STUDIES IN INTELLIGENCE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010005-7
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
107
Document Creation Date:
December 16, 2016
Document Release Date:
March 28, 2005
Sequence Number:
5
Case Number:
Publication Date:
January 1, 1969
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000300010005-7.pdf | 5.51 MB |
Body:
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
25X1
STUDIES
in
INTELLIGENCE
VOL. 13 NO. 1 WINTER 1969
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
ARCHIVAL RECORD
PLEASE RETURN TO
AGENCY ARCHIVES, BLDG. o
Approved For Release 200"GPIT4-RDT03194?A0010005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
25X1
All opinions expressed in the Studies are those of the
authors. They do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
This material contains information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Secs. 793 and 794, the transmission or revelation of which
to an unauthorized person is prohibited by law.
GROUP 1
Excluded from automatic
downgrading and
declassification
Approved For Release 2005/04/22c 3-RDP78T03194A000300010005-7
Approved For Release 2005/04/gpC --RDP78T03194A000300010005-7
25X1
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may
be written on any theoretical, doctrinal, oper-
ational, or historical aspect of intelligence.
The final responsibility for accepting or
rejecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion of the Board, the article
makes a contribution to the literature of in-
telligence.
DONALD F. CHAMBERLAIN
E. DREXEL GODFREY, JR.
25X1
EDITORIAL BOARD
ABBOT E. SMITH, Chairman
Additional members of the Board are
drawn from other CIA components.
25X1
Approved For Release 2005/04/26.tFkTRDP78T03194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
CONTRIBUTIONS
Contributions to the Studies or communications to the editors may
come from any member of the intelligence community or, upon in-
vitation, from persons outside. Manuscripts should be submitted
directly to the Editor, Studies in Intelligence, Room 7E62, Hq.
I land need not be coordinated or submitted through chan-
nels. They should be typed in duplicate, double-spaced, the original
on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Articles may be
classified through Secret.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office
dissemination center or the responsible Central Reference Service desk,
Editor,
For back issues and on other questions call the Office of the
All copies of each issue beginning Summer 1964 are numbered serially
and subject to recall.
Approved For Release 2005/04 RA-RDP78T03194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
25X1
CONTENTS
Page
The 1968 Studies in I
ntelligence Awards ........
...... faces
1
Policy and Intelligence
: The Arab-Israeli War . J. L
. Freshwater
1
Impact of a crisis. SECRET
The Anatomy of Cou
nterintelligence ...... A. C
. Wasemiller
9
The essentials of
CONFIDENTIAL
The Case of the SS-6
organizing a counterintellig
....................... M
ence service.
. C. Wonus
25
Growing pains in
DCI Hillenkoetter: S
astronautics intelligence. S
oft Sell and Stick .... Arthu
ECRET
r B. Darling
33
Central intelligence becomes an agency, still struggling
to establish its
Spotting Photo Faker
position and function. CON
y .................. Dino
FIDENTIAL
A. Brugioni
57
Brief guide to a c
Michael Collins and
ommon form of deception. C
Bloody Sunday .............
ONFIDENTIAL
...........
69
The war between
OFFICIAL USE
The Old Winsockie S
Martin C. Hartline & M.
the British and Irish intellige
yndrome ............. W.
M. Kaulbach
nce services.
B. Lavender
79
On the differe
nce between cover and
clandestinity.
SECRET
Communication to the Editors. CONFIDENTIAL ............. 83
Intelligence in Recent Public Literature
The Courtney Case. CONFIDENTIAL ...................
Miscellaneous. OFFICIAL USE ........................
87
93
25X1
Approved For Release 2005/04/26E(SA@FRDP78T03194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Next 1 Page(s) In Document Exempt
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000 ff05-7
No Foreign Dissem
Intelligence has an impact
during a major crisis.
POLICY AND INTELLIGENCE:
The Arab-Israeli War
J. L. Freshwater
Among the developments leading up to the outbreak of war be-
tween Israel and its Arab neighbors in June 1967, there were some
in Washington that provide one of those relatively rare instances in
which the visible impact of intelligence on national policy is specific
and clear cut.
A number of circumstances came together to make this possible.
First, the basic question which the policy makers asked-who will
win if the US stays out?-was sharply defined. Second, the duration
of the "crisis," as far as the production of premonitory intelligence
and short-term judgments were concerned, was only some three weeks,
from mid-May to dawn of 5 June. The basic issues thus had no
time to become fogged over. Third, the impact of the intelligence
judgment was the more explosive in that this judgment ran nearly
head-on into the initial impressions of some, at least, of the admin-
istration's top advisers.
