MURPHY COMMISSION DRAFT REPORTS ON INTELLIGENCE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP86B00269R000600030033-6
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
41
Document Creation Date: 
December 14, 2016
Document Release Date: 
November 19, 2002
Sequence Number: 
33
Case Number: 
Publication Date: 
February 24, 1975
Content Type: 
NOTES
File: 
AttachmentSize
PDF icon CIA-RDP86B00269R000600030033-6.pdf1.66 MB
Body: 
E:.ecuEv~ '.: } Approved For Release 2003/02/27: CIA-RDP86B00269R00060 U3 I 24 February 1975 NOTE FOR THE DIRECTOR SUBJECT: Murphy Commission Draft Reports on Intelligence Bill: The Murphy Commission draft reports have been provided to us as well as to Defense and NSA and comments were requested. The question of how DoD proposes to proceed on the reports impacting on their organizations was explored with Tom Latimer, ami l It appears that they do not intend to comment on the drafts, but will await a request to react to a final draft. Fisher Howe assures me the Commission will be requesting comments. The draft reports we have present some significant problems: ? Recommendations on organizational change are not related to how these will improve the responsiveness of intelligence or its performance in support of foreign policy. That needs to be done, and Fisher Howe has accepted the view with appreciation. The report fails to provide an analytic basis to support its recommendations. The report purports to support a stronger DCI; e.g., more national level review of NSA (EXCOM), as one major illustration, but it does not arrive at this conclusion from an accurate factual base. I've advised Howe of these differences, and he agrees the report needs more work. He has asked for factual corrections, and some of these are attached. (They do not address the recommendations or validity thereof.) Attachment: As Stated Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 24 February 1975 SUBJECT : Comments on Murphy Commission Draft Report Introduction - no comments. Section I, p. 8, last two lines of second para. - better words would be: It. . . and as such is responsible for coordinating all foreign intelligence activities of the U. S. Government." Section I, p. 10, lines 8 & 9 under DIA: Director DIA is no longer program manager for GDIP and SRV. ASD(I) now has these responsibilities. Section I, p. 11 - Under NSA. Second para. is incorrect. The Service Cryptologic Agencies (SCAs) are under the operational and technical control of Director, NSA. The SCA Chiefs also perform certain cryptologic related functions for their parent Services, for which they receive direction from the Service Chief. Some of these Service peculiar functions do involve maintenance of field units for direct support to military forces. The relationship between NSA and the SCAs is not ambiguous. Section I, p. 11 - NRO - I believe it is incorrect to describe NRO as a part of "Air Force intelligence. " It is not a part, either organizationally or in management and direction. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Section I, p. 12 - Many possible errors in fact or interpretation under Service Intelligence para. -- I question the source, validity and meaning of the large manpower figures given for Army, Navy, and Air Force intelli- gence. -- At least in the case of the Navy, it is totally incorrect to say that, "ONI employs about people. . . . -- Given the inaccuracy of these figures, it is wrong to say, in the second sentence, that "the three major Service agencies are all (SIC -- each) larger than DIA. (ONI, for example, actually has a world-wide strength of about (people. ) -- It is also incorrect, as noted previously, to include NRO as a part of Air Force intelligence. (Check accuracy of USIB Committee Chart) Section II, p. 1, line 5 - change DCI to CIA. Section III, p. 5, 2nd para. I understand the designation of the DCI as vice Chairman of NSCIC has never been made official. Letter drafted but never signed. Section III, p. 6, first line - strike out "director" Section IV, p. 1, first para. , last line - IRAC is "Resources" not "requirements" Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Section V, p. 1, first para - This paragraph conveys a very wrong impression regarding the contribution of NSA, DIA and NRO (see last sentence) when one reads the second line, "Most of their effort is limited to 'tactical' . . . . " Perhaps use of word "much" in place of "most" would be easiest fix. Section V, p. 2, lines 5-6 and 9-10 convey a misinterpretation. "Tactical" or military force support intelligence elements are organic to forces as a part of the force enabling the Commander to execute his mission. They are not "nice to have" or "more comfortable" to the Commander as their reason for being, as this paragraph portrays. The second para. is a non sequitur. The 15-85 split refers to "National" programs (Prog. III) and does not include "tactical" resources, which may be as much as double. Section V, P. 3 - "Tactical" figures are available, as are all DOD budget items. All one needs to find "tactical" intelligence resource figures is a definition of what to include. Section V, p. 5, NSA para. , lines 4-6: I agree that military coverage dominates the SIGINT business, but I will not agree that this is "at the expense of other national needs" -- a connotation that other needs are not being met because of military dominance. Not True. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Section V, NSA para. , last sentence, again connotes that non-military needs are not being met because of military dominance. This is not true and is the fault of DCI and USIB if it should be true. Section V, second para. , lines 3-5. Comments on further career aspirations hampering objectivity of DIRNSA is factually wrong. Only one DIRNSA has ever been advanced in his Service, and only one other has been advanced outside his Service. All other retired, and one reverted to two-star status. Section V, p. 7, lines 2-4. The only position in NSA traditionally held by a military officer is the Director. All other senior positions do rotate and all have rotated among civilians and military. Section V, p. 7, second para. , line 3 -- word "cryptographic" should be `'cryptologic. " Section V, last para. on p. 7 and first para. on p. 8 are I rossly mis- leading in impressions of relationships between NSA and SCAs plus role of Service Chiefs. This was explained in great detail to Mr. Wm. Harris. I Section V, p. 8, 2nd para. regarding CSS. The CSSis an abortion and was deliberately engineered to be so by ASD(I) and a former Director of NSA. Section V, p. 13 - Remedies recommended to improve the Defense Attache System are of little value. Promotion should not be Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 treated as a reward for one tour of duty, as suggested. The real remedy for DAS problems is to improve the prestige and image of the Military Attache, and restore personnel reductions which have cut the system by more than half. Section VI, p. 6, full para. at mid page: Discussion equates HUMINT to clandestine HUMINT, which is wrong. Result is wrong conclusion and bad recommendation. Section VII - no comments. Section VIII - no comments. CPAD IC cy to: Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030633-6 CENTRALIZATION OF DEFL~'4SE INTELLIGENCE FUNCTIONS After World War I, America's small military intelligence establish- ment was reduced to an ineffective level. Yardley's famous "Black Chamber" code-breaking operation was disbanded with the epitaph, "Gentlemen do not read other gentlemen's mail. " With the advent of World War II, intelligence units had to be hastily assembled to ineet the varying and often parochial needs of field commanders. Quite understand- ably under those cia cumstances, effectiveness, not organizational style or economy, was the overriding concern. It was from these origins, and in the face of Soviet advances in Europe, that an attempt was made to create a capable, centralized intelligence authority after World War II. Yet, even when'-the Central Intelligence Agency was formed in 1947, the military Services managed to retain most of their previously established authority and money under a key provision of the Act which made "departmental intelligence" the responsibility of each Service intelligence agency. In later years when numerous independent committees recommended consolidation of the complex and often overlapping-elements of the Defense intelligence structure to effect economies, reduce risks and achieve quality control over the final product, the military Services fought successful rearguard actions to maintain their independent capability. This was done by maintaining individual Service intelligence organizations which were only partially subordinated to such centralized authorities as the National National Security Act of 1947, 5102 (d)(3), Title 50 U.S.C.A. s403 (d)(3) (1970 ed. ). Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Security Agency (NSA) and the Defense Intelligence Agency (DIA), and also by making tactical intelligence units directly responsible to combat corn- manders in the same manner that rifle companies or artillery batteries are responsible to a field commander. The military rationale for this is understandable: All field commanders seem more comfortable if they have direct control over vital support elements such as intelligence; the trauma of surprise at Pearl Harbor created an aversion to some far-off centralized authority responsible for crucial warning intelligence; and a larger military intelligence effort could be maintained if it were scattered throughout the Defense Department and thus obscured from Congressional budget cutters and civilian resource managers. Every previous report on the organization of the U.S. intelligence community reviewed by this Commission has called attention'to the need for centralized management in the massive DOD intelligence complex. The proportions of the problem cannot be easily exaggerated. Although the DCI is nominally in charge of the entire intelligence budget, more than 85 per cent of the resources are in the Department of Defense and every responsible DOD official questioned by the Commission stated that the Secretary of Defense has final authority over the use of those funds. Althougl the National Security Agency was established in 195Z to be responsible for all U.S. Signals Intelligence (SIGINT), Service Cryptographic Agencies (SCA's) not only continue to exist, but actually perform most of the SIGINT mission. Although the SCA's must accept technical guidance and "national" tasking from NSA, and despite the fact that in 1971 the President ordered Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 t ! pw 4t14@%a ?2OO 1 2 274 86269ROOQ:6O 3Qk$ef}- NSA, the SCA's are responsible in a command sense to their Service chiefs and to the tasking of the local unit commanders to whom they are assigned. Altho the Defense Intelligence Agency was created in 1961 to centralize intelligenc collection and production for DOD, a House investigative team found in 1968 that the size of the Service intelligence organizations had nearly doubled in personnel since DLA was formed. Although the Schlesinger report of 1971 noted the tremendous disarray in Defense intelligence management, and the President's subsequent directive ordered not only consolidation of effort but reduction