rep- resents a significant measure of power both for the present and for the future of a country, when coupled with information on geography, raw ma- terials, and industry. Mere numbers alone, or even the military age numbers, are only the begin- ning for a power analysis. The data on numbers must be supplemented by detailed breakdowns on distribution by geographical location, and by den- sity in relation to developed resources. Trends are important. Is the population stationary, ris- ing, or falling? If it is rising, what is the rate of increase? At what height and when will the population level off? The sex-age group distri- bution or pyramid will tell what the labor force and the military supply will be now, 10 years from now, and even farther in the future. The supply of females of child-bearing age, related to other data, will forecast shifts in the population. Quali- tative population analysis will help to assess some of the intangibles of national power. The break- downs by education, cultural background, and technical skill are important. Tables on national origin, political parties, and religion may give important leads to questions of national cohe- sion. Economic groupings, tied to national and personal income statistics or land holdings, may answer questions on the appeal of communism or land redistribution. Although social scientists may quarrel with the statistical validity of mass personality traits, from a purely pragmatic view there seems to be definite value in studying typical traits of national character, for they may give clues to determination, objectives, subjectivity to hysteria or impatience, and other elements that influence an assessment of foreign nations' behavior. In the long run, national population trends will have their effects on the power position and foreign policies of countries. Medical, economic, intel- lectual, and religious environment factors affect birth rates and death rates as well. A shift in either rate will affect population growth. Al- though we have come a long way from the pessi- mism of Malthus, the growth of the total world Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ELEMENTS OF WORLD POWER CONFIDENTIAL population can be a subject of grave concern. Density data as such are meaningless in isolation, for Australia will never catch up with the United States, despite her area, and China has nothing like the overall density of the Netherlands, yet is prob- ably more "overcrowded." Net reproduction rates, adjusted for migration and possible life span changes, are key data to power calculations. Total Power Potential These elements reviewed in the foregoing sec- tion, then, are the basis for estimating the total power potential of a nation. No one element is dominant, neither industry, nor resources, nor manpower, but all are considered jointly with questions of geographical location, climate, and topography. Also important are the questions of vulnerability, of trends as well as of present situa- tion, or capacity to produce munitions as well as total industrial capacity. By no means can the intangibles of national spirit and determination be ignored, and in this day and age the ability to adapt national life to so-called "Cold War" may rival in importance the strictly conventional mo- bilization of the nation. This brings us to the next topic, the bridge between the assessment of national resources, in the broad sense, and politi- cal relations among nations, namely, geopolitics. GEOPOLITICS AND STRATEGY The formal study of all the aforementioned power factors in relation to geography and na- tional strategy is called geopolitics, a term that has been made unsavory only because of its mis- application by Nazi theorists. The scientific study of geopolitics is not only proper, but es- sential to our national well-being. It is of par- ticular interest to intelligence analysts because of its possible influence on the thinking of foreign political leaders and, hence, on the strategic plan- ning of various nations. A knowledge of geo- political concepts may give clues, therefore, to esti- mates of national behavior. Treatment of this subject here can only be cursory. Mackinder and Mahan In 1904, an Englishman, Mackinder, introduced the concept of the world island with its heartland, safe from assault by seapower. The heartland is 169 described as the territory encompassing much of the Soviet Union and the suzerainties under nomi- nal Chinese control, such as Sinkiang, Mongolia, and Tibet. The lands around the edge of the world island, which can be dominated by seapower, are referred to as the marginal crescent. The Americas are regarded as an outer island. Of course, such concepts are meaningful only in a limited sense, for new map projections, air travel and guided missiles rob the heartland concept of considerable meaning. The concepts are impor- tant, however, because they have influenced the thinking and policies of many leaders since Mack- inder's time. The idea "whoever controls the heartland controls the world island; whoever con- trols the world island controls the world" is an oversimplification, and although it has an ele- ment of truth, it is not a substitute for the careful and detailed analysis of national power previously recommended. Mahan of the United States Navy was the great exponent of sea power. His voluminous writings do not precisely delineate seapower, but general concepts can be derived from them. Seapower is related to the control of the commercial arteries of the world. It is the outgrowth of proper access to the sea coupled with the industry necessary to sup- port merchant ships and navies. The right bal- ance of fleets, control of strategic bases and fuel supplies, good training and morale, all combine to create sea power. Mahan felt that no nation has the ability and capital to be both a great sea power and a great land power, either one resulting in a serious drain on resources. Although in some way a comforting doctrine, it may not be com- pletely valid. Other influential writers in this field were Ratzel in Germany, Semple in the United States, and Kjellen in Sweden. Ratzel believed that geog- raphy dominated history, and he considered the state as a living organism. Coordinating his theories of selection and survival with those of Darwin, he attributed a spatial aggrandizement instinct to states? a theory somewhat difficult to support as a universal law. Semple was a disciple of Ratzel. Kjellen considered the state as not just a legal entity but as a living being. It was he who coined the expression "geopolitics," and in- fluenced the pan-German movement, believing that CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR one German state should spread from Scandinavia to the Near East. The American, Spykman, instead of opposing seapower to land power, envisioned seapower as joining with land power in one part of the world to fight similar combinations elsewhere. Consid- ering interior communications to be poor, he put stress on control of the rimland rather than the heartland and believed that the United States must oppose any attempt to dominate the rimland or crescent. German Interpretations Under the aegis of Hitler, Germany adapted Mahan's and Mackincler's doctrines to her own ends, with General Haushofer as the chief prophet. The Auslands organization and Geo- politic Institute combined studies of geopolitics with an intelligence collection program for plan- ning Germany's strategy. Haushofer considered that a Soviet-Japanese combination of land and sea power would be dan- gerous. Because of improved land transport, he tended to discount seapower and thought that if Germany could move to dominate Eurasia, its position as world leader would be assured. Spe- cifically, he favored a number of policies which markedly influenced Hitlerite Germany. These included autarchy, (national economic self-suffi- ciency), "lebensraum" (enough space for a vigo- rous, growing people), and a three-way split of the world, in which the United States would domi- nate pan-America, Germany would dominate Europe including Russia, the Middle East, and Africa, and Japan would dominate Asia and the South Pacific. He saw German control of the marginal crescent as a means to add seapower to her land power. Also he believed that a nation's frontier should be along a natural boundary, for any other frontier represented no more than a temporary truce line in time of peace. Peacetime, further, was viewed just as a breathing spell be- tween wars, a time to out-flank and encircle the enemy. International agreements were to build balance of power, not world security. All the great powers in considerable degree have operated geopolitically, whether they recog- nized the fact or not. Their use of geopolitics may have been more or less benevolent, or it may have CONFIDENTIAL 170 NAVAL OFFICERS been aggressive. The Truman Plan of contain- ment represents an application of Mackinder's theories. Although unable or unwilling to strike at the heartland, the United States has been de- termined to prevent the heartland leaders from seizing all of the marginal crescent that might allow them to add seapower to their land power, and thus dominate the world. Many of these geopolitical concepts need re- finement and modification in the light of the changing conditions. Atomic concepts of war- fare and power may well modify accessibility in the military sense. The Arctic no longer repre- sents a dead space, but rather a crucial direct air route between the power centers of the world. The concept of imperial domination has been re- placed by that of consultation as a guiding rule in the relationships between many world states. Airpower Concepts To Mahan's doctrine of seapower and the Ger- man-Soviet doctrines of land power have been added the doctrine of air power, first formulated by General Billy Mitchell and Douhet, and later vigorously presented to the public by Major de Seversky, an ardent enthusiast. While this doc- trine has given rise to heated debates involving the concepts of a dominant arm versus balanced military forces of approximately equal strength, it may be concluded that sea power, land power, and air power each have their potentialities and limitations in the determination of national power. To summarize, it must be admitted that history has been strongly influenced by geography, that defense in depth is a valid and compelling mili- tary doctrine. Though the heartland and rim- land ideas have strong elements of truth, how- ever, modern world power is based not only on location and size and shape, but also on resources, demography, technology, and transport. Power Politics The United States in its public conscience has disparaged power politics as an unworthy force, and as a poor approach to world relations. Yet the existence and use of power politics is ines- capable, whatever this doctrine is called. We are concerned with power to control the minds and actions of men, particularly men organized to do jointly what individuals could not do. Power is Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ELEMENTS OF WORLD POWER not force in its actual exercise, but it does imply fear of force. United States power has been in- creased by possession of the A-Bomb, even though its use is potential. This power would be reduced if controls were placed on its use, such as prior approval by the United Nations or even by Con- gress, since speed of reprisal may be the most potent deterrent to a would-be aggressor. Eco- nomic power can also be used for national power purposes. Control over exports of finished goods and raw materials needed by other countries is an enormous source of power. There will be power politics so long as nations keep their sovereignty. If a few "enlightened" nations eschew its use, they will be destroyed by the unenlightened. Power politics may be used merely to hold exist- ing positions, the status quo, to improve position through expansionism or imperialism, or to main- tain prestige by demonstrating that power. INTERNATIONAL POLITICAL RELATIONS It is very hard to be entirely objective in dis- cussing international political relations. Each nation tends to view its own conduct as above criticism and the conduct of others as frequently reprehensible. Even more, nations may often be unjustly charged with responsibility for an in- ternational situation because of the great difficulty in accurately and correctly identifying the events which led to the particular situation. Any assessment for intelligence purposes must be impartial and analytical: motivations both of the nation and its leaders must be carefully stud- ied. Certain general guides which may be help- ful in making any evaluations involving interna- tional relations are presented in this section. The "Status Quo" There is nothing especially sacrosanct about the status quo, though this is a pretension of those who are satisfied with it. The Congress of Vi- enna, the Versailles Treaty, and the United Na- tions have all had some part in maintaining things as they were. It should be pointed out that status quo does not refer to freezing of existing boun- daries, though on occasion it may take that form, but rather to maintaining an existing balance of power. Those who maintain existing situations, even though unfair, may have the weight of inter- CONFIDENTIAL national law behind them and be the upholders of "peace." All challengers, of course, are called "war mongers," regardless of the cause for which they struggle. Certainly, those who would resort to force carry the burden of justification for their acts, and their propaganda is rarely adequate, or accurate. Imperialism As opposed to the status quo, imperialism repre- sents an attempt to bring about a favorable duinge in a current world power situation. It refers to a nation's policy aimed at an extension of power over another area with or without the approval of the peoples concerned. The motives, and the means, for gaining this additional power may be economic, political, military, or ideological, or a combination thereof. Any analysis of this phe- nomenon of national behavior will result in the conclusion that it is exceedingly complex. For many years, the term imperialism has been in disrepute as the result, partly at least, of its association with the policies of colonialism and territorial aggrandizement carried on by various European nations during the latter nineteenth century at the expense of backward areas. Dur- ing that time, a predominant motive was eco- nomic competition, coupled with the search for larger markets and sources of food and raw ma- terials. However, there were other motives, such as the desire for expanded political power and prestige which might exert a dominating influence in world affairs, the real or assumed need for pro- viding greater guarantees for national security, and the search for sources of potential military manpower as well as areas of expansion for sur- plus population. There are curious inconsistencies in the inter- pretation of this term. Mussolini found it an expression of a nation's vitality. Marx and Lenin explained it as entirely a product of capitalism, a "dying" stage in which there was an inevitable struggle between national monopolies in the inter- national arena. They reasoned that by definition communism could not be imperialistic because it did not have the same need for new markets and trade. In popular fancy, imperialism has been associated with the "machinations" of Wall Street and the munitions makers, the Japanese Zaibatsu 171 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS emperor-worship, or the exploitation of colonial subjects. But these interpretations are inade- quate, since imperialism predates modern capital- ism by thousands of years and, from the American viewpoint, communist and socialist states have demonstrated positive imperialistic tendencies, re- gardless of the labels used. The policy of imperialism has been considered one of the causes of war. Wars actually arise for many reasons which are usually composite and complex in nature. There are so called "defen- sive" wars, designed to keep the status quo, but which often seek a permanent change in power to prevent effective challenge to present positions. Other wars are deliberately designed to expand the power position of a country, even when it is not threatened. The power vacuum theory applies in some cases, too, when the strong powers, rush- ing to dominate a newly weakened or discovered area, clash in their efforts for supremacy. This situation has been more recently demonstrated in Greece and Korea. A few aggressive nations, either for supposedly lofty or for very base rea- sons, have also set out deliberately to conquer the world by one means or another. Can compromise be considered a solution to the ambitions of such aggressive states? Repeated examples from history, some quite recent, seem to suggest that, at best, compromise may only shift the time table for further aggression. This may not be wholly bad for the compromiser, providing he can use this time to good advantage. Rearm- ing and defense pacts, important and inescapable as they may be, are not in themselves an absolute guarantee of peace, for they may create a vicious circle of counter moves by the opponents, with no solution short of military, economic, and psycho- logical conflict. Many excuses have been given for imperialism? the "white man's burden," a "sacred trust," "leb- ensraum," "ethnic unity," "defense against en- circlement," and others more idealistic, such as "liberty, equality, fraternity." We considered both world wars anti-imperialist, and of course for opposite reasons they were so regarded by many Germans and Japanese fighting against us. The Monroe Doctrine could be considered either status quo or imperialist, depending on the view- point and circumstances of assessment. How- CONFIDENTIAL 172 ever, from an objective point of view, it should be understood that these terms, the status quo and imperialism, are intrinsically and morally neither good nor bad. What these terms actually mean when applied in international relations depend upon the objectives, motivation, and circumstances of particular national policies. World Powers World powers today can be grouped into three general classes. The great powers are the United States and the Soviet Union. The United King- dom may still be considered a great power, too, although now less able to stand alone in the world. The regional powers, which wield considerable influence in particular parts of the world, include such countries as France, Argentina, Brazil, China, and India. In a third category are the client powers, such independent states as Uruguay, Costa Rica, Luxembourg, and Egypt. Even though their independence may be important to their citizens and even to mankind, their continued independence is at the sufferance of the larger powers, and their conduct is largely conditioned by external events. Under international law each sovereign state is equal, and American policies in considerable measure have aimed toward support of this doctrine; however, law cannot hide the fact that states are not equal in power and never will be. A country like India, with hundreds of mil- lions of people, cannot be equated in all circum- stances with a state like Liechtenstein, even though each is sovereign. This has been recog- nized by the United Nations by its system of per- manent seats in the Security Council, and the veto system, which is not wrong in itself, but only in its abuse. The tests of a great power, behind all the polite words and agreements are (1) to be able to threaten force, (2) to have the ability to pay the price in a showdown of force against force, (3) to have the capacity to wage active, autono- mous war with its own resources. This realistic approach to power is not meant to show cynicism for the efforts which certain coun- tries, including our own, have made to achieve a better world for all on the basis of soverign equality; far from it. It is merely intended as an examination of the basic forces of existence and survival that lie behind our best efforts. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Reltima.93/12/09,. CIA-RDP85G00105R00010021INF-R 6 OF WORLD POWER wENTIAL Nationalism The armed forces of any nation, if they are to carry out their assigned missions, must have a sense of nationalism, to know why they are fight- ing for their country. Extreme nationalism may be unworthy in a world that considers itself civil- ized, when the brotherhood of man, in the best Christian sense, is a worthy goal. But national- ism of itself is not bad. It may be the only means of attaining worthwhile goals. We love our rich and beautiful America; we want to raise our fam- ilies in peace and happiness; we believe in the American heritage of freedom and individual dignity. The willingness of military men to sacrifice their lives for such goals is, in effect, an expression of nationalism. Nationalism has its basis in the demand of par- ticular groups for complete sovereignty. Inter- nationalism on the other hand admits the sur- render of some aspects of sovereignty to a broader control. Each has its proper place, and the United States for valid reasons orients its policies both ways. No nation is willing to surrender all sovereignty until there are guarantees that what is held most sacred will not be harmed. But in countless fields, from the assignment of radio fre- quencies to the control of drugs, we willingly sub- ordinate our complete control in the interests of world order. Nationalism, in many ways an intangible force, grows out of race, religion, language, or historical and geographical circumstances. Small countries, lacking real power, sometimes substitute an exag- gerated feeling of nationalism. In some ways nationalism, as we know it today, is a relatively new development. In both ancient and medieval times, loyalty was shared between local people and local rulers, as a matter of mutual protection in the unsettled times in which they lived. In the Western world, a broader spiritual and cultural community was effected through the Christian church in its struggle for survival and growth. The development of a money economy, the end of serfdom, and the Renaissance brought larger states and a gradual transfer of loyalties to the symbol of the monarch and the state. An expanding interest in philosophy and many other multiple forces combined to help the concepts of democracy and self-determination emerge. A new liberal 173 nationalism gave the chief loyalty to the state, and the ruler became at most a symbol. But some- times the forces of nationalism, instead of leading to liberalism which recognizes the rights of minor- ities, leads to totalitarianism and more strongly authoritarian states. Democracy, as we know it, is a very fragile thing, even though it has a con- siderable will to live among those who understand it. Nationalism and individualism, therefore, are frequently in conflict, but nationalism per se is not to blame, but rather the use that is made of it, for nationalism may be the champion of freedom. The United States, therefore, needs nationalism, internationalism, and individualism; all three are inherent in its traditional political and social heritage. Some countries, including our own, also face the problem of national minorities. The major group, united by race, religion, or language, may not be the sole occupants of a political state. National minorities, people bonded together in varying de- gree by different forces, may be no problem at all, or they may constitute a threat to the solidarity and power of the dominant group. In the United States, for example, there are a great many sec- tional differences, social and political, -which appear more serious to foreign observers and critics, than they really are. India, for example, has religious minorities that continue to hamper complete national solidarity. Balance of Power So the world is organized into multitudinous groups, sometimes working together, sometimes at cross purposes, gathered politically into larger units known as sovereign states or dependencies. These units in turn settle their differences by war? military, economic, and psychological, or by sub- stitute devices which will be examined in the pages ahead. One means of avoiding war, or of jockey- ing for position to be at the best advantage, is through power politics, as already mentioned. Another means is through balance of power ma- neuvers, by which nations may achieve an equaliz- ing of forces to avoid or postpone war. This equalization may be achieved without destroying the individuality of the separate states. However, balance of power entails many devices and, in some degree, each affects the policies of all states. One CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 coNFIDEViireved For Release 2003/12/09 CIA-RDP85G00105B000100210002-9 INTELLIGENCE FOR NAVAL OFFIU.L11 device is the familiar "divide and rule ;" another is to prevent unions of competitive states. It is often stated that British policy in the past has been to seek a balance of power in Europe with Britain as the strategic key to the balance. When Napoleon was rampant in Europe, Britain was allied with other states against France. When the Kaiser and Hitler threatened, Britain was arrayed with the French and others opposed to German expansionism. In connection with the balance of power approach, it must be remembered that situa- tions constantly arise requiring vigorous remedial steps which may or may not be successful. The National Interest What constitutes the "national interest" by which states always claim to be guided? Perhaps its origin was in the personal interest of the ruler, and with the change to nationalism, the idea of national honor developed. Some wars have been fought for reasons of national honor. Honor alone may be too idealistic or Quixotic for some; the jailing of a citizen for the pulling down of a flag may not be considered excuse enough to plunge nations into war with great cost in lives and resources. National interest, however, if accu- rately assessed, is a realistic, practical considera- tion of events from the viewpoint of national welfare, both present and future. American na- tional policies in earlier years were largely inter- nally oriented, due to the farm interests in domes- tic land expansion. Industrial growth had its political and national consequences when a new interest in raw materials and markets dictated naval expansion. Tremendous responsibility for interpreting the national interest?economic, mili- tary, and "war of life"?rests with the President, as well as the Congress. For example, U. S. par- ticipation in the Korean War was interpreted as essential for reasons of national interest. It is because events in far away places like Korea and Iran and Germany are cumulative in their effects toward a buildup of destructive force that they cannot be ignored. America's national interest is and must be the determining factor in American reaction to any world events. National Character This discussion raises a related question, that of "national character." Is there such a thing? CONFIDENTIAL 174 America has attempted major reforms in Germany and Japan through political, economic, military, and educational changes. Will these changes be permanent? The answer is not simple. It may be that class characteristics are more valid in defi- nition than net characteristics, and particu- lar groups or classes may dominate policies and national viewpoint. Militarism, or communism, or idealism may dominate in different situations. Cultural patterns do affect the definition of "na- tional character." It was suggested earlier that national character may be susceptible to analysis, but it is important to remember that it is com- plex and not wholly predictable. Sovereignty Sovereignty has been referred to earlier as a characteristic of states. It grew out of a combi- nation of two doctrines, that of the divine right of kings, and that of the free will. Combined and transferred to the state, it has been the out- come of the necessity for an unchallengeable and supreme power to make and enforce the rules that bind society together. Such centralized power is the essence of government. Further, there can be no international law with real meaning unless there is sovereignty to consent to it. Perhaps the corollary doctrine is that one sovereign state should not interfere with another, though this is more difficult of accomplishment. Sovereignty does imply an equality among states, but only le- gally speaking, since this is a practical impossi- bility. A state can voluntarily accept restraints on its affairs without destroying sovereignty. Though states are legally equal, they may not have equal rights in all respects, and their independence of action may be more ephemeral than real. With the passage of time some states have lost their sovereignty and ceased to exist. This happens when, voluntarily or involuntarily, the final au- thority over their actions passes to another state. International Law International law is subject to considerable abuse and even more misunderstanding, yet it holds together the fabric of international society. Its elements of administration, enforcement, and adjudication have come from many sources. Do- mestic legal concepts throughout the world are not uniform enough for international law to be Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For ReleawAighls2/99 :vrichk-FIRM900105R00010021000.2n9 FIDENTIAL complete. Some law is based on common law, on precedents; other law is administrative and ad hoc, with judicial decisions playing a smaller role. International law comprises both kinds, drawing on evidence in the form of direct treaties, confer- ence agreements, treaties of third parties, deci- sions of international and national courts, state papers, opinions of unofficial bodies and individual scholars, and even upon the "general principles of justice." Some of the earliest recognized international law relates to the sea, which is one reason why the Navy has always been so interested in this field. The commerce of the Hanseatic League led to the foundation of international rules of conduct, and Grotius is credited as the father of formal study of international law. At an early period inter- national law also dealt with the rules of war. It deals with conduct both on public and private levels, and also becomes a part of the domestic law of most states. Its limitations are that it is appli- cable only in certain situations, that it is some- what uncertain and slow to develop, and that it cannot be legislated or executed in the ordinary sense. But it is developing and should grow in- creasingly important. Now criminal law is being added to international law, and the theory of non- intervention is undergoing change, while the rights of neutrals are being reduced. There is general condemnation of genocide, and support of a bill of rights for individuals. Even if these rights are not yet universally accepted, they are on their way to inclusion in the law. Genocide in- cludes not only actual killing of ethnic groups, but also sterilization, breakup of families, or submer- sion of culture. The international bill of rights includes the concept of due process of law, denies involuntary servitude except in wars or emergen- cies, and allows no arbitrary restrictions on free- dom of movement, public trial, religion and press, assembly, and similar elements familiar to Anglo- Saxon jurisprudence. International law holds that jurisdiction over particular cases may hinge upon the territorial principle ( where the act occurred) , the nationality principle (that of the guilty party) , the protection principle (through national interest) , the princi- ple of universality (as concerning pirates) , or the passive principle (that of the injured party). 175 The principle of territorial jurisdiction is most firmly established. Where individual parties sub- ject to one jurisdiction are required to appear be- fore another jurisdiction, their possible extradition is a matter of treaty. Recognition of one state by another under inter- national law may be either de facto or de jure. De facto means that although no formal treaty is signed and representatives are not exchanged, for all practical purposes the one state admits to the sovereignty and authority of the other over a par- ticular territory and people. This may have its naval application, when our government does not choose to recognize a foreign government. Naval commanders must be very careful that they take no action that could be interpreted as de facto recognition. De jure recognition, of course, is that granted by formal treaty and exchange of envoys. The Laws of War One of the chief concerns of international law is war, for in its modern form war invades every aspect of life. Early writers could not agree on a definition of war. It obviously refers to the use of force between states, but not all such cases con- stitute war. War, from the point of view of in- ternational law, is not per se bad, for the law deals only with its conduct, how it was begun, the be- havior of neutrals and belligerents, and its ending. The legal recognition of a state of war affects mat- ters of contraband, blockade, and censorship. Domestically it affects contracts and government controls. Such questions arise as to whether a state of war can only be declared by Congress, or whether a Presidential declaration of an "emer- gency" which requires action by armed forces is legally war. Under international law, the formal declaration is not necessary. Only one of the par- ties needs to intend war. However, police actions and armed intervention are not necessarily war. There is the presumption of intent to make war by certain overt acts, especially if so regarded by the victim, but even now there is no sharp definition. The question of defensive versus aggressive war also arises. These are equally difficult of defini- tion; it is not so simple as who fired the first shot, for some self-defensive acts and proper exercise of sanctions would then be ruled out. In practice, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTiiirroved For ReleaiRACIRV,Ipp iciAompqrppinit?R000100210002-9 regretfully it must be said, the winner was the "defender," the loser the "aggressor." In sum- mary, then, war, as such, is not illegal; it is the prerogative of the state. Causes of War Much has been written about the causes of war, and such studies should be of concern to the in- telligence officer, because he has a continuing in- terest in studying cause and effect patterns, par- ticularly in the field of war. However, the causes of war are not easy to find, although many have been suggested. An "instinct of pugnacity" in man, hate, military general staffs, munitions mak- ers, and many others that do not stand the tests of universality, have been suggested. War usu- ally is not an end in itself, but serves as a final means of settling disputes, preserving rights, and remedying wrongs. Granted that it is a profligate means, increasingly so as it threatens the survival of the race, mere recognition of this fact does not solve the problem. Wars will continue to occur until a substitute is found, and other means to en- sure security, defense, and justice must be pro- vided before weapons will be surrendered. Dis- armament, limitation of weapons, education, treaties outlawing war all have great merit, but they do not solve the basic problems of war, which are most complex. Psychologically, war springs out of fear, sus- picion, greed, lust for power, hate, revenge, jeal- ousy, and envy. When great tension has been built up, war represents a release from pressure. There are also economic causes: aggressive im- perialism, both territorial and economic, and com- petition for markets, energy sources, or essential raw materials. Wars may start from government protection of private interests abroad, without par- ticular reference to the general welfare. On the other hand, failure to protect citizens and prop- erty abroad with decisive action may also lead to war. Disregard for the rights of "backward peo- ple" and population pressure, at least in its indi- rect effects, are additional causes. Political causes include balance of power maneuvers, secret treaties, violations of unjust treaties, disregard for minority rights, deliberate organization for war, and even ineptness in government. There are many others: exaggerated nationalism, competi- CONFIDENTIAL 176 tive armaments, religious and racial differences, general ignorance, and even war psychology, in- duced by press, radio, motion pictures, text books, family influences, social inequalities, social sanc- tions, and a lack of spiritual ideals. If all the above causes could be removed, would war then disappear? The possibilities are poor according to some theorists who believe that war is cyclical, that it is related to survival of the fittest, that heredity and environment cause it, that it is a culture trait, an instinct, an institution, and part of the stepladder of evolution. These theories are far from encouraging. Accordingly, preventive devices, such as a world state, have been suggested. Critics of this plan, however, have pointed out that super-sovereignty might largely result in a shift from international wars to "domestic rivalry" just as difficult of solution. It is obvious that great difficulties are involved in determining the causes for war and that there is as yet no general agreement as to either causes or effective solutions. Until such a time, the grim realities of modern total war must be faced. Prevention of War The prevention of war is a major task of the larger nations of the world, although it should be stressed that prevention is by no means their only task nor does the word imply a philosophy of "peace at any price." Since the prevention of war is aided by any limitation of warlike tenden- cies, the means available to do so must be em- ployed to the maximum degree. There are sev- eral means. One is negotiation, the use of diplo- macy and conferences. Actually hundreds of minor incidents are settled by diplomacy, and thus do not become causes for war. A third country frequently offers its "good offices" in a dispute, or even goes so far as to mediate the quarrel. Com- missions of inquiry may be established to aid the settlement. Conciliation may move on to arbi- tration, voluntary or compulsory, but even arbi- tration does not necessarily force acceptance of decision. Such measures seem to work best on problems of private law and economic matters, rather than on strictly political matters. Concili- ation is on the borderline between straight nego- tiation and the compromise of arbitration. A Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 ELEMENTS OF WORLD POWER CONFIDENTIAL third general approach is through the use of judi- cial means, but in the international sphere accept- ance of a court decision is dependent on the will- ingness of the parties. Major political issues, therefore, have seldom been solved in world courts. When diplomacy fails to solve problems of war, security measures may be of help. These take many forms. Disarmament and arms limitation have had United States support but with limited success, because few countries are willing to co- operate whole-heartedly. Unilateral disarma- ment coupled with neutrality laws has met with no more success. Ratios of limitation, or stand- ards of allocation, are most difficult to establish. Security through education alone is illusory, for even if we are progressive and educate against war, will our enemies do the same? Passive re- sistance has been proposed and even used, as by Gandhi's followers, but they were opposing the British who have a conscience and are responsive to public opinion. Aggressors generally do not have scruples, and then passivity only hastens slavery. The Kellogg-Briand pact made a novel approach to war: it outlawed "aggressive war," 177 but not "defensive war," and of course each sover- eign state reserved to itself the decision as to the nature of the war it fought. The issues of iso- lationism as an approach to peace have been de- bated in the United States and elsewhere. Still another approach to peace is through collective security, which may mean alliances or even a world body and world police force. Peace between nations is a long-sought goal; the dimensions of the problems involved are best realized perhaps by those who first attempt to define war itself, isolate its causes, and find its cures. The purposes of this chapter have been much less ambitious, and limited to a considera- tion of the basic elements of power and the general prerogatives and behavior of states in their power environment. However, since war is expressive of a particular power relationship between world states, a better understanding of the elements of world power should lead to a fuller appreciation of problems of war. Other power relationships between nations, such as those expressed in terms of foreign policies, are the general subject of the following chapter. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 7 THE UNITED STATES AND THE WORLD While the preceding chapter on Elements of World Power dealt largely with concepts and principles, this chapter will review more specific developments in foreign policy, in international organization, and in economic relations that are of particular intelligence concern. All facets of the problems presented by the topics of this chap- ter obviously cannot be discussed because of space limitations, but it is hoped that those mentioned will stimulate further thinking and study. It is also appropriate to suggest here that the solutions of problems arising out of relationships between states can seldom be considered in terms of ab- solutes: good or bad, white or black. The com- plexities of these relationships give rise to a va- riety of alternative choices which often have rela- tive values. It is for this reason that good in- telligence must reflect shades of meaning in order that all potentialities may be fully recognized. AMERICAN FOREIGN POLICY The creation of the foreign policy of the United States is the role of both the executive and legis- lative branches of government. Indirectly, of course, it is affected by every kind of individual and group reaction. Its abstract nature makes it difficult of analysis, but it is the product of certain major fields of common concern. One is national security, which relates to our geographic loca- tion, military strength, industrial power, and man- power, as described earlier, and which is changing due to new forces at work in the world. A sec- ond major concern is related to our economic situ- ation, namely, the degree of industrialization we possess, our world trade interests, our raw ma- terial needs, our problems of unemployment and price levels, the availability of funds for invest- ment, and related phenomena. A third major con- cern is peace, and all that it implies, for peace is a predominant desire of the American people. Formulation and Execution of Foreign Policy The constitution of the United States reserves matters of foreign policy to the Federal Govern- ment, a concept which has been upheld in many court decisions. The Federal Government can negotiate treaties, legally "declare" war, receive foreign diplomats, appoint ambassadors, and regu- late foreign commerce. States, of course, can make lesser arrangements with foreign countries, if Congress approves. The President, as head of the executive branch of the government, is chiefly responsible for foreign policy, for through the Secretary of State he handles official communica- tions with other governments, decides upon their recognition, and determines states of belligerency and neutrality. The actual declaration of war is a congressional right, effected by the two houses meeting in joint session. Congress can strongly influence foreign policy through its legislative acts, such as the tariff, and the House of Repre- sentatives has a special power through its initiation of appropriations. The President and the Senate share the right to make treaties and appoint en- voys. Senate ratification of a treaty negotiated by the executive branch requires a two-thirds majority vote of those present. A device increas- ingly popular is the "executive agreement in place of the treaty. Its ratification requires a simple majority of the members of both houses, which is often politically more expedient than the standard treaty. Congressional interest in for- eign policy is illustrated by the large number of Congressmen traveling abroad to investigate a great variety of subjects and conditions. For- eign policy usually cuts across political party lines, and the party platforms in recent years have not differed materially in this respect. In matters of foreign policy, while the American people re- spond readily to moral and ethical principles, as mentioned previously, they, as any national group, react most rapidly to the needs of self-defense. A brief historical survey of the development and dominant features of American foreign policy will provide a useful background for the better under- standing of its current operations in connection with other world governments. 179 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Isolationism and Expansionism The exact meaning of George Washington's injunction against entangling foreign alliances has been long debated. It has been generally agreed, however, that his concern was in perma- nent alliances with foreign nations, and that he did not mean to impose a ban on all close relations to meet temporary situations. If a recommended policy of isolationism is to be implied from his remarks, certainly at the time it was a suitable policy for a weak country far removed from the European scene and well occupied with an inland frontier. But even though in the past the United States has avoided close political contacts, its trade and economic relations have always been tied in with the rest of the world. While true that the Monroe Doctrine, for example, was iso- lationist in one sense, in another it was interven- tionist because it was unilaterally proclaimed by the United States in sympathy with the Spanish rebels in Latin America. Nor can it be forgotten also that this doctrine for many years relied for support on the strength of the British Royal Navy. Internal expansion across the North American continent was followed before the end of the nine- teenth century by expansion into Alaska and over- seas into the Caribbean and the far reaches of the Pacific. The reasons for expansion beyond the continental limits of the United States are many and certainly cannot be blamed on the economic lobbyists alone. For example, many sugar inter- ests were actually opposed to intervention in Cuba and, in the Philippines, the United States might have withdrawn from there as readily as it did from Cuba had it not been for the postwar revolt. Our difficulties with Colombia over the Canal Zone were restricted to control over a narrow strip of land, coupled with handsome remuneration to the injured party, an unheard of act in that day. Our interests in Nicaragua, Haiti, Santo Domingo, and other nearby countries never led to actual coloniza- tion, although a later approach to inter-American relations has been that of mutual consultation rather than unilateral action. The Open Door in China In China, United States policy was long that of the open door; self-interested, yes, but at the same time it may have saved China from being carved CONFIDENTIAL 180 up into colonies like most of the rest of Asia. America's interest in China dates back to the days when our clipper ships traded at Canton for tea and silks. In the middle of the nineteenth cen- tury, China was forced to open additional treaty ports to foreign commerce, with concessions granted to a number of countries including our own. China had gradually lost many outlying territories and suzerainties. The French had taken Indo-China and dominated Yunnan, Kwangsi, and Kwantung together with the leased port of Kwangchowwan. Russia had taken the Amur Valley, had railway concessions in Man- churia, and dominated Outer Mongolia. Ger- many had Kiaochow and dominated Shangtung. The British held Hong Kong, Kowloon, and Weihaiwei, and controlled the Yangtze Valley. Earlier they had taken Burma, and had a degree of control over Tibet. Italy attempted to obtain Sanmen Bay in Chekiang, but was not successful. Japan, as is well known, persistently pressed for territory and privileges, acquiring the Ryukyus, Formosa, Korea, and later Manchuria. In 1899 Secretary John Hay proclaimed our open door policy to put an end to further territorial seizures. We never really backed it with force until 1941, and since then the progress of events has swept away the opportunity for its application. It was a generally favorable factor in our relations with China for many years. The First World War and Its Aftermath First trying to be neutral, we finally entered World War I as a crusade for democracy, with the issue of freedom of the seas a major considera- tion. After the war we found ourselves at odds with our allies and facing new and unfamiliar problems. Reparations, war debts, financial boom at home, then worldwide economic collapse were aftermaths of the war. Economic nationalism and autarchy, foreign aggression and dictatorships of right and left followed. The deterioration of world affairs in the 1930's brought us back to war again. The Second World War With much of the world in flames our neutrality acts were quickly shown to be no guarantee of peace. We transferred our ships to neutral flags to rush supplies to Europe. The sudden collapse Approved For Release 20 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE UNITED STATES AND THE WORLD CONFIDENTIAL of western Europe under the German onslaught brought a vast rearmament program, and overage destroyers, preserved from the first war, were ex- changed with Great Britain for bases. By the summer of 1941 the Navy was in effect at war to protect the western half of the Atlantic, despite the doubtful legal status of such protection. Our policy stiffened in the Far East as well, although we were woefully unprepared for major action. Many Americans had to revise their thinking dur- ing that period, though the full shock of discover- ing that we were arrayed against strong antago- nists in a worldwide struggle was not felt until the attack on Pearl Harbor. Moves for Security Our international relations after 1940 under- went successive policy changes as our leaders and people began to assess the meaning of events as they unfolded. Our primary concern was with our security. In the summer of 1941 off Argentia, Newfoundland, Churchill, and Roosevelt met to agree on common principles and war aims. We emphasized that we were not interested in terri- torial gains, and recognized the right of people to choose their own form of government. We agreed upon a postwar cooperative order that called for free access to raw materials and mar- kets, subject to existing commitments. We called for disarming aggressors, pending the arrange- ment of a general security system. We cham- pioned freedom of the seas, and expressed the famous four freedoms of the Atlantic Charter, freedom from want, freedom from fear, freedom of speech, and freedom of religion. Most of the successive important international conferences dealt largely with the prosecution of the war, but several important doctrines related to the present world order were enunciated and agreed upon during that period. At Casablanca, in 1943, Britain and the United States announced the "unconditional surrender" doctrine. 'Whether right or wrong, this stand may well have had a permanent effect on the war and its aftermath. Although Stalin was invited to attend the next meeting held in Quebec City, he failed to come. China participated in the negotiations of Novem- ber 1943 at Cairo where the Atlantic Charter was reaffirmed, and where it was agreed to strip Japan 181 of all territories outside the four main islands, with minor exceptions. The Teheran meeting later that month? was the first time Roosevelt, Churchill, and Stalin actually met in person. Be- cause of Soviet neutrality in the Pacific, Chiang Kai-shek was not invited. The broad strategy of the war in Europe was planned, and the demand for a "second front" was renewed. The Russians, of course, had a second front on the European continent in 1939-40, but at that time they chose to be neutral. Antagonisms and differences of opinion were evident even in this first meeting. Churchill favored an attack into the Balkans through the Vardar Valley, while Roosevelt called for a frontal assault on Western Europe because of military and political considerations including recognition of Soviet interests in a second front in Europe. While this may represent an over-sim- plification of the strategic views held, it suggests the nature of the differences that developed. Idealism Meetings nearly a year later at Dumbarton Oaks considered proposals for the postwar international peace machinery. Continuing differences over policy caused President Roosevelt to agree to a trip to Yalta to try to reach a better understand- ing with the Soviets, for as allies they were in no sense as reciprocal of plans, men, and supplies as were our British partners. The Yalta conferences dealt with the treatment to be accorded Germany, and the difficult task of forming a workable United Nations Organization. Representation in the organization was the first problem. The United States modestly requested only one vote, but since the independent members of the British Commonwealth wanted one vote each, the Russians demanded seventeen, one for each constituent re- public. The U. S. S. R. finally settled for three, technically taking one for the Ukraine, and another for Byelo-Russia, in addition to one for the U. S. S. R. There was agreement that in the present state of the world the major powers should retain a veto over substantive decisions of the Se- curity Council. We thought also that we had won the promise of free elections and independent states in eastern Europe. This proved illusory, to say the least. In an effort to shorten the Pa- cific war and thus save American lives, we reacted CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS favorably to a Soviet promise to declare war on Japan, and tentatively accepted Russian domina- tion of the Kuriles, Southern Sakhalin, Dairen, and the Manchurian railways. The assessments of this meeting, with its secret agreements, remain highly controversial. In the spring of 1945 the meetings in San Fran- cisco established the United Nations Organization. President Roosevelt died in April and Germany's final collapse came in May. At the time of the Potsdam meeting in August, of the original Big Three only Stalin was still in office, for Attlee had replaced Churchill. The Soviets were ready to enter the war against Japan, and did so soon after the atomic bombing of Hiroshima and Naga- saki. A completely demoralized Japan facing in- vasion of her home islands, surrendered in re- sponse to the Potsdam Declaration. At Potsdam, general plans for the former German satellite states were formulated and the zones of military occupation for Germany and Austria were estab- lished. A Council of Foreign Ministers to repre- sent the Big Three, plus France and China, was created. Realism In reviewing the record of these wartime con- ferences, it is interesting to note the shifts of position that occurred. Our first concern was that of security, for we were engaged in a struggle for survival, but as the end of the war came in sight, we entered a phase of idealism. With the benefit of hindsight it is now easy to see that the Soviets carefully adhered to the long-term policies which have placed them in opposition to ourselves. Any lingering doubts about the Soviet's real intentions were quickly dispelled in the months following the war. Countless efforts to show good will and to go more than halfway were met with no response from the Soviet delegates, who continued an atti- tude of suspicion and distrust. The record shows that we wanted peace and were willing to make any reasonable concessions, but no agreement proved better than the Soviet intentions of living up to it. New problems arose to plague the foreign min- isters and their deputies faster than the old ones could be solved or shelved. Satellite treaties, in- terference with elections, atomic energy, the CONFIDENTIAL 182 Italian treaty, and control of the Danube were debated at great length. Only the strongest of protests through the United Nations brought about the withdrawal of Soviet troops from Iran, thus averting what might have developed into a Soviet military penetration of the Middle East. The Morgenthau Plan for Germany and repara- tions on the scale demanded by the Soviets were finally abandoned. The position of the United States toward Germany gradually shifted when it was realized that Germany's deficits would even- tually be paid by the American taxpayer, and that a prostrate Germany meant an impoverished Eu- rope. Gradually the United States passed beyond the idealism stage and began to see the shape of the Soviet menace. Cold War Various aspects of the cold war further accen- tuated this menace. In a major test of strength the Soviets imposed a land blockade of Berlin in 1948. Controversial issues leading to this action included the quantity and kind of West Zone rep- arations to the Soviet Union, the currency reform which started West Germany toward economic re- covery, and the action taken to unify the Ameri- can, British, and French zones of occupation. Another factor was the Soviet desire to eliminate a Western Island in East Germany. The Soviet blockade was met with counter blockade action by the western allies and an arduous though success- ful airlift. Although the blockade was finally lifted, a few false moves on either side might have led to war. Steps taken by the United States to strengthen the economies of western European countries and later their military forces, as mentioned previ- ously, were all part of the cold war which in- creased in intensity with the outbreak of armed conflict in Korea in 1950. Trouble spots in Indo- China, Malaya, Iran, and the Arab world only served to accentuate the dimensions of this smol- dering menace. Relations With Latin America Any discussion of United States foreign policy must include developing relationships with the Latin American countries to the south. Pan- American relations have improved greatly since Approved For Release 20 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE UNITED STATES AND THE WORLD CONFIDENTIAL the time of the enunciation of the Monroe Doc- trine, the end of our territorial expansion, and our difficulties with Spain over Cuba. The for- mation of the Pan American Union in 1890 led the way to better relations with the Latin-Ameri- can republics, culminating in the well-publicised "good neighbor" policy in 1933. We eschewed unilateral intervention among all the American states. Our policies have now centered on pre- serving the independence of republican govern- ments, recognizing the equality of each country, maintaining their territorial integrity, and urging the observance of existing treaties and the peace- ful settlement of disputes. Continental solidarity has been the goal, coupled with nonintervention in internal affairs, but with extensive cooperation in all other matters. The degree of success has been fairly high. Eventually, all the American republics entered World War II and a number shared in lend-lease, and made available antisub- marine air bases as required for convoy protec- tion. The treaty of Chapultepec, ratified at Rio de Janeiro in 1947, binds all states on a two-thirds vote to come to the aid of any member state that is attacked. One of our more persistent remain- ing problems has been sporadic disagreement with ambitious and energetic Argentina. Far Eastern Relations United States foreign policy in China since World War II has been more controversial and the facts involved may be slow to emerge with any clarity. It is clear, however, that the former "open door" policy of equal access by any nation to China has been swept away during the course of the twentieth century by world events. Chi- nese nationalism flared up as early as the Boxer rebellion when there were demands for the expul- sion of foreigners. In 1911 came the revolution headed by Sun Yat-sen that destroyed the Manchu Empire. His Kuomintang party has favored ex- pulsion of foreigners and political tutelage of the people until a proper, constitutional government can ultimately function. Sun Yat-sen's revolu- tionary techniques were studied and adapted by Lenin, for in the early 1920's Soviet and Kuomin- tang relations were quite close. After Chiang Kai-shek made his successful march north from Canton in 1927, he tossed out his Russian advisers 183 and broke relations with Communist Chinese forces which withdrew into the interior, finally making Yenan their headquarters for many years. General Mao Tse-tung was the leader of this dis- sident group. In 1931 the Japanese made new advances into Manchuria, establishing a puppet state; in 1937 the war moved south of the Great Wall to extend Japanese control to all the major rail arteries and port cities of northern and cen- tral China. During World War II the Chinese fought a desultory war against the Japanese, for all their normal supply routes and most of their industry were in Japanese hands. Nationalist and Communist forces were united in an uneasy truce against a common enemy. At the end of the war the United States helped to ferry large numbers of Nationalist divisions to the coastal cities, north China, and Manchuria, together with supplying considerable amounts of war surplus equipment. The Communists were equally determined to control these territories, and swept out of the back country to lay waste the railways of the area. With Japanese equipment, probably turned over by the Soviets, they proved a strong opponent to the Nationalists. General Marshall's mission failed to find a solution to this problem acceptable to the parties concerned. Truce violations, attrition, inflation, and armies changing sides brought disaster. Before it was over, all China was Communist, aside from Formosa and mainland guerrilla forces of mixed allegiance. FOREIGN POLICIES OF OTHER NATIONS It is not possible here to discuss the guiding foreign policies of all other nations, but a few ab- breviated examples will at least illustrate the com- plex and shifting nature of policy manifestations, usually in support of some fairly persistent basic national drives. France France was long the problem child of Europe. Arrayed against the Hapsburgs and the Holy Roman Empire, she aimed at territorial expansion and predominant continental power which re- quired conquest and the sponsoring of "independ- ent" German states. Louis XIV also looked to French-Spanish union, and control of the Low- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR lands, but was opposed by the British. Napoleon, in the name of the French revolution, though with somewhat modified objectives, did sweep much of Europe. But after his defeat, French policy in Europe largely abandoned expansionism in favor of secure frontiers. French expansionism was later to be active again overseas. It as only at the turn of the nineteenth century, some years after Germany had united into a strong nation, that 400 years of British-French rivalry in Europe came to an end, and certain colonial difficulties were settled by giving Britain dominance over Egypt and France control in Morocco. Follow- ing the second invasion of their homeland by the Germans in World War I, security became almost an obsession for the French. They favored a breakup of Germany, the demilitarization of the Rhine, and defense in depth. The withdrawal of the United States from European affairs may have been a factor in the French sponsoring of the "cordon sanitaire," consisting of alliances of the States bordering Germany to prevent any resur- gence of military power. Italy, following World War I, felt that not all wartime promises had been kept and withdrew from her former allies. The French occupation of the Rhineland in 1923 was- an attempt in part to force Britain into a position of greater support, but the British were not too amenable, and gave some support instead to the Germans. Government changes in France and Germany brought closer cooperation between the two countries temporarily, and the French withdrew from the Rhineland. Growing German nationalism was clearly re- vealed by the 1936 remilitarization of the Rhine- land in violation of the Versailles treaty, which collapsed much of the French defense plan. This change made it difficult for France to offer any real military support to Eastern and Central Europe in the event of German aggressions. While France worked harder to build up the Maginot defense tine, she left her frontiers with Belgium and Luxemburg unprotected. French and Italian re- lationships were very confused: rivalry was strong in places like Tunisia, yet a partial understand- ing gave Italy a free hand in Ethiopia. War came to Spain. It was a proving ground for Com- munist and Fascist armies, with a few misguided liberals on the fringes, and the common people CONFIDENTIAL Approved For Release 20 184 NAVAL OFFICERS were the victims. The Polish corridor question was boiling. Buying time, or doing wishful thinking, Britain and France, though rearming, watched Austria, Czechoslovakia and Memel go to Germany. The Low Countries still thought in terms of neutrality. The sudden shock of the German-Soviet agreement of 1939 was the last step before the partition of Poland and the beginning of World War II. France, still feeling the heavy cost of the first war, subjected to the divided pol- icies of unstable governments and the weakening influence of the Front Populaire, was ill-equipped for war. What had been the greatest army in Europe fell before the Germans, destroyed partly by the politicians behind its back, partly by poor strategy, partly by fatalistic apathy. United Kingdom British policies are famous for their thorough relation to long-range British needs. Well-suited to an island people close offshore from a ferment- ing Europe, they are naturally keyed to British self-interest and have opposed entanglements on the mainland. The British have aimed at a bal- ance of power on the continent, to prevent its domination by any one group which could then threaten British security. For the last four cen- turies the British have had no European terri- torial ambitions, although they have been active overseas. They have taken what steps were neces- sary to protect their islands, to keep world trade routes free, and to assure the security of their overseas holdings. These aims have naturally enough made seapower a prime weapon. The British usually make short-term alliances in Eu- rope as required, though they have long continued close relations with Portugal, a remnant of earlier needs to counter Spain. Whenever the Rhine es- tuary and the Scheldt River are threatened, the British always fight. They have long felt Russian rivalry overseas, since the Russians have long sought access to the Indian Ocean and the Medi- terranean, both intimately related to Britain's im- perial lifeline. Postwar concentration of power in the hands of the Soviet Union and the United States has re- quired some British adjustments. As a result, Great Britain has associated closely with the United States in such common undertakings as the 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE UNITED STATES AND THE WORLD CONFIDENTIAL United Nations and NATO. In areas such as the Middle East and the Far East, however, British and American interests have not always been co- ordinated. In Europe the British have been con- sistent with their basic policies in delaying on the Schuman steel plan. The purpose of this quick review of various for- eign policies has been to emphasize that in the world, as it actually is, any nation that is to sur- vive as a great power is motivated by self-interest and will do whatever is necessary for survival. Aware of these facts, the intelligence officer is better able to understand and interpret the foreign policies of nations. INTERNATIONAL ORGANIZATION From the philosophical and even the practical outlook, men have long recognized the existence of a world community. The western world, for ex- ample, is joined in common spiritual values. Transport improvements and trade needs have also made materialistic interdependence very great, which in itself has demanded a degree of world organization. We have progressed from bi- lateral treaties to the partial recognition of in- ternational law, and increasing reliance is being placed on multilateral agreements and the creation of permanent international bodies with many powers. The achievements of international co- operation have been many. Examples are the In- ternational Red Cross, control of telecommunica- tions, control of rivers for international use, standard weights and measures, weather report- ing, hydrographic services, copyright rules, health regulations, and controls over slavery and nar- cotics. The failure has been at the political level and as a result, when states go to war, many of these cooperative and successful economic or tech- nical arrangements are jeopardized. The League of Nations There were many early attempts at multilateral international settlements, typified by the Congress of Vienna in 1815. At the end of the 19th century and in the years prior to World War I, the Hague Conferences attempted to set up an international order, but the first comprehensive attempt, spon- 269196-54----13 185 sored by President Wilson, was the creation of the League of Nations in conjunction with the Ver- sailles Treaty. The League was effective in the economic and social fields. It failed on the key question of secu- rity and power because of an unwillingness of its members to make it really work, to implement in full what it could do. The League could impose sanctions on aggressors, but being a pioneer effort, it was not designed to have unlimited power. Al- though the Covenant established the League, the interpretation of responsibilities rested with the individual states. It was largely a body of war victors, their friends, and their self-governing former colonies. Later other powers joined, with the exception of the United States which alone of the major powers remained aloof. America's un- willingness to participate directly in the League was based in part on its unfortunate experience in power politics and unpaid war debts. We did, however, remain interested in the League during the years it functioned, and always had an observer present at its meetings, occasionally considering the idea of entering, with reservations, to protect our position. When it finally suited their con- venience, Germany, Italy, and Japan withdrew from the League to pursue their courses of con- quest. The Soviets were expelled for their attack on Finland. The League was paralled by the World Court whose judges were able to settle many disputes in those cases where countries voluntarily submitted to its jurisdiction. The League was also closely allied to such bodies as the International Labor Organization, which in their specific field of con- cern, were able to do good work. The importance and success of all of these supplementary activities were dwarfed, if not lost to the public eye, by the magnitude and seriousness of world security prob- lems which the League failed to solve thereby dooming itself by inaction. Italy bombed Corfu in 1925, and the League failed to act decisively. The Lytton Commission did study the war in Manchuria in 1932, but had no way to enforce its recommendations. The Paraguay-Bolivia Gran Chaco War was not settled by the League. In the Ethiopian War sanctions were ordered against Italy, but not all members carried them out. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The United Nations Organization Some of the same basic elements which made up the League are to be found in the United Nations organization. It has a General Assembly of all member states, a Security Council with the big powers and regionally representative members, a Secretariat, an International Court of Justice, ECOSOC (the Economic and Social Council), and finally the Trusteeship Council. The ECOSOC is made up of a large group of activities including: ILO (International Labor Organization), FAO (Food and Agricultural Or- ganization), UNESCO (United Nations Educa- tional, Scientific, and Cultural Organization), ICAO (International Civil Aviation Organiza- tion), the International Bank for Reconstruction and Development, the International Monetary Fund, WHO (World Health Organization), IRO (International Refugee Organization), ITO (In- ternational Trade Organization) , UPU (Univer- sal Postal Union) , ITU (International Telecom- munications Union), WMO (World Meteorologi- cal Organization) , and IMCO (Intergovernmental Maritime Consultative Organization). ECOSOC concerns itself with matters of economics and em- ployment, transportation and communications. statistics, fiscal affairs, population, social prob- lems, human rights, the status of women, and narcotic drugs. It has as suborganizations the Economic Council for Europe, the Economic Council for Latin America, and the Economic Council for Asia and the Far East. ECOSOC by its very nature does some of the less spectacular and more successful work of the UN. Officially it has 18 members, appointed to 3-year terms, but it operates with many ad hoc committees and nongovernmental organizations. It has no ex- clusive jurisdiction, no permanent members, no veto problem, no coercive power; it is largely fact-finding and coordinating. Those recommen- dations bordering on domestic matters require do- mestic enactment to become effective. In a prac- tical sense, it is at work on the causes of war 'aside from those which are political or military. Ac- tually the ECOSOC fights communist objectives; while the communists are trying to destroy eco- nomic order to hasten world revolution, ECOSOC is attempting to restore order. Despite this, the CONFIDENTIAL Approved For Release 20 Soviet Union has joined several of the ECOSOC activities when it has been advantageous to do so. The General Assembly represents all member nations, each with one vote, though any size of delegation may be sent. This body discusses any matter it chooses and may pass recommendations to the Security Council. A two-thirds vote of the General Assembly, plus the approval of the big five in the Security Council, can amend the charter of the organization. The Security Council has 11 members, includ- ing the United States, the United Kingdom, the Soviet Union, China and France (all with the veto power) and 6 other members for 2-year terms "elected" by the General Assembly on a regional basis. For example, a typical distribu- tion is 1 British Commonwealth member, 2 Latin American members including 1 from the ABC powers (Argentina, Brazil, Chile), and one mem- ber each from a Soviet satellite, a West European state, and an Arab League state. The Security Council deals with major political disputes and can impose sanctions. It has a military staff to aid in this duty. It also has an armed forces committee and an atomic energy committee. The Secretariat, of course, provides administra- tive and research services while the Trusteeship Council is responsible to the General Assembly for the mandates and trusts administered by mem- bers. Some of these are former German colonies, others, the former Japanese holdings now under UN control. Regional Organizations The United Nations has attempted to avoid the failures of the League of Nations. Certainly it cannot be blamed for failure to end the cold war, because its success depends upon the honest in- tentions of its more powerful members. Merely having the machinery for peace does not solve the problems of the world communist movement and Soviet ambitions; in fact, the UN organization was not originally designed to fight this kind of battle. For this reason many types of regional international organizations have been created with definite functions to perform. The development of some of these organizations, patterned after the relatively successful Pan American Union, was stimulated by such events as the fall of Czechoslo- 186 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE UNITED STATES AND THE WORLD CONFIDENTIAL vakia to "internal" forces. For example, Bel- gium and Luxembourg have long had a customs union. With the addition of the Netherlands to this combination, and an extension of purposes, these countries established "Benelux," an economic union, sensibly designed to overcome some of the handicaps of small size. Such a merger is com- plex, for it not only removes tariff walls, but re- quires agreement on fiscal and monetary policies, the same regulation of prices and business, and a single legal code. Such changes do not come over- night. Benelux attempts at economic unity were paralleled by the grouping of the Brussels Pow- ers, namely, the Low Countries, Britain, and France, into a military alliance with increasing standardization of weapons and organization. In like manner the U. S. Marshall Plan on the eco- nomic level was matched by NATO, wherein the United States joined with the Brussels Pact coun- tries plus Canada, Portugal, Norway, Denmark, Iceland, Italy, Greece, and Turkey to form a mili- tary alliance. This movement was given signifi- cant support by the United States Military Aid Program and the assignment of General Eisen- hower to the top command. The Schuman Plan, aimed at the integration of coal and steel industries in western Europe, has been a significant effort toward economic unification of the participating countries, notably France and Germany. Still another regional development has been the Council of Europe, not unlike a miniature Gen- eral Assembly of the UN. It has only consulta- tive powers, but conceivably could result in Euro- pean federation. Although Winston Churchill was one of its early proponents, the British posi- tion is affected by triple interests, European, British Commonwealth, and United States co- operation. The growth of these various original organiza- tions has been stimulated by the unwillingness of the Soviet Union to cooperate within the UN. Examples of this unwillingness are many. Prior to the outbreak of the Korean War the UN had tried for several years to solve the problem of this divided country, but the Soviets would not allow UN observers in North Korea. Even though the UN had demonstrated its ability to aid in the settlement of problems in such areas as Palestine and Indonesia, it could not even gain access to Czechoslovakia. Early attempts to create a permanent UN police force remained com- pletely deadlocked. The United States offered to supply two divisions, ten to fifteen air groups, and two naval task groups; the United Kingdom was willing to commit half the Royal Air Force; all told, some two million men were offered. But the question of the veto power deadlocked fur- ther discussion. The questions of disarmament and atomic energy met with similar difficulties, since both conventional and mass destruction weapons must be considered in any real disarma- ment plan. The United States' position on atomic weapons was a generous offer to share its knowledge with the world, including world ownership of materials and facilities and complete inspection to prevent secret violation of rules. However, there could be no veto of swift punishment for all offenders. Even though such a plan is realistic if atomic con- trols are to be workable, they strike at the heart of the Soviet system of secrecy and isolation. Ac- cordingly, the Soviets, with a vast land power strength in conventional weapons, made the counterproposal that the United States destroy its atomic weapons, which constituted a vital source of military power, and that the veto power be retained by the five major powers. In the light of Soviet previous conduct such an arrangement did not seem to be consistent with survival. Of course, subsequent to the UN debates on the con- t1-01 of atomic power, it was learned that the Soviet Union was making rapid atomic progress herself by combining espionage with the best scientific brains at her disposal. The issue of veto is one of the most crucial in the UN. The United States, like the Soviet Union, believes in the veto, but recognizes it must be used in moderation if the organization is to function at all. Actually, the charter of the UN does not discuss the veto. It calls for 7 of 11 votes affirmative to pass motions, except that motions which are substantive in nature, not just proce- dural, require affirmative votes of the big 5 among the 7 or more votes. A state which is a member of the Security Council can be deprived of its vote when it is a party to a dispute, unless the issue involves a threat to the peace which is then called a "situation." Actually the veto power is abso- 187 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS lute, for the question of whether an issue is a "situation" or a "dispute" has been considered a substantive one, and no power will vote itself out of a veto on a crucial issue. By vetoing any at- tempt to declare an issue to be procedural, a big nation never loses its decisive power. This is com- monly referred to as the double veto. A state can veto a decision to make a question procedural, then veto it again as being a substantive matter. In exasperation many national leaders watching the record of mounting Soviet vetoes in the post- war period have turned to regional plans, or have recommended expulsion of the Soviets, or have talked of a new UN designed to be a real world government. The UN obviously is not perfect, but many of its functions are very useful. INTERNATIONAL ECONOMIC RELATIONS As a basis for reviewing economic relations be- tween world states it is well to remember, first, that states depend on various resources for their power, and second, that economic interdependence and political ambitions have brought them into continuous contact with each other. It has already been pointed out that the greatest progress in in- ternational organization has been in the economic sphere. This is natural because economics, like intelligence, is largely a matter of hard-headed realism, and economic interdependence is fre- quently dictated by compelling economic reasons. The United States and the Soviet Union continue to trade, even if on a reduced scale, because there are sound reasons for each to do so. In varying degree, trade is carried on indirectly even by bel- ligerents in most wars. This is of itself neither good nor bad, and is hardly different from other measures dealing with the conduct of war, such as the Geneva Convention for the treatment of prisoners. However, from the viewpoint of the individual state, it is bad when individual citizens secretly trade with the enemy in contravention of national policy. Economic Systems Economic relations are, of course, directly af- fected by some of the main forces at work in the economic world expressed in terms of economic systems. Perhaps the two extremes of these sys- tems are "free enterprise," on the one hand, where CONFIDENTIAL economic decisions are made by individuals, and communism" on the other, where the state is the source of all decisions. There are other varia- tions, of course, but these are the two major ex- tremes of present-day concern. In between are state socialism, as practiced in Scandinavia, and systems which in general support free enterprise but impose certain controls. The British Labor Government, for example, attempted public owner- ship of the basic industries, allowing "freedom" elsewhere. In general, the United States has kept private ownership, but has increasingly added cen- tral controls. A brief summary of the historical development of this Anglo-American economic system is illus- trative of the complex forces which shape such systems. The modern era of economics began when the rigidities of society inherent in a system of "status" gave way to business by "contract." The new money economies and trade were coupled with royal grants of monopolies of all possible va- riety. The 18th century brought strong new phil- osophies of individualism, and the beginnings of the industrial revolution. It was Adam Smith's Wealth, of Nation8 in 1776 that called for an eco- nomic revolution that would match the political revolution in America. No simple pattern of orderly development followed, for many of the old restrictions were only partially removed, but in considerable degree free competition and au- tomatic forces were the rule. The pressure of competition encouraged the exploitation of new inventions, and material progress was very real. The inefficient and obsolescent plants went bank- rupt. New enterprises, or those able to adjust to changing conditions, reaped profits that were plowed back into new machinery and other capital equipment. The corporation, an artificial legal being, became dominant in many fields over the partnership or individual enterprise. Very early, however, the need for regulation of monopolies was recognized, not as a contradiction to free enterprise, but as a necessary policing step to maintain it. In the United States the Granger laws and the Interstate Commerce Act of 1887 were typical of these controls. The Sherman Antitrust Act was of broader applicability. In the years that have followed, the American system has become increasingly more hybrid, and govern- 188 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE UNITED STATES AND THE WORLD CONFIDENTIAL ment has a voice in almost every phase of eco- nomic life including labor laws, security regula- tion, and agricultural supports. Increasingly, too, the power of government has been expanded by the emergency use of price controls and alloca- tions, and taxing power and spending power have enormous indirect effect on the direction of eco- nomic life. Social security and direct public in- vestment in electric power and atomic energy rep- resent further departures from abstract "free enterprise." Trade Relations The effect of economic systems on international relations is often to be found in the circumstances of trade between nations. Since current trade re- lations reflect those of the past, a brief resume will be helpful to general understanding. The world of Adam Smith was dominated by mercantilist concepts. The preceding centuries had seen national states established and the switch from feudal barter to money economies. Spain had poured gold and silver from the New World into Europe, but for countries without a supply of gold and silver for their expanding economies, the only way it could be obtained was through priva- teering ( a polite word for legalized piracy) or through the regulation of international trade to keep exports greater than imports in order that this difference could be received in bullion. This intense interest in the acquisition of gold and silver was a primary feature of mercantilism. There is not space here to expose all its economic fallacies, but any elementary text on the subject will make clear, as did Adam Smith, that real wealth lies in resources and labor, not in gold or silver, from the national point of view. It is no compliment to present-day thinking that most of the false concepts of the mercantilists are still with us in one form or another and still accepted by many people. The pressure of mercantilist theories had its effect in the struggle for colonies with supplies of precious metals, and in restrictive regulations to hamper freedom of shipping and of commerce, thus adding to the tensions and pressures that bring war. After Adam Smith, the following period of the classical economists was reflected in governmental 189 policies leading to a breakdown of many tariff barriers and trade restrictions. England in par- ticular became the champion of free trade, though actually the greatest free-trade area in the world is the United States itself, where no real tariffs are in force among the 48 States. In no small sense, United States world leadership in economic progress can be attributed to its continent-wide free trade. Moderate tariffs during the 19th century were coupled with the use of the automatic gold stand- ard for exchange. The gold content of the coinage of each country set the par of exchange, while free market fluctuations of the exchange rate were held to narrow limits by the ability of traders to ship gold to pay trade balances as an alternative to buy- ing bills of exchange. A continued imbalance of imports against exports of a particular country, including "invisible" trade (such things as ship- ping services and immigrant remittances), if not corrected rapidly by shipments of gold and ad- justment of the price level, was caused by the processes of international investment. A coun- try borrowing capital from abroad in effect re- ceives that loan in goods, and this is reflected in a so-called "unfavorable" balance of trade; namely, more imports than exports. When the interest payments come due and when the principal is re- paid, then exports exceed imports. The details of the mechanism are of no concern here, although it may be noted that the terms "favorable" and "un- favorable" balance are in themselves rather mean- ingless carry-overs from mercantilist days. World War I severely altered international economic relations. It had marked effects on the finances and money systems of the world, and new trade patterns developed. Impoverished by war, attacked by inflation at home, in heavy debt through reparations demands or borrowings, many countries sought to redress their position by ex- change controls and tariff barriers. Many had abandoned the gold standard during the war period, and now were on paper standards. Post- war unemployment was frequently countered by import restrictions and "buy at home" campaigns. Although intelligent people could see the ultimate damage to export sales of such restrictions, it was the easy course to take countermeasures and add more restrictions, even though the gains would be CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS temporary. Facing the political dangers of un- employment, in some cases even revolutionary danger, it was easiest to sacrifice long-range stand- ards of living in some degree in order to maintain employment through autarchy. This analysis, of course, is greatly oversimplified, but the facts of spiraling trade controls, quotas, and exchange manipulations are the important ones to remem- ber. The dangers of war inherent in policies which deny some countries equal access to markets and resources have been expressly recognized by American leaders from the time of the Atlantic Charter. However, at subsequent similar meet- ings, corrective action on an international scale has lagged behind recognition because of the many intricate problems involved. Attempts to free international trade have been vastly complicated by domestic economic controls in all parts of the world. State socialism is likely to lead to state buying in place of individual trade, as is the case in Britain's dealings with Argentina, and price supports at home mean drastic trade regulation, as is the case with agricultural imports in the United States. So-called normal trade patterns have also been strongly affected by world events since 1939. On a scale undreamed of before in world history the United States through lend-lease poured out a tremendous flow of munitions, foods, and indus- trial materials to its allies, to save the world from German-Japanese fascism. As a practical meas- ure it provided a means for arming the allies in a common cause and obviated many of the debt difficulties of World War I. It was based on the stated premise that free nations must stand to- gether in the face of a great common danger. Trade Agreements The particulars of recent trade policy include names and doctrines with which the naval intelli- gence officer should have at least a limited acquaintance. Although there are some multi- lateral international trade agreements, especially on certain commodities, most trading arrange- ments are bilateral in nature. The particular treaty devices adopted by the United States have led, however, to many multilateral effects. When CONFIDENTIAL 190 two countries sign a treaty of friendship and com- merce, opening their ports to each other's ships, they frequently promise "national" treatment to each other's businessmen and citizens. This means they guarantee foreigners equal treatment before the courts, and usually the right to engage in busi- ness on the same basis as nationals, though there may be a few exclusions. For example, we re- serve coastwise shipping, domestic air service, and fishing in American coastal waters to our own nationals. Our treaties are also usually made on a bilateral "most-favored-nation" basis, which really means "equally favored." The net effect is that if new tariff concessions are extended by either party to a third country, the signatories agree to extend the same privilege to each other. There are minor exceptions, such as the British Commonwealth preference agreements, and special American con- cessions to Cuba and, for a time, to the Philip- pines. Furthermore, we usually extend "most- favored-nation" treatment on an unconditional basis, which means that no new quid pro quo is required because agreement as to what constitutes equivalent concession is very hard to reach. Our aim is to minimize the restrictions on trade, al- though some of the most ardent free-enterprise businessmen often favor high tariffs and small quotas. In 1934, the United States returned to a form of additional trade negotiation it had used in earlier years, the now well-known Reciprocal Trade Treaties. In exchange for additional con- cessions on selected items that were most impor- tant in trade with a particular country the United States, by executive agreement, lowered its im- port tariffs (still on a "most-favored-nation" basis) even more. While these concessions are less subject to direct pressures by protectionist interests, the most elaborate safeguards are pro- vided by means of public hearings to give full voice to affected American industries. We do not grant concessions on items we have in surplus We have special penalties on "dumping," and even we use the "quota," a weapon more powerful than the tariff. In addition, when changed conditions require new protection for an American industry, these agreements have escape clauses. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210QQ2.2 THE UNITED STATES AND THE WORLD utnInDENTIAL Multilateral Agreements Multilateral agreements in the control of trade are best exemplified by the activities of the Food and Agricultural Organization, which establishes international quotas and price controls on certain agricultural commodities. Further, the Interna- tional Trade Organization of the United Nations establishes the fundamental machinery to collect trade data and takes corrective action to remove trade inequities that might lead to war. This or- ganization, which the United States has cham- pioned as a companion to the World Bank and the International Monetary Fund, is a beginning, but so far has demonstrated little concrete accom- plishment, since the obstacles it must overcome are tremendous. Of course, so long as the world is fundamentally divided in objectives, most of these agreements can have only limited success. The present ITO agreements give lip service to free- dom of trade and no discrimination, but are so hedged with escape clauses that their practical ef- fect is very limited. The choice has been to have the machinery established, or to have nothing, since the policy of free trade has not as yet been made possible. The milieu in which our trade policy is applied is not entirely of our own making, but results from events in all parts of the world. When immedi- ate post World War I restrictions had eased slightly, and several of the major powers returned to the gold standard in the late 1920's, the New York stock market collapsed and we stopped in- vesting in Germany. Those investments had given Germany the apparent power to pay repara- tions, and thus in turn enabled Britain and France to pay war debts. The collapse of the Kreditan- stalt bank in Austria spread financial panic in Central Europe, and the flight of short-term capi- tal began, eventually leading to a heavy gold in- flow into the United States. This threatened. ex- change stability abroad, and eventually forced most nations off the gold standard. In 1930 our passage of the Smoot-Hawley Tariff Act, as an answer to mounting unemployment at home, was soon matched by British abandonment of their traditional free trade policies, which had already been weakened. "Buy British" and Empire pref- erence became the rule. A special British trad- ing arrangement was made with Argentina in 191 1933, the first of many, due to the close commercial relations between the two countries. The United States and Britain did not join in a reciprocal trade agreement until 1938. World War It brought virtual free trade between the two coun- tries, for after the British exhausted most of their foreign investments paying for munitions during our "cash and carry neutrality" days, lend-lease and the postwar loans became major trade factors. Postwar Britain has been heavily engaged in state trading. The Soviets, since their seizure of power in 1918, have used state trading exclusively, though during the temporary N. E. P. period they did grant some private licenses for trade. The Min- istry of Foreign Trade controls all Soviet trade today, setting up foreign corporations abroad to do its buying. Special commodity trade combines under the Ministry set their quotas in accordance with an overall economic plan. In the United States, Antorg, a New York corporation, is the sole Soviet representative Amtorg's more sinis- ter espionage activities have already been men- tioned. Foreign Investment Many trade difficulties have been linked directly with problems of international investment or capi- tal flows, both long-term and short-term, from one country to another. It should be pointed out that long term private investment takes two forms, di- rect and portfolio. Direct investment is illus- trated by the great activity of United States firms in establishing branch plants in the Western Hemisphere countries. Portfolio investment re- fers to the purchase of securities in foreign con- cerns without the direct responsibilities of con- struction and management. The United States government has encouraged private investment abroad as a necessary measure to improve interna- tional economic good health. One of the economic problems is that the heavy American export flow, which has materially aided many countries and also maintained high employment at home, must be paid for in one or more of several ways: (a) by taxpayers helping to pay the costs; (b) by govern- ment or priVate citizens making investments abroad; (c) by an equal flow of imports. The fourth alternative, that of ending this export CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENflaEroved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS trade, has not been seriously considered in the present world situation. Since imports either have not been available or have come in competi- tion with domestic goods, they have not been of major assistance. According to various econo- mists, the best answer is investment now, with two- way trade as soon as possible. Our interest in private enterprise naturally favors private invest- ment, even though the problem is political in many respects, because outward movements of capital cannot really be considered investments unless there is a strong possibility of later dividends and repayment. Private investors are more likely to be influenced by such factors, and to place their money soundly, since they have no reason to weigh political considerations. One great trouble has been that private investors have frequently lacked incentive for foreign investment. Political in- stability and chaos, fluctuating exchanges, heavy taxes, and confiscation have all meant loss to previ- ous investors. Consequently, the trickle of such private funds abroad since the world depression has been quite small, except in a few "safe" areas. Government loans have had to replace such private flows. War Debts Financial adjustments growing out of the two world wars, as has been indicated, have been dom- inant forces in world economic relations. In the first war the United States loaned enormous sums which actually went abroad in the form of goods. There was not enough gold abroad to pay for them, yet we were unwilling to accept repayment in kind; namely, more goods. We felt that the con- tractual obligation was separate and apart from the question of reparations receipts by our debtors. Consequently, there was extreme bitterness of both sides, and payments with minor exceptions were halted. Germany surrendered at the end of World War I on the condition that no punitive damages other than war losses, were to be collected. But the Al- lied estimates of losses were astronomical. Of course, they were not completely paid, but in the process of trying, Germany experienced the com- plete inflationary destruction of her money system, and the accompanying despair has been identified as a factor in the rise of Hitler. The policy after CONFIDENTIAL Approved For Release 20 192 World War II was quite different. The United States kept title to lend-lease goods. Perishables were written off as one of the costs of the war. Durables were either returned, or transferred after the war at the best figure we could negotiate. Some of these mark-downs were tremendous. Of course, the significance of the mark-down has meant little in most cases, since our policy has in considerable measure been one of underwriting the foreign exchange deficits of those countries important to our defense which followed prudent fiscal and monetary policies. Following World War II some war debt settle- ments were made. In the case of a few countries, reverse lend-lease had been sufficiently great to cancel out direct lend-lease. Great Britain agreed to settle a lend-lease "debt" of $24 billion for $650 million to be paid over a 52-year period at 2-percent interest. Also, in various countries some settle- ment funds were made available under the Ful- bright plan for the interchange of scholars, when such funds were otherwise blocked because of ex- change difficulties. However, no agreements were ever reached with the Soviet Union which re- ceived 500,000 vehicles, 14,000 planes, 7,000 tanks, 2,000 locomotives, 11,000 freight cars, and 600,000 tons of ships. Reparations The end of the war brought with it the problem of reparations. The Soviet Union had suggested that it should receiVe twenty billion dollars worth of German reparations, separate and apart from any "war booty," which was a flexible term that could well include any property in territories oc- cupied by the Red Army. At the time, the United States was not demanding reparations but, under the influence of the Morgenthau Plan concept, was thinking in terms of converting Germany from an industrialized nation to an agricultural state which could never again threaten the world with serious aggression. There were many astute ob- servers who had misgivings about such a plan because of its economic consequences, not only for Germany but for all of Europe. While we did recognize that Germany had no export surplus with which to pay reparations, we envisioned that the dismantling of German war and heavy indus- tries could supply capital goods reparations re- 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R00010021M.F8. THE UNITED STATES AND THE WORLD ruENTIAL quired for the rebuilding of wrecked factories in a number of countries. By one way and another, several countries did collect some actual reparations. Poland was com- pensated by receiving important German terri- tories. The Soviet Union stripped much from the territories occupied by Russian troops, and appropriated German external assets in Eastern Europe even when they represented goods or se- curities stolen by the Germans. At fictitious prices the Soviets also bought control of most industry within their zones. The United States picked up portfolio German assets in Switzerland and Latin America. Dismantled plants in West- ern Germany were moved to Russia, partly as rep- arations, partly to pay for food imports from Eastern Zone. Economic Recovery Within a short time, the United States finally recognized in official policy that German economic recovery was essential both to European economic recovery and to avert chaos and communism. However, this required such sizable money grants from the United States that any reparations passed to other countries became actually equivalent to grants in aid from the United States. Therefore, the first charge on German exports was considered payment for imports, which substantially ended any large shipments of goods to the East. Be- cause of initial confusion, the three Western Zones ultimately set up unified economic controls, but some dismantling continued for a time, even after the official view had swung to the point where it was felt a halt should be called. The failure of the Soviets to receive all that they demanded be- came an additional factor in East-West tension. In the case of Japan, the Potsdam Declaration set forth general conditions for postwar treat- ment. War industries were to be destroyed, but a viable economy was to be left. External assets were taken over, and, for a period, considerable amounts of capital goods were shipped to the victims of Japanese aggression. The Soviet Union regarded its enormous prize of Manchuria, acquired in less an a week of war, as "booty," not a part of reparations. This was very costly to China, destroying for years to come any real hope of economic advance. In time the United States 269196-54 14 193 came to the position of making up Japanese trade deficits, first for relief purposes, then for economic recovery. This ended further reparations, and the Peace Treaty of 1952 fairly well closed the matter, despite the reservations held by the Philip- pines, Indonesia, and a few others. In the interests of an economically and polit- ically stable world, the United States felt obliged to extend economic aid not only to Germany and to Japan, but also to our allies, since they lacked the recuperative powers that we possessed. Their heavy purchases of food, industrial materials, and increasing amounts of capital goods in this coun- try, caused the so-called "dollar shortage." Therefore, lend-lease military aid was followed first by UNRRA food and clothing, and then by a series of other measures. We sponsored the European Payments plan to try to restore multi- lateral trade in Europe, and then the European Recovery Program, a combination of self-help, American technical guidance, and Marshall plan goods, with stress on permanent improvements of output rather than current consumables. The Economic Cooperation Agency was the American governmental body set up to administer these functions. The Marshall Plan and Military Aid The Marshall plan was an astute and states- manlike offer to the world, although the Soviet Union condemned it as an effort on our part to achieve world economic domination. Because of the Soviet position, their satellites had to with- draw acceptance of invitations to Paris to discuss the plan, and the further division of the world into East and West continued American aid and European response raised the physical indices of European production well above prewar levels, but still left Europe woefully weak militarily against the threat from the East. The Truman plan of containment with military aid for Greece and Turkey became necessary in order to save the West's strategic position in the Mediterranean. The Soviet answer to the Marshall plan was not only invective, but also the creation of the Molotov plan, which tied the satellites even closer to the U. S. S. R. The Cominform, the latest manifesta- tion of the supposedly dead Comintern, was also brought into the open. CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDEtnai oved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS Scarcely had the phenomenal and substantial economic recovery of a number of countries seemed to justify the Marshall plan and point toward its termination when new problems arose. The growth of the Soviet military menace to Western Europe, and indeed to the whole free world, indi- cated a new and general need for accelerated re- armament. However, military demands on the budget and material of the Marshall plan countries threatened to undo much of the progress that had been made. Vigorous measures by the countries concerned were hampered by both internal polit- ical problems and public apathy toward defense. United States military aid was a response to the economic and political problems faced. Both Britain and France were experiencing particular economic difficulties because of additional burdens imposed by the wars in Malaya and Indo-China. In the opinion of many government leaders, the important economic fact of military aid was that the issue of arms shipments versus more economic aid was one of expediency, not of fundamentals. Economic aid, if reflected in arms manufacture in Europe, might be cheaper than arms shipments; but if the latter meant arms sooner, the higher cost might be justified. The Allies had recognized even before World War II ended that strong economic measures of international cooperation were needed to provide the basis for a working world community. The prewar arrangements for bringing stability to ex- change rates were studied and strengthened at Bretton Woods in 1944. The International Mone- tary Fund to stabilize exchanges (short-term capi- tal movement) , and the International Bank for Reconstruction and Development to ease long- term capital movement problems were created. However, these measures alone, important as they were, could not provide enough support to restore the world economy. That is why the European recovery plan and "Point Four," a world-wide plan for development of backward areas, came into being. The military aid program was harder to foresee, for the cold war was not of our making. International Transport Without transport there would be neither in- ternational relations of importance, nor modern war machines. Consequently, the intelligence of- CONFIDENTIAL 194 ficer should know something of the workings of transport?the devices used, the control and man- agement, and the regulation, both national and international. Some of the most complete inter- national controls have developed in Europe, where modern technology with high speed and cheap movement contrasts most sharply with the small political units crowded into a compact geographic area. Modern economic life is closely linked with railways, the chief form of land transport throughout the world. They acquire significance because of their combination of a fixed right-of- way and mechanical power, forming networks that allow the delivery of freight and passengers without transshipment and at low ton-mile costs anywhere in a, big territory. Such networks re- quire a standardization of track gage, clearances, couplers, and brakes. We have developed a great North American net with a track gage of 4 feet 81/2 inches, covering Canada, the United States, and Mexico. A second great network of the same gage covers most of Europe outside of the Soviet Union and Iberia, though there are many Euro- pean local feeder lines of narrow gage. There are smaller networks in Manchuria-China, Argen- tina, and India-Pakistan, though some of the latter systems are more handicapped by a variety of gages. The standard being developed in Africa is 3 feet 6 inches. Australia hopes to convert her state systems to the American-European stand- ard. The Soviet standard on their extensive sys- tem is 5 feet. Europe's railway controls include international agreements on technical standards, car interchange, rates, timetables, and accounts. Many of these arrangements go back to the last century. The commerce of international rivers and some connecting canals are also subject to joint regu- lation. The Danube and the Rhine are outstand- ing examples, although under German and then Soviet domination, international control of the Danube in particular is illusory. A more general- ized type of treaty usually regulates the use of rivers flowing through or on the borders of more than one state in all parts of the world. Roads are more local in nature, although this characteristic is changing as long-distance truck- ing develops abroad as it has in America. How ? Approved For Release 20 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Rel_e_ase 2003/12/09 : CIA-RDP85G00105R000100210002-9 Ti-it UNITED STATES AND THE WORLD CONFIDENTIAL ever, there are agreements as to licensing, liability, and traffic signals. Roads still remain mostly feeders to railways in many foreign lands. Pipelines, except by bilateral treaty, have not figured as directly in international agreements, although a few, such as those from the Persian Gulf to the Mediterranean, are of very great politi- cal and strategic concern. International regulation of ocean shipping has been somewhat different from that of land trans- port, for international law has recognized the high seas as free to all users, with questions remaining only about the limits of territorial waters, use of oceanic canals and straits, and the rights of bellig- erents and neutrals. Just as railways have been very important to economic advance, so too has cheap ocean transport been made reliable by large steel steam or diesel vessels. The role of the merchant marine and its problems should require no explanation for any naval officer. Only re- cently has specific international regulation be- come more extensive. Conferences on safety at sea and rules of the road are being supplemented by discussions of wage rates, subsidies, and work- ing conditions. In the future, the regulations set by international agreement might increase. Regulations governing air transport among countries are very complex, an inevitable develop- ment, since aircraft have such great military and political implications and, unlike ships, are not obliged to stop at the frontier of a country, but can fly to any place on the globe irrespective of bound- aries. Early discussions of air law matured in 1919 into the first detailed set of rules. Public and private air law were merged under a single body, 195 the International Civil Aviation Organization, after the Chicago meetings in 1944. Regulations govern the licensing, inspection, registration, and technical standards of aircraft, communications, statistics, routes, and rates are all controlled either through the ICAO, the International Air Trans- port Association, or by bilateral agreements. Communications, too, bind together the whole world and consequently are internationally con- trolled. These controls include not only the Uni- versal Postal Union, but also the International Telecommunications Union, which assigns radio frequencies, establishes rules on telegraph and radio codes, and controls access to and use of these facilities. Within this chapter have been presented some of the major geographic, economic, and political forces that shape the environment of the world of which the United States is a part and in which the Navy must do its job?fields of concern which must inevitably affect the thinking and action of in- telligence officers. Obviously this review is not a substitute for the years of background reading and study and the constant day by day interest in fol- lowing current developments that are required for proper analytical assessment of events for in- telligence purposes. The only aim has been to re- fresh the thinking of the naval officer, to stimulate him to do further reading in areas beyond his ac- quaintance, and thus to improve his intelligence perspective. The following chapter will outline the problem the United States and the free nations of the world face in the menace of communism and its chief exponent, Soviet Russia. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 20 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 8 WORLD COMMUNISM AND THE U. S. S. R. The reality of the menace of communism as a militant political force is evidenced by the fact that Communist dictatorships now control one- third of the population and almost one-quarter of the inhabited areas of the world. In many non- Communist states, organized groups propound the doctrines of communism and exercise considerable political influence. But communism is not only a political force. Supported and directed by Soviet Russia, world communism has become the most extensive mass movement based on philosophical teachings since the advent of Christianity, and more disturbing, it is a tremendously powerful force subversive to the democratic way of life as enjoyed by the United States and other freedom- loving peoples of the world. Thus it constitutes the greatest problem we face today. However, for the citizenry of the United States, and for the naval officer, this problem must not only be iden- tified; it must also be understood if adequate so- lutions are to be found. It is therefore appropri- ate to review briefly the doctrines of communism, their historical development and utilization, and, finally, some of the elements of power of the So- viet State which is the chief advocate of Com- munist doctrine. THE BACKGROUND OF COMMUNISM Communism, in theory, is far from new. Ex- pressions of it are found in Plato's writings and in literature even before his time. From time to time in various areas, efforts were made to put certain fragments of this theory into practice. Marxist "Scientific" Socialism, or modern com- munism, as a social philosophy evolved out of conditions which existed in 19th century Europe and drew extensively upon the intellectual think- ing of the 18th century philosophers. The Age of Reason in 18th century Europe brought an awakened interest in philosophy, economics, and politics, a questioning of old beliefs, and a search for new approaches to the problems caused by social and economic change. Although the indus- 197 trial revolution eventually led to a higher standard of living, it also brought unusually harsh condi- tions of labor for many people. The individual initiative and healthful environment of an agri- cultural life and the simplicity of handicraft man- ufacture were increasingly replaced by the regi- mentation of the factory, the unhealthful conditions of the mine, and the complexity of highly organized industry. In trying to adjust to life in this new order, so- cial philosophers of the period began to consider once again the age-old question of how the com- mon man can improve his standard of living. At the same time, economic conditions were being analyzed and economic principles were being for- mulated into a broad body of doctrine by the so-called classical economists. Some of their doc- trines, with considerable elaboration, form the skeleton of modern economics, but many of their explanations of economic functions were based on very artificial or even false assumptions. Other writers not only tried to explain the world as it was, but sought solutions to some of the inequities of existence. Variant forms of cooperative life and socialism were suggested as replacements for the laissez-faire capitalism of the day. Some short-lived experiments in cooperative societies were made on a small scale, but most of these were abandoned when it was found that new problems replaced the ones they were trying to solve, or that all failings could not be attributed to capital- ism alone. One of the intellectual theorists of this period, Karl Marx, was to exert an influence on Western civilization out of all proportion to the signifi- cance of his teachings, which have been thoroughly discredited. Very much a product of his age, Marx conceived of himself as a prophet, a realist, a materialist, and a social scientist utilizing "scien- tific" methods. This unique mixture of mis- sionary fervor and spurious scientific theory was to be translated into action to an amazing degree by a small band of devoted followers. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR THE THEORY OF COMMUNISM The Communists rely heavily on their body of theory. Since they regard Marxism as "scien- tific," they derive from his theories both their long-range plans and day-to-day action, utilizing what they believe to be strictly logical deductive methods. Both Lenin and Stalin emphasized the importance of theory when they wrote, respec- tively: "Without a revolutionary theory, there cannot be a revolutionary movement," and, "Only a party guided by an advanced theory can act as a vanguard in the fight." The Communists' pro- grams of action are, in effect, applications of their theories. It is for this reason that an understand- ing of the theory is essential. Communism presents an interpretation of man and his history, a reason for cause and effect, a guidepost for goals, and a justification for the means of attaining them. Its doctrines have been closely integrated to embrace all of man's activi- ties: social, economic, political, and philosophical. For the confirmed Communist, they alone provide the satisfactory ? "scientific" ? explanation of man's being, the solution to his many puzzling and conflicting problems, and the opportunity for a realizable better life on earth. For the Com- munist, the only alternatives are to accept his doc- trines or to oppose them?a middle ground is impossible. Although rejecting all religions as "opiates" of the people, communism in the eyes of its adherents has become a substitute religion; even more, it has given them a sense of purpose, a symbol for per- sonal dedication. While Communistic writings are voluminous and complex, they are all built upon a series of basic concepts which might be called the creed of communism. The first is the concept that all life is material in a state of con- stant change; hence, there is no immortal soul and no God. The only moral code is that which serves the cause of communism. The second is the belief that all history is the result of the laws of economic determinism which were discovered by Marx; the basic conflict has always been and continues to be the struggle between social classes. The third concept is that capitalism is an instrument of op- pression and the primary source of opposition which must be destroyed, together with the State which of necessity supports it. Destruction can CONFIDENTIAL Approved For Release 20 198 NAVAL OFFICERS only be brought about by violent revolutionary methods because the ruling class will never relin- quish its autocratic power voluntarily. There- fore, such methods are essential and acceptable for the liberation of the oppressed classes by the van-- guard which is, of course, the Communist Party, considered in a collective sense. In the minds of the Communists it follows logically that true com- munism can only be realized in the world when all opposition has been eliminated eveywhere. The Marxist Philosophy The theory of communism is built on the philo- sophical teachings of Marx which have three pri- mary features. The first is Dialectical Material- ism which, simply stated, is a theory of reality, a philosophical explanation of the universe and man. While borrowing heavily from the thinking of the German philosopher Hegel, Marx substi- tuted materialism for Hegel's idealism, and at- tempted to demonstrate that the universe and man originated from material forces in a state of con- stant motion. Therefore, to Marx, matter was all-important, mind was of secondary value, and consequently the soul, immortality, and God could not exist. He explained development as the re- sult of the action of opposing forces. The first force was called the "thesis ;" the second force, the "antithesis;" and the result of their opposing ac- tion, the "synthesis." The "synthesis" became a new "thesis" and the whole process repeated itself ad infinitum. The historical application of this theory of reality was most ingenious. For their "thesis," the Marxists took the point of view that primitive society was classless, with tribal owner- ship of property. The "antithesis" was class so- ciety, with capitalism as its most extreme form. The "synthesis," of course, was true communism which would combine all the advantages of man's progress with the idyllic simplicity of primitive society. In addition to his theories of reality and de- velopment, Marx set forth three fundamental prin- ciples which he called the "unity of opposites," the "negation of the negation," and the change of quantity into quality. While abstruse if not ab- surd, these principles have been applied most in- geniously. The first justifies the combination of oppression and freedom within a country in the 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WORLD COMMUNISM AND THE U. S. S. R. ? CONFIDENTIAL sense that the enemies of communism are oppressed while its adherents are free to enjoy its benefits. The second justifies Communist warfare against the capitalistic state because it produces freedom for the masses. The third proposes that the trans- formation of one thing into another is qualitative and extreme; therefore, a violent revolution is required to change society from capitalism to com- munism. Reform is purely a quantitative matter and no fundamental change ever occurs. The historical application of Marxist dialectical materialism also involved the division of society into classes and an explanation of history on the basis of class struggle. By its very nature, this struggle was identified as the means for the even- tual and inevitable transformation of society. In- terestingly enough, Marx never took the trouble to define his term, "class." The second feature of the philosophy of Marx is his doctrine of the economic processes, includ- ing production and distribution. Two aspects of this doctrine are his labor theory of value and his theory of surplus value. While not only in- accurate but also false, his theory is that the value of commodities is a result solely of labor and, further, that profit represents nothing more than unpaid labor. In essence, this economic doc- trine is a theory of increasing exploitation of labor with the lot of the workers becoming progressively worse until they inevitably rise in revolt. In ap- plying this doctrine, the Communists regard the economic processes as the base for the entire so- cial structure of capitalism, including government and law, science, religion, art, and philosophy. The arena of the class struggle is the economic base. Since the theory suggests that the economic processes of capitalism must inevitably be de- stroyed, it follows logically, in the minds of the Communists, that the balance of the social struc- ture must also be destroyed because it would no longer have a foundation upon which to rest. The third feature of Marx's teachings is his theory of the State and of the revolutionary proc- ess. Since he believed the apparatus of the State to be nothing more than "a machine for the op- pression of one class by another," he was convinced that it would "wither away" when the true Com- munist society came into being. However, ac- cording to his concept of the revolutionary process, this transformation of human society was not to be accomplished in one step, but rather in several. In the first, the bourgeoisie would assume power; in the second, the proletariat would take control. This second, transitionary period he labeled the "Dictatorship of the Proletariat," during which time the State would be continued, but as an arm of the masses. Only later, at some future time which was never defined, would all semblance of the State disappear and the true Communist society emerge based upon the philosophy: "from each according to his ability, to each according to his needs." It is this theory of the State and of the revolutionary process which has been particu- larly subjected to interpretation and manipulation by Communist leaders who followed Marx. Communism and Socialism Any discussion of communism must also include socialism which was already a well-known term in the time of Marx. While space does not permit a detailed consideration of socialism as a system of thought and a course of social action, four points regarding it should be mentioned. First, socialism is revolutionary by its very nature be- cause it seeks a basic change in social institutions by a number of methods. This question of method is one point of difference between present day Socialists and Communists. Second, there are many kinds of socialism, of which Marxist social- ism or communism is only one. Third, as a social philosophy, socialism includes doctrines which are not only economic in nature but also political, edu- cational, cultural, and sociological. Fourth, to the Communists, socialism is a means, not an end? a tool with which to build a world Communist society. This Communist viewpoint that social- ism is a lower phase of communism is one reason why some scholars conclude that any movement toward socialism will ultimately redound to the advantage of communism. The Development of the Theory The total body of Communist theory which has evolved during the past 100 years is the product of the thinking and the writings of 4 men: Karl Marx, Frederick Engels, Vladimir Lenin, and 199 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL ? INTELLIGENCE FOR NAVAL OFFICERS Joseph Stalin. Marx has been described as the "originator" of modern communism, contributing its basic concepts. Called the "collaborator," Engels worked closely with Marx to systematize these basic concepts; his contributions included organizational ability and aggressive leadership. Lenin and Stalin made practical application of the Marxist theories to the social conditions of their own times. Communist historians regard Lenin as the "de- veloper." Enlarging upon the theory of the dictatorship of the proletariat, he was able to apply it successfully in Russia. Since he believed that the proletariat was not as yet capable of ad- ministering the State, he advanced the theory of the Communist Party as the core and "the van- guard of the proletariat, the general staff of the revolution." Interestingly enough, he did not con- ceive of the party as proletarian by nature; in fact, many of its leaders have been and are intel- lectuals and of middle-class origin. Nonetheless, the party "expresses the interests of the proletar- iat." Lenin expanded upon the theory of im- perialism as the final stage of capitalistic develop- ment. He also enlarged upon the strategy and tactics of world revolution and played a major part in the organization of the Third Interna- tional. In effect, he restated the Marxist philos- ophy in order to apply it more effectively to the Russian State. Stalin's place in Communist history is that of the "continuer." His particular contribution to theory is the concept of consolidating socialism in one country first (Soviet Russia). He converted the party into a strong administrative bureaucracy and further defined its functions within the dicta- torship of the proletariat. In rejecting the "withering of the state" theory, he modified the Marxist philosophy. At the same time, he ampli- fied it by introducing the concept of State plan- ning and emphasizing the industrialization of the country and the collectivizing of agriculture. Just as the theory of communism is the product of the work of these four men, so likewise is the growth and expansion of communism into its pres- ent position as a world political force attributable to their influences. CONFIDENTIAL 200 THE GROWTH OF COMMUNISM Karl Marx A German philosopher and economic historian who had settled in London, Karl Marx was among the more unconventional writers of the mid-19th century period. His massive work entitled Daa Kapital includes some remarkably well docu- mented and detailed descriptions of the objection-- able working conditions in the coal mines, the mills, and the factories, as they existed in his time. Radical as it was at the time, his analysis was an outgrowth and a perversion of some of the theories of the classical economists who are today often regarded as conservative. In the light of present day economics, many of his analytical conclusions are easily proven false. Marx is also well-knovvnL for his economic interpretation of history, even though he was not the sole originator of this con- cept. While this concept becomes absurd by ex- cessive application, it is important enough as an analytical approach to history to have made a contribution to the thinking of non-Marxist historians. Marx was definitely a materialist; for him all reality was autodynamic. He viewed life as a struggle for material goods, without a question of the hereafter. For Marx, there was nothing out- side, above, or below nature. All was nature in a state of eternal, dialectical flux. From his ideas emerged the doctrine of the class struggle between the oppressed who were the workers and the op- pressors who were the bourgeoisie. Because he believed the false doctrine of surplus value, Marx saw wealth being concentrated more and more in the hands of the few, with the wage earners unable to buy what they themselves produced. Such a situation, according to Marxist doctrine, leads to overproduction and unemployment, to imperial- ism in finding new markets, and to war. On the basis of his economic interpretation of history, Marx also expected that in time the desperate proletariat would rise in violent revolution to de- stroy the bourgeois oppressors and create a strong dictatorship which would exist only until the last traces of the old society had disappeared. In the new society, when the workers owned the means of production and no profits were paid, the need for a dominant organized State to regulate the work- Approved For Release 20 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WORLD COMMUNISM AND THE U. S. S. R. CONFIDENTIAL ers would disappear, and a new classless, stateless, and happy society would result. To a degree, Marx was a frustrated personality rebelling against the social conditions of his age, and, originally at least, quite willing for violent death to be the fate of the "enemies" of the work- ing class. But his false assumptions and incom- plete analyses led him to false conclusions. His materialistic approach to life is rejected by all who recognize that life also has spiritual values which transcend its material benefits. Men live by bread, but not by bread alone. The Marxist doctrines had a curious appeal, at- tracting a varied but limited group of followers in the beginning. Among these were some dis- contented intellectuals who imagined themselves in the vanguard of bold new thought; those who philosophically favored the destruction of existing institutions and moral values; those just too gulli- ble and ignorant to see the ultimate results of a social system that promised peace and plenty in exchange for a violent revolutionary struggle; and, finally, the unscrupulous opportunists who would support any movement that promised per- sonal rewards at the expense of society. In connection with the "inevitable" aspect of the social and economic doctrines advanced by Marx, it should be noted that the American social struc- ture has been a particular puzzle to the strictly Marxian analysts, because its development has con- futed their basic assumptions. Despite the growth of capitalism in the United States and the appearance of huge corporations, the standard of living has steadily improved and the ownership base has remained very broad. Public acceptance of sound regulation has produced a pattern of life far different from the dire prophecies of the Marx- ists, although many of the present-day adherents of Marxist philosophy refuse to recognize Ameri- can accomplishments. The First International The age of Marx has been described as a time of tumult and trouble. In 1848 Marx and Engels published the Communist Manifesto, marking a true turning point from the many Utopian social- ist plans to a world revolutionary movement. They called upon the workers of the world to arise, since they had "nothing to lose but their chains." 201 Revolution broke out in Paris just a few days after this document was printed, but it, as well as its counterparts all over Europe, was short-lived. Many of the German participants fled to America and England. In the years that followed, Eng- lish, French, German, Italian, and other working- men met, and eventually in 1864 formed the In- ternational Workingmen's Association, commonly known as the First International. Marx was a leading figure in the organization. Its purpose was to unite and advance the workingmen's move- ments in all European countries, but it eventually fell to pieces because, for one reason, many of the participants had paramount interest in their own national objectives. In the Franco-Prussian War, with the Germans at the gates of Paris, French workers rose to create the Paris Commune, whose bloody suppression was another factor in the de- struction of the First International. In 1872 the headquarters were transferred to New York, but in a short time the organization dwindled away and was finally disbanded in 1876. The Second International Formed in 1889, on the 100th anniversary of the French Revolution by delegates from 17 countries meeting in Paris, the Second International existed until World War I as a rather loose federation of socialist parties and a society of professional revo- lutionaries. It had liaison and information- gathering functions and pressure was exerted to unite divisive socialist groups. The organization is difficult to describe in general terms because of its diverse elements, ranging from Marxists to those who favored gradual reform within the framework of existing institutions. The con- servative elements largely supported the Allied war cause in World War I, while the Russian mem- bers favored a policy of revolution. It was this split that led to the creation of the Third Inter- national in 1919, often known as the Comintern or Communist International. Those parties who refused to affiliate with the Comintern, and who had left the Second Inter- national, formed their own organization. In 1923 they joined with the remnants of the Second In- ternational to establish the Labor and Socialist International (LSI). The national character of the socialist movements affiliated in its large mem- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS bership weakened its international effectiveness, and it finally ceased to exist. The Russian Revolution While the intellectuals debated and the revolu- tionaries climbed soap boxes or plotted coups in cellars, events of significance were transpiring in the land of the tzars. This vast and predomi- nantly agricultural nation had remained in rela- tive isolation from the economic and political changes in Europe and America, and the despotic power of the tzars had preserved aspects of the feudal system long after they had been destroyed in the rest of Europe. Marx never went to Russia nor did he envision that his doctrines would be applied there. However, the combination of many circumstances in that ultraconservative empire was to bring about a violent change. Russia experienced an aborted revolution in 1905. Some of the surviving revolutionary lead- ers who were not exiled to Siberia escaped to Ger- any, France, and Switzerland; others stayed "underground" in European Russia. Marxist philosophies were strongest among certain groups in Germany. When the intelectual theories of Marx were combined with the practical revolu- tionary techniques of Lenin, in part influenced by Sun Yat-Sen, a potentially dangerous force had come into existence. The terrible attrition of World War I, the misery of the lower classes under the cumulative oppression of the Tzarist regime, and some German conniving brought civil war to Russia again. The overthrow of the Tzar was followed first by the relatively moderate socialistic government of Kerensky, and then by the skillful seizure of power by the Bolsheviki under Lenin. Their ruthless methods, and the dissension among opposing groups, led to eventual consolidation of power in the hands of the Communist Party. COMMUNIST RUSSIA It should be pointed out that the resulting gov- ernment in Russia, for all its lip service to Marx, has yet to create a true Marxist state. The ideal of the classless society with its common ownership, no exploitation, no government, and "from each according to his ability to each according to his need" has not materialized, nor are there any signs CONFIDENTIAL Approved For Release 20 that it will. From a detached intellectual point of view, true Marxism, shorn of revolution, might have a certain appeal to those who are willing to overlook practical problems of human behavior and who are unaware of the serious scientific and philosophic errors in the Marxist analysis. But Marxism in practice, as sponsored by the Soviet Union and its international following, is quite an- other matter, which should be ample proof of the fallacies of its theory. Even the communists will admit that Soviet Russia is in the transitional stage of Socialism, or public ownership of the means of production. But what has developed is State Capitalism with a ruthless exercise of total power by a dictatorship. Thus a doctrine, orig- inally philosophical, has developed into a force seeking world domination. Reshaping Society The Russian communist leaders have been emi- nently practical men, willing to compromise or adapt their principles to accomplish their goal of consolidation of power. They have expertly carried out the techniques of revolution by seizure, of power following infiltration. They haw worked hard to reshape mankind to their type of society. Institutions and ideas that conflicted with their own have been ruthlessly destroyed. Religious activities, with their emphasis on moral values, have been stifled, except when for tactical reasons temporary concessions have seemed advis- able. Those who had a stake in the older society, such as property owners, officials, and community leaders, have been liquidated or shipped to slave camps. The flexible doctrine that any means are justified by the end has opened the door to a complete new code of behavior in individual and collective life. The individual is no longer dig- nified as such, but subordinate to the party goals. An important feature of the Soviet state is cen- tral planning. Some may think that the differ- ences in planning by Communist and non-Commu- nist states are only differences of degree, but such a conclusion is not only an oversimplification, but precludes correct analysis of the problem. The Soviets plan production, confiscate resources with- out compensation, and then exercise rigid control of practically all human activity to conform to the plan. Of course, a degree of central planning 202 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WORLD COMMUNISM AND THE U. S. S. R. CONFIDENTIAL is essential for any State; for example, all coun- tries collect data on price levels, credit needs, and similar items of national concern. A number of States have also created central banks to control money supply and price levels for the minimum purpose of stabilizing their economy. Some non- Communist countries use degrees of planning and control to meet their own needs that are less gen- erally accepted in the United States. However, there can be no question that what we know as democracy is not compatible with the Soviet pat- tern of life. The Soviets have combined the doc- trines of Marx, which embody Hegel's dialectics, Darwin's survival of the fittest, Ricardo's economic materialism, and the economic interpretation of history with the revolutionary techniques of Lenin and Stalin's Communist Party dictatorship. This is the antithesis of democracy. Forwarding the Revolution Lenin believed that the approach to revolution should vary with the type of country involved. In major nations it should begin with the ballot and then be followed by violent revolution. The client powers were to be oriented toward the Soviet Union and then finally absorbed. Dependent peoples could be taken over by directly sponsor- ing revolution, while backward people could be absorbed when convenient. Once Russia had become a Soviet state, though still weak, there arose the question of what was to be the next step. This resulted in a struggle for power among the Bolshevist leaders. Trotsky was ready to go ahead with revolution on a world scale. On the other hand, having already experi- enced foreign intervention in the invasion of Rus- sia and Siberia by the Allies after World War I, other Soviet leaders thought that an issue should not be made of world communism until it was strong enough to be assured of success. Stalin, although no less interested than Trotsky in world revolution, wanted to attain undisputed leadership in Russia first. Also, he firmly believed that an adaptation of Marxism was necessary to permit the establishment of a party composed of workers and peasants. In a double maneuver to strengthen the party and increase agricultural output, he instituted the bloody and ruthless collectivization of farms. Less than a century before, the peas- 203 ants had won their freedom from serfdom, and now they were deprived of their land again. In- dustry was also nationalized. A succession of police organizations enforced compliance and stamped out opposition. Party Control Party members, as well as passively resisting Russian citizens have faced execution and Siberian exile, for successive power struggles within the party have tolerated no division of leadership or dissent. The principle of government is the "in- terlocking directorate ;" that is, officials wear two hats, one as heads of government ministries re- sponsible for management and administration, and the other as members of the Praesidium where policy is formulated and control exercised. For almost 30 years Stalin was the dominant figure in both government and party; he was chairman of the Bureau of the Council of Ministers, the executive organ of the Supreme Soviet, and also General Secretary of the Communist Party, in which role he presided over meetings of the Prae- sidium, a powerful combination of the former Politburo and Orgburo effected by a party reor- ganization in 1951. Thus party control was made absolute, and party loyalty became a paramount virtue, the stepping-stone to prestige and influence. Russian Traditionalism Stalin was not only an improviser and believer in expediency, but a natural product of his en- vironment. Consequently, under him, many pol- icies and views of tzarist times continued to shape the behavior of the U. S. S. R. The traditional Russian obsession with security has made "perni- cious foreign influence" a major concern of both propaganda and actual policy. Many geopoliti- cal ideas have found expression in Soviet Russia. The central cores of power are Moscow and the area east of the Urals, both of which are partly shielded by the Ukrainian food circle and by the Arctic wastes. The next lines of defense are the border S. S. R.'s : Karelo-Finnish, Byelo-Russian, Estonian, Latvian, Lithuanian, Ukrainian, Mol- davian, the three Transcaucasian, the Kirghiz, Uzbek, Turkmen, Tadzikh, and Kazakh. Next comes a belt of protecting satellites : Poland, Czechoslovakia, East Germany, Hungary, East CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Austria, Rumania, Bulgaria, Albania, Outer Mon- golia, Sinkiang, China, and North Korea. Rus- sia has evidenced interest in adding Finland, Yugoslovia, Greece, Turkey, and Iran to the list. The Russian policies of imperialism have found new expression in many forms. By party activity and strikes, the Soviet Communists have engi- neered trouble in France and Italy. By support- ing Communist military forces they have attempted to further their designs in Korea, Indo-China, and Malaya. Through intrigue, espi- onage, subversion, and sabotage their influence has been felt in every part of the world. While the young Bolshevik government was struggling to establish itself, it emphasized con- solidation at home so long as separate Ukrainian, Byelo-Russian, Transcaucasian, and Central Asian governments followed parallel and friendly courses. However, as soon as the time was ripe, all these territories were reabsorbed into the new Soviet-pattern Russian empire. The Soviet Union has seemed quite intent on regaining all former tzarist territories. This it has largely ac- complished, except for the Finnish defiance and the United States ownership of Alaska. Another feature of Soviet policy has been to make strategic moves to further traditional Rus- sian objectives. Among these are domination of the Baltic and Black Seas, including eventual con- trol of their entrances, the acquisition of warm water ports on the Pacific, Atlantic, and Indian Oceans, sponsorship of the Pan-Slavic movement, and the attainment of economic self-sufficiency. To these have been added two special Soviet ideas: overcoming capitalist encirclement, and hastening the day of world revolution. Soviet World Objectives Soviet moves seem calculated to assure that the Soviet Union itself will survive, and beyond that point, will expand its territories as far as possible. This requires early consolidation of power in the countries of eastern Europe, leading to possible political merger into the U. S. S. R. Other pos- sible objectives are to retard and weaken such blocks of power as may develop, particularly in western Europe and the Near East; to destroy Anglo-American friendship; to undermine French cooperation in the Anglo-American alliance; to CONFIDENTIAL 204 keep Japan, Red China, and Germany sufficiently weak until Soviet control is complete; to absorb Austria; and to establish a dominating influence over the Dardanelles, the Suez Canal, and the Middle East oil fields. Further objectives include stirring up trouble in colonies and former colonies, taking over or destroying the socialist movement, infiltrating trade unions especially in key indus- tries, and using international organizations for propaganda purposes to strengthen the Soviet Union and its satellites. All of these plans are self-evident from the record of recent years. Building Power at Home Meanwhile at home the Soviet Communists are exerting strenuous efforts to industrialize the country, with heavy industry and armament com- ing first, and consumer goods being produced only in the amount necessary to prevent uncontrollable unrest. To meet the production goals, labor is moved by the millions to new industrial sites, to mines, and to railway and road construction areas. This at the same time disposes of dissident groups or ethnic minorities and keeps costs low, since slaves under the bayonet and whip need only min- imum material rewards. THE THIRD INTERNATIONAL From the apparent scope of Soviet activities it should be quite evident why they are of concern to the free countries of the world. As much as we may deplore the absence of all the democratic advantages in certain parts of the world, we be- lieve that foreign peoples must live their own lives according to the pattern they choose. We have hoped that normal social evolution in time would correct and improve conditions abroad. But when a powerful State not only aggressively disseminates economic, political, and social doc- trines diametrically opposed to our own, but also develops great military power in a determination to dominate an ever increasing part of the world, the problem becomes quite different. Peaceful co- existence with a Communist Russia, just as with Nazi Germany, presupposes not only an isolation- ist tendency on our part, but a basic change in Soviet objectives. Since the U. S. S. R. has openly and avowedly embarked on a course of world Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: cbtooespc,poAp5R000loom WORLD COMMUNISM AND T . . . IIIONFiDENTIAL conquest, there is little to indicate such a while the war with Nazi Germany was in prog- possibility. The issue is more complicated than simply one of imperialism versus the status quo. Some people mistakenly believe that our quarrel is not with communism but with Russian imperialism. The two are inseparable, for a basic aim of communism is world-wide destruction of noncommunistic in- stitutions and society through violent revolution. Such an ideological struggle involves more than military forces; it affects every aspect of life. The Utilization of Theory The consummate skill and cunning with which the Communists translate theory into action has been demonstrated by the use made of the Third International, or Communist International (Corn- intern) , as an instrument for world revolution and conquest. Unlike the earlier Internationals, this later world organization has emphasized rigid party discipline. National parties are not separate sections to be loosely federated, but rather tightly integrated units of one world movement. The ap- plication of Communist principles in the Russian State has not only given reality to the theory but also has made available tremendous physical resources. With the Soviet Union as the "Father- land," the Communist state in being, Communists the world over have had a tangible object to which to transfer their loyalties. At the same time, the Comintern has provided a means for close inter- national ties. The resilient strength of this world- wide organization has been indicated by its ready adaptability to the sudden shifts and changes in Soviet policy. On numerous occasions the various national Communists have revealed their point of view that what is advantageous for the Soviet Union is advantageous for them. Thus it has become exceedingly clear that international Com- munism is an integral part of Soviet global strategy. In the period between World Wars I and II, the Comintern openly held a series of world con- gresses to formulate Communist policy which was admittedly linked closely with the interests of the Soviet fatherland. However, in 1943, to allay the suspicions of the western powers, this organization was dissolved as a gesture to show that subversive activity in Capitalist countries had been suspended 205 ress?but not for long. In 1947, the Communist Information Bureau (Cominform) was created as a result of an international meeting of Communists held in Poland. It was not supposed to represent a revival of the Comintern, but to serve only as a European bureau for the exchange of ideas and in- formation, and to bring a degree of coordination to "democratic" movements. These descriptions of the Comintern and Cominform are what the Communists themselves admit publicly. Actually, this is a small part of the story, for the evidence is overwhelming that the Comintern was almost ex- clusively the instrument of the Soviet Union. Al- though this organization was officially dissolved in 1943, its principles were not: they merely assumed new modes. The Qominform, even more rigidly subservient to Moscow, appears to be an apparatus for world propaganda, subversion, and espionage. Subsidiary Applications of Theory As has been already indicated, communism in various countries is the tool of international com- munism controlled from the Soviet Union. There- fore it is a domestic enemy to be combatted. by the police, the courts, and the educational system, as well as the armed forces. Few can doubt that the United States itself is under attack by unorthodox weapons that cannot be challenged alone by the battleship, the tank, or the bomber. Required is a joint effort of all social forces in the nation. No Communist Party in any country should be confused with ordinary political parties, because it is essentially an underground movement. True, it may have a conventional organization which nomi- nates candidates for political office, and many fel- low travelers vote for these candidates and take part in the overt activities of the party. But it has been thoroughly documented in recent years, in the United States at least, that the core of the Communist Party is made up of disciplined people who operate at a conspiratorial level. As set forth in published evidence, the Com- munist Party of the United States openly em- braces the principles of Marxism-Leninism and advocates the overthrow and destruction of the United States Government by force and violence. Its pattern of action clearly indicates guidance and CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENntroved For Releasq:ANyaa9gE: RitiorDA8L5?)911::?10E1000100210002-9 direction of a foreign origin, as well as close as- sociation with the international Communist move- ment. Its methods also reflect its relationships with the Soviet Union and the Cominform. As do other Communists, those in the United States fol- low the "hard core" principle, which discourages large numbers and favors fewer members who are active and intensely loyal. Such party members associate themselves with worthy public causes, adopt misleading party names and alliances, en- courage labor strikes and disturbances, and at- tempt to infiltrate into government, the armed forces, and police agencies. Espionage is a com- mon feature, aimed at the transmission of vital information to the Soviet Union to serve Com- munist aims and objectives. Likewise, in its fanatical loyalty to Communist principles, the American Communist Party has a sabotage poten- tial which can be directed against the United States at any time. In depreciating the seriousness of the Commu- nist menace, some Americans have expressed the opinion that Trotsky was a dangerous Bolshevist type because he wanted to hasten world revolu- tion, but that Stalin was interested only in Rus- sia's domestic progress, although he used drastic measures to save time. Others regard Trotsky as an idealist betrayed by the heartless tyrant Stalin. It seems clear that both of these men were dedi- cated to the principle of world revolution. Stalin, supposedly concerned solely with internal develop- ment, was just more patient and thorough in his plans. He built his world organization in dupli- cating and parallel form. There are the overt organizations whose mission is to do as much as possible to create dissent, to recruit, to propa- gandize. There are also the covert organizations for the collection of information, for sabotage, and for infiltration of every type of social group. All represent powerful weapons whose capabilities will not become apparent unless widespread mili- tary war breaks out, and even then will be difficult of assessment. Obviously many of these organizations are par.. ticularly potent against a democracy such as the United States. Already the Bill of Rights has been used as a defense by those who seek to destroy its principles. Patriotic Americans sometimes propose measures to "smoke out subversives" that CONFIDENTIAL 206 as a cure may be as bad as the disease. Certainly the problem cannot be solved by strict censorship measures or disregard for the rights of citizenship or due process of law. Yet there are times when national survival may require stringent measures, applied with intelligence and discernment. Factors in the Growth of Communism The significant growth of world communism, especially in the post-World War II period, is the result of many factors, among them being: effec- tive organization and organized deception, world conditions which favored the acceptance of Com- munist theory, and the war prestige of the Soviet Union. As already shown, the Communists, even before the end of the war, had developed active organi- zations which were both international and domes- tic in nature. Armed with theory translated into organized action, they were prepared to move into national vacuums created by the disorganization of social structures in the aftermath of war and Nazi tyranny. The preparatory efforts of Lenin and Stalin, who had stressed the importance of organization, made possible the maximum utiliza- tion of every opportunity which presented itself. The operations of the Communist Parties of Italy and France are notable examples of the Soviet effort to influence political activities within non- Communist states. The underlying technique in all instances was carefully calculated organized deception. The terrible destruction of World War II, its dislocation of national economies and political structures, and its imposition of widespread hard- ships and untold suffering on large segments of the world's population all combined to create re- ceptive attention in many areas to the glittering Communist promises of security and a better life. The situation for many people was such that they felt they had nothing to lose, and everything to gain. As a result, some succumbed, unaware of the harsh, ugly realities of Communist rule. Not to be underestimated, therefore, is the appeal of theory as a factor in the rapid growth of the Com- munist movement. Backing up the organizations and the theory have been the Soviet Armies which gained great prestige during the war. In the postwar period, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved FvoMpt,macqqpgri ql&RRP?.5Q0litl05R0001002100NEDENTIAL the threat of their power, to say nothing of their proximity, has introduced the factor of uncer- tainty if not of intimidation, particularly for the nations of Europe. In addition, the wartime in- trusion of Communists, openly devoted to their "cause," into places of leadership within under- ground resistance movements in Europe and else- where has proved to be an additional source of strength. Since the Soviet state is a motivating force for world communism, it is appropriate to consider certain of its elements of power. THE SOVIET STATE Historical Background As stated in chapter 5, the assessment of a state is more than a description of its strategic position, its resources, and its industry. It is also essential to study its people and their background. The historical beginnings of Russia are lost in vague antiquity. Geographically, Russia was considered the dividing line between the races and cultures of Europe and those of Asia. To the east in Asia were nomadic tribes of Mongolians, Tatars, and Turks. Perhaps by the sixth century A. D., Slavic tribes from northeast of the Carpathians began to move into the wooded areas of western Russia and to spread along the river valleys to the Baltic. In the ninth century the Vikings es- tablished trading posts at Novgorod in the west, and also at Kiev in the east. Both became im- portant centers of government and culture. Satel- lite colonies and subject territories spread across much of European Russia. Novgorod became a merchant city in the Hanseatic League of the Mid- dle Ages. Kiev established contact with the East- ern Roman Church at Constantinople, and thus became Christian, also receiving the Cyrillic al- phabet, and many features of art and architecture. The power of Kiev declined under increasing tribal attacks from the east, and Muscovy, because of its more sheltered position in the upper Volga basin, became the new center of power. During the 13th century all European Russia except Novgorod was conquered by the Mongols of Genghis Khan and his successors, who dominated the country for 21/2 centuries and em- planted many of their own racial and cultural 207 characteristics. During the 13th century Russia was also invaded from the west by the Swedes, who conquered Finland and attacked Novgorod, and by the Teutonic Knights, who invaded the Baltic coast and established such cities as Riga. In the 14th century Lithuania and Poland, joined through royal marriage, dominated territories from the Baltic nearly to the Black Sea. The Lithuanian part is now Byelo-Russia, and the Polish part is now the Ukraine. The princes at Moscow gradually Odned power and finally won freedom from Tatar control. At this time the Ottoman Turks overran the Middle East and took Constantinople, forcing the Eastern church to move its headquarters to Mos- cow. Ivan III assumed the title of Tzar (Caesar) when he married the niece of the last Byzantine emperor in 1472. Then began a period of expan- sion of power. Traders and settlers pushed out- ward all the way to the Arctic shores and in 1648 reached the Pacific. During the following 200 years there were recurrent conflicts with the Turks, Tatars, Poles, Swedes, Lithuanians, and the Teu- tonic Knights. Peter the Great, in the late 17th and early 18th centuries, tried to westernize his country. Forcing out the Swedes, he moved into the Baltic states and established St. Petersburg as a great Russian seaport. Catherine the Great, 1762-96, won back the territories occupied by Poland, and her armies also pushed to the shores of the Black Sea. Later the Caucasus and Finland were conquered. Rus- sian explorers pushed far afield, establishing set- tlements not only in Pacific Siberia but along the Alaskan shores. By 1812 a colony was established just north of San Francisco at Fort Ross. To some degree Russia was involved in intrigue in California and Mexico even after the Fort Ross post was sold. The problem was finally eliminated by our purchase of Alaska in 1867. Meanwhile in Europe Russia had been at war with Napoleon, and after his famous winter re- treat, the Russian armies marched across Europe to France, hailed as liberators from the tyrant. In the years that ensued, Russia held a dominant position in Central and Eastern Europe, helping to suppress revolts in Austria and Prussia, but aiding the Balkan states to win freedom from the Turks. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDERIFINVved For Release 2410g09 : CIA-RDP85G00105R000100210002-9 NCE FOR NAVAL OFFICERS In the Crimean War of the 1850's the British and French joined with Turkey to block Russian expansion into the Mediterranean. Again in 1877-8, Britain, Austria, and Germany aided Turkey to prevent Russian conquest of the Darda- nelles. Thwarted in this direction, Russia wrested control of the lower Amur basin from China, and just before the end of the century laid railway lines through Manchuria and took Port Arthur. Rivalries with Japan in Korea brought a war that the new trans-Siberian railway could not sustain logistically. This led to Japanese domination in southern Manchuria, Korea, and south Sakhalin. Participation in the first world conflict came when Russia declared war in behalf of Serbia against Austria. Germany was able eventually to overrun much of White Russia, the Ukraine, and Finland; Rumania took Bessarabia; and the Turks entered the Caucasus. With internal revolution and chaos rife in Russia, the western Allies in- vaded Murmansk, Archangel, Far Eastern Siberia, and Baku. At the end of the war, Estonia, Latvia, Lithuania, Finland, Poland, and Bessarabia were all separated from Russia, and the Ukraine gained autonomy. Revolt in Turkestan lasted until 1923. Marshal Pilsudski in 1920 mounted fresh attacks from Poland which led to the capture of Kiev, and his forces reached Odessa. Russian counter- attacks would have destroyed Poland again but for British and French intervention. Russia made a few overt moves, aside from re- absorbing the Ukraine, Turkestan, and Trans- caucasia, until 1939 when her pact with Hilter led to the repartition of Poland, the absorption of the Baltic states, and war with Finland. German armies in 1941 began Operation Barbarosa that laid waste territories extending from the Arctic to the gates of Moscow and down to the Caucasus. An awakening patriotism and ruthless govern- mental measures supported by American lend-lease aid, enabled the Russians to turn the tide after the defense of Stalingrad, and to sweep west into central and eastern Europe. In the Far East their last minute entry into the Pacific War gave them the Kuriles, the rest of Sakhalin, and, eventual domination of the Asiatic mainland, through the Chinese Reds, all the way to Southeast Asia. The wars, hot and cold, of recent years are all too CONFIDENTIAL 208 familiar for elaboration here. So much for the bare outlines of military and political change. Military .Geography Geographically the U. S. S. R. is a vast conti- nental territory, sweeping some 6,000 miles east and west and 3,000 miles north and south. Much of it is a great plain that reaches from Poland across Eurasia to the Yenesei River, interrupted only by the moderate Ural Mountains. The mili- tary approaches to this territory are few. The Arctic, frozen much of the year, has few transport routes across it, and the soil is swampy and the area insect-ridden during the brief season when it is not frozen and wind-swept. The Soviet Union is protected in most of its other approaches by high mountains and by great deserts. In the west, the Pripet Marshes are a barrier; the Balkan frontier has the Carpathians; the Caucasus ranges are very high. Formidable, too, are the great mountain belts near Iran, Afghanistan, Sinkiang, and Mongolia. The Pa- cific flanks are also mountainous. Mongolia and much of the Turkestan area are deserts. The principal surface approaches are in the Mur- mansk area, through the Baltic to Leningrad, from Germany on either side of the Pripet Marshes, or from the Black Sea. Entry is also possible, geo- graphically speaking, along each shore of the Caspian from Iran, through the Dzungarian Gap from Sinkiang, or at the Pacific end of the country via Dairen, Vladivostok, or the Amur River. These military approaches, of course, are not wide open, since Soviet defenses are strong and the Red Army is likely to occupy most of them before any outside force could come near. Fur- ther, mere entry into Soviet territory is not the same as occupying the seat of Soviet power. Key regions of greatest strategic significande include: (1) Moscow, (2) Leningrad, (3) the Donbas, (4) the Caucasus, (5) the Urals, (6) Tashkent, (7) the Kuzbas, (8) Lake Baikal, (9) Chita, and (10) Khabarovsk. These include the major industries and sources of raw materials. Two additional fuel sources that feed the industrial areas must be added : the Pechora and the Karaganda coal fields. The areas listed above are so widely distributed that the power of the Soviet Union, like that of a hydra-headed monster, cannot be destroyed by the occupation of any single one of them. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WORLD COMMUNISM AND THE U. S. S. R. CONFIDENTIAL What are some other strengths and weaknesses inherent in Russia's geographic position? It has already been pointed out that the country is vast, well protected on most frontiers, and with widely scattered centers of industry. The vastness is a defense, but it also poses grave problems of trans- port. Given advance preparations, the Soviet Union from its interior position can strike out- ward at adjacent Alaska and at Japan, strengthen its position in China, overrun the Middle East to reach the Indian Ocean and the Suez region, send forces throughout Scandinavia, and of course, re- inforce the Balkans and move its heaviest forces westward beyond Poland to sweep Europe as far as the Pyrenees. It is hoped that NATO strength in time will minimize this likelihood. It may be that concentrated attacks upon the Soviet Union at unexpected points would create exceedingly dif- ficult problems for the Russians in moving troops and supplies. This possibility has been antic- ipated by the Russians, for large forces are main- tained at all points where attack might come, a policy which only a country with a large man- power pool can carry out. It has also been met by the virtually autonomous nature of many of the scattered industrial complexes. Munitions need not be moved from one end of the country to the other in all cases, for sources of supply are usually duplicated. Economic Development One of the significant features of economic de- velopment has been the percentage shift of indus- try to the area east of the Urals, although recon- struction and even new construction in the area overrun by the Germans has also been very sub- stantial. The major installations of the steel in- dustry are in the Donbas of the Ukraine, in the Urals, and in the Far East. Iron ore is found in each of these regions. Coal is currently mined in large quantities in the Donbas, the Kuzbas, and in the Karaganda and Pechora regions. Iron ore and coal move in opposite directions between the Urals area and the Kuzbas, equalizing rail traffic, while Karaganda coal moves both to the Urals and to the Tashkent area. Pechora coal moves both to the Leningrad and Urals areas. These bulk movements will be vastly improved in the years ahead as lagging transport facilities, both 209 rail and water, are improved. Already double tracking and electrification are improving many of the railways. New short-cut routes will carry coal to Tashkent from Karaganda and to the Urals from the Pechora. New dams on rivers and canals will bring water transport to supplement the railways. The machinery and other complex industries have long been associated with western centers such as Moscow, Leningrad, and Gorky, but now new plants, plus plants moved in the face of Ger- man invasion, turn out these products at widely scattered points all the way east to the Pacific. Tanks, aircraft, and railway equipment cannot be associated with a few areas alone. The Soviet Union is richly endowed with vir- tually the whole range of materials needed for modern industry and war. Perhaps the major shortcomings are in molybdenum, and to some ex- tent tungsten, though Communist China can sup- ply the latter. Although they have enough to meet minimum war needs, they have need of more bauxite, bismuth, cadmium, zinc, uranium, abra- sives, quartz, and talc. Petroleum shortages are frequently mentioned, but refining and transport capacity are probably more immediate problems than reserves. The country is also rich in other respects. It contains perhaps one-quarter of the timber stand of the world, enormous hydroelectric potentialities, and very considerable agricultural possibilities. Manpower The people themselves as a resource deserve mention. They are hardy and accustomed to Spartan living. Their numbers are not definitely known, but probably exceed 200 million. Al- though divided into many races, they showed con- siderable unity in the war against Germany before it was over. The population growth is such as to provide a high military manpower potential. Technology The Soviet Government has been very conscious of the need for catching up with the industrial development in Western Europe and America. Through 5-year plans, and frequently, ruthless measures, rapid progress has been made in heavy industry, the basis for both further expansion and CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS for munitions. Although their total capacity lags far below ours, direct statistical comparisons are dangerously misleading. Since consumer indus- tries receive a very low priority, only enough to prevent overall lowered production or revolt, by far the greatest effort is in further expansion of heavy and munitions industries. In contrast, our own so-called minimum civilian needs even in war- time swallow up very large quantities of labor and materials. The rugged simplicity of Soviet weapons is in striking contrast to the frequently indifferent re- sults in consumer goods. Basic research and tech- nical progress are given every encouragement, and have resulted in such outstanding achievements as some of the world's best tanks, artillery pieces, and jet fighter aircraft. Their emphasis on subma- rines is of special interest to the United States Navy. Their achievement in atomic weapons has been reached by much more than highly skilled espionage; it represents technical skill and organ- ized industrial effort. They have found a number of sources of uranium and are now carrying on a major atomic effort in several parts of their vast domain. Perhaps their two major industrial weaknesses are an inadequate transport system and the pres- sure that would be felt in the oil industry during a sustained all-out war. Natural Resources Food supply has long been a matter of concern for the Soviet government. In the past the coun- try was chiefly agricultural, and it still is in con- siderable degree, despite the strenuous efforts to industralize. The key area agriculturally is a long belt of steppe land reaching across the Ukraine and out east of the Volga. Although much of it has the rich Chernozem type black soil, rainfall is scanty and uncertain. This limited and unreliable ability to produce food for a rap- idly expanding population has serious implica- tions. Even if new areas were brought under cultivation, less than 10 percent of the total land in Russia is arable, and much of this is marginal. Conquest of eastern Europe therefore represents an important strengthening of the food position. The Soviets have worked hard to develop new cold-resistant fast-maturing crops to expand pro- CONFIDENTIAL 210 duction into the subarctic. The principal crops are wheat, rye, barley, potatoes, and sugar beets. Flax is raised in considerable quantities, and in- creased production of cotton in Turkestan, and near the Black and Caspian Seas, is bringing self- sufficiency. Meat has been in short supply for many years. The Soviet Union may well be the richest coun- try in the world in mineral resources. Not; all of it has been thoroughly prospected, but vast resources of petroleum, coal, iron, manganese, chromium, magnesium, aluminum, gold, platinum, potash, and phosphate have already been found. There are very considerable amounts of copper, nickel, lead, zinc, graphite, mica, asbestos, fluor- spar, quartz crystals, sulphur, and some titanium, tungsten, molybdenum, tin, and corundum. Co- balt, cadmium, and vanadium may be available as byproducts from ores known to exist in Russia. Where a few of these materials are in short supply for industry, the satellites make up most defi- ciencies. Molybdenum comes from East Germany, antimony from Czechoslovakia and China, tung- sten from China, and mercury for a time came from Yugoslavia. It is harder to assess the actual position in uranium production, but in addition to the old pitchblende mines in the Czechoslovakia- East Germany area, which have been thoroughly exploited, there are additional deposits in Poland and Bulgaria. More may be available in Man- churia, and it is rumored in several public reports that vast amounts can be exploited in western Tibet. Within the Soviet Union there are known uranium deposits at Ukhta in northern Russia, in the Caucasus, southeastern Turkestan, the Altai Mountains, Tannu Tuva, and near Lake Baikal. Undoubtedly, exploration has revealed more. Their chief need for mineral exploitation is more engineers, more production and refining equip- ment, and better railway transport. Soviet oil production has not kept pace fully with potential needs, but there are multiple sources under exploitation. The Caucasus area still leads in production, centering at Baku, Maikop, and Grosny. The trans-Volga and Emba River fields are being expanded. Other smaller fields are in the Gergana Valley of Turkestan, at Nebit Dag east of the Caspian, in the Kama River Valley, on Northern Sakhalin, and in Kamchatka. Still Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WORLD COMMUNISM AND THE U. S. S. R. CONFIDENTIAL other newer fields are in the Pechora, the Yenesei, and Maya Valleys, and the Tamir Peninsula. The Lvov fields in former Poland are now within the Soviet Union. In addition, satellite Rumania has the Ploesti fields. Production is conceivably only one-tenth that of the United States, but consump- tion by civilian motor vehicles and railways in the Soviet Union is negligible compared to ours. The Russians have made considerable improve- ments in electric power production. The greatest dam in Europe before the war was the 900,000 kilowatts-capacity Dnepr plant, comparable to Hoover Dam in power output. Since the war it has been restored, and a whole series of dams are either completed or projected along the Don and Volga. Potentially, there are large numbers of additional sites. Hydroelectric power is also de- veloped in the Kola Peninsula, the Caucasus, and in southeastern Turkestan. Today output may be about one quarter that of the United States. Sociological Characteristics What manner of people have the Russians be- come ? The question is difficult to answer in a few words. Representing a mixture of many cultures, they seem in many ways mystical, fond of phil- osophizing, perhaps too willing to shrug off mis- fortune, but able to endure discomfort and incon- venience. Because of ignorance and poverty, only strong methods have been able to change the masses in their habitual ways. The people as a whole have never lived in a western democratic society, and their present government is certainly not con- cerned with human rights or individual dignity. Although this is not meant to be an indictment of the Russian people, there is now a question of whether or not the people themselves, in their own society, may net be changing for the worse by our standards. The Russian nobility, prosper- ous farmers, and business classes of the past were killed or driven from the country. The peasants, used to a simple and hardy life, bound by a love for their soil, have been uprooted by the millions to go into industry or to collective farms. The years of revolution, war, famine, and repression have affected family life and individual outlook. The present generation has known nothing else; only the old people remember an earlier life. The Soviet government has tried in this generation to 211 reshape attitudes and behavior, using any means regardless of the cost to individuals. It has speeded modern improvements and corrected some former shortcomings, but only at a terrible price in human suffering and damage to the finer sen- sibilities of the people. The Soviet totalitarian state has not only brought planning to the econ- omy, but police terror, spying, and regulation into every aspect of life. The social and political con- sequences of communism are just as great and as serious as the economic. Communist minorities in the early days of revo- lution manipulated themselves into power and in a conspiratorial manner have ruthlessly maintained their hold. Division of authority is not tolerated, and when rivals have appeared, they have been purged by standards so extreme that their fam- ilies and associates, regardless of individual guilt, have also faced execution or imprisonment. Ter- ror is the weapon used. There is no voice other than the voice of the Party, whether it be in the press, the school, or the political forum. The de- tailed regulation of life with millions of informers makes anticommunist intrigue exceedingly diffi- cult. Children are praised for testifying against their parents. Education and politics become the ritualistic repetition of Party dogmas, with devia- tion a major sin. Yet despite a generation of re- education and suppression, there are still stresses in Soviet society. Minorities to some degree still have Nationalist aspirations. Normal human feelings cannot be so suppressed that some do not rebel at cruelty. The years of sacrifice, always with the promise of a better future, have not brought an easier life to the masses, instead a new privileged class, the Party members, has arisen. Only a few others are also favored: scientists, artists, and military leaders. The top leaders seem to combine a very real devotion to the Party with an apparently considerable degree of cyni- cism about some of the outward symbols used. In any event, extremes of privilege are very great, ranging according to rank within the Party, the military, and down through the intelligentsia to ordinary workers and peasants, finally reaching the "untouchables" of Soviet society, those out of favor with the Party and the slave laborers. No- body knows how many laborers are in penal servi- tude, but the number may be twenty or thirty mil- CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS lion, representing ordinary criminals, political minorities, the indiscreet, kulaks and petty bour- geoisie, or just people unfortunate enough to be within reach when more labor 'was required. The new generation takes this society for granted. Children old enough to go to school join the Young Pioneers, and if found worthy, are then graduated with suitable ritual to the Kom- somols. In time, by rigid selection, a few join the elite Communist Party. Its numbers, kept to hard core strength by constant self-examination, are subjected to rigid tests and tasks in order to increase their usefulness to the Party. Political Institutions A facade of legal government, a written consti- tution, and even elections exist, but it is the Party that rules through the Central Committee and the Party Presidium. It may be that there is freedom of expression and debate within the Party Presidium, but it is also likely that, in consider- able degree, while Stalin was dictator, the mem- bers waited for his nod. It is also possible that if some got illusions of grandeur, Stalin played them off against each other, or they suddenly died and enjoyed elaborate state funerals. The Party leaders live in country villas in the suburbs of Moscow, and ride to the Kremlin in limousines with police escort; but they also work very long hours. During Stalin's regime, late night conferences were customary. It is not yet possible to assess the consequences of the poli tical realignment which followed Stalin's death. How- ever, there seems to be no reason for anticipating major changes in fundamental policy or in the basic organizational structure of the Party or the Government. Evolutionary Prospects As has been pointed out, a better standard of liv- ing for the masses has been sacrificed to capital expansion and military strength. The Red Army, largest in the world, represents abstractly a counter force to the Communist Party. But precaution- ary measures, undertaken to prevent this eventu- ality, have been intensified, especially following the great purges of 1937 that uncovered treachery, imaginary or real, to Stalin. Every military unit CONFIDENTIAL Approved For Release 20 nowl includes a political officer and, in addition, there are secret informers throughout the ranks that watch for any dissidence. Also the security forces, under the MVD, have their own elite mili- tary units designed to deal with insurrection. It cannot be emphasized too strongly that those are most optimistic who hope for internal reform in the Soviet Union which will? change its world outlook. Although there may be some guerrilla bands, some dissident elements, and undoubtedly a host of unhappy citizens, the odds are against any upset short of major war and upheaval. Party control of all propaganda, education, and social activity, even including the Orthodox Church, makes the odds very great indeed. As has been suggested earlier, we do not have just a Soviet problem, one of ambitious State albeit with a different philosophy. We have a world Communist movement which draws men of many races and many classes into a world struggle for domination, and which receives strength and suc- cor from the Soviet homeland. The people of some countries have been won over more easily, perhaps, because by comparison Soviet domination seemed to represent an improved way of life. The Communists have also learned to take the legiti- mate grievance, set up a coalition or popular front, and then after infiltration of key posts to unmask their complete power and win control of the new government. Soviet Armed Forces The Red Army is the most powerful land force in the world. Its strength is usually quoted as 175 divisions, not including powerful satellite and security forces. Increasingly, the heavy arms production of the Soviet Union is being reflected in higher firepower and more armor and vehicles for this army. Amenities for troops are kept at a minimum. Under combat conditions they largely live off the land, and advance in every kind of vehicle, mechanically and animal powered. The haphazard aspects of their military behavior are not necessarily weaknesses: some are strengths, for they are free from the high logistics costs that we bear. Their willingness to take casualties makes them formidable adversaries. If a minefield blocks the way, hostages, labor forces, or their own troops simply march through and detonate 212 03/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R00010021QQ02-9 WORLD COMMUNISM AND THE U. S. S. R. cunt. luENTIAL the mines to allow more combat troops to pass. Although large numbers defected or were demoral- ized in the earlier stages of the German onslaught, extreme repressive measures, plus patriotism, plus personal indifference to death, created a powerful force that swept across Europe. The Red Air Force has specialized in tactical air support, and has long been known for its good quality fighters. The Korean War demonstrated that the MIG-15 jet fighter was one of the finest interceptors in the world. Creation of a strategic air force has been suggested by the copies of United States B-29's that have been seen in in- creasing numbers by foreign observers. This development, which probably includes more modern types, takes time, but fits logically with their presumed atomic capabilities. The Red Navy in the past has been largely a coastal defense force scattered among the several widely separated coasts of the Soviet Union. However, it is no mean force, for its submarine strength is the greatest in the world, and although reports are scanty, the same German technical knowledge in this field has been available to them as to us. The Soviet Navy's performance is largely unknown, since its exploits in World War II were limited, but there have been frequently reported stories of new surface vessel construc- tion that reflect Soviet interest in building an ef- fective fleet. A chief difference between these Red forces and our own is their use of political officers and also of 213 large para-military security forces. Unlike our doctrine, every Soviet military unit not only has a military commander but a political officer who can influence a commander's decision by making him accountable to the Party. The political officer has additional duties in insuring loyalty and in carrying out an intensive indoctrination program at all levels. The security forces are so organized as virtually to guarantee that the Red Army itself cannot rise against the government. These security forces also have major responsi- bilities for guarding the frontiers against any- thing other than major attack, and also for ad- ministering the slave labor camps with their estimated twenty million victims. In summation, the armed forces of the Soviet Union and the closely integrated satellite forces collectively represent the greatest military power in being in the world. They are famous for their artillery, their tanks, their rockets, and their fighter planes. They are politically oriented to a fanatical degree. They are hardened by their normal living conditions and by the most rigorous training. However, they are not invincible, nor is their political training a perfect shield, if the record of World War II gives any guide for the future. With full recognition of their strengths, the naval officer should study them with a view toward possible exploitation of their weaknesses, both in conventional military warfare and in those areas where intelligence can also aid so greatly: the economic, the political, and the psychological. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CHAPTER 9 THE INTELLIGENCE CYCLE: COLLECTION Intelligence as activity is embodied in the steps or phases of a perpetual cycle consisting of collec- tion, processing, and dissemination kept in motion and continually reactivated by use on the part of strategic planners and operational commanders. Any item of collected information becomes intel- ligence through processing and reaches its poten- tial consumer through dissemination. A cycle which comprises these functions is not peculiar to intelligence; the steps are common to any activity or industry which produces a finished product from raw materials. In the automotive industry, for example, the process of manufacture begins with the acquisition of raw materials, the ores from which the necessary metals are made. The metals are then fashioned into the component parts of engine, chassis, and body, which are as- sembled into a finished product, an automobile. The next step puts the product in the hands of distributors or dealers who sell it to the ultimate user, the individual motorist. The phases of such an industrial cycle, procurement, manufacture, distribution and sales are analogous to those of all intelligence activity. First, information must be collected; second, this information must be sub- jected to certain evaluative processes by which it becomes intelligence; and third, the intelligence must be put in the hands of potential users Finally, its use, either in planning or in operations, will uncover needs for additional information which will reactivate the cycle. Let us relate the operation of the intelligence cycle to the commander and his mission. In pre- liminary staff planning, the commander's needs and responsibilities in respect to intelligence will require answers to the following questions: 1. Is my information on the enemy and the area of operations complete, accurate, and timely? 2. What collecting agencies or units do I have available for filling in the gaps in my infor- mation? 3. What is the correct interpretation of this information in the light of my mission? CONFIDENTIAL 4. To which of my subordinates or superiors will certain items of intelligence be useful? In supplying the answers to the commander's questions, the supporting duties and functions of his intelligence officer are clearly prescribed as they relate to the three steps of the cycle, for collec- tion, processing, and dissemination are indicated. The matter of use requires more explanation. It has been stated above that use reactivates the cycle. Returning to our industrial analogy, we find the user, the man who bought the car, in the same position as the commander who "bought" the intelligence. The owner of the car reports that its performance in general is quite satisfactory, but that improvement in driving comfort would be effected with the addition of foam rubber seat cushions. Satisfied owners are essential to sales, so the company acts on the complaint by procuring additional raw materials, in this case foam rubber, and later models of the car have better seat cush- ions. Thus user experience results in a better product. Suppost now that the commander in the midst of his planning finds that his information on Blue Beach may not be completely up-to-date because of enemy activity in that particular area. Have beach defenses been improved? A collection task arises and his question can be answered best by amphibious reconnaissance of the beach. The re- port of the amphibious patrol will then be evalu- ated and the new intelligence considered in the commander's plan. The cycle was reactivated by the need for additional information in the plan- ning stage of the operation. Likewise, the opera- tion itself will cause the reactivation of the cycle when in retrospect it is realized that information was incomplete on the range of a certain type of mortar used by the enemy. The capabilities of this mortar must be reassessed in the light of com- bat experience: a job for his intelligence officer. Again the experience of the user results in a better product, which in this case is intelligence of value to the commander in making sound military decisions. 215 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The steps of the intelligence cycle do not always follow in the logical sequence of collection, proc- essing, and dissemination, although this order is normal procedure in the flow of raw information from producer to consumer. Circumstances may influence the sequence; certain information re- quires no processing, since it is finished intelligence at the time of collection. This would be true in the case of a single indisputable fact required by a user. Information required by a user can be supplied on many occasions from the files of ONI without the need for the assignment of an ad- ditional collection task to a field unit. The individual steps in the cycle likewise do not represent treatment by different intelligence activities at distinctly different times. The same activity may be collector, evaluator, and dissemi- nator of a certain item of information. Collect- ing agencies themselves normally subject the in- formation collected to a certain degree of processing, and those who determine the final interpretation of an item of information are often best qualified to determine its potential user. The cycle is flexible, therefore, in its application to specific subjects and intelligence tasks. Collection, processing, and dissemination and the work of the intelligence officer in each will be discussed more fully in the three chapters which follow. REQUIREMENTS IN COLLECTION Information for intelligence comprises docu- ments, facts, and observations which throw light on any of the varied aspects of a subject under study. In form, information may consist of written articles or reports, messages, oral presen- tations or briefings, maps, photographs, graphic visual aids, and physical objects. In nature, in- formation may be general or specific; detailed or fragmentary; true or false. Only when this raw undigested accumulation of material is subjected to the processes leading to final interpretation does it become intelligence to be disseminated to ap- propriate users. There are four basic requirements in the collec- tion of information for intelligence: (1) GUID- ANCE, the direction of the collection effort by means of collection plans at all levels of command; (2) COVERAGE, the availability of suitable collecting CONFIDENTIAL activities to fulfill the tasks imposed by the col- lection plan; (3) REPORTING, the form and means of forwarding information from the collecting activity to the processing agency; (4) RECORDING, making information readily available for present and future processing by proper cataloging, filing, and indexing, Guidance Collection requires specific guidance and control to make it efficient and valuable. Collectors must know what information is needed, and how soon it is needed, in order to expend their efforts effec- tively. Since collection of information for intel- ligence is a responsibility of a naval commander, it is from him that direction of the collection effort must come. The commander's function in this respect will be more fully discussed in chapter 12, ? Intelligence Staff Procedures. The guidance of collection throughout the naval establishment is effected through certain basic requirements set forth at the highest command level by the Chief of Naval Operations. They are expressed in broad terms for the general guidance of all the Navy's collecting agencies and activities and constitute a basic collection plan from which are derived the collection plans of subordinate commands. The Director of Naval Intelligence, for example, as CNO's Intelligence Officer, bases his collection plan upon the requirements listed by CNO, but DNI expresses them in much more detail and as- signs specific collection tasks to the agencies and activities which can best obtain the required in- formation. The field activities, such as the Oper- ating Forces, the Attache System, and the Naval District and River Commands, formulate their own collection plans, based in turn on the require- ments of DNI, but again expressing in detail the specific items that can be obtained through the exploitation of sources peculiar or particularly available to each. Thus the general intelligence requirements become more itemized and specific as they are incorporated into the collection plans of lower echelons of command. Some intelligence tasks are long-range and continuing, others are initiated by immediate needs. The collector must be aware of the purpose, nature, and urgency of these tasks, and he must work within the frame- 216 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL work of an organized plan in accordance with local conditions. Collection directives are subject to such periodic revision as may be demanded by the world situa- tion and the needs of the Navy. Emphasis will vary, interest will rise and wane, and objectives will differ in various parts of the world. Intel- ligence producing units, such as a geographic desk in the Office of Naval Intelligence, should have the closest possible contact with the field activity which is best qualified to collect the particular kind of information required for sound estimates or careful planning. The relations between col- lector and processor should always be as intimate as possible. Each report's value should be ap- praised and the reporting officer notified. Much welcome guidance can be given by suggestions through personal conferences, official inspections at stated intervals, and official evaluations and commentaries of field reports. Praise for indus- trious collection and good reporting are mutually rewarding for both collectors and processors. Coverage Coverage is achieved when the collecting agency, through conscientious exploitation of all sources of information, fulfils its assigned mission. Thor- ough coverage depends upon a carefully formu- lated collection plan, one which completely realizes the collecting potential of the area or target in question. Through the collection plan, potential sources for information of significance are most likely to be discovered and exploited; thus, it may be possible to anticipate and fulfil requirements for particular data. In connection with coverage, the utilization of operational collection units will be discussed in chapters 12 and 13. Collection Agencies As was noted in the previous sections on the organization of Naval Intelligence, the respon- sibility for the collection of all types of informa- tion for intelligence required within the Naval establishment rests with the Chief of Naval Op- erations. Under him, the Director of Naval In- telligence, as head of the Naval Intelligence organ- ization, is responsible for the exploitation of all sources in the collection of information of naval interest, guided by such pertinent policies, pro- 269196-54-15 217 cedures, and objectives as are set forth by the National Security Council. The broad scope of naval interest has been presented in the first chap- ter, and needs no further elaboration. Any infor- mation or intelligence that might support the Navy in carrying out the missions assigned to it or to its component parts, including naval aviation, amphibious forces, and the Marine Corps, is con- sidered to be of naval interest. The collecting activities available to the Director of Naval Intelligence are (1) the Office of Naval Intelligence, the "home office"; (2) the field activ- ities consisting of the Operating Forces, the Naval Attach?ystem, Naval District and River Com- mands, including Sea Frontiers; and (3) the naval sections of intelligence activities sponsored jointly by Navy with other military services. The Collector, Ashore and Afloat Every person in the Navy is a potential collec- tor of information of value to intelligence. A seaman on liberty in foreign or United States ports, a lieutenant unexpectedly invited aboard a foreign naval vessel, a welder in a naval shipyard, or a clerk in the office of a District Intelligence Officer, may be in position to supply a missing bit of information. Just as the intelligence required by staff planners differs from that required by sub- ordinate commanders only in scope, point of view, and level of employment, so do collectors of information differ only in the orbit of their move- ment, their background of education and experi- ence, and their position in the naval establish- ment. The collector, like the newspaper reporter, is concerned with the five W's and the H: who, what, when, where, why, and how, but he is more than an inquiring reporter, for he must be city editor and editorial writer as well, combining the discrimination of a city editor in determining what is "fit to print" with the editorial writer's perspec- tive in interpreting events of the contemporary scene. In collection activities, the intelligence officer must have the personal qualities possessed by the successful reporter. It is difficult to give a rela- tive order of importance to these qualities, for their significance will be determined by the aspects of the collection task, and they will vary with assignments. Answers come from questions, so CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS first of all, the intelligence officer as a collector must have an inquiring mind, an insatiable intel- lectual curiosity about the world in which he lives. In order to give direction to these qualities, he must have a thorough grasp of the object, nature, and scope of the intelligence operations in which he is engaged. In this respect intelligence is knowledge?knowledge gained by the intelligence officer through study and experience. The better his background of information is on a given sub- ject, the more valuable and discriminating will be his effort in collecting additional information. He, must be thoroughly familiar with his agency's existing file of information so that he will not waste time in collecting what is already available. It is on the gaps of information that he should expend time and energy. He must ever be an avid student, with a discerning awareness of the significance of what he sees, hears, and reads. In addition to mental alertness, the intelligence officer must have physical energy. He cannot sit at a desk and expect information to come to him. Collecting normally requires a certain amount of "leg-work": things to see and people to interview. Here the qualities of initiative, tact, and resource- fulness are paramount. If a source of information dries up, replacement must be found; if efforts in one direction are futile, leads must be discovered and pursued in other directions with perseverance and patience. Emotional stability is yet another quality de- sirable in a good intelligence collector. The busi- ness of tracking down information may be tedious and unexciting; the collector may meet with re- buffs and closed doors. He must be able to cope with these frustrations and devise ways to over- come them, subduing any momentary pique that initial difficulties might engender. Moreover, his ability to judge facts objectively must not be impaired by personal attitudes. Sometimes the collector in the field will receive spot requests for information which to him appear to be insignificant and purposeless, devoid of back- ground and meaning. In such cases he must comply without questioning the reason for the re- quest. Normally, the collector will be informed of the purpose, but sometimes urgency or com- munications security will not permit thorough briefing, and message requests preclude lengthy CONFIDENTIAL 218 explanations. To someone in the intelligence organization, this bit of information is of vital importance, and the collector must seek to obtain it with the same zeal he would use in performing intelligence tasks which seem to have more meaning. Intelligence agencies do not wish to stifle indi- vidual characteristics, for interplay of personali- ties in an intelligence organization is highly de- sirable, but the qualifications discussed above are basic. Some are innate, others can be acquired. It is the collector's responsibility to strive for the ideal through self-examination and improvement. The Office of Naval Intelligence The organizational structure of the Office of Naval Intelligence was presented in chapter 2. It is the "home office" into which all information reports flow and where they are processed and dis- seminated for use. Here collection programs are established which are translated into positive col- lection guidance for field activities. ONI also provides the liaison with other government de- partments and agencies which insures a full fund of knowledge and eliminates duplication of col- lection efforts. Although ONI fits into the intel- ligence cycle most appropriately in the processing phase, it must not be overlooked that the research activity carried on by analysts is in a large sense a collection activity as well, for evaluation requires the patient gathering of a mass of related materials. OPERATIONAL COLLECTION OF INTELLIGENCE Articles 0504 and 0506 of Navy Regulations state that "a commander shall maintain an effec- tive intelligence organization and keep himself informed of the political and military aspects of the national and international situation" and that CCa commander shall keep his immediate supe- rior appropriately informed of intelligence in- formation that may be of value." These two articles make each commander re- sponsible for the collection, processing, and dis- semination of intelligence within his own com- mand and the dissemination of intelligence to higher echelons. Without good intelligence it would be impossible to conduct a successful naval operation, unless there was an overwhelming supe- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE : COLLECTION CONFIDENTIAL riority of forces, and even then much time, money, and many lives would be wasted unnecessarily. The commander must be assured of continuing reliable intelligence as to the disposition, strength, composition, and movement of enemy forces, as well as intelligence on the weather and other factors of the area of operations. He must use every means at his disposal to gain information of the enemy forces opposing him, and of enemy forces in other areas, which may affect the prepara- tion and execution of his plans. A failure to ex- ploit every source of information may deny important information of enemy dispositions, movements and operations, and consequently make impossible a decisive exploitation of enemy weaknesses. The difficulties involved in obtaining adequate information and in arriving at reliable conclusions are many. These difficulties are due principally to the enemy's efforts to foil attempts made to gain information. In concealing his movements he will make use of camouflage, darkness, and weather. He will resort to any tactical measures that offer a reasonable chance of obtaining secrecy or sur- prise. He will enforce both strict censorship and communication security measures to prevent leaks of information. He may distribute false informa- tion and institute other measures to deceive the collecting agencies of the opposition. He will sometimes adopt a course of action that may ap- pear illogical. Thus in planning and operations, the designs of the enemy are more or less unknown factors. Combat operations during wartime constitute one of the primary sources of information about the enemy. The observations and experience of personnel involved, when properly evaluated, are immensely valuable in furnishing intelligence con- cerning enemy strength, disposition, materiel, tac- tics and capabilities, to say nothing of valuable target information and geographical detail. Collection by the Fleet The Fleet has at its disposal certain units that are ideally constituted to provide the means of collecting certain types of information. It is im- possible to list them in order of importance, for in certain conditions and at a particular time each may be of prime importance in a vital collection 219 task. The discussion here will be of a more gen- eral nature, since details of such employment of operational units will be presented in chapter 13 against a background of certain naval operations of World War II. Collection by Surface Vessels In both peace and war the surface vessels of the Navy are collectors of intelligence. Most na- tions send their vessels on cruises in peacetime, not only for training personnel and testing equipment, but also to collect a great variety of intelligence. Reports can be made on such subjects as weather observations, channel soundings, sonar conditions, port and harbor installations, radio and radar transmissions, and many items of political, eco- nomic, and sociological interest. It will also be possible to enhance the value of these reports with appropriate photographs. Collection by ship's personnel underway or in foreign ports requires vision in guidance and diligence on the part of the collectors. In actual war conditions, the emphasis in col- lection may shift to more current information of a tactical nature for which there is immediate need. There will always be gaps in our basic encyclopedic intelligence which must be filled as opportunity presents itself. For example, naval operations in World War II took place in parts of the world far from the beaten track, and the oper- ating forces not only had to find the enemy and observe the weather, but also had to take many soundings and do other jobs that unfortunately had not been done before the war. Even so, op- erations could not be wholly successful without the encyclopedic type of information as a frame of reference within which to study current enemy behavior. One of the tasks performed by surface vessels in collection is hydrographic survey. This infor- mation is needed by the Hydrographic Office to revise and improve the navigation charts used by merchant and naval ships alike. In many parts of the world navigation charts date back into the last century, and only the most obvious corrections have been made since. Subsequently, islands have been found to be mislocated and soundings in- adequate over reefs and other obstructions. There are geological changes, sometimes of great vio- lence, that require resurvey. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR In World War II, existing charts were found to be so inadequate that additional survey ships were commissioned and given elaborate photo- graphic and printing equipment to prepare new charts in the field for direct dissemination to the operating forces. The nature of hydrographic needs has changed with naval warfare itself, put- ting new demands on collectors. For example, amphibious intelligence poses information require- ments in surf and swell conditions, tides and cur- rents. Successful submarine operations require not only data on depths and currents, but also on temperature and salinity. Electronic Reconnaissance The appearance of radar in World War II and the subsequent advancement in the development of electronic devices have provided our fleets and forces with a new and important capability in the collection of information by means of electronic reconnaissance. Much of this capability rests with communications intelligence which will be dis- cussed in a later section, but reconnaissance by des- ignated ships and aircraft of the Fleet, within range of enemy radar or radio installations, pro- vides a means for the collection of data concerning their identification and location, as well as trans- mission frequencies, characteristics, and employ- ment. The devices and techniques of such collection require technical explanations beyond the scope of, this volume. Obviously, this is a job for elec- tronics experts, but the intelligence officer who finds himself associated with electronic collection activities can be of great assistance in on the spot guidance and preliminary interpretation of the collection effort. In an age when science and technology are constantly changing concepts of warfare, electronics represents a field of which the intelligence officer can ill afford to be ignorant. Collection by Submarines Submarines are especially suited for collection of information through reconnaissance because they can remain concealed and unsupported for long periods in enemy waters. Thus they can reconnoiter successfully and return safely and secretly in situations where other collection agen- cies could either not obtain the desired information CONFIDENTIAL 220 NAVAL OFFICERS at all, or could only do so at great cost and with the risk of giving the enemy an indication of intentions. One limitation of the submarine in reconnais- sance work is the necessity of relatively deep water. In order to remain submerged, and therefore con- cealed, the submarine must confine its movements to waters of ten or preferably twenty fathoms. Close approach to the area to be reconnoitered may thus be limited by bottom topography. In plan- ning any submarine reconnaissance, the depth of water must be given special consideration. Submarines are capable of several different types of reconnaissance: 1. Periscope reconnaissance. ( a) Visual. Best results are obtained from the shortest possible range. Binocular viewing by two or more observers at a time is recom- mended; for this purpose, an auxiliary viewer may be used, which projects the periscope field on a ground-glass screen. It is also advisable to use a voice recorder at the time of observations, and to make sketches of significant details. (b) Photographic. Makes a complete record of observations; allows photo-interpretation if a photo-reconnaissance strip can be made. All major amphibious operations in the Pacific dur- ing World War II were preceded by submarine photographic reconnaissance. 2. Radar or radio reconnaissance. Obtains in- formation of the locations and characteristics of enemy transmitters on shore, ships or aircraft. Special search receivers and associated equipment are required. The intelligence officer should brief submarine personnel in advance on the known loca- tions and characteristics of all enemy transmitters in the reconnaissance area. 3. Sonar reconnaissance. (a) Listening. With the use of special equip- ment, this type of reconnaissance can provide sonar information, similar to that of radar and radio. It not only contributes to scientific and technical intelligence, but may be of value in future undersea operations against the enemy. (b) Echo-ranging. Obtains information of the locations of minefields and other underwater obstacles. Special sonar equipment is required. The intelligence officer should provide charts of known or suspected mines and other obstacles Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL and should recommend search tracks, course lines, and radar contact points. Minefield re- connaissance by submarine is hazardous, and re- quires a high degree of training. 4. Meteorological reconnaissance. With spe- cialized personnel and equipment, submarines can gather weather data in enemy waters. They may, for example, remain on station for long periods as mobile weather stations. 5. Hydrographie reconnaissance. Submarines are excellent collectors of data on thermal gradi- ents and landmarks such as fixes, profiles, and orientation points. They are also able to deter- mine current and tide conditions and verify depths through soundings. Periscope photography, discussed above, is par- ticularly promising as a reconnaissance technique. Its chief advantage is that it supplies a complete and permanent record, which in certain cases lends itself admirably to photo-interpretation. The subjects of periscope observation, both vis- ual and photographic, are mainly enemy shipping, harbors, coastal areas, and beaches. Periscope photography of such subjects is preferable to aerial photography, especially for the production of am- phibious intelligence. It often reveals areas and details, such as profiles and orientation points, not normally obtained from aerial views. It is able to penetrate camouflage, which is usually designed to give protection from aerial observation. The side view which it affords is better for certain purposes than a vertical view, for example, in determining the gradient of a beach. Further- more, certain objects notably offshore obstacles, boat lanes, beach exits, and natural or man-made means of cover and concealment, are more readily and plainly visible to submarines than from the air. Periscope photography can also be useful for verifying the results of aerial photography. A disadvantage of individual periscope photo- graphs is their narrow angle of view?only eight degrees at high power, which is generally used. Because of the scale desired?not less than 1: 5000, preferably 1: 2500?the range cannot exceed a mile or two with certain types of cameras. For various reasons, including bottom topography, so close an approach is not always possible. Cameras of greater focal length would of course permit 221 photographs of suitable scale to be taken at longer range. In spite of these disadvantages, individual peri- scope photographs can provide information of great intelligence value. Those of the following types present data of particular intelligence value: 1. Broadside shots of naval and merchant ships, including the ship's entire length, supple- mented by close-ups showing the names, num- bers, and unusual features. In wartime, pre- attack and post-attack photographs of enemy shipping are useful for damage assessment and verification of sinkings. 2. Port and harbor facilities, such as docks, cranes, warehouses, and shipways. 3. Landmarks and orientation points. By taking a series of overlapping photographs, a submarine can make a so.-called "strip" or "pano- rama". If the true bearing of the periscope is changed between photographs, the result is a sweep panorama, which cannot be used for photo- interpretation but can be grouped to make com- posites for general information. Sweep pano- ramas can be taken in a short time, in areas of limited sea-room, and without much preparation. Thus they are often used, especially for coverage of harbors, coastal areas and beaches, when condi- tions are not favorable for stereo-photography. Photo-reconnaissance strips, also called "under- way panoramas", are made by taking a series of overlapping photographs (the extent of overlap being approximately 60 percent), with the peri- scope trained to the same true bearing while the submarine holds a constant course. Objects ap- pearing in two successive photographs can be viewed and interpreted in stereo. This is the most useful type of submarine pho- tography for intelligence purposes. However, it requires planning and preparation, takes time ( which may expose the submarine to discovery by the enemy) , and requires sufficient sea-room for the submarine to follow a continuous track while making photographs. Amphibious Patrols When certain essential information is lacking or it becomes necessary to confirm and amplify information received from other sources, amphib- ious patrons can be employed to gather hydro- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved CONFIDENTIAL For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS graphic data, report meteorological conditions, ex- amine beaches and terrain, locate enemy installa- tions, determine enemy strength, capture enemy prisoners, and make demonstrations to effect de- ceptions. As a general rule, amphibious patrols confine their activities to the covert acquisition of information and fight only in self-defense. Amphibious patrol personnel must be specially selected and trained to do their job in all types of terrain, such as mountain, jungle, and arctic. The elements and principles of scouting and patrolling must be sufficiently instilled in them to become instinctive. The aggressive type of action in- volved, combined with the strain of maintaining a high degree of security, necessitates exceptional physical condition and agility. All individuals must have confidence in their ability to handle themselves with ease in water. Additional training is required in the technique of entering hostile territory from the sea, in rec- ognizing unusual characteristics of terrain and hydrography, and in special communications methods and procedures. All patrol personnel must be able to handle small boats on the sea at night and to estimate such factors as current, wind, speed, and direction without difficulty. Accurate recognition, sketching, map and aerial photograph reading, and the ability to write objective factual reports are also essential in the successful opera- tions of an amphibious patrol. Underwater Demolition Teams During World War II one of the most useful sources of information in the hours just prior to amphibious landings was the result of the labors of the underwater demolition teams (UDT's). In early Pacific operations they proved their effective- ness in carrying out their assigned mission of beach clearance and they were able to operate success- fully even in daylight provided there was adequate fire support. After the Marianas operation, when an intel- ligence section was added to the staff of ComUDTs- Pac, the mission of the UDTs was enlarged to include reconnaissance as well as demolition. Two intelligence officers were assigned by ComPhibPac to the staff of ComUDTsPac and close liaison was established. This activity expanded considerably as operations grew larger and more complex, and CONFIDENTIAL by the end of the war, several intelligence officers were on duty with ComUDTsPac. All were given special instructions to prepare them for UDT in- telligence work, and some were assigned to teams for specific operations. UDTs can obtain detailed beach information on topography, soils and trafficability, location and nature of obstacles, hydrographic data, location and type of mines in beach approaches, the nature of the shore line, defenses, visible exits, and prom- inent landmarks along the beaches that can be used for guiding in landing craft. If the teams are launched in rubber boats from submarines at night, they may be able to obtain considerable hydro- graphic data without disclosing their presence. If launched from submarine or surface vessels in day- light, fire support may be necessary. Reconnoitering enemy shores, along with demo- lition of underwater obstacles, are important con- tributions of the Navy's underwater demolition teams, and the success of any amphibious opera- tion may well hinge upon them. 222 THE NAVAL ATTACHE SYSTEM Naval officers on duty in foreign posts provide a large part of the information needed by the Navy for planning purposes in war and peace. There- fore it is desirable to deal in some detail with the organization and function of the Naval Attach? system. The paramount duty of Naval Attaches is that of intelligence collection, in the performance of which they are an integral part of Naval Intel- ligence and are under the cognizance of the Direc- tor of Naval Intelligence. At the same time, they are under the military command of the minister or ambassador who heads the diplomatic mission to which they are assigned. Although the attache is not recognized under the law as a Foreign Serv- ice Officer, he carries a diplomatic passport and has diplomatic immunity. Thus, he is a member of the official staff of the diplomatic mission of the United States in the country to which that mission is accredited and is the direct representative of the Navy Department in that mission. The naval attache in general defers to the wishes of the ambassador or minister. Normally the chief of the mission will not be concerned with the attach? reports of classified technical and Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For ReleanaklginL:ECl/'6612RFONA00105R000100200NORMITIAL THE INTEL tactical naval information, particularly if they are of no international political significance. The attach? reports are forwarded directly to CNO (DNI) , and if desired, copies are furnished to the chief of mission. The controlling factor in the assignment of at- taches is the procurement of information of in- terest to the Navy Department. The assignment, as assistant attaches, of officers who have special- ized in various technical or professional subjects is usually limited to those stations which oiler special opportunities to procure technical infor- mation. Consultation with the State Department in the assignment of attaches is limited, in general, to assuring that the officer selected for the post is persona grata to the State Department, which then takes the necessary steps to ascertain that the selec- tion is acceptable to the country to which the diplomatic mission is accredited. When attaches and assistant attaches are accredited to more than one country, only countries whose mutual political relationships are good are included in the same group. The number and stations of naval attaches vary according to current requirements. In the cap- itals of major powers, such as London and Paris, a large complement is usually maintained, while in Latin America, a single attache may be accred- ited to several adjoining countries. Primary re- sponsibility is usually the country of the attach? residence; he will have secondary responsibilities as required by naval interest or the current situation. The duties of the naval attache may be described only in general terms, for the methods and tech- niques to be followed depend almost entirely on the good judgment and tactful discretion of the attache himself. The opportunities and situations which confront an attache vary so greatly in dif- ferent parts of the world that uniform procedures cannot be prescribed. He must be constantly on the alert for every kind of information of possible naval interest, using all his imagination, ingenuity, and resourcefulness to uncover it and all his knowl- edge of the country and of general naval subjects to interpret it. He cannot neglect an item simply because he has not received a specific request for it and has no labeled folder for it in his file. Naval attaches deal directly with the Admiralty or Ministry of Marine, and, where the military, naval, and air departments are combined, with the Ministry of Defense. Official dealings with any other ministry must be conducted through the chief of the diplomatic mission to which the attache is assigned. Ordinarily, naval matters will be re- ferred to the attache by the chief of mission. The attache can expect little official information from a government on the real spirit which per- vades its Navy, its concepts of strategy and tactics, the extent and results of maneuvers, the charac- teristics of its naval commanders, or the efficiency of personnel and materiel. This information can be obtained only through intimate personal and social relationships with foreign nationals, par- ticularly foreign naval and army officers. Outside the Iron Curtain, the attache often has many semi and unofficial sources of information available to him. They include the naval and air departments to which he has official access; visits to ships, dockyards, and port installations; wit- nessing maneuvers and demonstrations as an offi- cial guest; association with industrialists, politi- cians, and the man in the street; the press, official publications, correspondents, and our own State Department officers. The attaches of other gov- ernments accredited to the same country are like- wise valuable sources of information, and the naval attache is at liberty to discuss with them matters of interest which he has discovered for himself. He should not, however, discuss or ex- change information which has been given to him directly by the government to which he is accredited. The attache can often save himself much time and effort if he is aware of the collection activities of other United States government agencies. Con- sular reports, for example, contain carefully com- piled data concerning shipping which clears for United States ports. Regular consular officers, commercial and agricultural attaches, and trade commissioners assigned to missions can provide well-documented information of importance to the naval attache. However, when such information is reported by the naval attache, the source should be carefully identified in order to avoid problems which arise from duplicate reporting. 223 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDE*TINt ved For ReleasegatliNi&plik(511DNPAIr5A000F1FCilaRROE300100210002-9 Private American commercial interests abroad are always well supplied with material of value, particularly with regard to the movements and transfers of vessels, and unusual developments in the field in which they specialize. Representatives of such interest are to be found in nearly every major port in the world, and often have extensive and intimate knowledge of local conditions. In connection with their work, they observe and re- port on the activity of competing firms, both American and foreign, keep in touch with current political and economic trends, and maintain close and amicable relationships with official govern- ment sources. The naval attache can profit from cordial relations with them. Although the report- ing of economic intelligence is the primary mission of other United States intelligence agencies, much information of naval interest has its source in com- mercial and economic affairs. A word of caution is necessary regarding direct requests made by an attache to foreign govern- ments for specific information. By custom, such a request carries with it the implication that cor- responding data of our own will be given in ex- change. The Office of Naval Intelligence, there- fore, definitely prefers to acquire information on an unofficial basis, unless it specifically authorizes a direct official request. The same rules apply when the attache requests permission to attend, or accepts invitations to witness, confidential trials and experiments. It is quite likely that the gov- ernment to which the attach?s accredited will expect reciprocal privileges in return. The at- tache should know, and advise the officials of the foreign power, what the attitude of the United States is with regard to the exchange of informa- tion or the extension of reciprocal privileges. The collection activities of Naval Intelligence abroad are overt in nature. The attache must never jeopardize his position as a member of a diplomatic mission by indiscreet activities which may bring discredit upon himself, the embassy or legation, or the reputation of his fellow country- men resident abroad. Discretion is the key to success. The creation of good will should always be his aim. A sincere effort to become proficient in the language of the country, and constant study of the nature and customs of the people will do much to win loyal friends and expand the social CONFIDENTIAL 224 and professional circles in which he moves. If he is fortunate enough to have his family with him, he will be able to participate in community life to an even greater degree. A good attache works at his job with unfailing courtesy, tolerance, and cooperation. He can reflect great credit upon the United States Navy, leave a lasting impression of admiration and respect, and make the work of his successor easier. Covert Collection The demands of security naturally give a covert flavor to intelligence collection, but by far the greater part of information can be obtained openly by the thorough exploitation of available sources. In other words, an intelligence officer rarely has to depend on people who put a price on what they know. Few such sources are very valuable, and the disadvantages of their use and the risks in- volved are great. The shadow world of the pro- fessional informer is beset with pitfalls for the novice, and dealing with mercenary characters even on the fringe is a dangerous practice for anyone who desires to maintain a persona grata status in a foreign country. Covert collection, therefore, is not within the province of officers assigned to attache billets. NAVAL DISTRICTS AND RIVER COMMANDS Under the District Commandant, the District Intelligence Officer (DIO) is responsible for the collection of such information as is required for the security of naval activities within the District, as well as that which is needed by the Commander of the Sea Frontier in which the District is located. The DIO's collection tasks, therefore, are prima- rily concerned with counterintelligence problems involving the security of the Naval Establishment and the National Security, and with operational intelligence in support of the sea Frontier Com- mander. However, in consonance with existing directives and agreements among the various in- telligence agencies, the district intelligence organi- zation engages in some exploitation of selected sources of intelligence. The collection of intelligence by Sea Frontiers in wartime is largely of an operational character. Operational needs frequently cut across arbitrary district lines extended out to sea, thus making the Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL plots and logs kept by the Sea Frontier vital to effective action. JOINT INTELLIGENCE ACTIVITIES Collection activities can often be most efficiently carried out by the closely coordinated effort of a collection team composed of representatives of all the armed services. The Joint Intelligence Col- lection Agencies (JICA) groups which operated in overseas theaters during World War II were designed for this purpose. As noted in chapter 3, naval officers also serve with the intelligence com- mittees and groups of the Joint Chiefs of Staff, where they have unusual opportunities for collec- tion guidance. The coordination of intelligence reporting by service attach6s is exemplified in the Joint Weeka reports from State Department mis- sions all over the world which contain brief sum- maries on matters of interest to many government agencies. OTHER SOURCES AND METHODS OF COLLECTION The foregoing activities in the collecting of in- formation are directly guided and controlled by the Navy's intelligence organization. They by no means comprise all sources available to the Navy. Data collected by other government de- partments or agencies is often valuable for the Navy as well. The resourceful intelligence officer has sources well-nigh inexhaustible. They await his exploitation. The courses, methods, and techniques of the col- lection of information are as varied as the subjects, operating areas, and personal qualifications of the collectors. It is impossible to describe them all, but a few have been selected for special discussion as illustrative of basic principles applicable in the work of the intelligence officer as researcher, psy- chologist, and technician. Information gained from enemy personnel, documents, and materiel can be of special value because of its potential qualities of accuracy and timeliness. These cap- tured sources are, of course, normally available only in time of war. Prisoners of War In a tactical situation, prisoner of war inter- rogation, better described perhaps as "examina- tion," has as its purpose the obtaining of informa- 269196-54-16 225 tion of immediate value which enemy personnel may have. The advantages of such information are conditioned by the nature of the theater of operations, the availability of other sources, and the skill with which it is developed and exploited. The essential activities involved in the exploita- tion of prisoners of war as sources of information are: capture, screening, conditioning, and interro- gating. The preliminary evaluation and dissem- ination of this information by the interrogator are, of course, necessary. The capture of enemy personnel is a function of combat forces whose personnel must be carefully persuaded it is to their advantage to capture prisoners and keep them alive. Specific instruc- tions for handling prisoners should include: pre- vention of cruelty, prevention of excessive kind- ness, and prevention of unauthorized contact with higher ranking prisoners of war; their expeditious transport to designated interrogation specialists, with adequate advance notice; and the simultane- ous delivery of personal papers and effects, which are to be taken immediately from prisoners, clearly marked as to original ownership. Any plan for the procurement of prisoners should be prescribed by the careful indoctrination of operational units and advance planning for the handling of captured enemy personnel. In screening, each prisoner of war is given a preliminary examination in order to determine whether he is likely to have any useful informa- tion, how readily he may yield it, and which agency is most appropriate for his further processing. The selection of the appropriate agency is gov- erned by the nature of the information possessed and the military service to which the prisoner be- longs. The screening officer should, in general, avoid any discussion of subjects which are not of immediate tactical interest. When it appears that a prisoner may have information of more strategic value, special arrangements for handling are made. The activities of conditioning and interrogating are complementary and often carried on simultane- ously. The prisoner must not be permitted to become too contented with his status and he should remain fully aware, by subtle suggestion, that any favors he receives come solely from the interroga- tor. At all times, the normal military rank re- lationship should be maintained between the pris- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS oner and his captors. So-called "third-degree" methods are not only forbidden by international agreement but also are ineffective and often result in a complete failure of the interrogating process. Interrogation is the function of trained spe- cialists whose primary objective is to ascertain whether or not the prisoner actually possesses in- formation of value and, if he does, to obtain it. Interrogation is an excellent means of corroborat- ing information received from other sources. For many prisoners, a short interrogation is sufficient. The interrogating process has several prerequi- sites. There should be no conversation with the prisoner either before or between interrogations, except in accordance with the pre-determined plans of the interrogator. A secluded place is essential, with no audience present. No effort should be made to interfere with the work of the interrogator: he alone is best qualified to determine what the prisoner knows, how it may be obtained, and when to stop. The interrogator must be fully informed of all collateral information relevant to the prisoner and the information he is believed to have. The interrogator should promptly receive any new facts or data which may assist in the acquiring of the needed information. He should also be advised of the relative importance of items of required information and any changes in their importance. In this manner, his efforts may be better concentrated. Demonstrated confidence in the interrogator and his work can increase his ef- fectiveness in dealing with prisoners. The interrogator's preliminary evaluation of in- formation provided by the prisoner of war is al- most always inevitable and exceedingly helpful. The very nature of interrogation involves some determination of the correctness and accuracy of the information gained. In addition, personal impressions and reactions gained by the interroga- tor in his associations with a prisoner are of con- siderable value to subsequent processors of the information. Prior to disseminating his informa- tion, the interrogator should be satisfied that he has correctly understood the prisoner's statement and that this statement is as accurate and complete as he can get. In transmitting information, the interrogator should include, in addition to the information itself, an estimate of the extent of the prisoner's knowledge, a statement of the facility CONFIDENTIAL 226 with which it was obtained, and notification of availability for evacuation. The ideal interrogator is both a linguist and an intelligence officer, since his activity is basically an intelligence function. Not only must he have a fluent knowledge of the prisoner's language, he must also be familiar both with the customs and background of the enemy and with the intelligence requirements of his own command. In an opera- tional situation, especially during early stages of hostilities, this combination of attributes is always not readily obtainable. As a result, intelligence officers may be required to work closely with lin- guists in developing information from prisoners of war. The objective may well be to train a linguist to be an interrogator, in order that he may carry on his activities in a more independent manner. However, even when this becomes pos- sible, there must be the closest coordination of efforts and interests, and the interrogator must be guided at all times by knowledge of what infor- mation is most urgently needed and its significance to the command. No attempt should ever be made to obtain information through an interrogator without his complete understanding of the nature, scope, and significance of the information desired. On his part, the interrogator must cooperate fully with the intelligence officer and endeavor to fur- nish obtained information in a form which can be most readily used. Documents When examined systematically by competent personnel, captured documents reveal information about an enemy. An enemy document may be any form of recorded information regarding enemy forces or areas. Enemy documents are both per- sonal, found on prisoners or enemy dead, and official. As sources of information, enemy documents have one unique feature?they are prepared by the enemy for his own information and guidance and are, therefore, just as clear, concise, and accurate as he can make them. He does not intend that we will ever see them. In effect, then, when we get an enemy document, the enemy voluntarily tells us all he knows about a particular subject; he will tell it again and again in the same way as often as we wish to study the subject. Information from Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved Fofiliplfflma(012/0.9. ? CIA-RDP85G00105R000100210002-9 CLE : COLLECTION CONFIDENTIAL documents is more authentic and reliable than that from prisoners of war because it is less biased and less representative of personal opinion. During World War II documents were cata- logued, examined, and handled so as to disclose maximum information of obvious and immediate significance to the command and to its subordinate forces for use in combat operations at hand. Fur- ther processing by rear echelons produced intel- ligence valuable to all commands engaged in planning future operations. Collection by Examination of Materiel All types of enemy equipment are studied on the battlefield as well as behind the lines by tech- nical intelligence personnel?cannons, tanks, mor- tars, mines, radios, and so forth. The Navy raises sunken submarines, and refloats beached landing craft. Such ground and naval equipment some- times may be repaired to test against our own, and thus determine its performance characteristics. The components may be examined for clues as to assembly techniques, quality of alloys, and short- ages of materials. During World War II, German Tiger tanks were brought to the United States to race against our own tanks and to test-fire their guns; Soviet T34's from Korea have likewise been evaluated. Air Technical Intelligence is chosen for discus- sion here as typical of the broader field. Technical and scientific intelligence dealing with new weap- ons is covered in chapter 14. A favorite story of Air Technical Intelligence concerns the loss of an experimental Vickers Wellesley British bomber while on trials prior to World War II. Appar- ently German Intelligence wanted this plane badly enough to risk war, for it was shot down by a German submarine off the British coast and sal- vaged for later study in Germany. The British chose an extraordinary way to let the Germans know that the fate of the plane had been dis- covered. They made a motion picture based on the incident called "Clouds Over Europe" and released it for showing on the continent. The primary mission of Air Technical Intel- ligence is the collection of information about actual, potential, or possible enemy aircraft and related equipment. Information at first may con- sist of crude sketches or inferior photographs of 227 new planes, or reports of aircraft or components from escapees. All of this data is then related to known design trends of the aircraft of that particular foreign country. Eventually the time may come when actual components, or even a whole aircraft, are salvaged on the ground for analysis in detail. The uses of such information are both strategic and tactical. New and better performance may mean a new strategic situation in many parts of the world. Detailed analysis of turning ability, speed at different altitudes, vulnerability to damage, and weapons employed, may require modification of United States tactics. Improved foreign capabilities require counter- action by the United States armed forces both in long range plans and immediate steps. We made constant efforts in World War II to keep abreast of technical developments in Japanese and German aircraft. In the early days of the war, the Japanese Zero and Zeke fighters proved to be maneuverable and dangerous, although they lacked protective armor. Readers of Recognition magazine during the war will recall the publica- tion first of provisional silhouettes and tentative performance data, then subsequent revisions as reports improved, and finally views of captured and rebuilt planes with American markings, under test at Wright-Patterson Field. Through adroit collection, we often had photographs of proto- types considerably in advance of the time that operational models appeared in quantity. Ger- man jets, both turbine and rocket, near the end of the war represented extremely significant develop- ments due to their high speed, and consequently they were a prime technical intelligence target. Chapter 14 describes our interest in the Peene- miinde guided missiles center in Germany. We lost aircraft to the enemy as well, and one of the stranger episodes of the war was what hap- pened to the American B-29's that had been forced to land in Soviet territory. The fact that the Soviets could copy those "interned" aircraft and produce the type in quantity for a strategic air force was a good indication of the level of their technical intelligence and engineering achieve- ment. Long-range development of an air force re- quires consideration of many technical features that in turn depend on technical intelligence from CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS abroad. For example, our strategic bombers must not only have the range and carrying power we decide are necessary, but must be designed to cope with enemy interceptors, guided missiles, and anti- aircraft guns during the expected operational life of the planes. These questions of enemy de- fenses require detailed answers. For example, with regard to enemy interceptors, their future performance, armament, and armor must be esti- mated by extrapolating trends from the present. Performance includes service ceiling, rate of climb, combat radius, ability to turn, to dive, and so forth. Sometimes direct evidence on all of these matters is not available. However, it is possible to obtain much information of an indirect nature, but none- theless useful. For example, a report of no boosters on flight controls of a particular plane implies some lack of maneuverability at speeds near Mach one, and also consequent added pilot fatigue from battling the controls. On the other hand, lack of such equipment might also mean simpler maintenance and greater availability. PHOTOGRAPHIC INTELLIGENCE The purpose of the following discussion is to introduce naval officers to the field of photographic intelligence, and to point out some of its inherent capabilities, limitations, and techniques. Efficient staff planning and operational estimates require close cooperation between photo-interpreters and intelligence officers, and each should be cognizant of mutually supporting collection services. Photographic interpretation has been defined as the examination of photographic images of objects for the purpose of identifying the objects and de- ducing their significance. Photographic intelli- gence is the evaluated and analyzed information obtained through photographic interpretation. History and Development The United States Navy's photographic intelli- gence organization received its initial stimulus and help from the British, who, upon being pushed off the European continent and largely separated from ordinary information and intelligence chan- nels, had hurriedly improvised a system of extract- ing desired military information from factual evi- dence contained in photographs taken over enemy- held territory. 