THE CRAFT OF INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84-00161R000100170005-7
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
42
Document Creation Date:
December 12, 2016
Document Release Date:
May 30, 2002
Sequence Number:
5
Case Number:
Publication Date:
April 1, 1963
Content Type:
BOOK
File:
Attachment | Size |
---|---|
CIA-RDP84-00161R000100170005-7.pdf | 6.71 MB |
Body:
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
.THE CRAFT
OF
INTELLIGENCE,
by Allen W. Dulles
is is a TEMPORARY DOCUMENT
Te record copy has been
National ArchlVeS
4 t
s
'r
o
e
$~ea
under the 15TC CAL REVIEW PROGRAM.
Date . HRP
This document has been
approved for release through
tAa tt28TORICAL REVIEW PROGRAM of
the Central Intelligence Agency.
Date 3 -;/ 7-
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
Allen W. Dulles
FEw BOOKS have been so long awaited as Allen Dulles' The
Craft of Intelligence.
Since the renowned international lawyer, diplomat and
authority on intelligence resigned as Director of the Central
Intelligence Agency in 1961, editors and publishers have be-
sieged his Washington home urging him to write this book.
Britannica's Book of the Year was the fortunate winner in this
free-for-all... -
The Craft 'of Intelligence is the work.of-the one man in the
world probably best qualified to write, this story of cloak-and-
dagger?'andless romantic dperatiohs iirthe international area of
espionage",counterespionage, propagaudaarid Itiridred activities.
Member of a distinguished family which included three
secretaries of state, the last of these his late brother, John
Foster Dulles, Allen Dulles has traveled widely. His first job
after graduation from Princeton was in the educational field in
India.
Then came the U.S. diplomatic service, the peace delegation
in Paris after World War I with Pres. Woodrow Wilson, other
international conferences and in the mid-1920s entrance into
the private practice of law with the famed firm of Sullivan and
Cromwell.
World War II interrupted his legal career. He was immedi-
ately tapped for the U.S. Office of Strategic Services and spent
most of the war years, until the end of 1945, in Switzerland as the
top OSS operational officer on the continent.
After a few years of private law practice he returned to in-
telligence with the CIA in 1951 and after two years as deputy
director served as director of the agency for almost nine years.
In keeping with security practices, he made few public utter-
ances during this period.
Now he adds to three earlier books this authoritative study
of intelligence. Nothing quite like it, nothing so authoritative
and comprehensive, has before been published.
Approved & 6499s2~o tf k%V46J46ft( Wthor y.
2 e a
authorize or approve y tfa c 7
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT
OP
INTELLIGENCE
By ALLEN W. DULLES
1. INTELLIGENCE
In our time the United States is being challenged by a hostile
group of nations that profess a philosophy of life and of govern-
ment inimical to our own. This in itself is not a new develop-
ment; we have faced such challenges before. What has changed
is that now, for the first time, we face an adversary possessing the
military power to mount a devastating attack directly upon the
United States, and in the era of nuclear missiles this can be ac-
complished in a matter of minutes or hours with a minimum of
prior alert.
To be sure, we possess the same power against our adversary.
But in our free society our defenses and deterrents are prepared
in a largely open fashion, while our antagonists have built up a
formidable wall of secrecy and security. In order to bridge this
gap and help to provide for strategic warning, we have to rely
more and more upon our intelligence operations.
Another change is that we have had to assume the responsi-
bility of leadership for the countries of the Free World. Ac-
companying this responsibility is a burden of unprecedented
dimensions placed upon both our policies and our measures for
military preparedness. As a result, our intelligence services have
had to equip themselves for an expanding range of problems
unlike any they have ever faced before.
This report concerns itself with how our intelligence services
have been developing and what they must be equipped to do in
this age of peril.
In the past, in wartime, our military commanders have had
military intelligence services available to them. Nevertheless, dur-
ing World War I we still found ourselves inadequately prepared
for our intelligence responsibilities, despite the high degree of
competence and devotion of a small group of able army and navy
intelligence officers. It was only in World War II and particularly
after the Pearl Harbor attack that we began to develop, side by
side with our military intelligence organizations, an agency for
secret intelligence collection and operations. The origin of this
agency was a summons by President Franklin D. Roosevelt to
William J. Donovan in 1941 to come down to Washington and
work on this problem. The result was an organization known as
the Office of Strategic Services (OSS).
Colonel (later Major General) Donovan is generally regarded
as the father of modern U.S. intelligence. Ile was eminently
qualified for the job. A distinguished lawyer, a veteran of World
War I with the distinction of having won the Medal of Honor, he
had divided his busy life in peacetime between the law, govern-
COMES OF AGE
ment service and politics, He knew the world, having traveled
widely. Ile understood people. He had a flair for the unusual and
for the dangerous, tempered with judgment. In short, he had the
qualities to be desired in an intelligence officer.
The Japanese sneak attack on Pearl Harbor and our entry into
the war naturally stimulated the rapid growth of the OSS and
its intelligence operations. It was just after Pearl Harbor that I
was recruited by General Donovan, who had been a close friend
of mine for many years. I served with him until the end of the
war in 1945.
For a short time after V-J Day, it looked as though the U.S.
would gradually withdraw its troops from Europe and the Far
East. This would probably have included the disbanding of in-
telligence operations. In fact, it seemed likely at the end of 1945
that we would do what we did after World War I-fold our tents
and go back to business-as-usual. But this time, in contrast to
1919 when we repudiated the League of Nations, we became a
charter member of the United Nations and gave it our support in
hopes that it would grow up to be the keeper of world peace.
Communists Overplayed Hand
If the Communists had not overreached themselves, our gov-
ernment might well have been disposed to leave the responsibility
for keeping the peace more and more to the United Nations. In
fact, at Yalta Stalin asked President Roosevelt how long we ex-
pected to keep our troops in Europe. The President answered,
not more than two years. In view of the events that took place
in rapid succession during the postwar years, it is clear that in
the period between 1945 and 1950 Premier Stalin and Mao Tse-
tung decided that they would not wait for us to retire gracefully
from Europe and Asia; they would kick us out.
Moscow installed Communist regimes in Poland, Rumania and
Bulgaria before the ink was dry on the agreements signed at Yalta
and Potsdam. The Kremlin threatened Iran in 1946 and followed
this in rapid succession by imposing a Communist regime on
Hungary, activating the civil war in Greece, staging the take-over
of Czechoslovakia and instituting the Berlin blockade. Later, in
1950, Mao joined Stalin to mastermind the attack on South
Korea. Meanwhile Mao had been consolidating his position on
the mainland of China. These blows in different parts of the
world aroused our leaders to the need for a world-wide intelli-
gence system. We were, without fully realizing it, witnessing the
first stages of a master plan to shatter the societies of Europe
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 11
Loved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
App
United Press International
William J. Donovan (left) visiting
a military school in Sofia, Bulgaria,
In Feb. 1941 in his capacity as per-
sonal representative of Pres. Frank-
lin U. Roosevelt. At right, Gen.
Nihoff, head of the school
and Asia and isolate the United States, and eventually to take
over the entire world,
In his address to Congress on March 12, 1947, President Tru-
man declared that the security of the country was threatened by
Communist actions and stated that it would be our policy
to help free peoples to maintain their free institutions and their
national integrity against aggressive movements seeking to impose
on them totalitarian regimes.
He added that we could not allow changes in the status quo
brought about by "coercion or by such subterfuges as political
infiltration," in violation of the United Nations charter.
It was by then obvious that the United Nations, shackled by
the Soviet veto, could not play the role of policeman. It was also
clear that we had a long period of crisis ahead of us. Under these
conditions, a series of measures were taken by the government
to transform our words into action. One of the earliest was the
reorganization of our national defense structure, which provided
for the unification of the military services under a secretary of
defense and the creation of the National Security Council.
At that time President Truman, basing his action upon a blue-
print that General Donovan had submitted, recommended that a
central intelligence agency be created as a permanent agency
of government. A Republican Congress agreed and, with complete
bipartisan approval, the CIA was established in the National
Security Act of 1947. It was an openly acknowledged arm of the
executive branch of government although, of course, it had many
duties of a secret nature. President Truman saw to it that the
new agency was equipped to support our government's effort to
meet Communist tactics of "coercion, subterfuge, and political
infiltration." Much of the know-how and some of the personnel
of the OSS were taken over by the Central Intelligence Agency.
Fortunately many ranking officers of the OSS had remained in
various interim intelligence units which had functioned under
the aegis of the State and War departments in the period 1945-47.
1 have spent more than ten years with the Central Intelligence
Agency, eight as its director. During World War II I served
Allen Dulles, retiring after eight years as director of the CIA, received the Na-
tional Security medal from Pres. John F. Kennedy, who went to Langley, Va.,
Nov. 2S, 1961, to open the new CIA headquarters building
Approved For Release 2002/06/18: CIA-RDP84-00161 RO
-11 ft
THE CRAFT OF INTELLIGENCE
0161 R000?1001 7 0005-7
A meeting of the U.S. Intelligence board, a group of military and civilian advisers to the CIA, with Allen Dulles
with the OSS, and even earlier, during my years in the diplo-
matic service (1916-26), I was often engaged in the gathering
of intelligence. Since returning to private life in 1961, I have
felt strongly that someone-even though he be a deeply-
concerned advocate-should tell what properly can be told about
intelligence as a vital element in the structure of government.
Probably intelligence is the least understood and the most mis-
represented of the professions. Many books and articles, thrillers
that are more fictional than factual, have been written over re-
cent years about "spy" work. From them the general reader must
have drawn some strange conclusions as to the real purposes and
activities of our intelligence service.
When, on November 28, 1961, President Kennedy came out to
inaugurate the new CIA headquarters building and to say good-
by to me as director, he expressed one reason why this misunder-
standing exists: "Your successes are unheralded, your failures
are trumpeted." For obviously one cannot tell of operations that
go along well. Those that go badly generally speak for them-
selves. The President then added a word of encouragement to
the several thousand men and women of CIA:
... but I am sure you realize how important is your work, how
essential it is-and in the long sweep of history how significant your
efforts will be judged. So I do want to express my appreciation to
you now, and I am confident that in the future you will continue to
merit the appreciation of our country, as you have in the past.
It is hardly reasonable to expect proper understanding and
support for our intelligence work in this country if only the in-
siders, a few people within the executive and legislative branches,
know anything whatever about the CIA, and all others continue
to draw their knowledge from the so-called inside stories by writ-
ers who have never been on the inside.
There are, of course, sound reasons for not divulging any intel-
ligence secrets. It is well to remember that what is told to the
public also gets to the enemy. However, the discipline and
techniques-what we call the tradecraft of intelligence-are
widely known in the profession, whatever the nationality of the
service may be. A discussion of this reveals no secrets. What
must not be disclosed, and will not be disclosed here, is where
and how and when the precise means of the tradecraft are being
or will be employed in particular operations.
The CIA is not an underground organization. One need only
read the law to get a general idea of what it is set up to do. A
guiding principle of mine when I was Director of Central In-
telligence was always to keep secret, by every human means, only
those activities which should be secret, and not to make a mystery
out of what is a matter of common knowledge or is obvious to
friend and foe alike.
Futile Secrecy
Shortly after I became director I was presented with a good
illustration of the futility of certain kinds of secrecy. Dr. Milton
Eisenhower, brother of the President, had an appointment to see
me on some matter of mutual interest relating to the field of
education. The President volunteered to drop him off at my office.
They started out, I gather, without forewarning to the Secret
Service and were unable to find the CIA headquarters until a
telephone call had been put through for precise directions. This
led me to investigate the reasons for a secrecy surrounding my
location that was quite futile-the agency was, after all, listed
in the telephone book with its proper number and address, and
many cab drivers in Washington knew its location. But the gate
outside our headquarters bore only the sign "Government Print-
ing Office," which in fact had a shop on the premises. I learned
that the sightseeing buses going around Washington were mak-
ing it a practice to stop outside our front gate. The guide would
harangue the sightseers to the effect that behind the barbed
wire before them was the most secret, the most concealed place
in Washington-the headquarters of the U.S. spy organization,
the Central Intelligence Agency.
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT OF, INLLIG
Approved or a ease 66/18: CIA-RDP84-00161R000100170005-7
vL/
As soon as I had a proper sign placed outside our headquar- and Defense departments, although of great value, is not enough.
ters, the glamour and mystery disappeared. We were no longer Then, in addition to getting the information, there is also the
either sinister or mysterious to visitors to the capital-we became question of how it should he processed and analyzed. I feel that
just another government office. there are good reasons for placing the main burden of responsi-
When we try to make a mystery out of everything relating to bility for preparation and co-ordination of our intelligence analy-
intelligence, we tend to scatter those efforts and energies which ses upon a centralized agency of government that has no respon-
should properly be directed toward maintaining the secrecy and sibility for policy. Quite naturally policy makers tend to become
security of operations where they are essential to success. Each wedded to the policy for which they are responsible, and State
situation has to be considered according to the facts, keeping in and Defense employees are no exception to this very human tend-
mind the principle of withholding from a potential enemy all use- ency. They are likely to view with a jaundiced eye intelligence re-
ful information about secret intelligence operations or personnel ports that might include elements casting doubt upon the wisdom
engaged in them. The injunction that George Washington wrote of existing policy decisions. The most serious occupational hazard
to Colonel Elias Dayton on July 26, 1777, is still applicable to we have in the intelligence field, the one that causes more mis-
many intelligence operations today: takes than any foreign deception or intrigue, is prejudice. I grant
The necessity of procuring good Intelligence is apparent and need
not be further urged. All that remains for me to add, is, that you
keep the whole matter as secret as possible. For upon Secrecy, Suc-
cess depends in most Enterprizes of the kind, and for want of it,
they are generally defeated, however well planned and promising
a favourable issue.
On the whole, Americans are inclined to talk too much about
matters which should be classified. I feel that we hand out too
many of our secrets, particularly in the field of military "hard-
ware" and weaponry, and that we often fail to make the vital dis-
tinction between the type of things that should be secret and
those which, by their very nature, are not and cannot be kept
secret. Also, there are times when our press is overzealous in seek-
ing "scoops" with regard to future diplomatic, political and mili-
tary moves. We have learned the importance of secrecy in time of
war, although even then there have been serious indiscretions at
times. But it is well to recognize that in the "Cold War" our ad-
versary takes every advantage of what we divulge openly or make
publicly available.
To be sure, in our form of government, given the attitude of
the public and the press, it is impossible to erect a wall around
the whole business, nor do I suggest that this be done. Neither
Congress nor the executive branch intended this when the law of
1947 was passed. Furthermore, certain information must be
given out if public confidence in the intelligence mission is to be
strengthened and if the profession of the intelligence officer is
to be properly appreciated.
Most important of all, it is necessary that both those on the
inside-the workers in intelligence-and the public should come
to share in the conviction that intelligence operations can help
mightily to protect the nation.
that we are all creatures of prejudice, but by entrusting intelli-
gence co-ordination to our central intelligence service, which is
excluded from policy making, we can avoid, to the greatest pos-
sible extent, the bending of facts obtained through intelligence to
suit a particular point of view.
At the time of the Pearl Harbor attack many high officials
here and abroad were convinced that the Japanese, if they initi-
ated hostilities in the Pacific, would strike southward against the
"soft underbelly" of the British, French and Dutch colonial
areas. The likelihood that they would make the initial attack
directly upon their most dangerous antagonist, the United States,
was discounted. The Pearl Harbor attack was a classic instance
in which intelligence evaluation was not handled objectively. It
undoubtedly influenced later decisions concerning the organiza-
tion of our intelligence service.
Broad Range of Problems
Furthermore, both the State and Defense departments these
days have a vast range of absorbing problems to deal with-in
forming policy, planning for a wide variety of contingencies, and
implementing their policies in action. To burden them also with
the major responsibility for gathering and evaluating intelligence
would tend to subordinate that function to their other roles and
reduce the importance of the task an intelligence service must
perform.
That task is to provide the makers of our foreign policy-
primarily the President, the Secretary of State and the Secretary
of Defense, but including others in government strictly on a
"need-to-know" basis-with information on what is going on and
what are the likely future developments in the world about us.
Any information from any source that bears on the security of
the United States lies within the scope of the intelligence service.
Of course, particular emphasis is placed on information about
Does the United States need a central intelligence service? the countries whose policies are hostile to us, namely the Com-
This question has often been asked me. The inquirer then goes munist bloc. We must know as much as possible about their
on to point out that the Departments of State and Defense have power and their plans, about the types of military "hardware"
their own intelligence resources. Officers of the U.S. Foreign they are developing, particularly the missiles, nuclear bombs, air-
Service and various military attaches do collect information and craft and the other elements of their offensive strength which
these two departments have their intelligence experts who an- they could bring to bear upon us and our allies.
alyze incoming data. In general these people are well qualified and If anyone has any doubt about the importance of obtaining ob-
do a good job. Are not their accomplishments sufficient to our jective intelligence, I would suggest that he merely study the
needs? mistakes political leaders have made in the past because they
The answer given to this question in our time by both the were badly advised or because they misjudged the facts and
executive and legislative branches of government has been in the therefore the attitudes of other countries. When Kaiser Wil-
negative; Congress passed the legislation establishing the Central helm II ordered the invasion of France by way of Belgium in
Intelligence Agency and the President signed the bill. No effort 1914, he had been persuaded by his military leaders that the
has been made to repeal this legislation, for the character of violation of Belgian neutrality was essential to military success.
the Communist threat has made it necessary, even crucial, to But he relied too heavily on the judgment of these same military
our survival. The Soviet Union, Communist China and the en- men, who were reasonably sure, on military grounds, that Eng-
tire Communist bloc surround all their activities, both of a mili- land would not enter the war on behalf of the Belgians. The
Lary nature and of the sort we term subversive, with a wall of Kaiser had received ample warning from the political side and
secrecy and security. Tie int hence co f t t ure to appraise the available
P34 1 Approved For ke~ease 206 ~~A >~ : 644- ` `66' 69 bvff6d aTf66~ ~}
?se
in
;)d
ih
icc
Ad
.st
~ he
lid
intelligence objectively. ~11n~/n~/~.QQ
The days leadingAppmv(PrA vQr
examples. Disregarding Churchill's warnings and various intelli-
gence sources, the British failed to comprehend both the inten-
tions and the growing military capabilities of Nazi Germany.
They especially underestimated Germany's striking power
through the air. Hitler likewise made a series of miscalculations.
After France had fallen and most of the Continent was in German
hands, he discounted the strength and determination of Britain
to hold out much longer and opened a second front against Rus-
sia in June 1941. Also, when he was advised of the plan for a U.S.-
British landing in North Africa in 1942, he reportedly refused
to pay attention to the available intelligence. I have been told
that he remarked casually, "They don't have the ships to do it."
In our own case, the warnings the United States received prior
to Pearl Harbor may not have been clear enough to permit the
President and his military advisers to pinpoint the attack on
Hawaii and the Philippines; but, had they been adequately
analyzed, they would have alerted us to the imminent danger of
sudden attack somewhere in the Pacific. As for Japan, success-
ful as was the Pearl Harbor attack, its government proved later
to have made the greatest miscalculation of all when it under-
estimated United States military potential.
Today's intelligence service finds itself in the situation of hav-
ing to maintain a constant watch in every part of the world, no
matter what may at the moment be occupying the main at-
tention of diplomats and military men. Our vital interests are
subject to attack in almost every quarter of the globe at any
time.
Unpredictable Involvements
A few decades ago no one would have been able or willing to
predict that in the 1960s our armed forces would be stationed in
Korea and be deeply engaged in South Vietnam (how many of us
even knew the latter existed?), or that Cuba would have be...
come a hostile Communist state closely allied with Moscow,
or that the Congo would have assumed grave importance in our
foreign policy. Yet these are all facts of life today. The coming
years will undoubtedly provide equally strange developments.
Today it is impossible to predict where the next danger spot
may develop. It is the duty of intelligence to forew,irn of such
dangers, so that the government can take action. No longer
can the search for information be limited to a few countries.
The whole world is the arena of our conflict. In this age of
nuclear missiles even the Arctic and the Antarctic have become
areas of strategic significance. Distance has lost much of its old
significance, while time, in strategic terms, is counted in hours
or even minutes. The oceans, which even in World War II pro-
tected this country and allowed it ample time to prepare for
eventual participation, are still where they have always been.
But now they can be crossed by missiles in a matter of minutes
and by bombers in a few hours. Today the United States is in the
front line of attack, for it is the main target of its adversaries.
No longer does an attack require a long period of mobilization
with its telltale evidence. Missiles stand ready on their launchers,
and bombers are on the alert.
Therefore, an intelligence service today has an additional re-
sponsibility, for it cannot wait for evidences of the likelihood of
hostile acts against us until after the decision to strike has been
made by another power. Our government must be both fore-
warned and forearmed. The situation becomes all the more com-
plicated when, as in the case of Korea and Vietnam, a provocative
attack is directed not against the U.S. but against some distant
overseas area which, if lost to the Free World, would imperil our
own security. Obviously, then, the very nature of the intelligence
service has changed radically in the past two decades.
T~?~r t ,{IJ"6a n by the U.S.S.R.
~1Tc3~ifa~fis'E Karee llcrit testimony to this change.
Great areas of both countries are officially scaled off from foreign
eyes. The information that these countries release about their
military establishment is carefully controlled and patently mis-
leading, and yet accurate knowledge is needed for our defense and
for defense of the Free World. The Soviet Union has so far re-
fused to permit the inspection and control that are essential for
nuclear and conventional arms limitations. The Communist na-
tions brazenly assert that this secrecy is a great military asset
and an element of basic policy. As in Cuba, they arm in secret in
order to be able to attack in secret, as they did in Korea. In
1.955 the U.S.S.R. refused the "open skies" proposal of President
Eisenhower, which we were prepared to have applied to our
country on the same terns as to their own. It is the task of the
U.S. intelligence service to right the uneven balance of essential
knowledge about military capabilities and their preparation; to
do so it has no other choice than to break through the Com-
munists' shield of secrecy.
United States as Leader
The United States has been forced by the course of events,
particularly by the aggressive tactics of the Soviet Union, to
assume a role of leadership in the Free World. Not only da we
have formal allies. but there are many other friendly nations
who share our view of the Communist threat. Our partners in the
Free World are making a real contribution to the West's total
strength, and this includes contributions in matters of intelligence
that help keep the Free World forewarned. However, some of
our friends lack the resources to develop an effective intelligence
organization, and they look to the United States to play a major
role in this field and to advise them if we uncover hostile plans
against them. It is in our interest to do so. One of the most grati-
fying features of my work has been the co-operation established
between the U.S. intelligence service and its counterparts
throughout the world who make common cause with us in un-
covering aggressive moves of the Communists.
There is another side of the coin in intelligence work, known
most commonly as counterintelligence, devoted to warding off
the vigorous onslaught of espionage emanating largely from Com-
munist nations and aimed at penetrating our most important se-
crets in the fields of national defense and foreign policy.
Red Espionage Formidable
In the Soviet Union, we are faced with an antagonist who has
raised the art of espionage to an unprecedented height, while
developing the collateral techniques of subversion, deception and
penetration into a formidable political instrument of attack.
No other country has ever before attempted espionage on such
a scale. These operations have gone on in times of the so-called
thaw with the same vigour as in times of acute crisis. We have
the task of ferreting out and "neutralizing" hostile agents and
hostile activities that present a common danger to us and to our
allies and friends, and we also must keep our allies and friends
alerted.
The fact that so many Soviet spy cases have been uncovered
recently in several NATO countries is not due to mere chance. It
is well that the world should know what the Soviets know already,
namely, that the free countries of the world have been developing
increasingly sophisticated counterintelligence organizations and
have become more and more effective over the years in uncover-
ing Soviet espionage. Naturally, in all of our formal alliances we
have a direct interest in the internal security arrangements of
countries that may share some of our military secrets. If a NATO
document is filched from one of our NATO allies, it is just as
harmful to us as if it had been stolen from our own files. Herein
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 15
THE CR AGEN
A~pi0o ieidNFoT~4e(ease 2/06/18: CIA-RDP84-00161 R00010017.R0C 5-7
lies one of the pressing reasons for co-operation in counterintelli- soever. It is, however, response le or the security investigation
1 't f if own in-
s
gence work.
No matter how much accurate intelligence it collects or how
efficient is its counterintelligence capability, an intelligence serv-
ice is not fulfilling its purpose unless it can serve a third and
extremely important function. This consists of analyzing the
intelligence and reaching judgments or estimates on the basis of
all information, both overt and secret, available on any subject
of importance to the national security. In the United States this
process is generally referred to as the production of national
estimates, in which all the various U.S. intelligence groups par-
ticipate under the leadership of the Director of Central Intelli-
gence.
The President Always Reachable
There is one aspect of intelligence work that may seem rather
mechanical, but nevertheless presents some very real and practi-
cal problems. This is the matter of getting intelligence to its
"consumers" in a manner that will ensure prompt and thorough
consideration of its implications for policy. At the present time
the responsibilities for this procedure have been clearly fixed. I
believe this is one of the major improvements realized through
the CIA.
Arrangements have been made so that the President and other
senior officers of government, as required, can be instantly
reached by the Director of Central Intelligence or by their own
intelligence officers. Experience over the years has proved that
this system really works. I don't recall a single instance, during
my service as director of the CIA, when I failed to reach the
President in a matter of minutes with any item of intelligence
Lfelt was of immediate importance. Today, it is a rare occasion
indeed when an important policy decision pertaining to foreign
affairs is made without an intelligence estimate first having been
submitted covering the essential considerations involved.