This last point, which lends drama to the role of intelligence in
this episode, is not easy to document. At the time, however, it was
nonetheless reasonably clear that in fairly high quarters in Wash-
ington the first reaction to Nasir's opening moves in mid-May-the
mobilization of Egyptian forces and their deployment into Sinai, fol-
lowed by the withdrawal of the UN screening forces there-was to
assume that we were witnessing the unfolding of a calculated Soviet-
Arab plan to eliminate Israel (and ultimately the US) from the area.
Given this assumption, and the strength-at least on paper--of the
Soviet-backed Arab forces, it seemed likely that "little Israel" would
lose the war being prepared against it. Furthermore, given the extent
of the emotional attachment to Israel in this country developed over
twenty years in the form of moral if not political commitments, it
appeared to follow that the US ought to move tangibly and quickly
to Israel's support. Indeed, a number of US actions early in the crisis
appear to have sprung from these assumptions and this logic? Thus,
ApproveeoEor Release 2005/04/28 : CIA-RDP78TO3194A000300010b05-7
MORI/HRP PAGES 1-8
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
SECRET Policy and Intelligence
the way was cleared for an emergency airlift to Israel of spare parts,
ammunition, and, because of the Egyptians' known use of chemical
agents in Yemen, chemical defense equipment.
The Intelligence View
The US intelligence community was virtually unanimous in re-
jecting these assumptions and judgments. Soviet and Arab-Israeli
experts were agreed that Nasir's initial moves must have been con-
ceived out of misinformation about immediate Israeli intentions, and
that this misinformation had reached Nasir because of miscalculation
somewhere in the Soviet apparatus. On the most critical point, it
was nearly unanimously agreed that if war came the Is:raelis would
be able to defeat Nasir and the other Arabs combined, and that
the Soviet military would not physically intervene. In short, the in-
telligence community saw no carefully calculated Arab-Soviet plan.
It saw instead a Soviet blunder being compounded, to Moscow's em-
barrassment, by the responses of Arab leaders ridden with the com-
pulsion to react against what they read as Israeli threats.
These contrasting views of the origin of the crisis and of the
likely outcome of hostilities first collided at the top policy level on
Tuesday, 23 May, the day after the Egyptians announced that the
Gulf of Aqaba was henceforth closed to Israeli shipping. On the
morning of that date, the President called the Director of Central In-
telligence out of a briefing session with the House Armed Services
Subcommittee to tell him that Ambassador Goldberg had telephoned
from New York, complaining that there had been no warning of a
Middle East crisis, and worrying over the possibility of a. war which
Israel, in Goldberg's opinion, could not win. The President asked the
Director for papers on these subjects.
The Director in turn levied these requirements on his deputy for
intelligence, asking that the responses be delivered to him before the
White House regular Tuesday lunch.' The papers-"US Knowledge
of Egyptian Alert," and "Overall Arab and Israeli Military Capa-
bilities"-were drafted by a task force z which had been brought into
'There were at that moment less than four hours remaining in which these
papers had to be finished, prayed over, and delivered.
2 A task force in current intelligence parlance is a peculiar invention, not entirely
dissimilar in conception from the Manhattan Project, the object of which is to
bring into organized relations all who can help the intelligence e:Tort during a
crisis.
Appjoved For Release 2005/04/28 : CIA-RDP78T03194A00%#x'0005-7
Approved For elea r~ 2005/04/28 : CIA-RDP78T03194A000300010005-7
Policy aI Intelligence SECRET
being earlier the same morning. (The Egyptian announcement had
also triggered the Watch Committee of the United States Intelligence
Board, which had been called into special session at 0030.)
The two memoranda, plus a general situation briefing for the
Director's own use, were delivered to him in the ground floor lobby
outside Walt Rostow's White House office. At the lunch, in addition to
the President and the DCI, were Secretaries Rusk and McNamara,
General Wheeler (Chairman of the Joint Chiefs of Staff ), George
Christian (the White House press officer), and Walt Rostow.
The "who will win" memorandum was clearly crucial. It delivered
"the judgment of the intelligence community" that, on the ground,
Israel could "hold on any three fronts while mounting successfully
a major offensive on the fourth." 3 In the air, the Israelis "probably
could defeat the Egyptian air force if Israel's air facilities were not
damaged beyond repair." This memorandum concluded that, although
the Egyptian forces had "improved substantially" since 1956, neverthe-
less "we consider that the Israeli forces have retained an over-all
superiority." On the spot, the President asked Secretary McNamara
and General Wheeler whether they concurred in this judgment. After
they did so, he ordered both papers delivered to Ambassador Goldberg
in New York.