'While photographic intelligence CONFIDENTIAL had been used by both sides with some effect dur- ing World War I, it had in the interval before World War TI become a lost technique. Despite the improvisation, the British soon achieved re- sults that were spectacularly successful, and Amer- ican observers were sent to England to study the techniques of the new system. Their enthusiastic reports caused the Chief of Naval Operations, in September 1941, to recommend the establishment of the Photographic Interpretation School. Per- haps the greatest initial stumbling block for the School was the inability to anticipate requirements in the new field. There were no established billets for the graduates of the School, and many com- manders were inexperienced both in the employ- ment of photo-interpreters and in recognizing the capabilities and limitations of photographic inter- pretation. As the value of photographic intelli- gence was realized and more photo-interpreters became available, photographic interpretation units were formed, either as a part of a photo group or intelligence center assigned to an area commander. By the end of World War II, grad- uates of the Photographic Interpretation School were operating in all theaters of war, contributing significantly to all operations. Today the center of photographic interpretation activity for the Navy is the United States Naval Photographic Interpretation Center which func- tions under the Bureau of Aeronautics. This Cen- ter prepares photographic interpretation reports and studies for the Office of Naval Intelligence and for the Fleet, performs research and development work in the fields of photographic interpretation and photogrammetry, and trains photographic in- terpreters. Its activities include the preparation and maintenance of reference manuals, and other documents, the preparation of terrain models, and the maintenance of a library of photographic in- terpretation material and other pertinent data. Capabilities of Photographic Intelligence The extraction of useful intelligence from pho- tographs is not a simple matter. The photo- graphic interpreter must first know the conditions under which a photograph was taken. This in- formation is normally recorded on aerial photo- graphs, and includes the focal length of the cam- era, altitude of the plane, exposure and run 228 pproved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION number, mission number, organization number, date, time and zone, place, and classification. Gen- erally, the first print of a flight shows the basic information which concerns the whole flight, and each subsequent photograph shows only informa- tion to identify the individual print within the flight. A photo-interpreter should know the capa- bilities of each type of aerial camera, as well as the type of photograph from which he can obtain the information desired. For this reason the pho- tographic interpreter should be directly involved in preflight planning of an aerial reconnaissance mission. Photographs as a source of information possess many advantages when compared to other intelli- gence sources. Some of the more important ad- vantages are as follows: 1. Aerial photography can be used to collect in- formation over areas inaccessible to ground observers. 2. The photograph represents an accurate per- manent record, instantaneously made, of all the detail within the field of view of the camera. 3. The photograph is a means of transmitting an unbiased, first-hand impression to the ex- pert most qualified to interpret it, although he may be many miles from the scene. 4. The photograph can be studied with earlier and later coverage of the same area to pro- duce comparative intelligence. 5. Accurate dimensions of objects may be de- termined from photographs. 6. As a rule, photographs need not be evaluated as to course and reliability, but only as to content and significance. Other advantages of aerial photographs are comprehensive coverage, made possible through the use of modern equipment and techniques, and the ability to provide current and timely informa- tion. Under certain conditions, it is possible to determine ship speeds, surf conditions, water depths, the nature of beach obstacles, and to make industrial analyses. Water depths, surf condi- tions, and beach obstacles are particularly impor- tant during the planning of amphibious operations. Another important use of aerial photographs is in the construction or correction of charts, maps, and terrain models. Aerial mapping makes it 229 CONFIDENTIAL possible to produce accurate maps in a minimum length of time. Aerial photography as a source of intelligence has a number of limitations which should be clearly understood. Some of these are: 1. Effective aerial photographic coverage can- not normally be accomplished during periods of bad flying weather. It is also limited by the ranges of photographic aircraft, the pres- ence of ground mist, or cloud cover, and avail- able light conditions. 2. Since an aerial photograph represents con- ditions at one particular instant of time, sub- sequent photos of the same area must be obtained for analysis of significant changes. This is particularly important in considering enemy build-ups of equipment and personnel, increase in defensive positions, and air capabilities. 3. The aerial photographic interpreter cannot always see the fine details of a target. For example, while the size, extent, and height of a wall may be determined from the photo- graph much more accurately than from ground reconnaissance, the information as to whether its stones are loose or mortared must usually rest with the ground observer. How- ever, detail, such as grain size of beach sand, may sometimes be inferred from features visi- ble in aerial photos. 4. The observations of the photographic inter- preter are necessarily limited to areas shown on the photograph. It is quite possible that an item most important from an intelligence standpoint may occur just off the edge of available photo cover or under a patch of cloud. Teamwork of the Intelligence Officer and the Photographic Interpreter The Intelligence Officer and the Photographic Interpreter have mutually supporting contribu- tions to make in the production of intelligence. While their relationships will vary from station to station, a few general principles can be estab- lished. For any target or area of intelligence interest, there usually exists a body of background intelligence, from many sources, such as docu- ments, maps, and charts. Photographic intelli- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS gence can often confirm or deny the accuracy of such data or can amplify it whenever it relates to the physical nature of items viewed on the aerial photography. It may help to confirm the relia- bility of the source from which a report comes. In addition to providing verification, the aerial photographs can serve as a base on which various ground observation reports can be plotted and re- lated to each other. Generally speaking, the photo interpreter will be able to provide precise loca- tional data and state with reasonable assurance the presence or absence of specific features and their dimensions. He can also relate widely separated features beyond the view of any single ground observer. On the other hand, ground observation reports can provide much more detailed data for the immediate area in question. Just as the photographic interpreter can par- ticipate in the evaluation of information from other sources, so the intelligence officer can often aid in the analysis of data derived from aerial photography. Frequently, because of his greater familiarity with all of the available intelligence regarding an area, the intelligence officer may have a more complete grasp of the significance of data derived from aerial photography as it affects existing intelligence and relates to other informa- tion. Further, data from other sources, as com- piled and evaluated by the intelligence officer, may provide the photographic interpreter with clues which will lead him to a more complete analysis of the photos. By working together as a team, the intelligence officer and the photo- graphic interpreter represent a combination of great value in intelligence activity. Types of Aerial Photographs Many kinds of photographs are used by the photo-interpreter in assembling intelligence data, including aerial verticals, obliques, composites, continuous strip, gun camera, and ground. Each has a specific usefulness in fulfilling the intelli- gence needs of various strategic and tactical or- ganizations. In addition to recommending vari- ous types of cameras and photographic techniques, the photo-interpreter advises as to the use of spe- cial film and filter combinations under varying altitudes and light conditions. For instance, in- frared film records unusual qualities of colors. CONFIDENTIAL 230 Vegetation registers a light tone in sharp contrast to non-infrared reflective objects, such as water, roads, and buildings, that record dark on the print. This aids in the detection of artificial camouflage in areas of vegetation. Verticals Vertical photographs are the most valuable for general use lby the intelligence officer. They are taken with the optical axis of the camera in a vertical or in a near-vertical position. The scale of the photograph is equal to the quotient of focal length (in inches) over the altitude of the aircraft above the ground (in inches). It is apparent that the desired scale may be obtained by changing the focal length of the camera used or the alti- tude at which the pictures are taken. Errors of scale and azimuth resulting from tip and tilt, vari- ation in relief, and optical distortions are inherent in vertical photographs; however, these errors are relatively small and can be compensated when necessary. Obliques Oblique aerial photographs are obtained by in- tentionally tilting the optical axis of the camera from the vertical. A high-oblique aerial photo- graph includes the horizon; a low-oblique does not. Oblique photographs are of value to photo-inter- preters for such details as gun emplacements, camouflage positions, and underwater and beach obstacles. Annotated obliques are used effectively in briefing pilots and coxswains in order to ap- proximate the views of the beach and inland land- marks as realistically as possible. Simulated oblique photographs may be obtained by photographing terrain models and relief maps from various directions and heights. Composites An aerial photograph made with one camera directed vertically, and two or more cameras mounted on an angle from horizontal, is a com- posite. Trimetrogon photography, a form of composite, has one camera directed vertically downward and two cameras mounted at an angle of 300 from horizontal and perpendicular to the line of flight. All cameras are operated simulta- neously, so that the area from horizon to horizon, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE : COLLECTION CONFIDENTIAL perpendicular to the line of flight, is covered by three photographs. Composite photographs are used principally for mapping large areas on small scale. Less ground control is required and the flight lines need not be flown as accurately as when a single lens is used. This will be more fully discussed later. The distance between flight lines can be much greater with trimetrogon photography, since a greater area is covered with each click of the shutter. Continuous Strip Photography Continuous strip cameras photograph a contin- uous strip of terrain by allowing the negative to move continuously over a fixed slit at the focal plane of the camera. The film speed is adjusted to the height and speed of the aircraft. The Sonne continuous strip camera has been modified to per- mit stereo coverage by using two lenses and parti- tioning the camera cone so that two strips are photographed side by side on the 914-inch nega- tive. Parallax effects are obtained by causing the lens assembly to be rotated on a horizontal plane so that one lens is in advance of the other. Con- tinuous strip photography is usually taken ver- tically although successful obliques have been taken. Continuous strip photography is especially adapted to low altitude (approximately 200 feet) and high speed flying (300 up to 1,000 miles per hour) and permits an accurate determination of height and depth. It is well suited for detailed beach work; the scale (1 : 400 to 1:1,000) is such that all visible forms of minor defenses may be located and accurate data on gradient, spot depths, and heights may be calculated. Strip photogra- phy has the great advantage of "freezing" the surface of water areas, so that the bottom may be seen stereoscopically while the sea remains trans- parent. Photographic interpreters, with special- ized training, have obtained remarkable results with strip photography in depth determination studies. Gun Camera Photographs Gun camera photos are? widely used to record hits in aerial gunnery. In such employment they have also often proved valuable in recording new 231 types of aircraft, ground equipment, modifications in structure or design of aircraft, and other similar information which is extremely useful to air in- telligence officers as well as to photographic in- terpreters. Satisfactory measurements cannot normally be made on gun cameras' photos. In- terpreters use them qualitatively where possible for new leads and as supplementary aids in iden- tification of enemy equipment. Ground Photographs Ground photos are commonly used by the photo- graphic interpreter as supplementary aids in most types of interpretation. Where photos have been captured or derived in other ways, important use for them is found in identifying or analyzing structures and evaluating local terrain. Ground photos taken by our own forces after occupation of enemy territory are commonly used in compara- tive studies. Ground shots, when set side by side with vertical stereopairs, offer valuable cross- references and materially increase the chances of recognizing similar installations observed else- where on aerial photographs. Following the oc- cupation of Japan, Kiska, Attu, and other Pacific Islands, comparative studies were made by Navy photographic interpreters and other members of the United States Strategic Bombing Survey Teams with the air or ground photographs and measurements of important installations. Stereoscopy One of the greatest benefits of photographic in- terpretation is derived from stereoscopic analysis of aerial photographs. Stereoscopy may be de- fined as "The science which deals with three dimen- sional effects and the methods by which these effects are produced." In the case of photography, three dimensional affect, or stereo-vision, is ob- tained by viewing two pictures of the same object or area taken from different points, the photo- graphs being so oriented that each eye views a different picture. Aerial photographs for stereo- vision are obtained by making successive overlap- ping exposures. The overlapping parts of the prints may be viewed stereoscopically; two such prints are called a stereopair. Terrain features and objects which indicate vertical delineation appear in exaggerated relief when viewed stereo- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS scopically. This enables the photo-interpreter to detect camouflage, to note details of terrain, to identify and study the characteristics of aircraft, ships, and military installations, and finally, to determine the results of military action through damage assessment. A stereopair is any two photographs or dia- grams showing a common field or view, which have been taken, or represent a perspective, at approxi- mately the same distance from the field but from slightly different positions. To see photographs stereoscopically they must be placed in the same relative positions as when they were taken. Any pair of overlapping vertical photographs taken at approximately the same elevation, and with the same focal length camera, can be viewed stereo- scopically if arranged properly. Duplicate photo- graphs cannot be viewed stereoscopically, since the objects on the photographs must have been viewed by the camera from different angles. Vectographs and Anaglyphs A vectograph is a print or slide in which the two images of the stereopair are superimposed with slight offset, and each image transmits light, polarized in a plane perpendicular to that of the other. The print or projection must be viewed with polarized glasses so that the plane of polar- ization in each corresponds to that of the image each eye is required to see. Vectographs are difficult to prepare, hence their use in presentation of information is limited. Once prepared, however, they constitute a rapid means of presenting aerial photographs in three dimensions to persons unaccustomed to using a stereoscope or to a group of persons simultane- ously. This is useful during planning in familiar- izing staff officers with an unknown area and in briefing pilots, coxswains, and subordinate com- manders in the field. A vectograph eliminates the need for stereopairs and stereoscopes in brief- ing sessions. The polarized light principle can also be used whenever appropriate equipment is available, by projecting positive transparencies of a stereopair through a twin-barrel projector. The beams of projected light are polarized by passing through properly oriented polaroid plates, and the result- CONFIDENTIAL 232 ant composite image on the screen is used with polaroid glasses. Anaglyphs in similar fashion present a 3-dimen- sional effect by overprinting 2 films, 1 red, the other blue. When viewed with special glasses or cellophane eyepieces, also 1 red and 1 blue, the resulting image appears to be 3 dimensional. Flight Lines and Indices A flight line is a course laid out on a map to be followed by a plane. Principal and alternate flight lines should be prepared whenever possible for each photographic mission. The final plan- ning of the flight lines and the method of execution of the mission is the responsibility of the photo- graphic squadron commander. Photographic in- terpreters are trained to perform flight planning for photo reconnaissance missions in conjunction with the squadron commander. Intelligence offi- cers should also understand this important process, since it effects the quality and quantity of aerial photographic coverage. There are many factors to be considered in flight planning, details of which may be found in such specialized publications as the Photographic In- terpretation Handbook and NTVP W. Whenever possible the locations of photos are plotted on a map or overlay before photographic interpretation. The usual procedure is to use an adjustable plastic template, included in the photo- graphic interpreter's kit, which can be set to a size which represents the area covered by a photo- graph on the map or chart used as a base. By inspecting photo detail, a series of rectangles are drawn on the map, chart, or overlay to show the coverage of each photograph in the sortie. When a sortie plot has not been made, the "pilot's trace" a rough plot of the flight line fol- lowed by the plane, is often valuable as an aid in locating the photographs. Detailed discussion of plotting techniques will also be found in the refer- ence manuals cited above. Sometimes all photos taken on a given mission are taped down hastily without trimming to form a very rough mosaic which is then photographed. This is called a photo index. In this case, photo- graphs are usually laid so that the sortie and the number of each photograph can be easily read from the resultant mosaic. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL Scale Determination Scale may be defined as the relation between the distance on the photograph and the actual distance on the ground. As in map reading, scale may be expressed as a representative fraction (1: 10,000 where 1 inch on the photo equals 10,000 inches on ground), words, and figures (3 inches equal 1 mile) , or by means of a graphic scale. The scale of an aerial photograph can be determined in the following ways: (1) Focal length and lens height; (2) by comparison with a map; (3) by comparison with the ground. The formulas and procedures used in each method are described in detail in the Photographic Interpreter's Handbook. Mosaics A mosaic is an assembly of several aerial pho- tographs into one composite picture. There are two general types of mosaics, controlled and un- controlled. Controlled mosaics are prepared by adjusting vertical aerial photographs to the plotted posi- tions of ground control points. Ground control points are the result of earlier surveys or are es- tablished by one of several methods from controls already in existence. These ground control points are identified on photographs and plotted on a mounting board to the desired scale of the final mosaic. The photographs to be used are then enlarged or reduced to this scale by means of pre- cise rectifying projectors which are also adjusted to correct as much as possible for the existing tip and tilt in the photographs. When these control points on the photographs are placed directly over the corresponding points on the mounting board, the photographs are in true relation to each other. The controlled mosaic is accurate enough in scale and direction for most practical purposes. An annotated controlled mosaic may be useful as a replacement for maps of an area. Uncontrolled mosaics include all of those not prepared to the rather rigid specifications indi- cated above. The simplest form of uncontrolled mosaic is that produced by merely putting photo- graphs together by matching detail along their borders. More carefully prepared uncontrolled mosaics are cut and fitted to get the best match of detail, using only the center section of each photo- graph. Sometimes a measure of control is intro- 233 duced by plotting in advance certain widely spaced control points and making an attempt to meet this control by stretching and adjusting the photo- graphs. Uncontrolled mosaics give a good pic- torial representation of the ground and may be used for rough measurements. However, they will contain distortion and errors in scale. Un- controlled mosaics cannot usually be gridded for military purposes. A special type of uncontrolled mosaic is the "strip mosaic" which consists of a single run of aerial photographs matched and mounted to show the flight path. Terrain Models and Relief Maps Terrain models and relief maps are three-di- mensional representations of a portion of the earth's surface in miniature. Terrain models re- fer to plaster, rubber, or papier mache topographic models, which show relief but do not show detailed map information. Relief maps, on the other hand, are basically maps which show relief in third di- mension. The primary purpose of three-dimen- sional terrain models and relief maps is the visual presentation of available information on terrain in a simple and easily understood form. Terrain models and relief maps afford military personnel an opportunity for prolonged and intensive study from any height or direction thereby permitting the observer to recognize terrain and beach fea- tures more readily. During World War II, plaster and rubber ter- rain models were prepared for almost all major offensive operations, some being made in limited quantities in forward areas, others being produced in small quantities in this country and flown to task forces prior to the assault. There were six general categories of models according to their use: strategic planning, tactical planning, assault landing, assault, airborne landing, and aerial target. The scale of the models, of course, varies with the extent of the area depicted and the needs of the users. The demand for topographic models frequently exceeded production capacity, since laborious pro- cedures were employed and most finishing opera- tions were accomplished by tedious handwork. Furthermore, the quality of early models was gen- erally poor, because basic map information was CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS inaccurate or incomplete and in many instances model production equipment did not permit ac- curate editing. Model media also left much to be desired. Plaster and papier macho were com- monly used in forward areas throughout most of the war. Sponge-rubber models were not devel- oped until 1944 and these had to be hand-painted and could only be manufactured succesfully in rear echelon locations. The elimination of hand painting was first made possible through the development of plastic re- lief maps, a process invented by John J. Braund of the United States Coast and Geodetic Survey. This technique made use of normal printing proc- esses to print standard flat map information onto thermoplastic sheets for subsequent forming by heat and vacuum into a negative mold. The Braund Process marked the first major step to- ward quantity reproduction of models and, with certain refinements and modifications, it is the most advanced today. In Korea, plastic relief maps were effectively used for operational planning, briefing and as a map supplement for all commands. (For detailed information concerning the construction of plastic relief maps and plastic photomaps refer to Army Map Service Bulletin No. 29, dated April 1950). COMMUNICATIONS INTELLIGENCE Just as photographic intelligence represents the operations of collection, processing, and dissem- ination in a technical field, the steps of the intelli- gence cycle are similarly applicable to the operations of communications intelligence. It too, is a cycle within a cycle. Only the most cursory treatment of communi- cations intelligence can be given here, for though it is known that major powers engage in this activity, information as to how much or how little our country learns through these methods and the exact details of how we do our work might involve a serious breach of security. There are, however, several techniques that are generally in use and which can be described. These are grouped under cryptanalysis and traffic analysis. Cryptanalysis Cryptanalysis refers to the breaking of the ciphers or codes used by other countries. A cipher CONFIDENTIAL 234 is a rearrangement and/or a substitution of in- dividual letters in a message. A code uses special words or numbers to represent other words or even whole sentences. Ciphers are frequently prepared by machines and translated back into clear lan- guage by the same means. American accomplishments in cryptanalysis during World War I were made public knowledge in 1931 in a book by Herbert 0. Yardley, The American Black Chamber. During World War I, Yardley was the head of the MI-8 in the War Department, which was composed of five subsec- tions; code and cipher compilation, communica- tions, shorthand, secret ink laboratory, and code ? and cipher solution. He soon found out that all the great powers had well established bureaus of a similar nature staffed by competent professionals. Successes in this field certainly rank far above the exploits of Mata Hari for effectiveness if not for romantic interest. Fletcher Pratt in his book Secret and Urgent describes several notable cryp- tographic triumphs during World War I. The German cruiser, Magdeburg, raiding along the Russian coast one night early in the war, ran hard aground in a fog. When the mists cleared the following morning, the Russian Fleet was standing toward the helpless vessel. In this emer- gency the commander of the Magdeburg ordered one of his officers to take the code books in a small boat as far from the stranded ship as possible and throw them into deep water. In the resultant con- fusion the officer was pitched over the side by a large swell, faithfully clutching the lead-bound code books in his arms. A Russian order for de- cent burial of all German dead was rewarded with one of the most important finds of the war, for a dredge drew up the officer's body with the code books still in his arms. The books were promptly forwarded to London where they provided the solution for all German naval codes. This discovery had most important effects on the German naval effort and the course of the war. German raiding forces were intercepted and de- stroyed, and traps set by the German Navy for British forces boomeranged. In the Battle of Jut- land the German Fleet escaped annihilation only because the British Admiralty was unable to con- tact Admiral Jellicoe due to excess volume of radio traffic. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL Another notable British cipher coup began by chance aboard a small monitor in the Mediter- ranean. It had been noted that the German radio station at Nauen followed its regular evening broadcast of the daily communique with a series of signals sent so rapidly that separate sounds could not even be distinguished. It resembled static more than anything else. Allied code offi- cers had reached the conclusion that these signals were merely a method of testing the apparatus. One very hot and quiet day wardroom officers aboard the British monitor ran out of musical se- lections for their portable phonograph. They de- cided to play a record of Nauen's lightning gib- berish for amusement. The officer who put the record on forgot to rewind the phonograph, and as the instrument slowed to a stop, the high- pitched screech became a rational series of code groups. They were a series of messages from the German High Command to General Von Lettow- Vorbeck, commanding in German East Africa, and most interesting of all they were in an old German Army cipher which the British had long held. In East Africa the Germans had been unable to ob- tain the new cipher, so messages to them were con- cealed by transmission at 5 or 6 times normal speed. As Fletcher Pratt points out, the Germans were not without their own intelligence successes in World War I. They are credited with working a resounding military hoax on the Russians in the Black Sea as a sequel to their success in solving Russian naval ciphers. The German cruisers, Goben and Breslau, based at Constantinople, waited until the Russian Black Sea fleet put to sea, then slipped in between the Russians and their base. In naval code, as though coming from home, they wirelessed orders to the Russian admiral to proceed with all speed to Trebizond at the far eastern end of the Black Sea. When the duped Russians returned from their fruitless chase, they found that the two lone German ships had raided their shore establishments and broken up their coastal merchant shipping. Yardley's book describes the great effectiveness of our cryptanalysis in reading Japanese messages at the time of the Washington armament confer- ence. His office turned out over 5,000 decipher- ments and translations during those meetings. Some writers believe that the Japanese denounce- ment of the naval treaties was directly linked with Yardley's disclosures years later. How and to what extent any American agency reentered cryptanalysis after Yardley's work was discontinued in 1929, has not been disclosed. The public knows that something was done prior to Pearl Harbor because of the references made on 4 November 1945, by Representative Gearhart (Congressional Record, November 6, 1945, pp. 10606-11). On 15 November 1945, came the full disclosure to the joint congressional committee of some 700 messages dating back to 2 December 1940. One of the most controversial features of the Pearl Harbor investigation involved the pur- ported "winds messages" which were said to con- tain the signals for war. These references to cryptanalysis, though brief, should suggest the sensitive nature of the subject and the need for the intelligence officer wherever stationed to be aware of the implications of activ- ities which concern codes and ciphers. 235 Traffic Analysis Traffic analysis is a second major type of activity related to communications that does not even re- quire chyptanalysis to be useful, although code breaking eases this work. It requires a knowledge of how messages are put together, how they are routed, and what kinds of organizations use radio communications. The task is to reconstruct the radio networks of the enemy, and to determine the features of their operations. It includes the solu- tion of call sign and routing systems, analysis of the components of message externals, interpreta- tion of radio procedure, and the use of the various cryptographic systems passed; that is, everything about communications except the cryptanalysis it- self, although the two activities are mutually supporting. When traffic analysis is systematically devel- oped, it may be possible to learn the call signals of enemy stations, the frequencies and times of transmissions, the physical location of stations, routing codes, and so forth. From this informa- tion a principal end product is order of battle data. Radio networks have definite and detailed patterns that give clues to the organizations they serve. They may include individual links between two points, groups working as an entity under a single CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS control, or nets with common operating character- istics and overall direction. Stations may use a single frequency or a range to fit atmospheric conditions. They may switch for security reasons or when regular frequencies have been jammed. Call signs may be fixed or be changed on some sec- ret basis. Times of transmission may also be varied on some irregular, secret basis. Clues to messages and operations may come from procedure signals and miscellaneous chatter among operators. Such chatter may give information on cryptographic systems used. Japanese stations in World War II received advance notice of some of our carrier strikes when our pilots turned on trans- mitters to test them prior to take off. Occasion- ally, due to unusual atmospheric conditions, mes- sages on frequencies not intended to go very far are bounced great distances and received by enemy ears. Sometimes encrypted messages are refused by an addressee, and the same message is repeated under another system giving many important leads. Messages have certain externals that can convey much valuable information. These may include serial numbers, group counts, date time markings, routing to action and information ad- dresses, and precedence indicators. The location of transmitters, if not otherwise known, may be determined by direction finding, using several receivers and triangulation. Re- constructing a net may come from the call signals, the schedules, the frequencies, the routings and routines, the cryptographic system used, the chat- ter and names of operators. The information obtained is plotted in diagramatic form and in tables until meaningful patterns emerge. Volume of traffic and direction of flow may in- dicate what stations represent higher headquarters or certain command relationships. Changes in volume of messages may show that military opera- tions are underway or about to begin. For exam- ple, it appears that before the Pearl Harbor attack, important Japanese fleet units kept radio silence, an immediate clue that they did not want their activities identified. Since changes in volume of traffic can disclose so much, nearly all countries now pad their traffic to maintain an even volume and hide this kind of vital information. Dummy nets may continue to operate to hide the moves of real forces under radio silence. Consequently the CONFIDENTIAL 236 intelligence officer must always be on guard lest the obvious not be the real. Thus it is apparent that the value of traffic analysis is great, for it not only can be a source of much information to us, but also points out the need for protective measures to insure our own communications security. REPORTING Thus far in our discussion of collection we have described guidance, the direction of the collection effort, and coverage, the fulfillment of missions by collecting agencies or units. Now we come to reporting, the means by which information reaches its consumer. Without prompt and accurate re- porting a collection effort is without value. Graphically, the reporting by an intelligence officer can be re presented thus: See HearEvaluate Report In writing Organize Read Orally We have here in essence a reporting cycle which embraces all phases of the Intelligence Cycle: collection through the eye and ear; processing by a preliminary interpretation of the information and its organization into logical presentation; and dissemination through the act of reporting, either written or oral. The intelligence officer must therefore be able to present the information col- lected in the manner that will best serve the user. Words, written or spoken, are weapons to be used with skill. Written Reports Written reports can be classified into three types: (1) periodic, those required at regular intervals or on designated dates on a continuing basis; (2) spot, those made in reply to a specific request; and (3) voluntary, those submitted through the collec- tor's initiative. Typical of periodic reports is the joint WEEKA, prepared at virtually all United States foreign posts by the representatives of the Depart- ments of State, Army, Navy, and Air Force. It is an analysis of the significant local events of the week under review. The naval attach?s prima- rily responsible for items of naval interest which are briefly presented with appropriate comment. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL The intelligence officers of many operational commands prepare succinct summaries of items of interest for periodic dissemination to all units within that command. The items may be evalua- tions or interpretations of current events or merely accurate information to correct ill-founded scuttle-butt. Spot reports are direct answers to specific ques- tions. What is the depth of water alongside Pier 5 in Atlantis Harbor? What are the political sympathies of Admiral Ivanovitch ? Has the re- pair of the damaged crane in the Gesundheit Ship- yard been completed? Specific requests usually have a "due date" and replies by messages are often requested. Voluntary reports should make up the bulk of a collector's reporting. We have shown in previ- ous chapters the broad scope of subjects of naval interest. An alert collector's reporting respon- sibilities never cease, and conscientious effort in insuring completeness of information will often eliminate the necessity for specific requests to sup- ply the missing data. Form and Speed The primary considerations in the reporting of information are form and speed. The Navy has adopted a standard information report form which insures completeness and provides uniformity for rapid and efficient processing. The nature and urgency of the information will determine in what form it should be forwarded and the means to be used. Particularly vital information should be submitted by telecommunications, while matters of less immediate concern are forwarded by mail in accordance with security regulations affecting their transmission. Lacking specific directives, the intelligence officer must use his best judgment. Report Writing The ABC's of good report writing are accuracy, brevity, and clarity. Precision in the use of words is essential for accuracy. To write: The vehicle went into the water would be a most inaccurate description if the true circumstance was: The jeep slid into the Danube. Brevity is perhaps the most difficult to achieve, for it is always a problem to decide what is essential or nonessential for the 237 consumer's needs. However, one should not write: "The be-ribboned sea-dog mounted the gangway of the famous fighting ship and partook of a noon- day repast together with the efficient officers who control the intricate operations of this modern masterpiece of naval engineering" when the sit- uation can be simply described by: "Admiral Burke lunched with the ship's officers on board the Forrestal." Clarity is achieved by a simple, direct writing style, and a logical organization of report content. The standard Navy information report format consists of: (1) a succinct summary of the infor- mation; (2) the main body of the report; (3) the comments of the originator. A summary or brief is required for all reports of more than one page. Normally, it should not be longer than a few sentences or one-fourth page. Its purpose is to enable all who read it to determine its significance at first glance. Therefore it should be more than a mere outline of the paragraph titles of the report. It should contain the main facts, a succinct epitome or abstract of the report's con- tents. Thus a carefully written brief serves as a timesaver for those who initiate the processing of the report's information. It is an essential aid to proper dissemination, for its potential users will be clearly indicated. The main body of the report should be presented with section or paragraph titles and subtitles. The material should be factual and the writer must strive for complete objectivity. Here again brev- ity is desirable but never at the expense of neces- sary detail. At the close of the report, on a separate page, the reporting officer should present his personal comments. It may sometimes be advisable to elabo- rate on the reliability of the source or to submit a brief discussion of the pertinence of certain facts as seen by the collector in the field. Such comment will be most helpful to subsequent evaluators of the information. Here the reporting officer can be subjective and editorialize to his heart's content. However, he should still be concise. Often the forwarding officer in a chain of command will also desire to add comment. We can summarize our discussion of reporting by setting forth a few guiding principles: Each report should be on a single subject. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Give careful attention to the introductory sum- mary. Organize facts and figures in logical sequence. Photographs, sketches, and appropriate graphics will always save words and enhance the value of the report. Be objective in the main body; be subjective in comment. Never include questions or requests. Such mat- ters are subjects for separate letters. Edit the report before submission; reread, reor- ganize, rewrite. Make every report represent a best effort. Oral Reporting Intelligence officers in operational billets will be frequently called upon for oral presentations or briefings to commanders, staffs, and personnel of operating units. The effectiveness of such brief- ings depends on the officer's ability as a speaker and his ingenuity in the use of visual aids. Care- ful organization is again the key to success. A good briefing has an adequate introduction, smooth transition in moving from point to point, and a clear, forceful conclusion. Naturalness of de- livery, unity, coherence, and emphasis will achieve the desired result. Ability will come with prac- tice, and the intelligence officer should constantly strive for self-improvement in this important function. Observation and Reporting in the Field The intelligence officer serving as an attach?r in other billets abroad will frequently be in posi- tion to observe things of inestimable value. The full significance of many observations will, of course, be apparent only to the highly trained technician. A good intelligence officer must be quick to realize his own observation and reporting shortcomings in technical fields and request ex- pert assistance whenever possible. There are, however, certain fields in which he must acquire observation techniques in the interests of accurate reporting. We shall discuss two of them here: ships and aircraft, both of which are of prime in- telligence significance all over the world. Reporting on Merchant Ships Although thousands of merchant ships ply the oceans, far outnumbering naval vessels, the aver- CONFIDENTIAL 238 age naval officer is seldom equipped to recognize, identify, and accurately describe them. Yet their recognition is of key importance not only in dis- tinguishing between friend and foe but also in ac- curate assessment of the enemy's logistic capa- bility. Typical among current merchant ships recogni- tion manuals is CINCPAC RIG-1, which is an outgrowth of JMST used in World War II. Now out of print though still frequently available is ONI 209. Very useful, too, is Talbot-Booth's Merchant Ships annual. Recognition is of two types. The first is a gen- eral overall impression, used primarily in quick operational identification. The second is a more detailed analysis, feature by feature, made possible only by opportunity for prolonged observation. The latter is the most desirable, since ships present a great variety of characteristics and are therefore hard to identify quickly. There are several stages of ship recognition. As ships come over the horizon, their sequence of masts, kingposts, cranes, and funnels can be noted from bow to stern. Next can be noted the general hull form, whether flush-deck or in various com- binations with and without raised forecastle, bridge, and poop sections. At medium range more detail can be noted: the shape of the bow and stern, the funnel size and shape, position of masts and kingposts, and often clues to length and ton- nage. At close range the length of forecastle, bridge, and poop can be ascertained and also the position of deckhouses, winchhouses, ventilating cowls, lifeboats, and many other details. The par- ticulars of Navy merchant ship coding, largely adapted from Talbot-Booth, are covered in official manuals. How is the size of a ship to be judged? Apart from checking in a reference manual, there is no absolute measure, for visual impressions are af- fected by the color of sky, the kind of weather, and the altitude of the observer. However, an estima- tion of length may be possible from the number of lifeboats or the ratio of length to the height of the navigation bridge above the waterline. Whether the ship is light or laden will possibly influence identification of the shape of bow and stern. Speed estimates are also important. They depend upon a knowledge of the shapes and posi- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 .? CIA-RDP85G00105R000100210QQ2timDENTIAL .-9. THE INTELLIGENCE CYCLE: COLLECTION uu tions of waves made by different kinds of bows and familiarity with varieties of ships' wakes. The kind and continuity of smoke will give clues to the type of fuel burned by a ship. Mistakes are easy to make. A three-island ship may look like a flush decker if the well decks are loaded with lumber, and masts may be lowered on some ships so that they look like kingposts. An estimate of the age of a ship will often provide important clues to performance and iden- tification. Age is frequently revealed by such characteristics as shape of bow, stern, superstruc- ture, and funnels, and ratios of length to other dimensions, the amount of superstructure that is glass enclosed, the type of ventilation, and the type of lifeboat davits. In peacetime, an aid for identification is the coloring of such features as the hull, superstruc- ture, booting, stripes, masts and kingposts, cowls inside and out, and, of course, the funnel and house flag. In wartime the task is more difficult not only because of gray and dazzle paint, but because of deck cargo, armament, false work of canvas and sheet metal, and removal of dummy funnels. In recent years there has been one development that simplified recognition of types but not of ownership: the building of ships to standard pat- terns. In World War I the Hog Islander was typical of freighters designed for mass production to meet wartime needs. The President liners, both 535's and 502's, were cargo-passenger ships of standard design. In the late 1930's the United States Maritime Commission began a new program of permanent standardized types to bring our merchant fleet out of the doldrums, beginning with the Cl, C2, C3 cargo types. At the outset of World War II the British began an emergency building program to replace submarine losses, or- dering a very simple reciprocating engine ship with split superstructure, the Ocean class, from United States yards. At home and in Canada they built similar Fort and Park class freighters and later some better turbine and diesel ships, all with the prefix Empire. The British Ocean de- sign was modified in this country to a composite superstructure type, the Liberty ship, designated the EC2. Later in the war, the faster turbine Victory ships (VC-2) were built in considerable numbers. The regular peacetime program of C1, 239 C2, C3 types was enlarged, and joined by C4, C5, P1, P2, Ti, T2, T3 oceangoing types of cargo, passenger, and tanker designs. The C1MAV1 coastal cargo ship, an even smaller N3 type, and many standardized tugs, barges, and lake ships were also built. The Japanese, too, had to resort to mass production of ships to meet emergency needs, producing a whole series of ships with simplified lines. After the war, these mass-produced vessels, American, British, and to some extent Japanese, accounted for a very considerable proportion of all shipping afloat. Because of surplus sales, and lend-lease transfers not returned, a number of American designs, especially Liberty, Victory, and T2 tanker, are now found under many flags. These standard types make recognition training easier, but a positive identification of nationality often requires more than visual observation. Our country has led the way since the war in building or ordering abroad so-called "supertank- ers," grossing about 17,000 tons and carrying about 28,000 deadweight tons. These vessels are operat- ing under a number of flags including Pana- manian, Honduran, and Liberian, as well as the better known United States shipping companies. The new Mariner class vessels represent a sig- nificant change in cargo ship design, and though they are few in numbers now, they may be very important in any future war. In summary it can be pointed out that accurate ship recognition and reporting offers considerable opportunity to develop skill. Individual nation- alities and shipyards have their own characteristic building habits in design and auxiliary equipment. Close attention and constant study will pay divi- dends in many types of intelligence billets. Reporting on Naval Ships All known naval vessels are much more com- pletely covered in official manuals than are mer- chant ships. Additional unofficial sources that are very helpful are Jane's Fighting Ships and Fahey's Ships and Aircraft of the United States Fleet. Many of the recognition problems are somewhat similar to those of merchant ships, but the details to be reported on each vessel are more complicated and more urgently needed for naval purposes. In addition to simple recognition and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTEAL INTELLIGENCE FOR NAVAL OFFICERS description, it is essential to obtain specific data on performance, armament, armor, fire control, and the efficiency of crews. Opportunities for obser- vation may be more limited, since many countries do not expose their naval vessels needlessly. Even though an obscure aerial photograph may reveal no details, the hull proportions of length to beam may disclose the type. Generally, observation should include noting deck lines and superstruc- ture, the types of gun mounts and the disposition of batteries, the peculiarities of masts and funnels, and the shape of bow and stern. Observation of naval vessels is frequently com- plicated by their neutral color and complexity of gear. Frequent refits may modify appearance so that the vessel cannot be recognized from earlier drawings. It is incumbent upon the intelligence officer to be familiar with all the major vessel types: capital ships, cruisers, carriers, destroyers, submarines, minecraft, patrol craft, amphibious, all auxiliaries, and yardcraft, noting that there are many subtypes, each with a specialized and significant use. He should also note pendant or bow numbers, and, of course, names whenever possible. Attention to armament should include various types of guns, torpedoes, guided missiles, mines, antiaircraft weapons, rockets, directors, and radar. The armor protection of side, deck, turret, and tower are important, together with compartmen- tation and damage control measures. Mobility? speed and maneuverability?and sea-keeping qualities in various kinds of weather must also be ascertained. These are but the bare essentials, and the individual officer should continue his studies of naval vessels constantly in order to make the most of reporting opportunities. Reporting on Aircraft As in the case of ships, there are two principal approaches to aircraft recognition. One is in com- bat operations, when rapid identification is re- quired. The best results in this type of recognition have been achieved by use of the American Ren- shaw system, which consists of constant drill on total form. The other approach is more produc- tive of information of intelligence interest, the British WEFT system: Wings?Engines?Fuse- lage?Tail. It comprises a systematic detailed CONFIDENTIAL description. The observer, of course, must have a photograph to study or actually see the plane in a slow fly past. Wings are described according to their position on the fuselage, their size and shape: whether they are dihedral, if swept back and to what degree, gull or inverted gull, square or tapered, with rounded or square tips. Engines are noted as to number, whether in-line or radial reciprocating, turbo-jet, pulse-jet, ram-jet, or turbo-prop, and in respect to propellers the number of blades and whether they are coaxial contrarotating. In re- spect to the fuselage, general proportions, shape, and position of protuberances such as cockpit, gun turrets, radomes, and air intakes are important. Reporting on the tail must include shape, number of vertical stabilizers, position of the horizontal stabilizer, and the extent to which the tail fairs into the fuselage. Aircraft structural terminology is part of the intelligence officer's professional equipment. He must also seek data on range, speed, maneuver- ability, lifting capacity, performance at usual op- erational and highest possible altitudes, vulner- abilities, tactics employed, maintenance, and so forth. The appearance of a particular aircraft at a certain location may give clues as to unsuspected longer range. Air technical intelligence, as noted earlier, will supply detailed answers to many ques- tions of production rate, metallurgy, and equip- ment when opportunity is afforded to examine captured planes or their component parts. The signifiance of aircraft observation thus goes far beyond a mere determination of friend or foe. The appearance of German jets and rocket planes in World War II represented an outstanding ex- ample of how prompt recognition resulted in sig- nificant intelligence. We were able to assess their performance and take the proper countermeasures to save our bombing program on the continent and to avert defeat in the air. Reporting on Air Facilities Just as the proper use of the standard informa- tion report form insures completeness of reporting on items of general naval interest, the use of a standard form for describing foreign air facilities (NME-193) serves as a guide to the intelligence officer reporting on airfields and seaplane stations. 240 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL It systematically provides spaces for entering de- tailed information on location, runways, communi- cation facilities, installations, transportation, meteorological conditions, and servicing facilities. Such reports are augmented by enclosures which furnish additional data through maps, photo- graphs, approach procedures, operation regula- tions, and other pertinent facts. A separate report is required for each facility, and the information thus obtained is used in the compilation of foreign airfield lists published jointly by the Air Force and ONI, and in the compilation of aeronautical charts and related publications published by the Aeronautical Chart Service and the Navy Hydrographic Office. Other Subjects of Reporting The fact that ships and aircraft have been sin- gled out for special treatment above is in no way intended to minimize the importance of many other items of naval interest. Ports and harbors, of course, are to ships what air facilities are to aircraft, and information on ports and harbors represents a continuing requirement on naval in- telligence. A special guide published for the col- lector outlines the types of information desired in considerable detail. They include complete as- sessment of the harbor and its approaches, the docking, cargo transfer, and storage facilities, inland clearance, repair and servicing, and a host of other items. A complete port study is not pos- sible through a casual visit. It requires days and sometimes months of the keenest observation and most careful evaluation. Land transportation facilities, including rail- ways, roads, bridges, tunnels, urban transit sys- tems, inland waterways, and so forth, are primarily under the cognizance of the Army Transportation Corps, yet a naval observer may on occasion be in the best position to observe and report on them. Irrespective of source, such in- formation is of vital importance to Navy plan- ning. Even the seagoing naval officer when in port can note railway gage, number of tracks, con- dition of rails, ties, and ballast, signaling system used, gradient and curvature markers, location of passing tracks, branch lines, bridges, culverts, tun- nels, stations, repair, fuel and storage facilities, 241 size of marshalling yards, locomotive and car wheel arrangements, fuel used, freight observed in movement, types of couplers and brakes, and many similar items. It is all needed for accurate assess- ment of railway capacity and vulnerability. Roads and highways should likewise be observed for location and mileages, branches, number of lanes, width of lanes and shoulders, surface mate- rial, present condition, bridge construction and clearance. Reports on waterways should include information on the depths of water by seasons, degree of maintenance required, facilities for cargo transfer, and all dimensions of canal locks. Telecommunications facilities, though of a tech- nical nature, also provide material for useful re- porting even by the amateur. Noting the efficiency and extensiveness of the telephone and telegraph networks, the frequencies and locations of radio stations, and the shapes and positions of antennas will always yield valuable data. Power facilities are frequently keys to the capa- bilities and vulnerabilities of an area. Noting power lines, substations, hydroelectric and thermo- electric plants, the voltage and frequency of con- sumer electric power, and the availability of power fuels, such as coal and oil, will provide material for many reports. Industrial reporting is complex and varied, and accurate identification by mere observation from the outside is often difficult. A collector going to a foreign port should make a careful study of the types of industrial installations he is apt to en- counter in order to recognize them readily for what they are: steel mills, processing plants, construc- tion works, and so forth, and whether they func- tion in heavy, light, or agricultural industries. Estimations on production volume may be related to observed flows of raw materials, and numbers of workers. Labels on crates may give clues to ori- gins and destinations. Pacing off or using an automobile speedometer may give plant dimen- sions. Good opportunities for accurate reporting should not go begging for lack of ingenuity. Such observations should be considered a matter of collection and reporting routine. In this coun- try such information is readily available to all foreign nations from libraries, newspapers, and brochures published by local chambers of corn- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS merce. Collection abroad is often not so easy, so a greater burden of observation rests on the col- lecting agency. If opportunities for observation are fleeting, and the information is critical, the observer must concentrate on essential elements, and memorize them until he has an opportunity for recording without risk of compromise. Tak- ing pictures is subject to the same qualifications: they are invaluable, but unless the need is very great they should not be taken in a manner open to easy compromise or diplomatic censure. The Intelligence Sketch Sketching is one of the old forms of reporting information. Whether a sketch is simple and rough or elaborate and artistic, it affords a graphic means of communication which in many cases is much more effective than a written description. In circumstances where photography is impossible or inadvisable the sketch is the solution, and a maxim for the collector is: "If you can't photograph it, sketch it!" Some typical instances when sketching would be most valuable and appropriate are given below: A naval attache has been granted permission to travel into the interior of the country in which he is stationed and to visit certain military and indus- trial installations. Photography has been forbid- den, and well aware that he cannot rely on his memory for all details, he plans certain memory aids which will help him sketch the locations, structures, and plant layouts when he returns to his office. A prisoner of war, when being interrogated, re- vealed that he had recently been assigned to guard duty in a restricted harbor area. Although he is unable to describe verbally all that he saw, he can produce a rough sketch of certain port installa- tions and identify buildings. This information later proves to supply missing information on that particular harbor. In the course of a mission, a pilot observes a type of aircraft unknown to him. The air intelli- gence officer, debriefing the pilot, translates a de- scription of the new plane into a sketh. (See fig. 10.) Analysis of the sketch reveals technical de- velopments hitherto unususpected, thus resulting in a reassessment of the enemy's air capabilities. CONFIDENTIAL An intelligence officer, put ashore with an am- phibious reconnaissance patrol, is able to sketch the locations and relative bearings of a series of beach defenses. This sketch information, when delivered to the commander of the support group, makes it possible for naval gunfire support to be directed with greater accuracy. The most elementary kind of sketching is a. two dimensional drawing representing total form. (See fig. 11.) To achieve proper proportions the use of graph paper is recommended, particularly by the intelligence officer new to his job, but expe- rience and constant practice will soon eliminate the need for graph paper assistance. Problems often arise in sketching such things as general terrain, waterfront areas, and buildings. A plane view would meet the minimum require- ments, but by employing a simple sighting device, often used by landscape artists, it is possible to include perspective while retaining approximate scale. All that is needed is a pencil or ruler. Sup- pose the subject is a building. Sighting the build- ing over a pencil held vertically at arm's length it is found that the building's height is equal to about 2 inches of the pencils length. A 2 inch vertical line transcribed on paper is the first step in sketching the building. Its length is determined in the same manner by sighting with the pencil held horizontally. Height and length are thus transcribed in correct proportion. Beach sketching from seaward, invaluable in amphibious operations, can be mastered by any intelligence officer with the help of H. 0. Publica- tion No. 227, The Amphibious Sketch. For self- instruction in general sketching the following books are recommended: Arthur L. Guptill, Free- hand Drawing Self-Taught, published by Harpers Bros., and Ernest W. Watson, Pencil Drawing, published by Watson-Guptill Publications, Inc. Adequate sketching requires no special equip- ment other than a pencil, soft eraser, and paper. For general purposes, a 2?H (medium) pencil is best because it is soft enough to produce a firm mark with minimum pressure and yet does not smear readily. The type of drawing paper used will naturally influence the result obtained, so for general purposes paper of soft texture, not glossy, is best. 242 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL Sketching-Aircraft HEAD-ON VIEW (1) Draw a horizontal line, marking off a dis- tance to represent wing span. (2) Draw outline of fuselage cross section in proportion to wing span, locating it to indicate high, mid, or low wing as appro- priate. (3) Draw wing shape, indicating dihedral, if any. (4) Add wing floats or tanks, if any. (5) Draw tail surfaces in proper proportion and add any other features such as cockpit canopy, engine nacelles, airscoops. PLAN VIEW (1) Draw a vertical line, marking off a distance to indicate length of fuselage. (2) Sketch outline of fuselage. (3) Locate wing by a horizontal line, indicating span in proportion to fuselage length. With sweptback wings, the line should run through tips. Mark on fuselage positions of leading edge and trailing edge at roots. Figure 10.?Sketching aircraft. 243 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS PLAN VIEW (Cont.) (4) Draw wing tips, with tanks when included, and complete the outline of the wings. (5) Add engine nacelles, if any, and draw tail plane. SIDE VIEW (I) Indicate over-all length on a horizontal line. (2) Draw general outline of fuselage to show relative thickness as well as curvature and taper. (3) Draw fin and rudder in proper proportion. (4) Add any further prominent features?cock- pit canopy, turrets, radomes, scoops, or engine nacelles showing above or below the fuselage. (5) Add wings, stabilizer, and other details if desired. For silhouette effect, fill in the outline sketches. CONFIDENTIAL Figure 1 0.?Continued 244 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: COLLECTION CONFIDENTIAL Sketching Warships A. (1) Draw a straight horizontal line to represent the water line, marking position of how and stern. (2) Estimate the height of the bridge in pro- portion to indicated ship's length at the water line. B. (1) Draw the deck line and profiles of bow and stern. (2) Draw in outline the general mass of the superstructure. This step is most important as the over all shape is a major Recognition feature. C. (1) Add important details?bridge, stacks, masts, turrets. (2) Fill in for silhouette effect. Figure 11.?Sketching warships. 245 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL RECORDING INTELLIGENCE FOR NAVAL OFFICERS A discussion of collection will not be complete without mention of a final requirement: the proper filing and recording of the results of the collection effort. Information must be labeled for ready reference. Such cataloging and indexing should begin when the collector in the field gathers his material for a report. The efficient collector should keep a personal file of facts and notes on people, places, and events. In form these may be card files, annotated clippings from newspapers and magazines, or penciled memoranda. Some or- derly arrangement of this material will pay off when information is needed for reference or sug- gestion for leads. Just as a good reporter the intelligence officer should write down observations and impressions while they are fresh in his mind. Memory can play strange tricks, and in intelli- gence activity there is no place for hazy recollec- tion. CONFIDENTIAL 246 A standard Intelligence File Index, used by United States intelligence agencies, assures uni- form filing of information reports by all processing units. Thus a report or dispatch received by the Navy from Army or Air Force sources bears the same file number as it would if it had originated from a Navy collecting unit. Cross-indexing pro- vides for further efficiency. Further consideration to the principles of filing will be given in the following chapter on process- ing, for it is in the second step in the cycle that orderly arrangement of data becomes even more essential to the intelligence function in any mili- tary establishment. This chapter is not an exhaustive treatment of collection. Aspects and applications of this first step in the intelligence cycle will appear again and again in succeeding chapters, for collection is basic to intelligence activity; it sets the wheels in motion; on its efficient operation the remaining steps of the cycle depend. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CHAPTER 10 THE INTELLIGENCE CYCLE: PROCESSING In the continuous operation of the intelligence cycle, Collection provides the essential raw mate- rial and processing acts in the manner of a cata- lytic agent, transforming pertinent parts of the material into a meaningful product ready for dis- semination and eventual use by appropriate action agencies. During this second phase of the cycle, the trained intelligence officer and the skilled analyst work with quantities of raw information collected from a great variety of sources, selecting, verifying, comparing, and interpreting items of value, and acting upon the results to produce usa- ble intelligence. The basic problem is one of de- termining the significance of information in the light of past experience, present circumstances, and possible future developments. To be utilized by the analyst in solving this problem are the prin- ciples of logic, reasoning, and exhaustive research. As is true of the social sciences, intelligence is based on observed phenomena or facts from which generalized conclusions are drawn. Therefore, processing is much more than the orderly assem- bling of related facts and the determining of their significance; it involves the deriving of total mean- ing from these facts when related to other intelli- gence already available. As distinguished from the other phases of the cycle, processing is fundamentally a mental oper- ation, carried out primarily at higher echelons by specifically assigned analysts who are carefully selected and intensively trained for specalized activities. However, limited processing may be performed by any part of the intelligence organ- ization, particularly at the lower echelons where all phases of the cycle are often the responsibility of a single unit or perhaps one intelligence officer. This is true because information for intelligence is never static, but in continual motion. It is gathered, and processed to a degree, by the collec- tor who disseminates it upward to higher echelons, laterally to other echelons on the same level, or downward to lower echelons where it may be sub- jected again and again to processing by different individuals and from different viewpoints. 247 CONFIDENTIAL Even when processed information, which is in- telligence, has been placed in filing cabinets, it is only in suspended animation. It may already have set in motion a chain of events, or it may be drawn from the files at any time for use in conjunction with later information or intelligence to activate further events. Processing is a continuous operation because in- formation of intelligence interest is constantly being collected and because each item of processed intelligence will open new areas of collection. It is a vital operation because collected facts and data have intelligence value only as the result of proc- essing; failure to process represents a costly waste of the collection effort. Even processed informa- tion requires frequent re-evaluation in order that it may have current utility. Processing functions are also activated when requests are received for intelligence on a given topic and when solutions are required for problems arising out of planning for strategic, operational, or countering purposes. In the processing phase of the cycle, three gen- eral factors must always be kept in mind: the completeness of the basic data, the accuracy of the operation by which information is converted into intelligence, and the element of time. In order that the conclusions may be truly comprehensive and not partial, the basic facts and data used must be as inclusive as possible. In order to avoid errors which would render conclusions not only meaningless but also highly dangerous, the various processing functions must be expertly performed. Finally, because intelligence must be produced in sufficient time to be of value to those who need it, all information received by the processing unit must be handled expeditiously. The time-span of the processing phase is con- ditioned both by the nature of the information re- ceived and the urgency of the need for it. For example, a flash report from a subordinate com- mander of an impending enemy air attack on a car- rier would be disseminated immediately and the processing phase would be eliminated. Informa- tion suggesting an imminent military attack on an CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS ally of the United States might force the concen- tration of all processing activity into a matter of hours. On the other hand, a report including con- flicting implications of an anticipated change of government in a country of minor world impor- tance might require a longer period for thorough processing. At all times, however, speed in proc- essing is important because of the constant possi- bility that the final interpretation of the informa- tion may have meaning of vital and immediate concern to a potential user. Because of its abstract nature, the diverse cir- cumstances affecting it, and the varied application of its general principles, processing cannot be re- duced to a series of mechanical operations. It includes a number of mental functions which are intricately interwoven and often overlapping as they continue toward the goal of correct conclu- sions. At times several of these functions are per- formed simultaneously and they do not necessarily follow one another in fixed sequence. As a result, there will seldom be complete detailed agreement as to the particular functions encompassed by proc- essing or the terms to be used in describing them. However, the integral functions may be identified, for all practical purposes, as selection, evaluation, analysis, interpretation, and action. For the pur- poses of discussion only can they be considered separately. There are certain techniques and aids or devices generally used in processing, such as labeling, in- dexing, and filing. However, they are not ends in themselves and must never obscure the ultimate objective of processing which is the production of intelligence. SELECTION Volumes of information are received continu- ously by processing units in the form of reports, messages, charts, photographs, journals, and printed material of all types. Diverse topics of potential intelligence value may be included within a single report or bits of information regarding one topic of interest may be scattered among many. Since no item may be disregarded and many may be obscured by the very bulk of the reports in which they are contained, there must be a careful sifting of all information received on the basis of interests and specific pending requests to extract CONFIDENTIAL 248 data of value. Selection, then, is the preliminary examination of information to determine the need for it, the degree of interest it holds, its possible use, and its meaning. If meaning is readily ap- parent, the information will be disseminated promptly, even at this early stage of consideration. Selection, however, is much more than the ex- tracting of pertinent data. It is the first step of processing whereby controls are established over all extracted material in order to make it available in usable form to the appropriate intelligence analysts. Depending upon the particular require- ments of the analyst, the material received may be best controlled by subdividing it under general headings such as persons, places, organizations, situations, and trends. The sorting and grouping of information under headings such as these facili- tate the current and future use of all extracted material; they are also of immediate value to the other functions of processing. Related to the establishment of controls are two additional activities by analysts which are part of the function of selection. The first is the prompt distribution of incoming material within the proc- essing unit in order to maintain the rapid flow of information to all analysts who need it. How to minimize the circulation to analysts of informa- tion in which they have no interest is one problem of distribution. The second activity is that of labelling material for later filing and indexing in the reference files. The objective of this activity, of course, is to insure ready availability to the analyst of any material he has reviewed or proc- essed, regardless of the means he may use to iden- tify it at the time. The participation of the an- alyst in this preliminary phase of indexing and filing increases the probability that each item will be identifiable under the widest variety of head- ings by reference file personnel. EVALUATION Evaluation is a continuing function of process- ing. In fact, it is perpetual within the intelligence cycle, beginning when the collector considers cer- tain information worthy of reporting, and con- tinning thereafter as this information is passed from person to person. Within a processing unit, which has received information from many sources, evaluation is the competent consideration Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL of each item of information, the study of its rela- tionships with other pertinent information, and the determination of its accuracy, completeness, and inherent meaning. A basic problem in evalu- ation is the fact that the very nature of informa- tion collected for intelligence purposes usually precludes assigning it an absolute value, either true or false. Of necessity, therefore, this infor- mation must be evaluated on the basis of its rela- tionship to known fact and the degree to which it is in agreement with the known fact. Nonevaluated information is not intelligence and has little value for intelligence purposes. In fact, it can be potentially dangerous if dissemi- nated without being clearly identified as such. Generally, every effort should be made to evaluate information properly prior to its dissemination. Basic considerations in the function of evaluating information are the reliability of its source and the accuracy of its content. The Standard Evaluation Code As a means of rating the reliability of the source and the probability of the information itself, a standard letter-figure code system is widely used by United States intelligence agencies and should, therefore, be thoroughly understood by all intelli- gence personnel. As indicated below, the source is given a letter rating of from A to F and the content a figure rating of from 1 to 6. Reliabflity of Source Probabiiitio of Information A?Completely reliable 1?Confirmed by other B?tsually reliable sources C?Fairly reliable 2?Probably true D?Not usually reliable 3?Possibly true E?Unreliable 4?Doubtfully true F?Reliability cannot be 5?Improbable report judged 6?Truth cannot be judged In general, collectors in the field apply this code system to reports which they submit. Initially, the writer of the report is the most competent judge of the reliability of his source. Reports based on personal observation are normally rated "A," while those obtained from informants whose reliability can be judged in the light of past ex- perience are rated "B," "C," or "D." An "F" rating simply means that the reporting officer has nothing upon which to estimate the source's reli- ability. It may be the first time the source has supplied any information and the reporting officer 269196-54------17 249 cannot assess him by association, by the valued opinion of colleagues, or by recommendation of other trusted informants. The "E" rating is rarely used by originators of reports, except per- haps when distortion or falseness may provide useful background information. However, it may be used by subsequent processors when additional information not available to the collector indicates that the source is completely unreliable, as far as the information supplied in a particular instance is concerned. The ratings assigned by field agencies are not automatically accepted by the intelligence proces- sing units; rather, they are used as guides. Since the processing units sometimes have more infor- mation on an original source than the collector, field ratings are subject to change. Even the direct observation of the originator, which has been rated by him as "A," may be downgraded by the analyst on the basis of previous experience with the originator's accuracy of observation and reporting. It is also possible that a source of the originator may be rated as "F" by the analyst if no information is available to substantiate the assigned rating. There is no firm relationship between the letters and figures of the rating code. An "A" source will not always produce information of "1" or "2" rating, for mistakes can be made by the most reliable sources. On the other hand, an "E" source may supply information that is probably true or confirmed by other sources. Usually, however, the most accurate information will come from the most reliable source; hence the source does tend to influence the rating of the content. Ideally, source and content should always be con- sidered entirely separately. However, there are instances when the reliability of the source has a direct bearing on content, especially when there is no other means for judging the material under consideration. As a result, cumulative records of the reliability and accuracy of repetitive sources can be particularly helpful. When the originator asigns a low rating to information there is a tendency on the part of the analyst to accept it. To be re-emphasized is the fact that the Stand- ard Evaluation Code is to be used only as a guide and not taken too literally. As is often true of standardized rating systems, assigned values tend CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS to be arbitrary and subject to diverse interpreta- tion by its users who have varied backgrounds of experience and training. The rating of the content of the information is particularly difficult since degrees of accuracy and probability are involved. Information may be only partially cor- rect, or, though correct in itself, may convey false implications. It is equally the case that the reli- ability of a source may change, so that its ratings may vary over a period of time. Giving due con- sideration to the ratings assigned by the origina- tor, the analyst carefully examines the source and content of the information received on the basis of the total related information and intelligence available to him. Testing the Source In determining the reliability of the source, the analyst must distinguish between the actual source and the transmitting agency. When the action source is not revealed, however, the reliability of the transmitter, and his evaluation of the source, assumes primary importance. Theoretically, the only absolute sources for the analyst are his own direct observation and proven documentary evi- dence. The first is seldom possible and even the second must be verified. In testing for reliability, the first question is that of authenticity. Is the source from which the report ostensibly comes the true source? Or has false information been released for purposes of deception? An example of the dangers of incorrect evalua- tion of the authenticity of a source is described by Hector C. Bywater in Their Secret Purposes: Dramas and Mysteries of the Naval War. During World War I, a German warrant officer discovered charts of Russian mine fields and coast defenses in a brief case which the beautiful Anna of Libau claimed had been left behind by a former lover. Much excited by his discovery, the German officer obtained an audience with German naval author- ities who acted on his information. Minesweepers were sent out at night, and it was found that the indicated clear channel was actually free of mines. Gun flashes were observed at the shore defense positions marked on the charts, and the Germans worked out their gunfire problems accordingly. The next day, a strong force of German ships moved in, not to victory, but to disaster. The CONFIDENTIAL 250 Russians had sown mines in the clear channel after the minesweepers' investigation of the night be- fore, and the gun positions proved to be dummies, located far from the site of the actual coast defense batteries. The warrant officer was a reliable source, but the papers found were false, and Anna of Libau was subsequently identified as a long- term Russian agent. The second question which arises in testing a source for reliability is that of trustworthiness, which includes the factors of loyalty, motive, and objectivity. Trustworthiness may change with the passage of time. A source may have divided and conflicting loyalties, and the evaluator should anticipate circumstances under which that per- son's loyalty might be weakened or turned to active hostility in the future. Loyalty of a source may be determined to some extent by background, past performance, and present position. For example, an officer or enlisted man in the United States armed forces would be given a higher loyalty rating, and hence considered more trustworthy, than a citizen of a neutral country or a prisoner of war. The motive of a source in giving informa- tion must be carefully considered. Perhaps he acted under the stimulus of strong emotion, such as jealousy, revenge, patriotism, or fanaticism. Motives are sometimes revealed by the manner in which the information is made available, or by a study of the source's background and personality. Objectivity is even more difficult to determine than loyalty and motive. Every individual has certain prejudices and no one is a completely objective witness, so that the analyst must try to determine whether or not the report is biased or objective. What a collector sees and reports may be colored by subconscious reactions to certain things or little idiosyncrasies of which even he may be quite un- aware. Few people have photographic memories or the ability to reproduce at a later time all of the significant points of a lengthy conversation. Per- sonal interpretation is a common failing. Because of these various hindrances to objectivity on the part of the observer, the analyst should know as much as possible about the reporter and be con- tinually on guard against personality factors which can impair objectivity. The third question regarding reliability relates to the competency of the source. What have been Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL his training, experience, and opportunity for judging what he has seen? An observer who is known to be an expert in a given field of knowl- edge may usually be presumed to be competent in related fields. If in the past he has been a close and accurate observer, whether or not he is aware of the full implications of what he reports, the chances are that his information has value. The reporter who has lived in a foreign country for several years will usually supply more discerning comment than will the reporter who has newly arrived on the scene. Competency also involves the ability of the observer to gain the informa- tion in question. What would have been his means of access, or would he have been in a position to observe what he has reported? Testing the Information As already indicated, the evaluation of the con- tent of information is a matter of judging the degree of probability and accuracy. To what ex- tent is it true or possible? Three helpful criteria at this point are: coherence, credibility, and con- firmation. The use of these criteria depends, of course, upon the quantity of similar information received and the nature of the information itself. If, for example, no similar information has been received, the use of the criterion of confirmation may not be possible. On the average, it is to be expected that new information of value will have coherence, that is, it will be consistent within itself and its ideas will be related to each other in a logical manner. If it is self-contradictory, its probability is immediately subject to question. Relevant details add to the coherence of information by amplifying general statements which might otherwise be vague and of little value. As a criterion, however, coherence is only preliminary and by no means conclusive. Completely inaccurate information may appear to be logical and consistent, while sound information may seem to contain some inconsistencies. Nor do details in and of themselves insure correctness; yet they do provide additional means of verification. Credibility is determined by the way the infor- mation fits into the general pattern of activity of which it is a part. It is worthy of belief if con- sistent with the accumulated body of intelligence. Startling information which is completely con- 251 trary to the general progress of events or the be- havior trends of individuals or groups becomes suspect to the analyst. The analyst's own experi- ence in processing and general background knowl- edge are particularly useful here. He must be alert to the subtleties of behavior patterns which on the surface appear to vary and change. This alertness should prevent him from discarding in- formation just because it does not at first appear to be consistent with his general knowledge. How- ever, it is more often the case that a report which is consistent with available intelligence is worthy of credence. A report which is at variance with the intelligence at hand should be subject to fur- ther study, even though it has met the criteria of coherence and confirmation. The confirmation of the content of information by other specific information on the same or related subjects greatly increases its degree of probability and accuracy. By means of this criteria, new in- formation may be confirmed, not confirmed, or contradicted. Two reports containing similar data, but originating from different sources, must be closely compared down to the smallest details, if the information contained therein is to be con- firmed. Minute differences do not as a rule destroy the value of those portions of the two reports which can be reconciled. The compatability of new information with known facts may aid in its confirmation. For example, an operational report may give a new location for certain enemy fleet units. If these units have the capability of reach- ing the new location from their last known posi- tion, and if this new disposition is in agreement with the current operational situation, then the report assumes greater degree of accuracy. To be emphasized is the fact that the degree of accuracy of new information cannot be established by satisfying only one of these three criteria. Coherence, credibility, and confirmation are inter- related, so that an item must be judged accurate in proportion to the degree it satisfies all three. The reliability of the source is another factor which may be considered. Problems of Evaluation The evaluation of new information is often diffi- cult and complicated by a number of problems, some of which can be minimized by the collector. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Such problems include improper identification, in- accurate or incomplete reporting, duplicate report- ing, contradiction, and determination of inherent meaning. If the new information concerns persons or places, the greatest care must be taken to identify them completely. Surnames must be combined with complete given names to avoid mistaken iden- tity. If the surname is a common one, it may be necessary to include birthdate and physical de- scription to make sure that there can be no mis- understanding as to the particular individual in question. Variations in spelling and aliases must be noted. In the case of places, the use of geo- graphical coordinates, reference points, and phys- ical relationships to known positions can be ex- tremely important. This is especially true of places in areas which are little known, have not been completely mapped, or where local names are the colloquialisms of indigenous groups. Inaccurate, careless reporting can and does re- sult in inconsistencies and incoherent logic. Ex- cessive wordage and long, involved comments can obscure the facts of the case, complicating the work of accurate evaluation. Poor editing itself may result in failure to note typographical errors and incorrect inferences which, in turn, can cause faulty reasoning based on false premises. Ten- dencies to insert personal opinions and wishful thinking in reports make it difficult, if not impos- sible, for the analyst to separate fact from fancy. Incomplete reporting results from failure to in- clude all pertinent details in a report. For exam- ple, care should always be taken to identify the source of the information, if at all possible. When this is impossible or inadvisable, some evaluation should be given of the source as well as the content. One of the most serious problems faced by the analyst is that of duplicate reporting. Informa- tion regarding the same topic may be received from different transmitting agencies so that one report tends to confirm the other, even though both agencies have received their information from the same source. The dangers of this situation are well illustrated by reports which reached Wash- ington during World War II from two different collecting agencies regarding the identification of Nazi military units in an occupied country of Eu- rope. Although the information of both reports CONFIDENTIAL 252 was the same in every detail, the sources appeared to the intelligence processing units to be quite dif- ferent, apparently providing mutual confirmation. It later developed, however, when the two collect- ing agencies in the field compared notes, that the source of both reports was identical, and hence there was no real confirmation. Great care must be taken to avoid false confirmation. In attempting to evaluate new information, the analyst may find two or more reports on the same topic which are completely contradictory and im- possible to reconcile. The only action possible may be to summarize both reports, with no con- clusion, and wait for further information which will permit accurate evaluation. At all times, evaluation can only be made on the basis of infor- mation actually available to the analyst, even though the existence of additional information is suspected or known. In such cases, the analyst must exercise the greatest caution and discretion, keeping in mind that well-founded doubts must be resolved in favor of the Navy. Determination of Inherent Meaning Testing for the degree of reliability and ac- curacy of new information does not complete the function of evaluation. It is still necessary to determine what this information actually means and thus how it may affect the total body of knowl- edge relating to the subject. Sometimes a report may have no significance, or its significance is obvious; sometimes parts of it make good sense, but other parts are still obscure and questionable. A detected flight of enemy bombers may on one oc- casion indicate a strike at only one target, but in other situations the attack may be directed against one or all of several possible targets. The move- ment of enemy barges may mean the reinforce- ment of a particular advance base or the staging of an amphibious operation according to the at- tendant circumstances. When the significance is obvious, dissemination of the information should be immediate. When the significance remains in doubt, further processing is necessary. This early determination of meaning in the total processing operation does not necessarily in- volve immediately the later function of interpre- tation, although the nature of the information may permit interpretation to develop rapidly from Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL its accurate evaluation. In many cases, this de- termination of meaning concerns only the direct implications of the information to a particular subject or situation. Therefore, further process- ing is required in order to place this new informa- tion in its proper perspective and to relate its significance to the total body of knowledge. Often confirmation of the content of information will merge into the processing function of analysis. ANALYSIS Various explanations may be given of the mental activity which takes place in many instances from the time new information is being evaluated until the time it is interpreted and transformed into in- telligence. Some of these concern themselves with features of inductive and deductive reasoning and make use of such descriptive terms as analysis, col- lation, and synthesis or integration. These ex- planations can be helpful; they can also be con- fusing. Since it is extremely difficult to isolate or distinguish between some of these mental activ- ities, they may all be included, from a practical point of view, in the general function of analysis. An essential factor in processing, analysis is the comparison of information with known facts and previously evaluated data in order to determine relationships which may lead to pertinent infer- ences or conclusions. These relationships, in ef- fect, become new, more comprehensive facts. During analysis, a study is made of the compo- nent parts of evaluated and related facts, their inter-relationships, and their effect on established patterns of activity. After the careful weighing of these parts and reaching of a composite judg- ment regarding them, they are then fitted together into a meaningful, coherent whole. The process of analysis is one of distilling and refining, of sepa- rating and re-combining. Sensitivity on the part of the analyst is required to catch all implications of the facts under consideration and to visualize every possible combination which will lead to fuller understanding and meaning. Analysis often aids in resolving contradictions and reveal- ing the need for, if not the existence of, missing information. It frequently leads to the re-evalua- tion of the information being studied. For the intelligence officer and the analyst, the function of analysis requires a fund of accumu- 253 lated knowledge, personal liaison with those who are authorities in the particular subject field under consideration, and intensive research. The re- quired fund of knowledge is more than personal training and years of experience; it involves the ready availability of pertinent material which has been indexed and filed, together with the utiliza- tion of devices whereby this material can be con- sidered in an orderly, logical manner. Effective personal liaison is also a practical means of fur- ther expanding the fund of knowledge, as required, to meet the needs of the analyst. It brings to bear on the problem additional points of view. Research Methods Research means careful searching, studious in- quiry, and exhaustive investigation. It is an in- valuable aid in helping to fill in some of the gaps of missing information. It provides important factual background, contributes to the verification of new information, and assists in the identifica- tion of material. It also contributes to the dis- covery of relationships which give meaning and significance to what might otherwise be discon- nected facts and data. The materials for research include written rec- ords, files, reference books, newspaper clippings, encyclopedias, and libraries, both general and spe- cial. Careful documentation of facts is, of course, essential to good research. In the compilation of data, working bibliographies should be prepared from card-index files, periodical guides, newspaper indices, and other reference guides. Each refer- ence should be entered on a separate card. Indi- vidual cards should then be grouped according to major items of interest. From the study of evaluated information and additional data gathered by research methods arises one or more tentative explanations or the- ories. As additional material is accumulated, the tentative explanation or theory is strengthened or weakened, or one or more appear to approach more nearly to the truth. Logical reasoning and sound judgment play an important part in this mental process which results in the drawing of pertinent inferences and the reaching of meaningful conclu- sions. To be avoided is the ready acceptance of the first reasonable explanation and conclusion derived from an analytical study. Thorough re- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS search will tend to insure greater accuracy of the function of analysis. INTERPRETATION Interpretation is the determining of the fullest possible meaning of partially processed informa- tion, considered in relation to all other pertinent knowledge and in the perspective of current plan- ning. Depending upon its source and content, information can be, and sometimes is, given in- terpretation almost immediately after receipt. In some cases, its meaning is obvious. More often, new information must be subjected to the process- ing functions of selection, evaluation, and anal- ysis before the most accurate interpretation can be made. The full meaning of information inevitably re- lates to its effect on an existing condition or situa- tion. Does this new information alter or add significance to what is already known? Does it tend to confirm or disprove what is now believed to be true ? What are its implications? Correct interpretation completes the final transformation of information into intelligence ready for use. When strategic uses are involved, interpretation must take into consideration all relevant compo- nents of intelligence knowledge: military geogra- phy, transportation and telecommunications, sociological, political, economic, scientific and tech- nical, armed forces, and biographical. It must be comprehensive if it is to give accurate indication of a foreign nation's capabilities or intentions. As new information is processed, the interpretations made will affect in some manner the current intel- ligence estimates of that nation. New capabilities may be discovered, and old ones discarded. When operational uses are being considered, in- terpretation can supply the commander with in- telligence vital to his estimate of the situation and his selection of the course of action which will most nearly permit the fulfillment of his assigned mission. For example, knowledge of the disposi- tion of opposing enemy forces is not completely processed intelligence. Such knowledge is finally processed only when it has been interpreted in con- junction with such factors as terrain, weather, log- istics, and morale. Full meaning will relate to the capabilities of the enemy forces to initiate or resist an attack. CONFIDENTIAL The intelligence officer and the analyst can best perform their function of interpretation only when fully aware of the direction of current plan- ning. They must also make full use of their own knowledge and experience. Other factors in in- terpretation are logical reasoning and conscien- tious consultation with associates in order that an accurate and valid interpretation can be most nearly assured. Acuteness and ingenuity are req- uisites for the interpretation of all implications which may arise out of processed information. ACTION IN PROCESSING As used in processing, the term "action" refers to requests for further collection, the preparation of reports and studies, and the initiation of rec- ommendations regarding policies and planning. At any point in the processing phase of the cycle, the analyst may require additional informa- tion or amplification of information being proc- essed. Accordingly, specific requests for collection are addressed to available agencies. Such requests should include detailed requirements and time lim- itations. Close coordination of the efforts of col- lecting and processing units can greatly increase the overall efficiency of intelligence production. Processing units should fully understand the lim- itations and capabilities of the various collection agencies; at the same time, the collection agencies should endeavor to anticipate the requirements of processing and transmit information in lucid and usable form. The preparation of the first draft of reports and studies begins with the review and grouping of the analyst's reference cards. The objective is to present ideas in clear and simple language, so that the completed study may be clear, logical, and complete. Critical, objective review is necessary to make certain that no false implications and er- roneous inferences can be drawn from the state- ments made. Any excursions from the central theme should be rigorously excluded or, if there is a need for such observations, they should be relegated to a separate appendix rather than per- mitted in the main text. At times, the interpreta- tion of new information may suggest the need for changes in or modification of current policies and planning. Completely new policies and major re- visions in planning may appear to be urgently 254 pproved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL required. In such cases, appropriate recommenda- tions, carefully documented and substantiated, should be prepared for forwarding to the action agencies concerned. The decision as to the proper action agency and other interested agencies which should receive the intelligence product leads to dissemination, the third phase of the cycle. AN ILLUSTRATION OF PROCESSING Some of the functions of processing and prob- lems faced by intelligence personnel may be better understood when applied to a specific intelligence situation. For purposes of simplification, the sit- uation selected for discussion is one which con- fronted a Norwegian intelligence activity located in neutral Sweden during World War II. Through close liaison with the underground organization in occupied Norway, a wealth of in- formation was received concerning the activities of German submarines operating out of the huge concrete pens at Bergen and Trondheim. The underground found it extremely difficult to over- come the stringent security measures effected at these installations and only on rare occasions did opportunity arise for close observation. The Ger- mans, however, sometimes employed Norwegian laborers to carry supplies on board U-boats out- fitting in "Dora," the pens at Trondheim. One of these laborers was a loyal patriot who faithfully reported his observations to representatives of the underground. No loitering was allowed any of the workers around the pens, and certainly a man bent over with a heavy sack on his back is not in the best position for observation. Besides, he had no knowledge of submarines and was unable to identify technical equipment. Nevertheless, his reports were carefully scrutinized when they reached Sweden. One of them contained a puzzling bit of information. In the course of a rather garrulous account of his movements while carrying boxes and sacks of supplies from the warehouse to the U-boat, the observer mentioned that he had to step over a "riir" lying on the deck. What was this "riir" ? The Norwegian word means "pipe" and is used to describe many kinds of structural tubes. What was its diameter, length, of what material was it made? Was it a water pipe, a wire conduit, a new periscope? Could a sketch of it be supplied? Back to Trond- 255 heim went a request for more information. In about a week a reply was received, accompanied by a very crude sketch. The sketch was of little value; it revealed no detail and was not drawn to scale. The supplementary information was some- what more helpful, although the observer did not really get a good look at the pipe because there were too many German sailors standing around it. As he recalled, the part of the pipe he stepped over was about two feet in diameter. No, he didn't think it was a periscope. He couldn't tell what material it was made from since it was painted the same color as the rest of the U-boat. It was lying just forward of the conning tower. That was about all he could remember. How could these meager facts be evaluated and interpreted? The source was certainly authentic. Trustworthy? Yes, that too, for he was motivated by patriotic desire to aid his country's cause, and was completely vouched for by the underground. Competent? Unfortunately not. He was one of the unusual Norwegians who had never been to sea, nor had he ever worked as a stevedore or any- where around a dock area. He had worked all his life with his hands, but had never operated ma- chinery of any kind. He also doubted that he would get another work assignment in "Dora," since his gang had been transferred to another part of the city for road repair. To what further tests could the information be subjected. There was no possibility of con- firmation by other sources available to the under- ground. Was it coherent, or credible in the light of existing information? The U-boat had been positively identified by coast-watchers, and the names of the commander and many of the crew were known. It had been in the pen twenty days, long enough for minor repairs and installation of new equipment. Were the pens capable of making new equipment? No, everything came from Ger- many, but installation could be made either by the U-boat's crew or by certain German tech- nicians employed at the pen. Consultation with a refugee Norwegian naval officer, who had once been a submariner, brought no new leads or suggestions. At this point there was not much to analyze, or interpret. Yet anything new on U-boats and their operations had a high intelligence priority and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR was eagerly scrutinized by the Allied intelligence agencies in London. Perhaps the pipe would mean something to a staff expert on submarines. Accordingly the information was sent to London. An immediate reply was received, directing that every effort should be made to continue the obser- vations at "Dora," and to note especially the pres- ence of similar "pipes" on other U-boats. The Norwegian underground renewed attempts to penetrate the pens at both Trondheim and Ber- gen, but several weeks passed without result. Ger- man vigilance had not been relaxed. Then came a report from the Admiralty that a damaged U-boat had been captured in the North Sea. It was equipped with snorkel. The mystery of the "r6r" was solved. It was a logical inference that U-boats were being equipped with snorkels at bases in Norway. Full description and accurate drawings were now available and coast-watchers henceforth could identify snorkel on U-boats pass- ing through Norwegian fjords. Strategic and tactical planners had to cope with a new U-boat capability. The incident was certainly not a triumph for intelligence, as far as its forewarning function is concerned. It could have been if the "rOr" had been seen by a competent observer. It does illus- trate, however, typical frustrations in the collect- ing and processing of information. Little things have significance only when they are correctly interpreted. PERSONNEL FOR PROCESSING Any discussion of the functions of processing quickly reveals the requirements for a highly com- petent and skilled staff of personnel, both military and civilian. The experiences of intelligence agencies during World War II emphasized above all the need for personnel possessed of the peculiar talents required in processing information into a product of real value and use. It must be re-em- phasized that not just any officer can be assigned to an intelligence processing billet and expected to produce satisfactorily. In an age of specializa- tion in so many fields of endeavor, Intelligence has of necessity also become a specialized activity. However, particular training is not alone suffici- ent; selected personnel must have capability and adaptability for this particular activity. This is CONFIDENTIAL NAVAL OFFICERS equally true for civilian personnel, so that their selection involves much more than a consideration of paper qualifications. Since mental capabilities must be demonstrated, flexibility in the assignment of personnel is essential. Acquirable qualifications for analysis include a college education, preferably with experience in research methodology; demonstrated ability to write; experience in intelligence activity, includ- ing knowledge of intelligence functions and re- sponsibilities; and, whenever possible, a working knowledge of the particular language of the area of interest to which assigned, as well as travel or residence withi:n that area. In addition to training and experience, the qual- ities of the analytical mind are indispensable. These qualities include objectivity of approach, an enthusiasm in the painstaking search for perti- nent data, and a capacity for developing relation- ships between facts. Imagination, a sensitivity to implications, and a positive reaction to subtle changes are mental qualities which must be applied to the problems of processing. Common sense and a practical realization of the pressing requirements of intelligence production are significant temper- ing factors. Analysts can seldom live in worlds of their own. As integral personalities of the processing unit they must work in the full spirit of cooperation so that the intelligence product can be the result of the integration of varied points of view. Over- all harmony cif effort can come only out of indi- vidual adaptability to and consideration of the interests of coworkers. Self-restraint in spite of tension and stress can do much to assure orderly and effective activity when the time element im- poses heavy pressures. Above all, the analyst must have a balanced point of view and a well- grounded sense of values; the processing unit is no place for the extremist. Finally, he must be con- vinced of the importance of intelligence produc- tion and clearly appreciate the relative significance of his own contribution. The answer, then, to good processing is not merely organizational structure, important as organization and sound administration are for any group; rather, it is the quality of personnel who make up the structure. The simple fact is that the quality of intelligence produced is directly 256 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Reilplista9MM: gimp@?gagglgR0001002100086NFIDENTIAL proportionate to the quality of the individuals who produce it. TECHNIQUES AND AIDS In connection with processing, two points should be re-emphasized. First, the transforming of in- formation into intelligence requires a high degree of professional competency, judgment, and ex- perience if the results are to be consistently worth- while. Second, the functions of processing can- not be systematized into a series of assembly-line procedures. However, because of the quantities of information involved, various techniques and aids are commonly used by means of which infor- mation can be acquired, extracted, indexed, and compiled on a logical, systematic basis. These techniques and aids are of material assistance to the various functions of processing in more nearly assuring their completeness, accuracy, and time- liness. The following techniques and aids can be help- ful, although their utilization will vary according to the requirements of a particular analyst: liaison with sources, including records of performance; files and file controls; situation maps, charts, graphs, and statistical tables; and periodic digests. The sources of an analyst's information are vital in connection with evaluation and further collec- tion as required. Liaison with these sources may be accomplished by personal interview and by the written exchange of comments, suggestions, and analyses regarding information which has been transmitted. Any means by which the most cor- dial and sympathetic relationships can be estab- lished and maintained with the sources of informa- tion and with transmitting agencies will prove valuable. As has already been suggested, source identification and performance records, when it is possible to keep them, can be helpful both to the processor and to the collector. Files Card files are generally used by analysts for day-to-day working purposes. They are a prac- tical means of recording extracted pertinent data from lengthy reports or more bulky written mat- ter and for the easy assembling and arranging of relevant facts in whatever logical manner the topic under consideration suggests. On one card may 269196-54 18 257 be listed the chronological developments of a par- ticular topic, so that a current situation can be noted almost at a glance. A separate card for each source may be used for the recording of in- formation received on the same topic, so that ready comparison can be made at any time. Card files permit the subdividing of subject matter into its smallest possible elements thus facilitating a num- ber of the processing functions. Reference files contain the correspondence, reports, and more bulky written matter from which card files are prepared. In the use of ref- erence files, selectivity and good judgment on the part of the analyst are required. While the loca- tion of these files is not of major importance, it is imperative that their contents be readily available. Availability necessitates rigid controls. Control of Files The control system for any files depends in large part on their size; if small, they are usually organized on the basis of subject; if large, on the basis of numerical designations, supported by a card catalogue guide. When files are organized by subject, particularly in the case of intelligence card files, they are often subdivided according to names of individuals, organizations, places, situ- ations, and trends. Controls are greatly strengthened by the cen- tralization of files and the most exacting cross- ref erencing of subject matter. When several separate units retain reference material indefi- nitely, the very fact of its existence may not re- main known to all who have an interest in it, and its transfer from one unit to another may become haphazard or result in loss or at least uncertainty of location. Centralized control increases avail- ability as well as security. Cross-referencing is a means of increasing the possibility of locating reference material, regardless of the way in which it is requested. For example, information about a person will logically be filed under his name. In addition, cross-reference cards or forms may be filed under his country of residence, occupation, military unit, or the incident or incidents in which he has been involved. In this manner, the analyst is likely to obtain all relevant information con- cerning the topic with which he is working. Also, pertinent data is less likely to be overlooked. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENAIEP roved For Re leafsNeT?20341M9 1;09 plkifvoz8ganla5R000100210002-9 Filing systems are established for purposes of uniformity. They must meet the needs of the units they are designed to serve. For United States intelligence agencies, the Intelligence File Index, called IFI, has been created and is in use. It is a decimal filing system which includes a four- digit number for each basic element of subject matter and uses up to four decimal places for the additional subdivision of each element. For example, the 4000's are set aside for economic matters; within the 4000 block, the 4200's are used for fuels, metals and minerals; 4203 is petroleum; and 4203-0408 refers to the production of syn- thetic oil. When reports are received, the analyst is expected to attach a sheet on which he enters the appropriate IFI numbers. The report and attached sheet then go to the filing unit where all reports pertaining to the same subject are listed on a master control sheet, according to the assigned numbers. Maintaining Files Obviously, the maintaining of files will vary according to the size and location of an intelli- gence processing unit. Needs, working habits, and physical facilities are not uniform. A unit consisting of one officer and an enlisted man will of necessity vary its procedures from one which includes a larger group at the theater or depart- mental level. However, a carefully planned file system to meet the needs of the particular situa- tion is required if intelligence production is to be carried out efficiently and effectively. The follow- ing practical suggestions will apply to a variety of conditions. The basic purpose of files is the full utilization of available data. Reference files should group individual pieces of information under general topic headings. This may seem too obvious to require elaboration, but the fact remains that the average person does not know how to develop good files with adequate cross referencing, and every intelligence activity acquires extensive collections of facts and data. The intelligence officer must be able to locate precise information when it is needed. One requirement is the orderly arrange- ment of books in a reference library. A logical way to proceed is to survey the physi- cal facilities available in the form of file cabinets, CONFIDENTIAL 258 card files, map and chart cabinets, and safes in which to stow classified reports. Within the prac- tical limits of time and space available, the intelli- gence officer should review the missions of his commander, particularly with respect to the geo- graphical areas in which he is likely to operate, and then plan hs files to meet his needs in a simple and logical manner. In order to be prepared for the great variety of requests for information that will be directed to him, he must review his filing needs with some imagination and insight. Mere filing of information by an intelligence officer is not enough. He must be familiar with the contents of the file, and this can be attained only by occasional review. He should not put too much reliance on his ability to remember details with unfailing accuracy. The best of cross refer- ence systems have their limitations. Either they tend to be incomplete or it takes too much time to compile them. Finding the right balance between cross indexing and an actual review of the whole file from time to time is a matter of experience. The clerical chore of filing may be left to office assistants to a certain extent, but no intelligence officer can afford to develop such an executive com- plex that he is not intimately familiar not only with the filing plan he creates, but also with the actual filing that is done. An office that collapses in the absence of the filing yeoman has no place in intelligence activity. The mechanics of filing also merit attention. Manila folders or large envelopes with clearly printed labels will prove most satisfactory. Dividers separating groups of folders or envelopes under more general topics are also helpful. When special logs, card files, or charts are compiled, they should be designed with real forethought to com- bine logical entry of information from source with maximum convenience in later use. Kardex files are frequently a help, and in large archives micro- films and film readers are a definite advantage. Incoming publications and, reports should be handled by a routine entry in a log with appro- priate notation to indicate routing and final dis- position. If a general subject index is maintained, the new card should be made out promptly and the file number marked on the material. When material is loaned for outside use, normal military practice, in accordance with security reg- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Rse : CIA-RDP85G00105R00010021000.2z9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL ulations, requires custody cards and receipts. It is suggested, however, that a card or note inserted in the file itself will be an additional reminder of missing material to the individual using the files. The intelligence officer should use his imagina- tion and good sense in planning his files, remem- bering that orderliness and system pay very real dividends. In operational intelligence the use of special recording forms has been found to be ad- visable. These will be discussed in the chapter on Intelligence Staff Procedures. Other Aids Visual aids such as situation maps, charts, graphs, and statistical tables often provide the best means for comparing and interpreting cer- tain types of information. Situation maps are adapted to the study of relationships between ship and troop location and movement, attacks, logistics supply, production facilities, and population dis- tribution. The influence of geographic and time and space factors on a current situation may be- come more apparent as the result of the use of area maps on which appropriate information has been plotted. By such methods, enemy capabili- ties and limitations may be further clarified. Charts, graphs, and tables are of assistance in the compiling and comparing of information re- lating to economic and sociological intelligence. Periodic digests may be prepared in order to summarize information for which the chronologi- cal sequence of events is important. They are also helpful in considering subject matter, such as political events, which requires more detailed data than could be easily included within a manageable series of cards. Mechanical Brains and Punch Cards New technological developments are effecting every type of warfare and even the processing of intelligence. Some involve the techniques of cybernetics, the use of so-called "mechanical brains." In simple forms, electric calculating ma- chines are standard in most offices, and punch card tabulating and printing machines are used wher- ever statistical needs develop on a large scale. They produce raw census data, trade statistics, and many industrial records. In the military field they 259 are used for personnel records, accounting, inven- tory, and procurement purposes. Since intelligence processing may involve the combination, matching, and tabulation of literally millions of quantitative facts, the punch card and the machines which use it are familiar to central offices such as ONI or large theater intelligence centers. More recent is the rapid development of elec- tronic machines of both analogue and digital types for solving involved problems. They are playing an important role in military research in ballistics, aerodynamics, and related fields, and operationally they do the computing required by modern guns in tracking targets and controlling fire. As these machines become physically smaller, additional uses will be found for them in the field. On an experimental basis they are already being used in solving problems of strategy. Intelligence agen- cies will have the responsibility of supplying quan- titative data in the tremendous detail needed for meaningful results. The "mechanical brains" can take raw information on enemy capabilities and vulnerabilities, compare it with similar data on our own forces, and statistically produce the answers that will determine the best courses of action to pursue. They can measure in concrete terms whether we should concentrate on strategic air attacks on the enemy's basic industry, or whether our targets should be military installa- tions, harbors, or merchant shipping. The ma- chines can accomplish in minutes what men could do only in months, but the machine cannot give an answer better than the quality of the raw data fed into it. Therefore, the successful application of these advanced techniques will be in no small measure due to good information. An increasing number of intelligence officers must become aware of the potential services the "mechanical brains" can render. OPERATIONS RESEARCH A particular application of intelligence is in operations research which represents a blending of intelligence processing and intelligence use. The mechanical brains and punch cards, briefly de- scribed above, need a guiding set of principles if maximum results are to be obtained from them. Some of these principles are discussed in a work CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS by John von Neumann and Oskar Morgenstern, Theory of Games and Economic Behavior, first published in 1944. The theory of games has led to the development of mathematical theories of strategy under the exploitation of the three mili- tary services. This is not as strange as it seems, for the relationships in playing games, in business, and in war have certain similarities. The intel- ligence significance of these studies is apparent in the quotation: "Von Neumann's theory suggests that the seeking of information is central to the nature of strategy." (Fortune "A Theory of Strategy," June 1949 p. 104.) Military applica- tions of these principles were begun by ASWORG (Anti-Submarine Warfare Operations Research Group) and have continued to be used in other problems. Some of the first naval applications involved the problems of the pilot of an ASW aircraft in choosing a tracking and search pattern to maximize the likelihood of locating the submarine. Among the several agencies engaged in oper- ations research, the most unique is the Rand Cor- poration. The story of its creation and function has been admirably told in an article by John McDonald entitled "The War of Wits", published in Fortune magazine, March 1951, portions of which are quoted below: Rand is a creation of the United States Air Force. It is not, however, a government agency. It is an independent, non-profit or- ganization, similar in some respects to a foundation but without exact precedent; and it has numerous consultants and subcontrac- tors in universities and industries. Its prin- cipal business is long-range, scientific, mili- tary research, designed to aid Air Force decisions. Modern science and modern mili- tary art are joined here in a program of brain- work that may have considerable bearing on the security of the United States. Mr. McDonald continues with an indication of the wide range of the Air Force problems being considered by the Rand Corporation: A-bomb de- fense, A-bomb delivery, tactical operations, and logistics. Many of these studies are significant not only to the Air Force, but also have the most vital implications for the entire defense establish- ment and the nation, since they have as a govern- ing concept the preservation of national wealth and resources. Rand's view is that "the cheapest CONFIDENTIAL 260 way to win a war is not to have to fight one." The staff of this remarkable organization is as varied as the tasks they undertake. It is com- posed of nuclear physicists, electronic experts, air- craft and guided missile experts, students of lo- gistics, political scientists, economists, sociologists, psychologists, astronomers, and mathematicians. Further quotations from the article cited above are equally informative: Rand's social scientists are making a study of, among other things, Soviet Russia's in- terests, aims, and values, her -political and social structure, and her proba-Ole scientific, technical, and industrial capabilities at vari- ous future dates; in sum, her total war poten- tial?for the purpose in part of comparing these observations with the character and capabilities of the United States and its allies. But the era has passed when the techno- logical improvements of gadgets is the only scientific problem of warfare. Science and technology are continuously coming up with so many and such complicated military de- vices that even a nation as rich and advanced as the United States cannot afford, in terms of money, manpower, or available engineering effort, to develop all of them to their technical limits and produce them in significant num- bers (this goes for the enemy too). Given a budget the Air Force allocates its resources among various activities (offense, defense, tactical air, etc.) to perform its over- all mission in the best possible way. But in the pursuit of this mission it does not choose the grand strategy; its own Strategic Air Command is responsible directly to the Joint Chiefs of Staff, and the button is on the desk of the Commander-in-Chief in Blair House. (This was written during renovation of the White House.) It cannot always choose its targets (as between, say, military installa- tions, industry, and cities) ; nor its weapons, for weapons, too, are political. This was true even before the decision to drop the first A- bomb, and has been even more decisively the case since then. Similarly the Air Force has to consider the intentions as well as the capa- bilities of an enemy, since intentions affect the determination of when he will use what, and the question whether he will use certain capabilities at all. Rand, therefore, studies the social and po- litical framework in which the big strategical decisions are made, along with the more strictly scientific agenda. The bulk of its work, however, is concerned with the alloca- tion of resources. . . . Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 THE INTELLIGENCE CYCLE: PROCESSING CONFIDENTIAL In the Rand analysis the target's resistance is defined by bracketing the enemy's expected capabilities at a specific time era in the future. The order of attack is set up against the ene- my's assumed order of battle. The enemy's deployment is an intelligence problem. The enemy is assumed to be rational, with no holes left uncovered in his apportionment of de- fenses to targets?the "no soft spot" theory, which is derived from the von Neumann- Morgenstern theory of games. Rand math- ematicians have extended the development of game theory as a new and challenging doc- trine of military decision. From the solution of this first relatively simple bomber problem emerged Rand's principal research technique known in the shop as "systems analysis." There is more to offense and defense sys- tems, however, than allocation of resources and specifications of weapons. The payoff of a strategic bombing force is what the bombs do to an enemy?particularly the will and ability to wage war, through physical, eco- nomic, political, and psychological effects. Strategic bombing, for example, has a strong influence on the attitude of enemy popula- tions?equal perhaps to the impact of our war aims. What then should be our policy on enemy people and their leaders? Should we undertake a warning system for enemy popu- lations? What does a 90 percent target knockout mean in terms of productivity? Facts gathered by intelligence agencies are not of much use without a guiding concept with which to separate the relevant from the irrelevant. Designers of bombing systems thus have to take into account social problems along with the physical problems presented by nature. With such broad and varied questions in mind, Rand studies Soviet Russia, her inten- tions and capabilities. It is common knowl- edge that the United States industrial and general war potential is superior to Soviet Russia's at this time. But are they catching up? Does the Politburo have freedom of choice, flexibility, random behavior? What is its pattern of political behavior? How does the ordinary Communist have to think to translate doctrine into action? When attack? When retreat? When sound hostile? When friendly ? One of Rand's contributions is a codification of principles of action underly- ing the Politburo's calculations, made as a step toward predicting what it is likely to do. This type of operations research, then, is just a variation on intelligence processing in general, 261 though brought to a high level of achievement for the specialized tasks assigned to the Corporation. CONTRACT STUDIES: THE FLYING SAUCER Rand Corporation is only one of many private agencies that perform specialized studies for the armed forces. Large contracts in many fields of investigation have been made by all three services, though by no means do all relate so directly to intelligence matters. One particular project which illustrates many of the problems of process- ing, and which also involved contracts for anal- ysis by a number of outside agencies, was the well publicized flying saucer mystery. Kenneth Ar- nold on 24 June 1947, claimed to have seen some mysterious disks cavorting over the Cascade Mountains. Within a few days saucer reports poured over the news wires from all parts of the country. Witnesses in time included military pilots, weather observers, police, astronomers, and many ordinary citizens. That summer there were many wild rumors and quite contradictory reports on the saucers. Despite all official denials the be- lief persisted that the saucers were real, whoever controlled them. On 7 January 1948, at Godman Field, Ky., a mysterious object was sighted in the sky by control tower personnel. Captain Thomas Mantell who was in the air in an F-51 gave chase, and the re- mains of his plane were found crashed to earth. On 22 January 1948, the Air Force set up a re- search project on these sightings at the Air Materiel Command, Wright Field. Astrophys- icist Joseph Hynek, and the Rand Corporation among others, went to work to study the reports. Eastern Air Lines pilots, Clarence S. Chiles and John B. Whitted, flying a DC3 on 23 July 1948, west of Montgomery, Alabama, had a brief look at a mysterious wingless, cigar-shaped craft which had two rows of blue glowing ports and an orange- red flame projecting from the tail. On 1 October 1948, Lieut. George Gorman at Fargo, N. Dak., chased a mysterious maneuverable light in his F-51. These gyrations of plane and light were watched from the ground. Another of the more interesting cases was that made public on his own responsibility by Comdr. R. B. McLaughlin of the White Sands Proving CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Ground. His report of a sighting on 6 April 1948, claimed a saucer 105 feet in diameter some 56 miles up had been tracked by theodolites at 18,000 miles per hour. There were also 2 smaller objects about 20 inches in diameter that maneuvered around a fast-moving Navy missile, then passed it and disappeared. In 1950, 1951, and 1952, there were additional flurries of reports. \ An Air Force release in 1949 admitted that 375 sightings had been investigated up to that time. The count by more recent esti- mates is not available. What evaluation can be made of all these re- ports? The first step was to interview those who thought they had observed saucers in order to sort the first hand reports from rumors and distorted accounts. The observations were then analyzed to discover any patterns of similarity. Agencies responsible for operations that might be confused with saucers reviewed all cases to eliminate easily accounted for phenomena. The contract groups and other agencies reviewed all remaining cases to see whether natural phenomena, astronomical or meteorological, or subjective reporting could account for what was seen. Large numbers of sightings could be explained as weather balloons, Navy cosmic ray research bal- loons, meteors and fireballs, lightning, light re- flected from distant aircraft, and occasionally as the planet Venus. Some cases were a result of hallucination, hoax, or hysteria. To some analysts there seemed to remain a hard core for which no CONFIDENTIAL 262 definite cause could be assigned positively, al- though plausible explanations could be offered. Certain deductions could also be offered. If there were real saucers and they represented a secret weapon of either the United States or Russia, they were exposed to possible compromise by appearing in so many parts of the world with reckless dis- regard for safety of cities, normal air traffic, or security measures. Further, their reported speeds and turning ability would indicate new propul- sion and guidance systems far superior to those all world powers are spending billions to develop. Could they be from outer space? Although that possibility does exist, certain probabilities must be considered. Only Mars offers prospects of life similar to that on Earth and its rarified atmos- phere and extremes of temperature would seem to militate against an environment that allows the development of higher life forms. Other stars may be postulated to have planets, but the im- mense distances would reduce statistically the chance of our being visited. If a superior civili- zation were spying out the earth, it would be odd that it would disclose its presence so many times without making contact. The flying saucer mystery must be left for the present as one of those tantalizing enigmas of life that will be discussed for a long time to come. This brief account by no means answers the many questions about the saucers, but it does illustrate the many possibilities for evaluation and analysis of this type of information. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R00010021u00lu02-9 uNFENTIAL CHAPTER 11 THE INTELLIGENCE CYCLE: DISSEMINATION Dissemination is an essential phase of intelli- gence activity. Every officer who receives intel- ligence matter and passes it on, either for further processing or for the immediate use of strategic planners and operational commanders, partici- pates in its operation. It is continuous through- out the life of any essential element of information, beginning when the collector forwards his report, moving up, down, and laterally in a chain of com- mand or processing agency, and coming to rest only after use by each recipient for whom it has value. Two critical factors in the dissemination phase of the cycle are: First, the selection of the appro- priate action agency and other interested agencies which should receive the intelligence product; and second, the speed with which the product is trans- mitted, as conditioned by requirements of urgency and security. There is no greater handicap to the intelligence function than inadequate dissemination. Intelli- gence material should never be relegated to an inactive file until it has been seen by all to whom it may be of conceivable interest. The officer re- sponsible for routing has the initial responsibility of designating action, information, and retention addressees, but as the material passes from person to person, in accordance with the security regula- tions governing its distribution, the responsibility is shared by each recipient. The time interval between the interpretation of information and its receipt by the potential user may, in itself, determine the worthwhileness of the total effort of intelligence production. Even more, this factor of time may have a direct and vital bearing on matters affecting the security and welfare of the United States. The dissemination responsibilities of the intelli- gence officer are therefore concentrated in the exer- cise of judgment in determining who needs to know, how soon he should know, and by what means and in what form it should reach him in order to be most usable. These questions consti- tute the problems of dissemination. DETERMINATION OF RECIPIENT Effective dissemination requires not only a com- plete awareness of the significance of the informa- tion or intelligence, but also a knowledge of the specific mission of organizational units. On a small staff the intelligence officer is well aware of the commander's mission and the plan of opera- tions, and is also cognizant of incoming informa- tion, the processing required to convert it to usable intelligence, and the particular needs of each staff planner and unit commander. Dissemination in such a situation is much easier than on larger staffs, such as that of a theater command, an in- telligence center, or in the Office of Naval Intel- ligence. In large organizations the responsibility for dissemination should rest with the officer supervising evaluation and interpretation, for he first becomes aware of the finished product. Check Lists Check lists of commands normally receiving each type of intelligence are indispensable aids in effecting complete dissemination. The lists should be flexible; that is, by frequent revision they should be expanded or reduced as changes in situation demand. Thus they are always kept up to date, and commands will not continue to receive intelli- gence for which they no longer have need or on subjects in which they have no further interest. Operational Dissemination The tremendous dissemination task of an intelli- gence unit preceding an amphibious operation is well illustrated by the activities of the intelligence officers attached to CornPhibsPac, Commander of the Joint Expeditionary Force which was to land on Okinawa in April 1945. A preliminary distribution of basic information, consisting of terrain studies, maps, charts, beach sketches, identification sheets, and miscellaneous bulletins, was made to all staffs and ships involved in the operation 4 months before it was to take place. This material, the product of months of 263 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS research and additional collection, contained most of the accumulated strategic intelligence received up to that time, and was intended to assist the in- telligence officers of the various staffs and ships in preparing their individual intelligence esti- mates, and to be used for background information in the acquiring of additional intelligence. The final distribution of intelligence material from the ComPhibsPac Intelligence Section was forwarded from Pearl Harbor on 23 February 1945, and included all intelligence developed from the sources described previously. This distribu- tion was a difficult problem. It was essential that every vessel engaged in the Okinawa opera- tion, and those that might possibly become in- volved, receive an adequate supply of maps, charts, photos, and all other prepared written matter. These included not only the strictly amphibious vessels but all the gunfire support ships, the com- ponents of the carrier task forces, and other ves- sels that might be designated to assist in bombard- ment or transport of troops as reinforcements. The assigned vessels were staged at seven different bases throughout the Western Pacific and some were almost constantly at sea. Experience had clearly demonstrated that distribution by the echelon system was unsatisfactory, for many ships had complained of not receiving packages or of having received them months after they were mailed. Therefore, arrangements were made to fly the material by special R5D planes to the vari- ous staging areas. One intelligence officer from the ComPhibsPac personally made the distribu- tion at each staging area. He had complete lists of the ships and staffs involved, was in constant touch with ComPhibsPac, and thus was able to make corrections as changes took place. The officer was also supplied with a number of addi- tional packages for distribution to ships which might be assigned at a later date. This system operated satisfactorily, although there were ap- proximately 1,340 vessels and staffs engaged in the operation. All commands received an adequate supply of intelligence material. With proper security provisions and detailed instructions, copies were forwarded to port direc- tors, island commanders, and a few other impor- tant commands for possible later distribution to reserve units and ships assigned at the last moment CONFIDENTIAL 264 because of unforeseen emergencies. A large sup- ply of extra copies was furnished to the amphib- ious group intelligence officers for emergency dis- tribution. Previous experience had indicated that there always were unforeseen requests for intelli- gence material, and these emergency measures enabled all participating units to obtain the needed intelligence regardless of the date or location when they received orders to proceed to the objective. TIMELINESS Timeliness in distribution of information and intelligence is vital to the efficient functioning of every intelligence agency. Its attainment, of course, will be controlled to a certain degree by the means of dissemination available and the secu- rity classification of the subject matter. Naval Regulations stipulate that telecommunications should never be used when mail and messenger services will serve the purpose. The spirit of this general rule can be followed in the dissemination of intelligence, for certainly all intelligence mate- rial is not of sufficient urgency to require trans-- mission by radio, and often its length or bulk pre- eludes the use of sitch means. Discrimination and judgment must therefore be applied by the intelli- gence officer in all matters affecting the speed of dissemination. He needs a working knowledge of the naval communications system. Often the collector in both foreign and domestic fields will not have United States naval commu- nication facilities available. In such circum- stances his knowledge of other means available should be equally thorough. An attache, for example, should know the best procedures for for- warding all types of reports, including commer- cial radio and telegraph, postal services, and the schedules of State Department couriers. Classi- fied information, of course, is never entrusted to foreign mail systems, but commercial radio in foreign countries may be used for the transmis- tion of encrypted messages. Naval Telecommunications for Dissemination An intelligence officer with the Fleet will receive and disseminate a great portion of his intelligence material by radio. He must understand the de- livery characteristics of each type of communica- tions and the effect of the various degrees of pre- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R0001002100102A THE INTELLIGENCE CYCLE: DISSEMINATION CONFIDENTIAL cedence. The communications channel used must be suitable for reaching the addressees within the time required and in accordance with security regulations governing the handling of the subject matter of the message. In all such matters, of course, the expert advice of the communications officer should be solicited and his recommendations followed. For any given operation, the Communications Plan, usually an annex to the Operation Plan or Order, allocates radio frequencies in accordance with fleet frequency plans. Frequencies are allo- cated for particular uses; for example, there will be one or more for reporting enemy contacts, for shore fire-control parties, for CAP aircraft, etc. The Communications Plan also prescribes control- ling publications, effective date and time zones, crypto-systems to be used, and the procedures for radio telephone messages, visual communications, recognition, identification and authenticity, radio and radar countermeasures and deception, and the conditions of radio and radar silence. Message Precedence Once the intelligence officer is convinced that a particular item of intelligence must be transmitted by radio message, he must also decide which degree of precedence is required. Precedence establishes the order for the handling and delivery of mes- sages. It should be determined by the subject matter and the time factor involved. There are currently six degrees of precedence: (1) FLASH is reserved for enemy contact reports or reports designed to prevent imminent conflict between friendly forces. (2) EMERGENCY is used for amplifying reports and operational messages of high priority; e. g., attack orders, warnings of enemy attack. OPERATIONAL IMMEDIATE is used for opera- tional messages, i. e., those that will or may affect movements of ships, aircraft or ground forces within 48 hours, except ordi- nary movement reports which cannot be classified as urgent; e. g., Operation Orders, aircraft movement reports, changes in tactical disposition. PRIORITY is the highest precedence that can be given to administrative (non-opera- (3) (4) 265 (5) (6) tional) traffic; e. g., troop or ship move- ments (non-tactical), flight plans, move- ment of supplies. ROUTINE. DEFERRED means that delivery can be de- layed until the beginning of office hours following the day when filed. To specify high precedence when a lower degree is sufficient destroys the value of precedence, tends to demoralize communications, and frequently delays messages of great urgency. In one case during World War II an operational priority message from COMINCH to the commander of a task force in the Atlantic was delayed 61/2 hours and finally was received too late to serve its pur- pose. Investigation revealed that there had been 110 other operational priority messages waiting to be transmitted on the Fox schedule that after- noon. Scarcely a dozen were of sufficient urgency to justify the precedence which they carried. An Army experience further illustrates the ex- tremes to which misuse of precedence can go. A staff headquarters received a priority message addressed to two officers who could not be located, so a message was sent to the originator requesting instructions for delivery. The reply explained: "The two officers are on their way and will arrive in a couple of days." High precedence is not necessarily the best way to get prompt action. Precedence is a guide for communications personnel, not for addressees. It is better to ask in the text for prompt action rather than to use precedence in such a way as to delay messages of greater urgency. Reproduction The timely dissemination of certain types of in- telligence material to multiple addresses will often depend on the facilities an intelligence agency has available for reproducing it in quantity. Such requirements should be anticipated, and the agency should provide itself with the necessary reproduction machines together with personnel trained in their operation. Mimeographs, multi- liths, or contact printers are indispensable aids in intelligence centers, and even small units in the field will find frequent use of portable machines of this type. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS CLASSIFICATION A discussion of adequate and timely dissemina- tion cannot proceed very far before meeting the problem of classification. Although marking classified information and material Top Secret, Secret, or Confidential, will insure safeguarding consistent with its content, the misapplication of classification can also be a definite handicap to proper dissemination. It will be well here to review the principles of classification as set forth in the United States Navy Security Manual for Classified Matter particularly in respect to their application in intelligence activity. Top Secret In the Top Secret category, the security aspect is paramount, and unauthorized disclosure could cause exceptionally grave damage to the nation, such as initiation of war against the United States by a foreign government, defeat of planned war operations, and loss of a scientific or technical advantage which would materially affect the course or outcome of a war. The following items of military information are hence graded Top Secret: 1. War plans and plans or particulars of future major or special war operations, and related dispositions of our forces. 2. Intelligence documents (and information therein) which reveal a major intelligence effort on the part of the United States and from which unauthorized recipients would be able to evaluate the capabilities of our intelligence services. 3. Critical information of radically new and extremely important equipment or other mu- nitions of war. 4. Information primarily political or economic which contains implications comparable to items 1, 2, and 3. Secret Classified as Secret are information and mate- rial whose unauthorized disclosure could result in serious damage to the nation, injure national inter- ests or prestige, or would be of great advantage to a foreign nation. The following items are examples: 1. Particulars of operations in progress or planned. CONFIDENTIAL 266 2. Instructions regarding the employment of important new munitions of war, including scientific and technical developments. 3. Important improvements to existing muni- tions of war under development. 4. Information of enemy or potential enemy material or other material, procedure, dis- positions, and activities, whose value de- pends upon concealing the fact that we pos- sess it. 5. Reports of operations containing informa- tion of vital interest to the enemy. 6. Vital military information on important defenses. 7. Adverse reports on general morale affecting major operations. 8. Communications intelligence information, including security devices. 9. Certain new or specialized techniques or methods to be used in future operations, and the identity and composition of units which will employ them. 10. Information concerning strength of troops, air and naval forces, identity and composi- tion of units, or quantity of specific items of equipment in active theaters of operation. 11. Photographs, negatives, photostats, dia- grams, or models of Secret matter. 12. Certain compilations of data or items which in the aggregate warrant the higher classi- fication, although individual items may be classified Confidential or lower. Confidential The Confidential category is used for informa- tion or material the unauthorized disclosure of which could be prejudicial to the defense interests of the nation. Examples include: 1. Matters, investigations, and documents of a counterintelligence nature, or matters whose disclosure would adversely affect morale. 2. Routine operational and battle reports which contain information of value to the enemy but are not of vital interest to him. 3. Routine intelligence reports. 4. Military radio frequency allocations of spe- cial significance, or those which are fre- quently changed for security reasons. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CYCLE: DISSEMINATION CONFIDENTIAL mating the threat to national security if the in- formation should reach an enemy. Erring on the safe side is out of the question, because neither side is perfectly safe. Overclassification is one of the surest ways to undermine security, as was well illustrated in the Pacific during World War II. At one time 90 percent of message traffic was marked Secret. It was impossible to observe the precautions required for its handling, since so many people had to work with Secret messages. The number of copies exceeded all reasonable lim- its, and subject content was widely discussed. The inevitable result was that Confidential and Re- stricted messages were treated almost as if they were unclassified. A second result of overclassification is that the key setup used for Secret messages becomes over- loaded, thus endangering the security of both the key and the system. A third consequence is the delay in dissemination caused by the time required for encryption, decryption, and maintenance of the receipt system. Among the kinds of information commonly overclassified during the war were intelligence summaries of past action and messages about ship movements in nonoperational theaters. Confiden- tial, as noted in the definition above, is sufficient for routine intelligence reports. No gain in crypto-security is achieved by using a higher clas- sification than the content of the message warrants. The prime purpose of high classification is to limit the number of persons who may see the messages or reports and to increase the physical safeguards with which they are surrounded. The dissemina- tor must determine the number of persons who must have the information. Underclassification, of course, endangers secu- rity. During the war, messages which identified fleet commands or shore-based activities were sometimes delivered unclassified to the communi- cation office. Unclassified reports and requisitions sent to navy yards by ships of the fleet at times dis- closed their location and prospective movements. In combat situations emergencies arise when speed of dissemination requires plain language. Such a situation occurred during the North Afri- can campaign, as recounted in the battle report of the U. S. S. assachusetts. One of the spotting planes from the flagship off Casablanca encoun- tered "bandits" and signalled over voice radio: 267 CONFIDENTIAL THE INTELLIGENCE 5. Information which indicates strength, iden- tity, composition, or quantity of equipment of troops, air and naval forces in areas ad- jacent to active theaters of operations. 6. Technical documents and manuals used for training, maintenance, and inspection of im- portant new munitions of war, and the gen- eral tactical lessons learned in operations which should be withheld from any foreign nation. 7. Information relating to the design and de- velopment of new material, research or processes of manufacture of military sig- nificance which are not generally known. 8. Department of Defense information and records concerning industrial mobilization for war, including specific quantities of war reserves. 9. Photographs, negatives, photostats, dia- grams, or models of Confidential matter. 10. Certain compilations of data or items which in the aggregate warrant the higher clas- sification, although individually of lower classification. Restricted Category Abolished In accordance with the directives set forth in Executive Order No. 10501 effective 15 Dec 1953 the category "Restricted Security Information" and the phrase "Security Information" previously required in connection with the categories listed above were eliminated. This order further pro- vided that all Department of Defense information designated "Restricted Security Information" would be automatically declassified except in cer- tain instances where it was felt necessary to up- grade to Confidential. For example information from foreign friendly governments and classified Restricted by those governments is now upgraded to Confidential. The same is true of material related to Crypto systems. "Restricted Data" as used by the Atomic Energy Commission was not affected by Executive Order #10501. The Disseminator's Classification Responsibilities Intelligence personnel responsible for dissemi- nation must keep the definitions of the various categories of classification clearly in mind, esti- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS "Am coming in on the starboard bow with couple hostile aircraft on my tail. Pick 'em off?I am the one in front !" DISSEMINATION MEDIA Thus far the only dissemination medium dis- cussed has been telecommunications. A number of others are equally common to intelligence activ- ity, such as oral briefings, graphics, films, books and. periodic publications, not to mention the in- formal conferences that are daily occurrences in any intelligence agency. Each has its particular advantages and disadvantages in special circum- stances. Oral Dissemination Intelligence is disseminated orally by means of lectures, briefings, conferences, and ship's tele- phone or radio conversations. Public telephones ashore, of course, are never used for intelligence communication. Except in a formalized situation or classroom, lectures are not ideal means of dis- seminating intelligence. Retention of subject matter, presented in lecture form, is difficult with- out reference to comprehensive notes, and the lack of a lecture room and difficulties of assembling all who need to know combine to make the lecture method unsuitable in commands afloat. Briefing, a specialized form of lecture, is one of the most common types of oral dissemination of intelligence. It will be discussed in detail below. The staff conference, in which the intelligence officer participates, provides an excellent means of disseminating intelligence. If conducted in a spirit of open-mindedness, free from petty prej- udice, bias, or predetermined conclusion, the con- ference discussion results in resolution of conflict- ing bits and fragments of information. Panel dis- cussions, followed by open forum question periods, are also effective methods of dissemination. Under actual combat conditions, or in maneu- vers and training exercises, communication by voice, radio, or telephone is used. For quick dis- semination of intelligence to pilots awaiting final instructions from an Air Intelligence Officer, com- munication by a telephone system from intelli- gence control to ready room, is often more expedi- ent than the personal appearance of the briefing officer. The principles and practices that have CONFIDENTIAL 268 been developed in ships' battle phone systems fur- nish a good background for intelligence dissemi- nation by telephone. Whatever form oral dissemination takes, it is essentially a more or less prepared speech deliv- ered to an audience, and it is subject to the general rules for effective public speaking. Briefing for Dissemination An officer planning an oral briefing is under the same obligation to organize his material logically, present it coherently and fluently, and emphasize his main points unmistakably, as the preacher, the politician, the professor, or the salesman. The sages of old said that man's greatest enemy is time. A pertinent paraphrase would be: time is the briefing officer's greatest enemy. We have all been irritated by the speaker who begins by deploring the fact that so little time is available for an adequate presentation of his subject and then proceeds to use 90% of what time is available in undue attention to unnecessary and often ir- relevant details. The intelligence officer will always face a time limitation on his briefing. It is his greatest challenge. Careful organization is the key to success. In an 8-minute briefing, the time allocation for a well organized presentation should be about as follows: Introduction: 2 minutes. Rapport is established with the audience, the purpose is clearly stated, and necessary back- ground information is given. Main Body: 5 minutes. The fewer main points the better. Certainly in 5 minutes no more than 3 can be adequately cov- ered. Transition from one to another should be smooth and logical. This is the portion of the briefing in which graphics are effective time savers. Organization is the watch-word. Conclusion: 1 minute. Every briefing should close with a succinct sum- mary or interpretation of the points in the main body, thus leaving the audience with the definite impression that the speaker's purpose has been achieved. A colored preacher when queried as to the reason for his effective sermons summed all this up very neatly: "First I tells 'ern what I's gonna tell 'em, den I tells 'em, den I tells 'em what I told 'ern." Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9_ THE INTELLIGENCE CYCLE: DISSEMINATION CONFIDENTIAL Practice and receptivity to criticism are the best aids to effective speaking. The avoidance of dis- tracting mannerisms, and the cultivation of an easy, simple, straightforward, and confident style are essential. Every naval officer ought to be able to speak well. To the intelligence officer it is a functional asset. Graphics for Dissemination Dissemination through the use of graphic illus- tration achieves its purposes by the precept of the old adage: "A good picture is worth a thousand words." Although illustrations have been used for centuries, and maps and charts are as old as the art of warfare, new impetus was given to the use of graphic aids during World War II. In addi- tion to printed and written representations, the term "graphics" has come to include three dimen- sional figures such as models of ships, aircraft, terrain, cutaway sections, animated figures, and life-size mock-ups. Plots, photographs, motion pictures, maps, charts, sketches, drawings, posters, statistical graphs, and numerical tables are ad- ditional standard military applications of graphic dissemination media. Their success results from the fact that each is adapted to a particular situation. Clarity in graphic presentation will be achieved if it is unified in purpose, consistent and unmis- takable in use of symbols, and legible in details. Its force and attractiveness will depend, like its clarity, on adherence to fundamental principles of effective design. Nothing contributes more to the clarity of any graphic presentation than unity of purpose. In- telligence charts should be prepared for a specific purpose; every item of information useful for this purpose should appear, and all other items should be suppressed. A chart that shows harbor in- stallations should not be unnecessarily cluttered with notations of irrelevant buildings and topo- graphic details; a target folder designed for use by bombing squadrons is not usually improved by including elaborate hydrographic data. In military graphic presentation, symbols are of the utmost importance. The intelligence offi- cer spends considerable time working with plots and maps and charts; he should be thoroughly fa- miliar with the technical vocabulary of this kind 269 of graphic expression, and should be careful always to employ the accepted military and naval symbols so that any trained person can read his plot or overlay at a glance. Every chart for dis- semination should have a key to the symbols em- ployed, readily legible in the margin. Naval offi- cers should familiarize themselves with the sym- bol manuals: FM 21-30 and AFM 55-3. Graphics, like any other form of dissemination, should be convincing and attractive as well as clear. Emphasis is achieved by bold lettering, strong, solid outlines, and by the use of simple and strongly contrasted colors for the different items of information plotted. Attractiveness is increased by varigated and properly proportioned lettering and by the choice of harmonious colors. A common fault is trying to put too much on a single graphic; it is usually better to use several, rather than to clutter up one. When the graphic is to be projected on a screen as a "slide," the added factors of legibility at a distance and the adequacy of available equipment must be considered. The intelligence officer can- not usually control the conditions under which motion pictures are made, but he can control the conditions under which they are shown, and he should make these conditions as favorable as possible. Preparation for Graphics It is not practical here to discuss all the possible methods of preparing graphics in intelligence work, but a few suggestions regarding certain materials that have proved effective can well be made. Common tools are pictorial symbols made by colored pencils, colored pins, colored string, colored scotch tape, and various types of trans- parent materials. Cellulose "Scotch" tape, both the transparent type and the colored, is very useful in graphic presentations. The colored type can be employed for border and area demarcations on a map or overlay, for bar graphs, and for artistic line bor- ders of the entire graphic. The tape is manufac- tured in a great variety of colors, blue, red, black, green, orange, yellow, purple, silver, and brown. The rolls come in several widths, but experience has shown the most practical for graphic purposes to be 1/2",34" and 11/2". CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 _Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS "Scotch" double-coated tissue tape, being adhe- sive on both sides, facilitates the use of movable symbols on a changing situation plot. Masking tape can be used in the construction of portable (folding) plots, or for joining together several graphics into a composite whole. In order to avoid markings on the face of maps and charts that are being used for either briefings or graphic displays, clear transparent cellulose acetate overlays may be used. Usually, such ace- tate film comes in rolls 40" wide, and 100' long. China-marking (grease) pencils, in a variety of colors, are particularly appropriate for graphics, especially when used on a cellulose acetate overlay for depicting changing situations. The tracings can be easily removed with a dry cloth if made on the glossy side of the sheet. Illustration boards, both of heavy paper and light cardboard, have many uses, such as making formal graphics requiring good white background, or for map or chart backing. The "boards" are 3/4" thick and usually come in two sizes, 30" x 40" and 38" x 60". Such items as thumb tacks, a pencil compass, erasers, photointerpretation scales, a protractor, speedball lettering pens, a knife or a pair of scis- sors, and various colored inks are additional items of equipment for the preparation of good graphics. Most of these are readily available at Navy supply centers or depots. If graphic production is very extensive, time will be saved by employing a Leroy lettering set. With such a set it is possible to give graphics a professional appearance. Inasmuch as requirements differ, it is difficult to make recommendations as to the quantities of ma- terials or equipment needed. Operational staffs will need a lot; attaches will need very little. The intelligence officer must try to anticipate his needs, and particularly if afloat, should procure a good supply of basic materials from any supply depot where they are available. FORM OF DISSEMINATION Disseminated intelligence should always reach its potential consumer in usable form. There should be no doubt as to its meaning. The pre- vious discussion of reporting showed that the format and guiding principles of accuracy, brev- CONFIDENTIAL ity, and clarity in the preparation of the standard Information Report are designed for the user's benefit. Let us extend that discussion here by considering the drafting of messages. The prin- ciples set forth are again those of unity, complete- ness, coherence, and emphasis with special attention to economy in the use of words. Unity and Completeness Intelligence messages, just as information re- ports, are most easily handled by the recipient if they deal with single rather than multiple sub- jects. Filing is facilitated if all pertinent intelli- gence on a certain matter is included in one message. A message which does not give all the necessary facts may be little better than no mes- sage at all, especially in a combat situation. A contact report which omits the number, types, position, course, or time of sighting (the time group of the message) is better than no report, but each of these facts is needed to carry out an attack. During 1943 an enemy submarine was able to sink one of our ships and escape from American waters because of incomplete messages and failure to send messages. The submarine might have been destroyed before it could do damage had any one of the following errors not occurred: 1. A plane reported rescue of survivors, but failed to give time of attack, position of the attack, the course of the sub, or its condition. 2. Another plane neglected to make an amplify- ing report, and wasted time asking a question to which it should have known the answer. 3. A third plane failed to give the sub's position and did not communicate with a plane which was in a position to assist. It also failed to make amplifying reports promptly, in sufficient detail, and in plain language instead of code. Speed was vital, and the information was of little value to the enemy. 270 Coherence Ambiguity of expression in a message is not only valueless but dangerous. Misunderstood intelli- gence can lead to catastrophe. During the final month of the war in the Pacific, a task group made radar contact with an unidentified submarine. All efforts at recognition failed for visibility was poor, but the submarine gave indications of being hostile. At this point one of the destroyers in Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210QQ2.A bunnDENTIAL THE INTELLIGENCE CYCLE: DISSEMINATION the task group received a message from the task group commander which was understood to state: CLOSE TARGET EVALUATION IS ENEMY ATTACK AND DESTROY. The destroyer at- tacked and the target disappeared. Later it was discovered that the sub was one of our own. What the message actually said was: CLOSE TARGET AND IF EVALUATION IS ENEMY DE- STROY IT. Brevity Both the speed and security of naval communi- cations are in the hands of originators to a far greater extent than many realize. The originator who uses 50 words to express what could be clearly stated in 25 causes, in the aggregate, not hours but days of unnecessary work along the entire route of an encrypted message. He also damages secu- rity, for the amount of material available to enemy crypto-analysts is doubled. There are several ways to reduce the length of a message: 1. Eliminate nonessential details. 2. Remove superfluous words, such as "number," "following," and "dated," for example, in- stead of "FOLLOWING ITEMS NEEDED COLON" say "NEED," which represents an 85% word saving. A submarine on patrol in the eastern Mediterranean transmitted a ra- dio message in which the words "north" and "east" were used 18 times in giving positions. All 18 words could have been omitted, for there is no south latitude in the Mediter- ranean, and west longitude is confined, to a far western portion. 3. Use briefer words and phrases. The length of many messages can be reduced as much as 40-50% by consistently using the simpler and briefer of two expressions that are equally clear. The following are typical: Instead of Use Save attempt try 57% immediately at once 45% approximately twenty about twenty 42% immediate future soon 73% A simple way of saving words in a message is by putting verbs in the active rather than the pas- sive voice. Prepositions can often be eliminated with no sacrifice of meaning. 271 4. Use authorized abbreviations to a greater ex- tent and avoid excessive use of phonetic spell- ing. 5. Delete unnecessary punctuation. The use of the simple "X" will normally be equally clear. Message Drafting in Practice Let us now apply some of the above principles in an imaginary situation and follow the proce- dures of an intelligence officer in his role of dis- seminator. The setting is Calcutta, India, early in World War II. An allied intelligence activity of the CBI theater has a competent Burmese undercover agent in Japanese occupied Rangoon who reports twice a week on enemy activities on the waterfront. The information thus obtained is promptly for- warded by encrypted message to the A-2 of the 10th Air Force at a base in Chabua, Assam, for possible use in selecting targets for strategic bomb- ing missions. In a report dated 18 March, the Rangoon agent states that 2 days ago he saw a large number of vehicles and great quantities of supplies for the Japanese forces in Burma un- loaded from ships and stored in warehouses along the Irrawaddy River. This is interesting to be sure, but in its present form it does not constitute valuable target information because of its lack of detail. Supplies are continually arriving in Ran- goon and are normally stored in warehouses along the Irrawaddy at a great number of widely scat- tered locations. So first of all the Calcutta intelli- gence unit requests the Rangoon agent to obtain more specific data. In a few days an amplifying report is received, and on the basis of this addi- tional information the officer responsible for dis- semination of target intelligence writes the first draft of a message to A-2, Chabua "Following information received from usually reliable agent resident Rangoon: Japanese war materials stored in warehouses adjoining former docks of Burma Shell Oil Co. include 80-85 heavy trucks, 23 sedans, 3,000 tons shells and cartridges, and approximately 10,000 tons of food and cloth- ing for Japanese troops." The report now contains detailed target infor- mation. He proceeds to examine his first draft with a view to condensation. A-2, Chabua, has CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 coNFIDEftioved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFIC ERS prepared a large scale gridded map of Rangoon and has provided the Calcutta unit with a copy for use in target designation. Therefore the spe- cific location can be given by map reference as had been done in similar messages in the past. Consulting the map, the Calcutta officer finds that he can pinpoint the Burma Shell warehouses at 8237N4. So he makes further improvements: "Usually reliable agent Rangoon reports ware- houses located eighty two thirty seven Nan four contain colon three thousand tons ammunition comma ten thousand tons quartermaster supplies comma approximately one hundred vehicles pe- riod" Once again he studies the text for possible fur- ther economy of words. His colleagues in the code-room are always complaining about the chore of encrypting messages which are unnecessarily long, so he makes every effort to satisfy them. All Allied intelligence activities have been using the standard letter-number evaluation code, and A-2, Chabua, knows from past experience that Calcutta receives reports from agents in Ran- goon whose reliability and reporting accuracy have been well established by past performance. A-2 will, however, want to know the date the information was collected, in order to check it with other information he may have, or it may well be that, unknown to Calcutta, bombers of the 10th Air Force hit the same dock area on a mission within the last 24 hours. Furthermore, A-2 will consult his map and note that the grid location is that of warehouses. So after some more amend- ing, abbreviating, and deleting the final draft of the message text reads: RANGOON ONE SIX MAR BAKER TWO X EIGHT TWO THREE SEVEN NAN FOUR X THREE THOU TONS AMMO X TEN THOU TONS QM SUPPLIES X ABOUT ONE HUN VEHICLES. He takes it to the code-room. "Here, Joe, is one that will please you. Make it 'Operational Immediate.'" Thus by careful drafting the disseminator sends a message that is complete, accurate, coherent, and economical in words and encryption time. A-2, Chabua, has usable intelligence for the com- mander of his B-24 squadron. CONFIDENTIAL 272 USE OF INTELLIGENCE The example above is illustrative of more than message drafting. It also follows an item of in- formation through the steps of the Intelligence Cycle. Collection was not complete until ade- quate coverage was attained, and some of the mental gymnastics of processing were apparent as the officer kept reworking his draft into proper form for dissemination. The use of the finished product is, of course, the responsibility of the squadron commander in Chabua. The decision to make a strike against the Rangoon warehouses rests with him alone. Therefore, it would seem that the intelligence offi- cer's functions stop with dissemination. In a larger sense, however, this is not true. Certainly A-2 does not make the command decision, but he plays a most important role in influencing the decision through the quality of the intelligence he provides. The very form in which it reaches the potential user, and the timeliness achieved through proper designation of precedence are vital factors in use. Intelligence officers do not perform their duties in support of command by sitting aloof in their own little worlds. They are on a staff team, and operational commanders as well as strategic plan- ners make their decisions during or after confer- ences with staff officers who are experts on the various aspects of the tasks under consideration. This puts the intelligence officer very much in the picture when decisions are made, and working intimately with his staff colleagues, he contributes support in his particular sphere of responsibility: knowledge of the enemy and the characteristics of the area of operations. His responsibilities do not cease even when the intelligence he dis- seminates has been used, for the use itself will pose new problems in collection and evaluation, and post-action reports must be compiled. In the three following chapters the role of in- telligence in support of planning and operational activities will be considered. The discussion? however, will not be limited to use alone. Any review of the use of intelligence will involve its production to a greater or lesser degree, since use activates and reactivates production. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 12 INTELLIGENCE STAFF PROCEDURES INTRODUCTION: INTELLIGENCE-A STAFF FUNCTION Having made a general examination of intelli- gence as knowledge, organization, and activity, it will be well now to consider the specific ways in which intelligence makes its contributions to the planning and execution of military operations. By what formal procedures is intelligence sup- plied in an actual operational situation ? What specific techniques do intelligence officers use in order to make their services of value to operational commanders? The Commander and His Staff Traditionally, the key to all military operations is the authority of command personified in the military commander. He bears the full responsi- bility for the success or failure of all operations entrusted to him, and because of that responsibil- ity, he also possesses full authority to plan those operations and, supervise their execution. Manifestly, it would be impossible for a single individual, however well endowed, personally to perform all of the tasks involved in a typical mod- ern military operation. Consequently a com- mander has under him other individuals to whom he delegates one or more of the component parts of the broader task originally assigned to him. These individuals in turn may have subordinates to whom they will delegate certain portions of their own assigned tasks. Thus a structure is built up which we term the military chain of command, a device that provides a commander with the assistance he needs. After delegating appropriate areas of responsibility to each of his subordinates, the commander must plan, coordinate, and super- vise their execution of these responsibilities. Even this supervisory role, however, except at the lowest echelons of command, is more than any one individual can carry out alone. There are 273 just too many things to inspect, too many orders to issue, and too many subjects on which to be kept informed. And so, in addition to his subordinates in the chain of command, the commander also has the assistance of certain individuals who help him to coordinate and supervise the actions of his sub- ordinates. These personal assistants are known as the commander's staff. In contrast to the sub- ordinates in the chain of command, the members of the commander's staff do not possess any dele- gated authority or responsibility of their own. Their only purpose is to serve the commander per- sonally and directly, and to assist him, as he may choose, in exercising the various supervisory responsibilities which his command entails. The number of these staff assistants, and to some extent their organization and individual duties, ordinarily varies in proportion to the size of the commander's forces. But over the years a fairly standard staff organization has been evolved with- in the military profession which breaks down the duties performed by a commander's staff into sev- eral customary and well-recognized categories. Traditionally there are four principal staff func- tions: personnel and administration, intelligence, plans and operations, and supply. On an Army staff, for example, these four functions are per- formed by what are called the "general" (in con- trast to the "special") staff officers, who are desig- nated G-1 (Personnel and Administration), G-2 (Intelligence), G-3 (Operations), and G-1 (Sup- ply). Naval commanders also have staffs which correspond roughly to these same designations, though with some changes. On some naval staffs, for example, intelligence may not be a separate staff division, but only a subordinate section under operations. On naval staffs communications is ordinarily an additional "general" staff function, on a par with operations, supply, and personnel. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS But whatever the precise organization of the naval commander's staff may be, all staffs perform the same basic duties, and all exist to help the com- mander discharge his supervisory responsibility. Besides these staff assistants who help the com- mander in his operational functions, he usually has one or more personal aides, depending on his rank. On a naval staff these are the /lag lieuten- ant and the flag secretary. Depending upon the size of the staff they may also have other opera- tional staff duties, with the flag lieutenant perhaps serving as communicator, and the flag secretary as personnel and administrative officer. The struc- ture of a typical naval staff is shown in figure 12. AIDE AND FLAG SECT. 1 THE COMIAANDER CHIEF OP STAFF AIDE AND FLAG UEUT. N ? 1 ADMINISTRATION & PERSONNEL N.2 INTELLIGENCE N.3 PLANS AND OPERATIONS N.4 LOGISTICS 14.5 COMMUNICATIONS Figure 12.?Organization Chart?Typical Naval Operating Staff Each individual staff officer is highly qualified in some specialized field relating to military oper- ai ions. The personnel officer, for example, is an expert on such matters as military strengths, re- inforcements, replacements, etc.; the operations officer is a specialist in the strategy and tactics involved in planning and conducting military op- erations; and the supply officer is an expert on matters of equipment and material needed to sup- port operations. Within the field of his own specialty each staff officer is expected to keep his commander fully informed on all developments relating to the operations in question, to do what- ever detailed thinking and planning are required, and to make sound recommendations for action by the commander himself. Within the area of his specialty the staff officer should put himself men- tally in the place of his commander and ask him- self, "what would you do if you were the com- mander?", and then come up with the best possi- ble answer. Yet the final decision can only be made by the commander himself. The staff assistant proposes, CONFIDENTIAL 274 the commander disposes. However, the staff offi- cer should have familiarized himself so thoroughly with his own field, and should have anticipated and discussed all the implications involved in the recommendation he makes so completely, that the commander is able to make the actual decision with a minimum of further effort. This is what is known professionally as completed staff work; that is, presenting a military proposal to a commander in such a way that he needs only to signify his approval to put the proposal into full effect. To a considerable extent the success of any military commander will be in direct ratio to the thorough- ness and accuracy of the work of his staff. The Intelligence Officer on the Staff The intelligence officer's field of specialty is a dual one?the enemy and the area of operations. No military operation can be successfully planned or carried out unless a commander is as fully aware as possible of what he is up against. The enemy's strength, his dispositions, his capabilities, his fire- power, his reserves?all of these are factors that are bound to affect the course of action a military commander will adopt. Without such information he is literally fighting in the dark. It is the job of the intelligence officer then to inform the com- mander of what the enemy has and what the enemy can do, in order that the commander can make the soundest and wisest decision as to how to accom- plish his own mission. Similarly, the nature of the terrain in which an operation is to be con- ducted?the beach conditions, the weather, the location of high ground?will have an important bearing on the final decision, and information on those matters must also be furnished to the com- mander well in advance. This is also the job of the intelligence officer. While the military staff is thus a collection of experts, each man dealing principally in his own specialty, it does not follow that the actual exer- cise of military command can be compartmental- ized in any such precise fashion. After all, every one of the separate factors which bears on a mili- tary decision must ultimately be brought together in the mind of the commander before any final decision can be made, and the end product is thus Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES CONFIDENTIAL bound to be the result of the combination, com- parison, interaction and mutual adjustment of all of them. Consequently, although a military staff is functionally broken down into specialized units, none of these units can really function at top effi- ciency without the fullest cooperation and mutual understanding of the others. The intelligence of- ficer, for instance, must keep constantly abreast of the planning and thinking that is being done by the operations, supply, and personnel officers if his own work is to be entirely relevant to theirs; they, in turn, cannot make adequate plans as to what special equipment may be needed in an operation, or what types of attack can succeed, without hear- ing and understanding what the intelligence officer has to say about the enemy situation and the peculiar characteristics of the area of operations. Between operations and intelligence this mutual dependence is especially close, a fact that is borne out in the case of those naval staffs where the intelligence officer is a direct subordinate of the operations officer. Organization of an Intelligence Division The work for which the intelligence officer is personally responsible is actually performed, of course, with the help of such subordinates and assistants as may be assigned to him, organized into what is called an intelligence "division." The size of the intelligence division as well as its pre- cise structure will vary a good deal, depending on the size of the command and the nature of its assignment. On an operational staff the intelli- gence division may include specialists trained in the particular types of operations being con- ducted; a naval district intelligence office, on the other hand, will be likely to have a preponderance of counterintelligence personnel. Ideally, the in- telligence division of an operational staff ought to include some one in charge of administration and personnel, some one in charge of security and counterintelligence, and a number of specialists in such fields as amphibious warfare, communica- tions, air operations, photointerpretation, transla- tion and interpretation, and technical intelligence. In practice, since all but the very largest com- mands may have at most only three or four officers 275 in the whole division, especially in peacetime, one officer may find himself charged with several of these duties, whether he happens to be a specialist in them or not. In such an event, when he meets a problem which he is not personally equipped to solve, he should consult those who may be, or in technical matters, request expert assistance. THE PROCESS OF OPERATIONAL COMMAND As a staff assistant, the intelligence officer exists entirely to serve his commander in the execution of operational command duties. To do a full and effective job, therefore, the intelligence officer must understand first of all precisely what these com- mand duties entail. Two major functions are involved in military command: (1) planning the operation desired, and (2) supervising the execution of those plans. These two functions, in turn, may be broken down into four specific jobs which a commander per- forms in the process of exercising his command: (a) make the decision on what is to be done, (b) develop the plan for carrying out that decision, (c) issue the directive or order putting the plan into effect, and ( d) supervise the execution of the directive by subordinates in the "chain of com- mand." These four jobs embrace the four major steps in the process of operational command plan- ning. At each stage the responsibility of the com- mander is clear and well-defined. Estimate of the Situation The first and perhaps most important job of a military commander is to make decisions?in fact, not only to make decisions but to make correct decisions. Because making decisions is essentially a mental process, the quality of a commander's decisions will naturally depend to a considerable extent on his own sagacity. For this reason no precise mathematical formula can ever supply the key to making correct military decisions in all possible circumstances. Nevertheless, over the years the military profession has developed the following standard Estimate of the Situation form for use in connection with these decisions which every commander is expected to understand and, more or less, to follow. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS The Estimate of the Situation Form 1. MISSION a. Task b. Purpose 2. THE SITUATION AND COURSES OF ACTION a. Considerations affecting the possible courses of action (1) The general situation (2) Characteristics of the area of operations (3) Relative combat power (4) Strength and weakness factors b. Enemy capabilities (in terms of "accomplishment") c. Own courses of action 3. ANALYSIS OF OPPOSING COURSES OF ACTION 4. COMPARISON OF OWN COURSES OF ACTION 5. DECISION a. What the force is going to do b. Why this is to be done This estimate form, which grew originally out of a process first employed by the German general staff in the latter part of the 19th century, has now been officially adopted by the Joint Chiefs of _Staff for use by all military services, and can be found in detail in the Naval Manual of Operational Planning. By itself, .of course, the Estimate of the Situation form does not insure that any com- mander who faithfully follows it in every detail will automatically come up with right decisions in any and every situation. Rather the form serves as a kind of check-off list, to guarantee only that before a commander arrives at any important decision he will have first considered every relevant factor. Although it may seem somewhat stylized and artificial, the procedure involved in this Esti- mate of the Situation actually is not too much different from that employed by any rational indi- vidual in arriving at an important decision in everyday life. As will be seen from the above form, the initial step in the estimate procedure is to state the mis- sion assigned to the commander by higher head- quarters. Ordinarily this amounts to nothing more than copying the commander's original in- structions; but at least the statement of the mis- sion should include both the specific task assigned to the commander by his superiors, and the pur- CONFIDENTIAL 276 pose (which may either have been stated or can be inferred) for which that task was assigned. It is important that a military commander under- stand both of these points clearly at the very out- set. Otherwise, in the process of carrying out his assigned task, he might conceivably do some- thing that would jeopardize its broader purpose. The next step is to compile all the relevant in- formation which might bear on the accomplish- ment of this assigned mission, including, specifi- cally, (a) a resum6 of the general situation out of which the specific assignment has evolved, (b) a summary of all the facts about the area in which the operations are to be conducted, and (c) a sum- mary of the military strength of both our own forces and those of the enemy, together with a tabulation of the principal elements of strength and weakness on both sides which emerge from this information. Following this general summary, the commander next makes a list of all those things which the enemy can be considered to be physically "capable" of doing, given the forces at his disposal and the particular area in which he is to operate. These are what are known in the military profession as enemy capabilities, and in the commander's Esti- mate of the Situation they are customarily ex- pressed as specific objectives which the enemy will Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 WITTAAGENUE STAFF PROCEDURES CONFIDENTIAL try to accomplish, without reference to whatever opposition our own forces might interpose to their accomplishment. Once the enemy's capabilities have been listed in this way, the commander next puts down in equally general terms the various broad courses of action which his own forces might undertake to accomplish the assigned mission. The whole point of the estimate form, in fact, is to arrive finally at a decision as to which of these several possible courses of action open to the commander is the best one; but at this stage all that is required is to survey and set down in concise form each of the alternatives from which a final choice will later be made. After this the form moves on to a kind of mental "war-game" between each enemy capability on the one hand, and each course of action open to our own forces on the other. In this way it be- comes possible for a commander to visualize ex- actly what would happen in each combination of circumstances. No prudent commander certainly would want to make a decision on a course of ac- tion for the forces under him until he had tried to foresee as fully as possible all of the implica- tions and consequences of that decision. The best way to do this, of course, is to visualize what would happen if first one course of action and then an- other were adopted. And that is precisely what the "war-gaming" procedure involves. Each friendly course of action is pitted in turn against each separate enemy capability. If the original selection of enemy capabilities and of own courses of action was carefully and thoroughly done, all of the possibilities which should be considered by a prudent commander before a decision is reached will have been covered in the process. Next are tabulated the respective advantages and disadvantages which this "war-gaming" has shown accrue to each of the alternatives open to the commander. For example, it may have been shown that one course of action would be highly successful if the enemy adopted a particular one of its capabilities, but most disastrous if the enemy were to adopt any other capability. On the other hand, a second course of action might be visualized as relatively successful no matter which capability the enemy adopted. This is just the sort of corn- 277 parison which should help in making a final deci- sion. By setting these comparative advantages and disadvantages down in tabular form, the best course of action may become directly apparent. At any rate, the commander's final decision could then be made in the light of a full understanding of just what he stands to gain or lose. The commander is now ready to take his final step, the decision itself. On the basis of the anal- ysis just completed, he must select the one course of action?or in some cases the combination of several?which strikes him as being the best from all points of view to accomplish his mission. The statement of this course of action is itself the decision, and as such is listed in the fifth and final paragraph of the Estimate of the Situation form. In the standard form, the decision, like the mis- sion, must be expressed in two parts. The first part is the course of action decided on, for exam- ple, "to seize X-ray Island." Following this should come the words "in order to" plus a restate- ment of the original mission set down at the start of the estimate. Thus a typical decision might read as follows: "To seize X-ray Island, in order to establish a base for further operations against Japan." In this way the final paragraph of the estimate form is tied in directly with the opening paragraph, and illustrates how, as a result of the thought processes involved in the body of the esti- mate itself, the commander has moved from an assigned mission to a specific decision as to how that mission is to be accomplished. That, of course, was the initial purpose in undertaking the estimate procedure. There is really nothing mysterious or particu- larly strange about this Estimate of the Situation. It is no substitute, of course, for mental activity or alert thinking. It cannot transform a man into a military genius simply by virtue of being prop- erly applied. But its careful use by a naval com- mander will assist him to avoid either overlooking or underestimating any significant bit of informa- tion that might conceivably bear on the soundness of his ultimate decision. That in itself is enough to recommend it in any complicated or crucial military operation. In some cases experienced commanding officers may not actually write out a full formal estimate CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS in the manner just described before arriving at a decision. For these officers the estimating process may involve simply an oral discussion between themselves and the members of their staffs, out of which, after due deliberation, the final decision emerges. But the important point is that even in oral discussions of this kind the prudent com- mander must see that each of the significant fac- tors listed in the standard estimate form is actu- ally covered either by his staff in their own pres- entations or, at least to his own satisfaction, by his own personal thinking. At any rate, whether the estimate is developed in written or in oral form, the responsibility of the commander and his staff officers is the same. Each staff officer must supply certain parts of the information called for by the estimate. The in- telligence officer, for example, must supply the information about the enemy's strength, his capa- bilities, and the area of operations. The opera- tions and logistics officers must supply informa- tion about the strength of the commander's own forces, and recommend suitable courses of action to accomplish the assigned mission. When it comes to the "war-gaming" portion, the pitting of own courses of action against enemy capabilities, all of the staff officers will probably participate in the discussion. To that extent, then, the final decision, although still the immediate responsi- bility of the commander alone, is actually a group product of the commander and his staff, working harmoniously as a single military "mind." Development of the Plan With the broad decision out of the way, the next job of a military commander is to draw up detailed plans for putting that decision into practical effect. The plans are developed as follows: Development of the Plan 1. ANALYZE THE DECISION 2. STATE ANY ASSUMPTIONS USED 3. LIST COMPONENT OPERATIONS (a) Obtain intelligence (b) Movement or deployment (c) Protect own forces (d) Isolate the objective (e) Gain the objective (f) Provide logistic support (g) Provide for security and deception (h) Other component operations as appropriate 4. DETERMINE HOW EACH COMPONENT OPERATION IS TO BE CARRIED OUT; LIST FORCES AVAILABLE 5. ORGANIZE FORCES INTO TASK ORGANIZATION 6. ASSIGN TASKS TO APPROPRIATE ELEMENTS IN TASK ORGANIZATION 7. SOLVE COMMAND PROBLEMS (a) Communications (b) Coordinating measures (c) Location of officer in tactical command and second in command (d) Time and date plan will become effective 8. COMPILE INFORMATION NECESSARY TO PERMIT SUBORDI- NATES TO PERFORM TASKS INTELLIGENTLY (a) General situation (b) Enemy forces (c) Friendly forces (d) Area of operations CONFIDENTIAL 278 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R0001002100112.g -tarn r IDENTIAL INTELLIGENCE STAFF PROCEDURES Logically, the first thing to do is to determine what specific component operations must be per- formed to achieve the broad, generalized goal stated in the decision. A decision to capture a particular island, for example, would involve such component operations as preattack reconnaissance, combat loading, movement to the objective area, air and surface screening of the movement, and gunfire support of assault troops. Whatever the overall objective, its accomplishment will always involve a number of smaller, more specific tasks which the successful commander must thoroughly canvass in advance. After that he should organize the forces at his disposal in such a way as to per- form these operations most effectively, and then assign appropriate tasks to the various subdivi- sions of this organization. Besides the combat operations themselves a com- mander will at this stage also want to anticipate the various supporting details involved, such as what supplies he will need, and when and how he must get them; how and where he will exercise his command; what communications procedures will be most suitable for the operation; what addi- tional intelligence is needed for more effective planning; and what information is to be distrib- uted to his subordinates to insure their intelligent execution of their assignments. All of these de- tails should be foreseen at this early stage, because the more detailed the advance planning, the more smoothly the operation will be executed. Indeed this particular phase of the command process is especially designed to provide a smooth transition from the generalities of the command decision to the concise details of the operational directive which will eventually implement it. In some cases this planning will be written out along the lines indicated in the format. In other cases it may con- sist simply of rough notes in the possession of the commander or various members of his staff. But unless the planning has been actually done in one way or another, the directive that sets the opera- tion in motion will certainly suffer. Issuing the Directive After the preliminary planning comes the prep- aration and issuance of the directive. Here the commander usually has no option; the directive is a written document and must be issued formally as such. The standard format of an operational directive is as follows: The Directive Form (Operation Plan or Operation Order) Task Organization (list all subdivisions into which the command is organized for the opera- tion, with designating number and descriptive name for each subdivision) 1. General Situation (include here such information about the general sit- uation as will permit a subordinate to understand current operations, including information about enemy forces, friendly forces?not listed in task organization?plus a statement, in the case of operation plans, of any assumptions involved) 2. General Plan paragraph (state what is to be accomplished by the inte- grated efforts of the command as a whole and why?in other words, restate the commander's original decision) 3. Task paragraph (assign individual tasks to each subdivision listed in the task organization above, plus such other tasks as may be common to all subdivisions) 4. Logistics paragraph (indicate the availability of supplies and services, and the general plan for logistic support of the operation) 5. Comm,and paragraph (such instructions as are necessary to facilitate the exercise of command during the operation, such as, location of the commander and the second in command, communications procedures, zone time to be employed, etc.) Annexes, Appendices, and Tabs (as appropriate) 279 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENfiRe roved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS The directive creates the task organization, for- mally assigns component tasks to the various sub- divisions of this organization, makes provision for the performance of all necessary support func- tions, establishes times and schedules, and supplies subordinate commanders with such supplementary information as they may need to perform their jobs properly. Incidentally, this supplementary information is usually not set forth in the body of the directive itself, but is included in a series of annexes attached to the directive. These annexes may include details on any aspect of the directive which needs elaboration; for example, the task organization, movement plan, battle plan, com- munications plan, the logistics plan; or, as in the case of the intelligence annex, they may supply subordinate commanders with pertinent informa- tion about the enemy and the area of operations, plus appropriate instructions for collecting during the operation itself such additional information as may be desired. In the operational planning that leads up to the issuance of a directive of this kind, there is often a persistent element of uncertainty regard- ing one or another point that bears closely on the success of the plans being formulated. In developing defensive plans, for example, there may be doubt as to the direction from which the enemy will be likely to strike, or, in the case of offensive plans, it may not be known whether certain necessary reinforcements will actually be available in time to take part in the offensive. In cases such as these it is often the practice for a commander and his staff to do their preliminary planning, including even the issuance of the ap- propriate directive, on the basis of certain assump- tions with regard to these missing details. (See "Development of the Plan," item 2.) When this is done, the assumptions made must be clearly indicated as such. As its name implies, an as- sumption in military planning refers to a certain condition or situation, either unknown or cur- rently contrary to actual fact, which for the pur- poses of planning is assumed to be true. Thus in the case of an unknown quantity, like the di- rection of an impending enemy attack, one plan CONFIDENTIAL 280 might be drawn up on the basis of the specific assumption that the enemy will attack from the south, while an alternative plan might be devel- oped on the basis of the contrary assumption that he will attack from the north. Then as events disclose which of these two assumptions is true, the commander can also determine which of his alternative plans should govern his actual opera- tions. Or, to take the case of an assumption pres- ently contrary to fact, that reinforcements not now on hand will become available, the com- mander might elect to put his plan into effect as soon as the assumption becomes true, or to discard it if circumstances show that the assumption will not become true. Naturally, a prudent commander will want his plans to be broad and flexible enough to cover as many contingencies as possible. This operational directive, then, will be issued with the understand- ing that it is to be carried out?unless expressly rescinded?no matter what subsequently develops. The commander will hope that his thinking and planning have been thorough and extensive enough to encompass all reasonable developments. In that case the commander makes no assumptions in his planning, because every assumption limits the flexibility of his plan and to that extent weak- ens it. This kind of directive becomes effective upon receipt, and is known as an operation order. On the other hand, the commander may prefer to draw up his directive in tentative form, involv- ing one or another assumption, and issue it with the understanding that it will become effective only on later notification, usually after the matter covered by the assumption has been clarified by subsequent events. In that case the directive will be called an operation plan. The only difference between an operation order and an operation plan is that the latter includes one or more assumptions (specifically mentioned in the general situation paragraph) and is effective only on later signal, while the former contains no assumptions and is usually effective on receipt. Once an operation plan is put into effect it functions in exactly the same way as an operation order, and therefore, on all other points, the operation plan should follow Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES CONFIDENTIAL the same format as the order, and should convey 4-1-te same relevant information for the guidance direction of the commander's subordinates. vising the Planned Action Finally, the operational commander must super- vise the execution of the action which he has pre- viously decided on, planned, and ordered into exe- cution. Even the best-laid plans, however, can go awry, and uncertainty and contingency are rarely more in evidence than in the conduct of military operations. A combat commander, there- fore, must keep a careful eye on the actual progress of his operation so as to be ready to alter his original order whenever circumstances dictate. There are four main developments, all of which can occur on any battlefield, that justify a change in the original order. There may have been some error or misunderstanding; there may be a change in the enemy's situation, or at least in what is known about it; there may be a change in our situation, some ship may have run into unexpected difficulties, or some reinforcements may have failed to show up; or, finally, there may be a change in the mission assigned by higher headquarters, per- haps as a result of a new situation confronting the superior. In each of these cases, the commander must make a decision on the spot as to how to change his original order to meet the altered cir- cumstances. In the heat of battle, of course, there is rarely time for lengthy reflection or elaborate checking and rechecking. Presumably, in such circumstances, a commander will automatically make a mental estimate of the situation and then issue his revised orders. Still, the degree to which even these spot decisions made under difficult com- bat conditions are successful will be determined by the extent to which the commander, in more leisurely circumstances, has already mastered the various planning procedures outline here and made them a part of his normal mental habits. INTELLIGENCE IN THE BASIC DECISION In the light of these four steps which an oper- ational commander must go through in carrying 2619-54-19 281 out his command responsibilities, just where do intelligence and the intelligence staff officer fit in? Actually intelligence has a specific job to perform for the commander at each of these stages, and each one of these specific jobs involves a standard formal pattern which corresponds to a step in the command process itself. These four jobs, and their relationships to the stages of the command process, are shown in the following table: Commander 1. Estimate of the situation. 2. Development of the plan. 3. Preparation of the directive. 4. Supervision of the action. Intelligence Officer 1. Intelligence estimate. 2. Intelligence collection plan. 3. Intelligence annex. 4. Running intelligence estimate. Just as the four stages of the command process form a special kind of cyclical procedure which is repeated in the case of every new decision that comes up as an operation progresses, so the four steps outlined for the intelligence officer also con- stitute a pattern which include within it the phases of the familiar intelligence cycle applied to the planning and execution of actual operations. Intelligence Estimate In connection with the commander's estimate of the situation the intelligence officer's job is to sup- ply all of the information concerning the enemy and the area of operations. This information is submitted by the intelligence officer on a form called an intelligence estimate. In practice the intelligence estimate, like the commander's esti- mate, may under certain circumstances comprise only an oral summary. But the following stand- ard form for it has been established and is usually followed in assembling the pertinent information, regardless of whether it may eventually be pre- sented orally or on paper. CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL Classification Charts or maps: INTELLIGENCE FOR NAVAL OFFICERS Intelligence Estimate Form 1. MISSION 2. THE SITUATION (a) General situation (b) Characteristics of the Area of Operations (1) weather (2) topography (3) hydrography (4) transportation & telecommunications (5) economic (6) sociological (7) political (8) other factors, as applicable Enemy situation (1) numerical strength and combat effectiveness (2) composition, including order of battle (3) disposition or deployment (4) logistics (5) reinforcements (6) r&um6 of current operations (7) time and distance factors (8) strength and weakness factors (including enemy vulnera- bilities) (9) other factors, as applicable 3. ENEMY CAPABILITIES (a) Preliminary identification (in terms of w:hat, when, where, in what strength) (b) Analysis of each capability (1) relation to other capabilities (2) effect on accomplishment of our mission (3) evidence indicating relative probability of adoption (c) Final listing in order of relative probability of adoption (c) Organization Place Date and Time SIGNATURE Distribution: Also like the commander's estimate, the intelli- gence estimate begins with a statement of the com- mander's basic mission?which, of course, governs all pertinent planning?together with a statement of the general situation to which that mission ap- plies. Both items are essential guideposts in se- lecting what information should go into the estimate under its various headings. CONFIDENTIAL 282 Thus in compiling information concerning the enemy's situation and the area of operations, it is important to remember that an estimate is not an encyclopedia; coverage must be adequate, but it must also be distinctly limited to the specific mission at hand. In addition, each item of in- formation dealing with the area of operations should be followed by some brief statement or Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES CONFIDENTIAL conclusion indicating succinctly the practie effect of that information on any military o, _ a- tions that might be conducted in the area. As far as possible the same should be done in the case of data relating to the enemy's situation. This sec- tion should include a complete order of battle of enemy forces involved, and special attention should also be given to time and space factors, that is, to careful estimates of where the enemy can move in what particular period of time. These factors, if worked out with care, will prove ex- tremely helpful later on in determining enemy capabilities. Under "strength and weakness factors" the net effect of all the information thus far developed is summarized insofar as it bears on the strength or weakness of the enemy to conduct military opera- tions in the area involved. It is sometimes helpful in discussing enemy weaknesses to mention also any specific vulnerabilities that may have ap- peared. The statement of an enemy "vulnerabil- ity" differs, incidentally, from the statement of a "weakness" in that it should be phrased in terms of the military action which might take advantage of the specific weakness in question. For example, an enemy weakness might be listed as a long and overextended supply line. One way to take ad- vantage of such a weakness, of course, would be to direct heavy air strikes against these lines. Therefore, the enemy would be said to be "vulner- able" in this respect. In other words, while weak- ness and vulnerability are closely related as concepts, in expressing "vulnerabilities" the in- telligence officer has carried his thinking one step further in the direction of facilitating his com- mander's eventual decision. Enemy Capabilities The intelligence estimate culminates in its third paragraph with a statement of "enemy capabili- ties." Like the enemy capabilities which appear in the commander's estimate of the situation, these capabilities represent all of the courses of action which the enemy is "capable" of undertaking in the future, and which, if undertaken, would affect in one way or another the successful accomplish- ment of our own mission. From the point of view of planning these capa- bilities are the central core of the intelligence 283 estimate. They are dealt with in considerable more detail than in the commander's estimate, and their formulation is the most exacting task the intelligence officer has. For here he is not merely collecting and cataloguing bits and pieces of in- formation, but must pull the bits and pieces to- gether, along with whatever preliminary conclu- sions or inferences may already have been made, into some meaningful and coherent prediction of future enemy activity, on the basis of which his commander can then make a sound operational decision. Since capabilities are so important to the whole process of command planning, it is absolutely essential that the intelligence officer understand clearly what they involve. Ideally, a military commander can make a sound military decision only if he first knows exactly what the enemy forces opposing him are going to do. Armed with such foreknowledge, he could then dispose his own forces in such a way as to achieve maximum effect; without that knowledge he runs a greater or lesser risk of failure. Unfortunately, this brand of prophetic foreknowledge is rarely available to real (as dis- tinct from ideal) human beings, and even more rarely is it available to those engaged in military operations. For even more than most types of human endeavor, military operations are shrouded in a cloud of uncertainty or inadequate informa- tion, not merely about the enemy, but about our own forces as well, a situation which the famous military philosopher Clausewitz termed "the fog of war." It is the intelligence officer's responsibility to dispel this fog insofar as it concerns the enemy, and, traditionally, the notion of "capabilities" has been the device by which he has attempted to do so. Briefly, here is how it works. Since he can- not say with certainty what the enemy is going to do, at least he can determine all of the things which the enemy is capable of doing. Then, if his calculations have been careful and thorough, the course which the enemy actually does select will be among those considered. If, in addition, the intelligence officer can also determine the de- gree of probability that the enemy will adopt one rather than another of these capabilities, or, in other words, their order of relative probability, he will actually have gone a good way towards CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS reducing the area of uncertainty about the future that attends any command decision, even if he has not been able to predict with absolute certainty. Capabilities vs Intentions At first it might appear that a somewhat less complicated solution to this problem of predicting an enemy's future actions is available simply by pinpointing the enemy's intentions. It might be argued, for example (and with some merit), that although a myriad of courses are theoretically open to the enemy, only one can actually be se- lected. To take all of these theoretical possibili- ties into account before a command decision is made, therefore, is wasteful both of time and sub- stance. Hence why not concentrate instead on what the enemy intends or wants to do rather than on what he is capable of doing? This concentration on intentions does have a certain plausibility, but on closer inspection it turns out to be deceptive. In the first place, in- formation about enemy intentions, since it neces- sarily involves the mind of the enemy's high com- mand, is the most difficult of all to obtain; hence the likelihood of a deduction based on solid evi- dence rather than on some "hunch" is compara- tively slight. Secondly, intentions, even when accurately known, are by nature always subject to change. Even when the commander is so for- tunate as to have accurate word of the enemy's intentions as of a certain moment in time, there is always the possibility that some later development may force the enemy to alter his plans and con- centrate instead on some other course of which he was equally capable but which, until then, he had not been disposed to favor. Thus by focusing his attention exclusively on the single course of action which the commander is convinced that the enemy intends to follow, and as a result disregarding other courses of which the enemy was also entirely capable, any slightest error in the commander's information or any last-minute change in the enemy's plans would prove completely disastrous. From the vantage point of hindsight some com- mentators have even suggested that the defeat at Pearl Harbor was the result in part of this kind of preoccupation with enemy intentions instead of capabilities: convinced that any Japanese strike would be directed to the south, we did not pay CONFIDENTIAL 284 adequate attention to their alternative capability of striking eastward. In some exceptional cases it is possible for a commander to get good information about enemy intentions, and in such cases he would be making a grave error not to act on it. A classic example is the Battle of Midway, in World War IL Tipped off from secret sources as to Japanese intentions to strike at Midway, Admiral Nimitz deliberately ignored a continuing Japanese capability to strike once again towards Australia, and shifted all of his limited carrier forces north to the Midway area. That decision, of course, paid off heavily, but even so it involved a calculated risk, not only that the information was reliable and had been properly translated and evaluated, but also that the information was not deliberately leaked out as part of a planned deception effort. Similarly, Stalin is reported to have made the fateful decision in November 1941 to reinforce his Moscow defenses at the expense of his Man- churian border positions mainly on the strength of inside information from the Sorge espionage ring that the impending Japanese move would be south against the Americans and the British rather than north against the U. S. S. R. Indeed, on the highest level of military planning a concern with intentions as well as capabilities is probably inevitable, partly because it is unlikely that a potential enemy will make any last-minute change in basic national policy, and partly because at the topmost level any comprehensive survey of capabilities is likely to cover so wide an area that it becomes almost meaningless without some addi- tional information as to the specific direction (or in other words, the "intent") of the enemy's cur- rent planning. In terms of capabilities alone, for example, the Soviet Union and her satellites could be said to be capable of striking against the free world at almost any of a great number of points along a vast perimeter. Since it would be mani- festly impossible for us to fortify all of these spots equally well, we must therefore have some addi- tional information as to whether the Soviets actu- ally intend at the moment to exercise these capa- bilities, and if so, precisely where. Relative Probability While a concern on the part of the intelligence officer with enemy intentions in place of capabili- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES CONFIDENTIAL ties is a risky business, it is equally true that a mere listing of capabilities will usually make the picture of the enemy situation too broad and gen- eral to be of any real help in operational planning. There is a solution to this dilemma. It lies in supplementing the bare listing of capabilities the- oretically open to the enemy with an appraisal of their relative probability of adoption. In this way the intelligence officer and his commander can focus more of their energy and attention in some specific direction without at the same time entirely disregarding all other alternatives. The evidence that can be used to determine these relative probabilities need not be as specialized as that which is necessary to pinpoint a clear enemy intention. Any direct "pipeline" to the enemy's high command would, of course, supply substan- tial objective evidence pointing to an increased probability for one rather than another capability. But so too would any number of other types of circumstantial evidence, such as troop movements, or the construction of defense fortifications. The only restriction here is that arranging theoretical capabilities in some specific order of probability demands more than just a hunch; some real, ob- jective evidence must be available, and the char- acter of that evidence should be clearly described in the paragraph of the intelligence estimate which deals with capabilities. Without such evidence, the intelligence officer can only report that no evidence is available to indicate the relative prob- ability of one capability over another. "Adoption" vs "Accomplishment" How is the statement of any enemy capability actually phrased in the intelligence estimate? What are the terms used to express it? To an- swer these questions, it is necessary to review briefly the basic purposes which this notion of "capabilities" serves in the military planning process. An enemy capability has already been defined above as a course of action which the enemy is physically capable, with the forces at his disposal, of undertaking (irrespective of whether he will or will not undertake it) , and which, if under- taken, would affect?either favorably or unfavor- ably?the accomplishment of a commander's own mission. In formulating these capabilities no consideration is given to any opposition by our own forces. They are entirely "unopposed" capa- - bilities. It is important for a commander to understand the enemy's capabilities in order to make his own decision accordingly. It is equally important for, them to be known to the commander's subordi- nates, so that they may be prepared for whatever actions may be taken against their own particular forces during the course of the actual operation. In either case, it would seem only common sense to express these capabilities as specifically and exactly as possible. Ordinarily, careful answers are required to the following four questions : what? where? when? and in what strength? It is not enough to say simply that the enemy is capable of launching an attack with motor torpedo boats; if possible, that statement should also include some indication of where the attack can take place, when or after what time it can occur, and in what strength the enemy can launch it. Thus a capa- bility might more helpfully be stated: "Attack with up to 40 motor torpedo boats at any point north of Cape Henry at any time after 1600 on 27 June." Whenever the pertinent information to answer one or another of these specific questions is not available, that fact should simply be noted in the statement of the capability itself. Thus, for example, without specific information on num- bers, the capability above would be stated as fol- lows: "Attack with an unknown number of motor torpedo boats at Cape Henry at any time after 1600 on 27 June." The chief responsibility of the intelligence officer here is to reduce the broad area of uncer- tainty_as much as possible. Even if exact infor- mation as to how many boats are likely to participate in such an attack is missing, it may still be possible to indicate at least some broad out- side limits, with the use of such terms as "with at least" so many boats, or "with up to" so many. Even when the limits are broad, the planners are still better off than they would be without any information at all. Incidentally, in connection with air operations there is a somewhat specialized procedure for ex- pressing these specific details. Air capabilities, whether offensive or defensive, are of two kinds: maximum strength and sustained effort. The 285 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002- CONFIDEIMAL oved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS maximum strength, as might be supposed, is ex- pressed in terms of the total number of aircraft of certain types which are capable of operating over the area in question. Sustained effort capability, on the other hand, is measured in terms of the fre- quency with which the aircraft available to the enemy can attack on a continuing basis. It is cal- culated, according to a carefully devised formula, in terms of "sorties," or in other words, the num- ber of flights which the enemy can make over the target and return within some fixed period of time, usually 24 hours. In calculating the sortie factor, distances of different aircraft from the target, cruising speeds, turn-around times on the ground, and normal rates of attrition for aircraft in sus- tained operations must all be taken into account. No such preciseness as this is required when it comes to incorporating these statements of enemy capabilities in the commander's own estimate of the situation. His problem, after all, is to decide on some broad general course of action for his own forces, leaving specific details to the plan and the directive. Since the commander's decision must be a general one, the several "own courses of action" theoretically available to him to accom- plish his mission, from which he must select the best, must themselves be expressed in general terms. This means that the enemy capabilities, which have to be pitted or "war-gamed" against these "own courses of action" in the commander's estimate of the situation, must also be equally broad and general in their formulation, if the "war-gaming" process is to be meaningful at all. Yet, as has just been seen, enemy capabilities as formulated in the intelligence estimate are highly specific and precise. Some device, then, is needed to bridge the gap between the statement of enemy capabilities in the intelligence estimate, and the statement of enemy capabilities as they subse- quently appear in the commander's estimate. This is achieved by expressing enemy capabil- ities in the commander's estimate in what are called "terms of accomplishment ;" that is, in words that designate the broad general result or objective which the enemy will be trying to accom- plish,' while in the intelligence estimate, on the other hand, enemy capabilities are expressed in terms of adoption, that is, in words designating specific and individual courses of action which the CONFIDENTIAL 286 enemy is capable of initiating or adopting, without regard for the broad objective he may be trying to accomplish. Such words as "destroy," "interrupt," "sink," for example, are words which designate a com- pleted result or accomplishment, while such words as "attack" and "strike" designate an action that is adopted without implying the results it may or may not accomplish. By employing this "accom- plishment" phraseology it becomes possible to boil down a sizeable number of "adoption" capabilities from the intelligence estimate into a single one for use in the commander's estimate and that means, of course, that the job of "war-gaming" enemy capabilities against own courses of action becomes a much simpler matter than it would otherwise be. For example, an intelligence esti- mate might list a motor torpedo boat capability, an air attack capability, a submarine capability, a coastal defense gun capability, etc., each with different specific components of when, where, and in what strength. Yet all of these individual "adoption" capabilities might conceivably be di- rected toward the same broad result, for example, to "destroy our amphibious force prior to the ship-to-shore movement." In that case, the latter would amount to a single "accomplishment" capa- bility of the enemy, which could then be used by the commander in his own estimate of the situa? - tion for determining his ultimate decision. This distinction between "adoption" and "ac- complishment" capabilities often confronts stu- dents with one of their greatest difficulties in un- derstanding the estimate form. Actually, most of the difficulty is probably semantic, with words suggesting a greater distinction than actually ex- ists. As long as the intelligence officer under- stands the necessity for "boiling down" the half dozen or so specific capabilities that he has come up with in his own estimate into two or three more general capabilities for use in the commander's estimate, he should find no practical difficulty in this distinction. The boiling-down job may be done by the intelligence officer himself after the intelligence estimate has been submitted, or it may emerge out of informal discussions which the whole staff conducts on the individual capabilities originally worked up by the intelligence officer. In either case the enemy's situation is the only pproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 200 M1, ? ca-mghwoolo5R000loo2100101BENTiAl. INTELLIGE P proper guide. Both types of capabilities are "un- opposed," that is to say, they are formulated without regard for whatever opposing effect our own forces may be able to offer, which is some- thing that is considered, of course, at a later point in the commander's estimate. The discussion of enemy capabilities in the in- telligence estimate involves three distinct stages. First, the various "adoption" capabilities are identified and listed, as specifically as the available information warrants. In the second stage each individual capability is discussed, a process that normally covers three things: (1) the effect of the capability, should it be adopted by the enemy, on the accomplishment of our own mission; (2) the relation of the capability to other enemy capa- bilities; that is, whether it can be adopted along with certain other capabilities, or whether its adoption precludes the adoption of others; and, (3) what objective evidence is available to indicate the relative probability of adoption. In the third stage the capabilities previously identified are re- listed in the order of the relative probability thus deduced. Any boiling down of these various "adoption" capabilities into "accomplishment" capabilities for insertion directly into the com- mander's estimate of the situation is not a job that is normally done within the conventional framework of the intelligence estimate itself. Strategic Intelligence Estimates Before leaving the subject of intelligence esti- mates generally and the contribution they make towards basic military decisions, a brief additional word is in order with regard to the form which these estimates should take in the case of strategic situations. In the foregoing discussion the intelligence esti- mate has been described as it applies to a typical operational situation, where some specific opera- tional mission has been assigned to a naval com- mander. Many times, however, important deci- sions of a military nature must be taken in times of peace, when no actual operations against an "enemy" are involved, such as those relating to the deployment of defensive forces, or the rate of mili- tary production, or the type of recruitment pro- gram to be instituted. Circumstances which pro- voke decisions of this type are customarily referred to in military parlance as "strategic" situations. The former chapter on the components of intelli- gence knowledge indicated the tremendous variety of strategic problems. In strategic situations no less than in opera- tional ones, however, it is imperative that com- mand decisions be made on the basis of the best information available concerning the potential enemy and the potential area of operations. And. so there is a need for strategic intelligence esti- mates. At the same time the somewhat specialized character of strategic situations dictates certain differences in the format of strategic estimates from that already prescribed for operational estimates. For one thing, since no hostilities are involved, there can be no "mission" to govern the prepara- tion of the estimate and determine what material should or should not be included. Instead the strategic intelligence estimate customarily opens with a statement of the specific problem or question posed by the strategic planner or other authority which requests the preparation of the estimate. Ordinarily this will have something to do with the military capacity or potential of some foreign country; for example, its capacity to oppose oper- ations from some outside quarter. Or it may deal with the probable future course of foreign mili- tary operations already in progress. In each case the nature of the estimate is determined by the specific information which the strategic planners are interested in getting, and the final conclusions of the estimate should answer the specific question posed at the outset. This means that the conclu- sions of a strategic estimate may differ somewhat from the rather formal statement of capabilities and relative probabilities which has been pre- scribed above for the standard operational estimate. The second major difference between strategic and operational intelligence estimates is that in the former more than one foreign military force may be involved. While it is not the prime respon- sibility of the intelligence officer to deal with the strength or capabilities of his own forces, all for- eign forces not under the direct control of his commander do concern him, either as potential en- emies or simply as elements which have to be analyzed and appraised in order to understand 287 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDEM oved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS some particular area of the world in which the strategic planners may be interested. In fact, in areas where foreign military forces may be actu- ally fighting one another the intelligence officer must not only survey the strength of each of these separate forces in the strategic estimate, but must also attempt to visualize the probable future course of that conflict. This means that he will actually have to conduct almost the same kind of mental "war game" between opposing forces (though in this case, none of them our own) which a com- mander performs in his Estimate of the Situation. It also means that the conclusions of a strategic intelligence estimate of this kind would certainly go well beyond the mere statement of "adoption" capabilities in the customary operational intelli- gence estimate to a fuller consideration of prob- able results and developments. Because of these differences, no standard format for the strategic intelligence estimate has been developed. In practice, the form which estimates of this type take is determined by the particular government agency which may be involved, as well as by the type of information desired. Neverthe- less, with the differences mentioned above, all esti- mates follow the same general principles, and suc- cess depends first on the careful collection and marshalling of relevant facts, and then on the careful analysis of all the possibilities and impli- cations that logically follow. INTELLIGENCE IN THE PLANNING PROCESS Preliminary Procedures Once the commander's decision has been made, the staff turns to the task of working up detailed plans to implement that decision. First of all, the intelligence officer will probably want to block out some kind of tentative planning schedule for the guidance of his own division, so as to provide enough time to do all the many detailed jobs that have to be clone prior to the actual target date. As planning progresses, of course, some changes in the target date or in other details may be made which will dictate corresponding changes in the intelligence planning schedule, and to this extent no schedule can be entirely hard and fast. But at least a careful intelligence planning schedule can serve as a reminder to all hands of what re- CONFIDENTIAL 288 mains to be done and the time available for doing it. At this preliminary stage the intelligence divi- sion should also adopt, if it has not already done so, some kind of standard operating procedure (SOP), both for itself and for the various other intelligence activities in the forces under the com- mander. This SOP should be issued to all sub- ordinate units over the signature of the com- mander, and should cover most of the intelligence matters that are normally germane to any opera- tion, such as counterintelligence, the handling of captured documents and prisoners of war, the filing of periodic reports, etc. Like the planning schedule the standard operating procedure is in- tended chiefly as a guide and may be modified later as circumstances require. Essential Elements of Information The first substantive job which an intelligence officer must do in the planning stage is to make provision for the collection of whatever additional information is needed to insure the success of the forthcoming operation. As was pointed out earlier in connection with the development of the commander's plan, the collection of necessary in- telligence is usually one of the component opera- tions involved in the execution of any decision, and, unlike some of the others, one that has to be started well in advance of the actual target date. The pertinent information on hand has already been briefed and interpreted in the intelligence estimate. After the decision has been made a care- ful study of this estimate will usually show that many items of information about the enemy or the area of operations, which should be known to in- sure a successful operation, are missing. Before planning can proceed properly this missing in- formation must be obtained. Questions like these may have to be answered: is the soil of the beaches firm enough to support our combat vehicles? Will the enemy defend his beaches or counterat- tack instead from inland positions after our troops are ashore? Is there enough water in the area to sustain our troops without additional supplies of our own? Such questions are termed "essential elements of information," often abbreviated as "EEI." Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES In practice, of course, not every missing item of information a commander thinks he ought to know will turn up before the operation actually gets under way. Yet the commander may decide to go ahead anyway. To that extent, therefore, some of the essential elements of information are not, strictly speaking, "essential" to the success of the operation. The Collection Plan Having decided what information is needed, how does the intelligence officer go about collect- ing it? The first step is to determine specifically what concrete evidence might answer the questions posed by the essential elements of information. For example, if one of the EEIs is: "Will the enemy defend his beaches or counterattack instead from inland positions ?" then evidence such as the location of fixed defenses or established fields of fire would tend to answer the question. Specific bits of evidence of this kind which can answer the EEIs are called indications, and the first step in collecting information is to outline the indications that apply to each individual EEI. Now if information is to be collected, it must, of course, be collected by somebody. The next step, then, is to determine which units or individuals are available, and which are best qualified, for the collection task. In the case of beach defenses, for example, an underwater demolition team or a photo reconnaissance unit might be best equipped to spot the pertinent indications. Roughly, there are four broad categories of potential intelligence collectors: (a) nonintelli- gence units and personnel within our own com- mand, such as ground troops, aircraft, submarines, etc.; (b) personnel of the intelligence division, such as technical intelligence teams, translator and interpreter units, scouts, etc.; (c) military per- sonnel not tinder our command, such as ONI, other governmental intelligence agencies, other military services, and friendly foreign military personnel and agencies; and (d) nonmilitary personnel, such as civilian informants. Personnel of the intelli- gence division can of course be used for such col- lection tasks as the intelligence officer himself may determine, while the services of military personnel not under our command would be available only 269196-53-20 CONFIDENTIAL on request through proper channels. The use of civilian personnel would depend on the nature of the desired information, and the competency of the individual. Nonintelligence personnel within the command can be used only with the coopera- tion and approval of other staff officers, so that the assignment of collection duties to operational units will not conflict with other operation duty. Indeed it is chiefly for this reason that the com- mander himself is always considered as officially determining the EEIs, for he alone can judge whether some missing item of information is w important to him that its collection becomes a priority assignment for his own operational forces. After collection duties have been allotted to the units available, the next job is to draw up a sched- ule for getting that information back to the in- telligence division in time to use it. Some infor- mation, for instance, will be needed almost imme- diately or at least prior to some fixed deadline. Other items, like the condition of beach obstacles, for example, should be reported in terms of the current situation. Still other information, such as order of battle data, should be reported on a regular and continuing basis. These differing re- quirements dictate the need of a careful reporting schedule, so that units doing the actual collecting will submit reports in time to be of use. In instructing collection personnel not trained in intelligence work, the intelligence officer should avoid using the broad and general terminology of the essential elements of information or even of the indications. Rather be should clearly describe exactly what he wants them to look for and report. Otherwise the collection effort may become a com- plete waste of time. In the case of information on beach defenses, it probably would not be enough to tell an air reconnaissance group simply to check and report on "beach defenses." The intel- ligence officer should state the precise kind of defenses he has in mind: pill boxes, trenches, barbed wire, underwater obstacles, or coastal de- fense guns. It is always much easier to see some- thing when you know exactly what you are looking for; and the intelligence officer will get better re- sults from collection assignments if he takes noth- ing for granted. These details, therefore, should serve as the basis for specific orders to collectors, and the intelligence officer's responsibility is to see 289 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS INTELLIGENCE COLLECTION PLAN Essential elements of information Indications Basis for specific orders Agencies to be employed ........., Tim* and place for reporting information I I I 0 e u ? -a '41 vg..22 -.5-3i T 2 6" ..E - i I i 11111111 (list for each (any additional (designate with an "x" mark (specify the head. individual EEI) instructions that which agencies are able to quarters or section will facilitate obtain the specific bit of in. to which reports collection of de- "fa motion, and by circling one should be made, the sired inform?. such "x" select the one which frequency with which tion) will for have its major collection) responsibility they should be made, and any deadline ) Figure 13.?The Intelligence collection plan? abular form. that they are developed with enough care to pro- duce the results he wants. Taken together these five steps: determining the EEI, listing the indications, designating the collection agencies, scheduling reporting dead- lines, and issuing specific orders to collection per- sonnel comprise what is known as the collection plan. The collection plan may be drawn up in a variety of forms, but experience has proved that one similar to the tabular format shown in figure 13 is most useful. The important thing is not what form is used but whether all of the essential steps have been taken. Collecting information is not a job which ends when the formal directive has been issued or even when the operation has started. It continues throughout the life of the operation, and so pro- vision must also be made within the text of the operation order itself for the rules and techniques that should govern additional collection. That is one of the main purposes for the next major intel- ligence job, the preparation of the intelligence annex. CONFIDENTIAL 290 The Intelligence Annex It has been previously shown how at each suc- cessive stage in the command process the intelli- gence staff assistant performs some specific job designed to aid the commander in the successful execution of that particular stage. After the com- mander's decision has been made and his basic plan developed, the next command step is to issue the formal directive, the operation plan or opera- tion order. Intelligence has two legitimate inter- ests in the text of this directive. One is to see that it includes all information about the enemy and area of operations which subordinate commanders need to know to carry out their own parts of the operation successfully. The other is to dissem- inate to all subordinate headquarters such instruc- tions as may be required to insure the full and proper functioning of the intelligence aspects of the operation. In small operations, both purposes can ade- quately be served simply by incorporating the appropriate material within the body of the direc- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES tive as briefly and concisely as possible (sometimes perhaps even to the point of undue brevity), and by putting all amplifying details, including those dealing with intelligence, into separate anaexes. Customarily, all material relating to intelligence CONFIDENTIAL in any operation plan or order will be found in what is known as the intelligence annex. Following is the standard form for an intelli- gence annex which is designed to cover the three principal tasks which the annex must perform. Standard Intelligence Annex Form, File Number CLASSIFICATION Type of basic directive and serial number Title of superior of issuing command Title of issuing command and admin- istrative title Name of flagship or headquarters Place of issue Time of issue INTELLIGENCE ANNEX Map or chart references: PART I?INTELLIGENCE SUMMARY 1. The Situation a. General situation b. Enemy capabilities c. Characteristics of the area of operations (1) subdivisions as required d. Enemy situation (1) subdivisions as required PART II?INTELLIGENCE MISSION and COLLECTION PLAN 2. Intelligence Mission 3. Essential Elements of Information 4. Collection plan a. Orders to subordinate or attached units b. Requests to higher, adjacent, and cooperating units PART III?SUPPLEMENTARY INSTRUCTIONS 5. Measures for handling prisoners, captured documents, materiel, etc. 6. Maps, charts, models, and photographs 7. Specialist teams 8. Counterintelligence 9. Reports and distribution 10. Other subjects as pertinent Appendices and tabs (as necessary) DISTRIBUTION LIST Authentication Authenticated Flag Secretary S The Commander Rank Title 291 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS In the first part the information about the enemy and area of operations is summarized. In the second, intelligence collection tasks for sub- ordinate units of the command to perform during the course of the operation are assigned. In the third all general procedures for handling and co- ordinating all other intelligence matters within the command as a whole are promulgated. Generally speaking, the information in Part I of the annex is the same information about the enemy and area of operations which appeared pre- viously in the intelligence estimate, except, of course, that it has been revised, expanded, and brought up to date by any information collected since then. As in the estimate, this summary of information, especially that dealing with the area, should include brief conclusions as to its signifi- cance for combat operations. Occasionally an intelligence annex may be fur- ther broken down into supporting appendices and tabs whenever information of an elaborate or de- tailed sort can be better presented outside the body of the annex proper. Tide and sunrise tables, for example, might well be included in a separate appendix or tab and merely referenced in the body of the annex itself. There is no set pattern to follow; it all depends on the specific circumstances and volume of information at hand. The real meat of this first part of the annex is the section dealing with enemy capabilities. This, too, generally resembles the corresponding section in the intelligence estimate, except that it must be revised and brought up to date in line with what- ever new intelligence may have been developed since the estimate originally appeared. Here, in- cidentally, the value of expressing enemy capabil- ities in specific terms of what, when, where, and in what strength becomes clear, for the annex is designed primarily to guide and assist subordi- nate commanders. From their point of view the most important information about the enemy is what he can throw against their own particular force or vessels?plus when, where, and to what extent he can do so. As in the estimate, enemy capabilities should be not merely listed, but should also be discussed in terms both of their effect on the accomplishment of our own mission and their relative probability of adoption, although both CONFIDENTIAL 292 discussions may be more condensed than they were in the intelligence estimate. Part II of the annex comprises the latest intelli- gence mission and collection plan. Since many of the tasks provided for in the collection plan which was drawn up at the outset of the planning stage will by this time have been successfully com- pleted, the collection plan reproduced in the in- telligence annex will not be an exact duplicate. Only missing information is handled in any col- lection plan. The collection plan of the annex will therefore list only the current essential elements of informa- tion and their indications. The balance of the col- lection plan will outline the arrangements that have been made to get that information. Normally, these arrangements will fall into two divisions. The first includes the collection tasks assigned directly to subordinate units of the com- mander's own forces, listed in the order in which the units appear in the task organization para- graph of the operation order. All of the details that may be needed to insure adequate collection should also be included here, because this listing of intelligence collection assignments in the annex amounts to a specific order to the subordinate units involved to perform the collection task. In fact from this point of view the intelligence annex is actually an integral part of the order itself, and must be carefully perused by all subordinates for possible assignments. For example, the "scouting unit," in addition to its other assignments, may be instructed to report all sightings of ships, air- craft, and small coastal craft, and the "air support unit" may be instructed to make specific photo- graphic reconnaissance flights. The second division of collection arrangements lists the requests for information that have been made to other headquarters. Here, for example, might be recorded the fact that certain informa- tion about guerrilla activities has been requested of Army headquarters, and will be delivered by special messenger prior to a certain hour. The collection assignments to units of the command and the requests made to outside agencies together will give subordinate commanders an adequate picture of all cuirrent plans for getting the infor- mation they need in time for them to use it. Part III of the annex is a compendium of gen- eral instructions for the guidance of subordinate WININIIHairammompiffassiamilMINIMOINNOW pproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R00010021000279 INTELLIGENCE STAFF PROCEDURES CoNFIDENTIAL units in carrying out all other normal intelligence duties and responsibilities in the course of the operation. These include such subjects as the han- dling of prisoners of war, captured documents and materiel, the security and counterintelligence measures to be taken, instructions relating to maps, charts, photographs, and the preparation of pe- riodic reports?in a word, all of the matters which are normally covered in the intelligence standard operating procedure of the command. While this procedure is already presumably in effect within the command, the annex covers these matters in specific relation to the current operation, and therefore may involve certain changes in the exist- ing SOP that are required by the particular cir- cumstances of this specific operation. For exam- ple, the type of prisoners captured in certain operations may be unusual, or there may be special counterintelligence measures required. The pro- cedures outlined in this final section of the annex, therefore, must anticipate all of these special sit- uations and provide adequate guidance to all sub- ordinate intelligence sections in dealing with them. Without the direction thereby provided the intel- ligence work of the whole command may suffer from improper coordination and integration. INTELLIGENCE IN THE RUNNING ACTION Just as combat is the "pay-off" for the com- mander, so too is it the "pay-off" for his intelli- gence officer. Once an operation is underway the commander's duty is to supervise it closely and be ready to make whatever changes in his original orders may be dictated by differences that develop between the actual combat situation and the sit- uation that was originally 'visualized by his staff planners in drawing up the operation order. These differences are of two principal kinds: dif- ferences in the position of our own forces or their rate of progress in executing the plans laid down for them, and differences in the enemy's situation or the character of the area of operations as the action moves forward. Differences of the second category, of course, will be the concern of the in- telligence officer. As was the case at Tarawa, it may develop that actual underwater conditions are vastly different from those anticipated in the original order; or, as at Biak, it may turn out that what was regarded in the original planning as a gentle, rolling hill is in reality a sharp coral escarpment, filled with a myriad of limestone caves. New weapons may be encountered, as they were at Okinawa, or new and unexpected concentrations of troops, as was the case at Leyte. All of this new information, col- lected as an operation progresses by means of the very collection procedures which were set up ear- lier in the intelligence annex, must be evaluated and interpreted by the intelligence officer for any possible affect it may have on his current estimate of enemy capabilities. Any new conclusions that emerge must be passed along very quickly to the commander himself for use in his own reestimate and in any revision of his orders. The intelligence cycle is in high gear. New information is collected as a byproduct of the fighting, processed by the intelligence staff divi- sion, and disseminated to the commander for his consideration and possible use in supervising the progress of the action. The tempo is rapid, for unless information is collected, processed, dis- seminated, and used in time it is completely worth- less. So intelligence officers in combat have a re- sponsibility not merely for accuracy but also for speed. While success may to some extent depend on individual qualities of alertness and decisive- ness of mind, it can also be greatly facilitated by the understanding and use of proper techniques on the part of the intelligence division as a whole. 293 Plots One of these techniques is the prompt and care- ful recording of all new information about the enemy and the area of operations that is received during an operation. The methods of recording may vary somewhat from command to command and from operation to operation, but in general all of them should prove helpful. A plot of enemy positions and current opera- tions is perhaps the simplest and most effective way of recording operational data. Such plots may be kept directly on a map or chart, or, per- haps more readily, on an overlay, and they may be of several kinds, depending on the specific op- erations at hand. One plot, for example, might show enemy submarine sightings, another the po- CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 _Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS sition of enemy surface forces, and still another that of enemy merchant ships. In an amphibious operation some kind of plot of enemy ground posi- tions, enemy gun batteries, and possible enemy targets ashore would almost certainly have to be maintained. An air plot, with arcs indicating maximum combat radii for the various enemy aircraft involved, is also a must if the enemy pos- sesses any air strength at all. Order of battle information on these plots may he shown directly on the overlay, or on a small sheet or card posted to one side and referenced directly to the plot itself. In some cases the intelligence division may also be required to maintain a plot of friendly posi- tions, although usually this is a job for operations not intelligence. The intelligence plot, however, will have to include enough information about friendly positions so that the data about the enemy can be properly understood. The chief value of operational plots of this sort is that they make it possible for an intelligence division to record information in a form that enables the significance of that information to be recognized by the commander or any of his staff officers almost at a glance. Thus it must be as complete and current as possible. Not all of the information which comes in during an operation, however, can be recorded graphically, and the nature of any plot imposes certain limitations on the extent of the data that can be included on it. Other techniques are therefore needed if the in- telligence division is to do a thorough recording job. Journals and Worksheets Normally the first step in recording information is its entry in the intelligence log or journal. The journal is nothing more than a chronological list- ing of all incoming dispatches and other items of intelligence value. It insures that nothing is overlooked, and that all incoming items are promptly referred to the appropriate part of the division for further recording, analysis, and dis- semination. A journal usually consists of a num- ber assigned to each new item, a listing of the point of its origin and time of receipt, a brief description of the item itself, and finally a nota- CONFIDENTIAL 294 tion as to its disposition within the division, whether to plot, worksheets, file, or elsewhere. (See fig. 14.) Once new information has been properly logged in, it is further recorded on the appropriate work- sheet. Worksheets separate information into the major categories that are of interest to the intelli- gence division at the time. These categories will, of course, be dictated by the character of the oper- ations currently in progress. Separate work- sheets, for example, might be kept for enemy sub- marines, enemy ground forces, enemy aircraft, enemy morale, or enemy guerrilla activity. Each worksheet entry should include its journal number, a risum4 of the information it contains with the letter-number code as to source and accuracy, and such conclusions or deductions as may properly be drawn from it. As each new item is added on individual worksheets, it becomes possible for an. intelligence officer to grasp rather easily the owns- tative effect of new information and to recognize at any early moment any significant trends or developments that may be taking place to alter one or another of the enemy's capabilities. (See fig. 15.) Files for Operational Intelligence The importance of an adequate filing system in any intelligence activity has been discussed pre- viously in the sections on collection and process- ing. Since operational intelligence files invoice a much more detailed job of cataloguing than do worksheets, they cannot have top priority in the early stages of a combat operation. Nevertheless, an intelligence officer with a combat unit cannot neglect the maintenance of good files as a con- tinuing responsibility, and it is perhaps only a mild exaggeration to say that in the long run an intelligence division will prove to be no better than its files. The organization of operational intelligence files is likewise a prime consideration. In general the main subject headings should correspond to the principal categories of enemy activity that are likely to be of continuing interest to the intel- ligence division, and these should then be further cross-referenced with as much care and detail as time permits. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002za INTELLIGENCE STAFF PROCEDURES C 0 N FID ENTIAL COMMAND SAMPLE INTELLIGENCE JOURNAL SHEET FORM From: To: Date LOCATION TimeIncidents, Serial No. Date/ time messages, orders, etc. (identify, with place and time of origin) Action k to en In Out ' , ' Figure 14.?Sample intelligence loumal sheet form. 295 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS SAMPLE INTELLIGENCE WORKSHEET FORM COMMAND: SUBJECT ? Journal No. of source Date of source Information Evaluation and comments CONFIDENTIAL Figure 15.?Sample intelligence worksheet form. 296 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R00010021 NTIAL INTELLIGENCE STAFF PROCEDURES Running Intelligence Estimate From the commander's point of view what is needed most in supervising the execution of a planned action is word of any significant changes in enemy capabilities. To meet this requirement the intelligence officer must maintain a running intelligence estimate, an accurate, up-to-the- minute assessment of enemy capabilities based on the latest available information. If all the information coming into the intelli- gence division in the course of an operation has been properly recorded along the lines indicated above, the spadework for such a running estimate will have been done. In most cases an up-to-the- minute estimate can then be made simply by in- specting the various plots and worksheets to see where enemy capabilities may have changed. There is no standard technique for interpreting the effect of new information, but some intelli- gence officers have found it helpful to maintain a special notebook or clipboard for this purpose. To a certain extent the conclusions and deductions column of the worksheets themselves will serve as a running estimate, provided the breakdown of the individual worksheets has been made to con- form with the principal enemy capabilities, and provided also that the conclusions in the work- sheets have been drawn up with care and imagina- tion. But whatever technique is used, it is important to remember that the maintenance of a running intelligence estimate, like the drafting of an orig- inal estimate, is not just an automatic procedure. In intelligence it is always possible to fail to see the forest because of the trees; the failure can lead to disaster. Ultimately, a sound running estimate depends on the perception and imagination of the intelligence officer himself. Hundreds of bits of information can conceivably come in and be re- corded without making a single significant change in enemy capabilities, while one small item might well change a whole picture. The intelligence officer must be constantly alert to recognize that single item in time, and no system of automatic techniques under the sun can do the job for him. All that the use of proper recording and cata- loguing techniques can do is to cut down the like- lihood of error. That alone is ample justification for their employment. Intelligence Periodic Reports and Summaries The responsibilities of the operational intelli- gence officer are not discharged when he has re- corded new information, or cataloged it properly, or even interpreted it correctly. That informa- tion must get to the man who can use it?in most cases the commander?and get there in time. In military operations, an astute and discerning anal- ysis that is locked up in somebody's files or on somebody's clipboard is completely worthless. To be any good analyses must be disseminated. The responsibility for timely dissemination is also the intelligence officer's. Ile must not wait to be asked about changes in enemy capabilities; he must see that any new word is passed along to his commander as soon as it is available. In spite of all the emphasis which has been placed in these pages on formal procedures of one sort or another, the intelligence officer must never forget that at best these are only means to an end, never ends in themselves. In an actual operation dissemination to the commander himself should be on a direct, per- sonal, and usually informal basis. But when it comes to disseminating new information to the commander's superiors or his subordinates, this is usually done more formally in one or another of the reports and summaries which have been prescribed by the intelligence SOP. One such periodic report, the intelligence sum- mary, is usually prepared and submitted in mes- sage form every 21 hours. This summary, which may be distributed both up and down in the chain of command, should be as brief as possible, and generally should include a resume of enemy opera- tions, a brief of any significant new intelligence developed during the period, current weather in- formation, estimated enemy casualties for the period, and any significant changes in enemy capabilities. Depending on the desires of the particular com- mander and the circumstances of the operation, other more extensive intelligence reports may be issued on a less frequent basis. Once a week, for example, is typical for a periodic report, which would summarize enemy operations during the preceding week in much more detail than is pos- sible in an intelligence summary, and which would also include more extensive discussions of any new 297 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS items of possible interest. As reproduction fa- cilities permit, photographs may also be included, and theoretically there is no limit to the elaborate- ness of intelligence reports of this kind. The in- telligence publications of such agencies as JICPOA and SEFIC during World War II are typical of the sort of thing that can be done. The graphic attractiveness of these publications is not just a matter of aesthetic delight for those re- sponsible for getting them out. It serves a func- tional purpose in encouraging the reading and study of the report by more individuals who might profit by the information it contains. Often an intelligence officer has a real selling job to do with the information he has amassed, and it can fre- quently be facilitated by the attractiveness of the particular package in which it is presented. Still another kind of formal dissemination of operational intelligence is the special report, or- dinarily submitted directly to a superior whenever certain information of unusual significance has been received. In cases of considerable urgency such a report would be transmitted by radio mes- sage, in which case it would be know as a flash report. There is no set schedule for filing such reports, of course, since they are submitted as circumstances dictate. Like all other divisions of an operational head- quarters, intelligence will also be expected to pre- pare a post-action report, summarizing the func- tioning of the intelligence division during the operation, discussing intelligence successes or failures, and outlining any recommendations for future operations. Reports of this kind are usually widely circulated, and will eventually be- come a basis for training activities, for guidance in connection with future operations, and for writ- ing the official history of the operation at a later date. CONCLUSION This chapter has outlined the principal tech- niques and procedures by means of which the unique service that intelligence is qualified to per- form is actually made available to naval corn- CONFIDENTIAL 298 manders in the planning and execution of opera- tions entrusted to them. Each of the forms described here is appropriate to some particular stage of military command. The closeness of that relationship can readily be seen from the compos- ite chart shown in figure 16. Complicated as some of these intelligence pro- cedures may appear to be, especially on first ac- quaintance, the experienced officer knows how readily they are mastered by practice and how quickly they become an almost unconscious part of his daily routine. Important as techniques and procedures themselves are, they are overshadowed by certain other considerations. The form which an intelligence estimate or an intelligence annex takes, after all, is not nearly so important in the ultimate success of an operation as the extent and accuracy of the information it contains, or the soundness and imagination of the deductions and inferences drawn from it. On the basis of either of these an operational commander may well be obliged to make a decision affecting the lives of thousands of persons, and perhaps the security of the Nation as a whole. No form or technique alone can guarantee sound decision. At best intelligence procedures are like windows, most effective when virtually invisible, and when the attention of their user is allowed to focus almost exclusively on what is being pre- sented rather than on how it is being presented. Every intelligence officer must remember that the ultimate purpose of intelligence, and hence the overriding test of every bit of activity within the intelligence division, is the extent of service which can be performed in support of strategic or tac- tical military operations. To be sure the forms and techniques outlined in this chapter represent those which have well served the intelligence needs of operational commanders in the past. Still this does not mean that they must remain forever in- violate, or that future operations and changing circumstances will not dictate certain revisions and improvements. The wise intelligence officer should constantly be on the lookout for such changes and be ready to adjust himself accordingly. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE STAFF PROCEDURES HOW INTELLIGENCE SERVES COMMAND The lines anti arrows indicate the points at which material developed by'the Intelligence Staff Division is used by the Commander in his process of operational planning and supervision of the planned action. COMMAND ESTIMATE OF THE SITUATION I. Mission 2. Situation and Courses election .a. Considerations affecting possible courses of action (I) Tho general slfiltairal (2) Characteristics of the area (3) Relative combat power (4) Strength and weakness factors b. Enemy capabilities (in terms of accomplish. went) 3. Analysis of opposing courses of action 4. Comparison clown courses of action 5. Decision DEVELOPMENT OF THE PLAN I. Analyze the decision 2. State any assumptions used 3. List component operations (a) Obtain intelligence (b) Movement or deployment (c) Protect own forces (d) Isolate the oblective (e) Gain the objective, (F) Provide logistic support (g) Provide for security and deception (h) Other component operations 4. Determine how components are to be carried out; list forces available 5. Organize forces into task organisation 6. Assign tasks 7. Solve command problems 8. Compile necessary information THE DIRECTIVE (Op?Plan or Op.Order) Task Organization I. General situation 2. General plan 3. Task paragraph 4. Logistics paragraph 5. Command paragraph Annexes INTELLIGENCE INTELLIGENCE ESTIMATE 1. MI 16110.1 (same as command mission) 2. The Situation ( a. General situotion b. Characteristics of the area c. Enemy situation CONFIDENTIAL 3. Enemy capabilities (in terms of adoption) ( a. Preliminary identification b. Analysis c. Final listing in order of relative probability INTELLIGENCE COLLECTION PL.AN 11. Determine the essential elements of information 2. Analyze each EEI by identifying indications (spell out collection orders) I Assign collection mission to available collection agencies (via orders or requests) 4. Establish schedule of reports of collected infor- mation SUPERVISION OF THE PLANNED ACTION in order tor 1. Prevent error or misunderstanding 2. Provide for change is enemy situation 3. Provide for change in awn situation 4. Provide for change in own elision A INTELLIGENCE ANNEX r's Part 1 - Intelligence Summary I. The situation (a) Genera situation (b) Enemy capabilities (a) Characteristics of the moo (d) Enemy situation Part Il ... Mission and Collection Plan 2. Mission 3. Essential elements of information A. Collection plan (a) Orders to subordinate units (b) Requests to higher units Part 111 - Supplementary Instructior?s 5. POW, Documents, captured materiel 6. Maps, charts, models, photographs 7. Specialist teams 8. Counterintelligence 9. Reports and distribution O. Other sublects as approprinte Appendices end Tabs RUNNING INTELLIGENCE ESTIMATE (i. Situation plots 2. Journals, worksheets, files 3. Running and revised estimates 1. Periodic and special reports Figure 16.--Intelligence-speclalIzed adjunct to command. 299 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 13 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND Throughout the preceding chapter on Intelli- gence Staff Procedures we saw the cycle in action during the planning and execution of naval opera- tions. The procedures followed and the techniques employed are in general common to all types of operations. This chapter will continue the dis- cussion of intelligence in support of command, but will be concerned more specifically with its operational environment. Special attention will be given to the responsibilities and duties of the intelligence officer in operational billets to which he may be assigned. In order to understand the increased importance of intelligence in a great variety of operational commands, it is helpful to review the development of the types of warfare in which the Navy partici- pates, both at sea and on shore. The experiences of World War II afford the background. Intelli- gence can prepare itself for continued service only by a careful study of its past performance, and the lessons learned in former operations will point the way to future improvements. INTELLIGENCE CENTERS In a global war, the intelligence needs of one theater will differ widely from the requirements of another. The problem of dissemination alone makes it desirable to establish intelligence organi- zations under the area commanders to assume re- sponsibility for the expeditious distribution of in- telligence material to the forces that can use it. This need was recognized at an early date in World War II, and steps were taken to provide for the establishment of intelligence centers at important bases close to the areas of operations. Over a period of time, area commanders were fur- nished the necessary personnel and equipment to maintain centers which would meet their partic- ular requirements. The Office of Naval Intelli- gence in Washington gave technical assistance to the activities of these centers and provided spe- cially trained personnel for them. This guidance 301 and support was, of course, vital to the production of intelligence. The mission of these centers was: 1. To collect, evaluate and process intelligence required by the command; 2. To disseminate pertinent intelligence to higher, subordinate, and parallel commands; 3. To provide long range intelligence coverage required for national planning; and 4. To provide counterintelligence support. Centers in the European-Mediterranean Theaters In late 1942, the decision was made to create a cooperative Army-Navy intelligence organiza- tion, which was called the Joint Intelligence Col- lection Agency (JICA) . When established, this organization was located at Algiers under the As- sistant Chief of Staff, G-2, Allied Forces Head- quarters. Subsidiary units were placed at Oran and Casablanca. The mission of JICA was to meet certain long-range intelligence requirements of the Army and the Navy which could not be real- istically imposed upon the staffs of operational forces. The Navy assigned to the Algiers headquarters a selected team of officers and enlisted personnel which included specialists in the fields of investi- gation, research, language, document analysis, air intelligence and communications. It was the de- cision of the Army that its responsibilities to the new organization could be met by specialists at- tached to the G-2s of various Army commands in the area and by personnel of its Counter Intelli- gence Corps. During the early period of its exist- ence, JICA became little more than a mail and dispatch unit. Its effectiveness was greatly dimin- ished when some of its functions, including all counterintelligence activities, were eliminated and when no opportunity was found for cooperative assistance by Army intelligence units. After a time, most of its naval personnel were transferred to the staff of the Commander, 8th Fleet (Com- mander, North African Waters). However, small JICA units remained active in North Africa. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Eventually, British representatives were attached to the Algiers headquarters and additional offices were established in Egypt and Burma. As a fur- ther development of JICA, there was organized in Washington a joint Army-Navy agency known as the Joint Intelligence Agency Research Center (JIARC). When assigned to the 8th Fleet, the former JICA personnel were organized into a Naval Intel- ligence Unit under the staff N-2 and rapidly ex- panded their activities. The air intelligence per- sonnel participated with a combined British and American staff in photo interpretation projects and field operations, collecting data required for the planning of amphibious and ASW operations. Specialists in prisoner of war interrogation and document analysis worked with the Combined Services Detailed Interrogation Center (CSDIC), Allied Forces Headquarters, Algiers, to exploit sources of naval interest for both long-term and short-range purposes. Additional personnel en- gaged in liaison activities with intelligence collec- tion units of both national and combined military services in the Mediterranean, as well as with covert organizations maintained by OSS and the British Secret Intelligence Services. The NIU also formed teams from its personnel which were assigned to designated combat forces after special training with the Army Counter Intelligence Corps. Included in the functions of the NIU was the preparation of cooperative studies and reports, similar to the present national intelligence esti- mates and national intelligence surveys. The field units of NIU, 8th Fleet, made effective contributions. At the time of the invasion of Sicily, a team went ashore before the tac- tical situation had been secured. Through its efforts, targets of counterintelligence value were captured and exploited and certain threats to the success of the landings were thus neutralized. For example, this team acquired Italian charts showing the swept channels in the Tyrrhenian Sea. In addition, it gained control of key communica- tions facilities, thus preventing the Italians from alerting their German allies as to the size of the amphibious assault against Sicily. Captured doc- uments also provided valuable technical informa- tion. The success of NIU, 8th Fleet, in its counter- intelligence activities was such that British and CONFIDENTIAL 302 French liaison officers were assigned to it, and the Army recommended that future similar activities be carried out by combined teams. These teams, eventually known as "T" or Target-Forces, became the pattern for NIU-type counterintelligence oper- ations during later phases of the war in the European theater, including the assault on south- ern France. As the Allies advanced into Italy, the NIU, 8th Fleet, established offices in Naples and Rome, eventually operating as far north as Genoa. It made available its files on Italian organizations, situations, and trends to the Allied Control Coun- cil for Italy and to the Allied Military Govern- ment Organization, further assisting the latter agency by briefing assigned naval personnel. A continuing responsibility of NIU personnel was the exploitation of the archives of the Italian Navy and advice to Allied Forces regarding the disposi- tion of captured enemy material. Throughout the period of its operation the relatively small NIU, 8th Fleet, was most effective in its intelligence support of military command. The 8th Fleet NIU cooperated with a similar unit which had been established under the N-2 on the staff of the Commander, 12th Fleet, who was also Commander Naval Forces, Europe, located in London. While the NIU, 12th Fleet, was sub- stantially larger and its operations more extensive, its activities were similar. Its personnel carried out intelligence missions during and after the Normandy invasion, operated with naval com- mands in France and Germany, and participated in some of the intelligence work of the combined military staffs in Europe. As part of its function, the NIU, 12th Fleet, aided in setting up intelli- gence and counterintelligence targets and exploit- ing them both in the field and at headquarters in London. Exploitation of these targets was pri- marily accomplished through interrogation and document analysis. Eventually, the various T- forces were combined in Germany under one or- ganization. NI U personnel also participated with a combined Japanese counterintelligence team which operated on the continent. Its members were drawn from the various military services of the United States, Great Britain, and France, and were attached to the G-2 Division of the Supreme Headquarters, Allied Expeditionary Force, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL (SHAEF). The results of the work of this team were made available to the Supreme Allied Com- mander in the Far East. This team was assisted by other allied T-forces and by the United States Naval Technical Mission in Europe. A consid- erable volume of information of intelligence value to the Navy was developed by the NIU teams which operated in Germany. Location of Centers Centers were established in forward areas of the Pacific Theater soon after the outbreak of hostilities and continued to function as long as they were of value. At first, they were located at Pearl Harbor for CinCPac, at Noumea for ComSoPac, at Kodiak for ComNorPac, at Bris- bane for Com7th Fleet under ComSoWesPac, and at Norfolk for CinCLant. As conditions changed, the organization and locations of the centers were adjusted accordingly. When the South Pacific area ceased to be an active theater of operations after the collapse of Japanese resistance in the Solomons, the center at Noumea was closed. As operations in the North Pacific moved forward, the headquarters of the advance intelligence cen- ter moved down the Aleutian chain to Adak; similarly, the SoWesPac centers moved up the line from Brisbane to Hollandia, Leyte, and finally to Manila. One of the largest and most valuable in- telligence centers for the fleets which operated in Central Pacific waters was the Joint Intelligence Center, Pacific Ocean Areas (JICPOA) at Pearl Harbor which was staffed by United States and Allied personnel of all ser vice s. Under JICP0A's direction offices were later opened at Guam when the fleet admiral moved forward, and distribution centers were also established at Leyte, Ulithi, and Eniwetok. Area Responsibilities The activities of each center, while basically similar, were of course influenced by the nature of the warfare in the area. The center at Norfolk, under Commander Air Force, Atlantic Fleet, naturally concentrated on problems of antisub- marine warfare for the operating squadrons in that command and problems of training for recently formed air groups which were destined for duty in the Pacific. At Adak, the center was 303 forced to make a thorough study of the peculiar aerological conditions prevailing in the Aleutians, the Kuriles, and Kamchatka, since the unpre- dictable weather distinctly limited operations in that theater of war. In the Central Pacific area, JICPOA and related centers concentrated on the specialized intelligence required for carrier war- fare and for fleet and air support of amphibious landings. In the Southwest Pacific the short overwater jumps preliminary to the Philippine invasion were supported by land-based aircraft and did not require, for the most part, large naval supporting forces. Consequently, one of the chief responsibilities of the Seventh Fleet Intelligence Center (SEFIC) was to keep the Army theater commander informed on all naval matters. Prior to the Philippine landings, the center was con- cerned with the development of the guerrilla or- ganization in the Philippines, including training of personnel, establishment of communications, and the organization of submarine missions to supply the guerrillas with arms, equipment, and supplies. Collection and Processing As stated above, one of the missions of the in- telligence center was to process intelligence for the command. In most centers this mission was carried out at two levels: First, certain officers functioned as staff officers, furnishing information to the commander himself and to his operational staff; and second, a larger group of officers (fre- quently including some of the first group) were assigned to the various branches, divisions, or sec- tions within the center, and were engaged in col- lecting and processing information for the sub- ordinate, parallel, and higher commands. The duties of the first group have been described in the preceding chapter; the duties of the second were multitudinous, covering a wide variety of subjects under the purview of various sections of the center. The term "objective data," as used in intelligence centers, generally applied to factual studies, prin- cipally of geographical nature. Some of these studies were comprehensive, such as the Joint Army Navy Intelligence Studies (JANIS) , ONI monographs, and G-2 interim reports; others treated more restricted areas, such as objective CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS folders, air target folders, and information bulle- tins; still others covered special fields, such as the joint target group series on Japanese industrial systems, translations of captured documents on enemy airfields, and terrain intelligence. The chief responsibility of the officers working in the objective data section of a center was to insure that information on all areas under their cognizance was being made available to the plan- ning and operating forces that required it. Pre- liminary surveys were published, and as more in- formation was received and processed, the studies were revised and amended to incorporate the new data. An important part of the analysis of strategic intelligence undertaken by intelligence centers in active theaters was the thorough examination of all available data pertaining to potential targets, including photographs, captured documents, pris- oner-of-war interrogations, and the reports of technical intelligence teams with the object of rec- ommending priorities and tactics for bombing mis- sions and other combat operations. This became a highly valuable service of the JICPOA target analysis section, especially for carrier forces. The cartography section of the center had cog- nizance over the map production for the area. Although the Hydrographic Office and the Army Map Service provided much of this material, maps, charts, and models for special purposes, such as air support or bombardment, were planned at the center servicing the area and frequently were pro- duced there as well. A special section of the center was responsible for maintaining complete centralized files of in- telligence materials, adequately indexed and cross indexed. Accession lists were published daily, and cumulative lists at longer intervals. These proved invaluable in informing interested commands of available information. The obvious need for order of battle data on all enemy forces required that a section of the center record all available information on the organiza- tion, characteristics, and numbers of the enemy naval, air, and ground forces. The basic knowl- edge acquired prior to the opening of hostilities was augmented by the reports of prisoners of war, and captured materiel also frequently yielded valuable information. CONFIDENTIAL 304 The intelligence center was the appropriate place for the compilation of data on enemy mer- chant shipping and the maintenance of special studies and statistics on this subject. The valuable intelligence obtained from pris- oners of war, captured documents, and captured materiel made it imperative for centers to include an adequate number of language experts. When large-scale operations were in progress, the quanti- ties of documents and materiel and the large num- bers of prisoners of war made it essential that trained officers be on the spot to supervise the efficient collection of intelligence from such sources. Consequently, intelligence teams were organized and sent out from the centers to follow up all landings and major operations. In addition to translators and interpreters, teams normally in- eluded specialists in naval aviation materiel and bomb and mine disposal. Saipan alone produced 27 tons of Japanese documents. The crash intelli- gence section of the Saipan team found 23 Jap- anese fighter planes on Aslito airfield, most of them in flying condition, as well as 30 aircraft engines and 300 boxes of spare parts. Photo-Interpretation The photographic section of JICPOA printed and disseminated to interested commands thou- sands of photos per day. Photographic inter- preters identified. and filed negatives and prints and prepared photo interpretation reports, mo- saics, and overlays. In those instances where an objective had not been recently photographed and the information was needed immediately, a "first phase" report of available data was speedily dis- tributed. As soon as complete photo coverage had been made, a "second phase" report was issued. Special reports such as shipping, aircraft sum- maries, beach studies, and photogrammetric studies were issued as requested or deemed worth- while. As in other sections of JICPOA, photo interpreters concentrating on specific areas or sub- jects were available and employed for conferences and briefing sessions. The section also had a pool of photo-interpreters undergoing indoctrination for later assignment to combat units. In addition to extensive photo reproduction fa- cilities, the photographic section had ozalid, blue- print, photostat, multilith, and mimeograph Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT equipment, all of which was extensively used. The reproduction of great quantities of aerial photographs for the cartographic section was a very important part of the photo section's re- sponsibilities. Especially in the Pacific, where maps, charts, and background intelligence were either inadequate or did not exist, the photographs and interpretation reports furnished much, if not most, of the vital information needed by the objec- tive data section for the preparation of the Infor- mation Bulletins, Target Analysis Bulletins, and Air Information Summaries. Other Responsibilities The technical section of the center analyzed the information collected by representatives in the field and converted it into usable intelligence both for the strategists and the operational forces. Thus, information gleaned from the serial num- bers on crashed enemy aircraft often established rates of production, and tests of aircraft captured in good condition revealed the plane's capabilities in combat. The psychological warfare section maintained liaison with other agencies interested in attacks on enemy morale. At JICPOA during the war, a vast amount of psychological warfare material keyed to the exigencies of the current situation was prepared and distributed directly from the center, and the operating forces were indoctri- nated by the center in the employment of this material. The chief responsibilities of a section devoted to survival intelligence were the production of all intelligence and equipment for air-sea rescue, eva- sion and escape, and in general everything con- cerned with problems of survival in friendly or enemy areas. Experts reviewed all experiences of personnel who had returned and disseminated intelligence accordingly, either in f or m ally through memoranda and articles in current pub- lications, or officially through directives, such as those issued by CinCPac on the standard operating procedure for air-sea rescue in combat and non- ? combat areas in the Pacific Ocean areas. In such fashion, distress communications procedures, emergency flight controls, survival methods and equipment, and indoctrination of personnel in these matters were standardized, and prompt OF OPERATIONAL COMMAND CONFIDENTIAL 305 emergency assistance to aircraft and surface ves- sels in distress and the rescue of survivors were made possible. Centers also produced evasion and escape manuals containing the latest information available on the locations of enemy forces, guer- rilla forces, Allied troops, and friendly or un- friendly natives. Special sections were prepared for each part of enemy controlled territory in which linguistic or other differences in the native population or terrain required special evasion pro- cedures, and large-scale briefing maps for these areas were included. This information was kept current for the operating forces by supplementary messages. The size and complexity of operations in the Pacific made the assembly, evaluation, and dissem- ination of operational intelligence increasingly difficult. Comprehensive studies were required to determine what lessons could be learned from past actions, and new estimates were made of the ene- my's capabilities, tactics, and order of battle, as well as evaluations of our own capabilities and the effectiveness of our tactics and ordnance. Some of the information gained from such study was of interest principally to higher commands, but much battle experience was also useful to subordinate commands and to individual personnel for general information and morale purposes as well as an aid to tactical training. Experience demonstrated the desirability of combining in one intelligence center all the functions of processing and dissemination of combat and operational ex- perience, including statistical analysis, so that in one coordinated operation appropriate material might be extracted for command statistical and analytical purposes and for dissemination to vari- ous levels. Detailed statistical analysis of operations was largely the responsibility of ONI and other offices in Washington. Nevertheless, it was found nec- essary, in order to avoid delay in furnishing data to combat commands and units and to secure ap- propriate concentration on matters of local impor- tance and interest, to initiate a large volume of analytical and basic statistical studies in intelli- gence centers. An example was the operational intelligence center of ComAirPac, which pro- duced the periodical Analysis of Pacific Air Op- erations, Air Operations Memorandum, and briefs CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR of both reports for distribution to commands of fleet units, and also special statistical data and operational reports for ComAirPac and CinCPac. By virtue of conducting these studies in conjunc- tion with a general intelligence center it was pos- sible to produce reports that presented operational intelligence in practical relationship to objective and order of battle intelligence. The principal duties of flak intelligence officers assigned to intelligence centers were: the develop- ment of methods of analyzing enemy AA, such as the flak computer; the investigation of the char- acteristics of enemy AA materiel to determine its capabilities and limitations; the observation of all tactical tests of flak intelligence; the statistical analysis of AA damage to naval aircraft to deter- mine the circumstances under which it was ef- fected; the training of flak intelligence officers for service with the fleet; and the dissemination of all useful flak intelligence. Aside from the publications of a specialized nature which were issued by the sections described above, it was customary for intelligence centers to prepare a periodical of a general nature to keep the command informed of the most significant de- velopments in all categories. Such publications were daily, biweekly, weekly, or monthly, the regu- larity being determined by the amount of intelli- gence to be disseminated and the speed required. Some commands published more than one of these, though the most common practice was to issue a weekly intelligence bulletin. Although the specialists concerned with the identification and characteristics of own and enemy aircraft, fleet and merchant shipping, and mobile land equipment were at times separate units at- tached to administrative commands, such as the ComAirPac recognition unit during the last war, it was nonetheless essential for intelligence centers to insure that all such information was given ade- quate dissemination. Furthermore, for its own work, it was necessary to include in its organiza- tion a sufficient number of officers to supply the necessary data on recognition whenever required. It was general practice to include information which could be furnished by the recognition officer of the center, such as photographs and statistics on aircraft, ships, and ground vehicles. All centers assigned to certain officers, either as CONFIDENTIAL NAVAL OFFICERS 306 a full-time or part-time duty, the task of maintain- ing liaison with other services, agencies, or any unit which required the information available in the center. In turn, representatives of other units were at times stationed in a center as permanent liaison officers to act for their commands whenever desirable. This was especially true at JICP0A where, in addition to the representatives of United States organizations directly involved, there were also liaison officers from Allied services, such as the British Army and Navy and the Australian forces. ADVANCE BASES The intelligence duties at advance bases during World War II varied according to the geograph- ical location, local command organization, and general importance. The base intelligence officer had to be intimately acquainted with the exact nature and limits of the mission of his command- ing officer in order to perform his duties efficiently. The commander of an advance base usually had duties relating to the repair and supply of an op- erating fleet and to the routing and control of shipping. His intelligence officers, therefore, had to be familiar with basic operation plans in effect in order to keep the commander informed of all changes as operations in the area progressed. This was accomplished by means of comprehensive plots on convoys and routing, friendly and enemy submarine and surface forces, and the air activi- ties, such as area searches and barrier patrols. Responsibilities of the intelligence officer also included the briefing of naval and merchant ship captains on intelligence matters relating to their missions. Often he was of service to them in con- ducting investigations relating to security matters and to counterintelligence problems. In the course of this work, and in his general contact with naval and merchant marine personnel, he would collect much valuable intelligence information. Often his duties included administration of cen- sorship regulations, public information and liaison with news correspondents, ship boarding, liaison with friendly forces in the area, formulation of regulations governing relationships with local natives and liaison with them. Finally, he was responsible for the collection, processing, and dis- semination of intelligence regarding enemy forces in the area. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 L Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL SEA FRONTIERS AND DISTRICTS A consideration of the duties of an operational intelligence officer assigned to a naval district or a sea frontier is important for two reasons; first, because it was the experience and knowledge gained from those operations which formed the foundation for the development of operational in- telligence in the combat areas in World War II; and second, because in future wars we can no longer rely on the vast expanse of ocean which separates us from Europe and Asia to protect our coasts from continuous and devastating attack. The German U-boat campaign from 1942 to 1945 demonstrated the need for a complete coastal in- telligence network. The present development of the submarine, the aircraft, the rocket, and the guided missile are all further arguments in sup- port of the continuance of such activity. On 14 April 1942, the first victory over a Ger- man submarine in Fifth Naval District waters took place. The terse announcement merely stated "U. S. S. Roper sank sub at 35-55N, 75-15W, at 0069. 29 bodies recovered." The Roper did not stumble on the U-85 by chance, but was directed to first contact by the accurate intelligence of Fifth Naval District operations. District and sea fron- tier intelligence organizations accordingly dis- charged such responsibilities, as well as furnishing operating units with information concerning friendly forces and the characteristics of coastal waters. During World War II, the basic mission and responsibility of all operational intelligence branches in naval districts and sea frontiers was to collect, from all sources, combat and operational intelligence and information useful to the Naval Establishment, and after coordination and evalua- tion, to disseminate it to the action agencies of all Naval Districts, Sea Frontiers, the Office of Naval Intelligence, and to other appropriate government agencies and commands. Such a program entailed the establishment of intelligence rooms and plots in joint operation centers and of intelligence units at all outlying section bases, airfields, harbor en- trance control posts, and other naval shore stations. It involved the supervision of mine watch organi- zations, the handling of wreck information, the organization of a fishing vessel control plan, and other similar activities. Coastal information sec- 307 tions of the naval districts, given the job of per- forming operational intelligence, broadened in scope and came to be known by the latter name. In the various sea frontiers and naval districts, the mission of performing operational intelligence was accomplished by similar if not identical meth- ods. While operational intelligence in sea fron- tiers collected, processed, and disseminated infor- mation and intelligence furnished by the districts within the frontiers, districts performed the same functions for, intelligence furnished them by their joint operations centers, section bases, and air- fields. In other words, the district organization functioned operationally as a task group under the sea frontier task force command. Physical ar- rangements and internal organizations varied, but in most instances accomplishments were the same. Operational Intelligence Duties With Battleships and Cruisers Because operational intelligence billets afloat were a product of World War II and because the demands of commanding officers differed, estab- lished doctrine for intelligence officers reporting to single ships awaited experience, trial and error, and zealous attention to the task by a growing number of such officers, who ultimately were as- signed to half the battleships, a score of cruisers, and to numerous other units. Standard proce- dures were forthcoming, however, and the intelli- gence officer's value was recognized. One com- manding officer of a battleship, in commenting on the duties of his operational intelligence officer, stated, "He devised means, procedures, and devel- oped systems of intelligence reporting of such value that he made himself of inestimable value to his commanding officer during combat and cruising operations." The intelligence officer assigned to a single ship was at all times responsible to the captain of the ship who also defined his duties. He was, in effect, a member of the captain's staff and he had the same relationship to the captain as did the flag intelligence officer to his admiral. Since most ships during the war were in con- tinuous operation, the intelligence system finally employed relieved the ship's intelligence officer of much of the responsibility for developing sources of information aside from the battle expe- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS rience of his own ship. Instead, task force and fleet intelligence officers and, above all, the area intelligence center, were given the primary respon- sibility for furnishing intelligence for use by com- batant units. The process was never perfect, how- ever, and the ship's officer owed. to his captain the duty of making sure that the ship was included in all distribution lists governing the dissemination of intelligence publications useful to the ship. Adequate familiarity with the intelligence center, frequent liaison with group, force, and fleet in- telligence officers, and extensive visiting with shore-based commands as opportunity permitted proved effective in making the officer aware of the intelligence available. Intelligence while at sea was for the most part obtained from telecom- munications. The intelligence officer could insure his receipt of all pertinent messages by explaining his needs and problems to the Communications Department. The volume of intelligence received by an alert ship's intelligence officer, although not so great as that of higher echelons, required extensive study if it was to be thoroughly mastered and necessi- tated the employment of files useful for quick and ready reference. A universal means employed to evaluate and disseminate information was the plot, for much of the intelligence concerning the enemy situation, the theater of action, and friendly forces lent itself to graphic presentation. The in- formation best handled in this manner included surface, air, and submarine contacts, sightings, and fixes; known and probable enemy air searches; friendly submarine operating areas, positions, and tracks; friendly air searches; the shipping routes and positions of friendly convoys, as well as estab- lished fueling areas and reference points; own ship's track in relation to that of other combat units; minefields, whether laid by the enemy or by friendly forces; and uncharted navigational hazards. In most instances, all information suggested above could be kept on one strategic plotting chart. The more or less permanent items could be laid off directly on the chart, whereas information of temporary value could be plotted on an acetate or tracing paper overlay, which could be changed as conditions warranted. CONFIDENTIAL 308 Since this situation chart or plot was for the primary use of the captain, executive officer, navi- gator, CIC officer, and 00D, it was maintained near the bridge, in CIC, or at both locations as space and requirements dictated. A function of battleships and cruisers, when attached to a gunfire support group in an amphib- ious operation, was bombardment of targets on land. Fire support charts of suitable scale and accuracy were usually furnished by higher eche- lons and showed all known information on enemy targets useful to bombarding units. However, as an operation progressed, further intelligence had to be supplied to the CIC, the gunnery officer, and other interested personnel. Attention was paid to prospective as well as to assigned target areas. Of interest were gun emplacements, supplies, air fields, radar, roads, harbors, defenses, bases, and hideouts for small craft. Another medium which was employed by the ship's intelligence officer to convey current infor- mation to officers needing it was the daily intelli- gence report or summary. Its purpose was to col- lect and assess the most important items of in- formation received during the past 24 hours. The activities of specialized departments dic- tated more detailed attention by the intelligence officer. Thus the development of CIC in World War II as the operational nerve center of the ship concurrently called for special service from the intelligence officer, whose information from a multitude of sources was of great value to the evaluations and operational decisions undertaken by radar and plotting personnel in CIC. The CIC officer, by means of the daily summary, by having access to the strategic and tactical plots, and by being furnished with pertinent informa- tion from all sources was kept well informed. It proved desirable for the intelligence officer to spend considerable time in CIC during sur face engagement, air attack, or bombardment in order to lend every aid possible to the executive officer and CIC officers faced with weighty problems of evaluation. The seaplanes carried by cruisers and battle- ships had important patrol, search, and spotting functions and, what was probably of the greatest value in World War II, performed difficult rescue IApproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL missions. Briefing of seaplane pilots naturally depended on their specific assignments, but in most cases required information beyond the routine needs of the ship itself. Most major units had recognition officers as- signed to instruct ship's personnel in identification of friendly and enemy aircraft and ships. New enemy aircraft and ships frequently first appeared in publications, bulletins, or summaries received by the intelligence officer. The disposition of such material was obvious. In practice, the responsibility of the intelligence officer in keeping ship personnel informed of cur- rent information was necessarily limited to notify- ing key individuals. It was futile to attempt to contact personally all ship's officers and men. Yet all needed an adequate general idea of the overall situation and successive events. During the past war, one captain arrived at a satisfactory solution by requiring all of his department heads, plus certain designated key officers, to read the daily intelligence summary and to see the situation plot. Supplementing these regular information serv- ices, other graphic displays such as maps and frontline plots were maintained in the wardroom for officers and in a readily accessible place for the crew. Lectures on special subjects concerning the enemy, the objective, or especially instructive bat- tle experiences were likewise valuable to all hands, not only to keep them informed but to maintain their morale, their interest, and their desire to fight. The intelligence officer realized that operational experience was a primary source of information. Without his own efforts and those of many others in similar jobs, first-hand information on enemy tactics, materiel, strength, and capabilities would have been lost. His own notes and observations were supplemented by the reports of other officers and men previously indoctrinated with the value of accurate recorded observations. Post battle duties of the ship's intelligence offi- cer, as is true of officers in most intelligence billets, included contributing to the ship's action report. Intelligence officers with higher echelons depended heavily on full and accurate detail in these reports for vital information. 309 INTELLIGENCE FOR SUBMARINES Submarine operations during the war with Japan resulted in the sinking of 5,000,000 tons of Japanese merchant shipping and the destruction of such a large number of warships that the Jap- anese Fleet was very seriously crippled. An im- portant supporting aid to the submarine com- manders in achieving this brilliant record was the intelligence data furnished them by the intelli- gence centers of the fleet in the Pacific areas. The data furnished the submarine command at various centers were basically the same, but the method of operation varied at each center. For example, JICP0A assigned no personnel to the submarine command but worked through a liaison officer sta- tioned at the center. The intelligence support of submarine opera- tions was largely supplied by intelligence centers which prepared and carried on specialized pro- grams designed to assist the submarine commands in destroying the greatest possible number of Jap- anese ships and likewise in reducing the hazards inherent in submarine operations. An examina- tion of the methods employed by the Seventh Fleet Intelligence Center will illustrate the general methods employed by all centers in performing this function. In connection with locating enemy shipping targets, SEFIC undertook numerous studies re- lating to enemy merchant vessels and warships, their movements and equipment, and disseminated the findings to the submarine command. Charts were prepared showing individual and convoy shipping routes, points of convergence, overnight anchorages, and hiding points. These charts were kept current and changes in routes based on a compilation of new sightings of enemy shipping by aircraft, coastwatchers, and submarines were indicated. Statistical data, including damage and sinkings, new construction, new armament, radar, and special equipment on Japanese mer- chant vessels and warships, were also disseminated by the center. SEFIC prepared data, charts, and drawings showing the estimated position of enemy minefields, the estimated search sectors and patrol doctrine of enemy patrol planes, the antisubma- rine practices of enemy surface ships, and the use by the enemy of picket boats. From time to time information was received at CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS the center indicating, for example, that an impor- tant ship target had moved into an area patrolled by a submarine of the Seventh Fleet. The center would then communicate this information di- rectly to the submarine command by radio for further relay to the submarine itself. The need for keeping the intelligence organiza- tion in constant contact with the submarine com- mand resulted in the establishment of an intelli- gence unit subordinate to SEFIC and attached to Commander, Submarines Seventh Fleet. In the plot room of this unit situation charts, special charts of patrol areas, minefields, and similar items were kept, showing the current picture. Here the intelligence officers stood a continuous watch and performed operations duties including the processing of operational messages to and from submarines on patrol. An intelligence annex to each operation order for submarines going on patrol was prepared by the unit. It contained all data pertaining to the enemy of value to the submarine commanders and included routes taken by convoys and by indi- vidual ships, cargoes carried, ship position, type and number of escort vessels, method of convoy, antisubmarine measures, sonic devices, radar shore installations, enemy bases and airfields, radio shipping frequencies of major ports, enemy merchant ships and fleet units estimated to be in the operating area, and estimates of future enemy movements. In addition to the annex, charts an- notated with such of this information as would. likely be needed in the operation area were pre- pared for each patrol or special mission. Other duties included briefing the commanding officer of each submarine prior to his departure for a war patrol or special mission and interview- ing him upon return. Additional duties were the preparation of war patrol summaries and the compilation of digests so that later patrols might have first-hand knowl- edge of operating conditions. Of particular in- terest to submarine commanders was the informa- tion gained from such summaries on water salinity and temperature and the force and direction of currents. Each day the officer in charge of the unit briefed the admiral and his staff on the situation as it pertained to each submarine on patrol. CONFIDENTIAL 310 INTELLIGENCE DUTIES WITH TORPEDO BOATS The employment of torpedo boats in World War II included moving selected squadrons for- ward with amphibious forces and establishing them in bases from which they could defend the newly won beaches against attack from the sea and strike enemy supply lines. The functions of the intelligence officer, whether he was assigned to an operating squadron or to the commander of an advance base, were in general determined by these missions. In Pacific operations, the activi- ties of the intelligence officer with torpedo boats were influenced by several additional factors which were highly significant both before and after moving up to the advance base. The primary mission of the boats, to attack enemy warships and supply vessels with torpedoes, was steadily expanded to include the destruction of enemy waterborne supplies. This meant com- bating the extensive and effective Japanese system of night traffic by barges and other small craft with shallow draft. They hugged coastlines to avoid detection, utilized shallow water, took full advantage of coastal defenses, and employed care- fully selected bases and staging points. To be effective against such targets, torpedo boats needed more than altered armament. Accurate hydro- graphic information was essential to enable them to operate with safety in the poorly charted coastal waters of the Solomons, New Guinea, and the Philippines. Therefore, when preparing to move up to an advance base, the intelligence officer concerned himself to a great extent with a study of the waters and coastlines of the patrol areas newly assigned. Intelligence publications containing objective data were collected, full use was made of reconnaissance photographs, any available representatives of the coastwatchers or guerrilla organizations were consulted, and all Allied personnel with peace- time experience in the area were interviewed. The location of reefs, the depths of water just offshore, and the contour of the coastline in the area to be patrolled were matters fully as urgent to torpedo- boat captains as the position and capabilities of enemy coastal defenses. After the move to an advance base was com- pleted and the boats began their patrols in strange waters, the emphasis on obtaining hydrographic Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL and coastal information was continued. Boat cap- tains were expected to note, plot, or otherwise record such information during patrols. Reefs and other hazards in patrol areas were surveyed and charts corrected as quickly as possible. The contour and radar characteristics of islands and coastlines had to be ascertained. The questioning of boat personnel by intelligence officers yielded valuable information for future patrols. In addi- tion to operational patrol experience, arrange- ments were made to obtain current aerial photo interpretation reports and to perfect liaison with the coastwatcher organization. New objective data, publications of the theater intelligence cen- ter, current translations of captured documents, and reports of prisoner of war interrogations were examined carefully. Unquestionably, then, the needs of the torpedo boats for hydrographic and other coastal information determined to a great extent the direction and emphasis of the intelli- gence officer's activities. A second major influence on his functions was the lack of communication facilities at the advance base with which to handle the radio messages con- taining information on the rapidly changing enemy situation. The staff officer on higher eche- lons could depend on such messages as the main source of information regarding the progress of an operation, but the torpedo boat officer was forced to substitute extensive and continuous liai- son with local command to obtain needed informa- tion on the enemy. The naval base commander was usually cooperative and gave the intelligence officer access to the base message files. The results of friendly air reconnaissance and strikes as they affected the enemy shipping situation and coastal defenses could be obtained from the local air com- mand. Army and Marine intelligence officers will- ingly furnished facts concerning the progress of friendly ground forces and the disposition and movements of the enemy on land, all of which influenced enemy employment of surface craft for supply, evacuation, reinforcement, or redeploy- ment of local forces. The local coastwatcher rep- resentative was an excellent source of information on conditions in enemy held territory, barge and small craft movements, routes and staging points, supply dumps, coastal defense, and enemy inten- tions for employment of surface craft. 311 Liaison with these and other organizations in the vicinity of the torpedo boat base was a daily matter. The information collected was used by the base commander in determining the best time and place for the operations of his command. Furthermore, the basis for the intelligence officer's briefing of boat captains prior to patrol was in large part furnished by the information gathered by liaison activities. ASW AND ANTISUBMARINE INTELLIGENCE Sea power is the ability of a nation to control transportation over the seas. Its only purpose and justification is its effect on the movements of the transports, freighters, tankers, and amphibious craft which carry nearly all the men and supplies that cross the seas. To gain and maintain com- mand of the seas is thus the primary naval responsibility. It will at once be obvious that antisubmarine warfare (ASW) is essential to the success of this mission. It is a first objective upon which we must concentrate our efforts. If it fails, our whole naval enterprise will fail; if it succeeds, we shall have reason to hope for victory. Without ef- fective ASW, we cannot wage a major war over- seas, for the sea lanes must be kept open. It is common to think of ASW in its tactical aspect only, that is, the location and destruction of enemy submarines at sea. Such a view is too narrow. ASW may be conducted by strategic as well as tactical means. As here used, therefore, the term "ASW" will comprehend all efforts to deprive the enemy of the effective use of its sub- marines. There are many ways of effecting this mission other than finding and destroying enemy submarines at sea. We can, for example, prevent enemy submarines from being built or serviced by strategic bombing of bases and building yards, from reaching the open sea by strategic mining of restricted waters, from penetrating geographic areas by passive harbor defense and escort of con- voys, and from making contact with our shipping by the convoy system. We can also simply keep enemy submarines submerged most of the time by assiduous searches and patrols whether or not any submarines are actually found and destroyed. Neither tactical ASW nor any of the several forms CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS of strategic ASW can succeed without adequate intelligence. Capabilities and Limitations of Submarines The advantages of submarines over other combat craft are, briefly: (1) invisibility and secrecy, providing the opportunity for surprise; and (2) endurance and long range. For example, a submarine is capable of operat- ing for long periods in enemy waters, unsupported and undetected. While there, it can perform any of a great variety of missions. Suppose that the mission is minelaying. In many situations, sur- face ships or aircraft would not be physically ca- pable of reaching the designated area or of remain- ing long enough to lay mines, or would be capable of laying the mines only at the cost of their own destruction; and in any event, would reveal to the enemy by their movements where the mines were laid. Submarines also have a most important capability, serving as radar pickets for early warning of air attacks. On the other hand, submarines have suffered from characteristic limitations on their powers of (1) perception, (2) communication, and (3) mo- tion. All these limitations have been intensified when the submarine was wholly or partly sub- merged. Even with the use of its periscope and accompanying radar its horizon has been very close and its field of view very narrow. Its com- munication facilities have been deficient. As for motion, a submerged submarine has had very lim- ited speed, and range, and its ability to maneuver has been subject to sufficient water depths. In order to overcome these limitations, subma- rines have been forced to run on the surface a large part of the time, and when doing so, have lost their mantle of invisibility and have been exposed to their enemies. This, then, has been the subma- rine's dilemma : to be ineffective or to be vulnerable. ASW in the Two World Wars The Atlantic operations of German U-boats in two world wars exemplify the ability of the sub- marine to achieve disproportionate results in rela- tion to the cost and effort expended. At the height of U-boat warfare in 1915 and 1916, the Germans had an average of only 15 sub- marines at sea at any given time. This was a third CONFIDENTIAL 312 or less of their total strength, the other U-boats being in transit or training or in port. With only 15 U-boats at sea, they were sinking, on the aver- age, about 200,000 tons of Allied shipping every month. The price they paid was the loss, on the average of 11/2 U-boats a month?a profitable ex- change. The final score for World War I was 11 million tons of shipping at the price of 178 U- boats. Each U-boat, therefore, accounted for nearly 62,000 tons of shipping. Thus they made an impressive showing, especially since the U-boat campaign in World War I was somewhat impromptu. In the early years of its history, the submarine was not very seriously regarded as an attack ves- sel, being used chiefly for reconnaissance and patrol. Then, one afternoon in September, 1914, the U-9, engaged in a routine scouting mission, came by chance upon a British cruiser in the North Sea and sank it with a torpedo. Another cruiser, traveling in company with the first, came to pick up survivors and was also sunk with a torpedo. The third and last cruiser of the force, hurrying up to investigate, met a similar fate. In less than an hour, a single submarine had sunk three cruisers. Struck by this proof of offensive power, the Germans soon initiated undersea warfare on a large scale. At first the U-boat skippers were chivalrous towards their victims, giving warning before they sank merchant ships. The advent of the Q-boats however, brought on unrestricted submarine war- fare, in which merchant ships were sunk without warning, and submarine attacks, mounting in numbers and ferocity, threatened to overwhelm the Allied cause, until they were at last turned back by the system of convoy and escort. In World War II the U-boat campaign had been planned and prepared long in advance. The U- boats themselves were much improved, being larger and faster, with greater endurance and using wakeless torpedoes. They soon secured bases on the French coast from which they could operate more effectively. Furthermore, they learned new tactics, such as working in wolf packs and coming through a screen of ASW ships at night on the surface at high speed. It may seem surprising, therefore, that the U- boats achieved less relative success in World War Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL II than in World. War I. The final score for World War II was 13 millions tons of shipping sunk, at the price of 751 U-boats. Each U-boat accounted on the average for a little more than 17,000 tons of allied shipping, as compared with nearly 62,000 tons in World War I. This comparison reveals a striking historical process. It is obvious to hindsight, though per- haps it was not fully apparent at the time, that from April, 1917, when the convoy system was in- troduced, until the middle 1940's, the ascendance of the submarine over its adversaries?its com- petitive position?was slowly declining. The de- cline was due to the system of convoy and escort, to certain less important procedures, such as zig- zagging, and. to the World War II innovation of Air ASW and the hunter-killer system. It was also the cumulative effect of many technical im- provements in the means of detecting and attack- ing submarines. All naval intelligence officers should understand the methods and devices by which, during this period, the submarine was kept within bounds. It will be appropriate to start with the convoy system because of its importance and priority in time. It curtails losses by reducing the number of contacts that enemy submarines make, but it is costly as well, for it reduces the effective ton- nage of our ships nearly a third by loading port facilities intermittently and by holding down the faster ships to the speed of the slower ones. Hence enemy submarines partly achieved their mission merely by forcing us to send our ships in convoy, since they thereby decrease our command of the seas. Escort is the system of screening convoys or single ships with fighting ships or aircraft. Its effect is to reduce the number of successful sub- marine attacks for a given number of contacts. Like the convoy system, it exacts a heavy outlay of money, time, and labor. In addition to the convoy and escort systems, a number of ASW devices were developed during World War I. The most important were listening and echo-ranging equipment and hydrostatic depth charges. These devices are familiar to all naval personnel. Listening devices or "hydro- phones" are directional underwater microphones which detect and locate underwater sound sources. 269190-54----21 313 Echo-ranging equipment (United States "sonar," British "ASDIC") is a device which propagates sound in water in order to detect and locate under- water objects by means of the echoes reflected from them. Bearing is determined by the train of the sound projector ("transducer"), and range by the time elapsed before the echo returns. Hydrostatic depth charges are explosive charges in canlike con- tainers, equipped with fuzes which are fired by hydrostatic pressure and can be set for any depth (i. e., pressure) up to a maximum. During World War II, the technical advances made in ASW were spectacular. Search radar was the most important. When carried in air- craft, it enormously extended the area of ASW search. It kept enemy submarines submerged, and when they surfaced, as they often had to do for air or for observation, it could detect them at great distances. Hydrophones evolved into sonobuoys equipped with radio transmitters which relayed the signals picked up by their listening devices to patrolling aircraft. MAD (magnetic airborne de- tection) equipment, responding to the magnetic field created by the Submarine, made it possible for aircraft to pinpoint submarines underwater. An extensive direction-finder (HF-DF) system exploited the German lack of radio and radar discipline and provided us with a running master plot of submarine positions. In addition, depth charges developed into far more effective weapons: projectile charges and faster-sinking charges, equipped with contact or influence firing mech- anisms. The major ASW innovation of World War II, corresponding to the convoy and escort systems introduced in World War I, was the hunter-killer system. Actually, this was merely the most con- spicuous form of a general trend away from at- tacks by individual ships or aircraft to coordinated ASW attacks. Postwar analysis has shown that coordinated ship attacks were more than three times as effective in World War II as single ship attacks. They have proved their usefulness, as have coordinated air and coordinated air-surface (CAS) attacks. III the hunter-killer system, the coordinated attacks were made by teams composed of one or more carriers, several ASW vessels, search planes (hunters) and attack planes (killers). CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS By the middle 1940's, it seemed that the cumula- tive effect of all these ASW advances had proved too much for the submarine. To many observers, it looked as if the submarine might become obso- lete as a weapon of war. Then the trend was checked and reversed. Technological changes took place which promised to restore the old ascendancy of the submarine. Fortunately, they came too late to have any effect on the outcome of World War II. Submarine Development During and After World War II By the end of World War II, the so-called "Type XXI" submarine, though not yet operational, had been perfected by the Germans. This was the prototype of present submarines. In essence it was simply a streamlined submarine equipped with high-capacity batteries and snorkel (from the German word "Schnorkel") , a stack extension which enables the submarine to breathe while sub- merged to periscope depth. Because of its stream- lining and more powerful batteries, the Type XXI was capable of an underwater speed of 18 or 19 knots, as compared with 8 or 10 knots for its World War II counterparts- It had to use its batteries for motive power only when fully submerged. At periscope depth, it could run on its diesels, re- plenishing its air supply, at about 11 knots, and even if it slowed to 7 or 8 knots, simultaneously charge its batteries. Its underwater cruising radius was about 850 miles, or roughly five times that of ocean-going submarines in World War II. Lastly, it made use of various technical changes which resulted in much quieter operation. The changes exemplified by the Type XXI submarine have greatly magnified the effectiveness of sub- marines in attack, and then at the same time have greatly reduced their vulnerability. Vulnerability is lower for several reasons. A submarine equipped with snorkel is extremely hard to detect; in fact, practically undetectible by radar and visual search. In the first place, it never has to surface at sea, and it has to snorkel only about one fourth of the time that a World War II sub- marine had to surface. In the second place, a snorkel head is a very much smaller object of search than a fully surfaced submarine. Because of its low noise level, the Type XXI and its suc- cessor submarines are also very hard to detect with CONFIDENTIAL 314 listening devices, including sonobuoys. Even if detected and attacked, because of their greater speed, these submarines have 8 times as much es- cape volume as World War II submarines avail- able to them in a given time; and because of their greater underwater endurance, 25 times as much escape area, about 400,000 square miles, before they must again expose their snorkels. Effectiveness in attack is increased, because the submarine can now approach its targets from a direction much broader on the bow or even come in directly astern of a slow convoy. It is easy to see how this capability will complicate the problem of escort. Screens will have to be larger, perhaps completely circular, perhaps multiple, and in any case will require a much larger number of ships and aircraft. Of course, submarine development did not cease with the Type XXL Subsequent improvements have been continual. Most have been in the direc- tion of still greater underwater speed and endur- ance, and some have had to do with detection or communication equipment. Our own Navy has experimented with various specialized submarine types: the antisubmarine "Killer" (SSK) ; the submarine oiler (ASSO) ; the guided-missile sub- marine (SSG) ; the radar picket submarine (SSR) ; the cargo submarine, amphibious (ASSA) ; the transport submarine, amphibious (ASSP) ; and the atomic or nuclear-powered sub- marine (SSN). The last of these, the atomic or nuclear-powered submarine, when operational, should prove to be at least as radical an innovation as the Type XXI. It would be the fastest of all ships. If produced in numbers, it will present new problems in the employment of surface vessels. ASW Since World War II Since World War II there have been many im- provements in ASW detection devices and weap- ons, but no major innovations. Shipboard sonar has been much improved by the introduction of the integrated sonar system. In this system, a "scanning sonar" provides simultaneous all-round search, which is presented on a cathode-ray screen. The ASW officer is directly given all the informa- tion he needs for conning an attack: bearing, hori- zontal range ( from his ship to a point on the Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002:2 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL surface directly above the submarine), target depth, and time to fire. In computing horizontal range, the integrated sonar system automatically corrects slant range, measured along the sonar beam, for refraction caused by certain temperature differences in the water. There is no doubt that this equipment represents a solid ASW achieve- ment; if introduced during World War II, it might have proved decisive. Sonar has also been adapted for use by blimps and helicopters. Although such use is drastically limited by wind and sea conditions, air-borne sonar is inherently superior to shipboard sonar because it is free from interference caused by reverberation and hull echoes. When carried by aircraft, sonar may be towed through the water, or it may be "dipped," that is, lowered into the water, used for search, raised, and moved to another search point. It seems quite probable that sonar- equipped helicopters, in particular, will be widely used for ASW escort. In addition to greater sonar ranges, they offer the advantages over con- ventional escort ships of economy of means and relative invulnerability to submarine attack. Di- rectional as well as nondirectional sonobuoys are now available. Sonobuoy information is pre- sented on cathode-ray screens for ready use. Since World War II, search radar has under- gone steady improvement. Assiduous radar and visual search, especially from the air, continues to be one of the chief means of detecting subma- rines and keeping them submerged. In practice, however, it fails to attain its theoretical effective- ness, owing to limitations of equipment and per- sonnel, and above all to adverse atmospheric and sea conditions. In sea states of 3 and above, the probability of detecting a snorkel by visual or radar search, whether from shipboard or from the air, is extremely small. The detection range of MAD has been increased almost to its expectable limit. This type of equip- ment, however, is susceptible to magnetic inter- ference and to countermeasures. Furthermore, its horizontal range is rather narrow. Hence, though MAD has proved to be good follow-up equipment, it is not efficient for primary search. It has been successfully used: (1) for barrier patrols in re- stricted waters; (2) to investigate suspected sub- marine locations; (3) to regain contact; and (4) 315 for deliberate attacks, after contact has been made by other means. RCM/ECM equipment is essentially a radar or radio receiver used to detect transmitting enemy radars or radios. It is capable of great range, assuming that an enemy is in the vicinity and is transmitting. Even when no contact is made, the continuous use of RCM/ECM produces useful re- sults by curtailing enemy radar search and limit- ing the length and frequency of enemy radio transmissions. Post-war improvements in this field appear to have been minor. Refinements in the types of equipment described above, and other detection methods exploiting similar principles, are undergoing more or less continual research, development, and test. The development of ASW weapons has contin- ued, as during World War II, in the direction of fast-sinking charges, which may have magnetic or acoustic influence or contact as well as hydrostatic firing mechanisms and may be thrown in patterns or in rapid succession. Antisubmarine homing torpedoes have also been developed. They have "listening" or "pinging" heads and can search for submarines along a curved or zigzag path of vari- able depth. Lastly, it should be mentioned that all these ASW detection and attack devices have given rise to countermeasures. Some countermeasures merely involve appropriate action, such as going deep, assuming an East-West heading and in- creasing speed to avoid detection by MAD, or running silently and deep to avoid detection by sonobuoys. Others consist in using evasion de- vices, such as towed noisemakers and sonar decoys. In the future, submarines can be expected to have and use evasion measures of many kinds, each de- signed to baffle one or more specific ASW detection or attack devices. The ASW Problem Owing to the higher speed and longer under- water range of which submarines are now capable, tactical ASW, that is, the location and destruction of submarines at sea, must receive special attention. In order to be effective it will certainly require a vigorous effort on a vast scale. There is little doubt that the latest submarines are beyond the reach of the ASW methods used CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS in World War II. Furthermore, such success as we did achieve with those methods was due in large part to German deficiencies. Notably, the Germans permitted their submarines to transmit excessively by radio and failed to support them adequately with air or surface forces. It is not safe to assume that a future enemy will oblige us by committing the same errors. The tasks that ASW must perform are locating enemy subma- rines, attacking them successfully, and protecting our shipping. The major present weakness of ASW is the ini- tial detection and pinpoint location of submarines underwater. Unless its approximate location is known or suspected, a submerged submarine, or even a snorkeling submarine in a high sea, is practically undetectible. Furthermore, subma- rines will no longer need to expose even their peri- scopes and snorkels except for very short and infrequent intervals. The average range at which a submarine can be detected underwater, about 1 mile, is far shorter than either the range at which a subma- rine can plot and track a convoy, about 6 miles, or the range of submarine torpedoes, up to 7 miles. By hypothesis, location is an intelligence prob- lem. Failing the development of longer-range methods for initial pinpoint detection, it seems cer- tain that we will have to rely very largely on in- telligence of the approximate locations and move- ments of enemy submarines at sea, using every possible means to keep track of every enemy sub- marine from the time it is built or launched. It seems equally certain that ASW screens must be extended farther away from the convoys they protect and will for this reason among others re- quire a larger number of screening ships. The magnitude of this requirement may be seen from the fact that even in World War II more than 1,000 escort ships and 1,000 ASW aircraft were needed to cope with about 100 U-boats. Another major ASW weakness arises from the increased space available to submarines for eva- sion, because of their higher speed and longer underwater range, after the attacking ship has lost contact or has committed itself by firing its attack weapons. This problem may be met, in part, by coordinated operations in which one ship or surface craft continues to hold contact while CONFIDENTIAL 316 the other attacks. Such operations depend for their success on good communications and intelli- gence. The problem may also be partly solved by the development of attack weapons which in effect shorten the evasion time or otherwise reduce the ev a si on space. Thus, faster-sinking depth- charges and projectiles or self-propelled missiles shorten the evasion time; homing torpedoes re- duce the evasion space by enlarging the target to the size of the actuation (i. e., homing) space; and larger depth-charge patterns or more powerful (e. g., atomic) depth-charges or underwater bombs reduce the evasion space by increasing the effec- tive radius of the blast. The most extensive change resulting from the greater difficulty and reduced effectiveness of tactical ASW may well be the shift of a large part of our antisubmarine effort to strategic ASW. The forms which this shift is likely to take have already been described. Even more pertinent to this discussion, however, is the coming emphasis and dependence on antisubmarine intelligence. MINE WARFARE Mine warfare has been defined as "the strategic and tactical use of mines and mine countermeas- ures in the conduct of war." The subject includes offensive and defensive minelaying, the measures for mine clearance ( of one's own or the enemy's mines) , and protection against mines. No amount of wishful thinking has succeeded in preventing the use of mines in war when they will serve a needed purpose. One of the belligerents may forego use of them to his own disadvantage, but he cannot control the enemy's actions sufficiently to ensure that mines will not be used against him. Under proper conditions mining can be very effec- tive as a brief review of its history will reveal. The advent of aerial mining has greatly increased the effectiveness of offensive mining. Mining capabilities made great progress in the past war, but their limit was by no means reached. Historical Development Mine warfare has affected the outcome of wars since the days of the American Revolution. Mines were referred to as torpedoes until shortly after the Civil War. The results obtained from their use is of interest. During the Revolutionary War, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL David Bushnell attempted to explode charges under enemy ships at New London and Phila- delphia. Although the actual attempts were not successful, they did alarm the British captains to such an extent that they left with their ships. Again in the Civil War, Farragut actually was damning mines, when he said "Damn the tor- pedoes." It is also interesting to note that during the Civil War 27 Union ships were sunk by mines, whereas only 9 were sunk by gunfire. However, it remained for the Russo-Japanese War to show the first great promise of mines as an offensive weapon. Both the Japanese and the Russians mined extensively in areas under the other's control, resulting in heavy losses to both sides and leaving both countries very mine-con- scious. There are indications that the Russians still are. World War I brought the first large scale use of mines. During that war the Allies undertook extensive mining activities including the famous North Sea barrage of about 73,000 mines, but the really significant mining was carried out by the Germans. They laid about 45,000 mines offen- sively in and around Allied harbors and other focal points of Allied shipping. The results were spectacular: 586 Allied merchant vessels totaling 1,000,000 tons, and 41 British war vessels to- gether with 225 naval auxiliaries were lost in the minefields. In spite of this experience there remained in most countries a tendency to regard the mine only as a defensive weapon. Some ventured to con- sider the possibilites of a drifting mine as a tacti- cal weapon, but generally speaking, not much thought was given to using the mine offensively. When World War II broke out, Great Britain immediately, commenced a defensive mining cam- paign. She laid two important defensive fields. The first was an antisubmarine barrier along her East Coast. German submarines abandoned the area shortly after the minefield was announced and before any appreciable number of mines were over laid in it. It had been planned to lay another field between Scotland and Norway, but the German occupation of Norway prevented that. So instead, a large mine barrage was extended northwest of Scotland toward Iceland and Greenland. The intent of 317 these fields was much the same as the old North Sea barrage. The result has been difficult to de- termine but their presence was of serious concern to German submarines and aided considerably in the antisubmarine campaign. The United States defensive minelaying effort in World War II is outlined in the 26 September 1945 issue of the "ONI Weekly" as follows: Ten thousand moored contact mines were laid by the Navy during the early days of the war to prevent the enemy submarines menac- ing our coast from penetrating important anchorages, convoy assembly points, and ref- uge areas. . . . Operations began on the East Coast in Jan- uary 1942 when a field of 365 mines was laid at the entrance to Chesapeake Bay. . . . At Key West, 3,460 mines were laid in April and May 1942 to form a protected convoy as- sembly area. . . In May 1942, 2,635 mines were laid near Cape Hatteras to form a protected refuge and convoy area. . . . At Trinidad, 991 mines were laid in April 1942. In June 1943 an additional 400 mines reinforced the field. . . . In July 1942, 575 mines were laid at Kodiak to protect a naval operating base and between September and November 1942, several fields totaling 1,532 mines were laid at Adak to pre- vent a Japanese invasion of the island. . . . Those minefields were excellent examples of de- fensive mining. But it remained for Hitler to open the world's eyes to offensive mining. At the beginning of the war the Nazi dictator had bragged of a secret weapon which he said would win the war for him. Everyone wondered what the weapon would be: the British soon found out. One day in September 1939 a British ship was sunk while steaming through what was thought to be a swept channel. More sinkings followed and the British became alarmed. The cause was finally found to be magnetic mines, dropped by German aircraft, of a new type which sank to the bottom and exploded only when the magnetic field of a steel ship passed over them. The story of the recovery and analysis of these mines and the de- velopment of the necessary sweeping gear is a heroic tale. Fortunately, the Germans did not lay many of the mines until the spring of 1940, and by that time the sweeping problem had been solved. It has been estimated that if the Germans had de- CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS layed introduction of their magnetic mines until they could lay them in large numbers, the effect on the British would have been disastrous. Their premature introduction is considered to have been one of the major German mistakes in the early period of the war. When the Germans found the British sweeping their magnetic mines, they devised new complica- tions. They introduced a ship count device which prevented the mine from firing the first time a sweep went over it. It could be set to fire upon 1 of 6 actuations. The effect of this was obvious. The mine figuratively thumbed its nose at ships or sweepers until it was ready to fire. It meant that sweepers had to cover an area at least six times to make certain that it was mine free. Next, a delay arming mechanism was introduced. This would allow the mine to become active at any time up to 6 days. It necessitated continuous sweeping for 6 days after a minelaying raid and then six com- plete sweeps after that. The effort required to combat all these new devices was enormous, and minesweeping turned out to be one of the major British naval activities of the war. The trouble caused by German mines was enough to convince the British of the value of offensive mining and they undertook an extensive campaign of their own. Their fast cruiser mine- layers regularly laid minefields off German occu- pied ports in France, and their submarines laid mines off the coast of Norway. But the really effective minelaying was done with aircraft. More than 42,000 were aerially laid in German waters with the result that more than 1,500 German ships were sunk or damaged. Of significance was the fact that the Germans were forced to employ 2,500 ships and 42,000 personnel in the minesweeping effort. In the Pacific, a well organized mining cam- paign was executed against the Japanese outer zone. It commenced early in the war and con- tinued to the end. Allied aircraft, submarines, and surface layers participated. Submarines laid mines throughout the central and southwest Pacific. Surface layer DMs did most of their mining in the Solomons' area, and aerial mining campaigns were conducted from China, Southeast Asia, and the Central, South, and Southwest Pacific theaters. None of these campaigns in the CONFIDENTIAL 318 outer zone was large scale, but they were persist- ent and widespread, and when considered with submarine torpedo attacks and aircraft bombing, they formed a well-balanced attack on Japanese shipping. lt is interesting to note that the subma- rine mining campaign netted 27 ships sunk and 27 damaged, a combined total of over 150,000 tons. The Japanese laid a vast minefield in the East China Sea, west of the Nansei Shoto, and through- out the war this field protected their shipping in that area. Japanese mines were also scattered in the Yellow Sea and minefields effectively guarded the entrances to the Sea of Japan until the closing months of the war. The loss of 3 American sub- marines was almost certainly caused by mines, and 5 others that failed to return from patrol may have met a similar fate. Allied minesweepers performed ably in the Pacific, and in shallow waters where the YlVIS (motor minesweeper) could not safely work, un- derwater demolition teams operated with the am- phibious forces. Special mine disposal units joined in the clearance tasks, and shallow-draft landing craft were fitted with light emergency sweeping gear to assist in these operations. In March 1945 the 20th Air Force began a mine campaign designed to end shipping in Japanese coastal waters, the major target being Shimono- seki Straits. Eventually all important Japanese and Korean seaports were mined by the B-29's and over 670,000 tons of shipping were sunk or dis- abled by this tremendous barrage. The Japanese were unable to clear the clogged channels. Acoustic, pressure, and magnetic mines, and their type variations, were not easily swept up and the Japanese lacked equipment for the task. In conjunction with this offensive mining cam- paign, United States submarines entered the Sea of Japan with a new mine-detecting device that neutralized the Japanese minefields defending that body of water. With her defensive fields impo- tent and her ports blockaded by submarines and mines, Japan found herself in a vise. In the United States Strategic Bombing Sur- vey's "Interrogations of Japanese Officials, volume I," a Japanese naval officer has this to say in re- gard to the American mine attack on Japan: From the standpoint of the blockade of our bases of operations, the isolation of chief re- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF 4OPERATIONAL COMMAND CONFIDENTIAL sources supplying areas, the interception of supply routes and the blockade of important points on lines of communication, the mine attacks were quite effective?it cannot be de- nied that they were one of the main causes of our defeat. The use of mines by the Communist forces in the Korean conflict again demonstrated the im- portance of mine warfare. The Reds proved that a few innocent-looking sampans and fishing junks employed to lay mines are capable of disrupting the operations of mighty armadas of modern war- ships. In October 1950 a minefield off the port of Wonsan, North Korea, delayed for 8 days the scheduled invasion of that port by a large United Nations amphibious force. Types of Mines In order to appreciate the complexities of mine warfare it may be appropriate to consider briefly the types of mines employed in World War II. There are three general types of naval mines: the ground mine which rests on the sea bottom, the drifting mine which floats at or near the surface, and the moored mine which consists of a buoyant case moored to the bottom by an anchor and cable. The firing or actuating mechanism for mines may be one of three general types: controlled, which is fired by an observer in a remote control station; contact, which is fired by direct contact with the mines themselves; and influence, which is actuated by some change in the physical surroundings of the mine. Three basic types of influence firing mechanisms came into use during World War II; magnetic, actuated by the magnetic field which surrounds a steel ship; acoustic, actuated by the underwater sound from a ship; and pressure, fired by the change of pressure which results from the flow of water around a moving ship in shallow water. Combination type mines may be made by combin- ing any two or three of these separate types of firing mechanisms. Such a mine has the advan- tage of greatly complicating the sweeping prob- lem of the enemy. This is attested to by the comments of a Japanese naval officer contained in the USSBS volume cited above: One thing that caused us much trouble was the combination of two types of mines, combi- nation of magnetic-acoustic and the magnetic- 319 pressure mine. By the end of the war we were left with a lot of research being done but no real effective countermeasure being produced in quantity. Intelligence in Mine Warfare As in all phases of naval warfare, the intelli- gence officer has a contribution to make to mine warfare. First and foremost, he must keep his commander informed as to the enemy's mine war- fare capabilities. He must know the types of mines which may be employed, the extent to which they may be employed, and if possible, the areas which may have been mined by the enemy. The analysis of late model enemy mines by technical intelligence personnel may lead to improvement or modification of our own mines or mine counter- measures. A great amount of detailed intelligence concern- ing the area of operations, such as depth, tem- perature, and salinity of water, tides and currents, and coastal topographic data, must be furnished to the forces engaged in offensive minelaying. The mine forces in turn may in many instances be able to collect valuable information concerning the enemy and the area of operations. They should not be ignored as a vital collection agency, for in many amphibious operations they are the first naval forces to enter the objective area and may be able to furnish the latest information on enemy activity, location of enemy defenses and beach obstacles, and inshore hydrographic data. At present, indications point to an increased effectiveness of offensive mine warfare. In a little less than a century the mine has developed into a potent undersea weapon. Employed offensively and defensively it has turned the tide of battles, frustrated invading forces, and destroyed naval vessels of the largest class. In all probability minefields will continue to guard important har- bors and channels against invasion and will con- stitute a threat to wartime shipping. No modern naval commander would dare to defy the menace with a mere, "Damn the torpedoes, full speed ahead!" AIR INTELLIGENCE Air intelligence has been defined as "intelligence pertaining to the offensive and defensive capabili- ties of foreign countries and their vulnerability to CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS air attack which is required by commanders to plan, train for, and execute operations involving or affected by air power." Thus air intelligence finds its needs and applications in all types of operations that either directly or indirectly in- volve the use of air power. Air Power The air power of a sovereign state is determined by the compilation and analysis of several sets of figures and facts. It becomes meaningful when presented in terms of numbers of aircraft and the static ability to utilize and to replace them. Num- bers of aircraft in themselves are not particularly significant, but when collated with such other considerations as types, performance character- istics, availability, and operating personnel, the relative importance of a given nation's air power is established. Air power is therefore dependent on the capa- bilities of the following elements: 1. The air force in being, which consists of military aircraft, personnel, and establish- ments. 2. Air transport, which is composed of civilian air transport, personnel, and establishments. 3. The aircraft industry, which comprises the manufacturers of aircraft, aircraft parts, and accessories. It is devoted primarily to air transport production in peacetime. In time of war, it is concentrated on the manufacture of military aircraft. Air Force Basic Tasks The basic tasks for which the United States Air Force must be prepared constantly are: 1. Destroy hostile air forces, which includes air defense of the United States. 2. Deny the establishment of and/or destroy ex- isting hostile bases from which an enemy can conduct operations on land, sea, or in the air. 3. Operate against hostile land or sea forces, the location and strength of which are a threat to the vital interest of the United States and her allies. 4. Wage offensive air warfare against the source of strength (military and economic) of the enemies of the United States and her allies in the furtherance of approved war policies. CONFIDENTIAL 320 5. Operate as a part of the task force in the conduct of military operations. Mission of Air Intelligence The mission of operational air intelligence is threefold: 1. To procure, process, and disseminate infor- mation of the actual or potential hostile forces, the area of air operations, and any other usable information which Could assist the commander in arriving at timely and sound decisions. 2. To brief aviation personnel. prior to all flights on the type of flight, operating area, targets, flak, flight routes, expected air oppo- sition, types of hostile aircraft, communica- tion procedures and call signs, own and hos- tile ships and aircraft in the area, search and rescue procedures, evasion and escape infor- mation, navigation, aerology, and any other information pertinent to that flight. 3. To debrief returned aviation personnel on all aspects of the completed flight, such as hostile ships and/or aircraft in the area, results of air-to-air and air-to-surface com- bat, ground installations, troop movements, etc. In principle, air intelligence has the same char- acteristics and properties as any other type of intelligence, and the intelligence cycle is equally applicable to its activity. Its subject matter, however, comprises a special field and deals with special items of information, which in many cases require special handling and dissemination in forms which are not necessary for other types of intelligence. A basic knowledge of air intelli- gence is essential to the professional competence of all naval officers. Air Operations An examination of some of the aspects of air operations will help in understanding the func- tions of air intelligence. Air operations encompass a tremendous subject. When one considers the fact that large task forces are composed for air operations alone, the term assumes its true meaning and scope. Probably no type of warfare has made more rapid progress than air warfare, and as a result air operations Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL have similarly been extended to include a great number of tactical and strategic missions from both fixed and mobile bases. Carrier Air Operations At the present time the primary offensive weapon of the United States Navy is the carrier task force. Such forces are organized to accom- plish a specific mission, being highly mobile and able to change their composition and disposition in a short period of time. They are capable of conducting modern warfare in accordance with the highest attainable standards utilizing the latest aircraft, ships, and special weapons. They can strike at the heart of hostile forces and can cruise close to hostile shores and launch devastat- ing offensive air strikes against inland .as well as coastal targets. Carrier-based aircraft are divided into several categories depending upon their primary mission and comprise such varied types as fast fighters, attack aircraft, antisubmarine aircraft, semirigid airships (blimps), and helicopters. The intelli- gence officer must be familiar with the types of friendly aircraft operating in his area, their flight characteristics, and performance in order to uti- lize the aircraft either directly or indirectly avail- able to him for the collection of information about the enemy and the area of operation. Through proper employment of available personnel and aircraft in collection and on-the-spot evaluation of information, tactical operational intelligence is obtained during engagement with enemy forces. The information collected by carrier-based avi- ation personnel through observation and photog- raphy covers many components of both operational and strategic intelligence, such as: 1. Enemy aircraft in the area: numbers, types, performance data. 2. Air installations: location, size and capacity, facilities and possibility of expansion. 3. Ports and port facilities. 4. Troop movements and ground installations. 5. Ships and ship movements, both naval and merchant. Land Based and Patrol Air Operations Land based air operations differ greatly from carrier air operations for a number of reasons. 