These are the things an intelligence service in a free society
should do, but there are others it should not do that are equally
important to understand. First, as has already been implied, an
intelligence service should have a clear understanding of its re-
lation to policy decisions. It should not consider itself a policy-
making organization, despite the fact that an intelligence estimate
and the conclusions in it may, and often do, have considerable in-
fluence on what policy is finally adopted. This proper function
of intelligence has given rise to the mistaken charge that intelli-
gence is meddling in policy. If the intelligence officer proposes
policy or colours his conclusions in order to influence policy de-
cisions he is acting improperly. Everything in the present
mechanism of intelligence reporting and the preparation of esti-
mates guards against this happening.
We Have No Secret Police
of its own employees and for the physica securr y o
stallations. The spheres of operation of the Central Intelligence
Agency on the one hand and of the Federal Bureau of Investi-
gation on the other are quite distinct. Naturally, there must al-
ways be close co-operation between the two organizations, par-
ticularly in the matter of sharing information pertaining to
Communist espionage, for such information is acquired both at
home and abroad.
Once having clearly in mind the chief functions of intelligence
services in the Free World, one is able to look at the details-the
day-to-day operations of the service-in the proper perspective.
But first one should have at least a brief view of the role intelli-
gence has played in history.
III. INTELLIGENCE IN ITS
HISTORICAL SETTING
The history of intelligence activities is probably as old as the
rivalries between sovereign nations or communities. So long as
there is a need to protect vital interests and to promote the
power and welfare of a state or ruler, there is also a need for
intelligence. Thus the first instances of its use may be drawn
from the earliest recorded events.
Indeed it even has its place in mythology. The god Apollo
became enamoured of Cassandra, daughter of Priam of Troy, and
bestowed on her the ability to see into the future. With this gift,
her intelligence activities were worth more than those of any num-
her of conventional spies, and she turned in accurate "estimates"
of the consequences of abducting Helen to Troy and of accepting
the "Greek gift" of the Trojan horse. But Apollo, after he had
been rebuffed by Cassandra, added the proviso that her proph-
ecies should not be believed. Hence her intelligence forecasts
were disregarded. The result was the fall of Troy. While not all
intelligence officers have suffered the same fate as Cassandra,
it is a commonplace of history that intelligence is all too often
disregarded or not even solicited.
Moses Sent Forth Spies
The Bible contains accounts of several intelligence operations,
one of the earliest of which appears in chapter 13 of Numbers.
While Moses was in the wilderness with the Children of Israel,
he was directed by the Lord to send a ruler of each of the 12
tribes "to spy out the land of Canaan," which had been desig-
nated as their home. Moses gave them instructions to "see the
land, what it is; and the people that dwelleth therein, whether
they he strong or weak, few or many." And "so they went up,
and searched the land." They spent 40 days on their mission and
returned hearing grapes and pomegranates and figs as well as
the report, "surely it floweth with milk and honey, and this is the
fruit of it." But 10 of the 12 members of the mission (Joshua
and Caleb dissenting) submitted that the military outlook was
bleak, that the Canaanites were "men of a great stature" and "the
cities ... walled and very great." This report so discouraged the
Israelites that they "murmured against Moses and against
Aaron." The Lord then decreed that because of the little faith
that the people had shown in him, they "should wander in the
wilderness forty years."
This particular intelligence mission had been doomed from
the start, and was obviously simply a means to test the faith of
the Israelites. Instead of a few technicians, an unwieldy number
of political leaders had been dispatched to do the job. Here was an
obvious case of allowing policy makers to impose their prejudices
upon the intelligence picture. But after the 40 years had expired
a more successful operation took place when Joshua sent out two
There is another rule which an intelligence service in a free
society should follow scrupulously: it should never become in-
volved in domestic security matters. In totalitarian systems the
intelligence function is often combined with internal security
operations, which include the liquidation of so-called "enemies of
the state" at home or abroad. Such was the case with Himmler's
Gestapo, the secret police in Japan under the militarists, and the
Russian security services under the tsars as well as during the
Communist regime. This warped use of the intelligence apparatus
and the wide notoriety it has obtained has tended to confuse
many people about the true functions of an intelligence service in
a free society. Moreover, there have been many instances-
most conspicuously in Latin America-in which dictators have
converted authentic intelligence services into private gestapos for
maintaining their rule.
" and they lnthis~N &V 6Po e e1i 2~~ ~11 a Ah~ 4ell to 1~s -0016 R'0001y60170005Iwere received in Jericho in the
THE CRAFT OF INTELLIGENCE
house of Rahab the ha sne v622 for d ee i e for this kind
I cf ljtl. p,/1 8? ~`~I' d'
instance on record of what is now called in the mtel igence tra e o~ servo Ion, ut t ey a so 0prove ed a s from which to
a "safe house." Rahab concealed the spies and got them safely establish regular networks of espionage. By the sixteenth century,
out of the city with their intelligence. The Israelites conquered most European governments were following the example of the
Jericho "and utterly destroyed it and its people except that Italian city-states.
Rahab and her family were saved." Thus was established the Because map making was an almost unknown art in earlier
tradition that those who help the intelligence process should be times, an important item of intelligence was information on local
rewarded. geography. Knowledge of a river ford might allow an army to
Throughout ancient history, from Cyrus the Great to Alexan- escape encirclement; discovery of a mountain path could show
der the Great to the Roman Caesars, the effective use of intelli- the way past a strong enemy position. Local inhabitants could
gence and espionage was a hallmark of the exploits of a successful usually be induced to give this kind of information, and Louis IX
military leader. Mithradates VI, the king of Pontus, fought the gave a large reward to a Bedouin who showed him where to
power of Rome to a standstill in Asia Minor, in part because he cross a branch of the Nile, thereby enabling him to stage a sur-
had become an outstanding intelligence officer in his own right. prise attack upon a Muslim army. Louis' son turned a strong
He mastered 22 languages and dialects and knew the local tribes defensive position in the Pyrenees by buying information about
and their customs far better than did the Roman conquerors. a little-used route through the mountains. Better known is the
During the Middle Ages, due as much to the fragmented politi- incident in the Crecy campaign when Edward III was nearly
cal situation as to the difficulties of transportation, supply and hemmed in by a large French army. A shepherd showed him a
mobilization, it was impossible to attain strategic surprise in mili- ford across the Somme, and Edward not only escaped pursuit
tary campaigns. It took weeks, even months, to assemble an army, but also obtained such a strong defensive position that he was
and even when the force had been collected, it could move only a able to break the French army when it finally attacked.
few miles a day. Sea-borne expeditions could move somewhat When European politics became more sophisticated with the
more unobtrusively, but the massing of ships was difficult to con- rise of nationalism, the first specialists began to appear on the
ceal. For example, in 1066 King Harold of England had all the scene-ministers and secretaries of cabinet who devoted much
essential intelligence long before William the Conqueror landed time to organizing the collection of secret information. In Eng-
at Hastings. He had been in Normandy himself and had seen land there were Sir Francis Walsingham and Lord Burghley for
the Norman army in action. He knew that William was planning Queen Elizabeth I, John Thurloe for Cromwell. In France there
an attack; he estimated the planned embarkation date and land- was a long series of police "lieutenants," running from the days
ing place with great accuracy; and, judging by the size of the of Louis XIII and Richelieu to Napoleon. The Minister of Police
force he concentrated, he made a very good guess about the num- for the latter, the notorious Joseph Foucbe, directed political
ber of William's troops. His defeat was not due to strategic in- espionage to uncover the plottings of Jacobins, royalists and
telligence deficiencies. He lost, rather, because his troops were emigres both at home and abroad.
battle-weary, sick and exhausted after a long forced march.
Medieval Europe in the Dark
A more organized kind of strategic intelligence collection was
needed when western Europeans came into conflict with people
outside their own area. They were not very well informed about
the Byzantine Empire and the Eastern Slavs; they knew even
less of the Muslim world, and they were almost completely ig-
norant of anything that went on in Central and East Asia. Em-
peror Frederick II (1212-1250) tried to keep up contacts with
Muslim rulers (and was denounced as a heretic for his pains)
and Louis IX of France (1226-1270) sent emissaries to the
Mongols. Marco Polo's famous book about China contained ma-
terial that would have been useful for strategic intelligence, but
no one looked at it in that light. Throughout most of the Middle
Ages Italian merchants did obtain considerable information about
the East; unfortunately, they seldom had a chance to pass it on
to the people who determined Europe's policies in that direction.
The most serious political mistakes of western Europe in the
Middle Ages were made in relation to the East, due in large part
to inadequate intelligence collection. European rulers consistently
weakened Byzantium, instead of supporting it as a bulwark
against invasion. They failed to recognize both the dangers and
the opportunities created by the Mongol drive to the west. They
underestimated the Turkish threat during the period when the
Ottomans were consolidating their power. Given their prejudices,
they might have made the same mistakes even if they had had
better intelligence support, but without it they had almost no
chance of making correct decisions.
In the fifteenth century the Italians made an important con-
tribution to intelligence collection by establishing permanent
embassies abroad. The envoys of Venice were especially adept at
obtaining strategic intelligence. Many of their reports were of a.
very high quality, full of accurate observations and shrewd judg-
Sir Francis Walsingham, who combined diplomacy with espionage In the service
of Queen Elizabeth I
Culver Pictures, Inc.
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
c a a 1/ v a s v e
pproved 1or a ease 0 2/06/18 : CIA-RDP84-00161 R000100170005-7
One of the great intelligence services of the nineteenth cen-
tury in Europe was that maintained not by a government, but by
a private firm, the banking house of Rothschild. In promoting
their employers' financial interests from headquarters in Frank-
furt-am-Main, London, Paris, Vienna and Naples, the Rothschild
agents were often able to gain vital intelligence before govern-
ments did. In 1815, while Europe awaited news of the Battle of
Waterloo, Nathan Rothschild in London already knew that the
British had been victorious. In order to make a financial killing,
he then depressed the market by selling British government se-
curities; those who watched his every move in the market did
likewise, concluding that Waterloo had been lost by the British
and their allies. At the proper moment he bought back in at the
low, and when the news was finally generally known, the value
of government securities naturally soared.
Disraeli's Suez Coup
Sixty years later Lionel Rothschild, a descendant of Nathan,
on one historic evening had Disraeli as his dinner guest. During
the meal a secret message came to Lionel that a controlling in-
terest in the Suez Canal Company, owned by the Khedive of
Egypt, was for sale. The Prime Minister was intrigued with the
idea, but the equivalent of about $44,000.000 was required to
make the purchase. In the absence of Parliament, he could not
get it quickly. So Lionel bought the shares for the British gov-
ernment, enabling Disraeli to pull off one of the great coups of
his career. It was rumoured that some of the Rothschild "scoops"
were obtained by use of carrier pigeons. There was probably little
basis for the rumour, although it is true that one of the Roths-
childs, immobilized in Paris when the city was surrounded by
Germans in the Franco-German War of 1870, used balloons and
Maj. Allan Pinkerton (left), who organized an espionage system for the U.S.
during the Civil War, photographed with Pres. Abraham Lincoln and Maj. Gen.
J. A. McClernand at the headquarters of the Army of the Potomac in Oct. 1862
Unitvrt Press inr~r,,oHonaa
possibly also carrier pigeons to communicate with the outside
world. The world heard of the armistice ending the war through
this means, rather than through conventional news channels.
Prussian espionage in the nineteenth century is perhaps the
first that can be credited with a mass organization. Previously
espionage had made use largely of a few highly-placed ihdi-
viduals. In preparing for the campaigns against both Austria in
1866 and France in 1870, Prussian intelligence, directed by Wil-
helm Stieber, enlisted the services of hundreds of low-level in-
formants in the countries Prussia intended to attack.
In United States history, only in wartime has there been much
evidence of government intelligence activity, at least until re-
cent times. George Washington fortunately possessed a keen
understanding of the value and methods of secret intelligence
and of the need for keeping such activities utterly secret-so
secret, in fact, that we may never have the full history of his in-
telligence operations. The most famous incident of American spy-
ing (and unsuccessful spying at that) in the Revolution is of
course the story of Nathan Hale, but there is some evidence that
the unfortunate outcome of this episode is exactly what drew
Washington's attention to the need for more professional and de-
pendable secret intelligence operations. Washington's financial
accountings show that he spent around $17,000, a lot of money in
those days, on secret intelligence and that one of his main tar-
gets, where he kept a complex network of agents and couriers,
was the New York area. Many supposed Tories with access to
British headquarters there were really secret agents of General
Washington. Of the many battles in which intelligence played an
important role in the Revolution, the Battle of Saratoga, the
turning point of the war, was by far the most outstanding.
Civil War Activity
During the Civil War, of course, both sides were intensely en-
gaged in intelligence activities, particularly espionage. A civil war
always presents difficult problems for the counterintelligence
officer. Each side has little difficulty in finding spies and agents
whose speech, appearance, and mode of living are identical with
those of the enemy. Almost the only way to uncover a spy under
these circumstances is to apprehend him in flagrante.
Nevertheless, just prior to and during the opening phase of the
Civil War our federal government had a dearth of organized in-
telligence facilities. Then certain intelligence and security work
was farmed out to the private Pinkerton's National Detective
Agency, originally hired only to guard the person of president
Lincoln and to run down plots against him and his Cabinet. In
the early days of the war, Pinkerton men were also watching
nearby Virginia for signs of sabotage, uprisings, and military
action that would have isolated and paralyzed the city of Wash-
ington. In later years Mr. Pinkerton's agency was to become a
famous detective organization in this country, specializing in pro-
tection of industrial properties. At that time, however, his men
were pinch-hitting in jobs which today are part of the duties of
three quite distinct government organizations: the Secret Service
(guarding the President), the FBI (dealing with domestic
counterespionage), and the CIA (collecting foreign intelligence).
When the United States entered World War I, initially it had
to rely largely on the French and British for tactical and strategic
intelligence. But we learned rapidly-due largely to a group of
officers to whom I wish to pay tribute. There was, first of all,
Colonel Ralph H. Van Deman, who is considered by many to be
the moving force in establishing a U.S. military intelligence. His
work is described in what I consider the best account by an
American author of intelligence services through the ages, The
Story of Secret Service, by Richard Wilmer Rowan. I worked
personally with Colonel Van Deman in World War I when I was
in Bern, and I can attest to the effective work that he and his
P84-0061 R000100170005-7
-h
sl
ce
,o
u-
,y-
of
cat
.its
an
of
ice
is
i ad
r zic
r of
ill,
7e
'.!is
an
/Ie
t~d
as
fis
successors, General App*oVedfF ra reasL&1240200 : (NAAI)P84tbOc 6M000007 6sput over
telligence today.
The British and French, the Germans, and later the Italians,
entered World War II with highly developed secret intelligence
organizations in addition to military intelligence services. During
the war years when I was with the OSS, I had the privilege of
working with the British service and developed close personal
and professional relationships which remained intact after the
war. In Switzerland I made contact with a group of French
officers who were helping to build the intelligence service of
De Gaulle and the Free French. Near the end of the war, co-
operation was established with a branch of the Italian Secret
Service that declared allegiance to King Victor Emmanuel when
non-Fascist Italy joined the Allied cause. Through much of the
war, I was also working secretly with the anti-Nazi group in the
German Abwehr, the professional intelligence service of the Ger-
man army. This group was involved in secret plots against Hitler.
The head of the Abwehr, the extraordinary Admiral Canaris, was
executed by Hitler after records were discovered proving that
Canaris had co-operated with those who made the unsuccessful
attempt on Hitler's life on July 20, 1944.
Legacy of World War II
This wartime co-operation with the intelligence services of
the Free World has contributed, I believe, toward creating a
certain unity of purpose among them today. NATO, SEATO, and
other security communities are examples of present-day co-
operation, needed to help the Free World counter the subversive
activities and Cold War tactics of the intelligence and security
services of the Soviet Union.
Essential to any discussion of the history of intelligence is a
consideration of the Soviet service, which is one of the most
tightly structured organizations of its kind in the world. It has
just celebrated its 45th anniversary with what, for the Soviets,
was a good deal of fanfare, considering their usual reticence
on this subject. On December 20, 1962, an article appeared in
Pravda written by the present Chief of Soviet State Security
(K.G.B.), V. Semichastniy, which opened with the words,
"Forty-five years ago today, at the initiative of Vladimir Ilyich
Lenin ..." and went on to describe the founding of the first
Soviet security body, the Cheka, in 1917, and to summarize the
ups and downs of 45 years of Soviet police history. While the
purpose of the article was no doubt to improve the public image
of this justly feared and hated institution, its importance to the
foreign observer lay in the tacit admission that despite changes
of name and of leadership, the Soviets really view this organiza-
tion as having a definite and unbroken continuity since the day
of its founding.
Dual Totalitarian Services
Most totalitarian countries have, in the course of time, de-
veloped not just one but two intelligence services with quite
distinct functions, even though the work of these services may
occasionally overlap. One of these organizations is a military
intelligence service run by the general staff and responsible for
collecting military and technical information abroad. In the
U.S.S.R. this military organization is called the G.R.U. (Intelli-
gence Directorate). G.R.U. officers working out of the Soviet
Embassy in Ottawa operated the atomic spy networks in Canada
during World War II. The other service, which more typically
represents an exclusive development of a totalitarian state, is the
"security" service. Generally such a service has its origin in a se-
cret police force devoted to internal affairs such as the repression
of dissidents and the protection of the regime. Gradually this
organization expands outward, thrusting into neighbouring areas
the globe
Since this security service is primarily the creation of the clique
or party in power, it will always be more trusted by political
leaders than is the military intelligence service, and it will usually
seek to dominate and control the military service, if not to ab-
sorb it. In Nazi Germany the "Reich Security Office," under
Himmler, during 1944 completely took over its military counter-
part, the Abwehr. In 1947, the security and military services in
Soviet Russia were combined-with the former dominant-but
the merger lasted only a year. In 1958, however, Khrushchev
placed one of his most trusted security chiefs, General Ivan
Serov, in charge of the G.R.U., apparently in order to keep an eye
on it.
But whether or not the security service of a totalitarian state
succeeds in gaining control of the military service, it inevitably
becomes the more powerful organization. Furthermore, its func-
tions, both internal and external, far exceed those of the intelli-
gence services of free societies. Today, the Soviet State Security
Service (K.G.B.) is the eyes and ears of the Soviet state abroad
as well as at home. It is a multipurpose, clandestine arm of power
that can in the last analysis carry out almost any act that the
Soviet leadership assigns to it. It is more than a secret police
organization, more than an intelligence and counterintelligence
organization. It is an instrument for subversion, manipulation
and violence, for secret intervention in the affairs of other coun-
tries. It is an aggressive arm of Soviet ambitions in the Cold
War. If the Soviets send astronauts to the moon, I expect that
a K.G.B. officer will accompany them.
Tsarist Secret Police
Secret police were not invented by the Soviets, and even the
foreign operations of the K.G.B. have precedents in Russian his-
tory. The purpose of the tsars' Okhrana was to "protect" the
Imperial family and its regime. In this capacity it kept watch on
the Russian populace by means of armies of informants, and
once even distinguished itself by tailing the venerable Leo Tol-
stoi around Russia. Tolstoi had long since become a world-re-
nowned literary figure, but to the Okhrana he was only a retired
army lieutenant and a "suspect."
In the late nineteenth century there were so many Russian
revolutionaries, radical students and emigres outside Russia that
the Okhrana could not hope to keep Imperial Russia secure
merely by suppressing the voices of revolution at home. It had
to cope with dangerous voices from abroad. It sent agents to
join, penetrate and provoke the organizations of Russian students
and revolutionaries in western Europe, to incite, demoralize, steal
documents, and discover the channels by which illegal literature
was being smuggled into Russia. When Lenin was in Prague in
1912, he unknowingly harboured an Okhrana agent in his house-
hold. The primary reason for secret police operations abroad is to
neutralize the political opposition of its own nationals in exile;
although the Okhrana generally limited itself to this mission,
Soviet State Security has not.
No sooner had the Bolsheviks seized power in Russia than
they established their own secret police. The Cheka was set up
under Feliks Dzerzhinski in December 1917 as a security force
with executive powers. The name stood for "Extraordinary
Commissions against Counter-Revolution and Sabotage." The
Cheka was a militant, terroristic police force that ruthlessly
liquidated civilians on the basis of denunciations and suspicion of
bourgeois origins. It followed the Red armies in their conflicts
with the White Russian forces, and operated as a kind of counter-
espionage organization in areas where sovietization had not yet
been accomplished. In 1921 it established a foreign arm, because
by that time White Russian soldiers and civilian opponents of the
Approved For Release 2002/06/18 : CIA-RDP84-00161 ROOO1OO17OOO5-7
THE C AFT OP NTE-LLIGEE V
Approved For Release z606/18: CIA-RDP84-00161 R000100170005-7
Bolsheviks who could manage to do so had fled to western Europe he had perpetrated both the killings.
and the Middle and Far East and were seeking to strike back
against the Bolsheviks from abroad.
Almost at once this foreign arm of Soviet security had a much
bigger job than ever confronted the tsar's Okhrana. It had not
only to penetrate and neutralize the Russian exile organizations
that were conspiring against the Soviets, but also to discover
and guard against the hostile acts of those Western powers anx-
ious to see the downfall of the Bolsheviks. It thus became a
political intelligence service with a militant mission. In order
to achieve its aims, it engaged in violence and brutality, in kid-
napping and murder, both at home and abroad. This activity
was directed not only against the "enemies of the state" but
against fellow Bolsheviks who were considered untrustworthy or
burdensome. In Paris in 1926 the Soviet security murdered Gen-
eral Petliura, the exiled leader of the Ukrainian nationalists.
In 1930, again in Paris, it kidnapped General Kutepov, the leader
of the White Russian war veterans; in 1937, the same fate befell
his successor, General Miller: For over a decade Leon Trotski,
who had gone into exile in 1929, was the prime assassination tar-
get of Stalin. On August 21, 1940, the old revolutionist died in
Mexico City after being slashed with an Alpine climber's ice ax by
an agent of Soviet security.
Lest anyone think that these violent acts against exiles who
opposed or broke with the Bolsheviks in the early days were
merely manifestations of the rough-and-tumble era of early
Soviet history or of Stalin's personal vengefulness, it should
be pointed out that in the subsequent era of so-called "socialist
legality," which was proclaimed by Khrushchev in 1956, a
later generation of exiled leaders was wiped out. The only dif-
ference between the earlier and later crops of political murders
lay in the subtlety and efficacy of the murder weapons. The
mysterious deaths in Munich, in 1957 and 1959, of Lev Rebet
and Stephen Bandera, leaders of the Ukrainian ernigres, were
managed with a cyanide spray that killed almost instantaneously.
This method was so effective that, in Rebet's case, it was long
thought that he had died of a heart attack. The truth became
known only when the K.G.B. agent Bogdan Stashinskiy gave
himself up to the German police in 1961 and acknowledged that
In 1922, the Cheka became the G.P.U. (State Political Ad-
ministration), which in 1934 became part of the N.K.V.D. (Peo-
ple's Commissariat for Internal Affairs). This was a consolida-
tion which finally brought together under one ministry all police,
security and intelligence bodies-secret, overt, domestic and
foreign. As the foreign arm of Soviet security was expanding
into a world-wide espionage and political action organization, the
domestic arm grew into a monster. It is said that under Stalin
one out of every five Soviet citizens was reporting to it. In ad-
dition, it exercised control over the entire border militia, had an
internal militia of its own, ran all the prisons and labour camps,
and had become the watchdog over the government and over
the Communist party itself. Its most frightening power as an
internal secret police lay in its authority to arrest, condemn and
liquidate at the behest of the dictator, his henchmen or even
on its own cognizance, without any recourse to legal judgment
or control by any other organ of government.
During the war years and afterward the colossus of the
N.K.V.D. was split up, reconsolidated, split up again, reconsoli-
dated again, and finally split up once more into two separate
organizations. The M.G.B., now K.G.B., was made responsible
for external espionage and high-level internal security; the other
retained all policing functions not directly concerned with state
security at the higher levels and was called the M.V.D. (Ministry
of Internal Affairs).
Obviously, any clandestine arm that can so permeate and con-
trol public life-even in the upper echelons of power-must
he kept under the absolute control of the dictator. Thus, it
must occasionally be purged and weakened to keel) it from swal-
lowing up everything, the dictator included The history of Soviet
state security, under its various names, exhibits many cycles of
growing strength and subsequent purge, of consolidation and of
splintering, of rashes of political murders carried out by it and
similar rashes against it. After the demise of any leader who
had exploited it to keep himself in power, the service had to be
cut back to size. Stalin used the G.P.U. to enforce collectiviza-
tion and liquidate the kulaks during the early thirties, and the
N.K.V.D. during the mid-thirties to wipe out all the people he
Wide World
Body of Joseph Stalin lying In state
In Moscow in March 1953. Stalin, now
repudiated by the Soviet government,
was honoured by a line of mourners
that stretched for ten miles, 16
abreast
d Fo 0"6'-
A vera mease20 8?: IA-RDP84-00161
THE CRAFT OF INTELLIGENCE
did not trust or like in the Pat the r and ,p nd capture. b the
Then in 1937 he Ai N`(1Yeeiissroumen ~o ~ige ion sel1. is CIOkhr the Russian 8 revolutionaries 17t0065 late in tl
mn
d
chiefs and leading officers knew too much about his crimes, and
their power was second only to his. By 1953, after the death of
Stalin, the security service was again strong enough to become a
dominant force in the struggle for power, and the so-called "col-
lective leadership" felt they would not be safe until they had
liquidated its leader, Lavrenti Beria, and cleaned out his hench-
men.