in the "tactical intelligence" budgets, the Commission was unable to obtain any reliable figure on the exact amount of current resources in the so-called "tactical" categor' Technical Collection. The two primary means of technical collection employed by ourselves and our opponents are satellite photography and communications intercepts. Technical innovation and rapid advancement in these two fields caused intelligence costs to double during the 1960's, and today technical collection accounts for more than half of the entire intelligence community budget. However, the processed intelligence is of tremendous value, because it allows us to determine with great precision the number and type of major missile systems developed by an opponent, the movement of his conventional military forces and the degree to which he is adhering to various arms limitation agreements. Overhead Reconnaissance. The new opportunities for development and exploitation of satellite photography created an intense rivalry between CIA and DOD in the early 1960's. CIA turned out to have the best innovators Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 and Aspypsrtoe d F?r Release 2 atho/ug7 C A their per 002698 OOOo6000overruns were highest), while Defense proved best able to manage ongoing satellite pro- grams. Throughout, the USIB (on which both CIA and DOD are represented) has been effective in establishing satellite requirement lists. The rivalry was finally composed by making CIA and DOD jointly responsib: for satellite research, operations and exploitation. There is, however, a lingering concern that the DCI's final authority-to resolve disputes pro- vides his agency with an unfair advantage, particularly in resource debates where CIA is proposing a competing system. Although the compromise organizational structure seems to be working effectively, the Commission notes that the Schlesinger report did indicate in 1971 that substantial savings might be realized if a single (unspecified) manager were placed in charge of the entire overhead reconnaissance program. If that is the case--and this Commission is not in a position to judge--then consideration should probably be given to transferring complete authority for such programs to DOD, which already has most of the money and operational responsibility. The Commission does hold the strong view that a joint review of satellite photography at the National Photographic Interpretation Center (NPIC) by analysts from CIA and DOD acting independent of one another is a useful redundancy. The source material is so valuable and so massive that a built-in challenge mechanism facilitates total and effective exploitation. National Security Agency. NSA was created by executive order in 1952 as a semiautonomous arm of the Department of Defense responsible for coordinating the Service Cry-ptologic Agencies (SCA's). NSA has two mission; Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 -- The collection of foreign communications for the purpose of deriving intelligence. The resulting Signals Intelligence (SIGINT) is further subdivided into Communications Intelligence (COMINT) and Electronics Intelligence (ELINT), the latter covering electronic emana- tions, such as radar, which do not carry messages, but from which useful data may be obtained. -- The protection of U. S. communications from exploitation by foreign governments. The Communications Security (COMSEC) mission requires NSA to generate and provide security controls for all U.S. codes, promulgate communications standards and procedures, and engage in relevant research and development of prototyp3 hardware. Both the need for COMSEC and the importance of SIGINT as a source of valuable informatior are perhaps best demonstrated by the fact that the USSR maintains the largest SIGINT establishment in the world. The resource committed by the Soviets alone are nearly half again as large as the SIGINT resources of the U.S. and its allies combined. The Soviet's SIGINT threat is obvious when one considers the amount of daily business conducted by Americans by electronic means, much of it over insecure telephones. More- over, Soviet intercept operations are conducted against every facet of American activity, not just military and diplomatic communications, but economic, trade, industrial and research as well. _ The potential value of our own SIGINT operations and the threat posed by our opponents, require that we maintain an extensive, secure, well- managed effort which is responsive to the needs of all parts of our government Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 6 d'`F'`d R ,610AslelM3/02/27: CIA-RDP B00269R000600030033-6 ?F zttonal Security Agency shoulc control all U.S. Signals Intelligence and 11 S a IGINT assets now operated by the Service Cr tolo{=ic A =encies and GIA h , s ould be transferred to NSA. The struggle between NSA and the JCS, through the Service Cryptologic Agencies (SCA's), for control of our SIGIN' assets has been unending. A peculiar division of authority makes this situation almost inevitable. The cryptographic programs of the SCA's are coordinated by NSA, but each SCA receives its own budget to support its own program planned in response to two sets of guidance--one related to support of military field forces and the other designed to satisfy "national" requirements. The Director of NSA (DIRNSA) is responsible for providing technical direction and support to the SCA's and for levying requ remeaits and producing intelligence on-"national" objectives. However, each SCA is commanded by its Service chief at the headquarters level,and in the field is under operational control of the local military corrirriarrder. This situation