269196-54 -22 321 They place the greatest emphasis on search, pa- trol, logistic support, and the delivery of special weapons too bulky or heavy to be adequately handled aboard carriers. Land-based and patrol aircraft are usually larger, slower, and have a greater combat radius than those flown from car- riers. However, with the introduction of the new flush-deck carrier, aircraft which thus far have operated only from stationary, distant air- fields will transfer to the highly mobile deck of the carrier. The information available to the intel- ligence officer from Land-based and patrol air- craft is similar to that available from those which are carrier-based. Air Intelligence Production Divisions Air Combat Intelligence (ACI) was established by the Chief of the Bureau of Aeronautics early in 1942. Prior to that date the Navy had no specialists in this field. Since the application of intelligence to war in the air was more clearly a function of aeronautics than of the Office of Naval Intelligence as it was organized at the time, ACI was established in the Bureau of Aeronautics. Subsequent developments during World War II modified these earlier concepts to such an extent that ACI has now been transformed into the Air Section, Intelligence Branch, of ONI. Because the work of this section is so closely related to that of the Air Force's Intelligence Directorate, former joint committees have been re- placed by a single integrated activity, for both services known as the Air Intelligence Production Divisions, staffed by both Navy and Air Force personnel. Responsibilities of the Divisions include all the phases of the intelligence cycle as they apply to air, as well as foreign liaison and planning. They are the nerve centers of United States air power to which all information flows, where research is conducted, and from which estimates emanate. Air Intelligence Officer Program Since the development of air intelligence billets in World War II, the Navy has felt that air in- telligence officers should be specially equipped for their duties. During World War II, officers were trained at Quonset Point, R. I., for assignments to air combat intelligence billets. These officers CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR served with all types of operational squadrons as well as with staffs located both ashore and afloat. The significance of their contribution has been at- tested by all who had occasion either to work with them or to review the results of their work. At the end of World War II, the school at Quon- set Point was discontinued and most of the air combat intelligence officers were released from active duty, since the majority were reservists. There was actually little need for such specialists during the interim period between the close of World War II and the outbreak of the Korean conflict. The war in Korea and subsequent international developments again created a need for specially trained air intelligence officers. Profiting from World War II experiences, but well aware of changes dictated by current needs, the Navy re- established a school designed for their training. The older designation, air combat intelligence of- ficer, was changed to air intelligence officer, which is more descriptive of the present broad scope of their responsibilities and the services they render. As a rule, air intelligence officers are selected on the basis of aviation experience, either as pilots or in activities closely related to naval air operations. In time of ostensible peace, some of these officers are assigned to Naval Reserve organizations to help train Reserve air intelligence personnel. Air Intelligence Officer Duties In actual practice, probably no two air intelli- gence officers perform identical functions either qualitatively or quantitatively. This is due to dif- ferences both in command missions and individ- ually assigned tasks. In general, the duties of an ATO fall within the steps of the intelligence cycle: collection, processing, and dissemination of intel- ligence in support of the commander, and a fur- ther discharge of the same responsibilities in rela- tion to ONI. These duties, when stated more specifically for the air intelligence officer, include the maintenance of air intelligence files, the establishment of a ref- erence library, the collection and dissemination of target information concerning areas of opera- tion, the maintenance of situation plots, briefing the commander and other authorized aviation per- CONFIDENTIAL 322 NAVAL OFFICERS sonnel, the debriefing of aviation personnel, the preparation of action reports, assistance in oper- ational planning, and miscellaneous collateral duties such as the preparation of squadron war diaries, recommendations for awards, and such other duties as may be assigned from time to time. The foregoing list is in no way complete, for the duties will vary depending on the relative com- mand position of the unit the ATO serves. At higher levels, most of his efforts will be directed toward planning. At lower echelons, he will prob- ably concentrate on preparing his unit to execute the plans received. At the squadron level, the primary duty of the ATO is to brief and debrief aviation personnel. At the staff levels, he will be primarily concerned with planning functions, such as the preparation of intelligence estimates, command briefing, the writing of intelligence annexes to operation orders, and the supervision of photographic reconnais- sance. AIO's attached to intelligence centers process intelligence reports and disseminate them to all echelons of command. One of the most important duties of any air intelligence officer is the direction of the air intel- ligence effort. This involves both comprehensive planning and effective administration. Sources of Information Just as pilots and aircrewmen are dependent on the information and materials made available by the AIO, he in turn relies on them for augmenting the basic information prepared and disseminated by AFOIN and ONI. In time of war, theater intelligence centers provide the operating AIO's with additional intelligence pertinent to current operations. The products of such centers might include current situation plots, photo interpreta- tion reports, special objective studies, enemy order of battle, reconnaissance, and evasion and escape reports. It is significant to note that as aircraft capabili- ties increase, both in range and fire power, addi- tional forms of intelligence become "air" intelli gence. This particularly applies to sociological intelligence, interior terrain stu dies, enemy ground order of battle, and air technical intelligence. In light of recent technological developments, the Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002A umnFIDENTIAL INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND ATO will do well to consider all sources of in- telligence production as potential sources of air intelligence. AIR TECHNICAL INTELLIGENCE The following news item from the Washington Star of 3 November 1951 serves as a summary of the vital role of air technical intelligence: RUSSIAN WEAPONS CAREFULLY STUDIED IN U. S. LABORATORY (AP) Dayton Ohio Nov. 3, 1951. . . . The Air Force is peeking over Russia's shoulder?in a laboratory. The laboratory is the United States Air Force Technical Intelligence Center at nearby Wright-Patterson Air Force Base. What goes on there is so secret even workers them- selves cannot get in the restricted area "with- out special code numbers on their passes." An electric "code verifier" flashes like a metal detector in a prison when each of the workers check in or out. Armed guards will stop you if you walk 10 feet inside the area without an escort. A carefully screened, select group of officers and civilians work at the center. Engineers, photointerpreters, metallurgists, scientists, and specially trained evaluation experts of all kinds are putting the enemy under the microscope 24 hours a day, studying North Korean Communist equipment as well as Russian equipment. Findings Kept Secret What these technicians do, the technique they employ and how much they learn is a secret locked behind the laboratory fences. But, their prime job is to get every bit of tech- nical information about the enemy, evaluate it, and make the information available to our fliers in combat. More than 100 tons of captured North Korea, Chinese Red, and Russian equipment have been shipped thousands of miles from the fighting zone to the Ohio intelligence cen- ter. Some was flown here. More came by ship. One big item is a MIG-15 jet fighter taken by an air intelligence team shortly after it was shot down in Korea. "It was fairly intact," an officer said, "but there wasn't enough to warrant reconstruct- ing it and flying the machine." The officer explained, however, the Air Force could build a MIG-15 and fly it, if it wanted to. There's another MIG-15 at the 323 base these days. But it's a pile of junk now. A mass of turbine engine cowlings, wires, seats, tailpipe from a jet engine, rudder fin and elevators stacked in a storeroom. It was more complete when they got it, but they took it apart and studied it, piece by piece. Much Is Learned Col. Harold E. Watson pointed to the pile of junk: Sure, we learned a lot of things about it. But we're only telling our own interested agencies. That's what makes our work so tough. It isn't that we're afraid to tell the Russians about the MIG. They know all about it. But they don't know how much we know. The warehouse looks like a Russian junk- pile, with here and there supplies of intact equipment. There are racks of clothing worn by North Korean Navy, Air, and Army offi- cers. There are oxygen masks, gloves, flying jackets, boots, helmets, new engines of a recip- rocating type used by Russians in transport planes. In a warehouse cubbyhole is a partly intact Russian IL-11 two-seater trainer. The wing is in good condition. The fuselage, however, is partly shot up. IG Guns Checked Just a junk heap? Yes, but it told United States experts many things. For instance, theTlane was armed. Allied trainers are not. What kind of things do the experts learn when they peer over the shoulder of the Rus- sian bear? Well, the warehouse has some machineguns taken from the Russian MIGs. They are larger and heavier caliber than the guns in our F-86 Sabre jets. But they fire less rapidly and the Sabre has more guns. Maybe that is one reason American jets are shooting down MIGs in Korea today. INTELLIGENCE IN AMPHIBIOUS OPERATIONS During World War I, naval operations for the most part involved antisubmarine warfare, escort of convoy, and fleet actions. The intelligence offi- cer aboard ship was usually an assistant operations officer on a staff or the head of a department of the ship itself, and his intelligence work became merely a collateral duty as the need arose. He was to keep his flag or commanding officer advised on enemy locations and movements, and his infor- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR mation was for the most part received from scout- ing units and intelligence sources ashore. Air reconnaissance was in its infancy, and amphibious operations, as distinguished from raids, were not contemplated. It was not necessary to storm the beaches of Europe, inasmuch as France was then an active ally and transports could land their troops at her ports. During the amphibious operations training con- ducted by the Marine Corps between World War I and the beginning of World War II, it became evident that the sources and collection agencies of intelligence, normally used by ground forces, would have to be improved upon and expanded in order to meet requirements peculiar to an am- phibious operation. It was found that although the principles of intelligence remained the same, new methods and techniques for the collection and dissemination of enemy information would have to be developed and perfected before an amphibious operation could be put into effect with any reason- able expectation of success. Continuous experi- mental work, diligent training, and combat expe- rience resulted in the present concept of intelli- gence in amphibious operations. Lessons learned early in World War II, beginning with Guadal- canal in August 1942 and extending through the landings in North Africa and Sicily, were invalu- able for the planning and conduct of the amphibi- ous landings in Normandy in June 1944. It was realized during these early phases of World War II that the amphibious operation was complex, involving air, sea, and ground units, and that intelligence officers had to be trained for these special activities and rushed to the fleet as quickly as possible. By the conclusion of World War II, the succession of landings in the Philippines, on Iwo Jima, and on Okinawa pointed conclusively to the fact that all previous experiences had been carefully studied and utilized advantageously. Since World War II, developments in elec- tronics, aerial reconnaissance and photography, underwater demolition techniques, surface and underwater craft, and improved maps and charts have resulted in a more thorough, accurate, and timely system of collecting and disseminating enemy information and intelligence during the planning and execution of an amphibious opera- tion. The continuous research and training has CONFIDENTIAL 324 NAVAL OFFICERS eliminated a great number of the uncertainties that endangered success in the past. However, there still exists the need for more accurate infor- mation about the hydrography, trafficability of the beach, and other pertinent information of an objective area, as was shown in Korea during the planning for the Inchon landings in September 1950. Despite the fact that United States Occu- pation Forces had at one time been located in the proposed objective area, there was a definite lack of information on which to base the planning. It has become evident that the time to obtain most of the necessary information is during peacetime or other periods when areas are accessible. Intelligence Planning for Amphibious Operations Since an amphibious operation is joint by na- ture, all intelligence material of common interest must be procured jointly. All echelons have a common interest in matters such as landing beaches and their approaches, defensive beach in- stallations, enemy coast defense and antiaircraft guns, air fields and their defenses, weather condi- tions, visibility, natural and artificial obstacles, currents, tides, surf, and other hazards to landing. Unified action eliminates costly duplication of effort and effectively utilizes the combined collect- ing facilities of the land, sea, and air components. In preparation for joint operations, the produc- tion of intelligence from all sources must first be carefully planned and integrated at theater level to prevent incomplete coverage, needless duplica- tion, and leaks in security. The search for infor- mation must be continuous, and the production and dissemination of intelligence must be expe- dited to insure the factor of timeliness. The greatest problems in intelligence for am- phibious operations arise during the planning phase. A great distance often separates the mounting and the objective areas, the landing forces are not in contact with the enemy, the majority of the available collecting agencies are not organic to the landing force, and a relatively long period of time is required for planning prior to the execution of the landing during which the enemy situation may undergo many changes. Sources of Amphibious Intelligence The available information upon which planning will be initiated is obtained from departmental or Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R0001002100Q2-.9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND coNFIDENTIAL theater intelligence agencies and research sources. The publications of a number of governmental agencies provide intelligence of a background nature for planning an amphibious operation: 1. Central Intelligence Agency: Comprehensive surveys and studies. 2. State Department: Information of political, economic, and sociological nature. 3. ONI, G-2, and AFOIN : Information of for- eign military forces. 4. Army Map Service: Maps for the Armed Forces. 5. Army Corps of Engineers: Strategic engi- neering studies. 6. Navy Hydrographic Office: Hydrographic charts and studies. 7. Photographic Interpretation Center: Photo- graphic intelligence studies and operational aids. 8. Aeronautical Chart Service: Aeronautical charts. As planning progresses, more dependence will be placed upon theater, fleet, and organic landing force agencies for further information. Specialist teams may be available from the theater intelli- gence agencies for assignment to the landing forces, such as translation and interpretation, technical intelligence, and counterintelligence. For the Inchon landings in Korea, the 1st Marine Division used the 163d Military Intelligence Serv- ice Detachment and the 441st Counterintelligence Corps Team. Both of these specialist teams were furnished by the Far East Command and were composed of United States Army commissioned and enlisted personnel with such Korean nationals as were required for liaison interpretation and translation purposes. The intelligence sections of the amphibious forces and group staffs of the fleet also produce and disseminate intelligence necessary for the suc- cess of an amphibious operation. These agencies normally are based aboard amphibious force flag- ships (AGCs) equipped with complete reproduc- tion facilities for printing maps and charts, devel- oping negatives, printing ground or aerial photo- graphs, and processing motion picture film. In addition, the intelligence sections of the amphib- ious staffs include language and photographic in- terpretation personnel and other intelligence 325 specialists who can render considerable assistance to the landing force units in acquiring and process- ing information. An intelligence officer may be assigned the responsibility of target location, tar- get identification, and damage assessment. The Target Information Center, operated by the staff intelligence section, is the repository for all perti- nent known information on targets of interest to naval gunfire and air support. During operations target information is kept current by recording results of naval gunfire and air strikes. New tar- gets, reported by aerial reconnaissance or photo- graphic interpretation, are immediately referred to fire support ships and supporting aircraft. A card index of all known targets is maintained by the Target Information Center. Targets are num- bered and listed according to areas of responsibil- ity. As information on specific targets is reported by support ships and aircraft, the results are re- corded on the cards and also plotted on a target map for immediate visual reference. TIC gen- erally prepares daily for transmission to the ships a list of those targets destroyed or remaining in each area of responsibility. Aerial Reconnaissance Aerial reconnaissance is a primary source of information for the planning of an amphibious operation and often may be the only means of aug- menting background information furnished by departmental or theater agencies. Requests for aerial reconnaissance should be exact and detailed and submitted as early as possible to enable aerial reconnaissance missions to be coordinated with other missions. Aerial reconnaissance can be used to obtain valuable information of the enemy and the objective area. However, there are certain re- strictions imposed by inclement weather, darkness, antiaircraft artillery fire, hostile combat aircraft, concealed terrain, and inexperienced observers. Aerial reconnaissance may be divided into visual, electronic, or photographic; of these, pho- tographic reconnaissance is more widely used for planning purposes. It is highly desirable that aerial photographs of landing beaches and adja- cent areas be available early in the planning phase. The procedures and techniques of photointerpre- tation have been previously described. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL Fleet Units INTELLIGENCE FOR NAVAL OFFICERS Cruisers, destroyers, motor torpedo boats, land- ing craft, rubber boats, and submarines may be used to reconnoiter areas selected for operations and such additional areas as may be desirable for deceptive purposes. This may be executed by the naval units alone or in conjunction with amphib- ious reconnaissance patrols and underwater demo- lition teams furnished by the landing force. The collection capabilities of various types of ships have also been discussed in chapter 9 and need not be repeated here. However, some additional com- ments on amphibious patrols and underwater de- molition teams will be given because of their inti- mate association with the subject at hand. Amphibious Reconnaissance Patrols In the early history of amphibious warfare, the amphibious patrol as an aid to tactical planning for a contested landing was not widely employed. In his invasion of Britain, Julius Caesar sent offi- cers of his staff to observe prospective landing beaches from seaward, but they did not actually land. During the Middle Ages and Renaissance, if any information was gathered, it was by secret agents and espionage. Amphibious patrols reappeared during the Na- poleonic Wars. Prior to the British expedition against the French in Egypt in 1801, a patrol of officers was sent ashore at Aboukir Bay to recon- noiter for the projected landing. In the Russo- Japanese War of 1904, the landing beaches at Port Arthur were not scouted by the Japanese on the pessimistic premise that to do so would divulge the location of the proposed landing; the possibility of an undetected reconnaissance was apparently not considered. In the only major amphibious operation of World War I, the Gal- lipoli Campaign, no effort was made to reconnoiter the beaches physically prior to landing, although two amphibious patrols were used later in the operation for the purpose of gathering informa- tion along the flanks of the Anzao beachhead. One of these patrols accomplished its mission with no casualties, while the other was detected during landing and destroyed by rifle fire. The extensive use of the amphibious reconnais- sance patrol during World War II was mainly the result of modern theory and technique, stem- CONFIDENTIAL 326 ming largely from recent developments such as the inflatable rubber boat, radio communication, and radar. These developments, together with high- speed naval transports capable of covering con- siderable distance during hours of darkness, made the physical reconnaissance of a defended shore a practical and necessary source of information for the amphibious operation. One of the first examples of a modern patrol was conducted by the Marine Corps in February 1940 during the Fleet Marine Force maneuvers. In this exercise, the force designated to land on the defended island sent a patrol ashore prior to the landing which successfully located the defenses of the landing area without being detected by the defending force. The patrol consisted of a Battalion S-2 and three scouts. It was transported into the area by submarine and went ashore and returned under cover of darkness in one rubber boat. In January 1942, the Observer Group, Amphib- ious Corps, Atlantic Fleet, was organized. In September 1942, this group was transferred to the west coast where it became an organic part of the Pacific Fleet and was organized into a company of three reconnaissance platoons. It was soon discovered that the usefulness of this type of re- connaissance was such as to make almost con- tinual employment of the unit desirable. Since this was beyond the capabilities of so small a force, natural expansion followed and at the end of the war the Marine Corps was using a complete series of highly trained units for this specialized duty. Each of the two amphibious corps in the Pacific initially contained organic amphibious re- connaissance units, enabling each to collect infor- mation for forthcoming landings with its own agencies. In addition, each Marine division had its organic reconnaissance company, particularly trained for amphibious patrolling as well as for normal land warfare missions. Experience has shown that the patrolling of small heavily garrisoned areas does not as a rule warrant the risk involved. Large land masses, on the other hand, offer excellent patrolling op- portunities. Well-planned, aggressive patrolling was found to be feasible, and patrols secured valu- able detailed information. Patrols were success- ful on New Georgia Island, Treasury Island, and Bougainville, returning without a single casualty. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R00.111002100D2.% -uunrIDENTIAL INTELLIGENCE IN SUPPORT OF OPERATIONAL COMmAN The patrols used by the 1st Marine Division on Cape Gloucester and those on Tinian by the V Amphibious Corps proved conclusively that, when properly employed, the amphibious patrol can secure information of the enemy and terrain not otherwise available. In planning employment for amphibious pa- trols careful consideration must be given to the following basic principles: 1. A patrol must be so constituted, both as to size and equipment, that it can operate in its assigned area with minimum danger of detection. 2. Personnel assigned must be well trained in amphibious patrolling and be in good phys- ical condition. 3. Patrols must be given simple missions capable of accomplishment and of sufficient impor- tance to warrant sending out a patrol. 4. Patrols must be allowed sufficient time to ac- complish missions assigned. 5. Patrol leaders must be chosen for their known ability and intrepidity. 6. Before departing from base, patrols and the commander of the transporting craft must be carefully briefed as to where and how they will be landed and where and how they will be removed. The size of an amphibious patrol is limited to the minimum number of men and boats capable of accomplishing the assigned mission. Therefore, the size of patrols which are to land will vary from 2 or 3 men to a reconnaissance company, depending upon the nature of the mission, known enemy dis- positions, and the configuration of the terrain. The smaller the patrol and the fewer the boats, the greater will be the chances of escaping detection. Personnel assigned to amphibious reconnais- sance patrols are normally selected from recon- naissance battalions or companies organic to a Marine Division. At the close of World War II, the Division Reconnaissance Company consisted of 5 officers and 104 enlisted men, plus 4 naval per- sonnel. The present Division Reconnaissance Company consists of 6 officers and 121 enlisted men and no naval personnel. The Amphibious Reconnaissance Battalion of the Fleet Marine Force consists of 23 officers, 291 enlisted marines and 7 enlisted naval personnel. 327 Underwater Demolition Teams Underwater demolition teams are the principal Attack Force agency which can be used to recon- noiter the objective area prior to D-day to gain information of hydrographic conditions and enemy beach defenses, and to destroy or remove natural and artificial obstacles existing on the beach or in the approaches. Frequently person- nel of the Landing Force accompany underwater demolition teams to obtain information of par- ticular interest to the assault forces and to ensure that such information is immediately made avail- able to landing force units. During the landings at Lingayen on Luzon, in January 1945, ComUDTsPac requested that Army liaison personnel from higher echelons of the as- sault units be assigned to UDT as observers. Rough UDT charts, showing the results of the teams' reconnaissance, were prepared and repro- duced on gelatin "Ditto" pads, and a limited dis- tribution was made on D-day to some of the command ships of the assault forces. As a result of these experiences, it was perceived that UDTs could in the future perform valuable work of a reconnaissance and intelligence nature. The teams participating in this work at Lingayen Gulf had had no training in hydrographic recon- naissance as distinct from the demolition function, and consequently the information contained on their charts, although valuable, was not complete. Furthermore, distribution of this information was not effected until one hour before the assault on D-day. For adequate underwater intelligence, it was established that the officers participating should have a thorough knowledge of hydrography, in addition to an understanding of the maps, beach diagrams, and the methods of speedy reproduction under combat conditions. Ozalid machines, in- stalled on the fast transports (APDs) on which the teams were embarked, were used extensively in the preparation of the reconnaissance charts which were distributed immediately after the informa- tion was brought back. Staff members and under- water demolition team captains were briefed by the rear intelligence section in the early stages of planning an operation, and later the intelligence officers assigned to TJDTs briefed all personnel whose duties necessitated the collection of detailed CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS information. All available pertinent data was issued to them, and particular effort was made to supply blow-ups of all the best available photo- graphs of the beaches and reefs to be reconnoitered. The effectiveness of careful advance planning is well illustrated by the Iwo Jima operations. Re- connaissance was made on D-2 day, and several hours afterward a message summarizing the uar information was sent to the flagship of the am- phibious forces for relay to the attack forces approaching the target. On the night of D-2 day, the landing force liaison personnel, which consisted of Marines, two members of the UDT staff, and men from the teams, were sent back to rendezvous with the at- tack and support forces, bearing copies of the messages and the UDT charts. Reports were sent by message upon the completion of each recon- naissance operation; briefing personnel with re- ports and charts were put aboard APDs to rendezvous with attack forces on D-1 day, and were also transferred to the flagships of all Trans- Ron, TransDiv, attack force, and two tractor corn- in ands. The Army liaison personnel were assigned to their respective battalions, regiments, divisions, and corps. At dawn on the morning of D-day, with the arrival of the attack forces in the area, further transfers of staff personnel with the nec- essary charts were made to command ships. Each team furnished guides to the first landing wavesf and the staff personnel reported to the Force B ea chmaster. No demolition was necessary at Iwo Jima, but the necessity, feasibility, and importance of wide and early distribution of UDT intelligence were demonstrated. Prior to the invasion of Okinawa, the UDTs had been briefed at Leyte on all available intelligence, and the latest photographs had been delivered to them there. After making a reconnaissance of Kerma Retto, which was then occupied a week before the main assault, they proceeded to Oki- nawa and reconnoitered the beaches 2 days before the assault. Here they were accompanied by rep- resentatives of the various troop commands as- signed to the selected areas. Their reconnaissance produced a detailed written report, including large-scale Ozalid prints of beach and reef sketches, which proved to be accurate and com- CONFIDENTIAL prehensive. The day before the invasion, repre- sentatives of the various troop commands were taken by destroyer to the flagships and vessels on which troop commanders were embarked. UDT representatives then briefed the assembled com- manders and furnished them with the written report. During the UDT reconnaissance, 3,500 obstacles in the form of wooden posts set on the reef edges were discovered. As most of these constituted a barrier to LVTs, it was deemed necessary to blow them out of the beach approaches. This was ac- complished by the UDTs without incident. In addition, these incredibly courageous men later reconnoitered for more suitable unloading beaches in the northern part of the island. Amphibious Intelligence Forms The form used for intelligence estimates in amphibious operations conforms to the standard form for estimates (see chapter 12), although certain information must be stated in greater detail. Analysis of hydrography must include the following factors: nature of coastline and con- tiguous islands; the general location and extent of usable beaches and exits therefrom; the nature of offshore approaches, including the condition of the bottom, natural obstacles, surf conditions, tides, and currents. From the analysis of the hydrographic conditions, conclusions are reached as to the effect of these conditions on the enemy's ability to defend the objective area and on the execution of our mission. The intelligence annex for an amphibious op- eration follows in general the standard form described in chapter 12. It differs, however, in that many additional appendices are required be- cause of the vast amount of detail which must be promulgated during the planning phase of an amphibious operation. In order to expedite plan- ning between subordinate and higher units, the appendices and early drafts of the intelligence annex may be distributed as soon as prepared and in advance of the final draft of the operation plan. Other appendices may be issued later than the operation plan in order to permit inclusion of late information. Beach studies are paramount in the work of the intelligence officer in amphibious operations. 328 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL They may be prepared for a single beach or for a series of beaches in the same area. Information can be presented in tabular form under the follow- ing headings: (1) Location; (2) Length and width in yards; (3) Composition and trafficability of the soil; (4) Surf, current, and tidal condi- tions; (5) Characteristics of the bottom, including gradient; (6) Depth of water offshore and on- shore; (7) Terrain behind beach and routes of egress; (8) Natural and artificial beach obstacles; (9) Enemy beach defenses; (10) Other pertinent beach information. The collection plan for an amphibious opera- tion embodies the same considerations as those previously discussed in chapter 12. Essential elements of information and their indications will determine the collection assignments. Dissemination The task of disseminating intelligence in the amphibious landings on Okinawa was described in chapter 11. It is typical of all such operations, for dissemination is complicated by the distance which often separates participating units. Once the amphibious forces depart for the objective area, dissemination becomes increasingly difficult, and therefore it is important that all available in- telligence necessary for briefing of troops aboard ship be disseminated prior to embarkation. In certain instances, intelligence produced by specialist teams may be of value to the entire command. It can be most expeditiously dissemi- nated in the form of special studies or reports, such as weather surveys, technical intelligence monographs, translations of enemy documents, and comprehensive reports on enemy tactical doc- trine, order of battle, photographic interpretation, and terrain. The value of such reports is of course enhanced when they are accompanied by appropriate graphics. The intelligence officer must use the dissemina- tion method best suited to the time, place, situation, and nature of the intelligence. For example, radio silence normally is in effect aboard ship until the beginning of the landing and assault phase. Therefore, the intelligence officer must rely on vis- ual signals, aircraft drop, helicopter, ship's boats, or dispatch vessels for dissemination. To assist in the rapid dissemination of intelligence ashore, 329 an intelligence radio net is established among the intelligence sections within the landing force. Amphibious Intelligence in Action: Okinawa In the Okinawa Operation, Naval Intelligence made perhaps its most successful operational effort in amphibious warfare, utilizing both past experi- ence and training. Some mistakes were made, but the intelligence activities in this operation serve to illustrate both the problems and the complexities of intelligence requirements in amphibious war- fare. In August 1944, the Joint Chiefs of Staff reached their decision to occupy certain portions of the Nansei Shot? for the development of bases from which to conduct further operations against Japan. ComPhibsPac was designated the Com- mander of the Joint Expeditionary Force, which meant that his Intelligence Section became the highest echelon of intelligence for this operation. Before the actual landings took place, first on 24 March 1945 at Kerama Retto, and second on April at Okinawa, the facilities and personnel of Naval Intelligence were heavily taxed to provide the military forces involved with all of the infor- mation they required. The overall planning and preparation phase consumed almost 7 months. During the first part of this period a major task was the consolidation of all accumulated information available on the area to be attacked, and the preparation of co- ordinated plans and schedules for collecting new information. The bulk of accumulated informa- tion was supplied by the Office of Naval Intelli- gence, with additional information from such sources as JICPOA, the District Intelligence Offi- cer, Fourteenth Naval District, the Office of Stra- tegic Services, the Bishop Museum, the United States Geological Survey, the Hawaiian Pine- apple Co., Pan-American Airways, and the Com- mercial Pacific Cable Co. For the collection of new information the In- telligence Section of ComPhibsPac enlisted the aid and support of some of the same sources plus the intelligence officers of the Fifth Fleet, Tenth Army, Fleet Marine Forces (Pacific), XXIV Corps, XXX Amphibious Corps, ComAirPac, Fast Carrier Force, and all amphibious groups. Constant and close liaison with these units and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS with 0-2 was essential at all times. Prisoners of war were carefully interrogated, a conchologist from Arizona was employed; personnel of the United States Geological Survey Office in Hono- lulu were interviewed; continuing aerial recon- naissance of the area was scheduled and carried out; submarine reconnaissance was also conducted. The reproduction and distribution of adequate maps, charts, and printed material were tremend- ous jobs. In addition to hydrographic charts of the area, Okinawa approach charts, bombardment charts, briefing charts, and anchorage charts of the staging areas were prepared. There were many essential maps, including road maps of Okinawa; air and gunnery maps, scale 1/25,000, from which gridded air support charts were pre- pared; plotting maps of Okinawa, scale 1/100,000; special intelligence maps, scale 1/36,000 to show all defense installations; and rubber relief maps of the southern part of Okinawa, scale 1/10,000 and 1/25,000. Printed material included a gen- eral Information Bulletin on the area; a target analysis bulletin; graphic and tabular studies of the hydrography, reef, and beach conditions; a graphic terrain study; detailed studies of reefs, beaches, unloading conditions, surf and swell, weather, tide tables, and daylight-dark tables. Preliminary beach sketches showed the assault beaches and perspective, with salient features of each area. Controlled mosaics were prepared. By January 1945, the Intelligence Annex for the ComPhibsPac Operation Plan was completed, and annexes for the operation plans of subordinate units were underway. The distribution of all materials was begun in January and completed in February. It was, of course, necessary for every ship engaged in the operation, including those which might become involved, to receive an adequate supply of maps, charts, photographs, and all other prepared writ- ten material. The size of the distribution problem is indicated by the fact that the approximately 1,340 vessels involved in the operation were staged at seven different bases in the Western Pacific, and some were at sea most of the time. Special planes and officers were detailed for this particular job. The planning phase of this operation was ended when the Commander of the Joint Expeditionary Force departed from Iwo Jima on 9 March 1945 CONFIDENTIAL 330 to embark the commanding general of the Tenth Army at Leyte. During the period en route to the objective area, the work of his Intelligence Sec- tion increased. The coordination and dissemina- tion of late information received from a variety of sources was most pressing. Up-to-the-minute photography was a particularly important item. The following plots were maintained: a strategic plot of enemy forces, including sea, land, sub- marine, and air; a plot covering the movement of all allied task forces; a mine field plot; and a running intelligence plot of the objective area. Additional maps were prepared for the fire sup- port ships. At the last minute, UDT reports and CVE photography were received. The briefing of all personnel, including coxswains, boat crews, shore and beach parties was undertaken by lower echelon intelligence officers. With the arrival of the invasion forces at Oki- nawa, the last phase of the operation began. Speed now became a paramount consideration in the collection and dissemination of information during actual combat. ComPhibsPac assumed control of all photographic reconnaissance air- craft, with the result that the Intelligence Section was required to furnish the pilots with all infor- mation necessary to the efficient accomplishment of their various missions. The briefing of these photo aircraft by intelligence officers produced ex- cellent coverage of designated areas. Photo- graphic interpreters then worked closely with the Target Information Center to assist in locating targets and making damage assessments. Hydro- graphic survey units, placed under the jurisdic- tion of Intelligence, carried out extensive opera- tions in laying buoys, setting up navigational aids, observing tides and currents, and making special studies of beaches and anchorages. Weather fore- casts were issued twice daily. Captured materiel, documents, and prisoners were given a preliminary screening for informa- tion of immediate value. Situation plots and the intelligence maps were constantly maintained, and briefing, especially of newly arrived commanders, was a continuing responsibility. Daily situation estimates were prepared. The problem of ade- quate reproduction of photographs and maps re- quired continuing attention. Finally, liaison between the various commands, particularly when Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFIDENTIAL Army and Marine units moved ashore, was main- tained to the extent physically possible. For the intelligence officers of subordinate com- mands, the major problems were those of dissemi- nation of information and liaison with other com- mands engaged in this operation. Their partic- ular responsibilities and effort dealt with their own immediate objectives, the beaches on which their respective forces were to land and the land- ing approaches. On a smaller scale, their work was similar to that of the Intelligence System of ComPhibsPac. A most important task was the briefing of the lower echelons down to the person- nel of the individual ships in order that everyone would be familiar with the general situation and the part each was to play. The Okinawa invasion provided a practical demonstration of the vital operational role played by Intelligence. Its collection, processing, and dissemination of information produced the knowl- edge which made possible the Most effective and successful use of a vast, complex military machine geared to the requirements of amphibious warfare. MAPS AND CHARTS A thorough understanding of maps and charts as sources of information for intelligence is essen- tial in intelligence activity, especially in connec- tion with amphibious operations. In addition to familiarity with the types and scales of maps suit- able for specific operations, the intelligence officer must be skilled in the principles of map reference systems to enable him to read all systems quickly and easily. This subject is completely covered in Field Manuals 21-25 and 21-26, which should be studied by every intelligence officer; a working knowledge of grid systems can be obtained from AMS Technical Manual No. 36 and AFR No. 96-5. The three types of maps and charts with which the intelligence officer is primarily concerned are: military maps, hydrographic charts, and aeronau- tical charts. Military Maps In general, military maps may be classified by scale, use, or description. Scale is the criterion as to the amount of detail shown. Small scale maps are 1: 600,000 and smaller; medium scale 331 are larger than 1: 600,000, but smaller than 1: 75,000; large scale are 1. : 75,000 and larger. A standard classification of military maps has been adopted by the armed forces of the United States, the United Kingdom, and Canada: 1. General: Maps smaller than 1: 1,000,000? utilized for general planning purposes. 2. Strategic: 1: 1,000,000?utilized for strategic planning purposes. 3. Strategic-Tactical: 1: 250,000 (1: 500,000 al- ternate)?for use when other scales are un- suitable or unavailable. 4. Road: 1 : 250,000?for tactical and adminis- trative troop movements. 5. Tactical: 1: 50,000, and 1: 25,000 (1: 100,000 alternate). 6. Fire Control: 1: 25,000?fire control for artil- lery, naval gunfire, and air. 7. Photomap: 1: 25,000 (1: 12,500 alternate)? for tactical and administrative purposes. 8. Town Plans: 1: 12,500. 9. Beach Maps: 1: 2,000?for tactical use by assault units during an amphibious opera- tion. Hydrographic Charts Hydrographic charts are published primarily for navigational use and so are not designed as topographic maps. Generally, they include the outline of the adjacent land, together with the surface forms and artificial features that are use- ful as aids to navigation. For certain special op- erations, large scale hydrographic charts contain- ing both topographic and hydrographic data may be prepared. Hydrographic charts show depths of water, nature of bottom, contours of bottom, and tides and currents in a given sea or sea and land area. The standard projection for hydro- graphic charts is the Universal Transverse Mer- cator Projection on different scales, depending on the use of the chart. Small-scale charts include large areas suitable for ocean navigation; large scale charts cover small areas suitable for coastal and harbor navigation. Aeronautical Charts An aeronautical chart is a specialized repre- sentation of mapped features of the earth, or some part of it, produced to show selected terrain, cul- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS tural and hydrographic features, and supple- mental information required for air navigation, pilotage, or for planning air operations. The World Geographic Reference System (short title: Georef ) is used on all aeronautical charts for ref- erencing purposes in the control and direction of air forces engaged in large-area operations or those of global nature. This includes the control and direction of forces engaged in air defense, strategic air operations, air-sea rescue operations, and tactical air operations other than air support or amphibious operations, in which case the co- operating air forces will employ the grid referenc- ing system specified by the commander of the operations. LOGISTICS PLANNING A full treatment of logistics planning lies beyond the scope of this text, but the important relationship of intelligence to logistics merits consideration. Logistics relates to the procurement (design, manufacture, training), shipment and storage (or billeting) of materiel and personnel for military use. In the Navy this represents in a sense a com- bination of the greater part of the efforts of the Supply Corps and of operations officers through- out the service. The complexity of modern war and its enormous demands in men and materiel have been documented earlier in this volume. Successful campaigns do not depend on valor or will-to-win alone, but also on having the necessary tools and men delivered in sufficient concentra- tions at the right places and times. This requires minute planning and considerable experience. Minute planning of a particular operation re- quires a thorough knowledge of the area of opera- tions and the capabilities of the enemy. Reference Tables The logistics officer on a naval staff is closely allied with the intelligence officer, for the latter in effect is the enemy logistics officer, and his knowl- edge of the area of operations not only helps to assess enemy capabilities but is an essential ele- ment in our own logistics planning. Our logistics experience not only helps to plan future operations, but in the absence of concrete CONFIDENTIAL 332 intelligence gives many clues to enemy capabili- ties. We now have many volumes of basic data needed for logistics planning, such as the supply requirements, the man-hour costs, and the transit times over different kinds of terrain by various transport means. These data can serve as a gen- eral guide to the intelligence officer in assessing both the overall strategic abilities and the tactical behavior of the enemy. His goal should be to develop detailed parallel tables on enemy logistics as rapidly as the information can be collected. His collection of intelligence on size of the divi- sion slice, on speed of movement, on tons required to supply initially and to replenish given enemy units will ultimately lead to action by our own logistics planners to match or counter that of the enemy. There now are reference tables published in con- venient form (see FM 101-10, and the Navy Logistics Handbook) that are equally useful to the logistics officer and the intelligence officer in their respective jobs. The intelligence officer can- not hope to assess the enemy accurately unless he is first thoroughly familiar with the types of data we need to know for logistics planning for our own forces and until familiarity with our own needs can serve as a yardstick for assessing the enemy. Standard Components The logistics planning of the Navy is well illus- trated in the standard ACORNs, ClUBs, LIONs and other types of advance bases developed in the last war. Our early war experience, sometimes accompanied by confusion, led to the development of standard components of men and materials that could be planned well in advance of actual campaigns. Based upon the missions assigned a future advance base and the intelligence on the area where it was to be located, a large base could be ordered from a catalogue of standard compo- nent units. These units were assembled at interior supply depots or at coastal centers and packed for overseas shipment, often with unit markings al- ready on the boxes. When the decision was made to establish a base at a particular location the clas- sified code word (shipping designator) was Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R0001002100Q2-9 INTELLIGENCE IN SUPPORT OF OPERATIONAL COMMAND CONFluENTIAL printed on the boxes, and they were ready to move out in echelons to the forward area. Any combi- nation of components these bases would need were thus readily available. Planning of bases extended beyond choosing of components. A shipping priority system as- signed booking numbers to all cargo, both initial and replenishment. These were then linked di- rectly to the number of ships assigned to the lift, which in turn were scheduled to match the best intelligence assessments of initial unloading ca- pacity at the destination plus logistic assessment of expected increase in discharge capacity. A very large operation involves most detailed planning not only of the gunfire support, landing beaches, and air support targets, but also the cor- rect scheduling of each combat loaded assault wave and each resupply echelon to get the right material to the right place at the time it is needed. The degree of success will be related to the team- work demonstrated by operations, intelligence, and logistics on the staff concerned. 333 CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 malliniummimmemmunianimmin??mimmoinnmonnimiw Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 14 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES The responsibility of intelligence to the com- mander is never greater than when a new arm or tactic suddenly appears in the enemy's arsenal. Then intelligence must discover the capabilities and limitations of the new weapon or tactic and what countermeasures might be instituted. Such new developments that appeared in World War II were the V-1 and V-2 guided missiles, the Kami- kaze tactic, and, on the Allied side, the atomic bomb. It is the purpose of this chapter to discuss some of the special activities that have gained prominence as techniques of war, namely, atomic warfare, guided missiles, biological and chemical warfare, guerrilla and partisan operations, eco- nomic warfare, and psychological warfare. For the purposes of this discussion, the role of intelligence in support of these special activities is stressed. Here again, the intelligence cycle is in operation, and the intelligence officer is func- tioning to assist strategic planners and field com- manders. Collection, processing, and dissemina- tion are the intelligence officer's special responsi- bilities. In this respect, this chapter is merely an extension of those which have preceded it. ATOMIC WARFARE The advent of atomic weapons in the science of war has brought to the intelligence officer his greatest challenge in modern times. Not only must he have a basic understanding of the nuclear physics which creates atomic explosions, but he must also acquire a keen appreciation of the in- telligence targets and problems presented by the different aspects of a vast new field of scientific research and development. His first responsibility thus becomes the one which is always of prime importance to his work: the maintenance of a full fund of knowledge. It is by no means an impos- sible task, nor does he have to have professional scientific or engineering knowledge to comprehend it, for a tremendous amount of material is avail- able in books, magazines, and newspapers which 335 can be understood by the average layman. For more technical treatment he can turn to the Atomic Energy Commission's semiannual reports to Con- gress and the wealth of scientific reports continu- ally flowing from the research centers and labora- tories under the Commission's control. Further, he should read all the classified information available to his organization or activity. As developments in the atomic energy and nuclear power fields progress, more and more information is disseminated to all who need to know. It is to our credit as a nation that we offered to share our atomic secrets with the world in one of the most humane and generous gestures in re- corded history. Soviet Russia, however, was not ready to accept this offer with all the free exchange of scientific information and open inspection of existing installations which were requisite to its successful operation; hence the world is engaged in a race for military supremacy in the use of a discovery which should be one of mankind's great- est blessings. Since atomic weapons and nuclear power are new factors in current strategic esti- mates of the situation, the intelligence officer must consider the capabilities of potential enemies in these fields and the nature of the essential elements of information required in a collection plan for atomic information. Indications of Atomic Research Here he meets a real problem in determining in- dicators of atomic research and development. There is no single process for making an atomic bomb. There are at least two kinds of A-bombs, one made from uranium 235 and the other from plutonium, but both do have in common ultimate production from uranium. However, each kind can be made by three different separation processes, which means that there are six different ap- proaches to A-bomb production, each of which allows considerable latitude in design of installa- tions. Furthermore, when the processes of atomic CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS bomb production are broken down into their com- ponent parts, the materials, apparatus, and proc- esses are similar to those employed in familiar industrial enterprises. So our intelligence targets begin with the raw materials rather than with processing installations. Of these, uranium can be singled out as of prime interest. Other mate- rials which are possible indicators of processes involved in atomic research and development in- clude thorium, lithium, beryllium, graphite, deu- terium (heavy water) , inorganic chemical reagents of high purity, and non-corrosive construction materials such as monel metal, nickel, and stainless steel. The essential elements of information for intelligence would be generally concerned with ore deposits, mining statistics, exports and imports, rates of production, and ultimate use of such materials. Our second atomic intelligence interest is di- rected towards plants and equipment. Proximity of plants to water is a first indicator, for a nuclear reactor requires an elaborate water cooling sys- tem. When the water is returned to the river or lake of its origin, it may still be hot enough to cause a rise in the temperature above normal. The building housing a reactor will be of considerable size, and electronic equipment will be required for remote-control handling of the product. Separa- tion plants in plutonium extraction require under- ground tanks for the disposal of radioactive waste. From the ventilating stacks of these tanks radio- active dust may be widely scattered, not in suffi- cient quantities to constitute a health hazard, but enough to make detection possible in the surround- ing vegetation and water supply. Laboratory and engineering equipment of many kinds should be cause for investigation, although most of it is not used exclusively in nuclear energy development. Cyclotrons, electromagnets, com- pressors, vacuum pumps, and ultra-high voltage generators, for example, have potential employ- ment in atomic processes, and elaborate instru- ments such as a mass spectrometer are essential to nuclear research. Third, we have an admirable indicator of atomic activity in the person of the nuclear scientist and his colleagues in atomic research and development, the engineers, chemists, geologists, physicists, met- allurgists, and others of allied professions. The CONFIDENTIAL 336 activities of such people become essential elements of information in assessing any nation's atomic capability. The training of students in the nu- clear sciences, the projects of university labora- tories and research centers, and the security measures under which their work is carried on will all have meaning to the intelligence officer. The manufacture of an atomic weapon is an immense and difficult problem involving scientific and engineering ability of the highest order and the utilization of skilled manpower to such a degree that, in the present economic state of the world, very few nations could accomplish it, even though desirable. Nuclear Research Throughout the World We know of course that the United States, Can- ada, and Great Britain originally pooled scientific knowledge of atomic energy in the common inter- est. The French program is on a relatively small scale compared with that of the United States or even Britain. Belgium's contribution is of first- class importance because of the uranium deposits in the Belgian Congo, which is the largest supplier of these ores to the United States. The Philips Company in Holland has an international repu- tation as designers and manufacturers of particle accelerators for atomic research. Denmark is sec- ond to none in fundamental research (Profs. Bohr and Ilevesy) but lacks the industrial potential for practical applications. Norway's atomic energy research and installations are particularly con- cerned with the use of heavy water. Sweden has built a reactor and has the necessary high indus- trial potential. Switzerland has the engineering techniques and physicists of international reputa- tion (Dr. Paul Scherer). Nuclear research and discoveries of the greatest importance, led by Fermi and Anialdi, are Italian contributions. In- dia has an Atomic Energy Commission and her scientists are famed for their genius in advanced mathematical research, which is of special value in nucleonics and the quantum mechanics asso- ciated with it. India also has vast quantities of monozite sands, and Ceylon is potentially the world's richest source of thorium. South Africa and Australia have extensive programs of geologi- cal exploration. It is probable that other nations have found sources of uranium or thorium ores in Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: INTELLIGENCE IN SUPPORT significant quantities, but are not publishing their presence to the world. As to the U. S. S. R. and Eastern Europe the unclassified information published represents only educated guesses. We do know that the infamous Klaus Fuchs gave the Russians not only the inti- mate details of the A-bomb, but something of the potentialities of the H-bomb as well. He made it possible for Russian scientists to attain their goal at? least three and possibly as much as ten years sooner than they could have done it on their own. Russia exploded her A-bomb much sooner than we expected, and we can believe that she has been working on the H-bomb since 1045. Our own progress on the H-bomb continues to be highly classified information, although again reputable scientific reporters have made educated guesses. Thus far we have been dealing with atomic in- telligence of a strategic nature. Let us proceed to consider the operational employment of atomic weapons and the responsibilities of an intelligence officer on the staff of a commander who must make decisions as to their use and also solve the prob- lems of radiological defense. Such problems of command become the concern of the commander's staff. A-Weapons in Operational Command The introduction of new weapons of a nonper- ceptible insidious character in warfare does not require a revamping of our organization in order to cope with it. It is quite evident, however, that it will demand wisdom, tact, and ingenuity on the part of the commander and his staff. A proven, easily demonstrated weapon is quickly countered by the optimum defense attainable. For the de- fense against a weapon whose effects are either shrouded in secrecy or not easily observed, how- ever, implicit faith in technical staff advisers will be necessary. Command problems in radiological defense may arise as a direct result of several factors. Lack of prior planning, for instance, will require quick decisions and improvised plans, some of which may easily prove to be disastrous. Lack of quali- fied and trained personnel will cause serious de- lays. Lack of equipment of rigorous and proved design can cause limitations in time of need. The absence of a well-trained and well-organized radio- 337 CIA-RDP85G00105R000100210002-9 OF SPECIAL ACTIVITIES CONFIDENTIAL logical defense team can impose unnecessary time delays. Command problems directly attributable to these factors can be reduced. Other command problems arising out of unexpected employment of atomic weapons with regard to method, place, or timing can be minimized by thorough intelli- gence and counterintelligence. In the final anal- ysis, command problems can be solved by the adequate combination of the following: 1. A thoroughly trained radiological defense officer backed by his commander. 2. A well-thought-out and complete plan. 3. A trained radiological defense organization. 4. Adequate equipment, supplies, and facilities. 5. Good intelligence and counterintelligence. Methods of Atomic Attack The extent of damage caused by the various types of atomic bursts and the characteristics of the explosions have been thoroughly studied. With proper protective measures and a radiologi- cal defense plan the chances for survival under atomic attack have become very much increased, and many groundless fears have been dissipated by accurate knowledge gained from field tests. In an air burst of an atomic weapon, the pre- dominant effects are blast, radiant heat, instant nuclear radiation, and secondary fires; the second- ary effect is radioactive contamination which is relatively small. In the downwind direction, areas may be found contaminated by fall-out of radioactive material, although the degree of con- tamination may not be a primary hazard. In an underwater burst, the predominant effects are radioactive fall-out contamination and water- propagated blast which constitute an extremely serious threat. The water absorbs, shields, or minimizes the effects of instant nuclear radiation, air blast, radiant heat, and secondary fires. In order to obtain an extremely large volume of highly radioactive material on a target, the effect of blast and heat is reduced. The probable results of a subsurface ground burst are purely speculative, but some broad con- clusions can be drawn by analogy with the under- water burst. Predominant effects would be ra- dioactive contamination (from the fall-out of soil-trapped fission products and from neutron- induced reactions in the elements of the soil) and, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS to a less extent, air and ground shock wave. Sec- ondary effects would be instant nuclear radiation, radiant heat, and fires. Since the dissipation of the heat generated in a subsurface ground burst could be expected to be slower than in an under- water burst, the cloud would rise higher and would be influenced more by wind conditions. Considering each of the effects of the various probable methods of employing an atomic weapon, it is seen that they impose large problems on the military commander. In addition, the civilian de- fense organization will no doubt rely strongly on the zone of interior commander for advice, co- ordination, and assistance, make his task even greater. The commander outside the zone of in- terior may have to combine his efforts with those of a friendly power. This would further add to the responsibilities of that commander. Information From Tests Much profitable information and guidance can be extracted from experiences in operations involv- ing large-area radiation contamination. A corn- mand problem which was potentially very serious arose at the Baker test of Operation Crossroads. The Baker test explosion was different from those at Hiroshima and Nagasaki, for there was an added hazard from the radioactive materials trapped in the water and rained on the target ves- sels. Men walked through radioactive material scattered over the decks of the ships, tracked it around, and got it on their clothing and exposed parts of their bodies. Since they could not see, feel, nor smell it, they did not respect it, but they could eat it and they could inhale it. At Bikini, operations could be interrupted any time plans, group training, or operational tech- niques became inadequate to assure complete pro- tection to personnel. During combat, however, plans and training must be such that an organiza- tion can continue to function. After the Bikini tests were completed, the target vessels were towed to Kwajalein and anchored in the lagoon for long-term storage. The need for further examination of the vessels was apparent, and it was also evident that a complete quarantine of the ships would not be practical. The ships contained large amounts of high explosives, in- cluding some experimental ammunition and some CONFIDENTIAL 338 obtained from foreign navies. Removal of this ammunition was necessary, and the longer opera- tions were deferred the more dangerous the work would become. Frequent briefings of the men were held by the officers to impress the need for caution, not only against the dangers from radioactivity, but also against the dangers of handling explosive mate- rials and working in poorly ventilated spaces. The protective restrictions which were estab- lished were more severe than those used at Bikini. Every tendency to relax precautions had to be countered by a psychological campaign on the part of the officers to insure compliance. This is typical of what may be expected in the future. If the nature of the danger is not directly observable, the control of the troops will present a complex prob- lem. There is a vast difference between impressing a man with the fear of observable physical injury and impressing him with respect for invisible radioactivity. If there is careful indoctrination regarding radioactivity, the effect of atomic weap- ons should be decreased. If proper respect is not instilled, the toll of lives will be increased. It seems that the command difficulties to be countered and the lessons to be learned in atomic warfare will include a repetition of some of the difficult experiences at Kwajalein. There will be others that are more complex. The value of any objective should be weighed against the cost of achieving it. The costs of achieving radiological objectives are not readily observable. When a man has been subjected to some cumulative absorption, which will be re- ferred to as military tolerance, his usefulness for radiological defense (or attack) is impaired. Fur- ther exposure will increase the liability of his be- coming a casualty. When a commander has held his troops in an area of high radioactivity until he can observe the physical effects upon them, he has held them too long. The commander of the future must understand the nonperceptible hazards of atomic warfare and know how to evaluate them accurately. He must also know how to weigh the normal, calculated risks against the value of his military objective. He must understand the nature of radioactivity and the slowness with which it acts and makes itself evident. He must be willing to accept the Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL advice of a technical staff on such matters just as certainly as, under other circumstances, he would accept the information of troop losses. He can- not shift to technical personnel the responsibility for failing to drive on to his military objectives, but he must give proper weight to their advice. Military command remains in his hands and can- not be usurped by the adviser or the radiological monitors, but the commander cannot act efficiently if he ignores the advice of such technical person- nel, who in such instances would actually give far more than advice. They would tell the commander the absolute facts and impress them upon him so that later substantiation by troop casualty lists and demoralization reports would be avoided. The United States has conducted many tests since Hiroshima and Nagasaki for the purpose of obtaining data which will enable the development of an efficient, adequate, and commendable radio- logical defense operation. From each succeeding test come additional valuable lessons pertaining to radiation, lessons that will improve and perfect the overall concept of radiological defense. Captain Frank I. Winant, Jr., USN, Chief of the Radiological Defense Division, Armed Forces Special Weapons Project, concluded a lecture at the Army Medical Center in 1949 with the follow- ing observation: We must not leave our problems of opera- tional development unsolved awaiting a hur- ried solution under conditions of actual war- fare. Future atomic tests should be very useful for developing our standard opera- tional procedures and organizations, and military personnel should be employed in radiological defense work in these tests to in- crease our service experience. These tests are few and far between and are sometimes lim- ited to specialized objectives. Since they fall short of the disaster conditions toward which our planning must be pointed, it seems vital that there be operational development within the services. We have a great deal to do in properly evaluating the air reconnaissance of radiological areas, in determining the value of helicopters for radiological survey, in per- fecting remote and projectable telemetering instruments and techniques, and in complet- ing time studies and work planning and on- the-spot orientation methods for such condi- tions. We have a great deal more planning to do in the matter of provision of adequate and 339 timely personnel replacements in radiologi- cally hazardous areas. Operational development work will provide a continuous testing of textbook training and prevent stagnation of training doctrine. Without it our training in theoretical aspects can advance only to the limit of the most re- cent physics text and in its practical aspects to the limits of the last information which has emanated from atomic tests. No discussion of this nature could be com- plete without some reference to civil defense. Since most of us have families, we are natur- ally interested in this problem. The armed services are responsible for effecting their pri- mary military missions in wartime and will, in general, be unable to effect civil defense. Recognizing this condition, it is proper that the military should keep out of civil defense as much as possible. This will confront the Civil Defense Organization with the responsi- bility of growing up to meet its own problems. It would be sheer folly, however, to overlook the fact that civil defense will have a great influence on our capabilities to wage war. The next war may very well be won or lost on the home front. Recognizing this, we are trying to do what we can in support of civil defense without complicating it. Our re- search programs are pointed toward develop- ing equipment which will be as useful to the civil defenders as to the military. The field of radiological defense, from its inception, has been a universal field with universal lan- guage, equipment, techniques, and training. It is a military goal to increase our readiness in equipment and trained personnel so near to the service requirements that if called upon in emergency we can dispatch radiological defense personnel to any point necessary. To this end we have initiated a truly joint train- ing program with the Army, Navy, and Air Force turning out of their own schools joint student groups who have been trained in joint curricula under joint staffs so that in emer- gency they can be banded together quickly and work together with intelligence and pre- cision as they did in Operation Sandstone. Nuclear Power When in August 1951, the Navy announced that a contract had been let to the Electric Boat Co. of Groton, Conn., for construction of an atomic powered submarine, a new era in naval warfare was born. The implications of this new develop- ment are obvious, for such an undersea craft may well revolutionize modern concepts of naval CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR power. Tactical employment of submarines which approach a Jules Verne ideal conjures up a host of speculation upon the future of the surface ships which are the submarines' common target. We can only conjecture what further develop- ments in nuclear power will mean on the sea and in the air. One thing is certain: the intelligence officer will have to meet their challenge with flexi- bility of mind, ready to cast off obsolete ideas, and concentrate all his powers of imagination, resource- fulness, and initiative upon the new problems they pose. Once again the maintenance of a full fund of knowledge is paramount. He must study the capabilities of various aircraft as potential de- liverers of atomic weapons and think of what they can do if controlled and operated by the enemy. With such knowledge he will more capably sup- port his commander. GUIDED MISSILES A "Guided Missile" is defined by the Joint Chiefs of Staff as "an unmanned vehicle moving about the earth's surface whose trajectory or flight path is capable of being altered by a mechanism within the vehicle." In other words, it is a pilot- less aircraft with built-in intelligence. The basic components of any, guided missile are: an air- frame; a propulsion unit; a guidance system; and a warhead. The laws of subsonic and supersonic flight determine the design of the airframe. As for the propulsion unit, the jet engine is the only existing motive system capable of economically producing the tremendous power necessary to launch guided missiles and propel them to super- sonic speeds. The two main types of jet engines are the atmospheric jet and the rocket jet. The former may be subdivided into Pulse jets, Ram jets and Turbo jets (for use in the atmosphere) ; the latter into Liquid fuel rockets and Solid fuel rockets (for use in and beyond the atmosphere). Guidance systems under development today in- clude radio or radar command, terrestial naviga- tion, automatic celestial navigation, three-dimen- sional "dead-reckoner" called the inertial sys- tem, a preset course computer, and various types of homing devices which respond variously to light, radio, sound or infrared emissions, radar reflectivity, or magnetic features of the target. CONFIDENTIAL 340 NAVAL OFFICERS The warhead may be of the high explosive, frag- mentary, or special weapons categories. Or, in the case of reconnaissance missiles, the warhead may be replaced by a series of still, movie, or tele- vision cameras. Their greatest advantage is that they do not subject the lives of trained personnel to enemy fire. Therefore, the weight normally occupied by a pilot, guns, protective armament, landing gear, and survival gear, can be devoted to make the pilot- less aircraft fly higher, faster, and farther. The future potentialities of guided missiles are so great that they may one day comprise one of the major components of armed forces intelligence. Therefore, any reported foreign development is of tremendous technical and scientific interest. Early Progress The Russians pioneered in the military applica- tion of rockets, while the Germans led the world in the development of effective guidance systems. In Germany, a large group of rocket enthusiasts was at work in the early 1920's striving to break the barriers to travel beyond the earth. At several periods between the wars the German Army took a direct interest in rockets, foreseeing military ap- plications, and by the middle 1930's specific mili- tary experimentation was underway, well guarded from public knowledge, at the Baltic Coast sta- tion of Peenemiinde. Several teams of engineers were at work. One group produced a robot air- plane powered with a pulse-jet engine, the V--/. It carried almost one ton of explosives, had a range of about 125 miles, and a speed of about 425 miles per hour. It was launched from a ramp by a booster, then leveled out on a preset course from which it dived either on command of a cock mecha- nism or when the fuel gave out. It was simple in construction, requiring only 500 man-hours, and its pulse-jet engine termed "flying stove pipe" had no moving parts other than a flap valve at the air intake. Approximately 10,000 were shot toward Britain beginning a few days after D-day in Normandy. Of these the British spotted 8,081, and managed to shoot down 3,765 with fighter aircraft or ant Laircraft guns. Some 2,340 are known to have reached London, destroying or damaging one million homes, killing 6,000 persons, and wounding 37,000 more. It should be noted Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL that the V-1 was neither a rocket nor was it com- pletely guided, except by clockwork. The main group of engineers at Peenemfinde was at work on a technically more significant, though at the time less successful, military weapon: the long range rocket with supersonic speed. The one pushed to completion for opera- tional use was the A-4, popularly known as the V?s. With a range of about 200 miles, a speed of 3,500 miles per hour, and a 2,150 pound war- head, it was launched vertically from any level hard surface to arch through the stratosphere and then drop without warning on its target. Inter- ception was impossible because it travelled at nearly five times the speed of sound. Pin-point accuracy was not required, since it was directed at concentrated urban areas. It represented a great technological achievement, although less effective than the V-1. Its cost was very high, about 5,000 man-hours. The German experimenters also made progress with much more fearsome weapons. The A-4b, later improved to the A-9, was an A-4 with wings to increase its gliding range. Not tested was a two-stage rocket, the A9/A10 which was to speed an A-9 across the Atlantic to fall on New York 30 minutes after launching in Europe. A still larger, three stage A9/A10/A14 combination was to throw the A9 into space in a permanent orbit around the earth serving as a weapon to be dropped by radio command on any target in the world, or as an observation station and radio relay point, and later as the start of a manned station in space. The Germans also developed whole families of other special purpose missiles. They were de- signed for launching either from ground sites, air- craft, or surfaced submarines, and could be em- ployed against surface targets or aircraft. The most advanced surface-launched antiaircraft mis- siles were the Schmetterling and the Wasserfall, both of which were tracked optically and con- trolled by radio or radar. The air-to-air missiles included the .1-4 and the HS-298. The latter was tracked optically through a pair of binoculars from the launching plane, and course corrections were cranked in by radio. To overcome Allied attempts at jamming, controls were sent to the 1-4 through a fine, flexible wire training back to 341 the launching plane. The Germans also had two air-to-surface missiles, which proved quite effec- tive. The Fritz-X, a 3,000 pound radio-con- trolled bomb, was used to sink the modern Italian battleship Roma when she was fleeing to join the Allies. And the HS-293, an 1,100 pound radio- controlled missile, made successful attacks on Allied merchant ships, and also sank 7 destroyers in the Dodecanese. At the end of the war, German scientists, blue- prints, test models, and partially completed mis- siles fell into the hands of all principal victors. They have since provided the basis for postwar developments in both the United States and the U. S. S. B. Recent Developments The years since World War II have been devoted both to basic research and to developing interim tactical models. The United States used its stock of V?.'s as one phase of its upper atmosphere re- search program, in one case throwing a second stage rocket, WAG-Corporal, into space a distance of 250 miles. The effort has involved metallurgy and ceramics to find materials that would with- stand the terrific heat of rocket motors; chemistry to find dependable fuels delivering higher exhaust velocities; wind tunnels and mechanical brains to determine aerodynamic behavior; and especially, guidance systems to improve the long range ac- curacy of such weapons. Guided missiles in this country have become a major item in the military budget, with a special office to coordinate the independent research of Army, Navy, and Air Force. Space Travel As early as December 1948, it was announced that the efforts of the individual services to de- velop satellite vehicles were to be combined. Satel- lite vehicles, already within present day technical capabilities, could well be followed by manned sta- tions in space. The Air Force has underway long- range development programs that include studies of space medicine to anticipate the effects of lack of gravity, acceleration, cosmic radiation, and meteor incidence on the human organism. In pub- lic information releases, the Air Force has already spoken of travel not only within the Solar System CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS but eventually many light years away to other stars, suggesting that Wolf 359, some 8 light years away may be an early goal. Today's chemical fuels probably can give us a space station, though at considerable cost. A workable atomic drive, already blue-printed in several public proposals, or some entirely new propulsion system will be needed for further exploration. Even if the new fuels do not appear, by the costly stockpiling of material at a space station we can not only reach the moon but penetrate to Mars as well. Therefore, interplanetary travel is essentially an extension of intercontinental missile activity. The reason for dwelling at such length on these rather fantastic topics is their intelligence impli- cations. In World War II, Allied intelligence began to get strange reports about German activi- ties at Peenemiinde, and pinpointed air attacks on this center were important in disrupting activities there. Runaway rockets which crashed on Swed- ish soil were recovered and subjected to careful analysis so that their nature and capabilities could be determined. Aerial photographs and reports from agents told about the preparation of launch- ing sites. The invasion of Normandy came none too soon to save considerable destruction by Ger- man V weapons. Because of their potentialities, prompt technical intelligence steps were required to capture personnel and data on German experi- ments. Thus some acquaintance with the field of guided missiles is a new requirement in the intelligence officer's full fund of knowledge. Ile should read all available literature and seek opportunities to learn all he can from those who are engaged in this special branch of warfare. BIOLOGICAL AND CHEMICAL WARFARE Biological warfare (BW) is warfare waged by means of biological agents to produce death or dis- ease in men, animals, and plants. Chemical war- fare (CW) employs nonexplosive chemicals (es- pecially war gases, smokes, and incendiaries) for the same purpose. Biological and Chemical warfare intelligence are concerned with the research and the prepara- tions for operations by foreign nations in these forms of toxic warfare. Targets of this intelli- gence interest are the materials and techniques CONFIDENTIAL 342 employed, and the toxic warfare characteristics of all possible theaters of operations, including weather, hyd.rography, and terrain. The subject material of the following pages will introduce the intelligence officer to biological and chemical warfare, and outline the additional re- sponsibilities that become his in fields where sci- ence is making a deep impact upon modern military strategy and tactics. It becomes even more significant when we consider the fact that our enemies are very much interested in its development. Biological Warfare Biological warfare is old in the history of the human race, having been waged against man by man at least since Old Testament times and against man for many thousands of years by nature. As a technique, it has been described as "preventive medicine in reverse" and demands little more of our industry and science than a change in point of view. Biological warfare is defined as warfare waged by the use of organisms or their toxic products to cause disease in man, animals or plants. It is distinguished from other methods of warfare by three striking characteristics: (1) Its action is wholesale and indiscriminate. It is a method of mass killing, and as such may be extremely dc- moralizing; (2) Its action is diffusive and tends to spread rapidly in all directions. In this respect it is unique. It has been compared to the spread- ing of flames from an incendiary bomb and to an atomic chain reaction; (3) It is not destructive of property. Un like conventional or atomic shelling or bombing, it never destroys buildings, machines, or other dead matter, and can accomplish its pur- pose by affecting plants or domestic animals rather than human beings. At its present stage, biological warfare is by no means comparable to atomic warfare in destructive power. This is partly due to the problems of producing and preserving sufficient amounts of BW agents but even more to the difficulty of dis- seminating them widely enough to have a mili- tarily significant effect. Biological warfare is, however, far cheaper than atomic warfare. It is also more insidious and better suited to sabotage, especially in a time of ostensible peace. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL There are four types of disease-producing or- ganisms, or pathogens: bacteria, fungi, viruses, and rickettsias. (Certain specimens of these types are harmless or otherwise not suitable for BW.) It should be noted that "bacteriological warfare," once a common term, is too narrow in its denota- tion. Typhus, for example, is a rickettsial dis- ease; and so the use of typhus culture as a BW agent would, for consistency, have to be called "rickettsial warfare." For this reason the term "biological warfare" is now general. Suitability of Diseases for BW To be suitable for BW, a disease must have cer- tain characteristics. It should be highly. commu- nicable, infectious, i. e., able to breakdown the de- fensive mechanism of the host, and virulent, i. e., deadly or disabling. These criteria are self- evident. Unless a disease can spread rapidly, take hold and run its course, and cripple or enfeeble its victims, it cannot seriously affect morale or capacity to resist. It must be borne in mind, however, that the characteristics of a disease depend in part on the conditions under which it is used. Thus measles, a single attack of which ordinarily confers life- long immunity, would probably not be very infec- tious in most countries except among small children. Any disease chosen for BW will likely be one to which the population attacked is sus- ceptible, due regard being given to acquired immunity. Methods of Dissemination BW agents may be disseminated: (1) by air, in the form of aerosols (suspensions of solid or liquid particles in air) , as occurs with common colds, influenza, diphtheria, and measles; (2) by contam- ination of food or water, as occurs with typhoid and cholera; (3) by contact or contagion; (4) by carrier, such as a rodent or insect "vector," as occurs with typhus, malaria, Rocky Mountain spotted fever, and plague. A given disease may be transmitted by more than one of the above methods, and also by others, such as inoculation. It need not be transmitted in the way that is usual in nature; certain vector diseases can be effectively disseminated by air. Aerosol diseases are easily spread, and the result- 343 ing epidemics are hard to control. They are thus especially suitable for BW. The other types are not easy to introduce on a large scale and, except for vector diseases, are fairly easy to control by ordinary sanitation and case isolation. Accord- ingly, overt BW could be waged by means of filled missiles and munitions, projected or airborne, to create BW clouds (aerosols). Covert BW can also be effected with aerosols, although the possibility of contamination or the use of vectors cannot be ignored. Weather and terrain factors may favor or im- pede dissemination by the aerosol method. The best conditions for spreading aerosols are high humidity, low temperature, moderate wind, and dim light. The direction of the wind is important, since naturally the BW cloud must be released to windward of its objective. Personnel on high ground may be unaffected by a BW cloud. Heavy vegetation diminishes initial concentration and persistence, and buildings or dugouts tend to screen out the BW agent. Production and Use In addition to being able to cause a "suitable" disease under given circumstances and being sus- ceptible to dissemination in a given environment, a BW agent must be adaptable to large-scale produc- tion. Such production depends chiefly on the medical and biological sciences and industries and does not presuppose great resources, a vast and varied industrial plant, or the other components of national power in conventional or atomic warfare. BW is especially suitable for clandestine use, since preparations for it are easy to conceal. Con- spicuous plants and equipment, such as must be used in producing conventional or atomic weapons, are not needed. Furthermore, a relatively small supply of a BW agent is sufficient to infect even a large population. Intelligence Problems The identification of a BW attack and the deter- mination of its source may prove to be an intelli- gence enigma. The attack may first become evi- dent through such indications as an outbreak of disease which cannot be explained by normal means of transmission or the simultaneous appear- ance of many cases in about the same stage of de- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS velopment. Indications other than human illness, such as disease and death among animals, the un- usual taste or appearance of food or water, and the sudden reduction or disappearance of the residual chlorine in water supply systems, must also be watched. The following factors provide an index of a Nation's BW capabilities and vulnerabilities: (1) the level of medical and biological science; (2) the technological level, size, and flexibility of the bio- logical and pharmaceutical industry and in par- ticular, its capacity to produce cultures, antibi- otics and immunizing agents on a large scale; (3) the adequacy of medical personnel and facilities; (4) the system of communications and transpor- tation for evacuating afflicted areas, bringing them help, etc.; (5) the target population, particularly with respect to whether it is steadfast and well- informed and equipped in matters of sanitation; (6) BW research and training; (7) internal secu- rity to prevent sabotage; (8) intelligence of BW scientific and technical developments, the BW capabilities, vulnerabilities, and probable courses of action of all Nations, and the BW character- istics of strategic areas. Chemical Warfare Chemical warfare is defined as warfare waged by the use of smokes, incendiaries, and poison gases. In some respects it is unlike BW. It is not so indiscriminate, its action can be localized fairly well, and, of course, it does not have the same diffusive or "chain reaction" effect. On the other hand, like BW it can produce casualties without damaging installations and serves its purpose if it merely disables or demoralizes without killing personnel. The methods of dissemination are sim- ilar. For toxic CW agents, the most useful appear to be the aerosol method, such as spraying from aircraft, and the filled-munitions methods by us- ing bombs, shells, or grenades. History of CW CW has an extensive history. The Germans initiated it in World War I by launching a large- scale chlorine attack at Ypres on 22 April 1915. Though almost totally unprepared, the Allies soon CONFIDENTIAL 344 began to retaliate. By the time of the Armistice, chemical shells constituted the following percent- ages of all ammunition being expended: United States 15 percent, British 25 percent, French 35 percent, German 50 percent. About 39 different CW agents were developed during World War I, the best known being mustard and lewisite gases (vesicants) , phosgene and chlorine (choking gases) , and hydrogen cyanide (a "nerve" or "blood" gas). -Various irritant smokes, tear gases, incendiaries, and screening smokes were also developed. In World War II, for practical purposes, poison gas was not used at all, the deterrent being fear of retaliation. The Allies were known to be well prepared for CW counterattack, and it is also quite possible that Hitler, who was gassed as a corporal in World War I, abhorred poison gases and opposed their use. Other CW agents, how- ever, such as incendiary bombs, flamethrowers, screening smokes, and "napalm," were used and new ones were developed. Though they abstained from using poison gas, the Germans developed a new class of "nerve gases," called "G" (for "German") gases, which belong to a class of organic compounds called "Trilons." Their properties make them deadly war gases. One of them, "GD," for example, is 100 times as toxic as mustard gas. They are mod- erately persistent to persistent, colorless, odorless, tasteless, and otherwise difficult to detect, and their physiological action is very rapid. These gases exist in both the liquid and the vapor states. As liquids, they are absorbed into the bloodstream through the skin and may cause death within a few minutes. Known antidotes or decontamina- tion agents are effective only if used immediately. As gases, they are absorbed into the bloodstream through the lungs, when inhaled, and in this form they present little serious threat to anyone pro- tected by a standard United States protective mask, since no significant amount of the vapor is absorbed through unbroken skin. If absorbed through broken skin, however, or inhaled without a protective mask, the vapor in low concentratiOns produces headache, nausea, retching, and pupil- lary contraction so great that it may cause blind- ness, and in high concentrations, paralysis of the respiratory muscles. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL GUERRILLA AND PARTISAN OPERATIONS Intelligence has a two-fold concern with guer- rilla warfare. One is the production of intelli- gence suited to the special requirements of guer- rilla and partisan operations, and the other results from the fact that intelligence officers are fre- quently assigned to such groups for liaison pur- poses in an advisory capacity, or to participate in the execution of their missions. Guerrilla war- fare depends more on accurate intelligence than on mass force for successful operations, and its varied activities provide certain collection oppor- tunities not afforded by more conventional opera- tions. Missions of Guerrilla Forces Guerrillas are usually assigned missions which include the following: (1) Destruction of trans- portation and telecommunications facilities; (2) Destruction of crops, stored supplies, and fac- tories; (3) Harassment of isolated troops, supply convoys, unit command posts, and air installa- tions; (4) ColleCtion and transmission of intelli- gence?including the taking of prisoners for in- formation; (5) Political attack by assassinating enemy leaders, spreading propaganda, and ter- rorizing civilians; and (6) Combined operations, both offensive and defensive, with regular forces. It is easy to see that intelligence can play a most important role in the fulfillment of any one of these missions. Assignment to duty with guer- rillas is by no means limited to Army intelligence personnel; in World War II, naval intelligence officers served with such forces in Europe, Asia, and the islands of the Pacific. Strength and Composition Guerrilla units, although generally thought of as small, may vary considerably in size, depending on terrain, environment, and enemy activity. Examples exist of successful guerrilla forces of as many as 30,000 men. The significant organiza- tional characteristic of guerrilla operations is not that the forces are small but that the separate tac- tical entities are often small in comparison, with conventional units and their armament is gen- erally light, consisting of small arms, demolition materials and perhaps mortars. 209196-54---23 Ideally, every guerrilla unit has at least one radio operator, one explosives expert, and a person with medical knowledge. Military experience is of course desirable but not absolutely necessary, for the operations of guerrilla warfare have pecu- liar requirements and a variety of talents can be used to advantage. Marksmen from gun clubs, expert horsemen, hunters and trackers, miners who can handle dynamite, loggers who know how to control the fall of a tree, construction men, chemists to make explosives, mechanics to repair and operate captured vehicles or tanks?all are welcome in guerrilla ranks. Above all, an able leader is required, one who possesses the ability to inspire his men and who sets an example by his own daring and ingenuity. He must be able to control his men, for without a certain amount of discipline a guerrilla detachment becomes merely a group of individual bandits with no com- mon goal or method. Knowledge of Operating Area Guerrillas should operate in areas thoroughly familiar to themselves if they are to capitalize on their limited strength. Knowledge of the area of operations in the intelligence sense then be- comes of the utmost importance. There are hide- outs and caches to be prepared and escape routes to be planned. Terrain and cover must be studied to determine what areas can be traversed without detection from ground or air. Camouflage re- quirements need advance study and planning. The territory must be equally well known in the dark. The guerrilla does not try to hold ground. He uses his exact knowledge of the area to out- distance the enemy, to avoid his attention, to plan and carry out attacks. He must always be on the alert, since he lives by his wits. Support Requirements Major success by irregular troops or guerrillas require considerable support and sympathy of the resident population, logistics support from the outside, and coordinated action with other guerrilla units and also with any friendly forces in the area. Sympathetic inhabitants will furnish them with food, provide necessary information about the enemy, and protect them from betrayal. Without airdrops or smuggled arms and ammuni- 345 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR tion from friendly territory, continued operations against modern armies are arduous and often futile. Coordinated efforts in irregular attacks are necesary even if the only goal is harassment. When guerrillas are in close proximity to friendly military forces, their operations can be of im- measurable aid if controlled by the theater commanders. ECONOMIC WARFARE In chapter 5 the scope of economic intelligence was outlined, and its importance in the strategic assessment of military power was emphasized. In succeeding chapters economic resources were shown to be basic elements of power among nations, and some of the problems of international economic relations and trade were discussed. This section will illustrate how economic intelligence can be directly used as the basis for the form of uncon- ventional warfare called economic, which can sup- port military aims in war and if the need arises also be effectively used in times of peace. The Concept of Economic Warfare Economic warfare has many weapons and pur- poses, but fundamentally it deals with the fact that a strong and healthy economy is important to long-range success in both military and political spheres. The disruption of normal economic processes or interference with economic planning will upset the time tables of military or political programs. Modern war is a burden no nation can "afford" to carry, but it continues to be practiced because the alternatives seem even less desirable. Since the economic cost of war in resources, man-hours, capital investment, population shifts, financial debt, redistributed income, and inflation is so great, properly planned economic warfare meas- ures can make the burden intolerable and bring the war to an end. Economic warfare alone is seldom successful; it usually requires military strength to enforce its measures. Since ancient times, wars have been fought for economic gain, but even for the victors there was always been economic loss to a greater or lesser degree. . Let us consider some of the specific devices used as economic warfare measures: blockade, navicerts, CONFIDENTIAL A 346 NAVAL OFFICERS black lists, embargos, exchange controls, preemp- tive buying, rationing of neutrals, and strategic attack. Blockade Blockade is one of the oldest military tactics. Laying siege to a fortress until its food or water supply was exhausted brought surrender without heavy casualties to the attackers. On a larger scale, much of the history of sea warfare has in- volved interference with the commerce of the en- emy. By the time of World War I, the application of this measure through blockade had developed to the point where it resulted in starvation in Ger- many and an accompanying deterioration of mo- rale and will to resist. The German countermeas- ure was unrestricted submarine attack on ships going to the British Isles. Insofar as it made an issue of freedom of the seas and brought the United States into the war on the British side, it was a grievous error, but economically and militarily it was a logical and nearly successful step toward German victory. The Germans repeated these tactics in World War II not only to prevent the delivery of war weapons and materiel, but also to deplete the stocks of essential war materials. Their attacks against lend-lease shipments destroyed not only guns, tanks, and planes in transit to our allies, but also hundreds of thousands of tons of oil, foodstuffs, lumber, chemicals, and textiles. Our war against Japan from the Navy point of view included an economic attack through block- ade operations. Our "silent service," the sub- marine of the Fleet, can take much credit for the ultimate victory. Japan was an ideal target for such a program because its crowded home islands depended on imported food and raw materials both to fight and to live. It would be an over- simplification of the facts to say the war could have been won by submarines alone, for the lives of many brave men on ships, on land, and in air- craft were sacrificed to make victory possible, but the potentialities of submarine warfare in block- ade measures to weaken an enemy are very great indeed. Economic war fare through blockade is not con- fined to actual combat operations. It can be equally effective in times of ostensible peace. Eco- proved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL nomic sanctions were used by certain nations against Italy at the time of the attack on Ethiopia. Their failure to influence Italian policy by cutting off vital imports can only be attributed to the fact that the sanctions were not imposed by all nations trading with Italy. Blockadge has also been used since World War II for economic warfare purposes. The Soviets tried it in Berlin in 1948. The successful counter- measure, the costly airlift, was an added burden on our military budget, but its salutary effects on the free world were well worth the economic cost. We have also attempted a partial blockade of the Iron Curtain countries, because we have not wanted to supply the metals and machinery which would hasten the attainment of Soviet goals for military expansion. This has not been entirely successful, because the economic characteristics of the large Iron Curtain block are such that blockade alone cannot solve the problem. Navicerts A navicert (navigation certificate) is a device for controlling the activities of neutral vessels. The British have pioneered in this form of block- ade and have used it successfully in two world wars. It is simply a certificate issued by author- ized British officials, such as consuls, exempting a non-contraband cargo from seizure or search by patrol vessels maintaining a blockade. Thus ship- ping to neutral ports and the type of cargo carried by neutral vessels to enemy ports can be rigidly controlled. Cargoes not correctly manifested and covered by navicert are promptly confiscated. Black Lists In attempting to eliminate German influence in Latin America and to end neutral interference with blockade measures during World War II, the Allies effectively used the black list method. Economic intelligence uncovered the irregular ac- tivities of firms and individuals trading with the enemy, and a business house whose activities were discovered to be inimical to Allied interests was blacklisted. Even firms in a neutral country were threatened with reprisals for doing business with those on the black list. Embargoes Embargoes are simply prohibitions imposed by law upon commerce, such as government edicts prohibiting the departure or entry of ships at certain ports. They may be used to correct mar- ket supply and demand problems, to protect health, and to relieve traffic congestion. The embargo can also be used in economic warfare, but to be an effective weapon it has to be applied to com- modities for which no substitutes are available or which cannot be supplied from alternative sources. The identification of such commodities is a job for economic intelligence. The U. S. placed embargoes on oil and scrap metal exports to Japan in 1941 in the hope of stopping her production in preparation for war. They were not successful, for factions in Japan were determined on war, and the embargoes may even have hastened the attack on Pearl Harbor. As a policy, however, it was a logical measure at the time. Exchange Control The usual purpose of exchange control is to conserve limited supplies of foreign exchange to insure essential imports, to stabilize exchange rates and domestic prices, to control flights of capital, or to prevent black market activities. Ex- change control, however, like all other economic devices, can be subverted to economic warfare ends. For example, espionage and propaganda on a large scale are expensive; if exchange controls can limit the availability of funds for these purposes, the enemy effort can be crippled. Likewise, if control over use of exchange is tight, and dollar currency is in great international demand, then it will be exceedingly difficult for the enemy to buy essential goods in world markets. If exchange control can manipulate exchange rates, it can make purchases very costly for the enemy even where trade con- tinues. In support of national policy, many coun- tries in recent years have used multiple exchange rates which enable the offering of favorable rates to encourage desired activities without damage to the overall exchange and trade patterns. The mechanics used are beyond the scope of this study. Really effective exchange controls require a con- siderable amount of economic intelligence, for not only are licenses and inspection of particular ship- 847 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS ments necessary, but investigation must also be made of costs of production and market prices both at home and abroad to prevent getting around controls through fictitious prices. Additional re- quirements are search of foreign asset holdings by individuals and banks, study of free or black mar- kets in our exchange abroad, and prohibiting transfers of exchange from legitimate holders to those who are denied such facilities. Writers have suggested other economic warfare possibilities related to currencies. One is the printing of high grade counterfeit money to be introduced into the enemy's currency circulation to break down price controls and spread inflation or lack of confidence. Similarly, it may be pos- sible to drop counterfeit ration books in a highly controlled state to break down these regulations. It should be noted that the Soviets have already demonstrated on occasion their expertness in counterfeiting, and potential attack by these means is not to be disregarded. Preemptive Buying Preemptive buying is closely related to block- ade measures. During World War II, the Allies not only bought strategic materials in neutral countries for our own war purposes, but also tried to buy up those materials of which the enemy had a shortage. Such measures were generally very effective, but it was also possible for them to stimu- late production to the point where new problems were created. For example, tungsten was sorely needed by Germany, so the United States offered to buy the total production of neutral Spain. A characteristic of many of the extractive industries is that production can be expanded when prices make the exploitation of submarginal ore deposits profitable. Under the stimulus of preemptive buying, the digging of Iberian wolframite ex- panded to the point where we could not buy all of it, but at least Germany had to pay high prices for the ore she purchased. Even less successful were our attempts to buy up all the rabbit skins that the Germans used for lining aviation cloth- ing. Preemptive buying of rabbit skins soon showed the superiority of biological multiplica- tion over economic addition. Preemptive buying, however, can be a powerful economic warfare weapon. Through its use the CONFIDENTIAL 348 nations of the West are effectively retaining con- trol of all uranium ores this side of the Iron Cur- tain, and the entire output of other types of goods has also been preempted by long-term contracts. Rationing of Neutrals Blockade of the enemy and other control meas- ures become meaningless if adjacent neutrals are able to expand their purchases of strategic ma- terials on the world market and thus make avail- able to the enemy either their own former supplies or even transship what they buy abroad. The steps required to counteract such trade policies help to illustrate how meaningless the concepts of neutrality in a world war have become. Our eco- nomic warfare specialists have no choice but to make detailed economic studies of imports, pro- duction, exports, and stockpiling of all essential materials in neutral countries. Having deter- mined the normal needs for imports and the amount of stockpiling necessary to meet war con- ditions, the economic warfare authorities then control all neutral trade to keep it within reason- able limits. If current intelligence shows that we underestimated the ability of the neutral to export to the enemy, the controls are tightened. The controls are applied in the form of export em- bargoes, ship seizures, and exchange restrictions. Strategic Attack Strategic attack makes even heavier demands upon economic intelligence than does general blockade. Blockade merely requires assessment of overall economic dependence on trade. Stra- tegic attack aims to destroy the key facilities in the enemy's economic system and thus paralyze his war effort on the home front. Successful stra- tegic attack thus requires economic intelligence of the most exact nature to identify what is truly strategic in the enemy nation, where the bottle- necks of production, transport, supply or storage are located, and how they are to be attacked. Consistent policies of strategic attack can be highly decisive in war, although it has not been proved that they alone can win wars. The Ger- mans, for example, managed to keep production going under repeated strategic bombings, the im- mediate result being only temporary curtailment. When factories move underground, strategic Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL bombing is, of course, futile. The psychological effects of strategic bombings are a different story, which will be told in the following section. PSYCHOLOGICAL WARFARE This section will consider the conduct of inter- national relations and the implementation of na- tional policies through the planned, deliberate communication of ideas for the purpose of in- fluencing the opinions, attitudes, and actions of the people to whom the communication is directed. Of particular interest are the opportunities which may be presented to naval forces and naval com- manders to utilize the planned communication of ideas in naval operations and the contributions the intelligence officer can make in the formulation of such plans. An examination will also be made of the sub- structure which supports and makes possible the use of ideological weapons. The bricks and mor- tar of this foundation are bodies of knowledge? intelligence?and many people of diverse skills who participate in the intelligence support of psychological operations. At the national level, the intelligence support for such operations is provided by the Central Intelligence Agency, which can draw upon the data produced by the intelligence organizations of the armed forces. National Organization On 4 April 1951, the President issued a direc- tive establishing the Psychological Strategy Board (PSB) to serve the National Security Council by providing "more effective planning, coordination and conduct of psychological opera- tions within the framework of approved national policies." Representatives of the Department of State, the Department of Defense, and the Central Intelligence Agency were members of that board. The Joint Chiefs of Staff provided a Military Ad- visor. The Board was responsible for the "formu- lation and promulgation of overall national psy- chological objectives, policies and programs, for the coordination and evaluation of the national psychological effort." Guidance came from the Psychological Strat- egy Board through the Department of Defense to the Joint Chiefs of Staff. The Joint Subsidiary Plans Division (JSPD) of the JCS coordinated 349 the activities of the armed forces in this field through liaison with the Psychological Warfare Divisions of the respective services. The Joint Subsidiary Plans Division also provided informa- tion to other subdivisions of the Joint Staff en- gaged in strategic planning. The National Security Council assigned to the Department of State the responsibility for the conduct of overt psychological operations during time of peace and the initial stages of war. The Department of State, furthermore, was directed by Congress to set up a program to promote the better understanding of the United States among the peoples of the world. By Executive Order of 3 September 1953 the President abolished the Psychological Strategy Board and established the Operations Coordi- nating Board, an interagency group directly re- sponsible to the National Security Council. The purpose of this new board was "to provide for the integrated implementation of national security policies by the several agencies" of the Federal government. An underlying objective was to tie together more closely the planning and action phases of the nation's grand strategy. Specifically exempted from the authority of this board were any functions relating to internal security. The regular membership of the board included: (1) the Undersecretary of State, chairman; (2) the Deputy Director of Defense; (3) the Director of the Foreign Operations Administration; (4) the Director of Central Intelligence; and (5) a designated representative of the President. In addition, provision was made for official repre- sentation on the board of any other government agency whenever matters directly related to its responsibilities were under consideration. As a component of military planning, psycho- logical operations represent a legitimate subject - for investigation and consideration by the armed services during a time of ostensible peace or "cold war." For the Navy, it is not a simple matter to determine the extent or geographical location of its potential operational responsibilities or the cir- cumstances under which naval power may be brought to bear. The role may be that of chief actor, or it may be that of providing logistic sup- port to another branch of the services or the De- partment of State, or to an American mission over- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS seas, or to allied or neutral governments. What- ever the circumstances, the Navy must be prepared to plan and conduct psychological operations in support of both its own military activities and the actions of other government agencies. The Office of the Chief of Naval Operations, through OP-38, the Psychological Warfare Programs Division, directs this activity for the Navy. It is the respon- sibility of the Office of Naval Intelligence to sup- port such activities by providing suitable intelli- gence data and other services. The Concept and Name Military understanding of the concept and find- ing a suitable name for its military applications have evolved rather slowly during the period from the start of the First World War to the present day. The psychologists, sociologists and allied specialists who became interested in the potential- ities of "psychological warfare," aware as they should have been of the proper use of Communi- cations, did not do a thorough job of communicat- ing their ideas to the military leaders whose inter- est they were attempting to arouse. It should have been foreseeable that military men, customarily educated more intensively in the physical than in the social sciences, would display some skepticism and uneasiness when called upon to wage war on emotions, attitudes, and behaviors rather than on physical bodies and material fortifications. Yet the very language employed by the theoreticians and scholars was enough to discourage many a busy soldier. Working vocabularies with such terms as "privatization tendencies," "unstructured situations" and "audience predispositions," not to mention the far more technical vocabularies of Freud and Korzibski, were hardly suitable verbal symbols to capture the attention of the practition- ers of "hardware" warfare. Over the course of some 30 to 40 years from the World War I period to the present time, the process has gone on of working out a concept for the mission and func- tions of "psychological warfare" in relation to the traditional forms of military warfare and of de- termining the general perimeters of this evolving implement of national policy. Granted that there are ideological or psycho- logical side-reactions which accompany economic, CONFIDENTIAL 350 political, and military operations; granted that in some situations these may overshadow all other reactions in terms of contributing toward the achievement of objectives; nevertheless, the gener- ating of such results is not well-described by the term "psychological warfare." This is testified to by Hans Speier, who commences his article, Psychological Warfare Reconsidered, as follows: The term psychological warfare has gained wide currency in popular and scientific dis- cussions, but its meaning is not clear. For three reasons the term is debated among those who use it freely. First, warfare cannot readily be expected to be waged in times of peace or, for that matter, against the populations of neutral or allied countries in wartime, unless it is felt that by virtue of being "psychological" this kind of warfare is not "real" warfare. Dur- ing the Second World War, psychological warfare was indeed regarded primarily as a responsibility of the military who fought the enemy, whereas the civilian Office of War Information never officially professed before the Congress and the public its concern with it. Soon a fter the end of the war the rela- tionship between the Soviet Union and the Western powers began to be characterized as a state of cold war?incidentally no less am- biguous a term than "psychological war- fare"?but while according to many observers of the international scene the traditional dis- tinction bet ween war and peace cannot be ap- plied in the postwar period, no government involved in the cold war has as yet stated that it is engaged in psychological warfare against other nations. Rather, there is talk of "in- ternational information," and, reluctantly, of propaganda. Second, the terms "psychological warfare" and "political warfare" (as the British prefer to call their activities in this field) are mis- leading if they designate exclusively propa- ganda to enemy countries in time of war. Wars are waged against enemies in order to defeat them; yet during a war, psychological warfare comprises not only ancillary activi- ties to the same end by certain nonlethal means but also actions which attempt to reach and make f riends in the enemy camp. For yet a third reason, the term psychologi- cal warfare is easily misunderstood. When it is used as a synonym for combat propa- ganda and related activities in wartime, it seems to be implied that other forms of war- fare have no psychological effects; but only physical consequences, and are conducted Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : C INTELLIGENCE IN SUPPORT without regard for the mind of the enemy and the moral forces at his command. . . . The ambiguities of meaning from which the term psychological warfare suffers stems (sic) from the lack of a more basic agree- ment on the nature of war. . . . Is there available a more satisfactory title to describe this complex of activities, sometimes mili- tary, sometimes political, sometimes economic, all of which have psychological ramifications, which will take place in peaceful and warlike contexts, and which may be directed toward target groups of varying nationalities and living under widely differing circumstances? The term which not infrequently is employed unofficially is "Psychological Operations." This name is an improvement in that it avoids creating the erroneous impression that psychological activ- ities are a part only of warfare when they are in fact just as necessary in time of peace. However, the phrase "Psychological Warfare" continues to be used frequently as a general title for all kinds of psychological operations. There is evident also in some quarters an uneasy and uncertain dis- satisfaction about perpetuating the word "psycho- logical." The average American, not being de- vious by nature, and respecting a tradition of fair play, too often has associated psychological activi- ties with the perverted use to which they have been put by totalitarian regimes, not recognizing that such instrumentalities also may worthily serve in more just causes. However, the word "psychological" appears to be too deeply embedded in the common, working vocabulary of the modern world to be uprooted at this late date. Military Applications The clarification of the ambiguities of the term "psychological warfare" and a definition of the place and role of the psychological-ideological component of military operations require careful consideration of the diversity of responsibilities imposed upon the military organization of modern nations. Harold D. Lasswell's article, Political and Psy- chological Warfare, is helpful in the search for clarification. A portion of it is quoted below (italics are his) : 351 IA-RDP85G00105R000100210002-9 OF SPECIAL ACTIVITIES CONFIDENTIAL The most distinctive act of Psychological Warfare is this: it uses the means of mass communication in order to destroy the enemy's will to fight. Mass communication, it should be stressed, is not exclusively a matter of the word, spoken or printed, or picture. It uses other media also, such as physical acts and material de- vices. This is notably true of assassination. While the act of killing cannot be considered a conventional method of communication, yet it has been used often to affect political atti- tudes. The act of assassination was expected to have an impact upon the intention of the enemy to fight that would be far out of pro- portion to the physical damage done to his capacity, or to the physical capacity made use of in the killing. We are looking at the con- duct of war in the perspective of psychology when we are seeking to widen the gap between the physical destruction of capabilities on both sides and the magnitude of the impact upon the enemy's intention to resist As concerns the military, here is evidence that "psychological warfare" is not something apart, competing with traditional warfare. It is but another perspective for viewing the conduct of familiar military operations, another factor which must be considered when planning future cam- paigns, and on occasion another type of operation to be undertaken for principally psychological ends. The factor to be considered is "psychological suitability," which becomes a subject for investi- gation by the military commander and his staff as part of their estimate of the situation. It will in- clude study and analysis of what psychological- ideological results are desired in fulfilling their current mission, through what kind of operations the forces of the command can achieve these re- sults, and finally, what kind of operations or actions should be avoided because of their possible adverse effects. Psychological result g may be produced by the employment of conventional military weapons as well as by propaganda leaflets and tactical loud- speaker teams. The screaming, divebombing Stukas, supporting the Nazi ground forces in their breakthrough of the Maginot Line, were as much a weapon for achieving the psychological results of terror and panic as they were for killing Allied soldiers. The commander and his staff are directly concerned with psychological results that will CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR support specific operations at a particular time and place. The support rendered may be through demoralization of enemy troops; it may be through encouragement of and instructions to about-to-be- liberated friendly civilian populations; it may be through the creation of appropriate expectations or reactions among neutral groups who come in contact with our military operations and our per- sonnel. Whether the means used are psychological or conventional, if properly selected they are capa- ble of providing cooperating support for any mili- tary operation. Neutralizing the enemy or de- stroying his will to fight through psychological pressures are results no different from those to be achieved through the application of nonpsycho- logical force. Here then is merely another family of weapons stored and awaiting selection by the field commander who needs only to become accus- tomed to drawing on the psychological instru- ments at his command as readily and confidently as he selects his operating "hardware." In scope Psychological Operations encompass alike conditions of peaceful cooperation among nations, of uneasy tension, and of outright war; in influence they may extend to friends and allies, to neutrals, and to hostile target groups. More specifically, within each of the foregoing groups, appeals may be directed to individual leaders or to various religious, economic, social, or political sub- groups that in one way or another are significant in the life of the target society. The modus oper- andi is the use of every medium of communication which produces psychological results through the employment of visual symbols, through the writ- ten and the spoken word, and through conduct and actions. The results sought to be achieved may be con- sidered in terms of effects upon the mental states of the targets. States of mind which it is desired to produce may range from that in which the target feels reassured, comforted or encouraged to the other extreme in which the target feels per- suaded or compelled to take specific, immediate action along lines desired and predetermined by the communicator. Strategic Bombing in Psychological Operations It was mentioned in the previous discussion of economic warfare that strategic bombing may be CONFIDENTIAL 352 NAVAL OFFICERS a more important psychological weapon than a means of the physical destruction of enemy econ- omy. Destruction of morale has an immediate effect upon will to resist and will to work, hence it directly affects civilian production. The United States Strategic Bombing Survey studies the ef- fects of strategic bombing on German and Japa- nese morale. The following are excerpts from the German study: Strategic bombing was the major means by which the Allies were able to strike a direct blow at the morale of German civilians. Al- most one-third of the Germans were subjected to it and all lived in the shadow of its threat. One-half of one percent were killed by bomb- ing and one percent injured. One-fifth of all civilians were deprived of water, gas, or electricity, many of them for long periods. One of every 15 civilians was evacuated to another area. Every German, whether or not he experienced these direct effects of bombing, suffered such indirect results as shortages of food and supplies, and the disruption of transportation. There was no German civil- ian who did not experience hardship or suf- fering as a result of bombino. . . . A major factor in the final breakdown of German civilian morale was strategic bomb- ing. . . . Morale was not an easy target to knock out. It was never completely destroyed by strategic bombing, although its structure was seriously damaged. But during the closing months of the war, the cumulative effects of strategic bombin,or definitely began to outweigh the powerful Nazi forces which above all else had held the German people to the war-industry grindstone during the two preceding years. Poor morale did ultimately break out into widespread popular behavior imperiling. the German war effort. But the actual outbreak was the result of several mo- mentous and coinciding Gentian catastrophes, the approaching loss of the war, the loss of German lands to the enemy, the cumulative devastation and disruption of the German home front by bombing, the military, politi- cal, and economic chaos which prevailed in the wake of disastrous setbacks. It was in this combination of circumstances that strategic bombing was able to achieve its maximum morale effect. The general deterioration of morale due to bombings of Germany made itself evident in var- ious ways. There was increasing war weariness, and skepticism of Germany's ultimate victory. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP8500.01051R000100210 INTELLIGENCE IN SUPPORT OF SPECIAL AUTIVIII.Lb ana'AvvrinDENTIAL The Survey reports that "by the beginning of 1941 three-fourths of all Germans regarded the war as lost." Civilians in bombed areas lost confi- dence in their leaders, and because of their loss of homes and property thought that they were bear- ing the brunt of personal sacrifice. There was a strong fear and shock reaction produced by the bombings, which made people nervously upset by subsequent lesser alarms. The survey also dis- covered that the government was held responsible for the bombings and blamed for the failure to provide adequate defense. Resentments were di- rected against the Nazi regime more than against the Allies. Disruption of public utilities and es- pecially of local transportation services had an important effect in depressing the German people. A widespread evacuation program had to be un- dertaken, and it in itself produced dissatisfaction and confusion. Industrial productivity was di- minished somewhat, although the organized sys- tem of controls was fairly successful in keeping the traditionally obedient and industrious workers at a routine level of performance. Apathy, how- ever, was widespread. In Japan many of the same reactions to the bombings were reported. The Survey for Japan reported: The importance of the air attacks in de- pressing morale is indicated by the fact that Japanese said they were: The most important single factor in caus- ing them to have doubts of victory. The most important single factor in caus- ing them to feel certain of defeat. The most important single factor in mak- ing them unwilling to continue the war. Their greatest worry during the war, and the thing which made most of them happy that the war was over. . . . The primary emotional response to the bombings was fright and terror. Many peo- ple abandoned their "battle stations" as fire fighters and fled to shelters when the raids overwhelmed defenses. Night bombing was feared more than day- light bombing, and high explosives were feared more than incendiaries . . . Air attacks were cited as an important reason for absenteeism and lowered morale, but the chief effect of bombing appears to have been on the capacity of the people to work. The workers would still go to work or could still be forced to go, but they could 269196-54--------24 353 neither be utilized nor driven to produce as in previous years. The Japanese tactics in the South Pacific fur- nish an interesting illustration of warfare psycho- logically waged. Infantry and air strafing attacks were made against American troops, planned and timed to disrupt normal eating and sleeping hours. As Prof. James N. Mosel of George Washington University has pointed out in analyzing these in- cidents, the prolonged disruption of basic habits, particularly habits associated with the satisfac- tion of fundamental drives and wants, can cause severe frustration and anxiety and can even lead to neurosis. It was reported that at times it be- came impossible for American troops to maintain routine in even the most trivial activities. The same psychologist has called attention also to the fact that such a situation, if sufficiently pro- tracted, can generate emotional instability, in- creased excitability, break down the unity of the group, and sensitize individuals to a variety of irrational fears and negative attitudes. Such dis- turbances as digestive disorders, heightened blood pressure, muscular tremors, and bodily aches and pains may follow from such stimuli. Political Warfare Political warfare has been developed to its greatest extent in the totalitarian countries rather than in the democracies, for it violates much of what constitutes democratic morality and political conscience. Prof. Mosel makes some illuminating comments on its methods and techniques: A basic technique of political warfare as used by the Germans and Russians is to create ambiguity and confusion. One way of doing this is to assume a line of action which has multiple interpretations?one which points in several directions and suggests a number of different motives. Thus the enemy country is "kept guessing". Propaganda warfare is frequently used to accelerate the desired effects. This technique requires no overt consist- ency; its object is to mislead and complicate. The enemy country which is attempting to interpret these actions becomes anxious and disturbed by their inability to understand what they see. Many different interpretations CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS spring up, bringing bickering and internal dissension which, in turn, adds further anxi- ety and confusion. In their vain attempts to extract some ra- tional meaning from the opposing country's actions, the observing country's leaders and experts develop one plan or policy after an- other, each proving unsuccessful. The cleav- ages occurring among the leaders themselves are then further amplified by the population's loss of confidence in its leaders' ability to deal with the situation. This technique requires a thorough analysis of what constitutes "ambiguity' from the viewpoint of the enemy country, and a com- prehensive understanding of that country's current political problems, its role in the bal- ance of power, its international objectives and the circumstances which it considers as threats to its national well-being. When the general populace has been suffi- ciently undermined in its internal cohesion, the enemy country can then step in and climax its program with hard-hitting propaganda warfare. The psychological factors operative at this juncture are subtle but powerful. It is a psychological fact when confronted with an ambiguous, contradictory situation, we ex- perience a strong need for meaningful clarifi- cation. The clarification that is accepted is in general one that (1) is presented first, (2) when the need for clarification is strongest, and (3) which is most satisfying. By utiliz- ing these principles, the enemy country can inject at just the right moment a carefully designed interpretation" which will gain ac- ceptance. Needless to say, this maneuver re- quires accurate assessment of the situation, careful timing, comprehensive political in- telligence, and psychological knowledge of the country's national character structure (its symbols, loyalties, hopes, fears, personality traits, etc.). To investigate in detail how the Communists carry on political warfare, utilizing ideas, words, symbols and communication media, would require an extensive examination of the overall method of conduct of the international relations of the Com- munist Party and the Soviet government. Such an investigation would make it clear that the psy- chological pressures and reactions produced through political maneuvers are but one of the interacting weapons of warfare as waged in the Communist style. The effects attributed to this type of weapon cannot be isolated, but they can be studied in the context of any given campaign CONFIDENTIAL 354 A of the Communist-instigated war against the non- Communist wo rld. Communist political warfare is accompanied by a campaign of propaganda worldwide which is of great magnitude. It has been reported that the Soviet Union spent close to one billion dollars on various forms of propaganda during 1950, with another half billion dollars spent by Communist satellite states. The Soviets' principal themes for external con- sumption have been those that depict the Soviet Union as the chief proponent of world peace and the United States as the chief aggressive and war- like nation threatening such peace, and the "Hate America" campaign conducted within the Soviet Union. The vehicle for the former theme has been principally the Stockholm peace appeal, the Communist-sponsored, phoney but rather success- ful attempt to convince the peoples of many coun- tries that the source of belligerency in the world was the United States. The "Hate America" campaign has been carried on in the postwar period in the Soviet Union with an intensity and continuity that is beyond the comprehension of United States citizens. Emphasis has been placed on phoney charges that the United States engaged in bacteriological warfare in Korea and North China and treated prisoners of war with excessive cruelty. American correspondents in Moscow have re- ported that, as a result, the Soviet citizen believes Americans to be people without principle, bar- barous and hostilely aggressive. The feeling against the United States is reputed to be one of indignation, resentment, and anger. INTELLIGENCE SUPPORT FOR PSYCHOLOGICAL OPERATIONS In his book Sykewar, describing and analyzing PW activities in World War II, Daniel Lerner aptly illustrated the responsibility of intelligence in psychological operations as follows: Although (our highest-level policies) made few overt references to intelligence, they rested clearly on certain intelligence assump- tions concerning the audiences to which they were directed. The policy of Unconditional Surrender, for example, made sense only on the assumption that the enemy forces could and would surrender in the face of certain proved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL defeat. That such an assumption involved an important intelligence estimate (even if the estimate was never clarified on a more explicit level than "intuition"), will be better understood if one recalls the enormous pub- licity in America during the first year of the war, given to the view that Japanese soldiers never surrender. . . . If the view that German soldiers would not surrender had been taken literally, a policy of Unconditional Surrender could have led to nothing short of the extermination of every last member of the Wehrmacht. This was clearly not the intention of the Allied high command, whose evaluation of available information on surrender led to the conclu- sion that the German armies would surren- der. . . . Similarly the announcement of peace aims such as the Four Freedoms and the Atlantic Charter was based on the intelligence assump- tion that their contents correspond to the desires of the peoples of the Allied na- tions. . . . This need for accurate intelligence re- mained constant. Broad estimates of Ger- man attitudes served a useful purpose in framing high policies, but a continuous and detailed flow of accurate information, prop- erly evaluated, was required to keep these high policies applicable to the dozens of deci- sions which Sykewar had to make from day to day. Having recognized that there is a requirement for the intelligence support of psychological oper- ations, it is necessary to consider the nature of the supporting activity. The problem may be ap- proached by way of a comparison between the intelligence work produced in normal military operations and that required for conducting psy- chological operations. Earlier portions of this book have shown that the end product of intelligence collection and processing is frequently an intelligence estimate, report, study or annex to a military directive. The essence of the intelligence estimate is an ap- praisal of enemy capabilities and their relative order of probable adoption, formulated so as to assist the military commander in reaching a sound decision for the employment of forces. In psy- chological operations, however, military concern is to influence target attitudes and to control target behaviour, usually through means short of the use of overwhelming physical strength. That is, in 355 psychological operations it is vulnerabilities rather than capabilities that are of principal military interest. Current textual material prepared by the Psy- chological Warfare School of the Army discusses this concern with vulnerabilities: Use of the term "enemy vulnerabilities" in military intelligence for combat operations ordinarily is related to the physical weak- nesses which make the enemy susceptible to injury or defeat. Such vulnerabilities in- clude lack of defensive terrain, shortages of important materials and equipment, transpor- tation bottlenecks, and concentration of de- fense industries in overcrowded places which can be bombed or isolated. In psychological warfare intelligence the term enemy vulnerabilities" is related to so- ciological and psychological matters rather than to physical weaknesses. Vulnerabilities from the psychological warfare point of view are situations or conditions which can be ex- ploited by the propagandist. Sociological vulnerabilities, for example, may grow out of conflicts of interest between racial, religious, social, economic and politi- cal groups. They may result from the condi- tions in which people find themselves and be manifest in dissatisfaction with government policies, social conditions, or economic condi- tions or relationships. Psychological vulnerabilities, on the other hand, are attitudes, aspirations and person- ality traits which when manifested in par- ticular situations and circumstances indicate susceptibility to propaganda persuasion. Although vulnerabilities are the matter of pri- mary concern with respect to hostile target groups, their identification is not the sole requirement of the users of psychological warfare intelligence. The scope of psychological operations has been broadly defined to encompass neutral, allied, liber- ated, and analogous nonhostile audiences and to include conditions of peace and uneasy peace as well as conditions of war. Intelligence estimates on such target groups seek to present conclusions that will inform the operating agency how to gain an openminded and receptive audience, how to stimulate and encourage it, and how to create in it sentiments of agreement, sympathy, and under- standing. In these cases, the estimate must supply answers to such questions as: How can this policy of the CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS United States be best explained to this audience? How can this obliqueness or apparent inconsist- ency in United States' actions be presented in the least unfavorable light? What values does Amer- ican life have in common with this foreign society? How can a particular point of contact between Americans and a foreign group be directed so as to create mutual good will and cooperation? Lerner's illustration, above, of the Four Freedoms and the Atlantic Charter is a case in point when considering such varied nonhostile audiences. To produce conclusions of the kind discussed above and to present them in a psychological war- fare intelligence estimate, report, or study is a task easily recognized as one similar to that per- formed in the preparation of other intelligence estimates. The subject matters may differ, but the basic estimative process?proceeding from a mission stated or a problem identified for solution, through an analysis of factual elements, to con- clusions that will be meaningful and useful to operations agencies?is analogous to the process illustrated in chapter 12. A World War II illustration of a military use of psych-warfare intelligence is to be found in the case of the "Commander Norden" broadcasts to German submariners, a program directed by the United States Navy Department. "Commander Norden" was an intelligence officer in ONI, who possessed both fluency in the German language and comprehension of the German character. He had available such reliable information about cur- rent U-boat operations, conditions inside Ger- many, and even personal news of the families of some U-boat personnel that his broadcasts became very popular with U-boat crews. A byproduct of his psychological warfare operation developed in connection with general intelligence collection: "Commander Norden" became so well known and accepted by German submariners that captured personnel on more than one occasion declared that they would speak only to him about their experi- ences, for they believed that he could understand better than anyone else what they had undergone during their war patrols. Peacetime Support A peacetime naval operation in which psych- war intelligence can render service is that involv- CONFIDENTIAL ing the visit of United States Navy ships to foreign ports. Here is an occasion calling for the paying of mutual respects between governments and be- tween navies. The opportunity may arise for naval commanders to establish personal relation- ships with their opposite numbers and to cultivate good will between professional equals. Here, too, is an opportunity for creating favorable impres sions of "the Americans" as a result of orderly, friendly, and informed conduct and manners of naval personnel visiting ashore. On the other hand, there is also a substantial possibility that inadequately informed Americans representing their naval service may create ill will and generate unpopularity. Visitors abroad who are not sensitive, understanding, and respectful of the customs a:ad the ways of life, as well as the hopes, fears and daily problems of a foreign soci- ety, may through their ignorance make poor rep- resentatives of their country. To foreign eyes the conduct of such visitors typifies "America," its manner of life and its pattern of societl behavior. In carrying out the general purposes of the North Atlantic Treaty Organization, military missions representing the United States and its armed services are located in many countries throughout the world. In Europe, particularly, plans exist for the expenditure of large sums to build and maintain military facilities as part of the defense of that continent. Thousands of Americans in the armed services are living abroad, many with their dependents who too are represent- atives of the United States, in close daily contact with many other nationalities participating in the work of NATO. How well these Americans ad- just themselves to their physical and cultural sur- roundings is a factor of considerable influence in the obtaining and retaining of national allies. Illustrative of this complex of problems in day- -to-day living is the following report in The New York Times describing relationships between American military personnel and the native popu- lation at logistic bases in France: Meanwhile, the presence of some 12,000 to 15,000 soldiers and airmen in sixteen camps scattered through the Bordeaux and La- Rochelle areas produces a daily crop of minor irritations and misunderstandings, based principally on differences of language, eco- nomic status and social custom. 356 pproved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES With few exceptions these factors con- demn the two sides to isolation in an atmos- phere ranging from toleration to mutual dislike. Among the Americans' sources of irritation are high prices demanded by French land- lords for housing that is judged to be totally inadequate by United States standards, the failure of the French to manifest the same sense of urgency about the defense task that the Americans feel, annoyance with tech- niques and procedures that Americans find archaic, and the infinite number of ways in which the social, cultural and hygienic pat- terns of Bordeaux, LaRochelle and Angouleme vary from those of New York, Minneapolis and Dallas. To many Americans and many Frenchmen, a difference from their own standards is a defect. In a situation such as the foregoing there is manifest the necessity for a continued information and education program to explain foreign sur- roundings and foreign peoples to our own mili- tary personnel, a program which is a companion piece to the psychological operation of explaining the American visitors to their native hosts. Both of these programs can be founded only on the material provided in intelligence studies that examine and analyze the characteristics of various foreign societies and that identify in particular those aspects of the foreign way of life that are peculiarly sensitive to the native of that culture. Psychological operations are coordinated at the level of the theater command. At this echelon it is possible to plan and carry out a psychological campaign coordinated to support military opera- tions within the theater and one in which the themes and appeals employed are consistent throughout the entire area of operations. Pro- viding intelligence support at this level of com- mand imposes a diversity of requirements, many of which already have been illustrated. It is likely that the theater of operations will include several countries and target groups that are both hostile and friendly, whose patterns of life may be those of fishermen, farmers, villagers, city labor- ers, and displaced war refugees. A commander whose theater includes maritime areas may encounter further specialized psycho- logical operations problems which intelligence must help resolve. For example, if he is required CONFIDENTIAL to perform military government functions, he may become involved in the control of several maritime activities. It may be that the local fishing indus- try should be re-equipped and restored to produc- tion as promptly as possible to relieve food short- ages in the occupation area and to provide employ- ment for local residents. Fishing vessels and their crews provide a potential medium of external com- munication and so could represent a possible threat to military security and a channel for saboteurs and hostile agents. On the other hand, they may be able to give valuable support to our own mari- time control measures and be capable of combat- ting hostile resistance and obtaining useful opera- tional information. Intelligence may ease the task of reconstruction and control by informing mili- tary government officials of the ways in which local cooperation can be obtained most effectively. What is true of the fishing industry is equally true in other situations in which naval commanders may be required to control, reorganize, and direct indigenous affairs in ways best calculated to obtain local cooperation. For instance, either under or apart from military government, naval personnel may become engaged in the rehabilitation of for- eign ports so that they may be made available for logistic support of further military operations. Other situations in which the naval commander may find a need for intelligence about one or an- other foreign area in the world may be visualized as a result of the Navy's characteristic capability of providing mobile logistic support to many kinds of operations in areas distant from fixed bases. Naval forces may expect to play a role in emer- gency evacuations of civilians and military per- sonnel from danger areas, and the rescue and transportation of displaced persons or escapees from enemy areas. 357 Collection and Processing The collection and the processing of information for psychological operations are the two activities of the Intelligence Cycle that best reveal the actual nature of the work. A partial description of these two activities has already been presented in fore- going discussions and illustrations. The chief subject for investigation is man in his social set- ting, a topic of concern to a number of branches of learning, particularly the fields of psychology, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS sociology, and cultural anthropology, but also to political science, economics, history, biology, and psychiatry. In the field of psychological opera- tions the dependence of the military upon the academic is particularly evident, for psychological warfare still belongs as much to the scholar as to the professional soldier. This dependence upon academic support is no- where better illustrated than in the collection ef- fort which is carried on in two distinct milieus, along two mutually-supporting but independent lines. One of these is basic research, the realm of the academician; the other may be called current psychological intelligence, the realm of the field observer and collector. Both functions are in reality specific illustrations of the fundamental collection process, first obtaining a mass of basic data and evaluating it through scholarly research, and thereafter augmenting it by specific pertinent items currently collected in. the field. In the collection effort, no component of intelli- gence knowledge, geographical, political, sociolog- ical, economic, military, scientific, or biographical can be ignored, for man, individually and collec- tively, may be influenced by any one of them. What is distinctive about intelligence for psycho- logical operations is the particular point of view it maintains while performing its collection and processing tasks. The all-inclusive essential ele- ment of information is: What use can be made of specific facts of geography, economic, religion, or social customs in suggesting ways of affecting the opinions, attitudes, and actions of those groups of people whom it is desired to influence? The following quotation from Ellsworth Hunt- ington's book, Mainsprings of Civilization, illus- trates the interdependence of the various compo- nents of intelligence knowledge as they explain the mode of life of man in the totality of his environ- ment. The seclusion of women in Moslem countries furnishes a good illustration of the way in which climate cooperates with other condi- tions in encouraging social customs which in due time become religious practices. The se- clusion of women arises from the same human impulse as the private ownership of property. The possessor of something valuable wants to keep it for his own benefit. So far as women are concerned, this desire is more or less effec- tive in most parts of the world, but rarely, if CONFIDENTIAL 358 ever, is it more highly specialized than in the harems of the Arabs, the zenana of the Hin- dus. The seclusion of women is most fully developed in the deserts and semi-arid regions from northwestern India across Persia, Iraq, Arabia, and Syria to Egypt and Morocco. . . . The seclusion of women seems to have de- veloped most fully in the oases of Arabia where it is appropriate to the geographical environment. So long as man is a mere hunter and gatherer of wild products, he cannot se- clude his women, for the women must wander around searching for edible roots and grubs. Among pastoral nomads a similar situation prevails. . . . Only after agriculture was instituted did the effectiv seclusion of women become feas- ible, but not in warm, moist countries with plenty of rain. There the normal material for huts is rough, crooked branches with a thatch of leaves or grass. It is difficult to make such huts so tight that people cannot peer in, and it is uncomfortable to cook or do other work inside them in hot, damp weather. Then, too, from time immemorial, the acre of the weedy crops around tropical dwellings has been woman's work. . . . In a desert oases the situation is different. The most available building material is dry mud (adobe). Large, sun-dried bricks can easily be piled up to form walls. In the hot, dry air, the most comfortable place during the heat of the day is inside a thick-walled adobe house with a stout roof of the same material. Hence the women prefer to stay indoors many hours of the day. In such oases, agriculture can be carried on only by irrigation. An ir- rigated patch affords much temptation to thieves. Inasmuch as adobe walls can be built easily and last a long time, the common practice is to surround each "garden" with a thick wall seven or eight feet high. Thus, in the cooler parts of the day, when the women work outside the house, they are still sheltered from passers-by. . . . A veil over the face is little hardship in such a climate. Both sexes crave heavy clothing in the heat of noon and again in the sudden cool- ness after sunset. . . . In the hot deserts then, such as those of the lower Indus Valley, Arabia, and the Sahara, the oases offer physi- cal conditions which play directly into the hands of the jealous male who wants to seclude his women from other men. . . . Another factor may enter the picture. The men of the hot desert may have unusual cause for jealousy. In extremely hot weather peo- ple's ability to resist emotional impulses, in- A proved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES CONFIDENTIAL eluding those of sex, appears to be weakened. Sexual extravagance and prostitution seem to reach a maximum in the hottest parts of the world, that is, the dry parts of a belt located ten to thirty degrees from the equator. Animists, who usually live in moist, forested regions which do not have such extreme heat as the monsoon regions and deserts, appear to be sexually less excitable than Hindus, Arabs and other Moslems. . . . Now let us see what happened when Islam, in its great wave of conquest, imposed its cus- toms on conquered nations. If the conquered countries were so dry and warm that irriga- tion and mud-walled houses and gardens were normal, the seclusion of women could readily be introduced and would do relatively little harm to health . . . As (Islam) spread east- ward in the Indo-Gangetic Valley the custom became less and less appropriate to the climate and hence more and more harmful. The In- dian province of Bengal, near the mouth of the Ganges, was conquered by Islam more than seven hundred years ago. It now con- tains about thirty million Moslems. . . . From May to September . . . the tempera- ture averages from 82? to 86? . . . the air is constantly humid . . . Under such condi- tions, even though one perspires freely most of the time one is not thereby cooled because there is such great humidity. A stay in the stagnant air indoors is a kind of martyrdom but the outdoor air is not much better; there are no mud walls for shelter, and a cotton sheet that swathes the head and covers the face is most uncomfortable. Nevertheless, the Moslem women, especially those of the upper classes, are counted as grossly irreli- gious if they fail to keep themselves well cov- ered, face and all. Thus, by being converted into a religious requirement and then being transported to a new physical environment, a relatively harmless social custom has be- come a great detriment to health as well as comfort. . . . 'What are some of the principal lines of investi- gation in basic intelligence research for psycho- logical operations, and how are investigations in these areas undertaken by the armed services of the United States? Such studies are carried on by analysts, civilian and uniformed, in the research and intelligence agencies of the respective armed services, and also by private educational institu- tions and civilian scholars whose research is spe- cifically sponsored and financed through contracts with one or another of the armed services. Research For the Navy, the Office of Naval Research through its Psychological Sciences Division, and in particular through the Human Relations Branch of that division, is the contracting agency that sponsors private researchers. The Army con- ducts research through the medium of two agen- cies, Human Resources Research Office and Oper- ations Research Office, each of which is under the supervision of a leading American university. The Air Force has organized a Human Relations Research Institute as a part of the Air University at Maxwell Field, Ala. The Air Force also uses the Rand Corp., whose research activities have been described previously in this volume. The specific subjects for potential investigation within such general fields as anthropology,. psy- chology, sociology, history, economics, political science, psychiatry, and biology are, of course, practically without number. Some of the areas for study which have self-evident relationships to ultimate military applications are described below. The most pressing task of basic research is to pro- vide data on those peoples and societies whose na- tional strategies are a threat to the United States and to a peaceful and stable world order. How- ever, in view of the Communist tactic of foment- ing economic, social and political unrest in what- ever part of the world it may be latent, it is neces- sary as a second priority to study almost every national society having a potential role in the con- flict between the free and slave worlds. Typical examples of research on the U. S. S. R. and its leaders are two publications of the Rand Corp. entitled The Operational Code of the Polit- buro and The Organizational Weapon: A Study of Bolshevik Strategy and Tactics. A series of studies on other aspects of Soviet life have been undertaken by the Russian Research Center estab- lished at Harvard University in 1949 with the aid of a grant from the Carnegie Corporation. The first of these, Public Opinion in Soviet Russia, by Alex Inkeles has as its purpose: . . . to explain how Soviet mass communi- cation works, and why it has the particular characteristics it possesses. But it is by no means intended primarily as a technical dis- cussion of the Soviet press, radio and film. ' On the contrary, I hope that this work will 359 CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS promote a more adequate evaluation of the implications of the Soviet system. Since ex- posure to a steady flow of propaganda and agitation is a major facet of the daily life of every Soviet citizen, no assessment of his life situation can be complete if it does not take account of that fact. Furthermore, Soviet philosophy and practice in the realm of public opinion are important indexes to the nature of the regime. Other publications of the Research Center include Justice in Russia: An Interpretation of Soviet Law by Harold J. Berman and Soviet Ideology and Power Politics: A Study of the Role of Ideas in Social Change by Barrington Moore, Jr. Independent scholars have likewise made some important contributions. In the field of eco- nomics, Solomon M. Schwartz in Labor in the Soviet Union describes the workingman in the U. S. S. R. not as docile and enslaved, but still struggling to be free. The evidence is provided by reports of dissatisfaction and individual con- flict filtering from behind the Iron Curtain, a vul- nerability of interest to planners of psychological operations. Thus research contributes to knowledge of the nature of man, how he is motivated, how he exists in his particular culture, and what the character- istics are of that culture: its folkways and insti- tutions, its system of rewards and punishments, its capability or its brittle inflexibility toward self- adjustment when externally stimulated. These are the avenues along which research proceeds always seeking to provide fundamental data in answer to the questions Operations asks of Intel- ligence: How can we cause this particular society to run like an improperly adjusted engine, to over- strain, to slow down, to fly apart, or alternatively to gain new strength, further hope, fresh deter- mination and a revived will to achieve? Further Collection and Processing The second major subdivision of collection and processing may be labeled "Current." It consists of adding fresh individual items to basic knowl- edge concerning target societies. Its activity is typified by the work of collectors in the field such as naval attaches, and information obtained from travelers, defectors, and prisoner of war interro- gators. All of these must be made aware of poten- tial sources of information of value to psycho- CONFIDENTIAL logical operations. Collection may proceed also through the media of technological devices, such as aerial cameras and radio monitoring equipment, or through the application of scientific knowledge and techniques of analysis, as in the case of the examination of captured equipment and material. Any of these instrumentalities may provide fur- ther insight into one or another aspect of the conditions of life within a target society. _ One particular task of processing deserves spe- cial mention: the necessity for translating the data comiDiled by basic research into terminology and specific conclusions (hypotheses) that will assist concrete operational planning. A military com- mander will not appreciate being handed a schol- arly text and being told by his intelligence officer: "Sir, here is all the information we need about the oppressive economic conditions in Lower Slo- bovia." The argument and analysis of the profes- sional researcher must be reduced to terms that suit the immediate requirements of the profes- sional soldier. In processing information for potential use in psychological operations, it is essential constantly to keep in mind the possible specific operational applications of the data under analysis. An article entitled Effective Propaganda: Conditions and Evaluation, which appears in a volume, Propa- ganda in War and Crisis, edited by Daniel Lerner, sets forth the "conditions of effective propaganda" that may help to synthesize research and orient it and the researcher himself to operational appli- cations: The manipulation of expectations is an in- strument with powerful uses, but also with definite limits. The uses will be better served if the limits are clearly understood. The fundamental limitation is inherent in the in- strument: its strategy is persuasion and its vehicle is symbols. Propaganda does not change conditions but only beliefs about con- ditions; it cannot force people to change their beliefs but can only persuade them to do so. Under what conditions are people most likely to be persuaded by Symbols to modify their expectations of the future, and conse- quently their behaviour in the present? . . . Several main points are clear, however, from recent experience. We may summarize these lessons by stating four essential conditions of effective propaganda: 360 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R00010021000 INTELLIGENCE IN SUPPORT OF SPECIAL ACTIVITIES uoNFIDENTIAL (1) The attention of the audience must be secured. (2) The credence of the audience must be secured. (3) The predispositions of the audience must include the modifications sought by propaganda as plausible alterna- tives to present expectations. (4) The environment of the audience must permit the course of action prescribed by the modified structure of expecta- tions. These conditions seem obvious upon state- ment. To persuade a man to do what you tell him, you must first get him to listen to you. Once you have his attention, you must get him to believe what you say if he is to take your message seriously. His credence gained, what you tell him to believe must be within the realm of his existing predisposi- tional structure of expectations and aspira- tions. It is a waste of words to try to persuade a loyal citizen that he would rather see his nation lose a war than win it; no such alternative preference is possible within his predispositional set. But it may be quite pos- sible to persuade the same man, once you have gained his attention and credence, to believe that the nation is going to lose a war. . . . A fourth condition of effective propaganda is that the actions required of the audience by their modified expectations should be feasi- ble in the environing circumstances which de- fine for them the limits of meaningful behaviour. It would make no sense, for ex- ample, to call on Soviet citizens in Vladivos- tok . . . to assassinate Stalin or imprison the Politburo. . . . Indeed, the impracticability of such action might lead to the utter rejec- tion of our statements, otherwise plausible, because they impose obligations impossible to fulfill. The extent and emphasis of processing will de- pend, of course, on the subject matter. For ex- ample, the analysis of enemy radio propaganda is valuable intelligence, for it provides data on the particular themes that the enemy desires to em- phasize to particular audiences at specific periods of time. This is sometimes labelled "content anal- ysis" or "propanal" (propaganda analysis) which was used with some success in World War II to predict future enemy military operations. Such a processing task differs greatly from that of "pre- testing" possible propaganda themes by trying them out on a cooperative group of enemy prison- 361 ers of war in order to determine thematic effec- tiveness and authenticity. Another specialized collection and processing task is to obtain and evaluate data for evidence of the effectiveness of previous and current psycho- logical operations. This is a correctional func- tion, a validation test, carried out so that future undertakings may benefit from past experience. It may consist of conducting a public opinion poll in a friendly foreign country for the purpose of ascertaining listener reactions to the programs of the Voice of America. In addition to theme-analysis, another variety of processing must be carried out for the purpose of determining what words, expressions and sym- bols will most forcefully drive the message home to a given target group. Lerner, in Sykewar, illustrates this point: For example, an effective linguistic device for Sykewar was the use of the enemy's own words and phrases, within a context supplied by one's own propagandists. This was par- ticularly useful on the radio, where it gave some Germans the feeling that their enemy was omniscient. . . . There is evidence that some Germans were amused, bewildered, and sometimes even frightened by the rapidity with which Allied radio retold anti-Nazi jokes as they became current in some part of Ger- many. For this sort of operation, Sykewar required intelligence reports that Rhineland Germans had taken to calling Nazi party func- tionaries goldene F asanen (in addition to the older term Bonzen) ; or that in Berlin, Goeb- bels was commonly known as Jappch,en; or that, on a more serious level, the pervasive counterargument that Germans were develop- ing against Allied charges of German guilt was expressed in the phrase that they had been belogen und betrogen. Intelligence, as an aid to Sykewar opera- tions . . . brought in both the German sto- ries and the very words in which they were told. The value which output personnel put upon this type of intelligence is indicated by David Hertz, who was in charge of radio Sykewar against the besieged German garri- son at Lorient: "Our existence as a function- ing tactical weapon depended on intelligence from prisoners. We ate, slept, and drank with prisoners. Many nights I was awak- ened by members of our crew dragging in deserters, who sat on my bedroll, dropping the waters of the river Scorff as they told us the CONFIDENTIAL, Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 A_pproved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS latest Winchell dope on what went on inside the fortress." The collection and processing of information useful for psychological operations are not, how- ever, limited to intelligence specialists and schol- ars. In present-day circumstances, where such a variety of potential uses for psychological activi- ties exists, possible vulnerabilities may be no trade secret of intelligence analysts, but rather may be susceptible of identification by any perceptive reader of the daily newspapers and current peri- odicals or by any observer of international affairs. What can be read and observed comprises the raw material that is grist for the mill of current psych-warfare intelligence. An awareness of the wealth of raw material that can be gathered by the nonspecialist is perhaps as cogent a reason as CONFIDENTIAL 362 could be cited for naval officers without extensive specialized training in this area to become and remain sensitive to potential exploitable oppor- tunities in the realm of psychological operations. It is important that those whose travels, duty assignments, or other contacts afford opportuni- ties to observe foreign social orders in operation be constantly alert to observe and report on situ- ations and events that may be capitalized on by planners of psychological operations. It has proved unsatisfactory in practice to attempt to specify to a new naval attache, for example, just exactly what to look for to aid psychological oper- ations. It has proved far more suitable to explain to him what it is and what its requirements are-- which is precisely what this discussion has attempted to do. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CHAPTER 15 COUNTERINTELLIGENCE From the definitions of chapter 1, it was learned that counterintelligence, just as intelligence, is knowledge, organization, and activity, but that these elements are applied to the specific mission of opposing the enemy's intelligence effort, both defensively and offensively. Counterintelligence contributes to and draws from the whole body of intelligence knowledge. Its organizations are not only a part of Intelligence, but often are one ahd the same. Its activities can be identified with the steps of the intelligence cycle. It is equally im- portant in peace and war. The differences are in purposes, points of view, methods and tech- nique. To be a good counterintelligence officer one first must be a good intelligence officer. Because of the diversity and covert aspects of counterintelligence activities, and because these activities are not restricted to the intelligence or- ganizations of the armed services but are asso- ciated with all agencies which contribute to na- tional security, centralization of control is essen- tial to effective counterintelligence operations. Nowhere is this requirement more evident than in time of war when our own counterintelligence efforts in widely separated parts of the world must be coordinated with those of our allies. For ex- ample, during World War II, Naval Intelligence received information from a naval source in South America that an individual in Europe, about to embark on a Spanish ship for Argentina, was an important German espionage agent. Although given a low evaluation, this information was promptly relayed to British Intelligence whose agents removed the suspect from the ship at Gi- braltar and determined that he was in fact en- trusted with a highly important mission by the Germans. The Armed Forces Staff College manual, Coun- terintelligenee?Theater of Operations and Joint Overseas Operation, makes this pertinent comment on the need for coordinated control: There is no significant difference in the mis- sion of counterintelligence in the ground, 363 naval, and air forces and all Services share in the responsibility of carrying out this mission by both active and passive measures. How- ever, the relative number of personnel devoted to counterintelligence is greater in the ground force than in the other two because of the bet- ter opportunity afforded the enemy to pene- trate our counterintelligence screen by con- stant contact of opposing ground forces and the presence of indigenous or dis-Aaced pop- ulations in the combat or occupiej areas . . . Counterintelligence means available to all forces are extensive, and to secure their effec- tive employment requires close coordination by theater headquarters. During World War II, the Army Counter Intelli- gence Corps had a major responsibility for coun- terintelligence in overseas theaters. While the Navy's counterintelligence efforts were more con- centrated within the domestic theater, its interests were equally, and of necessity, worldwide. Prac- tically speaking, counterintelligence interests can- not be arbitrarily separated according to areas, because foreign intelligence organizations usually operate on a broad front without regard to areas of special cognizance; hence, all counterintelli- gence agencies must be concerned with the totality of counterintelligence knowledge. In the successful achievement of its mission, counterintelligence has three objectives: first, to locate and identify the aggressive efforts of hostile intelligence organizations; second, to deny correct information or access to vital areas to an actual or potential enemy; and third, to deceive and mislead him. This chapter will discuss the nature of hos- tile intelligence activities, measures and tech- niques to counter them, and organizations most directly concerned. The subject is difficult to dis- cuss because of its sensitive nature and the com- plexities of the areas of human behaviour with which it is concerned. Post-World War II devel- opments have magnified the responsibilities of counterintelligence and have led to new problems in their interpretation. Before proceeding to a discussion of counter- intelligence measures it will be appropriate and CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS helpful to consider first the need for counterintel- ligence and the nature of the organizations and activities which must be countered. THE NEED FOR COUNTERINTELLIGENCE The current compelling need for counterintelli- gence was created by the purposes and methods of the Soviet Union in the years following World War II. This need was accentuated by the oper- ations of the Soviet Intelligence System, reviewed in an earlier chapter, as well as by the tremendous growth of organized intelligence activity all over the world. Attempts to calculate the size of current world intelligence operations in terms of personnel and expenditures are, of course, speculative. However, as of 1949, the United Nations World estimated that the United States, Great Britain, and the U. S. S. R. were employing approximately 24,000 operatives, while smaller nations were utilizing another 15,000-20,000. The estimated total cost annually was set at $248,000,000. No attempt was made to estimate the additional part-time person- nel, whose total number might be astounding. In the same year, an estimate prepared for Great Britain's Ministry of Defense indicated a world total of intelligence operatives in excess of 250,000, actual or potential. By contrast, in 1938, a year of particular tension, the total number was esti- mated at no more than 12,000, of whom about 5,500 were employed by Nazi Germany. Irrespective of accurate figures, it may be assumed that the extent of intelligence activities in the world today is greater than ever before. One indication of this possibility is the increased number of operatives who have been apprehended since World War II in widely separated areas of the world. The challenge to all counterintelligence organi- zations comes not only from the dimensions of this world-wide intelligence activity, but even more from changes in methods. The case of the British scientist, Klaus Fuchs, for example, can scarcely be viewed as an isolated example. When placed in context and related to personalities and events in Canada and the United States, it indicates a dangerous trend toward the use of citizens to work against their own country. As a result foreign intelligence activity has become related to treach- ery and interwoven with political propaganda. CONFIDENTIAL 364 Whereas, in the past, speech accent and physical characteristics might have provided leads for counterintelligence operatives, at present the only clues may be the expression of thoughts and ideas. Nor can counteri:ntelligence problems be easily iso- lated to relatively few areas or nations. Active Soviet confederates are to be found in practically every country of the the world; the world oppo- nent of the United States, therefore, is two-headed, consisting not only of the U. S. S. R. but also of the militant organization of world communism. As a consequence, counterintelligence is confronted with a task involving unfriendly, neutral, and friendly nations of all continents of the world. The very nature of the cold war, with concepts and methods so alien to those Of other wars in mod- ern times, poses new problems for military and political leaders, the solutions of which become in turn new problems for counterintelligence. For example, the voluntary prisoner repatriation issue in the drawn-out truce negotiations of the Korean War brought new tensions to the United Nations Organization arid to relationships of the United States with other nations, including Great Britain and India. Riots and bloodshed in prisoner com- pounds on Koje Island were made a subject of vicious Communist propaganda directed against the United States. In January 1953 evidence pro- duced by the United Nations Headquarters of Gen. Mark Clark in Tokyo indicated that the communist delegates conducting the truce negotia- tions had simultaneously planned and organized these riots, through a "guidance bureau" which had trained special units for camp riots and su- pervised their infiltration into prison compounds. Here was a new task for counterintelligence with widespread political and military implications. Principal among the hostile foreign intelligence activities to be countered, which may or may not stem directly from foreign intelligence organiza- tions, are espionage, sabotage, and subversion. An understanding of each is necessary to fully appre- ciate counterintelligence measures. ESPIONAGE In earlier times, the term "espionage," or "spy- ing," was practically synonymous with the word "intelligence." In modern usage, it is broadly defined as the activity of spying on others, the Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL employment of spies or covert agents, or the sys- tematic secret collection of information regarding potential or actual enemies or potential or actual theaters of military operations, including terrain and weather. Its purpose is to gather in advance such complete and detailed data, normally pro- tected from exposure by a nation, as will assist in planning for defense or attack, or by which influ- ence, power, or control over other nations can be gained. No item or fact is too fragmentary or unimportant for collection and reporting. Generally speaking, the two types of espionage methods are designation, and saturation. Numer- ous examples of both types are presented in chap- ter 2: The Soviet spy system organized to gain in- formation about the atomic bomb is illustrative of the first, while the mass utilization of Japanese citizens abroad prior to World War II is an exam- ple of the second. Espionage by designation re- fers to the assignment of particular agents, many of whom are carefully trained, to specific targets or to the collection of certain highly significant "missing" items of information. Such agents usually seek to gain access to key individuals in governmental, military, or business affairs and to develop a network of exclusive informers. Es- pionage by saturation is a large-scale operation by many hundreds of individuals few if any of whom are trained for their assignments. It is a buck- shot method of hitting a target, involving the col- lection of volumes of information much of which may be neither pertinent nor useful. Quality of personnel and material is sacrificed for quantity on the assumption that a careful processing of the results will produce much that is usable and im- portant to the total intelligence effort. The popular conception of espionage activity is that it is exciting and glamorous, with a back- ground of luxury hotels, exotic foreign capitals, beautiful women, and hot pursuits in fast, sleek cars. There are, of course, moments of excitement, but it has been said by confessed agents that the time of greatest emotional excitement and stimu- lation for the spy comes when he is caught. Ac- tually, the life of an espionage agent is often quite dull and commonplace, for just as the sailor in a ship, he experiences long periods of tedious routine and monotonous waiting, relieved only occasion- ally by danger and suspense. Work hours may be 365 long and tiring and not as filled with hairbreadth escapes and quick journeys as in fictional accounts. The typical agent is inconspicuous and impos- sible to identify from appearances because he may be recruited from any social group, upper, middle, or lower classes. Espionage agents come from all walks of life, with different habits, varying char- acteristics and capabilities, and individual pat- terns of behavior. Indeed, on occasion, some rather ineffective people have been employed as agents in order to conceal the activities of those more capable and expert. Age, physical and mental characteristics, and social or economic status are no criterion for identification. An agent will often be a native of the country, in which he is to work or will have lived there for a long period of time; the most dangerous is the ordinary citizen who, for one reason or another, has decided to release important classified infor- mation to an enemy. While no identifying characteristics of the in- dividual agent can be pointed out, there are four general classifications based on mode of operation and assigned mission: diplomatic, fixed, special, and roving. Depending upon the particular country, diplo- matic agents may be consuls, diplomats, military and naval attaches, observers, members of special missions, or other quasi-official representatives, any of whom may aid or direct espionage activi- ties. As has already been indicated, the practice of individual nations varies considerably in the use of their diplomatic personnel for such pur- poses, although the governments of Russia have been notorious in so doing. The fixed agent often poses the greatest threat to a nation's security because he is assigned to a given area on a more or less permanent basis. His objective is to become an established, respected citi- zen of his community, of unquestioned loyalty and reputation, and with a profitable business or comfortably retired. His "cover" may be that of a doctor, storekeeper, farmer, or retired business- man?preferably any occupation which will per- mit the greatest possible activity at the least risk. Because of the importance of this type of agent, he may reside in a locality for years without re- ceiving any assignments or being contacted by any of his superiors. His objectives may be the in- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS filtration of military installations, close associa- tion with military personnel for the purpose of gleaning information, or the covert observation of military establishments and activities. He may have responsibilities for establishing, training, and directing networks or cells of agents in his area or acting as a point for transmittal of infor- mation, or "letter drop," for other agents. The special agent is handpicked to obtain spe- cific information because he is well-versed and highly trained in a particular field or in the pro- cedure by which the information is to be gained. Usually the special agent has been thoroughly in- doctrinated at an espionage school so that he is prepared to assume any disguise, to enter a coun- try legally or illegally, and to carry out his work for as long as necessary with plausible reasons and legitimate proof to back them up. Officially denied, these agents sometimes work under the supervision of diplomatic or fixed agents or di- rectly under the instructions of the intelligence service by which they are employed. In addition to collecting specific information they may serve as special organizers, inspectors, supervisors, or couriers. As his designation implies, the roving agent is not confined to a particular area, but may cover many, collecting general information in various categories or specific information in one. His problem, of course, is to have a credible reason for extensive travel. In the course of his work he may conduct personal observation and investi- gation of intelligence targets, penetrate installa- tions for short periods, and make brief contacts with other agents. Related to this class are part- time agents or informers, usually employed for a particular mission because they have or can obtain information of special value. Once committed to such work, and hence subject to blackmail, they are usually available for further employment as required and necessary. The motives which impel men and women to enter espionage service are many and varied, from fear, greed, or love of adventure to idealism or patriotism, particularly if the individual is im- bued with love of a country or a cause. Often a combination of reasons provides the motivation, although money is one of the more common. The ideological motive usually produces the most CONFIDENTIAL faithful and reliable agents from among the intel- lectual and professional groups who are stimu- lated by the vision of a new world order. Some may not actually realize the implications of their position as enemy agents or, if they do have an uneasy conscience about their activities, may ra- tionalize them as consistent with an inevitable course of events. These sympathizers provide an excellent means of penetration into government agencies and are most difficult to discover because their records are good, they have no obvious con- nections with intelligence organizations, and are often subjected to open attack by front organiza- tions. Financial rewards are of little consequence to the ideologically inspired. Many of the best agents are members of the military, naval, or diplomatic services who are professionally motivated and trained to carry out their assigned missions in a most competent man- ner. The desire to be on the winning side strongly motivates certain potential agents. They must be particularly watched during periods when an enemy has won the temporary advantage. Pres- tige and love of adventure also have a strong ap- peal, particularly for young people. Illusory though they may be, these motives have proved influential, as for example, among members of the Hitler Youth Organizations during World War II. In enemy-occupied areas some individuals under pressure will become intelligence agents to avoid other forms of service, such as in labor camps, or those involving transfer to foreign areas. An overwhelming urge to return home may make a person a willing "line-crosser." Un- der pressure, however, they often will abandon their mission or volunteer the information they have gathered. Criminals may become agents as an alternative to imprisonment; apprehended agents may be spared on condition that they work for an enemy. The latter become "double- agents," working for both sides. Dr. Richard Sorge, whose case was mentioned in chapter 2, is a good example of the double-agent. During World War II, many of the German agents who came to the United States were moti- vated by both greed and fear, especially fear of reprisal against their families left behind in Europe. In the case of Soviet agents, patriotism has seldom been a factor since many nationalities 366 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL have often been involved in the same network. In his book, Handbook for Spies, Alexander Foote has given an interesting fictional account of his recruitment as a Soviet spy during World War II. He suggests that the motivation of spies is often difficult to determine and that, in his own case, he was for some time unaware of the objectives and general purposes of the organization he served. The native attributes of any individual selected for full-time work in espionage most certainly in- clude common sense, good judgment, the ability to size up a situation correctly, and adaptability in learning and using necessary arts and sciences. Personal courage, alertness, and complete self- control are also essential. Bravery in company is one thing, but bravery alone is another matter, especially when the threat to exposure is constant. Mental and emotional stability, physical vigor, and stamina are prime requirements. Intoxi- cants must be used with great discretion, and romance has often been fatal. Therefore, it must be assumed that nations employing covert agents apply the most exacting standards in their selec- tion. Mental, emotional, and physical qualifications are only the foundation for the most intensive training which must develop others more special- ized, such as knowledge of foreign languages and skills in microphotography and means of commu- nications including wireless telegraphy, and secret inks. The curriculum of the Leningrad Espionage School as reported by the International News Service from Athens, Greece, in April 1952 is in- dicative of the range of subject matter. During the course, which lasts for about 1 year, students are instructed in chemistry (atomic science) , mechanics, drawing and sketching, fortifications and geography, sources of raw material and indus- trial output, and details of industrial production in the United States, Canada, and South America. Political studies cover the history of communism abroad as well as in the U. S. S. R., and students must become proficient in either English or Span- ish. Other subjects studied are the organization of foreign armies and their weapons, topography, photography, radio operating, and deciphering. Each individual must learn how to conduct him- self if captured, in prison or during trial, and he must know how to plan an escape and return to the U. S. S. R. either through legal, diplomatic channels or illegal routes, making use of false passports and disguises. Finally, instruction is given in the transmission of secret messages and the use of agitators and dissident groups. All students at the Leningrad School are, of course, politically reliable. In addition to Russians and satellite nationals, some foreigners are accepted as students, although fictitious names are the rule and correct identity is concealed. It must not be assumed that such a curriculum is necessarily exhaustive of the possibilities. Others might include safe-cracking, counterfeit- ing, and a detailed study of the local customs, man- nerisms, and peculiarities of the particular area to which the agent is to be assigned. The perfec- tion of cover stories, concealment of all identify- ing clues, evasion of surveillance, and clever altera- tions in identity all have a place in specialized training. Regardless of the specific subject matter, most espionage organizations have their own train- ing schools which usually have instruction in the following five areas : Types of information sought, techniques for obtaining it, selection and perfec- tion of a cover, means of transmission of informa- tion, and methods of entering the target area. Means of gaining access to a general area are, of course, varied and depend upon the circum- stances. During wartime, typical means include line-crossing, sea-coast landing, parachuting, and remaining behind as the enemy withdraws. Orientation within an area may be difficult because the agent often lands at some distance from his intended destination and must avoid carrying maps or inquiring directions. Other problems may include obtaining proper identification papers and documents. Obviously, the names and ad- dresses of the agent's contacts will be memorized and he will carry only such papers as are cus- tomary for his particular cover. The large-scale movement of immigrants, ref- ugees, and displaced persons since World War II has provided agents with an excellent means of entry into their target areas. Simulating the piti- ful circumstances of refugees escaping from per- secution, they have been able to reach their desti- nations in sizable numbers with marked success. For example, it has been reported in the public 367 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS press that Americans with friends or relatives in Communist-dominated countries have become vic- tims of blackmail and forced to sponsor the entry into the United States of trained agents posing as refugees from Communist oppression. Lists of such potential sponsors have sometimes been com- piled from parcels sent through the mails. Ex- change students also provide excellent cover for espionage activities, as do businessmen, merchant seamen, and tourists who have legitimate reasons for entering a country. Once within a target area the agent must adopt some disguise or "cover" which is suitable and logical to justify his presence. The cover adopted is normally an activity in which the agent is pro- ficient through previous employment; engaging in unfamiliar work will more readily lead to even- tual discovery. The cover of a servant is a good one for both men and women, especially those with traces of foreign extraction. Maids, cooks, butlers, and chauffeurs become intimates of households, and can logically obtain information in a variety of situations. For example, an agent posing as a chauffeur installed a recording device in the auto- mobile of a high government official, and thus obtained valuable information for a number of years. Hotel employees often have served as contacts between agents and as letterdrops. Bellhops, desk clerks, and maids can easily overhear conversa- tions and, in wartime, have gathered vital infor- mation from military personnel. The transient nature of such work and the minimum qualifica- tions are of considerable advantage. The enter- tainment profession provides a highly desirable cover because it is international in nature and brings together widely varied groups, the size and diversity depending, of course, upon the popular- ity of the individual entertainer. Frequent travel lends legitimacy to wartime movement into many areas, including military installations. The travel factor combined with the ability to make friends quickly and easily in the right circles, makes this cover particularly effective. Trades and industry have also been used for cover purposes, especially importers and publish- ers whose business involves foreign transactions in peacetime and the maintenance of connections with neutral countries in time of war. Communi- CONFIDENTIAL cations workers, contractors, and engineers are good covers for obtaining vital military and eco- nomic information. Diplomatic cover, of course, has the added advantage of security through diplo- matic immunity. The agent cannot be arrested but only requested to leave the country; hence some diplomatic missions have been established only for intelligence purposes. It is apparent that the types of cover are many and varied; those men- tioned only indicate the tremendous range of possi- bilities. Techniques The techniques of espionage are almost as di- verse as the types of cover; the particular one selected will depend upon the area involved, the information desired, and the degree of difficulty anticipated or encountered. Some of the more common can be listed, although it must be empha- sized that there are many other possibilities; they are often used in combination, and are not the exclusive province of the espionage agent. Pene- tration, the physical entry of an agent by normal procedures into an organization or installation for an indefinite period, is an ideal method for per- sonal observation and reporting. Targets for this technique are industrial plants, military installa- tions, laboratories, newspapers, radio stations, government statistical and intelligence agencies, political parties, labor unions, and any other agency or organization which may be concerned with information of intelligence value. Military services and government offices are particularly important targets and agents may enlist or start work in the lower echelons, gradually rising to positions where classified information becomes available. Direct observation, without actual penetration, is usually a more hazardous and less profitable technique, for it depends entirely upon the available means of cover, especially if cameras and binoculars are required. EmploYment agencies, language schools, and training schools are sometimes organized specifi- cally to facilitate penetration. Fire inspection surveys by agents supposedly representating in- surance companies, or actually operating out of such companies, have been a good approach. Bribery, theft, and purchase of documents, plans, and information have taken advantage of men's 368 pproved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL weakness in every generation. The development of friendships with individuals possessing impor- tant data, and their subsequent subtle interroga- tion making full use of flattery and conviviality have been effective. Where this method has failed, and under certain circumstances, outright abduction of specialists and important personages has been practiced, especially by the Soviet Union in modern times. Search of the personal effects of those believed to have vital information is some- times facilitated by employees who have ready access to such effects. Reproduction by copying or photographing models or documents which are only temporarily available can be secretly accomplished so that no suspicion is aroused. The actual appropriation of materials, where such are desired, is often aided by clerks, janitors, and other regular employees, either knowingly or unwittingly. The adroit use of informers is a common espionage technique. Many intelligence services maintain lists of such persons in every country for appropriate use by agents. Although the first major task of the espionage agent is to collect information, the second, that of transmitting it to his superiors, is of equal im- portance, for only when they have received it is the process of espionage complete. For this reason, successful methods of communication are vital and advance preparations for them are given the most careful attention. In modern times, the predominant method is the use of concealed radio transmitters and receivers of suitable size and power. In addition to range, other factors for consideration include source of power, operational wave length, antenna length, and atmospheric con- ditions. During World War II a number of ex- cellent radio sets for espionage use were developed, especially by the Germans, some of which were about the size of a shoebox. More recent electronic developments have reduced the size even more and made the problem of concealment easier. The necessity for an adequate antenna creates special problems in the location of a transmitting set, so that night is the usual time for operations. Since height is a factor, preferable transmission sites are hilltops or high buildings except when communications are directed toward aircraft in the vicinity. The advantages of radio for trans- 369 mission are speed and comparative reliability; some of its disadvantages are the equipment re- quired, training in its use, and the risk of dis- covery. Anyone with a receiver covering the proper wave length can receive the transmitted signal, and the agent never knows when his ac- tivity has been detected by radio security units. As a result, his transmissions must be brief and infrequent and his location must be changed often or subject to change on the shortest notice. In spite of the risks of interception, public mail service is often used to transmit information. During peacetime, the risks in many countries are reduced and mail is sent direct to commercial or private addresses used as covers; in wartime, cover addresses will be located in neutral countries. Under either condition, letters, newspapers or periodicals, ships' mail, and microphotographs may be the means for utilizing mail service, and such means may employ codes or secret inks or both. The potentialities of microphotography are particularly amazing, since a sheet of paper may be photographed and reduced in size to a pin- point of gelatin which may be hidden in the gummed sections of an envelope or used as a punc- tuation mark in a letter. There are many other methods for transmitting information for intelligence purposes, including couriers, pigeons and dogs, heliographs, light sig- nals, infrared rays, supersonic waves, clearing- houses in neutral countries, secret letterdrops, persons, even children acting as fronts, and coded messages ingeniously placed to be visible to the intended recipient. Because of the possibilities of interception, couriers are seldom used except when the transmittal of maps, objects, and photographs becomes vital; the diplomatic courier has the ob- vious advantage of customary freedom from search or censorship. Pigeons and dogs have been em- ployed for centuries, although the risk of inter- ception is great and the amount of material which can be transmitted is limited. Infrared-ray equip- ment has special advantages and scientific develop- ments in the field of secret communications con- tinue to provide other devices of high potential value. While the activities and techniques of espionage have a range which almost defies the imagination, it should be recognized that they are the cumula- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS tive result of brilliant, if sometimes almost per- verse, imaginative genius that knows no limits. No possibility, therefore, can be brushed aside as too impractical or improbable. Even more, mod- ern espionage is a comprehensive, skillfully organ- ized business with a major objective of collecting all possible information about planning, policy, and military secrets. Published reports by such prominent and informed persons as the Director of the Federal Bureau of Investigation suggest that this activity in the United States is organized on a scale incomprehensible to the average Amer- ican citizen, more pervasive than ever before, and potentially more dangerous. Literally thousands of people, many of whom are American citizens, are reported to be associated with espionage, at- tempting to transmit to the Soviet Union informa- tion which might aid that country in the cold war or in open conflict. The possibility exists that such persons may be located in government agen- cies, labor unions, key industries, and scientific organizations. The realities of espionage in the United States should be seriously regarded. SABOTAGE For the purposes of discussion, the subjects of espionage and sabotage will be considered sepa- rately, but it should be kept in mind that their activities are often interrelated, the personnel may be one and the same, and methods may be comple- mentary if not identical. Espionage is damage to national security by the acquisition of vital infor- mational items; sabotage is damage by injury or destruction of important physical items. The word "sabotage" originated in the industrial revo- lution of the 19th century when hand weavers of northern France and the Low Countries fearing loss of their jobs, often kicked their sabots into the new textile weaving machines in an effort to destroy them. In modern usage, sabotage is more broadly defined as "the malicious disruption or attempted disruption of the normal functions of a nation in any manner which intends or apparently intends to injure, interfere with, or obstruct the national defense or war potential of that nation." The term is sometimes applied to certain activities of a secretive nature, such as some aspects of psychological and economic warfare and projects CONFIDENTIAL 370 of subversive political groups which do not result in obvious physical damage. Three general purposes of sabotage are to weaken the war potential or war effort of a nation, to impair its internal strength and external influ- ence, and to dislocate its economic system. Dam- age to a nation's productive industrial facilities can directly affect its fighting capabilities on dis- tant fronts, while sabotage in the area of opera- tions can cause a breakdown in lines of commu- nications and prevent a commander from accom- plishing his mission. Internal weakening of a nation may disrupt its economic and political structure so that it not only cannot meet its inter- national commitments but also may be faced with social strife leading to revolutionary activities. The complexities, interrelationships, and concen- tration of modern industrial plants magnify the potential effectiveness of sabotage, for the de- struction of a few vital machines and damage to a few vulnerable plants can, like a chain reaction, immobilize thousands of others. Sabotage need not be direct damage or destruc- tion: it may be much more subtle, such as the undetected substitution of destination tags on shipments of important supplies. Nor can it be assumed that every act or attempted act of sabo- tage is the result of the directed effort of an em- ployee of a foreign service. Sabotage may be closely related to international developments, but it may also coincide with domestic labor disputes or extreme dissension among industrial personnel. Acts of violence and destruction can and have been traced to malicious and dissatisfied individuals who have no other motive than revenge or jeal- ousy. In any event, it may be assumed that sabo- tage will be directed against points of greatest vulnerability. Types of Saboteurs The German Nazis, the Italian Fascists, and the Russian Communists have all advanced the doc- trine that service to the state justifies any act which will aid its cause, with the result that injury and destruction of property evokes no personal sense of wrongdoing. The two basic types of saboteurs are the trained agent operating under the instructions of a foreign intelligence service, and the independent, usually untrained, malcon- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE tent acting for personal reasons with no foreign connections. According to the time element of their assign- mems, saboteurs may also be typed as long-range and short-range agents. The long-range agent, who usually enters a country at some time prior to an outbreak of hostilities, is similar to the fixed espionage agent, while the short-range saboteur ordinarily operates during wartime within an area of military operations. The means of entry into a country or a particular installation em- ployed by a saboteur are similar to those used by espionage agents. To be remembered is the fact that anyone can be a saboteur, of any age, from any social group, or ar y profession or occupation. While the activities the trained saboteur may conform to a pattern, those of the independent saboteur seldom do. This latter type may be un- expectedly motivated by diverse causes: he may commit sabotage in an effort to embarrass or dis- credit a fellowworker, and by blaming his act on another seek to gain personal recognition, ad- vancement, or reward. Methods and Targets of Sabotage The method employed by a saboteur will de- pend upon the nature and construction of the as- signed target, its vulnerability, security measures in force in the area, the effect desired, the time available, and the material necessary to cause the planned damage. While the range of possible methods is great, some are more commonly used because of their simplicity and convenience and may be divided into four groups: incendiary, ex- plosive, mechanical, and biological. The common characteristic of each is damage or destruction to life or property, except in the case of the latter which may have more indirect results. These methods may have a primary phase, which involves the actual act, such as arson or bombing, and a sec- ondary phase, consisting of acts which increase the effectiveness of the primary, such as disconnecting fire alarms and immobilizing fire-fighting equip- mer it. One of the most effective methods of sabotage is the use of fire because of complete destruction, concealment of evidence, and availability of means. Taking advantage of ordinary fire hazards, such as 371 CONFIDENTIAL the improper stowage of combustibles or faulty electric wiring, the saboteur can achieve his objec- tive with a minimum risk of detection and a, maxi- mum degree of disguise. For example, during World War II, a German sabotage group in Great Britain, directed by an electrical engineer, made use of apparent accidents to damage various elec- trical installations. The close relationship be- tween arson and sabotage, which differ only in objectives, often make it unnecessary for the sabo- teur to camouflage his incendiarism. Rapid spread and complete destruction is most accurately achieved when the saboteur personally ignites combustible materials, known as acceler- ants. Should he require time for escape or a bet- ter alibi, he may make use of a variety of delay mechanisms which are either improvised or manu- factured. These mechanisms are usually chemi- cal, electrical, or mechanical. A very simple de- vice is a lighted cigarette and a match folder which provides a delay of about 15 to 18 minutes. Typical chemical mechanisms include pencil-like incendiaries and sabotage bombs which have as their components a delay device, an initiator, and a main charge. Electrical and mechanical mecha- nisms are frequently used in combination with chemicals and adapt for their purposes ordinary alarm clocks, mouse traps, doorbells, and tele- phones. The use of explosives poses a number of prob- lems and requirements: storage, introduction into the target area, technical skill in preparation, the difficulties of making the explosion seem acci- dental, and the possibilities of public indignation resulting in intensive investigation and increased security measures. However, explosives become an acceptable method under certain circumstances: when the target is such that a cutting or shattering force is necessary for its destruction, when destruc- tion must be immediate and total, and when no other method will accomplish the objective. Ex- plosives are particularly effective in destroying cast iron forgings, reinforced concrete and stone structures. Usual explosive devices are bombs which may or may not be disguised. If disguised or concealed they may be set to explode at a predetermined time or so arranged as to explode by means of a trigger device activated by movement. The common ex- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS plosive materials used include black powder, smokeless powder, nitroglycerin, and TNT. Mechanical sabotage is by far the easiest method to employ as well as one of the most difficult to detect. Its most logical targets are industry and transport, although military equipment has some vulnerabilities. This method is accomplished by breakage, the use of abrasives, acts of omission, substitutions, and contamination. A wrench, hammer, or other similar tool can easily destroy delicate instruments, gears, pumps, and other vital moving parts of machinery. Abrasives, placed in lubricants and fuels, will cause excessive wear and eventual breakdown of machines, engines, and generators. Mere neglect to perform some im- portant, though simple, function, such as lubrica- tion of equipment or turning on oil feed lines, will accomplish a saboteur's purpose. The substitu- tion of faulty or foreign materials can materially affect an industrial plant and the alteration of blueprints can have equally destructive results. The contamination of fuels and lubricants is a procedure similar to those already mentioned. There are many advantages of mechanical sabo- tage: little equipment or training is needed; de- tection is exceedingly difficult; and it can often be continued in the same area over a considerable period of time. For example, industrial produc- tion may be retarded to a low level but not com- pletely stopped. During World War I it was 4 years before damage to the propeller shaft of an American merchant ship was discovered. In World War II, German agents had as one of their targets the transport system of the Allied armies moving through northern Italy and across France; their purpose was to slow down progress, to dis- tract transport personnel, and to detract investi- gative agencies from more important tasks. Biological sabotage is aimed at the home front, especially the labor force and seeks to cause sick- ness and absenteeism by introducing various toxins in sources of food and water. Three major categories of sabotage targets are transportation, industries, and natural resources. The importance of transportation to industries and to the movement of materials makes it a primary target, with railroads, water shipping, and air transport having priority in that order. Indus- trial targets might specifically be, in order of im- CONFIDENTIAL 372 portance : power plants, assembly lines, raw mate- rials, individual machines, lubricants, and fuels. The category of natural resources includes mines, farm produce, forests, and waterways, together with dams, breakwaters, flood-control systems, and reservoirs. The disruption of the telecommunica- tions facilities of a nation such as the United States, with its complex telephone, telegraph, cable, and radio networks, could quickly dislocate its economic, political, and social structure; while damage to public utilities, warehouses and supply depots, and military installations could have seri- ous consequences. A successful attack in any of these categories might have a progressively serious effect on the labor force which is always a vital target. In a theater of operations, and particularly in an area formerly held by an enemy, sabotage may be especially advantageous against such targets as ships, port and dock installations, railroad junc- tions, bridges, tunnels, switches, airports, radio transmitters, landing-control equipment, impor- tant public buildings, motor pools, and ammuni- tion, fuel and food dumps. The list of targets of special naval interest is extensive and includes: naval factories of all types, shipyards, piers and terminals, drydocks, loading and unloading equip- ment, depots and storage areas, central power sta- tions, transmission lines, transformers, water- works, transportation facilities, communications, ships of all types, and labor force. The organized, large-scale sabotage group, care- fully coordinated with other weapons and meas- ures, constitutes a danger and threat in both war- time and peacetime. In many instances these groups are an integral part of foreign intelligence services; in fact, some countries have maintained sabotage units for many years. In World War I, for example, the Germans operated an initially successful sabotage campaign against Allied ship- ping; in the United States this campaign was directed by Franz von Rintelin who has described his activities in an interesting book, The Dark Inivader. Prior to World War II, the Nazis ini- tiated sabotage operations in France in an effort to impair her industrial production and so to aid the activities of subversive groups. There are indications that these operations were successful at least in part. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL Nonphysical sabotage, which relates to the sys- tematic undermining of morale and public opinion and makes use of false propaganda and insidious rumor, is a form of subversion which is a major type of foreign directed activity of concern to counterintelligence. SUBVERSION The dictionary definition of the word "subvert" is "to overturn, overthrow, ruin utterly; to under- mine the morals, allegiance or faith of, corrupt." In its broadest sense, therefore, subversion in- cludes both espionage and sabotage, and their con- crete targets of information collection and phys- ical destruction. In order to focus attention on the mental targets of subversion, this discussion will deal with activities relating to the corruption of the minds of men. A comprehensive definition of subversion is dif- ficult to phrase because of its intermingled ab- stract and concrete aspects. Most of its effects, however, are political, and it thus includes any activity carried on by an individual or group which seeks to alter the form of Government of the United States by unconstitutional means or which serves the interest of a foreign government in a way inimical to the United States. The edu- cation law and the civil service law of the State of New York is more specific and detailed as quoted in the Regents' Rules on Subversive Activ- ities: . . . a teacher or other employee who "wil- fully and deliberately advocates, advises or teaches the doctrine that the government of the United States or of any state or of any political subdivision thereof should be over- thrown or overturned by force, violence or any unlawful means," or who participates in the preparation, publication or distribution of written or printed matter advocating such a doctrine or advising its adoption, or who "organizes or helps to organize or becomes a member of any society or group of persons" which teaches or advocates such a doctrine, or who utters "any treasonable or seditious act or acts," is engaging in subversive ac- tivity . . . Legally, subversion is the committing of a willful act inimical to the interests of the United States. From the intelligence point of view, subversion is also a specialized method of political warfare 373 which demands the most astute and painstaking counteraction. The term subversion, often popularly described as fifth column activity, is applied to a variety of manifestations, from an expressed attitude to a series of acts or statements which reveal disloyalty and endanger the constitutional government of the United States. Subversion, therefore, is a matter of degree and the naval officer must be carefully trained to recognize it in its many as- pects. Some characteristics of subversion include its conspiratorial nature, the secrecy surrounding its efforts, and the devious, inconsistent, and some- times seemingly conflicting means of approaching and attaining its eventual objectives. Perhaps the most serious problem is the resemblance of some phases of subversion to legitimate activities of a democratic citizenry, and differentiation must be made between the loyal American who exercises his right of criticism and the enemy who conceals his subversive activity by making use of the same right. The solution of this problem constitutes a heavy responsibility for counterintelligence and security agencies which have sometimes found themselves dealing with cases involving inference and personal judgment. For example, when a case against an individual lies within the area of ideas, even expert analyses of that case may vary in their conclusions as to what the individual is and what he actually represents. Shortly after World War I this problem was faced by Justices Holmes and Brandeis of the Supreme Court at which time Holmes brought forth the doctrine, as a standard, of "clear and present danger." In the case of Schenck v. United States, he said: "The question in every case is whether the words used are used in such circum- stances and are of such a nature as to create a clear and present danger that they will bring about the substantive evils that Congress has a right to prevent. It is a question of proximity and de- gree." Justice Brandeis, in the case Whitney v. California, further amplified this doctrine when he said: "No danger flowing from speech can be deemed clear and present, unless the incidence of the evil apprehended is so imminent that it may befall before there is an opportunity for full dis- cussion. If there be time to expose through dis- cussion the falsehood and fallacies, to avert the CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS evil by the processes of education, the remedy to be applied is more speech, not enforced silence." Nathaniel Weyl, a former Communist Party mem- ber, commenting on this statement in his book, The Battle Against Disloyalty, makes the point that "the purpose of the Communist movement was to deprive the people of the United States of any possibility of a 'free and open encounter' between truth and falsehood" and "is not a battle of ideas in the arena of honest discourse. The purpose is not to convince the majority, nor is there any will- ingness to abide by the majority's verdict." This fundamental problem is summarized by Philip Selznick in The Organizational 'Weapon: A Study of Bolshevik Strategy and Tactics, pub- lished by the Rand Corporation: The problem of subversion has two aspects which are often confused. On the one hand, a group is considered subversive when it seeks to overthrow established authority by forcible means. It is here that the doctrine of "clear and present danger" most readily applies, the assumption being that governments ought to punish acts and not thoughts, and that meas- ures of restraint ought to be consistent with the seriousness of the acts committed. How- ever, the problem is complicated when, as in the case of communism, subversion refers not only to a revolutionary program, but also to the manipulation of social institutions for alien ends, this manipulation being conducted covertly in the name of the institution's own values. Mr. Selznick goes on to say that confusion in identifying subversion can and does arise from the fact that new social forces develop from time to time in a community, which may be considered subversive because their motives and objectives are not generally understood or appreciated. The criterion in such instances will be the limits of the objectives sought and their realization within the established and regulated processes of constitu- tional government. A study and understanding of communism can lead only to the conclusion that it is subversive, because its goal is unlimited power and its methods utterly disregard and directly oppose customary constitutional processes and restraints. Power is sought through the insurrectionary activities of a pivotally placed minority assisted by a foreign power. CONFIDENTIAL 374 Aspects of Subversion Disaffection, a first step toward subversion, is a state of mind in which there is a basic lack of loyalty or regard for any constitutional form of government and particularly for the Government and Constitution of the United States. It may be indicated by disloyal comments, not necessarily designed to influence others, or by sympathetic association with persons or groups who have posi- tive subversive tendencies. In and of itself, as a state of mind, it constitutes no criminal offense since no act has been committed. It is particu- larly important to distinguish between the discon- tented and the disaffected, as well as between disaffection and subversion. The step between disaffection and subversion is taken when the act is committed. Disaffection is of direct interest to counterintelligence because of its potential danger and easy conversion to subversive purposes. A foreign national residing within the limits of the United States cannot be guilty of disaffection, since he owes no loyalty to the United States. Sedition is described as acts, or words written or spoken, which tend to incite the citizens of a country to revolt or rebel against constituted authority. While sedition involves questions of constitutional law, the Congress has the implied right to protect the Federal Government against injury and the authority to punish incitements to violate or interfere with the execution of Federal laws. Sedition, therefore, involves any advice urging illegal resistance to the law, any attempt to change by illegal means the existing form of government, and any illegal interference with the execution of its policies. The key words in the various sedition laws are: Insubordination, dis- loyalty, mutiny, refusal to duty, injury to the United States, force, and violence. In 1940, the sedition laws were broadened to include "any per- sons who knowingly or wilfully advocate, abet, seek, advise the necessity, desirability, or propriety of overthrowing or destroying any government in the United States by force or violence." More recent laws, still under consideration, tend to be even more explicit. Treason, the most serious offense that can be committed against the Government of the United Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL States, is specifically defined in the Constitution as follows: "Treason against the United States shall consist only in levying war against them, or in adhering to their enemies, giving them aid and comfort. No person shall be convicted of treason, unless on the testimony of two witnesses to the same overt act, or on confession in open court." The basic difference between treason and sedition is that treason means the committing of an overt physical act, whereas in a case of sedition, words alone can constitute the offense. Treason is a breach of allegiance. "Levying war" has been in- terpreted by the courts to include furnishing to an enemy arms, troops, supplies, information, or means of transportation. "Adhering to their enemies" is an offense which includes the trans- mission of intelligence of military value to an enemy, all acts which in any way tend to obstruct or weaken the military operations of the United States, and the inciting of others to aid an enemy. It should be apparent that many legalities can arise in connection with cases of treason and sedition. Nathaniel Weyl, in the book cited above, states that "the United States has been extraordinarily tolerant of both sedition and disloyalty. No mod- ern state has ever defined the crime of treason so narrowly. No nation has ever surrounded the man accused of betraying his country with such a for- midable barrier of constitutional protection or been so reluctant to punish conspiracies directed at its very existence." Since World War II, how- ever, more vigorous measures have been taken, not only against the underground forces of commu- nism but also against the American Communist Party which has waged an unceasing campaign for revolution. One of the most important was the indictment in 1948 of 12 men charged with con- spiracy to organize the Communist Party of the United States as an association of people "who teach and advocate the overthrow and destruction of the Government of the United States by force and violence." This organization is characterized by deceit, conspiratorial activity, secrecy, viru- lence and hatred, subservience to instructions from the Soviet Union, and a fanaticism on the part of its members which is a way of life engulfing their entire personalities. 375 Methods of Subversion A study of the American Communist Party and its activities will provide a detailed illustration of subversion and its methods. As a part of the party discipline each member is carefully instructed in the basic principles of organization, propaganda, and agitation through the doctrinal teachings of Marx, Engels, Lenin, and Stalin by which the party directs the struggles of the working class in gaining victories while avoiding unnecessary sac- rifices. These teachings also show the party the best methods of overthrowing capitalism, which will lead to the establishment of a Socialist Soviet Republic in the United States. A clue to the ad- vantages of subversion from the Communist point of view are the words, "unnecessary sacrifices;" at the same time its principal methods, or tech- niques, are identified by the terms, organization, propaganda, and agitation, which will be discussed in turn. Organizational Methods In order to understand the organizational method of subversion it is necessary first to appre- ciate the power generated not only by one organ- ized group but also by an entire organized politi- cal community. The recognized constitutional order of a democratic state imposes positive re- sponsibilities on group or political party power and enforces regulations governing the use of or accession to that power. The regulations of the constitutional system are continually being ex- tended into new areas where group power is being developed and won. For example, political parties, pressure groups, unions, and various other agencies attaining power adapt themselves to the constitu- tional order and so contribute to the continued stability of the state. For this reason subversion is not involved. Communist political doctrine, fully recognizing the potential of group power, seeks to exploit it in all social institutions regardless of whether or not they are normally political in nature, and to achieve the consolidation of total group power by one ruling group. Hiding behind the customary and accepted rules of constitutional procedure, the Communists achieve power by the manipula- tion of minority units, thus actually circumventing these rules. Their search for power does not stop CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS short of total absolute control. For these reasons, communistic organizational methods are subver- sive and can be characterized as total subversion. The implications of these methods in their totality are indeed staggering and represent a challenge to democratic society that is perhaps unparalleled. The importance of ideology to communism is well known; the almost equal importance of organ- izational control was emphasized by Lenin when he said: "The proletariat has no other weapon in the fight for power except organization . . . the proletariat can become and inevitably will become a dominant force only because its intellectual unity created by the principles of Marxism is fortified by the material unity of organization which welds millions of toilers into an army of the working class." For the Communists, therefore, ideology is only a beginning; the ultimate goal is the con- solidation of total power in a select group within organizations which can force a final and irrevo- cable decision on society. One method is the creation of acknowledged political organizations, such as the American Com- munist Party, legally constituted and openly de- voted to the expansion of membership and the enlistment of popular support for political control through recognized constitutional procedures. A second method is the development of "front organizations" in any area of social activity, po- litical, professional, cultural, or economic. Com- munist-controlled from their inception, these or- ganizations have innocent-appearing and seem- ingly commendable objectives designed to appeal to specific groups and individuals who may be dominated and exploited for subversive purposes. By such means, propaganda is disseminated through apparently acceptable channels, informa- tion is obtained fox further organizational activi- ties, such as names and addresses, and subversive groups gain at least partial control over those which are nonsubversive. Front organizations have the mutual character- istics of common origin, idealistic sounding title, rigid conformity to the Communist "line," and deception; they are either mass, membership, or paper organizations, and solicit and make use of the names of prominent persons. The same party members may belong to several front organiza- tions. In recent years, hundreds of such organ- CONFIDENTIAL 376 izations have sprung up, but have quickly ceased to exist when exposed. In some of his writings, Stalin has stressed the importance of these groups, describing them as "transmission belts" and quot- ing Lenin to support his point of view: The dictatorship (of the proletariat) can- not be effectively realized without "belts" to transmit power from the vanguard (the Com- munist Party) to the mass of the advanced class, and from this to the mass of those who labor. The membership ordinarily includes four cate- gories of individuals: (1) Admitted Communist Party members; (2) Party members whose true status is concealed; (3) Consistent accepters of the party discipline although they are not party members; (4) Those attracted by the announced objectives of the group, the prominence of its spon- sors, and general sociability. The means by which these organizations are established and controlled have been described by a former high official of the American Communist Party in his testimony before the Special Committee on Un-American Activities, House of Representatives: A front organization is organized by the Communist Party in the following fashion: First, a number of sympathizers who are close to the party and whom the party knows can be depended upon to carry out party orders, are gotten together and formed into a nucleus which issues a call for the organization of a particular front organization which the party wants to establish. And generally after that is done a program is drawn up by the party, which this provisional committee adopts. Then, on the basis of this provisional pro- gram, all kinds of individuals are canvassed to become sponsors of the organization, which is to be launched in the very near future. A provisional secretary is appointed before the organization is launched and in every instance in our day the secretary who was appointed was a member of the Communist Party . . . And as president of the organization we would put up some prominent public figure who was willing to accept the presidency . . ., gen- erally making sure that, if that public figure was one who would not go along with the Communists, he was of such a type that he would be too busy to pay attention to the af- fairs of the organization . . . On the committee that would be drawn to- gether, a sufficient number of Communists and Communist Party sympathizers, who would Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL carry out party orders, was included, and out of this number a small executive committee was organized . . . which carried on the af- fairs of the organization, so-called, and this small executive committee, with the secretary, really ran the organization . . . when mani- festos or decisions are made, those campaigns are ordered by the Communist Party. The purpose of all of these new organizations is, of course, to produce new sources of political power at the same time subtracting power from established institutions. However, new effective groupings may not be possible or desirable, so that a third and particularly insidious method is adopted, that of capturing established institutions, completely or in part. While the framework and facade are retained, the body and working mech- anism are replaced or reoriented so that these or- ganizations have new, though concealed, loyalties and purposes and are no longer a normal part of the constitutional order but instrumentalities pre- pared for revolution. In connection with this method two points should be noted: first, vital nerve centers and key institutions are primary targets so that controlling power may be achieved with a minimum of mass support; and second, within a target group the replacement of top lead- ership is followed by a remolding of the entire control system which will ensure uniformity of opinion, complete conformity, and the greatest possible favorable influence within the broad base of the membership. Even if that favorable in- fluence is not gained, the organizational mech- anism will maintain control, so that here again minimum support makes maximum power possi- ble. For example, in a Communist-controlled union, headquarters officials, organizers, and shop stewards all become part of an integrated appara- tus leaving the base membership with no formal- ized, and frequently no effective, means of expres- sion. The total impact of this organizational method was vividly and startlingly demonstrated in the case of Czechoslovakia where the Commu- nists seized power in February 1948. As noted in The Organizational Weapon: It was not an insurrection, involving at- tacks upon a ruling group, but a seizure of total power by those who already held domi- nant influence in the government. It was a revolution nonetheless, for it resulted in a fundamental shift in the locus of sovereignty 269196-54-25 from constitutionally restrained parliamen- tarism to a totalitarian state. What was overturned in Prague was an institutional system, not a regime. Striving to seize the power potential of any attractive formalized group enterprise, the Com- munists take advantage of inherent weaknesses which can be readily manipulated to their own purposes. Within any organization a small in- formal group with special cohesive interests can become a dominating force. Once an official posi- tion has been captured, it can be used to influence decisions and to direct the distribution of internal and external power. Through the informal group and the official position, steps can be taken to reorganize the formal group, ostensibly to per- mit greater internal efficiency or better coopera- tion with external groups, but actually to consoli- date the influence and controls of the informal group. In many, if not most organizations, the membership is loosely joined together and mobil- ized for concentrated action only on special occa- sions and for particular short-term reasons or goals. The ability of the informal group to inte- grate the membership closely and continuously activate it provides a new source of power which can be directed in many ways. Most organiza- tions also have limited objectives within their par- ticular fields of interest. However, once internal strength is concentrated, the limited objectives can be expanded as desired. It is apparent that ideology becomes an important means for inte- grating mass membership and in developing or- ganizational power. In selecting an established institution for cap- ture, the Communists consider most carefully its relative importance in the social structure, the breadth of its base, the composition of its member- ship, its acceptability within the community, and the potential of its power. Their ingenuity of analysis leads them into unexpected areas and their systematic procedures accomplish amazing results. Infiltration and penetration are followed by mass political education or indoctrination. Emphasis is placed on the importance of organ- ized and combined positive action, an aggressive hatred against so-called "evil forces" such as capitalism, intense loyalty, and continuous self- sacrifice. The membership must acquire a sense 377 CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 .Aonroved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDEN run INTELLIGENCE FOR NAVAL OFFICERS of mission and dedication, their lives must be cen- tered around the group, and they must be per- sonally committed to the principle of mutual support. There are many types of institutions selected for Communist capture. Typical are the youth groups which have been primary targets all over the world because they are often effective breeding grounds for social strife and unrest and for the recruitment of new communist members. Many of the leaders in the American Communist Party began their work in their youth and it has been estimated by the FBI that the average age at which men and women join the party or its youth branch is 22.2 years, with ages ranging from 14 to 35. The approach to young people at the begin- ning is often indirect and may be only a matter of parties, dances, and socials; once recruited, how- ever, the individual becomes a virtual prisoner. Of interest is the fact that many of these youthful recruits have a high native intelligence and much natural ability. In addition to labor unions which have already been mentioned, minority groups are excellent areas for Communist exploitation. Differences in language or race, suspicions, and misunder- standings are magnified into open discontent and disaffection which are subverted as sources of power. For example, the Communists have en- deavored to appear as champions of the American Negro, promising much, and concealing their true objectives under high-sounding words. In addi- tion, they have attempted to undermine worthy negro organizations. Refugee groups, often dis- contented, have similar potentialities. The Armed Forces and principal veterans' organiza- tions are composite social groups of great impor- tance. According to the FBI, Communist policy in respect to the Armed Forces in the postwar period has been to discourage the enlistment of non-Communist youths; for party members to create confusion and dissension if drafted; for members not subject to draft to obtain work in defense plants in order to promote dissension. The overall purpose is to reduce the effectiveness of the Armed Forces. In the case of the veterans, some of their objectives have been espoused by the Communists in an effort to win support. The CONFIDENTIAL 378 control of civil police is a means of preventing action against subversive enterprise. For their purposes the Communists do not find it essential to establish complete control over all organizations, for in order to influence policy deci- sions infiltration is often sufficient. The organi- zational method, therefore, includes gaining access to non-Communist groups in order to guide un- suspecting loyal citizens into supporting policies of the party. All types of groups, from women's clubs to government agencies, are potential targets. Peace petitions support the Communist world strategy, and even the control of routine decisions at lower levels in government can have important cumulative results. Leadership It is a fundamental Communist principle that the durability of a movement depends upon stable leadership to insure continuity. An elite group of directors, called the vanguard, is therefore es- sential to maneuver the masses into the desired position. The entire party structure is based on strict administrative accountability and a clear- cut chain of command. The highest loyalty and. obedience are demanded from every party member and those who deviate are summarily subjected to harsh treatment. The development of adamant leaders begins with a psychological process of re-shaping person- ality, which from the point of view of American values includes the destruction of all independence of judgment and the erasing of environmental and educational influences. Then follows a gradual remolding into the professional revolutionist, a person who is totally and pitifully dependent on the party, completely obedient to instructions, zealously fanatic, and merciless to those who falter or fail. This complete transformation of the inner man is subversion of the most heartless type. According to Nathaniel Weyl, a number of clan- destine party schools have this as their mission, with students carefully selected for their qualities of intelligence, loyalty, and demonstrated courage. Closely guarded, these students take assumed names and are not permitted to leave the school or to communicate with anyone outside its walls during their training period of from 6 to 10 weeks. The new leader emerges in the mold of the party, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL warped by revolutionary desires, filled with hate for any society which opposes the goals he had been taught to attain, and ignorant of all values which give life meaning for normal people. In- tolerant of any differences of opinion, he will fight by the foulest means to attain his objectives; com- munism is the only truth he knows. Propaganda Although the training of active or potential party members is not intended to be as complete or intensive as that of party leaders, they too must be properly oriented and indoctrinated. This is accomplished largely by propaganda, which from the Communist point of view is indoctrination through the dissemination of ideas to small groups of society. Books, pamphlets, magazines, news- papers, bulletins, letters and postcards, lectures, movies, radio broadcasts and various kinds of group entertainment are effective media for pre- senting doctrine and spreading rumors. The insidiousness of propaganda for subversion makes it extremely difficult to identify and evalu- ate; its specific purposes may be completely con- cealed at the outset. Seldom will it encourage open revolt, but will have an emotional rather than an intellectual appeal aimed at lowering morale and stimulating discontent. Sometimes it will be directed solely toward effecting certain organi- zational changes so that, of itself, it has no ap- parent propaganda characteristics. Failure to recognize this type of propaganda obviously leads to errors in correctly evaluating Communist ac- tivity. In many respects, Communist propaganda in America appears to have concentrated on mid- dle class groups because their vulnerability tends to be more psychological than organizational. Since the organizations of the middle class are more diverse and less centralized than those of the laboring class, organizational subversion methods cannot have as great a power impact; the middle class, however, is often more receptive to ideologi- cal exploitation. Louis Budenz in his revealing book, Men,With- out Faces, emphasizes the effectiveness of Com- munist propaganda in molding American thought, and comments "we are likely to forget that it is the Communists' hidden influence on American opinion that has been most devastating." He points out that one purpose of this attack on men's minds has been to convince Americans that the Soviet fifth column does not really exist and that revelations of Soviet espionage activity are nothing but the result of hysteria. He adds that the Com- munists "have done a fairly adequate job of mak- ing America ashamed of defending its own free- doms." The lengthy trial of the 12 Communist Party leaders in 1949-50 afforded an opportunity to attack American courts in the person of Judge Harold R. Medina who was compared to Hitler, accused of pro-Fascist tendencies and prejudices, described as a wealthy corporation lawyer, and labelled as a discriminator against Jews and Negroes. The purpose of this vicious campaign may have been to implant the heinous suggestion that the American legal system is no more than a sham and a mere pretence of real justice for all. In The Red Decade, Eugene Lyons sums up one pattern of Communist propaganda activities in his discussion of the American League for Peace and Democracy: In eight years of existence under changing names this League probably reached more Americans with its propaganda than any other foreign agency in the whole history of our country. By a generous definition of the "de- mocracy" it ostensibly defended, the organi- zation worked busily with all other Commu- nist stooge groups. This process of mutual help expanded the clamor and impressiveness of the incredible revolution immensely?a sort of multiple-mirror trick. The League pub- lished a monthly magazine, distributed mil- lions of pieces of literature, staged scores of parades and mass meetings, lobbied for legis- lation, sent its speakers into hundreds of clubs and churches, promoted plays and mo- tion pictures in line with its policies, and de- veloped hundreds of contact points in our Federal and local government. A further pattern of Communist activity is a vigorous counterpropaganda effort designed to nullify or reduce the effects of informational and educational programs conducted by legally con- stituted American groups. Smear campaigns, as well as infiltrated organizations or front groups which protest and decry governmental and pri- vate information programs, are commonly used. Of particular interest is the fact that the Com- munists not only employ propaganda for the pur- poses of furthering their ideological program, but 379 CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS also attempt to maximize the possibilities of its favorable results by gaining some control of the group at which it is directed. In this manner, its acceptance may be facilitated. This strategy in- dicates the very close relationships of the organi- zational and propaganda methods of subversion. Agitation Certain variations in the propaganda method of subversion as applied to different social groups justify the identification of a third method, namely agitation. In fact Lenin made such a distinction, considering propaganda as an output of many ideas to small groups and agitation as the broad- casting of a few ideas, or only one, to a mass of people. This distinction coincides with that made between the vanguard which is to be pursuaded and the masses which are to be led. Agitation has more of an action connotation than does propaganda in that its appeal to large groups is in the nature of an immediate solution of current problems and the active improvement of unfavorable situations which may have been magnified into impending crises. One objective of Communist agitation is the fomenting of strikes and disorder. Before going further, however, it should be pointed out that there is grave difficulty in distinguishing between strikes which are Com- munist-inspired and those which arise out of the orderly legal processes followed by responsible labor unions. To brand every labor strike as Communist-led is as dangerous to the welfare of the democratic state as to scoff at the possibilities that they are communist inspired. It is for this reason, among others, that the Communists find the area of labor relations such a fertile field for activity, and concentrate so much energy on strike tactics. Whether or not a strike results in specific benefits to the workers means little or nothing to the Communist leaders. Of far greater impor- tance is the opportunity provided to test Com- munist strength and control over the groups concerned, to determine the weaknesses of their opposition, to channel the loyalties of the strikers toward communist leadership, and to give them experience and training in mass action. Mass picketing which will include all the workers, their wives, children, and sympathizers is especially sought as a method of magnifying the impact of CONFIDENTIAL 380 a strike. The Communists' own strike objective, of course, is to solidify their controls and create a total political power that can be decisive in the larger struggle. They obtain a unique advantage whenever they can force the legally constituted government into the position of being a strike- breaker. Lenin has described the ultimate use of the mass strike in words of significant import: Prior to January . . . 