In Khrushchev's now-famous address to the 20th congress of
the Communist party in 1956, in which he exposed the crimes of
Stalin, the main emphasis was on those crimes Stalin had com-
mitted through the N.K.V.D. This speech not only served to open
Khrushchev's attack on Stalinism and the Stalinists still in the
regime, but was also intended to justify new purges of existing
state security organs, which he had to bring under his control in
order to strengthen his own position as dictator. Anxious to give
both the Soviet public and the outside world the impression that
the new era of "socialist legality" was dawning, Khrushchev sub-
sequently took various steps to wipe out the image of the security
service as a repressive executive body. Once again, a change of
name was in order. Khrushchev announced on September 3, 1962,
that the Ministry of Internal Affairs (M.V.D.) was now to be
called the Ministry of Public Law and Order. Just what this new
ministry would do he did not clarify, although he did promise
that no more trials would be held in which Soviet citizens were
condemned in secret.
New Soviet Controls
But internal control systems still exist, even though in new
forms. For example, under the terms of a decree published on
November 28, 1962, an elaborate control system hac been estab-
lished which, to quote the New York Times (November 29,
1962), "would make every worker in every job a watchman over
the implementation of party and government directives." In com-
menting on the decree Pravda made reference to earlier poor
controls over "faking, pilfering, bribing and bureaucracy" and
asserted that the new system would be a "sharp weapon" against
them, as well as against "red tape and misuse of authority" and
"squanderers of the national wealth." The new watchdog agency
is called the Committee of Party and State Control.
With so many informers operating against such broad cate-
gories of crimes and misdemeanours, it should be possible to put
almost anyone in jail at any time. And indeed the press hag been
full of reports recently that courts in the Soviet Union have been
handing down death or long prison sentences for many offenses
that in the United States would be only minor crimes or mis-
demeanours. It should also be noted that Aleksandr N. Shelepin,
who was designated by the Central Committee of the Communist
Party of the Soviet Union to be the head of this new control
agency, once served as head of the K.G.B., having succeeded
General Ivan Serov in 1958.
But all these shake-ups, purges and organizational changes
seem to have had remarkably little effect on the aims, methods
and capabilities of that part of the Soviet security service which
interests us most-its foreign arm. Throughout its 45 years it
has accumulated an enormous fund of knowledge and experience:
techniques that have been amply tested as to their suitability in
furthering its aims in various parts of the world, and files of in-
telligence information kept intact through all the political power
struggles. It has in its ranks intelligence officers (those who sur-
vived the purges) of 20 to 30 years' experience. It has on its
rosters disciplined, experienced agents and informants spread
throughout the world, many of whom have been active since the
1930s. And it has a tradition that goes all the way back to tsarist
days.
c een r an
early twentieth centuries developed the conspiratorial techniques
that later stood the Soviets in such good stead. The complicated
and devious tricks of concealing and passing messages, of falsi-
fying documents, of using harmless intermediaries between sus-
pect parties so as not to expose one to the other or allow both
to be seen together--these were all survival techniques developed
after bitter encounters with and many losses at the hands of
the tsar's police. When the Soviets later founded their own secret
police, these were the tricks they taught their agents to enable
them to evade the police of other countries. Even the very words
used by the Bolsheviks in their illegal days before 1917 as a
kind of private slang became, with time, the terms in official use
within the Soviet intelligence service.
A brief look at the end product of this tradition, the Soviet
intelligence officer, should provide a fitting close to a history of
intelligence work. To many he represents the culmination of cen
turies of the development of the breed. To my mind he represents
the species Homo Sovieticus in its unalloyed and most successful
form-this strikes me as much the most important thing about
him, more important than his characteristics as a practitioner of
the intelligence craft. It is as if he were the human end product
of the Soviet system, the Soviet mentality refined to the rrth de-
gree.
He is blindly and unquestioningly dedicated to the cause, at
least at the outset. lie has been fully indoctrinated in the politi-
cal and philosophical beliefs of communism and in the basic
"morality" which proceeds from those beliefs. This morality
holds that the ends alone count, and that any means that achieve
them are justified. Since the ingrained Soviet approach to the
problems of life and politics is entirely conspiratorial, it is no
surprise that this approach finds its ultimate fulfillment in intelli-
gence work.
Soviet Operative Ranks High
The Soviet intelligence officer throughout his career is subject
to a rigid discipline. As one man put it, he "has graduated from
an iron school." On the one hand, he belongs to an elite; he has
privilege and power of a very special kind. He may ostensibly be
an embassy chauffeur, but in truth his rank may be higher than
that of the ambassador and he may possess more of the kind of
power that really counts. At the same time, neither rank nor
seniority nor past achievement will protect him if he makes a mis-
take. When a Soviet intelligence officer is detected or his agents
are caught through an oversight on his part, he can expect de-
motion or dismissal, even prison.
It is no surprise, then, that the Soviet intelligence officer him-
self acquires a harsh, merciless attitude. There is no better exam-
ple of this than the story told about one of Stalin's intelligence
chiefs, General V. S. Abakumov. During the war, Abakumov's
sister was picked up somewhere in Russia on a minor black-
marketing charge, or "speculation." In view of her close connec-
tion to a man as powerful as Abakmnov, the police officials mak-
ing the arrest sent a message to him asking how he would like the
case handled. They fully expected that he would request the
charges be dropped. Instead, he is reliably reported to have writ-
ten on the memorandum that had been sent him: "Why do you
ask me? Don't you know your duty? Speculation during wartime
is treason. Shoot her."
Abakumov met the fate of many Soviet intelligence officers
after the death of Stalin and the liquidation of Beria. By that
time he was in charge of the internal section of Soviet security
and controlled the files on members of the government and of the
party. Abakumov was secretly executed and his entire section
was decimated under the Malenkov regime. They knew too much.
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 21
THE CRAFT OF INTELLIGENCE
Despite ceAopm4edi fte Rt4easidieop /0%WshClAt'RD6844Q)1Pu1 Q0100170005-7
Russia today, the "terror" still holds sway within Soviet intelli-
gence itself; this arm of Soviet power cannot relax, cannot be
allowed any weakness.
The Soviet citizen usually does not apply for a job in the intel-
ligence service. He is spotted and chosen. Bright young men in
various positions, be it in foreign affairs, economics or the sci-
ences, are proposed for intelligence work by their superiors in the
party. To pass muster they must themselves be either party
members, candidates for party membership, or members of the
Komsomol, the Communist youth organization for the older age
groups. They must come from what appears to be an impeccable
political background, which means that there can be no "bourgeois
taint" to them or any record of deviation or dissent among their
immediate family or forebears.
An ambitious young man who is able to make his career in
one of the branches of intelligence service is fortunate by Soviet
standards. His selection for this duty raises him to the ranks of
the "New Class," the nobility of the new Russia. His prestige
equals and often surpasses that of the military officer. He receives
material rewards much above those given the similar ranks of
government bureaucracy in other departments. He has opportuni-
ties for travel open to few Soviet citizens. further, a career of
this kind can lead to high political office and important rank in
the Communist party.
But the Soviet security service suffers from the same funda-
mental weakness as does Soviet bureaucracy and Communist so-
ciety generally-indifference"to the individual and his feelings.
This indifference results in frequent lack of recognition for per-
sonal service, improper assignments, frustrated ambition and un-
fair punishment-all of which breed in a Soviet, as in any man,
loss of initiative, passivity, disgruntlement, and even disillusion-
ment. Furthermore, service in the Soviet bureaucracy does not
foster independent thought and the qualities of leadership. The
average Soviet official, in the intelligence service as elsewhere,
balks at assuming responsibility or risking his career. There is an
ingrained tendency to perform tasks "by the book," to conform,
to pass the bureaucratic buck if things go wrong.
Most important, every time the Soviets send an intelligence
officer abroad they risk his exposure to the very systems he is
dedicated to destroy. If for any reason he has become disillu-
sioned or dissatisfied, his contact with the Western world often
works as the catalyst that starts the process of disaffection. A
steadily growing number of Soviet intelligence officers have been
coming over to our side, proving that Soviet intelligence is by no
means as monolithic and invulnerable as it wishes the world to
believe.
IV. INTELLIGENCE COLLECTION
The collection of foreign intelligence is accomplished in a va-
riety of ways, not all of them mysterious or even difficult to
understand. This is particularly true of overt intelligence which
is information derived from newspapers, books, learned and tech-
nical publications, official reports of government proceedings,
radio and television. Even a novel or a play may contain useful
information about the state of a nation.
Two important sources of overt intelligence in the Soviet Union
are, of course, the newspapers Izvestia and Pravda, which trans-
late into "News" and "Truth." The former is an organ of the gov-
ernment and the latter of the party. There are also "little" Izves-
tias and Pravdas throughout Russia. A wit once suggested that in
Izvestia there is no news and in Pravda then: is no truth. This
is a fairly accurate statement, but it is, nevertheless, of real
interest to know what they publish and what they ignore, and
what turn they give to embarrassing developments that they are
It is, for example, illuminating to compare the published text
of Khrushchev's extemporaneous remarks in Soviet media with
what he actually said. His now-famous remark to Western diplo-
mats at a Polish Embassy reception in Moscow on November 18,
1956, "We will bury you," was not quoted thusly in the Soviet
press reports, even though it was overheard by many. The state
press apparently has the right to censor Premier Khrushchev,
presumably with his approval. Later, of course, the remark
caught up with Khrushchev and he gave a lengthy and somewhat
mollifying interpretation of it. How and why a story is twisted
is thus at least as interesting as the actual content. Often there
is one version for domestic consumption, another for the other
Communist bloc countries and still other versions for different
foreign countries. There are times when the "fairy stories" that
Communist regimes tell their own people are indicative of new
vulnerabilities and new fears.
The collection of overt foreign information by the United
States is largely the business of the State Department, with other
government departments co-operating in accordance with their
own needs. The CIA has an interest in the "product" and shares
in collection, selection and translation. Obviously, to collect
such intelligence on a world-wide basis is a colossal job, but the
work is well organized and the burden equitably shared. The
monitoring of foreign radio broadcasts that might be of interest
to us is one of the biggest parts of the job. In the Iron Curtain
countries alone, millions of words are spewed out over the air
every day; most of the broadcasts originate in Moscow and
Peking, some directed to domestic audiences and others beamed
abroad.
Trained Analysts Needed
All overt information is grist for the intelligence mill. It is
there for the getting, but large numbers of trained personnel are
required to sort and cull it in order to find the grain of wheat
in the mountains of chaff. For example, in the fall of 1961 we
were forewarned by a few hours of the Soviet intention to re-
sume atomic testing, by means of a vague news item transmitted
by Radio Moscow for publicaion in a provincial Soviet journal.
A young lady at a remote listening post spotted this item, ana-
lyzed it correctly, and relayed it to Washington immediately.
Vigilance and perceptiveness succeeded in singling out one sig-
nificant piece of intelligence from the mountains of deadly verbi-
age that have to be listened to daily.
In countries that are free, where the press is free and the
publication of political and scientific information is not hampered
by the government, the collection of overt intelligence is of par-
ticular value and is of direct use in the preparation of our intelli-
gence estimates. Since we are that kind of a country ourselves,
we are victims of this kind of collection. The Soviets pick up
some of their most valuable information about us from our pub-
lications, particularly from our technical and scientific journals,
published transcripts of congressional hearings and the like. A re-
cent defector from the Polish diplomatic mission in Washington
has told us that his embassy is assigned the task of collecting
this literature for Moscow's use. There is no problem in ac-
quiring it. The Soviets simply want to spare themselves the ef-
fort in order to be able to devote their time to more demanding
tasks; also, they feel that a Polish collection agent is likely to
have less trouble than a Russian in picking tip the required mate-
rial.
Information is also collected in the ordinary course of con-
ducting official relations with a foreign power. This is not overt
in the sense that it is available to anyone who reads the papers
or listens to the radio. Indeed, the success of diplomatic negotia-
tions calls for a certain measure of secrecy. But information
22 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
-v,
rk
:Lt
d
re
:.,r
lit
at
,!w
cd
,.r
'ir
cs
t
:he
he
ir
d
ed
is
re
he
oil
I ng
to
THE CRAFT OF INTELLIGENCE
derived from diplakWeliEe6f'sair Re1ealsal2092IQ61 8-: Q }RQPc irnNI6,-,IEZQ1PA Q11Z,0Q95rd1
a government has
telligence service for the preparation of estimates. Such informa-
tion may contain facts, slants and hints that are significant, espe-
cially when coupled with intelligence from other sources. If the
Foreign Minister of X hesitates to accept a United States offer
on Monday, it may be that he is seeing the Soviets on Tuesday.
Later, from an entirely different quarter, we may get a glimpse
into the Soviet offer. Together these two items will probably
have much more meaning than either would have had alone.
Our effort in overt collection is broad and massive. It tries
to miss nothing that is readily available and might be of use. Yet
there may be some subjects on which the government urgently
needs information that are not covered by such material. Or, this
material may lack sufficient detail, may be inconclusive, or may
not be completely reliable. Naturally, this is mote often the
case in a closed society. We cannot depend on the Soviets making
public, either intentionally or inadvertently, what our government
wants to know; only what they wish us to believe. When they do
give out official information, it cannot always be trusted. Pub-
lished statistics may credit a five-year plan with great success;
economic intelligence from inside informants shows that the plan
failed in certain respects and that the ruble statistics given were
not a true index of values. Photographs may be doctored, or even
faked, as was the famous Soviet publicity picture of the junk
heap designated as the downed U-2. The rocket in the Red Army
Day parade, witnessed and photographed by Western newsmen
and military attaches, may be a dud, an assemblage of odd rocket
parts that do not really constitute a working missile. As easy.as
it is to collect overt intelligence, it is equally easy to plant de-
ception within it. For all these reasons. clandestine intelligence
collection (espionage) must remain an essential and basic ac-
tivity of intelligence.
Clandestine intelligence collection is chiefly a matter of cir-
cumventing obstacles in order to reach an objective. Our side
chooses the objective. The opponent has set up the obstacles. Usu-
ally he knows which objectives are most important to us, and he
surrounds these with appropriately difficult obstacles. For exam-
ple, when the Soviets started testing their missiles, they chose
launching sites in their most remote and inapproachable waste-
United Press International
Official Soviet photograph of what was
represented as the wreckage of the
U-2 plane piloted by Francis Gary
Powers, shot down over Soviet terri-
tory in May 1960. It was a pile of
junk assembled for propaganda rather
than the actual plane. The real wreck-
age was later put on display
over its people, the more obstacles there are. In our time this
means that U.S. intelligence must delve for the intentions and
capabilities of a nation pledged to secrecy and organized for de-
ception, whose key installations may be buried a thousand miles
off the beaten track.
In this particular situation our government determines what
the objectives are and what information it needs, without regard
to the obstacles. It also establishes priorities among these objec-
tives according to their relative urgency. ICBMs will take prior-
ity over steel production. Whether or not the Soviet Union would
go to war over Laos will take priority over the political shading
of a new regime in the Middle East. Only after priority has been
established is the question of obstacles examined. If the informa-
tion can be obtained by overt collection or in the ordinary course
of diplomatic work, the intelligence service will not be asked to
devote to the task its limited assets for clandestine collection.
But if it is decided that secret intelligence must do the job, then
it is usually because serious obstacles are known to surround the
target.
Free and Denied Areas
In the eyes of Western intelligence, the world is divided into
two kinds of places-"free areas" and "denied areas." Its major
targets lie in the denied areas, that is, behind the Iron and
Bamboo curtains, and are comprised of the military, technical
and industrial installations-the capabilities-that constitute the
backbone of Sino-Soviet power. Also among the major targets
are the plans of the people who guide the Soviet Union and
Communist China-their intentions concerning warfare and their
"peaceful" political intentions. All information about such tar-
gets is called "positive intelligence."
The Berlin Wall not only shut off the two halves of a politi-
cally divided city from each other and severely limited the num-
ber of East Germans escaping to the West. It also was supposed
to plug one of the last big gaps in the Iron Curtain, the barrier
of barbed wire, land mines, observation towers, mobile patrols
and "sanitized" border areas that zigzags southward from the
Baltic. The erection of the Berlin Wall is intended to be the final
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT OF,d0'p~erdlV"ase 2002/06/18 : CIA-RDP84-00161R000'J07Q005-7
step in sealing off eastern Europe, a process that took 16 years
to accomplish. Yet it is still possible to get under or over, around
or even through the barrier of the Iron Curtain. It is just the first
of a series of obstacles. Behind that first wall are segregated and
restricted areas and, behind these, the walls of institutional and
personal secrecy. This combination protects everything the Soviet
state believes could reveal either its strengths or weaknesses to
the inquisitive West.
Clandestine collection uses people: "agents," "sources," "in-
formants." It may also use machines, for there are machines
today that can do things human beings cannot do and can "see"
things they cannot see. Since the opponent would try to stop this
effort if he could locate and reach it, it is carried out in secret;
thus we speak of it as clandestine collection. The traditional word
for it is espionage.
The essence of espionage is access. Someone, or some device,
has to get close enough to a thing, a place or a person to ob-
serve or discover the desired facts without arousing the attention
of those who protect them. The information must then be de-
livered to the people who want it. It must move quickly or it
may get "stale." And it must not get lost or be intercepted en
route.
At its simplest, espionage is nothing more than a kind of well-
concealed reconnaissance. This suffices when a brief look at the
target is all that is needed. The agent makes his way to an objec-
tive, observes it, then comes back and reports what he saw. The
target is usually fairly large and easily discernible-such things
as troop dispositions, fortifications or airfields. Perhaps the agent
also can make his way into a closed installation and have a look
around, or even make off with documents. In any case, the length
of his stay is limited. Continuous reportage is impossible to main-
tain because the agent's presence in the area is secret and illegal,
Technical Know-How Required
Behind the Iron Curtain today, this method of spying is
hardly adequate, not because the obstacles are so formidable
that they cannot be breached but because the kind of man who
is equipped by his training to breach them is not likely to have
the technical knowledge that will enable him to make a useful
report on the complex targets that exist nowadays. If you don't
know anything about nuclear reactors there is little you can dis-
cover about one, even when you are standing right next to it.
And even for the rare person who might be competent in both
fields, just getting close to such a target is hardly enough to ful-
fill today's intelligence requirements. What is needed is a thor-
ough examination of the actual workings of the reactor. For this
reason it is unrealistic to think that U.S. or other Western tourists
in the Soviet Union can be of much use in intelligence collection.
But for propaganda reasons, the Soviets continue to arrest tour-
ists now and then in order to give the world the impression that
U.S. espionage is a vast effort exploiting even the innocent
traveler.
Of far more long-term value than reconnaissance is "penetra-
tion" by an agent, meaning that he somehow is able to get in-
side the target and stay there. One of the ways of going about
this is for the agent to insinuate himself into the offices or the
elite circles of another power by means of subterfuge. He is
then in a position to elicit the desired information from persons
who come to trust him and who are entirely unaware of his true
role. In popular parlance, this operation is called a "plant."
The plant is a tried and true method of espionage. In our own
history we have the example, in Revolutionary War days, of the
adroit British spy, Dr. Edward Bancroft, who was born in the
Colonies and who successfully wormed his way into the employ
was
kli
F
n
ran
and confidence of Benjamin Franklin. In 1776
t the German Embassy in Tokyo, Eventually he suttee
negotiating in PariAJYPMVdd CIA-RDP84-00161 R000100170005-7
24
Benjamin Franklin dictating to Edward Bancroft, the trusted secretary-assistant
who was an espionage agent for Britain during the Revolution
loyalty to the American cause, Bancroft worked as Franklin's
secretary and assistant for little pay. His real mission was to
report to George Ill's government on Franklin's progress with
the French. He passed his messages to the British Embassy in
Paris by depositing them in a bottle hidden in the hollow root
of a tree in the Tuileries Gardens. Whenever he had more in-
formation than could be fitted into the bottle, or when he needed
new directives from the British, he simply paid a visit to London
-with Franklin's blessing-for he persuaded Franklin that he
could pick up valuable information for the Americans in London.
The British obligingly supplied him with what we today call
"chicken feed," misleading information prepared for the op-
ponents' consumption.
To deflect possible suspicion of their agent, the British once
even arrested Bancroft as he was leaving England, an action in-
tended to impress Franklin with his bona fides and with the
dangers to which his devotion to the American cause exposed
him. Everything depended, of course, on the acting ability of
Dr. Bancroft, which was so effective that when Franklin was
later presented with evidence of Bancroft's duplicity he refused
to believe it. Even as wise and able a diplomat as Franklin could
be fooled by a spy whose credentials rested on his own claims.
A penetration of this kind is predicated upon a show of outer
loyalties, which are often not put to the test. Nor are they
easily tested, especially when opponents share a common lan-
guage and background. Today, when the lines that separate one
nation from another are so sharply drawn with respect to basic
outlook and frame of reference, the dissembling of loyalties is
more difficult to maintain over a long period of time and under
close scrutiny. It can be managed, though. One of the most
notorious Soviet espionage operations before and during World
War II was the Sorge network in the Far East. The agents of
a German Communist, provided the Soviets with
e
d Sor
Ri
h
,
g
ar
c
top-level information on Japan's military planning. Although the
network was primarily directed against Japanese targets, Sorge
himself made it his business to cultivate his fellow countrymen
having hi
not only
inside in I
relations
To act
which hr
embassy
all his f
Sorge's I
the Japa
been a I
early 19_
Shortl
ment at
Ponteco
unmask'
vious C(
and int,
sible pc
was to(
moved
Great I
States
working
credenti
thoroug
records
Approved For Release 2002/06/18: CIA-RDP84 T61 O'11001ff0.0O9= 'LLIGENCE
fin's
to
ith
in
jot
n-
:]cd
oin
he
on,
all
op-
once
in-
the
:used
of
was
sed
uld
I n-IS.
ruter
they
lan-
one
basic
..:dies is
under
most
I World
nts of
s with
,zh the
Sorge
rymen
riled in
having himself assigned to the press section of the Embassy. This
not only gave him excellent cover but also provided him with
inside information about the Nazis' conduct of the war and their
relations with Japan.
To achieve this, Sorge had to play the part of the good Nazi,
which he apparently did convincingly. The Gestapo chief in the
embassy, as well as the ambassador and the service attaches, were
all his friends. Had the Gestapo in Berlin ever investigated
Sorge's past, as it eventually did after Sorge was apprehended by
the Japanese in 1942, it would have discovered that Sorge had
been a Communist agent and agitator in Germany during the
early 1920s.
Soviet Espionage in the West
Shortly thereafter, we were being subjected to similar treat-
ment at the hands of Soviet espionage. Names such as Bruno
Pontecorvo and Klaus Fuchs come to mind as agents who were
unmasked after the war. In some such cases records of pre-
vious Communist affiliations lay in the files of Western security
and intelligence services, even while the agents held respon-
sible positions in the West, but they were ignored until it
was too late. Because physicists like Fuchs and Pontecorvo
moved from job to job among the allied countries-one year in
Great Britain, another in Canada and another in the United
States-and because the scientific laboratories of the Allies were
working under great pressures, investigations of personnel with
credentials from Allied countries were not always conducted as
thoroughly as in the case of U.S. citizens. And when available
records were consulted, the data found in them-particularly if
Richard Sorge, German newspaperman who was acting as press advisor In Tokyo
while running a spy ring for Soviet Russia In Japan in the early 1940s
Approved
Carver, Pies.---Piz from Public
Italian atomic scientist Bruno Pontecorvo, who left his top-secret post at Brit-
ain's Harwell Research establishment in 1950 and flew to the U.S,S.R. This
photograph was taken at one of his rare public appearances in Moscow
of Nazi origin-seem often to have been discounted at a time
when Russia was our ally and Hitler our enemy, and when the war
effort required the technical services of gifted scientists.
The consequences of these omissions and oversights during the
turbulent war years are regrettable, and the lesson will not easily
be forgotten. We cannot afford any more Fuchses or Pontecorvos.
Today, investigation of persons seeking employment in sensitive
areas of the U.S. government and related technical installations
is justifiably thorough and painstaking.
An agent who performs as a plant in our time must have more
in his favour than acting ability; he can succeed only if there is
no record of his ever having been something other than what he
represents himself to be. The only way to disguise a man today
so that he will be acceptable in hostile circles for any length of
time is to make him over entirely. This involves years of training
and a thorough concealing and burying of the past under layers
of fictitious personal history which have to be "backstopped."
An agent made over in this fashion is referred to as an "illegal."
If you were really born in Finland, but are supposed to have
been born in Munich, Germany, then you must have documents
showing your connection to that city. You have to be able to act
like someone who was born and lived there. Arrangements have
to be made in Munich in order to confirm your origin there in
case you are ever investigated. In most Western countries the
lax procedures involved in issuing duplicates of most vital sta-
tistics-birth certificates, records of marriage, death, etc.-make
it relatively easy for hostile intelligence services to procure valid
documents for "papering" their agents. The Soviets have fre-
quently taken advantage of this fact, and it would certainly be
in our interest to tighten up this laxity.
THE CRAFT OF INTELLIGENCE
Approved For Release 20021Q611 ?,orgl -arRpI{&4.cW16tli Ai3~003h7 A0fi4sory capacity,
for directing espionage networks, rather than for penetration jobs
that increase the danger of discovery. Lonsdale was such a man,
and so was Rudolf Abel, who masqueraded in Brooklyn as a
photographer and who, after his conviction as a spy, was ex-
changed for the downed U-2 pilot, Francis Gary Powers, in 1962.
An alternative procedure to attempting to place one's own
agent within a highly sensitive foreign target is to find somebody
who is already there and recruit him. This technique must be
adapted to suit each case. The main thing is to find an insider who
is willing to co-operate and who also is "cleared" and qualified
in his position. Often, however, such a person is not quite at the
right spot to have access to the information you need. Or you
might have to settle for someone just beginning a career that will
eventually lead to his employment in the area of the target. Some
maneuvering and manipulation is needed to get your man, who is
more or less an amateur in espionage, in the place where he can
acquire the information without arousing suspicion.