persists despite the facts that the head of NSA is a Flag Officer who reports directly the the Secretary of Defense, and military men dominate the other senior positions in NSA. The Director of NSA is a three- star Flag Officer who very often moves on to higher command and, therefore is not particularly disposed to alienating his military superiors in the comrnal structure. The SCA problem is complicated by other factors as well. Cryptography began in the military as an adjunct of communications, and therefore, althougL its -product is obviously intelligence, it has no connection with the regular Service intelligence organizations (G-2, ONI, A-2). Moreover, not until Approved For Release 2003/02/27: CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 1970 were the : A's split out of the communiC..Lions command structure, and then only in headquarters and not in the field. Although NSA is supposed to be responsible for both COMINT and ELINT, the Services do not believe NSA is putting enough effort on the latter. As a result, the Services are circumventing a National Security Council Intelligence Directive assigning authority for ELINT to NSA by retitling the activity "Electronic Warfare. It If this most recent Service dilution of NSA authority is permitted to continue, ELINT research and development could easily be justified on a fragmented "Electronic Warfare" basis. In 1971, on the basis of recommendations contained in the Schlesinger report, the President ordered the creation of the Central Security Service (CSS). The idea was to consolidate requirement and analysis assets in NSA _ headquarters which would provide tasking for the newly consolidated collec- tion assets under the CSS. However, instead of abolishing the. SCA's, a new military-style command structure was developed within NSA. The civilian collection stations controlled directly by NSA were excluded from the all military CSS, apparently because mixing civilian and military assets per- forming the same functions would have implicitly demonstrated that the "unique" needs of each Service could be met centrally. Another indication that the intended fusion of separate elements under DIRNSA did not occur is demonstrated by the expansion of his title to Director, NSA, and Chief, CSS. The Commission believes it is now time to effect a genuine consolidation of SIGINT programs under NSA. All other SIGINT programs, including those of CIA and the SCA's, should be abolished and their assets transferred to NSA. However, since in time of war many of these assets would revert Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27: CIA-RDP86B002,6?R0006000ai003.3t-6 to the c ro unit cornrnanc ers, it is reaso 3 e a a mi ed number of cryptologic units should be assigned to field commands by NSA in a train- ing capacity to insure their continued ability to respond to tactical require- ments. If deemed desirable, personnel could be rotated out of NSA into these units on a regular basis to insure adequate trained reserves. Even these training units should be available for national level tasking if they have a capability to contribute to requirements. As a further safeguard, SIGINT liaison officers might be retained at all appropriate levels of the military command structure, and NSA units should participate in military readiness exercises. We believe these safeguards meet the concerns expressed in the 1958 Eaton Report, which recommended centralization of functions under NSA, but only after the Vietnam war and only if JCS wartime needs could be -Security Agency should be established by (a) making CIA and DOD jointly responsible for managing all SIGINT activities, and (b) revising directives to allow either a civilian or military official to hold any senior position in that Agency. The Commission has concluded that the military is dominating the use of the SIGINT collection capability at the expense of other national needs. NSA is the only national cryptologic organization in the West which reports to the Defense chief. Most of the rest are affiliated with foreign affairs organizations, and the Communists have developed redundancy by creating two major organizations--one under military intelligence and. the other more extensive one under civilian intelligence. We are aware in making Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033=6" recommer tion for a more independent I\_ that civilian departments are able to levy requirements on NSA through the USIB mechanism. How- ever, the sheer volume of "requirements" permits wide collector discretion and SIGINT resources are slanted heavily toward military targets. The Commission is inclined to recommend joint CIA-DOD management of NSA in order to protect the military's strong and legitimate interests in SIGINT, while creating a climate in which the new intelligence needs of civilian consumers can be addressed more fully by NSA. Such a manage- ment structure would parallel the joint control which works well in the overhead satellite program. Only the Schlesinger report comment that a single satellite manager would save substantial sums is troublesome, since it might well apply equally-to SIGINT. -However, the military stake in SIGINT is.so high that the Commission rejected an alternate proposal that NSA be made an independent agency-reporting through the Director of Central Intelligence, not the Secretary of Defense. However, the Commission definitely believes that the Director of NSA should no longer automatically be a military man. Practices similar to those which have come to govern the selection of` the leadership of CIA, namely that either the Director or the Deputy should be an active duty or retired military officer, would seem most appropriate to NSA's current and prospective role in the intelligence community. We further suggest that the Director of this critically important, and major Agency, be appointed by the President with the advice and consent of the Senate. All other senior positions in NSA should also be awarded on the basis of knowledge and merit, not simply on the basis of traditional rotation of jobs among the military Servic Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Ilk 1ipfla F*#IRQ11MQk-\2003/02/27: CAA-FQF ? 