1905, the revolution- ary party of Russia consisted of a small hand- ful of people, and the reformists of those days . . . derisively called us a "sect" . . . Within a few months, however, the picture completely changed. The hundreds of revolutionary So- cial-Democrats "suddenly" grew into thou- sands; the thousands became leaders of between two and three million proletarians . . . The principal means by which this trans- formation was brought about was the mass strike. The peculiar feature of the Russian revolution is that in its social content it was a bourgeois-democratic revolution, but in its methods of struggle it was a proletarian revo- lution. It was a bourgeois-democratic revo- lution since the aim toward which it strove directly and which it could reach directly with the aid of its own forces was a democratic republic, an eight-hour day and the confisca- tion of the immense estates of nobility . . . At the same time the Russian revolution was also a proletarian revolution, not only in the sense that the proletariat was the leading force, the vanguard of the movement, but also in the sense that the specifically proletarian means of struggle?namely the strike?was the principal instrument employed for rous- ing the masses and the most characteristic phenomenon in the wave-like rise of decisive events. COUNTERESPIONAGE A highly specialized activity to be undertaken only by trained and skilled personnel, counter- espionage is directed against enemy spies and secret agents in order to forestall, neutralize, or confuse their activities. Since a primary purpose is to apprehend spies and agents before they have accomplished their mission, counterespionage must establish an advance warning system, block access to potential targets, and render ineffective all efforts to locate, collect, and communicate in- formation. Counterespionage activity takes place both in the United States and abroad; its intensity is proportionate to the tensions of the existing Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COTJNTERINTELLIGENCE CONFIDENTIAL international situation. In time of peace particu- lar problems are involved in applying its tech- niques in such a way that they will not unjustifiably restrain the rights and freedom of the individual citizen. The disclosure of foreign espionage services is a most difficult and exacting assignment, first, be- cause customary police procedures and routine criminal detection methods are inappropriate and generally futile, and second, because spies and agents usually are persons with outstanding native abilities, unusual talents, and intensive training. Intensive study of known past activities must be made in an effort to determine any possible weak- nesses. Most of the spies mentioned in chapter II were apprehended by skillful exploitation of their weaknesses. Undoubtedly, there have been many more who escaped detection, so it is much wiser to overestimate rather than underestimate the abili- ties of agents and spies and the extent of their activities. Prior to World War I the Germans were particularly effective in counterespionage, apprehending 411 spies as compared to the 20 caught by the British and some 40 by the French. Personnel Attributes Spies and agents must be opposed by counter- espionage personnel who likewise possess special attributes. In his intriguing book, Spy-Catcher, Oreste Pinto, a former counterintelligence officer attached to Allied forces in Europe during World War II, prescribes 10 qualities, of which only the last 3 can be acquired by study and training. The first is an ex,ceptional memory, not only the ability to remember events, faces, and places for indefinite periods of time, but also the capacity to interview and interrogate without written notes. Infinite patience and attention to detail may be the most important factors in the eventual apprehension of an agent whose cover story is air-tight except for one trivial fact. A facile gift for languages can be helpful in a variety of situations, from conversing with suspects to determine their true place of origin and to sense overtones or implica- tions in their remarks to checking thoroughly on letters, documents, or any written matter in their belongings or on their person. An agent, for example, may pose as a Spanish exporter when 881 actually he is a Pole with an excellent knowledge of Spanish. A working knowledge of practical psychology is indispensable in selecting the proper approach to different types of people, and in stimulating in- voluntary actions on their part to prearranged situations. The counterespionage operator must possess courage of a high moral order, which in- cludes an unwavering belief in the fundamental rightness of his cause. He must be a born actor capable of maintaining the most rigid controls over his emotions and sentiments. This quality is associated with knowledge of practical psychol- ogy in that it comes into action after the counter- espionage operator has assessed his opponent or suspect and determined the particular approach he will make. Successful acting also requires the quality of patience, because a part may have to be played for days on end and impatience or bore- dom will betray it. Skill in the mechanics of dis- guise must be matched by lifelike consistency in its portrayal. It is evident that thus far the qualities of the counterespionage operator match those of the espionage agent, which gives pertinency to the saying "it takes a spy to catch a spy." There is a difference, however; the counterspy must possess these qualities to a higher degree and, in addition, the mental capacity to outwit his opponent. This involves a sense of logic which is associated with a gift of detection. The explanations of innocent suspects are usually more confused, incoherent, and illogical than those of actual agents, and an innocent man may occasionally have much more difficulty in accounting for his presence at a par- ticular time and place than the agent whose cover story has been carefully prepared. For this rea- son, counterespionage personnel must be able to analyze available evidence logically, testing each item, understanding the relationships of cause and effect and distinguishing clearly between the true and the false. Something of a sixth sense is neces- sary to stimulate a further search for an obscure hidden bit of information which may provide the only clue. An unexplainable sense of impending danger may also come from this mental attribute. These inborn qualities can be fortified and strengthened by others that are acquired, the first of which, related to the capacity for detection, is CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS practical knowledge of the techniques of espionage. In the course of its long and tortuous history, espionage has developed and made common use of a variety of techniques, including methods of secret writing and of communicating information. In addition, some intelligence services, having adopted particular methods, continue to use them as a matter of routine and with little imagination, one notable example being the Germans who seemed incapable of change even after their meth- ods had been discovered. During World War II, they made use of microcameras resembling pocket fountain pens to photograph documents and pro- duce negatives which could be transmitted under a postage stamp. Even after this clever device was discovered, the Germans continued to use it for mail whose addresses were suspect. Knowl- edge of various techniques, therefore, can be of tremendous assistance in unmasking espionage agents. A precise knowledge of geography, with an emphasis on cities and towns, serves as a means of substantiating or refuting cover stories and of facilitating movement in particular areas of ac- tivity. To be of the greatest value, this knowledge must be specific, as to streets, important buildings, restaurants, hotels, and peculiar local characteris- tics. Finally, a usable knowledge of international law is helpful in securing certain individual rights and privileges and in knowing when these rights are improperly claimed. Apprehension of Espionage Agents Three ways to prevent agents and spies from accomplishing their mission are: (1) to apprehend them at the point of entry into the target country, combat zone, or specific area of interest; (2) to disclose their particular cover or disguise; and (3) to intercept their communications. The last is the most critical stage of their activities. While security controls will be considered more fully in a later section, it is appropriate here to mention that in peacetime the United States is protected against illegal entry by the Border Pa- trol, Customs and Immigration authorities, and other civilian law enforcement agencies. Because of our extensive coastline, however, complete border control is impracticable. The Soviet Union, on the other hand, maintains a much more elaborate system which includes extensive border CONFIDENTIAL 382 patrols, barbed wire, electrified fences, and cleared, plowed strips of land. In a combat area during wartime, or in a military zone, additional travel controls are enforced, such as travel per- mits, check points, both stationary and moving, curfew hours, and questioning of civilians. Other controls in a military zone are provided by defin- ing restricted areas to divert civilian traffic, pub- lishing lists of occupations available only to cer- tain individuals, and supervising civilian labor groups by military personnel. In wartime, the control of civilian signal communications and postal service is often productive. For a number of reasons, the detection of an enemy agent should not always be followed imme- diately by taking him into custody. In the first place, he will quite probably be replaced by an- other agent whose identity is not known; or already detected by another intelligence agency, he may be under its surveillance or being supplied with false information. By leaving him at large under constant surveillance it may be possible to locate his associates and superiors, to determine the true nature of his mission, which will reveal the type of information required by an enemy, and to discover his methods of communication. He may also become a means for undermining the enemy espionage system. Even if the enemy quickly realizes that he is supplying them with false information, it will lead to distrust of other agents because of the same possibility in their case, thus creating general uncertainty. Techniques and Procedures Advance warning of attempts at espionage can be gained in a number of ways. One approach is to select probable targets of a foreign intelligence service and to determine points of greatest vulner- ability. At these targets covert agents can be placed and/or a friendly informant network can be organized; in the case of the latter, it should be extended to include likely cover firms and enter- prises as well as places of possible communications. In areas where espionage activities are suspected, curtailment of the customary channels of informa- tion may force the enemy agent to take greater risks, thus increasing possibilities of detection. Planned leakage of the location of sources of sup- posedly classified information may have similar proved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002:9 CONFIDENTIAL COUNTERINTELLIGENCE results. The surveillance of suspects, identifica- tion requirements, traffic controls, and checks on communications methods, including signalling, may be productive. The penetration of foreign intelligence services is, of course, an ultimate in providing advance warning and positive clues to covert activities. The disclosure of an enemy agent's cover can be a long, painstaking, and sometimes frustrating process. In addition to stringent security controls, appropriate techniques may include investigation and interrogation, name checks, and question- naires. A. sense of discrimination must be devel- oped in order to avoid wasting time on investiga- tions of amateur or unimportant agents. Foreign intelligence services often flood a target country with large numbers of relatively ainateur agents in an attempt to overburden its counterespionage service and to divert attention from the profes- sional, specialist agents. Routine background in- vestigations and the screening of refugees and displaced persons must be conscientiously handled. A close inspection of bank accounts, financial transactions, and credit company records is often productive, and, while excellent cover methods have been perfected, as long as agents are paid or receive funds for their operations some traces can usually be found. Prompt reporting of all infor- mation and evidence is essential to successful investigation. In interrogating espionage agents, it should be remembered that they are consummate actors, of whom it is dangerous to form snap judgments on first encounter. Articles found on the suspect's person or in his quarters often provide the basis for initial interrogation leading to disclosure. While lists of contacts are undoubtedly committed to memory, there is always the possibility that the agent will have in his possession an address on a scrap of paper, photographic equipment of some type, some means of secret writing, or radio or electronic equipment. The case of Alphons Eugene Timmermans during World War II is illustrative. A young Belgian merchant seaman, he had reached England by devious means and won the confidence of the Belgian government-in- exile with a most convincing cover story. As a result, he obtained and transmitted information to the Nazis regarding American troop movements 383 and locations of British ammunition dumps, air- fields, and naval installations, among other items of interest. Eventual search of his person led to the discovery in his wallet of an envelope contain- ing pyramidon powder, some orange sticks nor- mally used in manicuring fingernails, and a piece of cotton?all essential for invisible writing. At his apartment was found a transportable radio which could be strapped around the waist as a belt. Interception of an agent's communications may be achieved by monitoring the air waves for sig- nals from wireless transmitters, mail inspection, checks on telephones and the telegraph, surveil- lance of possible couriers such as merchant seamen, raids and searches of suspected areas, and censor- ship. Many of these methods are, of course, lim- ited to times of war. The specific techniques of counterespionage, just as those of espionage, are closely guarded secrets. It is obvious that economy in this aspect of counter- intelligence can be dangerous, if not fatal, consid- ering the potential damage a single enemy agent can do and the relatively small additional effort and cost which might have defeated him. COUNTERSABOTAGE Initially at least the activities of counterespio- nage and countersabotage are similar, if not iden- tical. The mission of the enemy agent may be the collection of information or the physical destruc- tion of particular targets or both; and most fre- quently the collection of some information is necessarily preliminary to an act of sabotage. The trained saboteur, like the espionage agent, must gain entry to his target country and/or to a specific area for operations; he will employ suitable cover and disguise; and he has the responsibility of reporting back to his "home office" the results of his efforts. In the case of sabotage, however, the critical point is access to the specific target. While counterespionage, to all practical purposes, oper- ates to gain advance warning of proposed sabotage, to prevent the obtaining of information for sab- otage activities, and to discover potential sabo- teurs, countersabotage takes over those activities designed to impede or prevent the act, to reduce its total effectiveness, and through study, to strengthen preventive and security measures. CONFIDENTIAL Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 oved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS CONFIDENEL While acts of sabotage usually take place only in time of war or immediately prior to an out- break of hostilities, their planning and prepara- tion are undoubtedly begun in time of peace. In previous wars, the United States, fortunately, has been relatively free of any widespread sabotage problems; however, in the event of any future war, it is logical to assume that aggressive sabotage will be attempted on a broad scale in view of the ulti- mate decisive effects of American industrial pro- duction. Countersabotage, therefore, has assumed a greater significance than ever before, and it be- hooves the intelligence officer to be thoroughly familiar with its problems and procedures. A first step in approaching the problem of sab- otage is to determine the most likely and most vulnerable targets, such as transportation systems, industrial plants, and military installations. A second step is to select, by process of elimination, the points within particular installations or facili- ties which are most vulnerable to sabotage. For example, in an industrial plant, its source of elec- trical power and its assembly lines could be pri- mary, ultimate targets; however, if they are well protected and relatively inaccessible, the most vul- nerable secondary target, called the immediate target, might be the power lines from their source. The destruction of these lines might well neutral- ize the primary target, even though it is inaccessi- ble. A third step is to survey the potential target area to insure that the necessary physical security measures have been established and are being maintained. Careful attention must be given to eliminating any natural hazards which may be present, such as those arising from the improper stowage of combustibles, chemicals, and explosives, defective mechanical equipment, and poor sanitary conditions, in short, general plant protection. The prevention of sabotage requires security controls over information, communications, per- sonnel, critical materials, and potential saboteurs operating from within or without. General se- curity controls over information will be discussed in a later section. Since the techniques for de- tecting and apprehending saboteurs and espionage agents are similarf emphasis in this section will be on physical security measures, the application of counterintelligence techniques to cases of CONFIDENTIAL 384 sabotage, and procedures to limit damage from sabotage. Physical Security Controls and Measures The most common preventive measures for physical security are physical equipment, guards, identification systems, and the establishment of restricted areas. Physical equipment includes fencing, barbed wire, walls, alarm systems, special electronic devices, and other mechanical means. Protective screening should be placed over all vulnerable windows, ventilators, drains, or other small openings; and appropriate barriers should be constructed to prevent access from adjacent buildings, overpasses, and similarly located struc- tures. Entrances should be kept at a minimum and locked or guarded at all times. Within a target area special protection should be given to machines and equipment vital to total operation and difficult to replace, such as switch boards, pre- cision tools, transformers, regulator stations, and power terminals. Exterior lighting systems should be so designed that movement of personnel can be readily observed. In studying problems of physical security and the use of preventive equipment, it should be remembered that certain factors favor the accom- plishment of sabotage. No unprotected fence or barrier will completely prohibit entry to an area. Under cover of darkness, a saboteur who is thor- oughly familiar with his target area can move with ease, unseen and unheard, to within reach of almost any guard. Finally, with the inde- pendent choice of time and place, the saboteur has a great advantage in the element of surprise. On the other hand, he can be impeded, if not stopped, by such factors as adequate lighting, delays cre- ated by physical barriers, noise inadvertently made by him, and his own errors arising out of the emotional excitement of the moment. Guards are a supplement to physical equipment and the means of enforcing general security meas- ures. They should be well-trained, efficient, vig- orous, well-informed, and self-reliant. Patrols at irregular intervals, close attention to most vul- nerable points, and alert checking on any dis- turbances within assigned areas of responsibility are matters of efficient organization and training. Guards should not permit themselves to be drawn 111111111110111111111111111111?11W Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release266141,api,i,L,WpeE85G00105R0001002100Q2-2 uunFIDENTIAL away from their own areas or posts by commotion at another, and under no circumstances are in- dividuals without proper credentials to be ad- mitted. Materials in transit and receiving and shipping platforms must be continually guarded. The establishment of special restrictions for vital areas within an installation strengthens security controls for such vulnerable targets as power plants, experimental laboratories, transformer rooms, and arms and ammunition storage. Ade- quate fire protection, including both equipment and trained personnel, is essential to physical security. Particularly in time of war, concealment and camouflage are helpful measures. In some in- stances, vital installations are constructed under- ground to minimize the possibilities of detection; in others, camouflage is used to make important targets look like something else, or nothing at all. Various illusions are created by means of nets, paint, and the planting of trees and bushes on roofs of buildings. Techniques and Procedures Countersabotage personnel, like all others en- gaged in the intelligence activity, make use of com- prehensive files regarding incidents of sabotage, including the types of targets attacked, the equip- ment and materials used, the methods of attack, and the particular individuals apprehended. These files can be supplemented by information from fire reports of insurance companies, fire de- partments, underwriters' laboratories, and special police department files. One of the first items of interest is to determine whether or not the sabotage act is an isolated case, perpetrated by the independ- ent saboteur, or part of an organized effort directed from foreign sources. Spot reports submitted to intelligence headquarters are of material assist- ance for evaluative purposes, and up-to-date files can provide important and significant clues. Informants among civilian and military per- sonnel and friendly associations with plant super- visors and security guards can do much to strengthen all security measures. In apprehend- ing saboteurs common use is made of interrogation and investigation. The investigation of sabotage will often uncover the motive behind it. For example, a fire in a 269196-54----28 385 blueprint room may be designed to tie up produc- tion or to conceal the theft of certain prints. If the prints concern new aircraft design and pro- duction, the motive assumes greater meaning. Although the methods and the means are often readily determined, the detection of the individual is much more difficult. There is a close relation- ship between the degree of efficiency of the secu- rity measures in force at the time and the facility with which an investigation can be made. In conducting an investigation of sabotage, a common procedure is to pursue answers to the questions, What? When? How? Where? Why? and Who? While each method of sabotage requires some specialized knowledge on the part of the investi- gator, there are certain general procedures appli- cable to each. In order to establish a case of incendiary sabotage, it is necessary to know: first, the exact point of origin of the fire; second, the exact time the fire started; and third, the criminal intent to destroy. Arrival, if possible, at the scene while the fire is still burning will permit observa- tion of its extent, its intensity, characteristics of smoke, and other features which may establish point of origin and the possible use of accelerants. Maliciously damaged fire equipment and alarm systems, propped open door and windows, the out- break of fire simultaneously at several points, odors, weather conditions, and individuals at the scene may provide clues. The pyromaniac, for example, will often remain in the immediate area as a matter of personal satisfaction and evidence varying degrees of emotional excitement. How- ever, the detection of the perpetrator and the iden- tification of the case as arson or sabotage may take a considerable period of time; it is seldom that the saboteur is caught on the spot. In the event of explosive sabotage, two primary considerations are the preservation of evidence and the protection of life and equipment from further immediate damage. If a suspected bomb has been reported, or even if it has exploded, the area should be cleared of all personnel to eliminate damage from further possible explosions. In addition, all endangered utilities should be cut off, portable equipment should be moved, and guards posted around the area to prevent access by unwary persons and to deny exit to undetected and possibly suspect personnel. If an explosion CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTAProved For ReleapNeT328M91:,Ali-TNE8N,99Ap5 R000100210002-9 has occurred, an examination of the area should begin at the center of the explosion and move outward in enlarging circles in an effort to locate fragments or traces of devices which might have been used, such as pieces of pipe, portions of tin cans, wrappings of cloth, electricians' tape, rope, wire, fragments of burned fuse, pieces of detona- tors, batteries, or clock mechanism. Evidence of the type of explosive used may be drawn from the condition of objects at the scene, which in turn may establish the saboteur's source of supply. The placement of the explosive may indicate the experience of the saboteur as well as the materials and methods used. For these investigations the services of an experienced demolitions or explo- sives expert is e8sential, especially if an unex- ploded bomb is involved. Technical assistance is also required in any in- vestigation of mechanical sabotage because the tools used are usually common to the target area, there may be little physical evidence which can be studied, and the effects of its repetition on production over varying periods of time may not be readily apparent. Ascertaining the intent of a suspect may be most difficult if the damage is a result of mere failure to perform certain necessary duties. The fact that damage and destruction may be caused by the independent saboteur who has no connection with a foreign service poses extremely difficult problems since such acts will be disorgan- ized and unrelated. However, as a general rule, this type of sabotage is less effective and less dan- gerous to national security than that which is conducted by organized, large scale operating groups. Certain weaknesses of such groups com- bine to assist countersabotage personnel in their work and should be considered as important guides in tracking down saboteurs. Their opera- tional program, for example, tends to fall into definite patterns. Previous success with partic- ular methods will usually result in their repetition and reduces any initiative to utilize new methods. As in the case of espionage agents, communica- tions between sabotage groups and their superiors are a continuing source of weakness, saboteurs may become double agents for personal motives, and accidental exposure may result from personal indiscretions. CONFIDENTIAL 386 Reduction of Sabotage and Its Effects From the countersabotage point of view the apprehension and conviction of one saboteur is less important than the discovery and destruction of the organization of which he is a part. Since a study of sabotage incidents usually reveals weak- nesses in security controls, an important objective is the strengthening of those controls and the de- velopment of new countermeasures to prevent the repetition of similar incidents. Those engaged in countersabotage activities should ask themselves these questions: At what point would a single act of sabotage most seriously affect the operations of this installation? If I had the mission, as a saboteur, to knock out this area what would I con- sider to be the points of greatest vulnerability? The explicit answers to these questions will go far toward the reduction of acts of sabotage and their total effectiveness. C:OUNTERSUBVERSION Difficult as are the problems of countering espi- onage and sabotage, they can be related to specific areas of information or to physical targets both of which are tangible and capable of identification and protection. In countering subversion, how- ever, Intellige ace is dealing with the intangible attempts to capture and manipulate men's minds, and there may be no obvious critical point at which subversion becomes a clear and present danger. Countersubversion, therefore, becomes a study of symptoms of subversive thought and action and a development of aggressive countermeasures on a broad front which must be prosecuted by many social, military, and political agencies whose activ- ities are not always closely coordinated. The suc- cessful application of countermeasures depends in large part on the ability of countersubversion personnel to identify accurately preliminary sub- critical points such as the consolidation of Com- munist power in various organizations, increasing influence over leadership, the tempo and direction of propaganda efforts, and the effectiveness of agitation as demonstrated by strikes and coordi- nated group attack on the constitutional order. Any discussion of countersubversion must rec- ognize at the outset the substantive nature of the basic problem as well as the fact that its current activities are in a period of definition and develop- Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-NFIDENTIAL 9. COUNTERINTELLIGENCE uO ment, as explained in the section on psychological operations in the preceding chapter. Countersub- version must begin with an analytical study of Communist activities in every form, and particu- larly of reputable disclosures of their aims and methods of operation. A clear understanding of the nature of Communist subversion is also essen- tial to the development of appropriate counter- measures which will accomplish their intended purpose without becoming repressive and de- structive of the institutions they are designed to protect. This problem was clearly stated by former President Truman in a message to the Congress in August 1950: We face today, as we have always faced in time of international tension, the question of how to keep our freedom secure against in- ternal as well as external attack, without at the same time unduly limiting individual rights and liberties. Mr. Truman continued by pointing out that the best deterrent to subversion is: A vigorous, functioning democracy which succeeds in meeting the needs of its people. A vigilant people, who exercise their demo- cratic rights to keep their government active in the interests of all, can defeat the efforts of Communists to attain electoral power. Measures to Counter Subversive Activity Measures for countering purposes require: first, an identification of specific aims and methods of the subversive effort; and second, procedures aimed directly at countering them. One double-edged Communist objective is to become identified with democratic idealism, liberal and reform groups, and any dissident elements desiring change, and thus to undermine, corrupt, confuse, and destroy public confidence in the established constitutional order. Once this procedure has been discovered and localized, a series of related countermeasures must be undertaken to expose this objective and destroy it by means of full and accurate informa- tion disseminated to the particular groups affected. The general measure is a program of information and education, implemented by other related spe- cific measures. Truth has always been the surest weapon in the long run to defeat secrecy, deceit, and evasion, and the practices of communism can- not withstand the clear view of public observation. 387 Indeed, it would appear that the staunchest sup- porters of the philosophy of communism are those who have never lived under its rigid political sys- tem. This countermeasure of information and education might well be implemented by exposure of Communist double-talk, specifically Communist connotations of democratic terminology to mean something entirely different, and the positive iden- tification of Communists within an infiltrated group. In employing their organizational method of subversion, the Communists of necessity endeavor to conceal their bid for power. A countering meas- ure to this method is the identification and isola- tion of the organizational targets involved, coupled with a mobilization of anti-Communist groups within it to expel the subversives. In the case of Communist front organizations, means of iden- tification were suggested by J. Edgar Hoover, Director of the FBI, in his testimony before the Committee on Un-American Activities in March 1947: There are easy tests to establish the real character of such organizations: 1. Does the group espouse the cause of Americanism or the cause of Soviet Russia? 2. Does the organization feature as speakers at its meetings known Communists, sym- pathizers, or fellow travelers? 3. Does the organization shift when the party line shifts? 4. Does the organization sponsor causes, campaigns, literature, petitions, or other activities sponsored by the party or other front organizations? 5. Is the organization used as a sounding board by or is it endorsed by Communist- controlled labor unions? 6. Does the organization receive consistent favorable mention in Communist publi- cations? 7. Does its literature follow the Commu- nist line or is it printed by the Commu- nist press? 8. Does the organization present itself to be nonpartisan yet engage in political ac- tivities and consistently .advocate causes favored by the Communists? 9. Does the organization denounce Ameri- can and British foreign policy while al- ways lauding Soviet policy? 10. Does the organization utilize Communist "double talk" by referring to Soviet- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS dominated countries as democracies, complaining that the United States is imperialistic and constantly denouncing monopoly capital? 11. Have outstanding leaders in public life openly renounced affiliation with the or- ganization? 12. Does the organization, if espousing lib- eral progressive causes, attract well- known honest patriotic liberals or does it denounce well-known liberals? 13. Does the organization have a consistent record of supporting the American view- point over the years? 14. Does the organization consider matters not directly related to its avowed pur- poses and objectives? Supplementary countering measures to further isolate the target and to motivate appropriate in- ternal forces will vary according to the nature of the target itself, just as do the methods applied by the Communists. Whatever the particular ap- proach, on the basis of evidence gathered, the basic loyalties of reliable members must be stimulated into action to set their own house in order and to administer their own countersubversion activities. Depending upon the seriousness of the circum- stances, they may find it necessary to resign, or possibly to fight to regain control. The impor- tance of an internal attack on subversive influences cannot be overemphasized; countermeasures by formal opposition external to the target may result in strengthening rather than destroying the power of the subversive elements. Since an organization's leaders, whether at the top or on lower echelons, are expected to maintain the established order and to protect the status and integrity of the associated membership, their ag- gregate and individual influence is tremendous. In commenting on Communist use of such influ- ence, J. Edgar Hoover, in his article, How, To Fight Communism, written for Newsweek in June 1947, said: . . . in one union with nearly 100,000 mem- bers, 500 party members were able to control the union. Another union with 8,500 mem- bers sought to free itself from Communist control but failed despite the fact that there were less than 200 party members in the union. In one instance a single Communist by clever manipulation at a union convention was able to dictate resolutions adopted by the convention. CONFIDENTIAL 388 The radicalism or persistence of leadership will sometimes give evidence of its subversive and in- dicate the degree of crisis within the controlled group. Where Communist trained leadership is involved, the countermeasures of identification, isolation, and in formation may assist in uncover- ing its deception and deceit. Outright replace- ment then becomes a countermeasure to be adopted internally. In the case of group leaders who have become sympathizers and collaborators, guidance and reorientation may be a useful countermeasure. Appropriate guidance must encourage a self- clarification by these group leaders of their own position and responsibilities and point out actual Communist methods used to manipulate other leaders for Communist objectives. Supplementary countermeasures to strengthen leadership before it has been attacked are important from a protec- tive security point of view. In the modern war of subversion there may well be a subtle competi- tion for power through an unsuspecting leader- ship; countersubversive measures must be aimed toward winning that competition by encouraging and strengthening leadership. An intermediate subversive method of the Com- munists is to infiltrate organizations, not for the purposes of domination and control, but rather to use non-Communist groups as the means for ac- complishing either general or limited purposes external to these groups. Success in this method is achieved when Communist aims become iden- tified and unified with those of non-Communists; and the problem becomes one of collaboration. Countermeasures for this subversive effort must begin with a program of education and informa- tion, but must be further refined and directed to- ward the affected group, reorienting some and iso- lating others. The primary effort, of course, should be directed toward the collaborators rather than the infiltrators. According to Mr. Philip Selznick in his book, The Organizational Weapon, an examination of Communist strategy in subversive activities will reveal that two sources of strengths are, first, the historic credibility of Communist doctrines and objectives, particularly when associated with the growth of the Soviet Union, and second, the estab- lished constitutional processes of democratic so- ciety which protect and encourage the rights, Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE privileges, and freedoms of the individual both singly and in organized groups. The inevitable imperfections of the democratic society are seized upon by the Communists who offer in their place glittering promises and happy easy solutions. Therefore, above and beyond the successful coun- tering of the specifics of Communist subversion there must be a continuing conscientious effort to find solutions to troublesome social issues of mod- ern times. Such solutions can come from the active consecrated devotion of a united, informed cit- izenry to the American way of life. Drawing upon their own moral and spiritual strength, Americans can, in the words of J. Edgar Hoover, "make our democracy so strong and so workable that the Communists can never compete with its reality." He goes on to say that this can be done without any "abridgement of civil liberties." This discussion of measures to countersubver- sion is based in part on and considerably amplified by a chapter entitled "Problems of Counter- offense," in Philip Selznick's The Organizational Weapon. Techniques in Countersubversion All of the techniques already mentioned have utility in the field of countersubversion. From the naval point of view the orderly processes of analysis and recommendations for action are im- measurably aided by means of comprehensive files, special studies, and effective liaison with appro- priate governmental agencies. Suspect and sum- mary cards, topical cards, all carefully and completely cross indexed, permit the accumulation of information and ready reference to any item of possible interest. Reference and background material on organizations, groups, trends, and situations which may have no immediate use often provides important clues and gives fuller meaning to later developments. Periodic and special studies of subversive trends can give warning of specific dangers and suggest the use of effective techniques and measures. Liaison between the various agencies engaging in countersubversion activities is extremely valuable in assuring co- ordination of effort and in pooling information of common interest. The intricate, diverse, and delicate problems of subversion require a full arsenal of countering 389 CONFIDENTIAL techniques. In considering these problems, to- gether with those of espionage and sabotage and the techniques and measures of countering them, it is not inappropriate to suggest that a good coun- terespionage operator must first be a good spy, a good countersabotage agent must first be a good saboteur, and good countersubversion personnel must first be skilled in the arts of subversion. GENERAL SECURITY CONTROL MEASURES From the preceding discussion it has become increasingly apparent that protective measures and devices for classified information, vital equip- ment, installations, and personnel are essential aids for detecting, deterring, or preventing for- eign-sponsored activities inimical to the best in- terests of the United States. Such measures and devices are called security control measures and may be either physical or procedural. Physical security control measures have already been enu- merated; procedural measures include secrecy discipline, document security, communications se- curity, censorship, and personnel security pro- grams. Just as physical measures are effective only when backed up by alert, well-trained guards, procedural measures are effective only when en- forced by all personnel associated with the agencies involved, whether military or civilian. There- fore, while counterintelligence prepares recom- mended procedures and specific groups are assigned to direct their enforcement, the purposes of security control measures and the consequences of their failure must be completely understood by all individuals concerned. This, of course, is a matter of specific training and realistic education; it is by no means a mere formality. Secrecy Discipline is the training of individuals to safeguard rigidly and consistently any and all classified information or material known to them or in their custody; it relates to the dissemination of that information or material only to authorized persons. The human hazard to security is uni- versal and perhaps the greatest single vulner- ability with which counterintelligence must con- tend. The ignorance, conceit, pride, faith, and enthusiasm of individuals become tools in the hands of an enemy, for people are prone to talk and those who are untrained may quite unwit- tingly disclose valuable bits of information. Care- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR less boasting arising out of conceit can become an excellent source of information through which almost any known facts can be gained by the patient, encouraging listener. Ignorance either of the potential value of specific information or of the subtle methods employed by a skilled enemy can be highly damaging; while faith and confi- dence in family or friends have often resulted in the ultimate transmission of vital facts. There- fore, training must both identify and stress the importance of classified information and those who have need to talk about it must use the utmost discretion. The human hazard necessitates strict measures in the dissemination of classified infor- mation: only those who require it should have full knowledge; others should be given only limited access to the extent needed in their work. The basic problem is not one of loyalty so much as the hazard inherent to any conversation. As an aid to the recognition of important items of information or material, appropriate classifica- tion is assigned to each in the manner described in chapter 11 and the procedural methods for han- dling are indicated by the classification. This measure is known as Document Security and covers such items as correspondence, reports, studies, blueprints, photographs, publications, specialized equipment and other significant ma- terials. The problem is the assignment of a clas- sification which is appropriate to the items con- cerned, and the greatest care must be exercised to achieve the proper degree of classification. Overclassification can become a danger and a haz- ard in itself, weakening procedures for enforce- ment as well as the respect of individuals who are responsible. Those concerned with document se- curity may find it helpful to ask themselves the question, "Will this information or material be of value to an enemy and how valuable may it be ?" The importance of effective document security can perhaps be more fully appreciated when it is remembered that high value is placed on captured enemy documents as a source of information. Just as the transmission of information by an espionage agent represents a point of critical vulnerability for him, so likewise it is a vulner- ability for any military or civilian agency. Signal Communications Security, therefore, covering all types of electrical transmission, is a vital control CONFIDENTIAL 390 NAVAL OFFICERS measure for the safeguarding of information by means of codes and ciphers and the protection of the cryptographic devices or systems employed in connection with them. Increasing dependence on radio to transmit information between far-flung units and their headquarters has increased the pos- sibilities of interception and hence the importance of message security. The encoding of classified messages has become customary, with a possible exception in time of war when the urgency of the information and the fact that an enemy would not have time to act upon it permits transmission in plain language. Censorship, both civil and military, is normally a wartime control measure applied to the trans- mission of information or material by unofficial means such as letters, photographs, packages, news releases, cable, and radio. From past expe- rience it has been found that personal correspond- ence and diaries can be rich sources of information to an enemy regarding such matters as the location and strength of military units, troop, and ship movements, morale, weather conditions, opera- tional planning, and new weapons, equipment, and procedures. From the point of view of military censorship, unauthorized disclosures can be re- duced if not eliminated by successful secrecy dis- cipline and a clear understanding by all personnel of the reasons why censorship is necessary. In this way many innocent subterfuges to evade the regu- lations can be forestalled and the workload light- ened for those who must enforce them. Censor- ship not only operates to deny classified informa- tion to an enemy but also to collect information of intelligence value and to detect illegal covert enemy operations; therefore, as a source of new information it is more than a protective and pre- ventive measure of security. It is also a valuable counterintelligence device for making spot checks on suspect individuals and groups and it provides a means for intercepting their communications and examining them for secret inks or writings. It follows, therefore, that censorship personnel must be trained and. highly endowed with the qual- ities of good judgment, discrimination, and perspicacity. Since the success of all security control meas- ures, whether physical or procedural, is dependent upon the people 'Involved, it follows that Personnel Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL Secwrity control measures are basic and funda- mental, for the best training and the most impene- trable barriers will have little effect if disloyal, indiscreet, or emotionally unstable persons hold positions where vital material is available. Per- sonnel security, therefore, must be a comprehensive and pervasive measure applied with equal effec- tiveness from the various levels of government, through the military forces, to industry and its related services, wherever classified information and material are involved. This measure in- cludes investigation of all individuals holding sensitive positions or having access to vital infor- mation and the issuance of official security clear- ances, but it should be emphasized that counterin- telligence is responsible only for the investigative aspect. Official clearance is the responsibility of the military commander or the head of the Gov- ernment agency, as the case may be. In reaching a decision for security clearance the responsible authority must carefully weigh the security risks inherent to the position, his own knowledge of the applicant, and the facts presented by the investi- gation. In addition to military personnel and employees of various governmental agencies, clear- ances are required for individuals employed by contractors bidding for and carrying out military and Government contracts which relate to classi- fied material. The magnitude of the task of agencies responsi- ble for personnel security is indicated by a report of the FBI published in 1952 that over 31/2 million loyalty forms were completed in the 5-year period following 1947 when the loyalty program of the United States Government was undertaken. Dur- ing the fiscal year 1951-52, the report continues, more than 800,000 investigations into the loyalty of Government job applicants or employees were made. While decisions to issue clearances some- times present difficult problems requiring the most careful judgment, it may be accepted that they will not be granted by a military commander to individuals whose background investigations re- veal certain unfavorable facts. Such facts would include seditious or treasonable public statements, association with foreign agents or acts related to sabotage or espionage, affiliation or sympathetic association with subversive organizations, a record of security violations, an established history of 391 serious mental or emotional instability, or positive indications of basic weaknesses of character or substantial and continued lack of good judgment. A successful personnel security program will in- sure that loyal and discreet people have been em- ployed to fill all positions related to or concerned with classified material; on this basis the possi- bilities for the success of other security control measures will be tremendously increased. THE INVESTIGATIVE FUNCTION A general discussion of the important function of investigation which relates to many types of countermeasures involves consideration of the in- vestigator and the techniques he may use or have at his disposal. A number of the special personnel attributes already mentioned are applicable of course to the general investigator. Others of his professional requirements are gained through re- search, study, and practical experience. Apart from specialized forms of interrogation such as used in collecting information from prisoners of war, most of the counterintelligence techniques are related or subordinate to that of investigation. The Investigator, His Sources, and Personal Qualities In their book, Specific Procedures for Investi- gations in General, Frary and Sullivan summarize the qualities of an investigator as follows: . . . the foundation upon which a successful career in investigation is based comprises com- mon sense, good judgment, good health, aver- age mentality, accurate observation, the ability to factually report one's observations, and the attribute of a well-developed fund of general information. If the above are present and coupled with the basic qualities of any normal, good-living individual such as honesty, sincerity, integrity, discretion, etc., then the foundation for his training is adequate. He is neat and well groomed but not conspicuous, blending into whatever group he joins. He is pleasant, polite but not ingratiating, poised but not overbearing. Placing a high value on his reputation, he is discreet, avoids gossip, and care- fully protects the identities of his confidential sources. With supple skill, he adjusts his train CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS and pace of thought to that of the person with whom he is dealing, drawing out critical facts with apparent casualness and sorting the signifi- cant from the incidental as he goes. He makes certain that he is properly equipped to carry out his assignment, including possession of appropri- ate credentials. Before starting a case, the investigator makes a thorough analysis of it and all pertinent material already assembled; he plans his approach in order that his time may be employed to maximum effec- tiveness. Methodically building his case, he is objective in his approach, follows wherever the facts lead, and never tries to fit the facts into preconceived conclusions. He keeps a careful record of progress, aware that the use of a note- book is his best assurance that all leads have been covered, that it will serve to refresh his memory if called upon as a witness at a trial, and that it may prevent him from falling victim to an un- scrupulous opponent. In successfully handling his assignment, he is materially aided by his accu- mulated knowledge, by his exploitation of po- tential sources of information, by his practical understanding of human behavior, and by his ca- pacity for accurate observation and reporting. The most easily accessible sources of informa- tion on individuals, organizations, or incidents under investigation are records and files which provide original information as well as corrobora- tion for or explanations of facts already known. Public records are available at the local Bureau of Vital Statistics, the Registry of Motor Vehicles, the Selective Service headquarters, the Police and Post Office Departments, public welfare and social agencies, Registries of Deeds and of Probate, offices of Clerks of Courts, the Veterans' Administration, the United States Employment Service, and the local offices of the Treasury Department: Customs, Immigration, and Naturalization. Public librar- ies are excellent sources for both general matters and specific items of fact such as may be found in business and city directories and statistical studies. Records of private organizations may also be made available on a confidential basis to representatives of governmental agencies for official purposes. Such records are those of banks, bonding com- panies, credit investigation agencies, fraternal CONFIDENTIAL 392 organizations, educational institutions, hotel asso- ciations, labor unions, hospitals, manufacturing and business enterprises, newspapers, telephone and t elegr a p h offices, and transportation companies. People are also valuable sources of information about subjects under investigation. In cases in- volving persons, for example, there are those with whom the individual has been associated: club members, neighbors, employers, friends, each of whom has formed impressions from a variety of connections. The investigator will make a particu- lar effort to cultivate and develop a wide range of personal acquaintances who, on the basis of f riendly cooperation, will be glad to furnish any pertinent available information either voluntarily or when asked. Such acquaintances, known as contacts or informants, are likely to be most help- ful and productive of important leads in a case. It has been estimated that about 95 percent of all crimes are solved by informants?someone who saw something, heard something, or experienced something he was able and willing to report. Such persons are not necessarily in important positions; rather they are 'Individuals who for one reason or another have opportunities for observing signifi- cant incidents in ordinary daily life. The news- dealer and cigar-store proprietor on a busy down- town intersection meet hundreds of passersby daily, become acquainted with many of them, and, during the regular course of business, are present where happenings of potential interest may tran- spire. The milkman and the postman in suburban areas have excellent opportunities to observe the daily lives of those in the communities they serve, as do the filling station operator, the barber, the hotel waiter, the bellboy, and the bus or trolley operator. Secretaries for executives and clerical supervisors can also be of invaluable assistance. Recognizing the importance of people as sources of information, the experienced investigator will have a ready knack for making friends and a genuine interest in people as individuals. The full utilization of personal contacts or in- formants, as well as the intelligent analysis of the individual under investigation, logically requires a practical understanding of psychology and hu- man behavior Such understanding is useful in Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL forming hypotheses to explain certain actions of individuals, in interviewing contacts or interro- gating suspects, and in drawing out information from those who possess knowledge of certain facts. Abnormal psychology is a subject of practical study. According to Dr. Harry SOderman, one of the authors of the authoritative text, Modern Criminal Investigation: Every good detective should have a general knowledge of mental illnesses and constitu- tional abnormalities of the mind. In the course of his investigations he will often meet persons whose actions and motives may seem puzzling to him if he is not equipped with some knowledge of psychiatry . . . A knowledge of the signs and symptoms tending to prove mental illnesses is, of course, necessary. Familiarity with the personality make-up of neurotic persons, of epileptics and hysterics, should be of particular interest to the interrogator, as these conditions often affect suspects as well as witnesses. An individual who is not insane in. the true sense of the word, but who nevertheless shows great divergence in character and emotional reactions from those of a normal person, may be classified as a 'psychopathological person. The intelligence of such a person is often quite satisfactory and at times highly developed. However, it exercises entirely too little control over his actions, which, instead, are gener- ally influenced by compulsive emotional reac- tions . . . Among these persons we encounter many criminals. Of the many other practical items of knowl- edge about human behavior, two merit special men- tion. The first is the surprising degree of uni- formity in thoughts and reactions to a common situation, in spite of the numberless differences in human personality. In The Art of Detection, Jacob Fisher points out the source of strength which the predictable sameness of human behavior represents for the investigator. By way of illus- tration, he cites the multiple-husband racket car- ried on by a large number of women during World War II in order to obtain dependency allotments from their husbands whom they met and married just prior to the latters' movement overseas. This wartime activity was new to the women involved . . . Nevertheless each of thousands of women in every part of the United States thought up a scheme for some easy money, never dreaming that it paralleled almost 393 exactly the illegal schemes of thousands of other women. The second is the wide divergence in the capac- ities of human beings to observe and report accu- rately what they see, hear, smell, feel, and taste. All knowledge and experience come to the indi- vidual, of course, through the various sensory organs. Since sensory perception is not uniform among human beings, it may be expected that sev- eral reports of a single factual situation will dis- agree. Furthermore, physical objects and specific situations may evoke a variety of responses because of past experiences which result in a perceiving of things not as they are but as the individual thinks they ought to be or in a form in which he perceived them on prior occasions. This problem of accurate perception is one which the investigator must solve in his own case. He himself must be able to observe and report accurately and be prepared to interpret the factual significance of reports received from others. Frary and Sullivan, in their book already quoted, have this to say: . . . there is no phase of investigative work which is not dependent completely upon an in- dividual's ability to observe and describe. For example, when an investigator is interro- gating a subject, interviewing a witness, or evaluating an informant's information, he is constantly observing that person for the pur- pose of detecting any indication of falsehood or any error in observation; when an investi- gator is conducting a surveillance it is obvious that his powers of observation must be com- pletely and constantly employed, for it is im- possible to "shadow" a man and not closely observe him. Realizing that inaccurate reporting can arise also from forgetfulness or an inability to describe what has been perceived, the investigator must take steps to correct any such personal deficiencies. The latter difficulty necessitates careful study in order that he may correctly interpret the meaning of what he observes. Frequently he is called upon to describe individuals, their characteristics, or peculiarities in their methods of operations. He is expected to reconstruct in detail the physical scene of an incident. No less important is his ability to recognize when he himself is under observation. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Determination of Techniques in Investigation The particular techniques employed will depend upon the nature of the investigator's case, and his plan of attack will he derived from a careful anal- ysis of the problem. Security investigations, in general, concern individuals or situations. The former are investigated to determine suitability for a security clearance. The latter concerns a specific, suspected threat to security or the viola- tion of a federal law by a person under naval jurisdiction. A personnel security type investigation is ap- proached as a general inquiry into an individual's background. Ordinarily, at the outset there is no suspicion that the subject is a wrongdoer. A per- sonal history statement provides the starting point for an independent inquiry, including checks of the various record and file sources already men- tioned. The collection of data and the scope of the investigation depend upon the sensitivity of the work to which the individual may be assigned, and the investigation is conducted to provide in- formation for some naval commander for whom the individual will be working. An investigation into a situation believed to be a threat to security is undertaken to develop in- formation for use by a naval commander in safe- guarding his command. Usually a particular in- cident has occurred and is the impetus for the start of the investigation which proceeds to collect evi- dence that will prove or disprove the existence of a threat to security. For this type of case, and also for the case where the investigator is gather- ing facts concerning the possible violation of a Federal statute, there is an eventual possibility that the investigation may result in a legal pro- ceeding either under the Uniform Code of Military Justice or under rules of a civil Federal court. Therefore, the investigator not only has the task of assembling data for the naval commander con- cerned, but also he must collect and preserve data in accordance with the special requirements posed by the rules of legal evidence in order that the facts ascertained may be admissible in a formal court proceeding. Technical Aids and Equipment When determining suitable techniques, the in- vestigator also should be aware of the technical CONFIDENTIAL 394 equipment and scientific aids available for his use or assistance in the development or confirmation of information. Electronic equipment, much of it portable and easily concealed, permits hearing and recording conversations without detection. For example, specially designed microphones placed against a common wall will amplify con- versations in an adjoining room sufficiently to be heard plainly; such conversations can also be re- corded. Other equipment will facilitate the survey of offices and conference rooms to determine whether or not enemy agents have installed de- vices for broadcasting or recording purposes. While equipment has also been perfected for tap- ping telephone lines, the Federal courts have ruled that conversations recorded by such means may not be received as evidence. In connection with scientific aids, the investi- gator's responsibility is to understand their capa- bilities, to be able to explain to the technician the information desired, and to know where such aids can be obtained to assist him. Because of their specialized nature, the general naval investigator should rarely attempt to use them himself; rather he should make use of equipment and trained per- sonnel available at the Office of Naval Intelligence in Washington, at the District Intelligence Offices, and at other specified locations in the field. The Physical Security Equipment Agency located in Washington maintains equipment for investiga- tive work and loans it to the Armed Forces. Also, through established channels, the technical serv- ices of the FBI and State police organizations may be utilized. While scientific techniques and lab- oratory examination can provide invaluable as- sistance in the development of information, it must be remembered that they can never replace the trained investigator or his personal efforts in lo- cating and interviewing witnesses, evaluating, and. integrating factual evidence. Some of the more important forms of scientific analysis are microscopy, spectrography, firearm identification and ballistics, fingerprint identifi- cation, document examination, and specialized photography. Microscopy, called the bulwark of scientific investigations, involves the examination of minute particles of physical evidence such as paint, dust, soils and minerals, human hair, blood and other stains, coal dust, and ashes. Spectrog- Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL raph,y is the science of measuring the wave length of a substance. Every substance has a character- istic wavelength, which, to a laboratory technician, is the equivalent of a fingerprint of that substance. Firearm identification and ballistics, utilizing comparison miscroscopes and helixometers, pro- vide a scientific means for determining that a par- ticular weapon fired a particular missile. Bullets and fired cartridge cases are therefore important bits of evidence for scientific investigation. Exhaustive research has led to the conclusion that no two persons have identical fingerprints. Therefore, identification by a qualified fingerprint examiner is generally accepted as conclusive proof of the identity of an individual. The FBI main- tains an ever-expanding master file of millions of sets of fingerprints which it will search upon re- quest by any proper law-enforcement agency. To satisfy the requirements of the FBI for positive identification, additional fingerprint cards sub- mitted for filing are accepted only if there is furnished a complete set of suitable impressions of all fingers and thumbs. Nevertheless, some- times single fingerprints may serve as important clues in the solution of a crime and the investigator should have a general understanding of finger- print characteristics and procedures for locating and preserving them. Subjects analogous to fin- gerprints include the identification of footprints and tire tracks, all of which require special study and training on the part of the investigator. Document examination is a technical specialty in scientific analysis which involves the identifica- tion of handwriting and typewriting, the use of inks, and the analysis of the characteristics and age of paper and other writing materials. Pho- tography has many specialized applications in the field of investigation both as to types of equipment used and as to the use of photographs as evidence. The investigator must be familiar with the capa- bilities of ultraviolet and infrared photography, for example, and understand that to be admissible in court, photographs must be inherently truthful in what they portray. Surveillance An important and productive technique in in- vestigation is surveillance. This consists of ob- serving a person, a place, or a vehicle for a given 395 period of time in order to obtain specific informa- tion. Illustrative purposes of this technique are: to maintain a continuous watch on a particular person; to identify all individuals associated with the enterprise or activity under investigation; to prevent an illegal act or to apprehend the indi- vidual attempting it; to locate the headquarters and meeting places of suspect organizations; to determine means of communication employed by subversive groups; to obtain factual data about a person for later use in interrogation; to check the accuracy of reports submitted by informants; to locate the hiding places of stolen property or contraband. Although often producing valuable results, sur- veillance may be expensive in time, money, man- power, and equipment required; hence, careful ad- vance planning is required after a decision has been made that the probable results justify the effort. Because surveillance can seldom be suc- cessfully conducted by a single investigator, the ABC, or three man team, method is often utilized. The basic team positioning is for A to follow behind the suspect individual, with B behind A, and C abreast and across the street from the sub- ject. C is thus in a position to signal the subject's movements if the latter is lost to the view of A and B. This team method permits the frequent exchange of positions to minimize risks of detec- tion and makes possible a continuity of the sur- veillance even when one of the team is required to drop out for any reason. This technique has many exacting requirements. Each member of a team must have an appropriate convincing cover story should he be challenged. Signals must be prearranged, together with special means of communication with the home office. If vehicles are required, it may be desirable to use rented cars, changing them as necessary, or to pro- cure license plates which cannot be traced. Care- ful study must be made of the geographic area to facilitate easy and unobtrusive movement. The subject himself must be intensively studied both as to his physical characteristics and as to his normal daily routine and habits. Depending upon the time element, a relief team must be made available, capable of taking over smoothly and inconspicuously. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS There are an infinite number of problems which can develop during a surveillance and only train- ing and experience can assist in their solution. Indicative of the problems are the movements of a suspect into buildings, elevators, telephone booths, theaters, and buses, trains, or subways. It is possible that the suspect will sense the fact that he is being followed and deliberately attempt to escape, or he may have a second party specifically employed to watch for and identify surveillants. He may confront the investigator and demand an explanation. These hazards may be overcome by avoiding direct eye contact with the subject, by eliminating signs of recognition between investi- gators, by training the investigator to be com- pletely casual and natural. Patience is an out- standing requirement; the investigator must be prepared to walk and to wait for long periods of time, sometimes in physical discomforts, always observing carefully and taking notes wherever possible. The activity of surveillance is both a severe physical strain and a stern test of the ability to concentrate. This technique, however, is only a means to an end. Consequently, its results must be evalu- ated progressively in order to determine its con- tinuing value or the advisability of shifting to another technique which may be more productive in the time available. The Interview The Interview, an indispensable technique which plays some part in almost all investiga- tive work, is a direct method of obtaining infor- mation. Its rules are based on the assumption that the environment is voluntary and that the conver- sation with the person being interviewed has as its purpose the providing of helpful information on a particular subject. Whenever possible, the in- vestigator should plan his approach in advance as a time-saving device and to keep control of the discussion. However, he should never attempt to force the conversation and so prevent the person being interviewed from relating in his own way all that he knows; nor should be suggest possible answers to questions asked. Of importance is an accurate appraisal of the person interviewed in order to establish a pleasant open atmosphere. CONFIDENTIAL 396 Courtesy and tact are invaluable attributes. Above all, the investigator should suppress per- sonal feelings of bias or prejudice and maintain an objective point of view. It is here that a practical knowledge of psychology and a facility for friendly directed conversation have special value. Interrogation The distinction between an interview and an interrogation is an important one to make. The former involves the questioning of a person who is either willing to provide information or at least passively neutral in his attitude; the latter con- cerns a person who is either suspected of an offense or unjustifiably is holding information in his pos- session. The difference becomes a matter of de- gree, depending upon the intensity of the conver- sations and the attitude of the subject toward providing the desired information. A distinction also exists between interrogation of prisoners of war and interrogation of persons involved in security and criminal investigations. Usually, the technique of interrogation is one of the last to be used in connection with investi- gation because its effectiveness often depends upon the prior collection, by other techniques, of suffi- cient data to give the interrogator leads for ques- tions and facts to verify statements made. Inter- rogation also may result in admissions by the sus- pect, followed by a full confession first given orally and then reduced to writing. Criminal interrogation calls for a high degree of skill, a wide experience, and a keen insight into human personality. Well done, the interrogation often can provide a solution to the investigation; prematurely attempted or ineptly handled, it can result only in the recalcitrance of the subject and a dissipation of the strength of psychological fac- tors involved. Interrogation is a technique which requires detailed study and should be undertaken only by specially trained personnel when its employment seems justified. In his practical book, Lie Detection and Crim- inal Interrogation, Fred E. Inbau stresses the im- portance of the environment for the interrogation and the approach of the interrogator who must make proper utilization of principles of psychol- ogy. A suitable and strictly private room for Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002:1 COUNTERINTELLIGENCE uuNrIDENTIAL interrogation with no more than one or two inter- rogators present is essential because of the fact that people instinctively are sensitive about speak- ing frankly of their actions and motivations in the presence of a, group of observers. The room itself should contain no distracting features such as pictures or wall decorations; however, it should be equipped with concealed recording equipment and a one-way mirror through which an observer can follow the proceedings and corroborate them if required. An interrogation should never be con- ducted in a location where the subject feels confi- dent or superior, such as his own home. The particular approach of the interrogator will, of course, depend upon the data he already has assembled and the personality of the suspect. In general, according to Inbau, the suspect must be convinced that the interrogator is merely seek- ing the truth and in no way relentlessly attempt- ing to force a confession. Based on this objective, the language used should be easily understand- able; harsh, uncompromising words should be avoided. For example, "kill," "steal," and "con- fess" should be replaced by "shoot," "take," and "tell the truth." At the outset, it is often desir- able to ask non-sensitive, routine questions as a means of conditioning the subject to answering and to his surroundings This procedure also en- ables the interrogator to size up the suspect and to determine the best approach to the critical phase of the interrogation. When the guilt of the person involved is rea- sonably certain and the primary purpose of the interrogation is to obtain an incriminating admis- sion or a full confession, the interrogator may adopt an attitude of sympathetic understanding if the suspect shows feelings of genuine remorse or mental anguish. On the other hand, for those who have no such feelings, the practical, cards- on-the-table approach may be more suitable in order to show the subject that other evidence of guilt exists. If guilt is doubtful or uncertain, the interrogator must, in the words of Inbau, "feel his way around," seeking to detect deception and searching for positive clues of guilt or innocence. Such clues may be derived from inconsistent state- ments, signs of physical uneasiness, inadequate explanations, and attempts to lie. 397 The Polygraph Properly associated with the topic of technical equipment, the polygraph or lie detector is men- tioned at this point because of its frequent use in connection with interrogation as a means of dis- covering deception. This instrument records and measures the physiological changes induced in an individual by his emotional response, usually in- voluntary, to questions addressed to him. Rela- tive changes in blood pressure, rapidity and ampli- tude of pulse, variations of the respiratory pat- tern, and minute changes in the conductivity of the skin are detected and recorded on graphs. While the operation of the physical equipment is relatively simple, the interpretation of the result- ing charts is highly technical, requiring not only specialized training and extensive experience, but also complete integrity on the part of the tech- nician. The Careless, over-anxious operator who attempts to prove more than the equipment is capable of proving can produce interpretations and reach conclusions which are completely un- warranted. The investigator, therefore, must be aware of the capabilities and limitations of the polygraph and recognize that its results are dependent upon the skill and ability of the operator. Based upon the experience of the scientific crime detection laboratory at Northwestern University, it has been estimated that out of every 100 subjects tested, a competent polygraph examiner can make an accu- rate and definite diagnosis for about 75 to 80. The chief source of error is a failure to detect decep- tion by a guilty person rather than the misinter- pretation of the record of one who is innocent. Properly used, the polygraph makes possible greater accuracy in the detection of deception and has a decided psychological effect in inducing guilty persons to confess. At times this equip- ment can be employed as an initial technique in investigations involving several suspects. By such means it is often possible to eliminate the inno- cent, with a considerable saving in total time in- volved in the solution of a case. Legal Evidence In any investigation which may result in court action, the investigator is responsible for obtain- ing and protecting available physical evidence, CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTNeroved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 INTELLIGENCE FOR NAVAL OFFICERS and for demonstrating a continuous chain of pos- session through the hands of any and all of its custodians. Knowledge relating to the admissi- bility or inadmissibility of data as legal evidence is also essential to avoid the dismissal of a case on technical grounds. While a detailed discussion of this subject is beyond the scope of this chapter, it should be pointed out that the Manual for Courts-Martial United States 1951, its Naval Sup- plement, and the Uniform Code of Military Jus- tice are basic materials with which the investi- gator in the armed services must be familiar. One procedural requirement which these publi- cations impose upon the conduct of interviews and interrogations is initial advice to the individual of his legal rights. Article 31 of the Code provides against compulsory self-incrimination and also states: No persons subject to this code shall inter- rogate, or request any statement from, an accused or a person suspected of an offense without first informing him of the nature of the accusation and advising him that he does not have to make any statement regarding the offense of which he is accused or suspected and that any statement made by him may be used as evidence against him in a trial by court-martial. On this basis, the Office of Naval Intelligence re- quires that a written confession include the state- ment that the signer was initially informed of his rights, wherever he will agree to do so. Formal Report An accurate, objective formal report is the con- cluding phase of the investigator's field work on a particular case. In the armed services this report is particularly important because the military commander as the action officer responsible for the security of his command must rely upon the investigation report as his primary source of in- formation upon which to predicate his action. For this reason, the qualities of clarity, completeness, and impartiality in presentation are essential. The reporting responsibility of the investigator is exacting and challenging. In many instances the formal report will involve the careful coordination of preliminary investiga- tive reports prepared by a number of contributing naval agencies, particularly the District Intelli- CONFIDENTIAL 398 gence Offices, for investigative leads may be de- veloped in several geographic areas. Investigations of all varieties absorb much of the time and energies of the counterintelligence organization. Their problems will often challenge the ingenuity of the investigator, but most of the work is routine, requiring careful attention to. minute detail. However, for the investigator there is a reward in the form of deep personal satisfac- tion when the "tough case" is broken through his skill, imagination, and industry. NAVAL COUNTERINTELLIGENCE ORGANIZATION While the Security Branch of the Office of Naval Intelligence is the center of counterintelligence activity within the Department of the Navy, a number of other offices and agencies of necessity play a significant part in the total effort. For example, in the collection of information the Se- curity Branch relies heavily upon the District Intelligence Offices, naval attaches, fleet units, and other governmental intelligence producing agen- cies, both foreign and domestic. Likewise, in con- nection with security control measures, its function is that of disseminating intelligence since correc- tive action to be taken is a responsibility of com- mand. Communications security is a primary responsibility of the Director of Naval Communi- cations although there is close mutual support in activities of common interest. Similar cooperation takes place in connection with national internal security which is a responsibility of the Depart- ment of Justice and in contractor personnel secu- rity which involves a number of departments of the executive branch of the Federal government. Thus it can be seen that collaboration, coordina- tion, and liaison are essential to the successful operation of the Security Branch. From the counterintelligence point of view, the functions of the Security Branch include: 1. The production for appropriate dissemina- tion of intelligence to warn of and to aid in countering threats of espionage, sabotage, and subversion, particularly as they may af- fect the Naval Establishment. 2. The administration and utilization of coun- terintelligence techniques, particularly in- vestigation. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL 3. The formulation of policy concerning secu- rity control measures, including the clear- ance of classified information to foreign agencies and participation in the application of censorship and commerce and travel con- trol. 4. The coordination of the naval effort with that of other counterintelligence agencies. The importance of the coordinating function has been emphasized by the subversive character- istics of the cold war and the worldwide locations of naval units and activities which have tremen- dously expanded the scope of the interests of the Security Branch. The functions of the Branch are delegated and distributed among the follow- ing sections: S. E. C. (Sabotage, Espionage, and Countersubversion) , Investigations, Security Pol- icy, Security Control, Censorship, and Commerce and Travel, the latter two being fully acti- vated only in time of war. It should be noted that a number of these sections have functions and responsibilities which are not directly related to counterintelligence. In considering the matter of organization, it should further be remembered that changes occur from time to time as needs and emphasis shift, so that the important con- siderations are the functions performed in sup- porting the broad mission of producing intelli- gence for the protection and security of the Naval Establishment. In any event, the activities of the various sections are closely related and con- tinuing mutual assistance insures integration of effort. The S. E. C. Section is a research and evalua- tion unit, responsible for the analysis of informa- tion and the dissemination of the resultant intelli- gence to appropriate naval authorities for use in planning and executing effective counter and pro- tective measures. Because of the pervasive nature of counterintelligence itself, this dissemination may include not only naval activities but also other government agencies. The section's interests are worldwide. Like a headquarters staff, it corre- lates information received from a wide variety of sources, and while it must call upon other activi- ties for the collection of specific information de- sired, it is not limited geographically in its col- lection effort. From a mass of raw material, it must extract significant items, evaluate them, and 399 disseminate them in usable form. Its research subjects include personnel, techniques, finances, communications, situations, trends, and objectives of subversive and covert foreign and domestic or- ganizations. While much of this research is of a long-term nature, designed to produce detailed studies of value to many branches of the Depart- ment of the Navy and other government agencies, the section must remain alert for any significant single items which, when interpreted, indicate some new threat or trend, or possibly a new ap- proach by a subversive activity, requiring prompt dissemination to the appropriate action agency. Close liaison with Army and Air Force Intelli- gence, the Federal Bureau of Investigation, the Central Intelligence Agency, the Department of State, the Treasury Department, and other agen- cies of the government permits a, valuable inter- change of information of mutual interest and benefit. Other sources of information include do- mestic and foreign newspapers and periodicals and transcripts of foreign radio news broadcasts. During World War IT the various intelligence and interrogation reports from United States and Al- lied forces abroad were useful sources. With the approval of competent authority, information is also exchanged with agencies of friendly foreign governments. In its collection and evaluation effort, the section is materially aided by the In- telligence Branch of ONI and the District Intelli- gence Offices. Internally, it is organized on the basis of major topical interests. Illustrative of the inter-relations within the Security Branch, the S. E. C. section receives much routine information regarding individuals and sit- uations from other sections; on the other hand, in connection with security matters, it may provide the investigations section with an evaluation of information developed in the course of an investi- gation of a suspect or prospective employee. In addition, it may be able to advise the Security Control Section that one of the members of an official foreign mission requesting clearance for an official inspection is a known or suspected enemy agent. In time of war, the closest relationships are maintained with the Censorship section in or- der to identify foreign agents, their contacts, and their means of finance and communications. CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS Closely associated with S. E. C. is the Investiga- tions Section which provides the Navy with per- sonnel trained in specialized counterintelligence techniques. The counterintelligence function of this section is to develop information regarding al- leged or suspected espionage, sabotage, and sub- versive activities on the part of naval personnel, uniformed or civilian. In addition, it is the offi- cially designated investigative service for the Na- val Establishment and makes investigations not immediately related to counterintelligence. These are conducted when specifically requested by com- petent naval authority. Such investigations in- clude matters involving naval contractors, war frauds, and personnel misconduct or disciplinary cases. Contractors' investigations may be required be- fore the material bureaus of the Navy Department enter into contractual relationships with private concerns. When, in the interest of the security of classified naval equipment or information, the Chief of a Bureau deems it necessary to have facts about the general corporate structure of a con- tractor, its financial responsibility, ability to pro- duce, integrity of management, and especially any possible foreign affiliations, ONI is requested to obtain the essential information. Based on the facts developed, the responsible bureau authority can then make his decision regarding the placing of the contract. These facts also contribute to decisions concerning appropriate security controls that should apply to classified work in progress. Requests for war fraud investigations arise out of the belief of a commanding officer that naval personnel, military or civilian, are involved in defrauding the government in connection with a naval contract or by the unauthorized use or dis- position of naval supplies or equipment. If evi- dence of fraud is developed, the case is referred to the Department of Justice and, at the same time, the commanding officer is advised of the facts so that he can take such action as he desires to protect the Navy from further harm. Since the Investi- gations Section provides the designated investiga- tive service for the Navy, its trained agents are called upon to determine the facts pertaining to misconduct and breaches of discipline so that com- manding officers can fix responsibility and better determine appropriate punishment. CONFIDENTIAL Because of the diversity of its activities, this section is closely associated with most phases of intelligence operations as well as with a large number of the naval commands and other offices and bureaus of the Navy Department. While some of its work is not immediately of a counterintelli- gence nature, the greater part has some bearing on security measures, and sometimes seemingly un- related cases are productive of information of direct counterintelligence value. It must be kept in mind that this section, in gathering data on an investigation, is serving only as a fact-finding agency. Completed investiga- tions are referred to the requesting authority for such administrative action as he, in his best judg- ment, believes to be necessary on the basis of the facts presented. In order to protect sources of information from compromise or disclosure, all investigative reports are classified Confidential or higher; recipients, therefore, must safeguard them carefully and not disclose sources therein. In no case is the subject of a report to be advised of its existence or permitted to see it. The Security Branch has Navy-wide responsi- bility for originating or approving the promulga- tion of all policies relating to the safeguarding of classified naval information, as well as administer- ing such policies. The Assistant to the Branch Head (Security Policy) originates, approves, and reviews policy and prepares for promulgation by the Chief of Naval Operations specific directives on such subjects as classification and security meas- ures, the disclosure of naval information, the tak- ing of photographs, the release of information on new ship construction or conversion, and visits to naval activities and installations. While direc- tives on physical security are prepared by the Base Maintenance Division, Office of the Chief of Naval Operations, the branch functions in an advisory and consultative capacity. The Security Control Section administers and executes various security policies and programs. This involves a wide range of activity, a diversity of responsibilities, and the exercise of the most discriminating judgment. In its work this section is assisted by qualified representatives from the various technical bureaus and offices, the State Department, and Army and Air Force Intelli- gence. Included in its responsibilities is the re- 400 Approved For Release 2003/12/09: CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL lease of classified information to individuals and organizations for private use, to industry manu- facturing items of naval interest for foreign gov- ernments, and to official representatives of foreign governments. Generally speaking, classified in- formation is not released for private use except when so doing serves the interests of the Navy. For example, it may be necessary, on occasion, to provide merchant vessels or civilian aircraft with classified Hydrographic Office information. Releases to foreign governments are usually gov- erned by high level policy decisions and by special circumstances within the purview of the Navy's technical bureaus and the Intelligence Branch of ONI. Visits of foreigners to naval activities, commercial plants and private institutions en- gaged in classified work for the Navy require clearance and the issue of proper credentials. Security liaison with the Office of Public Informa- tion of the Navy Department entails review of articles, reports, and pictures to determine whether or not the subject matter may be released in con- formance with established policy. Another task is that of the prevention and correction of security violations by naval personnel which sometimes occur in the preparations, handling, and marking of correspondence. Much more serious is the loss or compromise of classified matter. In such cases, as required by Navy Regulations, a local investiga- tion of the circumstances is made and a report for- warded to CNO. Each report is reviewed to de- termine whether the investigation has been ade- quate, and it is then transmitted to the interested offices of the Navy Department for information and, when disciplinary action is indicated, to the Bureau of Naval Personnel. Since classified information is originated and handled by all naval activities, an important func- tion of the Security Branch is the integration of procedures, the coordination of assignment of classifications, and timely declassification. Ad- vice to naval commands regarding security consid- erations and coordination with other agencies is a continuing responsibility. When activated in time of war, the Censorship Section is responsible for preparing basic regu- lations for naval censors, maintaining liaison with all other censorship organizations, and acting as a clearing house for such administrative matters 401 as violations, proposed changes in regulations, and general inquiries. Since naval censorship is a function of command, officers are designated to serve as censors for every naval vessel, base, and activity, and special instructions in addition to basic regulations may be prepared with the ap- proval of ONI. As appropriate, special reports are submitted by individual censors through the chain of command to the Censorship section. Such reports may be summaries of information of a subversive nature, indications of leaks, or evi- dence of an unusual interest in classified naval in- formation. The questionable correspondence may be forwarded with the report. A basic problem of censorship is the exercise of good judgment and common sense in the treatment of private cor- respondence, the forwarding of photographs, the transfer of personal funds, and the clearance through customs of officers (not official couriers) carrying official Navy documents. Associated with this section in wartime is the Telecommunications Unit which provides trained officers for cable and radio censorship. The Navy, with its responsibility for the safe overseas move- ment of merchant ships and strategic materials, is vitally interested in safeguarding movement in- formation transmitted over commercial or private circuits. Personnel selected for this work usually possess a background of experience in trade, finance, industry, and communications. The de- fensive function of this activity is to prevent the transmittal of information of military, economic, or political value to an enemy, such as production data, new devices, general shipping information, and movements of materials, supplies, or person- nel. Offensively, this activity can detect enemy covert operations by intercepting agent reports, transmittal of funds, propaganda, and requests for special information; even more, it can assist in thwarting espionage, sabotage, and subversive operations. In this area, the coordination of naval security interests with those of other agencies is most important. During World War II this unit and its personnel were transferred to the Cable and Radio Division of National Censorship. Also active in wartime, the Commerce and Travel Section functions to prevent the unau- thorized transmission of classified information through merchant shipping, crews, travelers, over- CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS seas commercial aircraft, and maritime personnel; it assists in the control of persons attempting to enter or leave United States controlled areas whose activities might constitute a danger to the security of the Naval Establishment. Worldwide in scope, the responsibilities of this section are cen- tered around the boarding of merchant ships, the preparing of advisory information for individual travel authorizations and inspection of travelers, the making of special studies, and cooperative liaison with other agencies engaged in the con- trol of travel and commerce. While this section operates primarily to establish and maintain security barriers against the illegal movement of classified information and personnel engaged in espionage, sabotage, or subversive activities, it also collects a large volume of information for a variety of intelligence purposes. During peacetime, the functions of this section are performed by estab- lished civil federal agencies; even in wartime, these civil agencies retain primary responsibility and the Security Branch of ONI acts in a sup- plementary and advisory capacity in areas of par- ticular concern to the Navy. When active, the Commerce and Travel Control Section initiates policies and supervises the field work performed by the District Intelligence Offices and related to its mission. The primary counterintelligence purpose for boarding ships and aircraft entering or leaving United States controlled ports is to ascertain that no classified information is hidden in the ship, cargo, or on the persons of travelers and crew members and to insure that proper security meas- ures are maintained in the handling of shipping information and classified cargo assigned to over- seas areas. Leakage of important information can occur from the careless use of bills of lading, marine insurance policies, and cargo manifests; likewise, merchant seamen and waterfront work- ers can make valuable observations of merchant ships and cargoes. A second purpose is to obtain by means of interview any pertinent information possessed by merchant marine officers, crew mem- bers, travelers, and Armed Guard personnel. Sur- vivors of enemy attacks on shipping are sources of information not only of immediate operational value but also of salient details regarding the attack: the circumstances, enemy units involved, CONFIDENTIAL 402 names of other survivors or known dead or miss- ing, and the status of classified publications aboard. Travel authorization is basically a responsibility of the State Department, while travel inspection rests with agencies of the Treasury and Justice Departments: United States Customs and the Im- migration and Naturalization Service. The ONI Commerce and Travel Section works with these agencies in a cooperative and advisory capacity in matters relating to naval security. The check- ing of passenger and crew lists in advance of the arrival or departure of a merchant ship or com- mercial plane is a valuable means for enforcing security control measures, and promptness in processing and dissemination of resulting infor- mation is imperative. The preparation of special studies of trends and situations by this section serves to guide and stimulate the activities of the field units. The closest liaison, effective at all levels of operation, must be maintained with other military agencies, the Passport and Visa divisions of the State Department, the Bureau of Customs and Internal Revenue of the Treasury Depart- ment, the FBI and the Immigration and Naturali- zation Service of the Justice Department, the Office of International Trade of the Commerce Department, the Civil Aeronautics Administra- tion, the Maritime Commission, and other federal and state agencies, not to mention a variety of private agencies and companies. Particularly close relationships exist with the Coast Guard which has primary responsibilities for port se- curity and the clearance of merchant seamen. As already indicated in this review of the Navy's counterintelligence organization, the sections of the Security Branch both support and are sup- ported by field activities, notably the District In- telligence Offices. While the responsibilities of these offices are localized within their districts, they are no less important and usually are inter- related not only from district to district and to the Security Branch, but also to the field activities of other governmental agencies. It is imperative, therefore, that all current information regarding counterintelligence matters be available in the DIO's and that these offices be manned by person- nel trained in the various security techniques and procedures. The requirements and capabilities of Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL these offices will naturally vary according to their geographical area of responsibility; in any event, they must be prepared to support effectively all pertinent countermeasures if the Naval Establish- ment and the nation are to be protected success- fully against espionage, sabotage, and subversive activities. In chapter 3 the counterintelligence organiza- tions of the Army and the Air Force were identi- fied; it is sufficient to indicate here that their functions and responsibilities within their respec- tive services are similar to those of the Security Branch of ONI. The counterintelligence activ- ities and responsibilities of all the military serv- ices are carefully defined by the Delimitation Agreement and integrated with those of the FBI which has primary responsibility for the internal security of the United States. COUNTERINTELLIGENCE IN A THEATER OF MILITARY OPERATIONS While basic counterintelligence problems and objectives in a theater of operations are not essen- tially different from those already discussed, the urgency of operating conditions gives special em- phasis to the time element and the nature of mili- tary combat both requires and permits the use of special countermeasures and techniques in addi- tion to those already described. The extent and character of counterintelligence activities are conditioned by the particular theater of operations and such factors as population density, composi- tion and cultural characteristics of the people, their attitude toward friendly and enemy forces, their susceptibility to enemy penetration and propaganda, and the stability of local govern- ments. In a theater of operations the information tar- gets of enemy intelligence are concentrated within the field of armed forces intelligence knowledge described in chapter 5, with emphasis on capabil- ities and vulnerabilities. Recognizing these prob- able targets, the intelligence officer has a number of counterintelligence responsibilities, such as the planning of effective protective countermeasures and the neutralization of hostile intelligence oper- ations. In coordination with other staff sections, he will plan measures and procedures for deceiving the enemy. Counter propaganda may be his 403 sphere of responsibility, as well as censorship and the initiation of investigations as required. In general, counterintelligence operations in the thea- ter are grouped into five categories: military secu- rity; civil security; port, frontier, and travel security; censorship; and special operations. Special operations may include problems of camouflage and concealment of installations, either to mask their true identity or to conceal them from observation completely. The intelli- gence officer may also supply valuable knowledge in the planning of deceptive measures such as feints, secondary landings, demonstrations, and false concentrations. The success of deception depends upon a maximum of realism in execution and complete security of information. In combat areas, counterintelligence personnel are responsible for or assist in locating evacuated enemy headquarters, billeting areas, supply depots and similar installations and searching them for documents and other material of possible interest. Other sources of potential value are offices for- merly occupied by enemy intelligence services, enemy police organizations, local semimilitary organizations, civil government centers, signal communications and broadcasting centers, and known collaboration groups. Mail at enemy post- offices should be impounded pending the arrival of designated censors. Important personnel tar- gets are known or suspected enemy agents, col- laborators, and sympathizers, whose identity and location may be facilitated by contact with local officials and other persons known to be friendly to our forces. On the other hand, installations evacuated by our own forces must be inspected to ensure that no material of intelligence value to the enemy has been left behind. Prior to the establishment of Controls by Civil Affairs or Military Government units in areas re- covered from an enemy, counterintelligence per- sonnel cooperate with military commanders and police units in preparing security regulations, pro- mulgating instructions, and restoring law and order. Frequent checks must be made to ascertain the effectiveness of measures taken, and informant networks must be established. Since security con- trols over a civil population become the responsi- bility of Civil Affairs-Military Government units, the closest relationships must be maintained with CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : Cl CONFIDENTIAL INTELLIGENCE FOR A-RDP85G00105R000100210002-9 them for they normally serve as the channel for dealings with civilians in a military zone. Coun- terintelligence personnel often continue to assist in such matters as locating and confiscating hidden arms and the conduct of security investigations. As a general principle in the wake of battle, the security of military interests has priority over the welfare and convenience of the civilian population in a theater of operations. Counterintelligence Estimates and Plans From the foregoing it is apparent that advance planning is essential, in order that the intelligence officer may carry out his counterintelligence re- sponsibilities successfully. An early requirement is an estimate of enemy intelligence capabilities, based upon available knowledge of the enemy's overt and covert intelligence agencies, including organization, training, equipment, doctrine, tech- niques, and disposition. Such an estimate should include a critical analysis of our own counter- intelligence deficiencies. This careful study will indicate additional knowledge required, improve- ments to effect, and the measures which will be most advantageous in countering the enemy's in- telligence effort. This estimative process for counterintelligence is only a subsidiary phase of the total process involved in preparing the In- telligence Estimate discussed in chapter 12. However, the Intelligence Estimate form itself can be utilized as a general guide for the intelli- gence officer as he analyzes his counterintelligence problems and considers appropriate countermeas- ures. The Department of the Army Field Manual 30-5, entitled Combat Intelligence, recommends the revision of the estimate form to include the following topics as appropriate: a. Collection of Information. 1. Overt methods. (a) Reconnaissance, ground and air, including photo. (b) Communication intelligence. (c) Prisoners of war, deserters, and refugees. (d) Captured documents, including maps, orders, and letters. (e) Interception of radio and tele- vision broadcasts. (f) Interrogation of captured secret agents. 2. Covert methods. Espionage, all types. CONFIDENTIAL 404 NAVAL OFFICERS b. Sabotage. 1. Military. 2. Political. 3. Economic and industrial. c. Guerrilla Warfare. 1. Semimilitary operations. 2. Minor armed uprisings. d. Underground. 1. Political and refugee. 2. Escape and Evasion. 3. Criminal. e. Assassination and Abduction. 1. Military and political leaders. 2. Personnel performing critical duties. f. Unfriendly Nations. Miscellaneous activi- ties. g. Analysis of our own and allied counter- intelligence deficiencies. The particular form used is not important. What is essential is that appropriate measures to counter each enemy capability be devised and as- signed to various units of the command. The intelligence officer should maintain for his own use a composite record in order to make cer- tain that he has considered all possible enemy in- telligence operations, planned for the necessary countermeasures, and recommended execution by the appropriate agencies. This record may also contain notations amplifying the planned counter- measures for further dissemination to the action agencies; it may indicate additional information to be collected and reported according to a time schedule. The results of this study and planning are incorporated into the intelligence annex to an operation order, described in chapter 12. SUMMARY AND CONCLUSIONS It is hoped that this study has served to give greater understanding of intelligence work and the milieu in which it operates in war and peace. This text is not intended to be complete in its coverage of the subject matter but rather only introductory. Of necessity intelligence impinges on many aspects of human life. It deals with the realities of existence and the interrelationships of groups of people who have formed themselves into powerful states. Inevitably, any study of intelli- gence becomes historically dated, and while this text has endeavored to project ideas beyond the present, the viewpoint is that of early 1953. Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 COUNTERINTELLIGENCE CONFIDENTIAL Intelligence has been described as organization, as knowledge, and as a producing activity. Only by the coordinated effort of many contributing agencies and personnel at all echelons can intelli- gence be produced to meet the needs of a nation and its armed forces. By tracing the historical development of intelligence, valuable lessons have been pointed out as guides for the present and the future. In considering functions of intelligence in the formulation of the strategy and tactics of world states, a proper perspective for intelligence personnel has been suggested. As an area of human knowledge, intelligence specifically deals with foreign nations and geo- graphic areas of potential operations. It helps to answer questions of both a strategic and opera- tional nature. Its component parts have been de- scribed as geographic, transportation and telecom- munications, sociological, political, economic, armed forces, scientific and technical, and bio- graphical. Because of their current interest to the United States, World Communism and the U. S. S. R. have been given more detailed consideration. The processes whereby information is converted into intelligence have been shown as an unending cycle within which is collection, processing, and dissemination. Use by planners and operational commanders sparks new requests for collection, while throughout the cycle, guidance controls and channels the various phases of activity. The in- telligence cycle is practically applied by the in- telligence section of a naval staff in its support of the naval commander as he makes his decisions and supervises his planned action. It has con- tinuing practical application in the support given by intelligence to all types of naval operations in- cluding air, surface forces, submarines, and joint and combined operations including amphibious. It is at work in the intelligence support of special activities such as atomic warfare, economic war- fare, psychological warfare, and guerrilla and partisan operations. All of these aspects of intelligence?organiza- tion, knowledge, and activity?find special and concentrated application in counterintelligence which is directed against hostile intelligence or- ganizations and their activities threatening the welfare and security of the nation. 405 While Naval Intelligence is the primary consid- eration of this text, it has been necessary to deal with the general field of intelligence, because only by so doing can the purposes, responsibilities, re- lationships, and contributions of Naval Intelli- gence have real meaning. THE FUTURE OF INTELLIGENCE Those assigned to intelligence duties can some- times become overenthusiastic as they consider the potentialities of their activities. On the other hand, those unacquainted with the capabilities of intelligence, or familiar only with its limitations, can find few values comparable to the hardware of war. There is, of course, a middle ground where realistic appraisal and appreciation meet. Knowledge and understanding will lead to the recognition that intelligence can make very real contributions, but that it can predict the future only within the limits of the social sciences which aid in its production. Insofar as facts can be collected, intelligence can at least produce reason- ably accurate estimates of capabilities and, at cer- tain levels, give sufficient indications of intentions to alert action agencies to possible dangers and threats. Intelligence is not an end in itself, but only a means to an end which can be constantly used to effective advantage by both civilian and military leaders as they formulate and implement the grand strategy of the nation. As a staff function intelli- gence is an integral part of command and never an independent activity. Intelligence activities, carefully planned and wisely guided, have been demonstrated histori- cally to be a profitable investment that will more than repay the cost in manpower and resources. However, its benefits cannot be obtained by hasty improvisation. A working organization is much more than the creation of units and lines of control on a paper chart, and its product can have full meaning only when developed over many years. The exploitation of sources of information is grad- ual and painstaking, while improvements in the techniques of processing come only from long ex- perience. Dissemination is also a matter of train- ing and experience in making certain that the CONFIDENTIAL Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL INTELLIGENCE FOR NAVAL OFFICERS right knowledge reaches the right people at the right time. The experiences of World War II and the post- war years have awakened and sharpened general interest in and knowledge of intelligence needs. The development of a United States Intelligence organization with an emphasis on coordination and guidance starting at the highest national level gives promise that the nation will be better guarded and better guided than it has in the past. With full and continued public support, United States Intelligence must continue to merit the trust of those it serves. COMMENTS ON STUDY The readers of this text will be primarily naval military personnel in many types of assignments. Some, having nonintelligence duties, will be inter- ested only in a general understanding of intelli- gence; it is hoped that such has been gained. Others, assigned to intelligence duties, will recog- nize that this book is not a detailed working man- ual. Many of its sections can be considerably expanded. Individual tasks must be learned either on the job or at such special training schools as may be organized for that purpose. However, for intelligence personnel, this book will have served its purpose if it has given a fuller insight CONFIDENTIAL 406 into the totality of intelligence activity and pro- vided direction to further study. The ingenuity and interest of the individual will be required to expand his own sources from books, periodicals, newspapers, naval operational experi- ence, foreign travel, and acquaintance with people everywhere. Equally as important as the study of books is learning more about people and why they react as they do. A characteristic of the good intelligence officer must be a genuine interest in people and places, an awareness of the world about him, and the ability to view it with objective detachment. The cursory inspection of this text for the sole purpose of locating facts to copy into written as- signments will have limited and incidental value. The hasty formulation of answers to essay-type questions will be equally unrewarding. Clear thinking and real understanding are goals the reader should set for himself. He should particu- larly derive from essay questions the experience of analyzing and interpreting topical material, to- gether with that of the preparation of intelligence reports which have the qualities of clarity, con- ciseness, and completeness. For the naval officer with much more than an idle curiosity and passing interest in intelligence this text will provide a good beginning to his own development as an intelligence officer of real value to the Navy. U. S. GOVERNMENT PRINTING OFFICES 1954 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 Approved For Release 2003/12/09 : CIA-RDP85G00105R000100210002-9 CONFIDENTIAL CONFIDENTIAL