Most of the notorious instances of Soviet penetration of im-
portant targets in Western countries were made possible by the
recruitment of someone already employed inside the target.
David Greenglass, although only a draftsman at Los Alamos dur-
ing World War II, had access to secret details of the internal
construction of the atomic bomb. Judith Coplon, while employed
in a section of the Department of justice responsible for the
registration of foreign agents in the United States, regularly
copied FBI reports crossing her desk concerning investigations of
espionage in the United States. Joseph Scarbeck was only an ad-
ministrative officer in our embassy in Warsaw, but after he had
been trapped by a female Polish agent and blackmailed, he
wide world managed to procure for the Polish intelligence service (operating
Klaus Fuchs, scientist member of the ring that fed atomic secrets to Soviet under Soviet direction) some of our ambassador's secret reports
rison
itish
B
p
r
Russia, arriving at an East German airport after his release from a
The Soviet "illegal" may be a Soviet national or a native of Lieut. Gen. Waiter Bedell Smith, former Director of the CIA
tieee,
r~
l
t
P
er
e
e
ress
almost any country in the world. His actual origin is of no great United
I f!
importance, since it is completely buried under a new nationality
and a new identity. A national chosen for such work will be sent
to live abroad for as many years as it takes him to perfect his
knowledge of the language and way of life of the other country.
He may even acquire citizenship in the adopted country. But
during this whole period he has absolutely no intelligence mission.
Ile does nothing that would arouse suspicion. When he has be-
come sufficiently acclimatized, he returns to the Soviet Union
where he is trained and documented for his intelligence mission,
tested for his loyalties and eventually dispatched to the target
country, which may be the same one he has learned to live in, or
a different one. It matters little, for the main thing is that he is
unrecognizable as a Soviet or eastern European. He is a German
or a Scandinavian or a South American. His papers show it, and
so do his speech and his manners.
The Case of Gordon Lonsdale
Gordon Lonsdale, the "Canadian" who was caught in London
in early 1961 as the leading figure in an extensive Soviet spy ring,
was a Russian whose Canadian identity had been carefully built
up over many years. Here the Soviets used their "illegal" not to
work in Canada, where he would have been much more exposed
to accidental encounters with people from his "home town," but
in England, where, as a Canadian, he would be quite acceptable
and would be unlikely to become the subject of much curiosity
about the details of his background.
Because they have almost perfect camouflage and are conse-
quently immensely difficult to locate, "illegals" constitute the
gravest security hazards to countries against which they are
h the Soviets have been turn-
tat
id
ence
working. There is every ev
ing out such "illegals" at an accelerated rate since the end of
to the
Europ,
thougi
were
Admir
access
liamei
in the
ing in
valua',
progrn
pert.
All
alreat
Corn,
cases
the S
achie
Vassr
behir.
signe
docu.
Simi!
court
prob
as ht
anot
111
mosi
26 Approved For Release 2002/06/18 : CIA-RDP84-00161 ROOO1OO17OOO5-7
?city,
jobs
man,
as a
ex-
own
edy
be
%;ho
J;ied
the
ou
ill
;n1_
he
et.
!nr-
rnal
ed
the
..fly
,:;of
:id-
liad
he
ing
arts
Approved For Release 2002/06/18
CIA-RDP84-ck161k&1001 Oda-7 L L I G E N C E
right person-the one who is vulnerable-inside the target, to
reach him without being apprehended, to persuade him to co-
operate, to continue to communicate with him secretly after he
has been won over. This is where one can really begin to talk
about the techniques of espionage. There are techniques for
"spotting" agents, for recruiting agents, for directing agents, for
testing agents, and for communicating with agents. If the oper-
ation is very sensitive, the Soviets will use one of their "illegals"
to handle the case. The illegal, unless apprehended with the agent
or betrayed by him, can disappear into the woodwork if some-
thing goes wrong. There will be no trail leading to a Soviet dip-
lomatic installation to embarrass or discredit it. There are times,
however, when Soviet intelligence personnel stationed in an
embassy or some other official installation will handle recruited
agents or certain aspects of their operations. Sometimes the
"cover" of the embassy or trade mission lends advantages not
available to the illegal, and if the so-called "legal resident" is
caught in the act, all that happens is his enforced departure and
the subsequent arrival of a replacement to fill his shoes.
If, for example, the Soviets are anxious to find an agent in
a Western country who will provide intelligence on a certain
sensitive industry, they will use the built-in spotting mechanism
provided by their embassies or trade missions. With the object
of looking over candidates without their knowing it or the local
authorities knowing it, the Soviet trade mission will advertise
that it is interested in purchasing certain nonstrategic items
manufactured by the particular industry or one closely allied to
it. Manufacturers will be attracted and will visit the Soviet mis-
sion to talk over possible business. But it is just a ruse to entice
into the field of vision of Soviet intelligence, people with the
desired access. The visitors will he requested to fill out forms call-
ing for personal and business data, references, financial state-
ments, and the like. All this material is reviewed by the intel-
ligence officer stationed at the mission, who may also participate
in the personal interviews and get a direct look at the human
material under consideration. If any candidates seem promising
because of their innocence, their political or perhaps apolitical
attitudes, their need for money or susceptibility to blackmail,
the Soviets can cultivate them further by pretending that the
business deal is slowly brewing. The hand of espionage has not
yet been shown. Ostensibly, nothing has yet been done against
the law.
Wide World
David Greenglass, former U.S. army technician who was convicted as a member
of the Rosenberg atomic spy ring, In custody of a U.S. deputy marshal after
his arraignment in June 1950
to the State Department on the political situation in eastern
Europe. In Great Britain, Henry Houghton and John Vassall, al-
though of low rank and engaged chiefly in administrative work,
were able to procure classified technical information from the
Admiralty. Alfred Frenzel, a West German parliamentarian, had
access to NATO documents distributed to a West German par-
liamentary defense committee on which he served. Heinz Felfe,
in the West German intelligence service, whose case is still-pend-
ing in the German courts, had plenty of opportunity to pass
valuable information to the Soviets during the years he was
progressing up the ladder as a promising young intelligence ex-
pert.
The "Insider" Is Useful
All of these people, at the time they were recruited, were
already employed in some job that made them interesting to the
Communists because of their positions of natural access. In some
cases, they later moved up into jobs that increased their value to
the Soviets, and these transfers may in some instances have been
achieved under secret guidance from the Soviets. Houghton and
Vassall were both recruited while stationed at British embassies
behind the Iron Curtain. When each returned home and was as-
signed to a position in the Admiralty, his access to important
documents and other information naturally was broadened.
Similarly, had Scarbeck not been caught as a result of careful
counterintelligence efforts while still at his post in Warsaw, he
probably would have been of ever-increasing use to the Soviets
as he was reassigned to one United States diplomatic post after
another over the years.
In this kind of espionage operation, then, the first step is the
most crucial. Everything depends upon the ability to "spot" the
"Spotting of Agents"
The Communist party apparatus and Communist front organi-
zations can also be used to spot potential agents for espionage.
The evidence given in the Canadian trials shortly after World
War II by the defected code clerk from the Soviet Embassy in
Ottawa, Igor Gouzenko, acquainted the public for the first time
with the elaborate techniques employed by the Communist party
under various guises. "Reading groups" and "study groups" for
persons quite innocently interested in Russia were formed within
Canadian defense industries, entirely for the purpose of spotting
and cultivating people who could eventually be exploited for the
information they possessed. The target in this case was the
atomic bomb.
However, the Communist party outside the Soviet Union has
been used only intermittently by the Soviet government for ac-
tual espionage. Every time some element of the Communist party
is caught in acts of espionage, this discredits the party as an
"idealistic" and indigenous political organization and exposes it
for what it really is-the instrument of a hostile foreign power,
the stooge of Moscow. Whenever such exposures have taken
place, as happened frequently in Europe in the 1920s, it has been
observed that, for a time, there is a sharp decline in the intel-
ligence work performed by local Communist parties. The value
Approved For Release 2002/06/18 :. CIA-RDP84-00161 ROOO1OO17OOO5-7
of using personnel-ti6P!prt 1nPf ih`Yttgg~gn?TO9g P?/a4s- CIA- u `tU t4i`tQo 7tf~ehip4 -br to his government.
tionahle, since these amateur collaborators can expose not only If the potential victim has done nothing on his own to compro-
themselves but also the operations of the intelligence service mise himself, then he or she must he enticed into a compromising
proper.
Chiefly in countries where the party is tolerated but where resi-
dent agents are difficult to procure, the Soviet intelligence services
have had recourse to the party. This was the case in the United
States during World War II. One of the reasons for the eventual
collapse of Soviet networks that reached deeply into our govern-
ment at that time was the fact that the personnel were not ideally
suited for espionage. Many of these people had only strong ideo-
logical leanings toward communism to recommend them for such
work and in time were repelled by the discipline of espionage.
Some, like Whittaker Chambers and Elizabeth Bentley, to whom
the work became unpalatable, finally balked and went and told
their stories to the FBI. This problem came to a head for the
Soviets just after the end of World War II as a result of the
Gouzenko revelations. At that time the K.G.B. issued a secret or-
der to its officers abroad not to involve members of Communist
parties further in intelligence work.
In foreign and hostile countries, then, the Soviets must proceed
with some caution in recruiting resident agents. They have not
always done so, of course. Some of their attempts, particularly
through their UN personnel, have been so crude and barefaced
as to give the impression that the UN is being used by them for
the schooling of their spies.
Entrapping Victims
But within the Soviet Union itself; or in a bloc country, where
the Soviets can set the stage, provide the facilities--a safe house,
hotel or nightclub-and furnish the cast of men or women agents
provocateurs, more vigorous tactics are customarily used to re-
cruit or entrap prospective agents. The Soviets often work on the
principle that in order to get a man to do what you want, you
try to catch him in something he would not like to have exposed
situation set up by K.G.B. operatives. Two of the most recent
cases involving this technique are those of Joseph Scarbeck in
Poland and John Vassall in the Soviet Union.
The sordid story of Vassall, the British Admiralty employee
who spied for the Soviets for six years both in the Soviet Union
and in London, is a typical one. In my own experience, I have run
across a score of cases where the scenarios are almost identical
with this one. The K.G.B. operatives assigned to the task, after
studying Vassall's case history from all angles and analyzing his
weaknesses, set up the plan to frame him, exploiting the fact that
he was a homosexual. The usual procedure here is to invite the
victim to what appears to be a social affair; there the particular
temptation to which the victim is likely to succumb is proffered
him and his behaviour is recorded on tape or on film. He is then
confronted with the evidence and told that unless he work, for
the Soviets the evidence will be brought to the attention of his
employers. Vassall succumbed to this.
If the target individual is strong-willed enough to tell the whole
story to his superior officer immediately, then the Soviet attempts
at recruitment can be thwarted with relatively little danger to
the individual concerned-even if he is residing in the Soviet
Union. Sometimes his superior officer will want to play the man
back against the Soviet apparatus in order to ferret out all the
individuals and the tactics involved. But if the man approached
does not seem qualified to play such a role, especially if the ap-
proach was made behind the Iron Curtain, he is merely told to
break off from his tormentors and tell them he has disclosed
everything.
There is, of course, the other side of the coin. Western intel-
ligence is able to procure agents too, but does not use the same
methods. It is no secret that the piercing of the Iron and Bamboo
curtains is made easier for the West because of the volunteers
Camera Press-Pix from Public
Hungarian freedom fighters crossing
snow-covered fields to refuge in Aus-
tria after Soviet Russia's suppression'
of the uprising
who
Of tei
it. \1
more
The
insid
Chin
cros,
plact
In
but i
Eurc
garb.
refu_
to-d,
achi(
likel
thou
othc
War
T
It h
and
citiz
to t
how
who
calls
Son
bcc.
feat
or vv
hun
ids
wor
use
I
hies
tha
rul
wa
int,
the
wh
est
tht
ha
to
sal
on
art
nc
an
oft
fir
re
fr
,nt.
,ro-
uig
ent
in
ee
on
an
-al
ter
at
he
ar
cd
on
or
its
-ole
;,Ls
to
:iet
an
he
ed
!0-
to
:.ed
cl-
ne
_,oo
rs
THE CRAFT OF INTELL1(.&L:1Vt_C
who come our way. We o tot1~ OW hers than is presently the case if it were not for the usual Soviet
'~ e kelfease i6/1 ac ~2 QQ~c61 i O00i1tO h1 ~0?f te~jers behind as
Often it comes to us throng peop e w o arc we acquai
. it. While this is not a one-way street, the West has gained far
more in recent years from volunteers than its opponents have.
The reason for this is the growing discontent with the system
inside the Soviet Union, the satellite nations and Communist
China. These volunteers are either refugees and defectors who
cross over the frontiers to us or they are people who remain "in
place" in order to serve us within the Communist societies.
Information from refugees is often piecemeal and scattered,
hnt fnr years it has added to our basic fund of knowledge about
European satellites of Soviet Russia. The upheaval of the nun-
I garian revolution in 1956 sent more than a quarter of a million
brought us up-
the
t
y
refugees fleeing westward. Needless
o say,to-date on every aspect of technical, scientific and military
achievement in Hungary and gave us an excellent forecast of
likely capabilities for years to come. Among the hundreds of
j thousands of refugees who have come over from East Germany,
other satellites and Communist China since the end of World
War II, many have performed a similar service.
"Defector"-a Misnomer
intelligence. The reader of the daily papers in the West knows
that among the defectors are soldiers, diplomats, scientists,
engineers, ballet dancers, athletes and, not infrequently, intel-
ligence officers.
On the other hand, the fate of those who have gone from our
V
side over to the other would not serve as a particularly good
advertisement for further such defections. Some of these people
have recently talked to Western visitors and have admitted, with-
out prompting, that their lot is miserable and that they have no
future. The scientific defectors, like the atomic physicist Ponte-
corvo, who continue to be useful to the Soviet in their tech-
nological efforts, seem to fare better than the others. The
Burgesses and MacLeans, the Martins and Mitchells have had
their day of publicity and now eke out a dull living, sometimes
as "propaganda advisors." Some of them still hope one day to
be able to return to the West.
It is occasionally the case that defectors from the Communist
side are not exactly what they seem. Rather, they have been
working "in place" as agents for the West for long periods of
time previous to their appearance as defectors, and have come to
the West only because they or we feel that the dangers of remain-
ing inside have become too great. In addition, some who come
over from the Soviet bloc have never been "surfaced" and remain
unknown to the public. The Soviets know, of course, that they
have left, but not to what precise location. This concealment is
desirable in some cases in order to protect the individuals in-
volved.
People who volunteer "in place" have many ways of doing so,
in spite of the isolation, the physical barriers and the internal
controls of the Soviet bloc. There are relatively safe channels
of communication with the West, including, surprisingly enough,
the mails. As long as the address on a letter looks harmless and
the identity of the sender (the agent "in place") remains con-
cealed, there is little danger. Soviet bloc censorship cannot pos-
sibly inspect every piece of the great volume of mail passing to
and fro over the borders. And even if a. letter is intercepted, it.
need give no clue whatever to the sender if proper security pre-
cautions are followed. Various radio stations in western Europe
broadcasting to the Soviet bloc can thus solicit comments and
"fan mail" from listeners, and receive letters by the thousands
from behind the Iron Curtain.
Science Vital to Intelligence
It has become imbedded in the jargon of international relations
and intelligence to describe the officials or highly knowledgeable
citizens of the Communist bloc who leave their country and come
to the West. And the West has had some defectors, too. It is,
however, a term that is resented, and properly so, by the persons
who come to freedom from tyranny. I do not claim that all so-
called defectors have come to the West for ideological reasons.
Some have come out of more mundane motives: in certain cases
because they have failed in their jobs; in some because they are
fearful that a shake-up in the regime will lead to their demotion
or worse; some are lured by the physical attractions of the West,
human or material. But a large number have come over for highly
ideological reasons. They were revolted by life in the Communist
world, by the tasks they were assigned by their superiors. They
yearned for something better and more satisfying. The term
"volunteer" is more suitable for these people, and I prefer to
use it whenever possible.
If the one who comes over to us has been part of the Soviet
hierarchy, he knows the strengths and weaknesses of the regime
that employed him-its factions, its inefficiencies and its cor-
ruption. As a specialist, he knows its achievements in whatever
was his chosen field-soldiery, science, education, diplomacy or
Secret Agents of the West
The fact that behind the Iron Curtain there are many people
who seriously consider taking this step is a matter of deep inter-
est to the intelligence services of the West. Our task is to make
them understand that they will be welcome and secure once they
have come out. Experience has shown that many of them hesitate
to take the final step, not because they have qualms about for-
saking a detested way of life, but because they are afraid of the
unknowns that await them. So an effort is made to show that they
are welcome and will be safe and happy with us. Every time a
newly arrived defector goes on the air over the Voice of America
and says he is glad to be here and is being treated well, countless
officials behind the Iron Curtain will take heart and go back to
figuring out just how they can get themselves appointed as trade
representatives in Oslo or Paris. Short-term visitors to the West
from the Soviet bloc would probably defect in far greater num-
np
on'
Anyone who knows how the latest filing and sorting machines
are used in personnel work will not be surprised to hear that if
the intelligence service is looking for a man who speaks Swahili
and French, has a degree in chemical engineering, is unmarried,
over 35 and under 5'8", all it has to do is push a button and
in less than 40 seconds it will know whether a man with these
qualifications is available, along with other information about
him. The same kinds of machines are used in sorting out and
assembling the data of intelligence itself.
But this is a small feat compared with how technology is used
in the collection of information. Many targets of contemporary
intelligence by their very nature suggest the creation of the
technical devices by which they can be observed. If a target emits
a telltale sound, then a sensitive acoustical device comes to mind
for monitoring it. If the target causes shock waves in the earth,
then seismographic apparatus will detect these. Moreover, the
need to observe and measure the effects of our own technological
experiments, e.g., with nuclear weapons and missiles, has hastened
the refinement of equipment which, with some modifications, can
also be useful for observing other people's experiments.
Radar and accurate long-range photography are the basic tools
of technical collection. Another is the collection and analysis of
air samples in the atmosphere in order to determine the presence
of radioactivity. Since radioactive particles are carried by winds
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
over national bor gpnb i OrRe1G s~ O2tG6/moo CI1~- ? f~flO4Gi ROPEY >~1 ~0~ 7late October of 1962.
Beginning in 1948 our government instituted a program calling
for round-the-clock monitoring of the atmosphere by aircraft
for the purpose of detecting any experimentation with atomic
weapons. After this program was installed, the first evidence of
a Soviet atomic explosion on the Asiatic mainland was detected
in September of 1949. Later refinements in instrumentation en-
able us to discover not only the fact that atomic explosions have
taken place but also the power and type of the atomic device
detonated.
Many targets, of course, do not betray their location and
nature by any such activity as bomb detonation or a missile
launching that can be traced from afar in the upper atmosphere.
To observe such targets, one must get directly over them at very
high altitudes, armed with long-range cameras. This requirement
led to the development of the U-2. It was safer, more accurate
and more dependable than anything that could be performed by
an agent on the ground. Its feats could be equaled only by the
acquisition of technical documents directly from Soviet offices
and laboratories. The U-2 marked a new high, in more ways than
one, in the scientific collection of intelligence. Thomas S. Gates,
Jr., Secretary of Defense of the United States at the time of the
U-2 incident, May 1, 1960, testified to this before the Senate
Foreign Relations Committee on June 2, 1960:
From these flights we got information on airfields, aircraft, missiles, missile
testing and training, special weapons storage, submarine production, atomic
production and aircraft deployment ... all types of vital information. These
results were considered in formulating our military programs. We obviously
were the prime customer, and ours is the major interest.
In more recent days, it was the high-altitude U-2 reconnais-
sance flights which gave the "hard" evidence of the positioning
in progress and before they could be camouflaged, these bases
might have constituted a secret and deadly threat to our security
and that of this hemisphere. Here too was an interesting case in
which classical collection methods wedded to scientific methods
brought extremely valuable results. Various agents and refugees
from Cuba reported that something in the nature of missile bases
was being constructed and pinpointed the area of construction;
this led to the gathering of proof by aerial reconnaissance.
Radar and the Battle of Britain
Scientific intelligence collection has proved its value a hundred
times over. Winston Churchill in his history of World War II
describes British development of radar and its use in the Battle
of Britain, as well as British success in bending, amplifying and
falsifying by scientific means the directional signals sent to guide
the attacking German aircraft. He concludes that "unless British
science had proved superior to German and unless its strange,
sinister resources had been effectively brought to bear in the
struggle for survival, we might well have been defeated, and be-
ing defeated, destroyed." Science as a vital arm of intelligence is
here to stay. We are in a critical competitive race with the scien-
tific development of the Communist bloc, particularly that of the
Soviet Union, and we must see to it that we remain in a posi-
tion of leadership. Some day this may be as vital to us as radar
was to Britain in 1940.
A technical aid to espionage of another kind is the concealed
microphone and transmitter, carrying live information in the
form of conversations from inside a target to a nearby listening
post. What the public knows as "tapping" telephones or as "bug-
San Diego, Calif., naval air station as seen from a plane flying at 70,000 ft. Pres. Dwight D. Eisenhower used this
photograph-in a television report to the nation in 1960, following the collapse of the Paris summit conference, to
Illustrate the power of aerial surveillance at great heights
ping..
ligen(
aturi.
and
teal::
,L l
tised
local:
the t
the L
Aml)
teal:
mitt
said
was
in 111
Pilo
1':'
thine
repel
cove
and
the t
tale
one
30 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
Henry Cabot Lodge, U.S. ambassador to the UN, demonstrating to the Security council in May 1960 how a micro-
phone had been concealed within a wooden carving of the Great Seal of the U.S., that had been hung in the office of
the U.S. ambassador in Moscow as a gift from the U.S.S.R.
ging" or "miking" offices is called "audio-surveillance" in intel-
ligence work. Three things are required for this: excellent mini-
aturized electronic equipment, clever methods of concealment
and a human agent to penetrate the premises and do the con-
coaling.
The public usually hears of this activity only'when it is prac-
tised by law-enforcement or security organizations in their own
locality. But in June of 1960 Ambassador Lodge displayed before
the United Nations in New York a plaque of the Great Seal of
the United States which had been hanging in the office of the U.S.
Ambassador in Moscow. He showed how the Soviets had con-
cealed a tiny instrument in the seal which, when activated, per-
mitted a Soviet listening post to overhear everything that was
said in the ambassador's office. The installation of this device
was no great feat for the Soviets, since every foreign embassy
in Moscow has to call on the services of local electricians, tele-
phone men, plumbers, charwomen and the like.
Performing the same trick outside one's own country is some-
thing else. Any intelligence service must consider the possible
repercussions and embarrassments that may result from the dis-
covery that an official installation has been illegally entered
and its equipment tampered with. As in all espionage operations,
the trick is to find the man who can do the job and who has the
talent and the motive, whether patriotic or pecuniary. There was
one instance when the Soviets managed to place microphones
in the flowerpots that decorated the offices of a Western embassy.
The janitor of the building, who had a weakness for alcohol, was
glad to comply for a little pocket money. He never knew who
the people were who borrowed the pots from him every now
and then or what they did with them.
There is hardly a technological device of this kind against
which countermeasures cannot be taken. Not only can the devices
themselves be neutralized, but sometimes they can he turned
against those who install them. Once they have been detected,
it is often profitable to leave them in place in order to feed the
other side with false or misleading information.
The Field of Cryptography
An area of intelligence which is only partly a technological
matter is that of cryptography. Codes and ciphers have been used
throughout history, and attempts have always been made to break
them. Today scientific knowledge is used to aid those who work
in this field. No nation ever willingly reveals its current successes
or failures in cryptography, but there are many instances from
the recent past now in the public domain that serve to illustrate
the important role that the deciphering of coded messages has
played in the collection of intelligence.
The diplomatic service, the armed forces and the intelligence
service of every country all use secret codes and ciphers to trans-
mit their long-distance communications between headquarters
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 31
TIIE CRAFT OF INTELLIGENCE
and posts abroa#l-O'V4t ItP6rr i ge}2QA2i/?8/t&'SeCI~11 P8i4 1iroi1r?s1 R1QQ917DO4c7O `a7 dirigibles, returning
commercial cable d' h' h
mes
or ra o, m w rc case they know that
any other government can generally obtain copies of the en-
ciphered cables sent from or to its area and can intercept and
record radio traffic passing from, to or over its territory. That
much is easy; the problem is to decipher such material. Since the
contents of official government messages on sensitive subjects,
especially in times of crisis, constitute the best and "hottest" in-
telligence that one government can hope to gather about another,
every government goes to great lengths to invent unbreakable
codes and to protect its code materials and its cryptographic per-
sonnel. For that reason, every intelligence service is continually
on the alert for opportunities which will give it access to cryp-
tographic materials of other governments. Should these be ob-
tained, the task of breaking a code is made easier. But there are
other, less dramatic, methods, for some codes and ciphers can be
broken by mathematical analysis of intercepted traffic.
The uncontrollable accidents and disasters of war sometimes
expose to one opponent cryptographic materials used by the
other. A headquarters or an outpost may be overrun and in the
heat of retreat code books left behind. Many notable instances of
this kind in World War I gave the British a lifesaving insight
into the military and diplomatic intentions of the Germans. Early
in the war the Russians sank the German cruiser "Magdeburg"
and rescued from the arms of a drowning sailor the German naval
code book, which was promptly turned over to their British allies.