02 9F&0W0W9g3fT&elligence should be created with the necessary authority to consolidate the military intelligence effort and establish centralized control over int`i gence collection, analysis, production and resource management. The large size of the military intelligence effort, as well as the redundancy built into the system, seems to stem from the shock of Pearl HarLor and the Cold War conviction earlier held by all top governmental leaders (not just military men) that World War III might break out at any moment. Under those psychological conditions, he military approach to intelligence became encyclopedic. The military view that our best defense is to try to know everything about everything is a genuine and deeply felt conviction, and not merely'a drive for big intelligence budgets and empire -building--although that has been an inescapable consequence. This acquisitive attitude is compounded by a strong sense within each Service that its own concerns are of overriding importance. Like most dedicated professionals, each military commander is inclined to believe his own Service is the most important; therefore, his Service is best suited to counter threats against American security; therefore, his Service should collect and analyze as much intelligence within its field of interest as possible. Since his Service's collection requirements are complex and technical, they can best be satisfied by members of his Service. Further. more, each unit commander feels that he can best safeguard his men if he has personal control over much of the intelligence necessary to prevent surprise and conduct operations. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Ixpprovg8 rd?` gigs' ~ 2MOM2I2!7 Id M DR86RG026.$ Q()t4.6QPOgQg3A rvival has disappeared, it has certainly receded--in part because our intelligence is better, both as a result of technological breakthroughs by CIA and NSA and accumulated analytical experience in many parts of government. Thus, the separate Service approach to intelligence, however justified it may have been originally, is now in need of major revision. Centralized Management Authority. Every previous report reviewed by this Commission which considered the Defense intelligence-organization, noted the need to consolidate the fragmented military intelligence effort under a single manager. The Joint Study Group in 19"0 observed that, although the Defense Reorganization Act of 1958 was bringing about a stronger unified command under the JCS, this was not curing the management problems of Defense intelligence. The Joint Study Group proposed revising NSCID's to assign the Secretary of Defense specific responsibility, which might be delegated, to control intelligence resources and reduce waste and duplication.. When the Defense Intelligence Agency (DIA) was established in 1961, it was supposed to have responsibility for the management of all Defense intelligence assets and production, but DIA's later preoccupation with sub- stantive matters led to the atrophy of its assigned management responsibilities. The House Appropriations Committee Investigative Team (HACIT) report in Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 1965 colauncnL,:d on this DIA failing, and the II roehlke report in 1969' suggested remedial action by splitting off the management function and recreating a position similar to the Assistant to the Secretary of Defense (Special Operations) which had existed from 1953 to 1961 when DIA was created. Secretary Froehlke believed that managing Defense intelligence resources and representing Defense on all intelligence community matters could be done on a part-time basis by the Assistant Secretary of Defense/ Administration. The Fitzhugh report of 1970 and the Schlesinger report of 1971 noted that the ASD/A was ineffective in his intelligence role, because he had never been given authority over all Defense intelligence programs and because he was preoccupied with administrative concerns. Both reports recommended a full-time manager of intelligence resources, and the Schlesinger- report provided various options, including a powerful Director of Defense Intelligence (DDI) with command authority over all Defense intelligence activities and resources (including tactical), and alternately an Assistant Secretary of Defense/Intelligence (ASD/I) with staff advisory powers, but no command authority. The ASD/I position was created in 1971, and since that time, separate Service programs for security background investigations and mapping have been consolidated; some small, marginal programs have been abolished; resource trade-offs between the Services have been negotiated, and resource reviews made within DOD and with the DCI have been conducted on a regular basis. However, as a staff advisor, the ASD/I does not have control over the separate Service intelligence organizations. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 The power of the Services in resource matters can be demonstrated in various ways. Although DIAA, was intended to effect economies and centralize functions, the HACIT report indicated that the size of Service intelligence agencies nearly doubled between 1961 and 1968. In the past five years, when total manpower in the entire intelligence community was being reduced by approximately 45 per cent, the cuts in order of magnitude were taken by NSA, CIA, DIA and then the military intelligence Services. Today, manpower in Service intelligence units totals slightly more than twice that in DIA. The Schlesinger report noted that very substantial sums are spent- on "tactical intelligence;" that these funds are controlled by field conuna.nders rather than the Service intelligence chiefs; and that it is therefore difficult to determine the overall total which DOD is spending on intelligence. In his 1971 letter, the President instructed the Director of C antral Intelligence to look to tactical intelligence as an area where management and great savings could be achieved. Yet, the DCI has so far been ineffective in implementing this instruction. The Commission found that different people used different figures for tactical intelligence, depending on the point they are attempting to demonstrate. Even more disturbing is the fact that all figures equal or exceed the total cost of our largest technical collection program. The Commission believes that "tactical intelligence" is an outdated phrase, because intelligence necessary to protect against major future con- flict is most likely to be strategic, rather than tactical, in nature. We further believe that tactical intelligence is relevant to this Commission's inquiry for Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030633-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 severar rea: s. This technique permits th, siphoning off of resources which could be better applied to other DOD programs, possibly including centralized intelligence activities. DOD already has control of 85 per cent of the total U. S. centralized intelligence budget, if tactical intelligence costs are added the military-civilian imbalance in intelligence collection is further magnified. Two major Commission recommendations--increased DCI authority over the intelligence community and centralization of DOD intelligence activities--cannot be made relevant if tactical intelligence activities are excluded. Defense Intelligence Agency. It appears that DIA was created in responst to the Joint Study Group report in 1960, which called for centralization of Defense intelligence functions. DIA was originally expected to control all Defense intelligence assets and products, but, according to the HACIT report in 1968, was unable to implement its charter because the. Services failed to provide DIA with a sufficient number of officers trained in management. The HACIT report also noted that while DIA was originally intended to pro- duce all finished intelligence for all Defense components, much of its basic work was being subcontracted back to the Services; and DIA was tending to become more a manager of production than a producer. The Director of DIA was originally supposed to replace the three Service chiefs as a single Defense representative on the USIB. However, representatives of the Service chiefs soon rejoined USIB as observers "with voice but no vote," and later the ASD/I also became a USIB member under the same ground rules. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Today, the Director of DIA is the principal substantive intelligence advisor to the Secretary of Defense and the senior intelligence staff officer on the JCS. His organization is the primary producer of military intelligencE at headquarters, but not in the unified and specified commands where the individual Service organizations are represented rather than DIA. DIA can review and coordinate Service intelligence activities, but has no command control over their resources. DIA manages only those military intelligence activities, such as the military attache program, which are not assigned to field forces or national programs. Director of Defense Intelligence. Consolidation of Defense intelligence activities has been a dominant recurring theme in reports made by every previous committee that has reviewed the Defense intelligence establishment. This Commission endorses the proposal that a Director of Defense Intelligence (DDI) be established. This idea was delineated by the Blue Ribbon Panel under the chairmanship of Mr. Fitzhugh in 1970. As then described, the DDI would be the Defense representative on USIB; direct and control all Defense intelligence activities not organic to combat forces; review all intelli- gence programs and recommend resource allocations; establish requirements for collection and production; conduct periodic evaluations of Defense intelli- gence processes and products; review and consolidate intelligence R&D; and Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R00060003 03 dcvelop procedures to protect sources and niethc,us. The DDI proposal was resubmitted for Presidential review as the first DOD option of the Schlesinger report of 1971, but apparently not adopted despite its obvious benefits, because the President decided to avoid making changes in the intelligence community which would require Congressional action. The Commission believes this may be a more appropriate time for fundamental reform of the Defense intelligence establishment. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 THE CLANDESTINE SERVICE AND COVERT ACTION The clandestine service of the CIA has primary responsibility for the conduct of those operations popularly associated with "spying"--the recruit- ment and management of agents who (a) provide information on the actions and intentions of others, and/or (b) themselves take actions to promote our polio ies abroad. This is an exacting business requiring a high degree of professionalism, because the rewards for success are often great and the penalties for failure usually include embarrassrr.ent (or worse) for American officials and incarceration (or worse) for the exposed agents. RECOMMENDATION : CIS, should retain responsibility for secret operations abroad. The clandestine collection and covert action functions should remain under the unified control and direction of a single clandestine service chief. - The possibility of splitting off the clandestine service from the intelli- gence analysis and estimating activity of CIA has been reviewed in many previous studies. All have recommended that CIA remain intact, including produced the Bay of Pigs postmortem report which was/under the cloud of President Kennedy's initial public statement that he would like to "scatter CIA to the winds. " This Commission again reviewed this fundamental question. A principal argument for separation is that placing collectors in one organization and analysts in another would assure objectivity in analysis. Yet, within CIA, analysis has always been organizationally compartmented from collection Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 .n. no major consumer is known to have complained about any lack of Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 objectivity in CIA rerrting. A second argument is . at estimators derive most of their information from open sources and can enhance their interpreta- tion of events by establishing close-working associations with other institu- tions such as universities. Such vital associations, which were so strong in the early days of CIA, have tended to atrophy. CIA is trying to cope with this problem by encouraging its analysts to become active in pro- fessional organizations and by declassifying material of interest to the academic community. An argument for retaining covert activities within CIA is that an important part of the raw intelligence used is derive.1 from sensitive sources whose security must be protected most carefully. Another argument is that analysts gain valuable insights through their association with collectors C~ C, and the latter can improve their product if they better understand analysts' needs. Also, the quality of CIA analytical research and estimative personnel is high and the turnover has been low, notwithstanding the association of the clandestine activities with the estimating and analysis functions. A second organizational change sometimes suggested is the creation of two clandestine services, one to collect intelligence and another to engage. in ro=,-ert action operations. The argument made for separation of the two activities is that a covert action organization which also collects intelligence mil *_ tend to bias its intelligence reporting to support and justify its Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 operational programs. Although this is a danger, adequate safeguards can Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 be established with a single organization. The a,,sments against separa- tion are more fundamental. First, a clear line between the two activities cannot be drawn, because a single individual can often collect valuable informa- tion and also take positive actions of benefit to the U. S. It would be wasteful in the extreme to have two clandestine elements of our government competing for his services, or even worse, separately rewarding him for his efforts. Second, many successful covert action operations create sources with the capability and motivation to provide important information to our government. Third, trying to compartment recruitment and. communication lines for the two purposes in a single country would be, and indeed in past experience has proved to be, not only impractical but dangerous. In summary, the c:.rrent organizational arrangement seems to be most appropriate, and thus the disruption of ongoing activities and the added expense of dividing collectors from analysts or intelligence from covert action cannot be justified. Human Intelligence (Hurnint). Although satellite photography can provide previously unavailable and often incontrovertible evidence about past develop- ments and current events, it can tell us nothing about the political dyn3rnics of other societies or the intentions of foreign leaders. Therefore, clandestine agent operations (known in the intelligence trade as Humint) are still crucially important. 1v ar,y people abroad are ready to assist U.S. intelligence. They view cooperation with America as an important way to safeguard their own national .interests, or as a vehicle for bringing improved conditions to their countries, or as the only effective method of protest against the unjustices of a repressive Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Locating a person with access to the data we require who is also willing; to cooperate is no easy task. This is particularly true in the closed Communist societies where individual mobility is severely restricted, secrecy is ingrained, and the leadership carefully compartments information as a control technique. Conversely, in an open society such as ours much important informa- tion is readily available to potential adversaries. By simply subscribing to a weekly aviation magazine, the Soviets can obtain the type of essential technical data we must spend millions of dollars to collect secretly. Given this obvious advantage, as well as their announced interest in reducing tensions, one might well imagine that Soviet intelligence activities must have been reduced. However, the trend is actually in the oppos'ite'direction. According to our best estimates, the USSR annually commits more resources (both people and money) than the U.S. to all phases of intelligence--satellites, communications intercepts and Humint. (NB: FBI figures may be added at this point when available.) Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 REC011MENDATlON The Collection of improved Ilumint Approved For Release 2003/02/27 : CIA-RDP86B00269R - on the intentions of i. reign governments must be ma_..; a matter of priority national concern. The CIA should have exclusive responsibility for clandestine Humint operations abroad during peacetime. The Commission endorses previous President's Foreign Intelligence Advisory Board findings that the DCI should generate the type of national effort which during the past decade caused seemingly impossible obstacles in the field of technical collection to be overcome. While the problem-solving techniques are totally different, the advantages of success are comparable because even a single agent of the caliber of Colonel Penkovsky can greatly reduce the uncertainties and dangers of great power politics. The military has, over the years, been phasing out of Humint, and this is a trend which should now be carried to its logical conclusion. Several past studies have criticized the military for lack of competence in agent operations; the risks involved do not justify further military efforts generally aimed at low level targets; and the Schlesinger report noted that some. economies can be effected by centralizing the function. The only exception should be DCI discretionary authority temporarily to sanction military clandestine collection units providing essential support to operational commands for current operations and contingency planning. All other such units abroad should be disbanded, but especially talented and valuable military personnel might be assigned to CIA stations if deemed advisable by the DCI. No change should be made in established arrange- ?rents which provide that CIA clandestine assets will be subordinated to military commanders in time of war. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 RECC 1%1ENDDATI0N The 111,. iLary attaches stem should be a railed as career sspeciality and be made more res onsive to CIA Humint tasking. The attaches, which are not part of the military covert collection organization, can contribute significantly to.Humint reporting if their work is properly coordinated with the enhanced CIA effort we envisage. The importance of the attache corps should be given greater recognition within the Defense establishment. The quality of attaches should be improv by increasing their promotion possibilities. Fewer senior assignments should be considered retirement posts, and more attaches should have an opportunity to achieve Flag Officer rank. The attache corps should be made more attractive to bright, young officers. The Commission is concerned that the sharp reduction in the number of attaches abroad has been mainly felt among junior officers. Yet, their age is an-important advantage in contacting their counterparts in Communist Embassies and the young foreign military officers sho are most often responsible for sudden political upheavals. Approved For Release 2003/02/27 : CIA-RDP86B00269ROD0600030033-6 25X1 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 CovcAlbp ted For Release t2M O Z,71j: PIAaRDPA?@002q R Qq?g0L(3cQg3?u6blic criticism is not strictly an intelligence activity at all. - Covert action is, however, a traditional function of intelligence organizations, and it is a weapon. maintained in the arsenal of all governments--whether autocratic or democratic--which have important foreign obligations and interests. The term covert action includes those propaganda, political and para- military actions abroad carried out in support of U.S. policy, but in a manner not attributable to the U.S. Government. Authority for covert action is implied under the National Security Act of 1947, which empowers the CIA "to perform such other functions and duties related to intelligence affecting the national security as the National Security Council may from time to time direct." This intentionally vague, but purposeful, language has been elaborated upon by several secret NSC directives. It has been made specific through the use of ct_vert action by every postwar President under constraints requiring CIA to obtain inter- agency policy approval for each operational plan. RECOMMENDATION The U. S. should maintain the capability to carry out covert action. This capability should be used sparingl'y' The Commission has heard testimony against covert action and has discussed the pros and cons of covert action.at length. It is mindful of the arguments against covert action: that such activity is offensive to the moral standards of a great democracy; that covert action runs counter to the respect for international law which the U. S. is attempting to inculcate in others; that the means used are more important than the ends achieved; that CIA activities have done much to undermine the reputation of the U. S. Approved For Release 2003/02/27 : CIA-RDP86B00269R000600030033-6 and its diplomacy around the world; that our intervention abroad has helped to alienate many Americans from their government; that the risk of "leaks" has become greater as the strong public consensus behind policies to "contain Communism" has waned; that CIA has contributed to the eventual creation of undemocratic, dictatorial governments; that covert action, possibly defensible in wartime situations, is inappropriate in peacetime; that the Cold War has been prolonged by covert action. Critics also question the effectiveness of covert action, and it is true that badly mismanaged operations, such