British salvage operations on sunken German submarines turned
U.S. marine corps bombers attacking the "Mogami" during the battle of Midway
W id, world
from a raid over England, ran into a storm and were downed over
France. Among the materials retrieved from them were coded
maps and code books used by German U-boats in the Atlantic.
Military operations based on breaking of codes will often tip
off the enemy, however. Once the Germans noticed that their sub-
marines were being spotted and cornered with unusual and
startling frequency, it was not hard for them to guess that com-
munications with their underwater fleet were being read. As a
result, all codes were immediately changed. There is always the
problem, then, of how to act on information derived in this
manner. One can risk terminating the usefulness of the source in
order to obtain an immediate military or diplomatic gain, or
one can hold back and continue to accumulate an ever-broadening
knowledge of the enemy's movements and actions in order even-
tually to inflict the greatest possible damage.
The "Black Chamber"
During World War I the first serious American cryptographic
undertaking was launched under the aegis of the War Depart-
ment. Officially known as Section 8 of Military Intelligence, it
liked to call itself the Black Chamber, the name used for cen-
turies by the secret organs of postal censorship of the major
European nations. Working from scratch, a group of brilliant
amateurs under the direction of Herbert Yardley, a former tele-
graph operator, had by 1918 become a first-rate professional out-
fit. One of its outstanding achievements after World War I was
the breaking of the Japanese diplomatic codes. During negoti-
ations at the Washington Disarmament Conference in 1921, the
United States wanted very much to get Japanese argeement to a
10:6 naval ratio. The Japanese came to the conference with the
stated intention of holding to a 10:7 ratio. In diplomacy, as in
any kind of bargaining, you are at a tremendous advantage if you
know your opponent is prepared to retreat to secondary positions
if necessary. Decipherment of the Japanese diplomatic traffic
between Washington and Tokyo by the Black Chamber revealed
to our government that the Japanese were actually ready to back
down to the desired ratio if we forced the issue. So we were able
to force it without risking a breakup of the conference over the
issue.
The Chamber remained intact, serving chiefly the State De-
partment, until 1929 when Henry Stimson, who had become Sec-
retary of State under President Hoover, refused to allow his
department to avail itself further of its services, after which,
it had to close down. "Gentlemen," so Stimson claimed, "do not
read each other's mail." Later, however, while serving as Secre-
tary of War under President Roosevelt during World War II,
he came to recognize the overriding importance of intelligence,
especially cryptographic intelligence.
When the fate of a nation is at stake and the lives of its military
men are in the balance, gentlemen do read each other's mail-
if they can get their hands on it.
Our navy had, fortunately, begun to address itself to the prob-
lems of cryptography in the early 1920s, with particular emphasis
on the Japanese, since U.S. naval thinking at that time foresaw
Japan as the major potential foe of the United States. By 1941,
the year of Pearl Harbor, navy cryptographers had broken most
of the important Japanese naval and diplomatic codes and ci-
phers; and later we were often able to forecast Japanese action
in the Pacific before it took place. The battle of Midway in June
1942, the turning point of the naval war in the Pacific, was an
engagement our navy sought because it was able to learn from
intercepted messages that a major task force of the Imperial
Japanese Navy was gathering off Midway. Our information con-
cerning its strength, disposition and intention gave Admiral
Nimitz the advantage of surprise. Our successes in breaking
32 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
T
had
Cou
and
so. 1
utili
on
wes:
bilit
med
the
beer
men
Firs
sessi
had
cont
emb,
ciph;
thus
fact
Gerr,
sign,
Adn.
man
forn
that
ness
copi(
play
Japanese codes were made pubt~~~Weo p?~m IA M~~~ t e q~ e tele-
point of view of an intelligence dtlicer this was un ou6ec y re- 2gram ~ Itao fhe Assoc fe ress Hit t i i u 1 c like a
grettable.
One of the most spectacular of all cryptographic coups in the
field of diplomacy was the British decipherment of the so-called
Zimmermann telegram in January 1917, when the United States
was on the brink of World War I. The job of decipherment was
performed by the experts of "Room 40," as British naval crypto-
graphic headquarters was called. The message had originated with
German Foreign Secretary Zimmermann in Berlin and was ad-
dressed to the German Minister in Mexico City. It outlined
the German plan for the resumption of unrestricted submarine
warfare on Feb. 1, 1917, stated the probability that this would
bring the United States into the war and proposed that Mexico
enter the war on Germany's side; with victory, Mexico would
regain its "lost territory in Texas, New Mexico and Arizona."
The famous Admiral Hall, Chief of British Naval Intelligence,
had this message in his hands for over a month after its inter-
ception. His problem was how to pass its deciphered contents to
the Americans in a manner that would convince them of its
authenticity yet would prevent the Germans from learning of
British competence in breaking their codes. Finally, and without
any satisfactory solution having been found, the urgency of the
war situation caused Lord Balfour, the British Foreign Secretary,
to communicate the Zimmermann message formally to the Amer-
ican Ambassador in London. The receipt of the message in Wash-
ington caused a sensation at the White House and State Depart-
ment, and created serious problems for our government-how
to verify beyond a doubt the validity of the message and how
to make it public without letting it seem merely an Anglo-Amer-
ican ploy to get the United States into the war. Robert Lansing,
who was then Secretary of State, and was an uncle of mine, later
told me about the dramatic events of the next few days which
brought America much closer to war.
Diplomatic Cables Abused
The situation was complicated by the fact that the Germans
had transmitted the message via their ambassador in Washington,
Count Bernstorff, who relayed it to his colleague in Mexico City,
and that they used American diplomatic cable facilities to do
so. President Wilson had granted the Germans the privilege of
utilizing our communication lines between Europe and America
on the understanding that messages to their representatives in the
western hemisphere would be devoted to furthering the possi-
bility of the peace which Wilson was so earnestly trying to
mediate at the time. The President's chagrin was therefore all
the greater when he discovered to what end the Germans had
been exploiting his good offices. However, this curious arrange-
ment turned out to be of great advantage in what happened next.
First of all, it meant that the State Department had in its pos-
session a copy of the encoded Zimmermann telegram which it
had passed to Bernstorff-unaware, of course, of its inflammatory
contents. Once this copy was identified, it was forwarded to our
embassy in London, where one of Admiral Hall's men re-de-
ciphered it for us in the presence of an embassy representative,
thus verifying beyond a doubt its true contents. Secondly, the
fact that deciphered copies of the telegram had been seen by
German diplomats in both Washington and Mexico City helped
significantly to solve the all-important problem that had caused
Admiral Hall so much worry, namely, how to deceive the Ger-
mans about the real source from which we had obtained the in-
formation. In the end the impression given the Germans was
that the famous message had leaked as a result of some careless-
ness or theft in one of the German embassies which had received
copies of it. They continued using the same codes, which dis-
played a remarkable but welcome lack of imagination on their
bombshell. In April we declared war on Germany.
Intelligence Requires Guidance
I have described some of the manifold activities involved in
gathering intelligence. The diverse needs for information and
the varying opportunities for acquiring it make it imperative
that some orderly system govern the world-wide collection
process. Without appropriate guidance, intelligence officers in the
field could spend much of their time duplicating each other's
work and could exert disproportionate efforts in the attempt to
get information in one place that could be obtained much more
simply and quickly in another. It is the task of the intelligence
headquarters, with its world perspective, to establish the basic
guidelines along which intelligence officers in different places try
to pattern their work. This is accomplished, for long-range pur-
poses, by setting up a list of priorities that give the order of
importance of tasks to be undertaken in any one area. It also
often happens that headquarters will assign crash jobs to in-
telligence officers in areas where it is believed that much-needed
information might be available.
The function of headquarters was illustrated when Khrushchev
made his secret speech denouncing Stalin to the twentieth Party
Congress in 1956. It was clear from various press and other
references to the speech that a text must be available somewhere.
The speech was too long and too detailed to have been made
extemporaneously even by Khrushchev, who is noted for lengthy
extemporary remarks. An intelligence "document hunt" was in-
stituted and eventually the text of the speech was found-but
many miles from Moscow. It was necessary in this case for head-
quarters to alert all possible sources and to make sure all clues
were followed up to produce this intelligence coup for the west.
Forbidden Fruit
There are also times when headquarters must perform a nega-
tive function, warning its agents to avoid material-no matter
how valuable it may seem-in order not to jeopardize some other
intelligence source. When I was stationed in Switzerland during
World War II, I received an instruction not to try to obtain any
foreign codes without prior instructions. I did not know it at the
time, but shortly beforehand an attempt by our intelligence to
get a German code in Portugal had so alerted the Germans that
they changed a code we were already reading.
Soon afterward one of my most trusted German agents, who
spoke with authority, told me that if I wished, he could get me
detailed information about their diplomatic codes and ciphers.
This put me in quite a quandary. If I showed no interest, this
would have been a giveaway that we had them already; no intelli-
gence officer would otherwise reject such an offer. I expressed
great interest and sparred for time to think over how this could
best be worked out. The next day I told him that as all my traffic
to Washington had to go by radio (Switzerland was surrounded,
in late 1942, by Nazi and Fascist forces) it would be too difficult
and too perilous for me to communicate what lie might give me
on the German codes. I said I should prefer to wait till France
was liberated-the Normandy invasion had already taken place
-so I could send out his code information by diplomatic pouch.
He readily accepted this somewhat specious answer. Sometimes
even the seemingly ripest apples of intelligence should not be
plucked.
In a world where so many countries have some kind of repre-
sentation abroad and where trade and travel occur in the most
unpredictable patterns, no intelligence service and no intelli-
gence officer rules out the possibility of the random and unex-
pected and often inexplicable windfall. This happens despite the
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 33
TILE CRAFT OF INTELLIGENCE
best-planned geiAppgciVedeFOrrR&IeasenZOO2dO1s8rieCIAbRQFRi&I4-004 6r1 QO1sQO17Q005e7 and returned
thing on his mind feels safer about talking to an intelligence
officer 10,000 miles away from home, so he waits for the oppor-
tunity of a trip abroad to seek one out. Suddenly Korea may
become the place where one picks up valuable information on
Czechoslovakia. It can happen that way.
A final word on the craft of intelligence as it is practised today
requires comparison of the open and the closed society. Each
in its distinctive way contains weaknesses of which an opposing
intelligence service can take advantage, and strengths which make
the opponent's job more difficult. Altogether it must be said
that in our open society we make it far too easy for our op-
ponents to learn of our military secrets. Much that we can acquire
from the Soviets only through an enormous investment of man-
power and money, they can get from us merely by reading what
we publish.
Some years ago my predecessor as director of the CIA, General
Walter Bedell Smith, was disturbed by this situation and decided
to make a test. He co-opted the services of a group of able and
qualified academicians from one of our large universities for
some summer work. He asked them to examine open publica-
tions, news articles, hearings of the Congress, government re-
leases, monographs, speeches and the like, in order to determine
what kind of estimate of U.S. military capabilities the Soviets
could put together from unclassified sources. "Their conclusions
indicated that in a few weeks of work by a task force on the open
literature our opponents could acquire a very good general idea
of our order of battle.
But when it comes to clandestine collection of intelligence-and
neither side can depend wholly on overt intelligence-then our
opponents' agents run up against the FBI and other law-enforce-
ment agencies in this country. Our system also provides other
obstacles which are inherent and require no special effort on
our part-our free society does not breed deep-set and widespread
disaffection, as does the Communist society. Even though we
have had a share of "ideological" Communists and cases of en-
trapment, the Soviets have today no large pool of malcontents
and haters of our system from which to draw when they look for
resident agents. They know that the local Communist party is
too closely watched to recommend it for clandestine work.
Communist Mind Isolated
It is also a fact that the closed society produces the kind of
isolated mentality that cannot understand the workings and the
mentality of a free society. The same "wall" that Soviet'citizens
carry with them when they go abroad, which makes it difficult
for us to get close to them, tends to cut them off from the societies
and governments they wish to penetrate. For one thing, they often
consider much of the overt intelligence available to them as in-
tentional deception their own suspicion betrays them. Their
judgment of the true loyalties of prospective recruits is often bad.
When they approach nationals of western European and North
American countries under the impression that they have found a
willing source, they often discover that their names are in the
papers soon afterwards because the source was not really willing
at all. Hundreds of Americans of Russian and east European
origin whom the Soviets or their satellites have tried to approach
have reported such approaches to our authorities immediately
after they were made.
An outstanding case of this kind was that of the Rumanian
V. C. Georgescu. In 1953, shortly after Georgescu's escape from
Communist Rumania and while he was seeking U.S. citizenship,
a Communist intelligence agent acting under Soviet guidance
made a cruel attempt to blackmail him. Georgescu was given to
understand that if he would agree to perform certain intelligence
tasks in the United States, his two young sons, who were still
parents. Otherwise he could expect never to see his sons again.
Georgescu courageously refused any discussion of the subject,
threw the man out of his office and reported the full details to the
FBI. The Communist agent, who was in the diplomatic service,
was expelled from the United States. The whole case received
such wide publicity that Rumania finally sought to repair its
damaged prestige by acceding to President Eisenhower's personal
request for the release of the boys.
The ease with which the Soviets can place their intelligence
officers in Western countries is an enormous advantage for their
intelligence work. I have already described how the Soviets use
their embassies and trade missions abroad for cover. They also
use their mission at the United Nations and have even placed
their intelligence personnel in such bodies as the sacrosanct Sec-
retariat of the United Nations, whose employees are supposed to
be international civil servants. Recently two Soviets were ex-
pelled from this body and from the United States for their at-
tempt to recruit a politician of the state of New York who
reported the whole incident to the FBI. To the Soviets, no inter-
national organization is sacrosanct.
These advantages which the Soviets have in the West cannot
be matched behind the Iron Curtain. There are no immigrants
and few long-term visitors to the Soviet Union. So far, no inter-
national body has chosen to settle there or has been invited to do
so. A Soviet citizen cannot walk into a foreign embassy without
having to explain later to the police what he was doing there. The
Soviet people are taught to distrust the foreigner (although they
do not always follow instructions) and the Soviet internal police
have the mission of seeing to it that the foreigner does not get
into sensitive areas. Under these conditions, espionage operations
are difficult to initiate from scratch behind the Iron Curtain. The
possibility that agents can he sought and found and cultivated
there without the knowledge of local police is so limited that no
intelligence service is going to try to solve many of its problems
by this means. Fortunately, there are other ways of achieving
the objectives of intelligence collection.
Our free societies, with all their blessings, cannot be made over
merely to even the balance sheet of intelligence. But some of the
loopholes, some indiscretions, some of the carelessness in our
handling of public information can possibly be dealt with more
effectively than they are today.
V. COUNTERINTELLIGENCE
I have emphasized that in today's spy-conscious world each
side tries to make the acquisition of intelligence by its opponent
as difficult as possible by taking "security measures" in order
to protect classified information, vital installations and personnel
from enemy penetration. I have also indicated that these meas-
ures, while indispensable as basic safeguards, become in the end
a challenge to the opponent's intelligence technicians to devise
even more ingenious ways of getting around the obstacles.
Clearly, if a country wishes to protect itself against the un-
ceasing encroachments of hostile intelligence services it must do
more than keep an eye on foreign travelers crossing its borders,
more than placing guards around its "sensitive" areas, more than
checking on the loyalty of its employees in sensitive positions. It
must also find out what the intelligence services of hostile coun-
tries are after, how they are proceeding and what people they are
using. It can best accomplish these tasks by penetrating the inner
circle of hostile services where the plans are made and the agents
selected and trained, and, if the job can be managed, by bringing
over to its side "insiders" from the other camp.
Operations having this distinct aim belong to the field of coun-
terespionage and the information that is derived from them is
34 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
tiled counterintelligence. Counterespionage is inherently a pro
Jive and defensive operation. 4ppiQv rFKsRelea> 2.OO
,ionage against one's country. Given the nature of Communist
ns, however, counterespionage on our side inevitably entails
uncovering of secret aggression, subversion, sabotage, kid-
>ping, even assassination. Although such information is not, like
itive intelligence, of direct use to the government in the forma-
o, of policy, it often alerts the government to the nature of the
usts of its opponents and the area in which political action is
.ug planned. On October 30, 1962, U.S. and Venezuelan officials
'nitored a secret Cuban radio signal directing acts of terrorism
inst the Venezuelan oil fields. Before adequate preventive ac-
1 could be taken saboteurs, believed to be Communists, suc-
kled in doing serious damage to the oil production facilities
, C. Here counterintelligence helped mitigate the damage and
ointed the Cuban source of the threat. This allowed better
ective action to be taken for the future.
he function of counterespionage is assigned to various U.S.
ties, each of which has a special area of responsibility. The
s province is the territory of the United States itself; this
1_uiization guards against the hostile activities of foreign agents
our own soil. The CIA has the major responsibility for coun-
aspionage outside the United States, thereby constituting a
Guard line of defense against foreign espionage-it attempts to
ect the operations of hostile intelligence before the agents
h their targets. Each branch of the armed forces also has a
,nterintelligence arm whose purpose is mainly to protect its
imands, technical establishments and personnel both at home
1 abroad against enemy penetration.
Co-ordination of Agencies
he effectiveness of this division of labour depends. upon the
ordination of the separate agencies and on the rapid dissemi-
;on of counterintelligence information from one to the other.
case of the Soviet "illegal" Colonel Rudolf Abel supplies an
-I ration of this co-ordination. A close associate and co-worker
'olonel Abel's in the United States was on his way back to
Soviet Union to make his report. While in western Europe,
decided to defect. He contacted a U.S. intelligence office in
ountry where he felt it safe to do so, showing an American
,,port obtained on the basis of a false birth certificate. He told
itastic story of espionage in the United States, including spe-
,a as to secret caches of funds, communication among agents
l 'is network and certain details regarding Colonel Abel. All this
,'rmation was immediately transmitted to Washington and
=ed to the FBI for verification. The agent's story stood up in
cry respect. He was brought back quietly and willingly to the
-rited States. As soon as he reached our shores, the primary
,ponsibility for handling the investigation and legal procedures
the case was transferred to the FBI and the Department of
c;tice. The case had originated abroad with CIA which con-
iued to handle its foreign angles.
The traditional purposes of counterespionage are "to locate,
entify and neutralize" the opposition. In more specific terms,
his means to find out where and who the hostile spy is-and pos-
,ly the spymaster, too-in order to thwart his work and even
illy to put him out of business. "Neutralizing" can take many
,rms. Within the United States an apprehended spy can be prose-
;Jed under the law; so can a foreign intelligence officer who is
ought red-handed having contact with agents, provided he does
:ot. have diplomatic immunity. If he has immunity he can only
`io expelled. But there are other ways of neutralizing agents, and
x e of the best is by exposure or the threat of exposure. A spy
not of much further use once his name, face and story are in
lie papers.
Counterespionage operations are often compared to chess, and
Wide World
Soviet spy Rudolf Abel In his cell In the federal courthouse In Brooklyn, N.Y.,
after his arraignment In Aug. 1957. Col. Abel's detection and arrest were
brought about by co-ordination between the CIA, which first got the tip In
Europe, and the FBI and the Justice department, which handled the case In
the U.S.
the Soviets are notoriously good chess players. These operations
require enormous patience and adroitness. They may take months
to plan and years to bring to fruition. Our target is massive and
diverse, for the Soviets use not only their own intelligence ap-
paratus in their operations against us but also those of their Euro-
pean satellites-Poland, Czechoslovakia, Hungary, Rumania and
Bulgaria-all of whom are old in the ways of espionage. Chinese
Communist espionage and counterespionage operations are largely
independent of Moscow, though many of their senior personnel
were schooled by Soviet. intelligence.
The most sophisticated operations of counterespionage, and the
most rewarding if they succeed, are directed against the staff and
the installations of the opponent's intelligence service. One of the
most famous cases in history was that of Col. Alfred Redl, who
from 1900 to 1907 was chief of counterespionage in the Austro-
Hungarian Empire's military intelligence service, and was later
its representative in Prague. From 1902 until the time he was
unmasked in 1913, Redl actually had been a secret agent of the
Russians and had revealed to them everything he knew of his
own country's intelligence operations-in this case, almost every-
thing there was to know. But that wasn't all. As a leading officer
of the intelligence service, Redl was a member of the General
Staff of the Austro-Hungarian Army and had access to all the
General Staff's war plans. These too he gave to the Russians.
35
Approved For Release 2002/06/18 : CIA-RDP84-00161 ROOO1OO17OOO5-7
THE CRAFT OF INTELLIGENCE
Redl had been bla"cl~rr~a~ ~~n~o ~~rl ~~ ie2~ s~ /e lY ClAs8QR&4a0V1A GQMQ?17008Ws on serious charges,
in his career on the basis of two weaknesses-homosexuality and then the revolutionary group had to do something extreme, some-
A
overwhelming venality.
't'oday, when the headquarters of an intelligence service is as
"impenetrable" as the best minds assigned to the task can make
it, counterespionage usually aims at more accessible and vul-
nerable targets. These are chiefly the offices and units that in-
telligence services maintain in foreign countries from which their
field operations in espionage and counterespionage are directed.
In the case of the Soviets, such, offices are often located in em-
bassies, consulates and trade delegations. These locations provide
"cover"; i.e., they conceal the intelligence unit and at the same
time afford its members the protection of diplomatic immunity.
A factor which counterespionage exploits is the need and desire
of the opposing side for information, for positive intelligence.
If a stranger walks into an embassy in the Free World and with a
worried look on his face goes up to the receptionist and tells her in
a hoarse whisper that he has some important information which
he would like to put into the hands of the "right person," it is
likely that he will sooner or later be talking to the "right person."
No intelligence service can afford to turn away such an offer of
information, not, at least, without giving it careful scrutiny. Some
of the most crucial intelligence ever received has been delivered
by people who unexpectedly walked into an embassy one day in
just this fashion. Therefore, counterespionage often tries to
"plant" an agent with the opposing service by fixing him up with
information which will make him appear useful. It is hoped that
the agent will get himself hired by the opposition on a long-term
basis, become more and more trusted and will be given increas-
ingly sensitive assignments.
The Soviets used this method against Allied intelligence offices
in West Germany and Austria during the 19S0s. Refugees from
the East were so numerous at that time that it was necessary to
employ the better-educated ones to help in the screening and
interrogation of their fellow refugees. The Soviets determined to
take advantage of this situation and cleverly inserted agents in
the refugee channel, providing them with information about con-
ditions behind the Curtain which could not fail to make them
seem of great interest to Western intelligence. As a result, it later
turned out that some people employed as interrogators and assist-
ants were Soviet agents. Their task for the Soviets was to find
out about our methods and targets, to get acquainted with our
personnel and also to keep tabs on the countless refugees who
innocently told them their stories.
Provocation Frequently Used
s
thing more serious than merely holding clandestine meetings.
a result, we encounter some astounding situations in the Russia
of the early 1900s.
The most notorious of all tsarist provocateurs, the agent Azeff,
appears to have originated the idea of murdering the tsar's uncle,
the Grand Duke Sergius, and the Minister of the Interior, Plehve.
These murders were actually committed by the terrorists at the
instigation of Azeff solely for the sake of giving the Okhrana
the opportunity of arresting them. One of Lenin's closest asso-
ciates from 1912 until the Revolution, Roman Malinovsky, was a
tsarist police agent and provocateur, suspected by Lenin's entou-
rage but always defended by Lenin. Malinovsky did his share of
revealing the whereabouts of secret printing presses, secret meet-
ings and the conspiracies of the revolutionaries to the police, but
his main achievement was far more dramatic. Since he openly
played the role of an active Bolshevik, he got himself elected,
with police assistance and with Lenin's blessing, as representative
to the Russian parliament, the Duma, where he led the Bolshevik
faction and distinguished himself as an orator. The police often
had to ask him to restrain the revolutionary ardour of his
speeches. Indeed, there is some question in the cases of both Azeff
and Malinovsky as to where their allegiance really lay. Since each
played his role so well, he seems frequently to have been carried
away by it and to have believed in it, at least temporarily..
Officials and Newsmen Targets
ins
the
air
an
sel
do
of
Sc
be
ja
Today provocation is chiefly an operation of security services
behind the Iron Curtain directed against foreign intelligence of-
ficers and diplomatic personnel: It may also be employed against
newsmen or even casual tourists, either to get rid of a reporter
who knows too much or to create the image of massive Western
espionage against the Soviet Union. It is sometimes even used as
a basis for blackmail. The usual method is to provoke the victim
into an illegal or degrading act, to expose or blackmail him and
make him liable to prosecution or to expulsion if he is protected
by diplomatic immunity. Of course, when blackmail is involved
there is no disclosure if the target agrees to "play the game."
When you read in the paper that an individual has been ex-
pelled from one of the Soviet bloc countries, frequently this is
either a case of a completely arbitrary charge being made or else
it is the result of a provocation. The routine goes like this: one
day the target is contacted at home, in a restaurant, on the street
or even in his office by a member of the "underground" or by
someone who feigns dissatisfaction with the regime. The provoc-
ateur offers important information. If the target bites and takes
up contact with the man, he may be unpleasantly surprised dur-
ing the course of one of his meetings by the sudden intervention
of the local security police. The provocateur is "arrested" for
giving information to a foreign power. The target himself may
find his name in the paper; if he is a diplomatic official his em-
bassy will receive a request from the local foreign office that he
leave the country within 24 hours.
What is gained through this technique is that if the victim
really was engaged in the collection of intelligence, then the So-
viet Union is rid of him and has also served warning that it will
not put up with any kind of snooping. His replacement will prob-
ably restrict himself accordingly. He will certainly be careful
about offers from the "underground." And if the victim is a pri-
vate citizen knowledgeable in the ways and wiles of Communism,
then the Soviet will have deprived the West of another person
whose advice and counsel would be useful to us.
The most characteristic tool of counterespionage operations is
the double agent, and he comes in many guises. In an area like
West Germany, with its concentration of technical and military
This same tactic can be used to quite a different end, namely,
provocation, which has an ancient and dishonourable tradition.
The term agent provocateur points to its origin in France where
the device was formerly used during times of political unrest. But
it was the Russians who made a fine art of provocation. It was
the main technique of the tsarist Okhrana in smoking out revolu-
tionaries and dissenters and was later taken over by the various
Soviet police organs. In tsarist times an agent would join a sub-
versive group and not only spy and report on it t o the police, but
also incite it to take some kind of action in order to give the police
a pretext for swooping down on it and arresting some or all of its
members. Since the agent reported to the police exactly when
and where the action was going to take place, they had no
problems.
Actually, such operations could become immensely subtle, com-
plicated and dramatic. The more infamous of the tsarist agents
provocateurs have all the earmarks of characters out of Dostoev-
ski. In order to incite a revolutionary group to the action that
would bring the police down on it, the provocateur himself had to
play the role of revolutionary leader and terrorist. If the police
36 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT OF INTELLIGENCE
installations of both the German Federal Republic and NATO, The British roundup of five Soviet agents in the Lonsdale ring
there is a steady flood of ageApfpmved fortR ie *20O2/06918uarcIA-RDP84e 04619 ROOQiIlQQ I7QNStiY surveil-
airfields, supply depots, factories, United States military posts
and the like. Many of these agents are caught. Many give them-
selves up for a variety of personal motives. Such agents become
doubles when they can be persuaded to continue the appearance
of working for the Soviet bloc but under Western "control."
Soviet agents who are caught by Western officials often agree to
become double agents because they find it preferable to sitting in
jail for a couple of years.
Using the Double Agent
In order to "build up" a double agent of this kind he is al-
lowed to report harmless positive information back to his original
employers, the Soviets. It is hoped that the latter, pleased with
his success in acquiring information, will give him new briefs
and directives. Such briefs in themselves are counterintelligence
information because they show us what the opponent wants to
know and how he is going about getting it. Sometimes it is pos-
sible, through such an agent, to lure a courier, another agent or
even an intelligence officer into the West. When this happens,
one has the choice of simply watching the movements of the
visitor-hoping he will lead to other agents concealed in the
West-or of arresting him. If he is arrested, the operation is
naturally over, but it has succeeded in neutralizing another person
working for the opposition.
A more valuable double for our counterintelligence is the
resident of a Western country who, when approached by the
Soviet or other bloc intelligence service to undertake a mission
for them, quietly reports the encounter to his own authorities.
The advantages are twofold. The Soviets rarely approach a West-
erner unless they have something serious in mind. Secondly, the
voluntary act of the person approached in reporting this event
points to his trustworthiness. In such a case the target of Soviet
recruitment will usually be told by his own intelligence authorities
m.o "accept" the Soviet offer and to feign co-operation, meanwhile
reporting all the activities and missions which he undertakes for
!.he Soviets. He is provided with "reports" which his principals
desire to have fed to the Soviets. This game can then be played
until the Soviets begin to have some reason to suspect their
"agent," or until the agent can no longer stand the strain.
The case of the late Boris Morros, the Hollywood director, was
of this kind. Through Morros, who had checked in with the FBI
early in the game, the Soviets ran a network of extremely impor-
tant agents in the United States, most of them in political and
intellectual circles. Morros reported on them regularly to the FBI.
Surveillance Must Be Covert
"Surveillance" is the professional word for shadowing or tail-
ing. Like every act of counterespionage, it must be executed with
maximum care lest its target become aware of it. A criminal who
feels or knows he is being followed has limited possibilities open
to him. The best he can hope for is to elude surveillance long
enough to find a good hiding place. But an intelligence agent, once
he has been alarmed by surveillance, will take steps to leave the
country, and he will have plenty of assistance in doing so.
The purpose of surveillance in counterespionage is twofold.
Tf a person is only suspected of being an enemy agent, close ob-
servation of his actions over a period of time may lead to fur-
ther facts that confirm the suspicion and supply details about the
agent's mission and how he-is carrying it out. Secondly, an agent
is rarely entirely on his own. Eventually he will get in touch, by
one means or another, with his helpers, his sources, and perhaps
the people from whom he is taking orders. Surveillance at its best
will uncover the network to which he belongs and the channels
through which he reports.
lance. Henry Houghton, an Admiralty employee, was suspected
of passing classified information to an unidentified foreign power.
Scotland Yard observed him meeting with another man on a
London street, but the encounter was so brief it was impossible
to tell for certain whether anything had passed between them or
whether they had even spoken to each other. However, the fact
that both men acted so furtive and were apparently extremely
wary of surveillance convinced the British that they were on the
right track. The Yard had enough trained men in the immediate
area to have the second man followed as well. He eventually led
them, after many days of tireless and well-concealed surveillance,
to a harmless-looking American couple who operated a second-
hand bookstore. The role, if any, of this couple could not be im-
mediately ascertained.
On a later occasion Houghton came up to London again, this
time with his girl friend, who worked in the same naval establish-
ment. While under surveillance, the two of them, walking down
the street carrying a market bag, were approached from the rear
by the same man as before. He was ready to relieve Houghton
and the girl of the market bag, clearly a prearranged method for
passing the "goods."
Three at one swoop, all caught in the act, was something the
police could not afford to pass up, and the three were arrested on
the spot. A few hours later, the American couple met the same
fate. The man Houghton met was Gordon Lonsdale, the Soviet
"illegal" with Canadian papers who was running the show. The
Americans had previously been sought by the FBI for their
part in a Soviet net in the United States and had disappeared
when things had become too hot for them here. In London they
had been operating a secret transmitter to relay Lonsdale's in-
formation to Moscow. Microfilms found in their apartment
eventually led to the apprehension of John Vassall, another
Admiralty employee. Good counterespionage operatives never
close in on an agent without first having exhausted all the possi-
bilities of locating and identifying everyone else associated with
the agent.
A Bonanza for Intelligence
One of the biggest bonanzas for counterespionage is the defec-
tion of a staff intelligence officer of the opposition. It provides
the equivalent of a direct penetration of hostile headquarters for
a period of time. One such intelligence "volunteer" can paralyze
for months to come the service he left behind. He can describe the
internal and external organization of his service and the work
and character of many of his former colleagues at headquarters.
He can identify some intelligence personnel stationed abroad un-
der cover. Best of all, he can deliver information about opera-
tions. He is not likely to know the true identity of a large number
of agents, of course, for all intelligence services compartmentalize
such information, and only the few officers intimately concerned
with a case will know exactly who the agents on that case are.
The West has been singularly lucky in having many of these
bonanzas in the course of recent history. In 1937 two of Stalin's
top intelligence officers stationed abroad defected rather than
return to Russia to be swallowed up in the purge of the N.K.V.D.
One was Walter Krivitsky, who had been chief of Soviet intelli-
gence in Holland. In 1941 he was found dead in a Washington
hotel, shot by unknown agents, presumably Soviet, who were
never apprehended. I shall never accept the story that he com-
mitted suicide. The second was Alexander Orlov, who had been
one of the N.K.V.D. chiefs in Spain at the time of the civil war.
Unlike Krivitsky, he has managed to elude Soviet vengeance.
An early postwar Soviet defection was that of Igor Gouzenko,
a member of Soviet military intelligence, who had been in charge
37
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
_, , #eese 2002/06/18 CIA-RDP84-00161 R04Q1QOfi0005-7
Wide world
Head In shadow Is that of Peter
Deriabin, former major in the Soviet
secret police, who sought asylum in
the West in 1954. At left, Associated
Press reporter Pay Shaw. Interviewed
in 1959, Deriabin permitted no pic-
tures of his face, even though he was
wearing a disguise
of codes and ciphers in the Soviet Embassy in Ottawa. Thanks
in large part to information Gouzenko brought with him, the most
lethal of all Soviet espionage efforts, to procure the secrets of the
atom bomb, was stopped.
The years 1954-55 were the occasion of multiple desertions.
After Stalin's death and the liquidation of Beria shortly after-
ward, it was clear that anyone prominent in the Soviet security
service was in jeopardy. Among the major defections to the West
at that time were those of Vladimir Petrov, who had been K.G.B.
chief in Australia; Juri Rastvorov, an intelligence officer sta-
tioned at the Soviet Mission in Japan; and Peter Deriabin, who
defected from his post in Vienna. All of these men had at one
time or another been stationed at intelligence headquarters in
Moscow and possessed valuable information that went far beyond
their assignments at the time they defected.
Two defections of a special kind that have occurred in recent
years involved Soviet intelligence personnel employed on assas-
sination missions. Nikolay Khokhlov was sent from Moscow to
West Germany in early 1954 to arrange for the murder of a
prominent anti-Soviet emigre leader, Georgi Okolovich. Khokhlov
told Okolovich of his mission and then defected. At Munich in
1957, Soviet agents tried without success to poison Khokhlov.
In the fall of 1961, Bogdan Stashinskiy defected in West Ger-
many and confessed that on Soviet orders he had murdered the
two Ukrainian exile leaders Rebet and Bandera some years earlier
in Munich.
Recently, Soviet diplomat Aleksandr Kaznachayev defected
in Burma, where he had been stationed. While Kaznachayev was
not a staff member of Soviet intelligence, he was a "co-opted
worker" and was used in intelligence work whenever his position
as a diplomat enabled him to perform certain tasks with less risk
of discovery than his colleagues in the intelligence branch. His
recent book describing what went on in the Soviet Embassy in
Rangoon has done a great deal to debunk the picture of Soviet
skill and American incompetence previously impressed on the
American public in the book The Ugly American.
All the important intelligence "volunteers" have not been So-
viets. Numerous high-ranking staff officers have defected from the
satellite countries and were able to contribute information not
only about their own services but about Soviet intelligence as
well, for the Soviets manage and direct the satellite services, not
at long range but in person. They do this through a so-called ad-
visory system. A Soviet "advisor" is installed in almost every
department and section of the satellite intelligence services, be
it in Prague, Warsaw, Bucharest, or any other satellite capital.
This advisor is supposed to be shown all significant material con-
cerning the work being done, and must give his consent to all im-
portant operational undertakings. Ile is to all intents and purposes
a supervisor, and his word is final.
As a sidelight on Soviet relations to its satellites, and as an
38 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
nae tee e t s intere ;
xcellent example of counter30P
o note that the Soviets do bPbd o'hrt~~~a~ii "t~S2/ x?
ontrol the satellite intelligence services. This is not because the
latter are incompetent, but because the satellite services are evi-
dently not trusted by their Soviet masters. In order to prevent
these services from getting away with anything, the Soviets go to
the trouble of secretly recruiting intelligence officers of the satel-
lite services who can supply them with information on plans, per-
sonnel, conflicts in the local management, disaffection and the
like, which might not have come to the attention of the advisor.
Key Satellite Aides Fled
Joseph Swiatlo, who defected in 1954, had been chief of the
department of the Polish intelligence service which kept tabs on
members of the Polish government and the Polish Communist
party. Pawel Monat had been Polish military attache in Washing-
ton from 1955 to 1958, after which he returned to Warsaw and
was put in charge of world-wide collection of information by
Polish military attaches. He served in this job for two years be-
fore defecting in 1959. Frantisek Tisler defected to us after hav-
ing served as Czech military attache in Washington from 1957
to 1959. The Hungarian secret police officer Bela Lapusnyik
made a daring escape to freedom over the Austria-Hungary bor-
der in May of 1961 and reached Vienna safely, only to die of
poisoning, apparently at the hands of Soviet agents, before he
could tell his full story to Western authorities.
What has brought all these men over to our side is naturally a
matter of great interest not only to Western intelligence but to
any serious student of the Soviet system and of Soviet life.
Revelations by Vladimir Petrov, Soviet embassy official who had acted as the
Soviet's espionage chief In Australia until he became disillusioned with com-
munism, set off a major Investigation In 1954. Petrov and his wife, who had
also served as an espionage officer, were granted sanctuary in Australia
Wide Worid
Wide World
Jozef Swiatlo, Polish security official who turned against communism in 1954
and was given asylum In the U.S.
Gouzenko, as code clerk for Soviet intelligence, saw all the traffic
that passed back and forth between the Soviet Embassy in Ot-
tawa and Soviet intelligence headquarters in Moscow during
World War II. He has told how he was gradually, overcome by
shame and repugnance as he began to realize that the U.S.S.R.,
while a wartime ally of Britain, Canada and the United States,
was mounting a tremendous espionage effort to steal their scien-
tific secrets. The moral revulsion of the man on learning of Soviet
machinations against its "friends" eventually led to his defection.
Soviet Insiders Disillusioned
The postwar defectors did not have similar motivation because
the Soviets no longer affected friendship with the West after 1946.
Every Soviet official was well indoctrinated on this point and
could not easily survive in his job if he had any soft feelings about
the "imperialists." Nevertheless, feelings akin to Gouzenko's seem
to have inspired these defections. Many of these men suffered
some disillusionment or disappointment with their own system.
When one studies the role the intelligence services play in the
Soviet world and their closeness to the centres of power, it is not
surprising that the Soviet intelligence officer gets an inside look,
available to few, of the sinister and hypocritical methods of op-
eration behind the facade of "socialist idealism." To the intelli-
gent, dedicated Communist, such knowledge comes as a shock.
One defector has told us, for example, that he could trace the dis-
illusionment which later led to his own defection back to the day
when he found out that Stalin and the K.G.B., and not the Ger-
mans, had been responsible for the Katyn massacre (the murder
of 10,000 Polish officers during World War II). The Soviet pub-
lic still does not know the truth about this or most of the other
crimes of Stalin. This "loss of faith" in the system within which
one is working, coupled often with personal disappointments,
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 39
THE CRAFT OF INTELLIGENCE
seems to be theA9pi J &JiPB' tZ6[6A4e2G621()6/1 8 : CIAADP84 'O 1 -1ROO&*OOfFROOS.-'t'his country has always
Of course, these names by no means exhaust the list of all those been a haven for those seeking to leave tyranny and espouse
who have left the Soviet intelligence service and other Soviet
posts. Some of the most important and also some of the most
recent defectors have so far chosen not to be "surfaced." They
too have made, and are making, a continual contribution to our
inside knowledge of the work of the Soviet intelligence and se-
curity apparatus and of the way in which the subversive war is
being carried on against us by Communism. There have also been
defectors from Communist China.
Every effort is made to see to it that those who leave a Com-
munist service are helped and assisted in every way, whether they
openly acknowledge their previous connections or try to preserve
Soviet bombers over Moscow's Red Square during a May Day parade
TikhomirofJ-Magnum
continue to work for the Kremlin and against the
VI. CONFUSING THE ADVERSARY
Sir Walter Scott, when he wrote the well-known lines
Oh, what a tangled web we weave,
When first we practice to deceive!
was not thinking of intelligence deception, but his words describe
quite correctly what this kind of operation frequently entails.
When one intentionally misleads, friends as well as foes arc some-
times misled, and there is always the danger of subsequently not
being believed when one wants to be. Deception is tricky business,
especially in time of peace and in the absence of wartime controls.
And deception is easier in the closed society, which can manipu-
late its information media and hide what it wants, where and
when it wants.
In intelligence, the term deception covers a wide variety of ma-
neuvers by which a state attempts to mislead another state, gen-
erally a potential or actual enemy, as to its own capabilities and
intentions. Its best-known use is in wartime or just prior to the
outbreak of war, when its main purpose is to draw enemy defenses
away from a planned point of attack, or to give the impression
that there will be no attack at all, or simply to confuse the op-
ponent about one's plans and purposes. During the kind of peace
we call the Cold War, various other forms of deception, including
political deception, are practised against us by the Soviets. These
involve the propagation of false and misleading information, the
faking of documents and the use of forgeries. This is considered
important enough so that a special section in the Soviet intelli-
gence service called the "disinformation bureau" is responsible
for mounting such operations.
Soviet Parades Used for Deception
Deception as to military capabilities is chiefly a short-range
tactical maneuver gauged to conceal the possession or location
of certain weapons-or, sometimes, the lack of them. The So-
viets have used military parades to place armaments on display
that are intended to draw attention away from other armaments
they may have in their arsenal or may plan to have. Mock-ups of
planes and other equipment never intended to be operational have
also been exhibited. In 1955 the Soviets gave the impression,
during an exhibition on Red Aviation Day, that they were em-
phasizing heavy bomber production, whereas in fact they were
shifting their emphasis to missiles. Visiting diplomats and mili-
tary observers were permitted to see a "fly-by" of heavy bombers
in numbers far exceeding what was thought to be the available
squadron strength in the area. The impression was thereby given
that many more heavy bombers were coming off the assembly
lines that we had calculated. Later it was learned that the same
squadron of bombers had been flying around in circles, reappear-
ing every few minutes with the intention of misleading the ob-
servers.
Deception techniques of this sort were utilized by both sides
during World War II. Airfields in Britain were made to look like
farms from the air. Sod was placed over the hangars and main-
tenance shacks were given the appearance of barns, sheds and
outbuildings. Even more important, mock-ups were set up in
other areas to look like real airfields with planes on them. Else-
where mocked-up naval vessels were stationed where real ones
might well have been.
As a strategic maneuver, deception operations generally re-
quire lengthy and careful preparation. One must ascertain what
THE CRAFT OF INTELLIGENCE
the enemy thinks and wAp e4sF c I~ q Q)g2t q6/~qcj IA RDP>~4 0report t em. 0161 RO 001100170005-agents in the up , closest co-ordination between the supreme military command French underground were utilized to pass deceptive orders and
and the intelligence service. Thus these operations are always of requests for action to back up the coming Allied landings; it
major stature and are, for the most part, one-time gambles for was known that certain of these agents were under the control
high stakes. The intelligence problem is to get information into of the Germans and would pass on to them messages received
the hands of the enemy by some means and in some form so that from the Allies. Such agents therefore constituted a direct chan-
he will believe a certain move is to be made by his opponent. The nel to the German intelligence service. In order to make the
information itself must be plausible and not outside the prat- Germans think that the landings would take place in the Le Havre
tical range of plans that the enemy knows are capable of being area, agents in the vicinity were asked to make certain oh-
put into operation. servati fl 1
n
After the Allies had driven the Germans out of North Africa
in 1943, it was clear to all that their next move would be into
southern Europe. The question was where. Since Sicily was an
obvious stepping stone and was in fact the Allied objective, it
was felt that every effort should be made to give the Germans and
Italians the impression that the Allies were going to bypass it.
To have tried to persuade the Germans that there was to be no
attack at all or that it was going to move across Spain was out
of the question, for these things would not have been credible.
The deception had to point to something within the expected
range.
The Contrived Accident
For quick and effective placement of plausible deception di-
rectly into the hands of the enemy's high command, few methods
beat the "accident," so long as it seems logical and has all the ap-
pearances of being a wonderfully lucky break for the enemy. Such
an accident was cleverly staged by the British in 1943 and it was
no doubt accepted by the Germans at the time as completely
genuine. Early in May of that year the corpse of a British ma-
jor was found washed up on the southwest coast of Spain near
the town of Huelva, between the Portuguese border and Gibral-
tar. A courier briefcase was still strapped to his wrist containing
copies of correspondence to General Alexander in Tunisia from
the Imperial General Staff. These papers clearly hinted at an
Allied plan to invade southern Europe via Sardinia and Greece.
As we learned after the war, the Germans fully believed these
hints. Hitler sent an armoured division to Greece, and the Italian
garrison on Sicily was not reinforced.
This was perhaps one of the best cases of deception utiliz-
ing a single move in recent intelligence history. It was called
Operation "Mincemeat," and the story of its execution has been
fully told by one of the main planners of the affair, Ewen
Montagu, in the book The Man Who Never Was. It was a highly
sophisticated feat, made possible by the circumstances of modern
warfare and the techniques of modern science. There was nothing
illogical about the possibility that a plane on which an officer
carrying important documents was a passenger could have come
down, or that a body from the crash could have been washed
up on the Spanish shore.
A British Major's Corpse
Actually, a recently dead civilian was used for this operation.
He was dressed in the uniform of a British major; in his pockets
were all the identification papers, calling cards and odds and ends
necessary to authenticate him as Major Martin. He was floated
into Spain from a British submarine, which surfaced close enough
to the Spanish coast to make sure that he would reach his target
without fail. And he did.
"Overlord," the combined Allied invasion of Normandy, in
June 1944, also made effective use of deception-in this case not
an isolated ruse but a variety of misleading maneuvers closely
co-ordinated with each other. These succeeded, as is well known,
in keeping the Germans guessing as to the exact area of the in-
tended Allied landing. False rumours were circulated among our
own troops on the theory that German agents in England would
sere )y nuicatmg to the Germans a heightened
Allied interest in fortifications, rail traffic, etc. Lastly, military
reconnaissance itself was organized in such a way as to em-
phasize an urgent interest in places where the attack would not
come. Fewer aerial reconnaissance sorties were flown over the
Normandy beaches than over Le Havre and other likely areas.
There are essentially two ways of planting deceptive informa-
tion with the enemy. One can stage the kind of accident the
British did in Spain. Such accidents are plausible because they
do, after all, frequently occur solely as a result of the misfor-
tunes of war. History is full of instances where couriers, loaded
with important dispatches, fell into enemy hands. The other way
is to plant an agent with the enemy who is ostensibly reporting to
him about your plans. He can be a "deserter," or some kind of
"neutral." The problem, as in all counterespionage penetrations,
is to get the enemy to trust the agent. He cannot simply turn up
with dramatic military information and expect to be believed.
Captured Radio Put to Use
A wholly modern deception channel came into being with the
use of radio. For example, a parachutist lands in enemy territory
equipped with a portable transmitter and is captured. He con-
fesses he has been sent on a mission to spy on enemy troop move-
ments and to communicate with his intelligence headquarters by
radio. Such an agent stands. a good chance of being shot after
making this confession; he may be shot before he has a chance
to make it. The probability is high, however, that his captors will
decide he is more useful alive than dead because his radio pro-
vides a direct channel for feeding deception to the opponent's
intelligence service. If the intelligence service that sent the agent
knows, however, that he has been captured and is under enemy
control, it can continue to send him questions with the intent of
deceiving the other side. If it asks for a report on troop concentra-
tions in sector A, it gives the impression that some military action
is planned there. This was one tactic used by the Allies in prepara-
tion for the Normandy landings.
The mounting of strategic deception requires the complete
co-operation and the complete security of all parts of govern-
ment engaged in the effort. For this reason, large-scale deception
is difficult for a democratic government except under wartime
controls. For the Soviets, of course, the situation is different.
With their centralized organization and complete control of the
information media within their country they can support a decep-
tion operation far more efficiently than a free country can. When
a Soviet diplomat drops a remark in deepest confidence to a col-
league from a neutral country at a dinner party, he usually does
so knowing that the neutral colleague also attends dinner parties
with Westerners. The particular remark was contained in a direc-
tive sent to him by his Foreign Office. When it is studied in intelli-
gence headquarters somewhere in the West and is found to agree
in substance with a remark made by a Soviet military attache at
a cocktail party 10,000 miles away, the two remarks may errone-
ously be thought to confirm one another.
In reality both originated with the same master source in the
Kremlin. Both Russians were acting as mouthpieces for an ex-
tremely well co-ordinated and well-timed program of political de-
ception mani ulated month by month i j fiction with
n
Approved For Release 2002/06/18 : CIA-RDP84-00161 R0001
0-0170-0-0''
41
THE CRAFT OF IAW(Whecf For Release 2002/06/18 : CLA-~DP84-00 1 JF,Q9PXQ9',7PQQ 7
massive of-
ocu
the Soviets' ever-shifting aggressive probes and plots in Berlin,
Cuba and whatever is next on the program.
the Congo
L
,
aos,
One of the most successful acts of long-range political de-
ception ever launched against the West took place before and
during World War II. It had the gullible in the West believing
that the Chinese People's Movement was not Communistic but
was solely a social and agrarian reform. This was not accom-
plished by open Communist propaganda. Instead the fiction was
planted by means of Communist-controlled journalists in the Far
East and various "front" or penetrated organizations.
Real Accidents Suspect
Any discussion of deception would be incomplete without men-
tioning how often the fear of being deceived has blinded an op-
ponent to valid intelligence accidentally coming into his hands.
If you suspect an enemy of constant trickery, then almost any-
thing that happens can be taken as one of his tricks. A collateral
effect of deception, once a single piece of deception has succeeded
in its purpose, is to upset and confuse the opponent's judgment
and evaluation of other intelligence he may receive. He will be
suspicious and distrustful. He will not want to be caught off
guard.
On January 10, 1940, during the "phony war," a German
courier plane flying between two points in Germany lost its way
in the clouds, ran out of fuel and made a forced landing in what
d t to be Belgium. On board were the complete plans of
u
thing, t e icero
fensives to come and the growing power of the Allies-infor-
mation which collided head on with the illusions cherished in
the highest German circles. Secondly, competition and discord
among different organs of the German government prevented it
from making a sober analysis of this source. Particularly, the
intelligence service under Himmler and Kaltenbrunner and the
diplomatic service under Ribbentrop were at odds and, as a re-
sult, if Kaltenbrunner thought information was good, Ribben-
trop automatically tended to think it was bad. An objective
analysis of the operational data was out of the question in a
situation where rival cutthroats were vying for position and
prestige. In the Cicero case Ribbentrop and the diplomatic serv-
ice suspected deception. The net effect was that, as far as can
be ascertained, the Cicero material never had any appreciable
influence on Nazi strategy. Of course, at this late date they did
not have many alternatives open to them anyway.
A further ironical twist to this famous case is that the Nazi
intelligence service paid this most valuable agent in counterfeit
English pound notes, and he has been trying ever since to get
restitution from the German government for services rendered
-in real money.
Long History of Forgery
Certainly one of the most active agencies in the propagation
of intentional deception is the office in the Soviet intelligence
service (K.G.B.) called the disinformation section. In recent
years this office has been particularly busy in formulating and
distributing what purport to be official documents of the United
States, Britain and other countries of the Free World. Its in-
tention is to misstate and misrepresent the policies and purposes
of these countries. In June of 1961 Richard Helms, a high
official of the Central Intelligence Agency, presented the evi-
dence of this activity to a congressional committee. Out of the
mass of forgeries available, he selected 32 particularly succulent
ones, which were fabricated in the period 1957-60.
turne o
the German invasion of France through Belgium, for which
Hitler had already given marching orders. When the Luftwaffe
major who had been piloting the plane realized where he had
landed, he quickly built a fire out of brush and tried to burn all
the papers he had on board, but Belgian authorities reached him
before he could finish the job and retrieved enough half-burned
and unburned documents to be able to piece together the German
plan.
Some of the high British and French officials who studied the
material felt that the whole thing was a German deception op-
eration. How could the Germans be so sloppy as to allow a small
plane to go aloft so close to the Belgian border in bad weather
with a completely detailed invasion plan on board? This reason-
ing focused on the circumstances, not on the contents of the
papers. Churchill writes that he opposed this interpretation.
Putting himself in the place of the German leaders, he asked
himself what possible advantage there was in perpetrating a de-
ception of this sort. Obviously, none. As we learned after the
war, the invasion of Belgium, which had been set for the 16th of
January-six days after the plane came down-was postponed
by Hitler primarily because the plans had fallen into the Allies'
hands.
The Ambassador's Valet
ACcidents like this are not the only events that
spectre of deception. It has already been pointed out that if you
send a deception agent to the, enemy, you have to make him
credible. Thus bona fide windfalls have sometimes been doubted
and neglected because they were suspected of being deception.
This happened to the Nazis late in World War II in the case of
"Cicero," the Albanian valet of the British Ambassador to Tur-
key. He had succeeded in cracking the ambassador's private safe
and had access to top secret British documents on the conduct
of the war, and one day offered to sell them to the Germans as
well as to continue supplying similar documents.
Some of Hitler's experts in Berlin could never quite believe
that this wasn't a British trick, but for more complex reasons
than in some cases where deception is feared. The incident is
an excellent example of how prejudice and preconception can
cause failure to pr~g, ,yoWi 7Or Release 2002/06/18
42
He pointed out that the Russian secret service has a ong
of forging documents, having concocted the Protocols of
tor
hi
y
s
Zion over 60 years ago to promote anti-Semitism. The Soviets
have been adept pupils of their tsarist predecessors. Their for-
geries nowadays, he pointed out, are intended to discredit the
West, and the United States in particular, in the eyes of the
rest of the world; to sow suspicion and discord among the West-
ern allies; and to drive a wedge between the peoples of non-
Communist countries and their governments by promoting the
notion that these governments are the puppets of the United
States.
The falsified documents include various communications pur-
porting to be from high officials to the President of the United
States, letters to and from the Secretary of State or high State
Department, Defense Department and USIA officials. To the
initiated, these documents are patent fabrications; while the
texts are cleverly conceived, there are always a great number of
technical errors and inconsistencies. Unfortunately these are not
apparent to the audiences for which the letters are intended,
generally the peoples of the newly independent nations. The
documents are prepared for mass consumption rather
British
the elite. One of the most subtle, supposedly part a
cabinet paper, wholly misrepresented the U.S. and British atti-
tude with respect to trade-union policies in Africa.
The forgery technique is particularly useful to the Communists
because they possess the means for wide and fast distribution.
Newspapers and news outlets are available to them on a world-
wide basis. While many of these are tarnished and suspect be-
cause of Communist affiliations, they are nevertheless capable
of placing a fabrication before millions of people in a short time.
CIA-RDP84-00161 R000100170005-7
The
ride
alrea
hand
tellir
tion~
own
Ti
whir
ices
office
of w
mill
not
Ir
thou
fron
rely
in ti
educ
less
a lip
supl
cati,
TELEGRAM TENT
LIYI_ 1UXI [1JFIT1T
~
I L ~\60\ \
To: SECSTATE
WASHINGTON
THE CRAFT OF INTELLIGENCE
TELEGRAM. SENT
Tel 9ECSTATE
WASHINGTOd
Date; April 9. 1957
Cbereed W: Embaaay
50B, April 4, 5 p.m,
HOST INQtEDIATH
TOP SECRET
your telegram No. 1348 of April 2, 1957
At the present moment it would be a aprather parently lffiCIXV~
prefer,
to carry out version No. 1, which y
owing to the lack of people in Gt.mmo'e entourage whom we
trust completely. There is also no certainty that at the
could t lose heart and
ftie successors will no
last
tell moGimmoment eome o
everyt n9.
The situation 10 further complicated by the fact that
Ching-kuo eontinuse to retain complete control
Chiang of the
eenret service. Preparations for vers ion ChNO. 1 iang Cbing-k"O'*
n therefore, be discovered by his age ikY that he would take
~comoromjsiog
countermeasures ands ruinl the entire enterprise.
ider therefore version No. 3 preferable, although
Its execution
t
.
cons
I cons
its detaile must be more carefully worked ou
on proper timing if all suspicion Is to be avoided.
that a final decision should be taken
,Will astll soon depasend
In any case I age possible.
561, April 9. 5:3o p.m.
MOs? DQ413DIATZ
TOP 9rCRST
Of G Latest reports from very
entour
immo's go l ed reliable so he attitude
telegram No. 1348 irate that urces on t
does not solve the problemoutlined In your
, t
take
01molaet my
r portmiler measures necessary to further and
Interfe here member the e Persona besides
re with our a of the old me^t coned i?
services here fully PB are Hepresenttivea afrd might seriouel
Y
this vi
the s
ew.
pacial
eneures the whappointmentloF of continue
ina icreviduen"
donea the Na officers 504
In the All and the Air. Thia has tgala sometoertposient tions
vY already, view of the o been general sot one authorized certain meoam taken 348. arryind o
4orized
in Your tole eye
egr the
Typical of documents forged for propaganda purposes and made public in media of popular circulation are these two
spurious telegrams supposedly sent to the Secretary of State In Washington. Published In an English-language
newspaper in the Far East, the documents alleged that American official agencies were plotting to assassinate Chiang-
kal-Shek
The denials and the pinpointing of the evidence of fabrication
ride so far behind the initial publication that the forgeries have
already made their impact in spreading deception. On the other
hand, the technique of forgery is not available to Western in-
telligence in peacetime, for, quite apart from ethical considera-
tions, there is too much danger of deceiving and misleading our
own people.
There is another type of deception that occasionally crops up
which does not have its source with Communist intelligence serv-
ices but which complicates the task of the Western intelligence
officer and particularly the analyst. This deception is the product
of what are called "papermills" in intelligence parlance. A paper-
mill is a producer of phony intelligence, primarily for profit and
not for the sake of the deception.
In the latter days of World War II and in the postwar era when
thousands of the intelligentsia of eastern Europe were uprooted
from their homes and sought refuge in the West they came to
rely on their wits for a living. Many had had important posts
in the countries they were forced to leave, and possessed wide
education and knowledge of languages and peoples. Some of the
less scrupulous among them found that an excellent way to make
a living for a time was to fabricate intelligence reports based on
supposed contacts with their homeland. These papermill fabri-
cations could be cleverly conceived, well constructed and well
attuned to the desires of prospective purchasers and therefore
almost impossible to reject at first glance. Many of them had a
good market and brought a good price. Unfortunately for the
fabricators, they were often too zealous in seeking more than
one market for their product. In time-but it took much time and
effort-U.S. and other intelligence services that had been vic-
timized made a common drive to eliminate the papermills. The
effort has been very largely successful.
VII. HOW INTELLIGENCE IS PUT TO USE
Information gathered by intelligence services is of little use
unless it is got into the hands of its "consumers," the policy
makers. This must be done in good time and in clear, intelligible
form so that the particular intelligence can easily be read and
properly related to the policy problem with which it deals.
These criteria are not easily met, for the sum total of intelli-
gence received is immense. Thousands of items come into CIA
headquarters every day, directly or through other agencies of
government, particularly the State and Defense departments.
When we consider all we need to know about happenings behind
the Iron Curtain and in over a hundred other countries, this
volume is not surprising. Anywhere in the world events could
occur which might affect the security of the United States. How
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 43
THE CRAFT OF INTELLIGENCE
is this mass of inf MvWdr ei gi4O02/DW48
agencies, and how is i processed in the State Department, the
Defense Department and the CIA?
Between these three agencies there is immediate and often
automatic exchange of important intelligence data. Of course,
someone has to decide what "important" means and determine
priorities. The sender of an intelligence report (w]io may be
any one of our many officials abroad-diplomatic, military or
intelligence) will often label it as being of a certain importance,
but the question of priority is generally decided on the receiving
end. If a report is of a particularly critical character, touching
on the danger of hostilities or some major threat to our national
security, the sender will place his message in channels that pro-
vide for automatic dissemination to the intelligence officers in
the State and Defense departments and the CIA. The latter, as
co-ordinator of foreign intelligence, has the right of access to
all intelligence that comes to any department of our government.
This is provided for by law.
There is a round-the-clock watch for important intelligence
coming into the State and Defense departments and the CIA.
During office hours (which in intelligence work are never nor-
mal), designated officers scan the incoming information for
anything of critical character. Through the long night hours, spe-
cial watch officers in the three agencies do the monitoring. They
are in close touch with each other and come to know each other
well, and are continually exchanging ideas about the sorting out
of clues to any developing crisis. In the event that any dramatic
item should appear in the incoming nightly stream of reports, ar-
rangements have been made as to the notification of their im-
mediate chiefs. The latter decide who among the high policy of-
ficials of government-from the President at the top to the re-
sponsible senior officers in State, Defense and the CIA-should
be alerted. The watch officers also follow the press-service and
radio reports, including those of Soviet and Chinese origin. News
of a dramatic, yet open, character-the death of a Stalin, a re-
volt in Iraq, the assassination of a political leader--may first
become known through public means of communication. Official
channels today have access to the most speedy means of trans-
mission of reports from our embassies and our overseas installa-
tions, but these messages must go through the process of being
enciphered and deciphered. As a result, news flashes sometimes
get through first.
Post-Mortem Analyses
After there has been an important incident affecting our se-
curity, one that has called for policy decisions and actions, there
is usually an intelligence post-mortem to examine how effectively
the available information was handled and how much forewarn-
ing had been given by intelligence. Incidents such as the Iraqi
revolution of 1958 or the erecting of the wall dividing Berlin
on August 13, 1961, required such treatment, since neither had
been clearly predicted through intelligence channels. The pur-
pose of the post-mortem is to obtain something in the nature of
a batting average for the alertness of intelligence services. If
there has been a failure, either in prior warning or in handling
the intelligence already at hand, the causes are sought and every
effort is made to find means of improving future performance.
The processing of incoming intelligence falls into three general
categories. The first is the daily and hourly handling of current
intelligence. The second is the researching of all available intelli-
gence on a given series of subjects of interest to our policy
makers; this might be given the name "basic intelligence." For
example, one group of analysts may. deal with the information
available on the Soviet economy, another with its agriculture, a
third with its steel and capital goods production, and still another
with its aircraft and missile development. The third type of proc-
CW RDM&OOi Pr$ QDQIQO1aaiQQQ 7ence estimate and
judgment based on the whole volume of information on the sub-
ject of the estimate.
Of course, there is not time to submit every important item to
detailed analysis before it is distributed to the policy makers. But
"raw" intelligence is a dangerous thing unless it is understood
for what it generally is-an unevaluated report, frequently sent
off without the originator of the message being able to determine
finally its accuracy and reliability. Hence the policy makers who
receive such intelligence in the form of periodic intelligence bul-
letins (or as an isolated message if its importance and urgency
requires special treatment) are warned against acting on raw
intelligence alone.
These bulletins-both daily and weekly-summarize on a
world-wide basis the important new developments over the pre-
ceding hours or days; they include such appraisal as the sender
may give or as the CIA is able to add in consultation with rep-
resentatives of the other government intelligence agencies. These
representatives meet frequently for that purpose, going over the
items to be included in the daily bulletin. New information may
still be added to the daily bulletin up until the early morning
hours of the day on which it is issued. When this intelligence
is sent forward, explanatory material is often included as to
source, manner of acquisition and reliability. Some messages carry
their own credentials as to authenticity; most do not.
Position Papers
In addition to the current raw intelligence reports and the
"basic intelligence" studies, there are the position papers, gen-
erally called "national estimates." These are prepared by the in-
telligence community on the basis of all the ,intelligence available
on a certain subject along with an interpretation of the "impon-
derables." Here we come to a most vital function of the entire
work of intelligence-how to deal with the mass of information
about future developments so as to make it useful to our policy
makers and planners as they examine the critical problems of
today and tomorrow. Berlin, Cuba, Laos; Communist aims and
objectives; the Soviet military and nuclear programs; the econo-
mies of the U.S.S.R. and Communist China-the list. could be
almost indefinitely extended and is, of course, not exclusively
concerned with Communist bloc matters. Sometimes estimates
must be made on a crash basis. Sometimes, particularly where
long-range estimates are involved, they are made after long weeks
of study.
One of the major reasons why the CIA was organized was to
provide a mechanism for co-ordinating intelligence work so that
the President, the Secretary of State and the Secretary of De-
fense could have before them a single reasoned analysis of the
factors involved in situations affecting our national security.
President Truman, who, in 1947, submitted the legislation pro-
posing its creation, expressed in his memoirs the need for such a
mechanism :
The war taught us this lesson-that we had to collect intelligence in a
manner that would make the information available where it was needed
and when it was wanted, in an intelligent and understandable form. If it
is not intelligent and understandable, it is useless.
He also describes the system by which intelligence was co-ordi-
nated and passed on to policy makers:
Each time the National Security Council is about to consider a certain
policy--let us say a policy having to do with Southeast Asia--it immedi-
ately calls upon the CIA to present an estimate of the effects such a
policy is likely to have. The Director of the CIA sits with the staff of
the National Security Council and continually informs as they go along.
The estimates he submits represent the judgment of the CIA and a cross
section of the judgments of all the advisory councils of the CIA. These
are G-2, A-2, the ONI, the State Department, the FBI, and the Director
of Intelligence of the AEC. The Secretary of State then makes the final
recommendation of policy, and the President makes the final decision.
What President Truman refers to as "all the advisory councils
of the CIA" was established in 1950 as the Intelligence Advisory
Co
Bo,
ml
abt
Ag,
for
in i
the
tar
frc,
tell
sp(
me
mei
fin:
the
the
in i
size
Inc
Inc
Th(
allc
the
an(
sen
nic:
gra
est:
mal
out
C
it o,
ing
ess.
spit
of
plat
tion
dcp
had
anc]
fort
m cc
bac'.
earl
agrt
tion
secr
ope
imp
nati
silo
cet\
con:
fact
to 1
bass
ran:
sib]
frog
44 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT OF INTELLIGENCE
Committee, which later beApprtbvddi"rSR4NvaA 1kIO2/06PttPrp to D 4?-b0F6'1R( (f1`oOqs -e drawn as
Board (USIB) and is often referred to as "the intelligence com-
munity." USIB now has an additional member to those listed
above-the head of the newly created Defense Intelligence
Agency, which co-ordinates the work of army, navy and air
force intelligence and is playing an increasingly important role
in the intelligence community. So too is the intelligence unit of
the State Department, whose head ranks as an assistant secre-
tary of state. The USIB meets regularly every week and more
frequently during crises or whenever any vital new, item of in-
telligence is received. The Director of Central Intelligence is re-
sponsible for the estimates arrived at by the board, but if any
member dissents and desires his dissent to be recorded, a state-
ment of his views is included as a footnote to the estimate that is
finally presented to the President and interested members of
the National Security Council.
To facilitate its work in making estimates, the CIA has set up
the Board of National Estimates, on which sits a group of experts
in intelligence, both civilian and military. The board has no fixed
size or term of office but generally comprises about a dozen
members. It is an integral and vital part of the agency, and its
members are officials of the agency serving on a full-time basis.
The military members are eminent retired officers who owe their
allegiance to CIA and not to a particular military service. It is
the duty of the board to prepare initial drafts of most estimates
and to co-ordinate these drafts, at the working level, with repre-
sentatives from the USIB membership. To deal with highly tech-
nical subjects, such as Soviet missiles, aircraft or nuclear pro-
grams, competent technical subcommittees of USIB have been
established to work with the Board of National Estimates in
making early drafts of estimates. And, in certain cases, experts
outside of government may be consulted.
Bulganin's Missile Threat
Obviously, the procedure of making an initial draft, passing
it on to the USIB, formulating the report along with'any dissent-
ing opinions, and finally submitting it, is a time-consuming proc-
ess. There are times when "crash" estimates are needed on the
spur of the moment. One of these occasions was the Suez crisis
of November 1956. I had left Washington to go to my voting
place in New York state when I was intercepted early on elec-
tion eve by a telephone message from General Charles P. Cabell,
deputy director of the CIA. He read to me a Soviet note that
had just come over the wires. Bulganin was threatening London
and Paris with missile attacks unless the British and French
forces withdrew from Egypt. I asked General Cabell to call a
meeting of the intelligence community and immediately flew
back to Washington. The USIB met throughout the night, and
early on election morning I took to President Eisenhower our
agreed estimate of Soviet intentions and probable courses of ac-
tion in this crisis.
The contents of this and other estimates are generally kept
secret. However, the fact that this mechanism exists and can
operate quickly should be a matter of public knowledge. It is an
important cog in our national security machinery.
When, on October 22, 1962, President Kennedy addressed the
nation on the secret Soviet build-up of intermediate-range mis-
siles in Cuba, the intelligence community had already been re-
ceiving reports from agents and refugees indicating mysterious
construction of some sort of bases in Cuba. It was a well-known
fact that for some time past, Castro-or the Soviets purporting
to be acting for Castro-had been installing a whole series of
bases for ground-to-air missiles. These, however, were of short
range and their major purpose apparently was to deal with pos-
sible intruding aircraft. Since the reports received came largely
from persons who had little technical knowledge of missile de-
whether something more sinister was involved.
The evidence that had been accumulated was sufficient, how-
ever, to alert the intelligence community to the need for a more
scientific and precise analysis of what was going on. Reconnais-
sance flights were resumed and the concrete evidence obtained
on which the President based his report to the nation and his
action. This required, of course, not only the most careful in-
telligence analysis but immediate intelligence judgments. As the
President stated, the air reconnaissance established beyond a
doubt that more than antiaircraft installations were being con-
structed on Cuban soil. This was a case, incidentally, in which
it was obviously necessary to give publicity to intelligence con-
clusions. Khrushchev's subsequent statements and actions testi-
fied to their accuracy.
A Sense of Urgency
Most of the estimating can be done on a more ordered basis
than in such situations, although today there is a sense of
urgency in the whole field of intelligence. Some estimates are
requested by senior policy officers of government to guide them
in dealing with particular problems before them or to get an
idea of how others may react to a particular line of action we
may be considering. Others are prepared on a regularly scheduled
basis, as, for example, the periodic reports on Soviet military
and technical preparations. Before some estimates are pre-
pared, a hurry-up call is sent to those who collect the intelli-
gence to try to fill certain gaps in the information required for a
complete analysis of a particular problem. Such gaps might be
in the military or economic information available, or in our
knowledge of the intentions of a particular government at a
particular time.
Few fields have proved more difficult of analysis than that of
certain Soviet weapons systems. Here one has to deal with Soviet
capabilities to produce a given system, the role assigned to the
system by the military and its true priority in the whole mili-
tary field. It is always difficult to predict how much emphasis
will be given to any particular system until the research and
development stage has been completed, the tests of effectiveness
have been carried out and the factories have been given the
order to proceed with actual production. While a Soviet system
is still in its early stages, our estimates will stress capabilities
and probable intentions; as hard facts become available, it is
possible to give an estimate of the actual programming of the
system.
In 1954, for example, there was evidence that the Soviet Union
was producing long-range intercontinental heavy bombers
comparable to our B-52s. At first, every indication pointed to
the conclusion that the Russians were adopting this weapon as
a major element of their offensive strength and planned to pro-
duce heavy bombers as fast as their economy and technology
permitted. Certain estimates of the build-up of this bomber force
over the next few years were called for by the Defense Depart-
ment and were supplied by the intelligence community. These
were based on knowledge of the Soviet aircraft manufactur-
ing industry and the types of aircraft under construction, and
included projections concerning the future rate of build-up on the
basis of existing production rates and expected expansion of in-
dustrial capacity. There was hard evidence of Soviet capability to
produce bombers at a certain rate if they so desired. At the time
of the estimate, the available evidence indicated that they did
so desire, and intended to translate this capability into an ac-
tual program. All this led to speculation in this country as to a
"bomber gap."
Naturally, however, intelligence kept a close watch on events.
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 45
THE CRAFT OF INTELLIGENCE
Production did n~RPFOaYeApFd4S1' Bed ~s 0 6/18 :CIA-RD ~84-0161 R000100170005-7
dence accumulated that th evi- say to he mte tgence officers: If you won't give us some esti-
e per ormance of the heavy bomber
was less than satisfactory. At some point, probably about 1957,
the Soviet leaders apparently decided to limit heavy bomber
production drastically. The bomber gap never materialized. This
became quite understandable, as evidence of progress in the
Russian intercontinental missile program was then appearing
and beginning to cause concern. Thus, while previous estimates
of capability in bomber production remained valid, policy changes
had necessitated a new estimate as to future developments in
this particular system.
Intentions can be modified or even reversed, and intelligence
estimates dealing d'ith them can never be satisfactory. Witness
how, just recently, our own intentions concerning the Skybolt
missile have changed and how this must affect the calculations of
Soviet intelligence.
The Soviet missile program, like that of the heavy bomber,
had various vicissitudes. The Soviets saw early, probably earlier
than we did, the significance of the missile as the weapon of the
future and the potential psychological impact of space achieve-
ments. They saw this even before it was clear that a nuclear
warhead could be so reduced in weight and size as to be deliver-
able over great distances by the big boosters which they cor-
rectly judged to be within the range of possibility. Given their
geographical situation-their strategic requirements differ from
ours-they soon realized that even a short- or medium-range
missile would have great value in their program to dominate
Europe.
Don't Underrate Soviets
The origins of the program go back to the end of World War II,
when the Soviet Union, having carefully followed the progress
made by the Germans with their V-1 and V-2 missiles, made,
every effort to gather together as much of the German develop-
mental hardware and as many German rocket experts as they
could get their hands on while they were conquering eastern
Germany. The Soviets also hired a considerable number of Ger-
man experts in addition to those they seized and forcibly de-
ported.
It is a mistake, however, to credit Soviet missile proficiency
today largely to the Germans. The Soviets themselves have a
long history in this field and developed high competence quickly.
They never took the Germans fully into their confidence but
pumped them dry of knowledge, kept them a few years at the
drawing boards and away from the testing areas, and then sent
most of them back home. While these people proved to be a
useful source of intelligence, they had never been brought into
contact with the actual Soviet development and could tell' only
what they had themselves contributed.
The first decade after the end of the war was a period when
we had only a scanty knowledge of Soviet missile progress.
Drawing boards are silent and short-range missiles make little
commotion. As the techniques of science were put to work and
the U-2 photographs became available after 1956, "hard" intel-
ligence began to flow into the hands of the impatient estimators.
Their impatience was understandable, for great pressure had
been put on them by those in the Department of Defense con-
cerned with our own missile programs as well as with our own
missile defenses. Planning in such a field takes years, and the
Defense Department felt that this was a case in which it was
justified in asking the intelligence community to project several
years in advance the probable attainments of the Soviet program.
As in the earlier case of Soviet bomber production, the intelli-
gence community, I am safe in saying, would be quite content if
it were not called upon for such crystal-hall gazing. But our
military planning requires estimates of this nature. The planners
mate as to the future, we will have to prepare it ourselves-but
you intelligence officers should really be in a better position to
make the predictions than we are. For the intelligence service to
deny this would be tantamount to saying it was not up to its job.
Thus, early figures of Soviet missile production had to be de-
veloped on the basis of estimated production and development
capabilities over a period in the future. Once again one had to
decide bow the Soviet Union would allocate its total military ef-
fort. How much of it would go into missiles? How much into
developing the nuclear potential? How much into the heavy
bomber, as well as the fighter planes and ground-to-air defense
to meet hostile bombers? How much into submarines? And, in
general, now much into elements of attack and how
those of defense?
It was due to this measure of incertitude during the late 1950s
that the national debate over the so-called missile gap developed.
Then, on the basis of certain proved capabilities of the Russians
and of estimates of their intentions and over-all strategy, con-
clusions were reached as to the numbers of missiles and nuclear
warheads that would be available and on launchers several years
in the future.
There is no doubt that tests of Soviet missiles in 1957 and
afterward showed a high competence in the.ICBM field. Soviet
shots of seven to eight thousand miles into the far Pacific were
well advertised and not ignored by our intelligence. Their test-
ing in the intermediate fields must also have been gratifying
to them. But would they use their bulky and somewhat awk-
ward "first generation" ICBM-effective though it was-as the
missile to deploy, or would they wait for a second or third
generation? Were they in such a hurry to capitalize on a mo-
ment of possible missile superiority that they would sacrifice
this to a more orderly program? The answer, in retrospect,
seems to be in the negative, indicating that they chose the more
orderly program. As soon as this evidence appeared, the ICBM
estimates-as in the case of the bombers-were quickly revised
downward.
Intelligence Good on Cuba
Today, after the Cuba incident, one may well ask whether pres-
ent Soviet actions do not indicate a change of attitude toward
their missile program. They were willing to take considerable
risks to get some IRBM and MRBM bases in Cuba to create the
equivalent, as a threat to us, of a considerable additional num-
ber of ICBM bases in the heartland of Russia. Now they seem
to be more in a hurry.
In any event, the intelligence collected on Soviet missiles was
excellent as to the nature and quality of the potential threat.
Our intelligence was also both good and timely as to Soviet pro-
duction of high-thrust engines and the work on Sputnik. And all
of this intelligence spurred us to press forward with our own
missile and space programs.
When one turns from the military to the political field, the
problems for the estimators are often even more complex. Analy-
sis of human behaviour and anticipation of human reactions in a
given situation can' never be assigned to a computer, and some-
times they baffle the most clever analyst.
More than a decade ago, in the autumn of 1950, this country
had to face in North Korea the difficult decision of whether or
not to push forward to the Yalu River and reunite Korea. If we
did so, what would be the reaction of the Chinese Communists?
Would they answer with a direct attack, or would they stay
quiescent under certain conditions-if, for example, Korean
rather than U.S. and UN troops formed the bulk of the advance
or if we did not disturb the Chinese sources of electric power
in North Korea?
46 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
THE CRAFT OF INTELLIGENCE
At that time, we had goo ,i A pb~ el~r o 4/O sadiAul bPWQw 61 ~*0~t004 t a sponta-
strength of the Chinese Com cost `fo`rces on t e far s~ e of the neous uprising of the unarmed population of Cuba would ensue.
Yalu. We had to guess, or to put it better, estimate the intentions
of Moscow and Peking. We were not in on their secret councils
and decisions. In such cases it is arrogant, as well as dangerous,
for the intelligence officer to venture a firm opinion in the ab-
sence of telltale information on the positioning and moving of
troops, the bringing up of strategic supplies and the like. I can
speak with detachment about the 1950 estimates, for these were
made just before I joined the CIA. The conclusions of the esti-
mators were that it was a toss-up, but they leaned to the side that
under certain circumstances the Chinese would probably not
intervene. In fact, we just did not know what the Chinese Com-
munists would do, and we did not know how far the Soviet Union
would press them or agree to support them if they moved.
One cannot assume that a Communist leader will act or react
as we would. For example, normally one would not have "esti-
mated" that Khrushchev should choose the opening day of the
Unaligned Nations Conference at Belgrade in September of 1961
to announce to the world, without forewarning, that he was break-
ing the gentleman's agreement on suspension of nuclear testing.
Yet, this is exactly what he did. In Cuba in October of 1962
Khrushchev presumably "estimated" that he could sneak his
missiles into the island, plant them and camouflage them and
then, at a time of his own choosing, face the United States with
a fait accompli. Certainly here he misestimated, just as some
on our side had misestimated, that, because of the risks involved
and the difficulty of maintaining secrecy, Khrushchev would not
attempt to place offensive weapons in Cuba, right under our nose.
Whenever a dramatic event occurs in the foreign relations field
-an event for which the public may not have been prepared-
one can usually count on the cry going up, "Intelligence has
tailed again." As we have seen, the charge may at times be cor-
rect. But there are also many occasions when an event has been
foreseen and correctly estimated but intelligence has been un-
able to advertise its success, at least at the time.
Intelligence Knew of Suez
This was true of the Suez invasion of 1956. Here, intelligence
was well alerted as to both the possibility and later the probability
of the actions taken by Israel and then by Britain and France.
The public received the impression that there had been an in-
telligence failure; statements were issued by U.S. officials to
the effect that the country had not been given advance warning
of the action. Our officials, of course, intended to imply only
that the British and French and Israelis had failed to tell us what
they were doing. In fact, United States intelligence had kept the
government informed without, as usual, advertising its achieve-
ment.
On other occasions the press and the public have been mistaken
about the actual role of intelligence in certain situations. Having
reached their conclusions about what the intelligence estimate
must have been in the light of the official action taken, they have
proceeded to attack the intelligence services even though, in fact,
there had been no such estimate made. Take, for example, Bay of
Pigs episode in 1961. Much of the American press assumed at the
time that this action was predicated on a mistaken intelligence es-
timate to the effect that a landing would touch off a widespread
and successful popular revolt in Cuba. Those who had worked, as
I had, with the anti-Hitler underground behind the Nazi lines in
France and Italy and in Germany itself during World War II, and
those who watched the tragedy of the Hungarian patriots in 1956,
would have realized that spontaneous revolutions by unarmed
people in this modern age are ineffective and often disastrous.
While I have never discussed any details of the 1961 Cuban op-
eration and do not propose to do so here, I repeat now what I
Clearly, our intelligence estimates must take into account not
only the natural and the usual but also the unusual, the brutal,
the unexpected. It is no longer wise to estimate actions and re-
actions on the basis of what we ourselves might do if we were in
Khrushchev's shoes because, as we have seen at the United Na-
tions, he takes off his shoes. Very often Russian policy moves
seem almost to be based on the ideas of Ivan Petrovich Pavlov,
the noted Russian physiologist who died in 1936. His experi-
ments included inducing certain reflexes in animals and then, by
abruptly changing the treatment, reducing the animals to a state
of confusion. The Pavlovian touch can he seen in Khrushchev's
abrupt changes in attitude and action, intended to give rise to
confusion and dismay in his adversary. The scuttling of the
Paris Summit meeting in 1960, the surprise resumption of nuclear
testing just at the time the nonaligned nations were assembling
in Belgrade in 1961, even the famous shoe-thumping episode,
were staged so that their shock effect would help produce certain
results he desired. He probably hoped for the same shock effects
from the missiles in Cuba. Estimates on how Khrushchev will act
in a given situation should take this characteristic into account.
Of course, the trouble with estimating is that one rarely has
knowledge of all the factors hearing on any given situation. No
one can clearly foresee the future or predict with assurance the
workings of the minds of the leaders whose decisions make his-
tory. As a matter of fact, if we were to set out to estimate what
our own policy decisions would be a few years hence, we would
soon be lost in a forest of uncertainty. And yet our estimators are
called upon to decide what others will do. Unfortunately the in-
telligence process of making estimates will never become an exact
science.
But at least progress has been made in assembling the ele-
ments of a given situation in an orderly manner so as to assist
our planners and policy makers. It is possible, often, to indicate
a range of probabilities or possibilities and to isolate those factors
which would influence Kremlin or Peking decisions. In any event,
we have come a long way since Pearl Harbor and the somewhat
haphazard system of intelligence analysis which prevailed at that
time.
VIII. INTELLIGENCE IN OUR FREE SOCIETY
From time to time the charge is made that an intelligence or
security service is a potential threat to our freedoms and that
there is something sinister about the secrecy surrounding its
operations that is inconsistent with the workings of a free society.
There has been some sensational writing about the CIA's sup-
posedly making national policy on its own, and playing fast and
loose with its secret funds. The Soviet Union and its Commu-
nist allies have persistently mounted the most vicious attacks on
U.S. intelligence by means of press, radio and other means of
communication. Many of these attacks occur in non-Communist
media and are not immediately recognizable as of Communist
origin. Innocently or otherwise, many writers, especially on the
left, have taken up the refrain and, at times, more conservative
publicists have been misled into repeating a good deal of Commu-
nist propaganda on the subject. Of course, I have taken Commu-
nist attacks as a compliment and a measure of our adversaries'
fear of the CIA.
I have already pointed out that in both tsarist and Soviet
Russia, in Germany, in Japan under the war lords and in certain
other countries, security services that exercised some intelligence
functions were used to help a tyrant or a totalitarian society to
suppress freedoms at home and to carry out terrorist operations
abroad. This fact has added to the confusion of many about the
Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7 47
THE CRAFT OF INTELLIGENCE
exact function of an intellOPPrgM9keFQ,iiR9 ,2 1306/c181.tieCIi4-RDPB1440Q164RQOO1OD17QOO ira1 Roscoe
rather unexpected quarter, comes a comment by Supreme Court
Justice William O. Douglas. He suggests that "the press does not
cover the operations of the Pentagon adequately, nor can it
report truthfully on the C.I.A.," which, he alleges, generates
"policies," the dangers of which "are not known even to many
of the informed press." (Freedom of the Mind, American Library
Association, Chicago, Ill. [1962], p. 8.) It is understandable,
of course, that a relatively new organization in our government's
structure, like the CIA, should-despite its desire for anonymity
--receive more than its share of publicity and be subject to ques-
tioning and to attack.
Harry Howe Ransom, who has written a study of our intelli-
gence service in relation to the nation's security, puts the issue
this way :
CIA is the indispensable gatherer and evaluator of world-wide facts for
the National Security Council. Yet to most persons CIA remains a mys-
terious, super-secret, shadow agency of government. Its invisible role, its
power and influence, and the secrecy enshrouding its structure and op-
erations, raise important questions regarding its place in the democratic
process. One such question is: How shall a democracy insure that its secret
intelligence apparatus becomes neither a vehicle for conspiracy nor a sup-
pressor of the traditional liberties of democratic self-government? (Central
Intelligence and National Security, Harvard University Press, Cambridge,
Mass. [1958], p. vi.)
I propose to answer this and other questions and criticisms. In
fact, in writing this article, I have been motivated by the desire
to put intelligence in our free society in its proper perspective.
As already indicated, CIA is a publicly recognized institution
of government. Its duties, its place in our governmental structure
and the controls surrounding it are set forth partly by statute and
partly under National Security Council directive. It was set up
under an act of Congress on the recommendation of the President
after exhaustive congressional hearings and with practically unan-
imous bipartisan support. The law specifically provides "that the
Agency shall have no police, subpoena, law enforcement powers
or internal security functions." It does not make policy, and all
its actions must be consistent with the government's policy and
approved by those responsible for that policy. Like the State
and Defense departments, it has certain publicly assigned func-
tions. Also like these departments, it must keep much of its work
secret.
Henry Hillenkoetter, who had distinguished service in the navy
and in naval intelligence; (2) General Walter Bedell Smith, who,
in addition to an outstanding military career, had been for almost
three years U.S. Ambassador to the Soviet Union and
an undersecretary of state; (3) myself, about whom any com-
ment here would be out of place, except for the mention of a long
period of government service and many years in intelligence
work; (4) John A. McCone, the present director, who has per-
formed outstanding service in both the Truman and the Eisen-
hower administrations in many important government posts-as
a member of the President's Air Policy Commission, as a deputy
to the Secretary of Defense, as undersecretary of the air force,
and then as chairman of the United States Atomic Energy Com-
mission.
The law provides that a civilian must be either in the posi-
tion of director or deputy director. While, theoretically, it is pos-
sible to have both of these jobs in civilian hands, military men
cannot fill both positions as the law now stands. The practice over
the past decade has been to split them between a military man
and a civilian. The last two directors, both civilians, have had
highly experienced military men for deputy directors-General
Charles Pearre Cabell during my tenure, and now Lieutenant
General Marshall S. Carter under John McCone.
I have gone into these details about the backgrounds of those
in positions of leadership in the CIA because one has a right to
expect from such men the highest degree of integrity and re-
sponsibility.
Relations with the President
From my own experience in the agency, under three presidents,
I can say with certainty that the chief executive takes a deep
and continuing interest in the operations of the agency. During
8 of my 11 years as deputy director and director of the CIA, I
served under President Eisenhower. I had many talks with him
about the day-to-day workings of the agency, particularly con-
cerning the handling of its funds. I recall his telling me that we
should set up procedures in the agency for the internal account-
ing of unvouchered funds, i.e., funds appropriated by Congress
and expendable on the signature of the director, which would be
even more searching, if that were possible, than those of the Gen-
eral Accounting Office. While, obviously, many expenditures must
be kept secret as far as the public is concerned, the CIA always
stands ready to account to the President, to the CIA appropria-
tions subcommittees of Congress and to the Bureau of the Budget
for every penny expended, whatever its purpose.
During the earlier years of the agency there was a series of
special investigations of its activities. I myself was the head
of a committee of three that in 1949 reported to President
Truman on CIA operations. There were also studies made un-
der the auspices of two Hoover commissions, one in 1949 and
one in 1955. These dealt with the organization of the execu-
tive branch of government and included studies on our intel-
ligence structure. The latter survey, conducted in 1955 during
my directorship, included a report prepared by a task force
under the leadership of General Mark W. Clark; at about
the same time, a special survey of certain of the more secret
operations of the agency was prepared for President Eisenhower
by a task force under General James Doolittle. It is interesting
to note that General Clark's task force, expressing concern over
the dearth of intelligence data from behind the Iron Curtain,
called for "aggressive leadership, boldness and persistence." We
were urged to do more, not less-the U-2 was already on the
drawing boards and was to fly within the year.
Following the report of the 1955 Hoover Commission, I dis-
cussed with President Eisenhower one of the commission's rec-
It Can't Happen Here
This country certainly wants no part of an organization like
the Okhrana of the tsars or the N.K.V.D. of Stalin or the
K.G.B. of Khrushchev. We have been nauseated by what we have
read of Himmler's Sicherheitsdienst and by the military secret
service of Japan in pre-World War II days. The very nature of
our government and of our society under the Constitution and the
Bill of Rights would outlaw such organizations- as these. They
could never take root in this country. But even if these factors
were not enough, there is a whole group of safeguards, both legal
and practical, surrounding the work of the CIA.
The Central Intelligence Agency is placed directly under the
National Security Council, which, in effect, means that it is under
the President. The chief executive himself, therefore, has the
responsibility for overseeing the operations of the CIA. The Na-
tional Security Council directives are issued under the authority
of the National Security act of 1947, which provides that, in
addition to the duties and functions specifically assigned under
law, the CIA is further empowered to
perform for the benefit of the existing intelligence agencies such additional
services of common concern as the National Security Council determines
can be more efficiently accomplished centrally .'. . . perform such other
functions and duties relating to intelligence affecting the national security
as the National Security Council may from time to time direct.
It is the President who selects and the Senate which confirms
the director and the deputy director of the agency, and this
choice is no routine affair. In the 15 years since the agency was
om
pre
the
Pr(
tio'
eigi
tin.
Tet
aft,
mu'
Ki l
of
coil
me:
1
coil
also
In I
Ma_
con-:
Co,:
a le
the
sent
of ti
bete
bod,
A
the
field
wert
vou:
one
was
Sen:
Cha
ator
Con
vote
ingl
saic
sea
the
SWE
ha,,
sup
ley.
Set
Sy
age
vat
th::
pc
tin
1
W,i.
Up
w'],
aft
C,I
Ht,
48 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7
lg
re
:!5
'y
n
in
d
?al
nt
ommendations t
o1 uve l*FWr]ReflidalW6hb(3r2/X67'?'8e?tCIARP 8410014 90061MCk71 $$0r a certain amount of
presidential watchdog board staffed by civilians. This would take
the place of ad hoc investigation committees from time to time.
President Eisenhower agreed completely with this recommenda-
tion and appointed a "President's Board of Consultants on For-
eign Intelligence Activities," the chairman of which for some
time was the distinguished head of the Massachusetts Institute of
Technology, James R. Killian, Jr. President Kennedy, shortly
after he took office, reconstituted this committee with a slightly
modified membership, but again under the chairmanship of Dr.
Killian. The files, the records, the activities and the expenditures
of the Central Intelligence Agency are open to this presidential
committee, which meets several times a year and whose recom-
mendations and advice I found of inestimable value in my work.
A "Watchdog" Considered
The other recommendation of the Hoover Commission in this
connection-that a congressional watchdog committee should
also be considered-has had a somewhat more stormy history.
In 1953, even before the Hoover recommendations, Senator Mike
Mansfield had introduced a bill to establish a joint congressional
committee for the CIA, somewhat along the lines of the joint
Committee on Atomic Energy. On August 25, 1953, he wrote me
a letter to inquire about CIA's relations with Congress and asked
the agency's views on the resolution he had submitted. In my ab-
sence abroad, General Cabello my deputy, replied that "the ties
of the CIA with the Congress are stronger than those which exist
between any other nation's intelligence service and its legislative
body."
A few years later this issue came to a vote in the Senate in
the form of a concurrent resolution sponsored by Senator Mans-
field, It had considerable support, as 35 senators from both parties
were co-sponsors and the resolution had been reported out fa-
vourably by the Senate Rules Committee in February of 1956, but
one vote of strong dissent came from Senator Carl Hayden, who
was also the chairman of the Senate Appropriations Committee.
Senator Hayden was supported by Senator Richard Russell,
Chairman of the Senate Armed Services Committee, and by Sen-
ator Leverett Saltonstall, the senior Republican member of that
Committee. In April the Senate, after a most interesting debate,
voted against the watchdog committee resolution by a surpris-
ingly large majority. In opposing the resolution, Senator Russell
said: "Although we have asked him [Allen W. Dulles] very
searching questions about some activities which it almost chills
the marrow of a man to hear about, he has never failed to an-
swer us forthrightly and frankly in response to any questions we
have asked him." The issue was decided when this testimony was
supported by former Vice-President (then Senator) Alben Bark-
ley, who spoke from his experience as a member of the National
Security Council. Be was joined in opposition by Senator Stuart
Symington, who had intimate knowledge of the workings of the
agency from his days as Secretary of the Air Force. On the final
vote of 59 to 27, 10 of the measure's original co-sponsors reversed
their positions and joined with the majority to defeat the pro-
posal. They had heard enough to persuade them that, for the
time being at least, the measure was not needed.
Congress Holds Purse Strings
Possibly the strongest argument against a special congressional
watchdog committee is the fact that procedures have been set
up-and have been functioning well for almost a decade-
whereby Congress exercises its legislative control over what is,
after all, very distinctly a function of the executive branch.
Congress, of course, holds the purse strings and, through the
House and Senate Armed Services committees, also oversees
legislative and other requirements of the agency. Appropria-
control over the scope of operations-how many people CIA can
employ; how much it can do; and, to some extent, even what it
can do. Obviously, the entire CIA budget cannot be thrown open
to general knowledge either in Congress or in the executive
branch. But any general public impression that the senators and
representatives can exert no power over the CIA is quite mis-
taken.
The procedures for dealing with the CIA budget are worked out
by the Congress itself. Even before a congressional subcommittee
sees the CIA budget, moreover, there is a review by the Bureau
of the Budget, which must approve the amount set aside for it.
This, of course, includes presidential approval. Then the budget
is considered by a subcommittee of the Appropriations Commit-
tee of the House, as is the case with other executive departments
and agencies, The only difference is that the amount of the CIA
budget is not publicly disclosed outside of the subcommittee hear-
ings.
This subcommittee includes three members of the majority and
two members of the minority from the Appropriations Commit-
tee. The present chairman of the committee, Clarence Cannon,
is also chairman of the CIA appropriations subcommittee. Until
his recent retirement, the senior minority member of the sub-
committee was John Taber. Two men with longer experience in
congressional procedure and two more careful watchdogs of the
public treasury could hardly be found. This subcommittee is en-4
titled to see everything it wishes to see with regard to the CIA
budget and to have as much explanation of expenditures, past and
present, as it desires.
All this was clearly brought out in a dramatic statement that
Mr. Cannon made on the floor of the House on May 10, 1960,
just after the failure of the U-2 flight of Francis Gary Powers:
The plane was on an espionage mission authorized and supported by money
provided under an appropriation recommended by the House Committee
on Appropriations and passed by the Congress.
He then referred to the fact that the appropriation and the ac-
tivity had also been approved and recommended by the Bureau
of the Budget and, like all such expenditures and operations, was
under the aegis of the chief executive. He discussed the authority
of the subcommittee of the Appropriations Committee to recom-
mend an appropriation for such purposes and also the fact that
these activities had not been divulged to the House and to the
country. He recalled the circumstances during World War II
when billions of dollars were appropriated, through the Manhat-
tan project, for the atomic bomb under the same general safe-
guards as in the case of the U-2, i.e., on the authority of a sub-
committee of the Appropriations Committee. He referred to the
widespread espionage by the Soviet Union, to the activities of
their spies in stealing the secret of the atomic bomb. Alluding to
the surprise attack by the Communists in Korea in 1950, he jus-
tified the U-2 operation in these words:
Each year we have admonished ... the CIA that it must meet situations
of this character with effective measures. We told them "This must not
happen again and it is up to you to see that it does not happen again"
and the plan that they were following when this plane was taken,
is their answer to that demand.
He took occasion to commend the CIA for its action in sending
reconnaissance planes over the Soviet Union for the four years
preceding Powers' capture and concluded:
We have here demonstrated conclusively that free men, confronted by
the most ruthless and criminal despotism, can under the Constitution of
the United States protect this Nation and preserve world civilization.
I cite this merely to show the extent to which even the most
secret of the CIA's intelligence operations have, under appropri-
ate safeguards, been laid before the representatives of the people
in Congress.
In addition to the scrutiny of CIA activities by the House
Approved For Release 2002/06/18 : CIA-RDP84-00161 ROOO1OO17OOO5-7
THE CRAFT OF INTELLIGENCE
Appropriations CommApprtQMedsFOI5 ReWaenMZ(10 le18 : C 4A. 890161RQQPAQAMQQ5,77, legislative and
house Armed Services Committee. The chairman of this sub-
committee is Carl Vinson, who for years has been head of the
Armed Services Committee itself. To this body the agency reports
its current operations to the extent and in whatever detail the
committee desires; here the interest lies not so much with the
financial aspects of operations as with all the other elements of
our work. In the Senate, there are comparable subcommittees of
the Appropriations and Armed Services Committees.
Fifteen years ago, when the legislation to set up a central in-
telligence agency was being considered, the congressional com-
mittees working on the matter sought my views. In addition to
testifying, I submitted a memorandum, published in the record
of the proceedings, in which I proposed that a special advisory
body for the new agency should be constituted to include repre-
sentatives of the President, the Secretary of State and the Secre-
tary of Defense. This group should, I proposed, "assume the
responsibility for advising and counseling the Director of Intelli-
gence and assure the proper liaison between the Agency and
these two Departments and the Executive." This procedure has
been followed.
Open to Public Criticism
Of course, the public and the press remain free to criticize
the actions taken by intelligence, including those which are ex-
posed by mishap or indiscretion. This holds just as true for
intelligence activities as for any government operations, except
where the national security is involved. When an intelligence
operation goes wrong and publicity results, the intelligence
agency and particularly its director must stand ready to assume
responsibility wherever that is possible. There have been times,
as in the cases of the U-2 descent on Soviet territory and
the Cuban affair of April 1961, where the chief executive has
publicly assumed responsibility. Here, if the CIA had attempted
to take the position that it had planned and carried out the ac-
tion unguided and alone it would have been tantamount to admit-
ting that the executive branch of the government was not on the
job. Of course, in intelligence operations, silence is the best policy
where silence is possible. It is not possible when it cannot be
maintained without calling into grave question the vigilance of
the executive.
There are many safeguards prescribed within the agency itself
to protect against its meddling in policy matters. In addition, ,the
established practice is that no one in the agency, from the di-
rector on down, may engage in political activities of any nature,
except to vote. A resignation is immediately accepted-or de-
manded-whenever this rule is violated; any member with po-
litical aspirations is given to understand that re-employment-
in case his plunge into the political arena is unsuccessful-is un-
likely.
other-which surround our intelligence work and help to ensure
that the CIA under our government operates solely within es-
tablished policies.
In the last analysis, however, the most important safeguards
are the kind of leadership the intelligence service has and the
character of the people who work for it. The efficacy of our laws
and regulations depends upon the respect of our citizens for
them, as well as upon the courts which enforce them. The hopes
or fears which our citizens may have with regard to U.S. intelli-
gence and its operations must centre on the integrity of those on
the job-their respect for the democratic processes and their
sense of duty and devotion in carrying out their important and
delicate tasks.
After ten years of service, I can testify that I have never seen
a group of men and women more devoted to the defense of our
country and its way of life than those who are working in the
Central Intelligence Agency. Our people do not go into the in-
telligence service for reasons of financial reward or because the
service can give them, in return for their work, high rank or
public acclaim. Their accomplishments must remain, as President
Kennedy has remarked, largely unsung. They are there because
of the fascination of the work and the belief that through their
service they can personally make a contribution to our nation's
security. Most of the senior officers have had long years of serv-
ice; the new recruits, from whose ranks the agency of the future
will be built, are chosen with utmost care and given thorough
training before they begin work.
No More Controls Needed
I do not believe that there is need for more controls on our
intelligence work. Rather, one should stress the need for all of
us, to be more alert, more aggressively prepared to meets the re-
quirements of this age. It is not by our intelligence organization
that our liberties will be threatened, but rather by our. failure
to understand the nature of the dangers facing us throughout
the world today. If we have more Cubas, if some of the coun-
tries of the non-Communist world that are in jeopardy today
are further weakened, then we could well be isolated and our
liberties, too, could be threatened.
We understand the military threat in the age of nuclear mis-
siles, and we are spending billions-properly so-to counter it.
It is the invisible war that we must meet-Khrushchev's wars
of liberation, the subversive threats orchestrated by the Soviet
Communist party with all its ramifications and fronts, supported
by the vigorous penetration activities of secret agents and
espionage. We cannot afford to put intelligence in chains; we
must continue to support it and enable it to play its protective
and informative role in preparing us to meet the dangers unique
to this era.
50 Approved For Release 2002/06/18 : CIA-RDP84-00161 R000100170005-7