Second Round'
Wednesday, 24 May, was devoted by the intelligence community
and the policy people to digesting developments and refining their
appreciations. A regularly scheduled National Security Council meet-
ing took up problems of South Arabia, while on the intelligence level
the USIB Watch Committee met once again to sift the evidence bear-
ing on possible Soviet intervention in the crisis. The Watch Committee
concluded that "direct Soviet military involvement" was "highly un-
likely."
Next day (25 May), however, activity ste ed up. The Israelis
weighed in in Washington with
a written estimate o the situation which described Arab intentions
in most sinister terms. Israeli intelligence said it saw a well-orchestrated,
Soviet-backed Arab plan to attack Israel, using chemical agents in
addition to conventional weapons. On receiving this paper, the Director
asked the Office of National Estimates to comment. Their paper was
completed in five hours. Both the Israeli paper and ONE's commentary
'The fronts envisioned were the Sinai, Syrian, Jordanian, and Lebanese.
Appro d1r Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
SECRET Policy and Intelligence
were sent post haste to the White House to Bromley Smith, the NSC
Executive Secretary. The President himself had not yet returned from
a one-day trip to Montreal. At a meeting on the Vietnam problem
that afternoon in Undersecretary of State Katzenbach's office, the Di-
rector learned from Assistant Secretary of State Eugene P.ostow that
Israeli Foreign Minister Eban was making a pitch
and was even then talking to the See-
retary of State.
The Agency's comment on the Israeli document said flatly that "we
do not believe that the Israeli appreciation ... was a serious estimate
of the sort they would submit to their own high officials," and that
"it is probably a gambit intended to influence the US . . . ." The
Agency's paper judged that the Egyptian positions in Sinai were
essentially defensive, that the other Arabs' troop movements were
gestures for political effect, and that the possibility of the. Egyptians
using chemical warfare could be discounted since the local conditions
were most unfavorable. The paper took the position that "the Soviet
aim is still to avoid military involvement and to give the US a black
eye among the Arabs by identifying it with Israel." The paper con-
cluded that the Soviets "probably could not openly help the Arabs
because of lack of capability, and probably would not for fear of con-
frontation with the US."
Early on the evening of the 25th, a high-level group 4 assembled
in Walt Rostow's office at the White House. Secretary Rusk, having
seen Eban, asked if the Director agreed with ONE's comments on the
Israelis' paper. Told that the Director did indeed agree, the Secretary
commented: "Dick, there is only one thing I want to say-as La-
Guardia once remarked, if this is a mistake, it's a beaut." The group
then moved to the President's office.
The President had read the two papers, and again c1uizzed the
I)irector and General Wheeler-was the US assessment solid? The
President evidently had in mind both the question of Egyptian and
Soviet intentions and the "who would win" issue, which Goldberg
was still picking at. The Director replied, "we'll scrub it down again,"
and following the meeting threw the CIA machinery once again into
gear, to produce the next day what has a good claim to have been
the classic paper of the crisis, "Military Capabilities of Israel and the
Arab States."
`Rusk, Cyrus Vance (vice McNamara who was out of town), General Wheeler,
Eugene Rostow, and the Director.
Apptoved For Release 2005/04/28: CIA-RDP78T03194A0069966I0005-7
Appro ed For Ie e2005/04/28 : CIA-RDP78T03194A000b3P Q Q005-7
Policy and ntelligence
Reassessment and Reassertion
This paper, product of a coordinated effort by ONE, elements of
CIA's Directorate of Intelligence and the Defense Intelligence Agency,
considerably sharpened but did not in essence alter the assessment
given the President by the Director two days earlier. It estimated
that the Israelis could attain air superiority over Sinai in 24 hours
after taking the initiative or in two or three days if the Egyptians
struck first, and that Israeli armored forces could breach Egypt's for-
ward lines in Sinai within "several" days, although the paper foresaw
a need for the Israeli ground forces to regroup and resupply before they
could move to the Suez Canal .5
As for Syria and Jordan, this paper was even more prescient. It
judged that the Syrians had no capability for a successful attack and
said the Israelis could break the Syrian line, though with relatively
heavy casualties because of the terrain and the Syrians' fortifications.
Regarding Jordan, the paper estimated that if Jordan undertook more
than very limited operations, Israel could occupy most of the West
Bank in a few days once major fighting with Egypt had subsided.
This paper was disseminated about mid-afternoon on 26 May. Policy
makers therefore had not yet read it when they again convened in
the White House Cabinet room that day. They did have, however, an
ONE memorandum, "The Middle Eastern Crisis," which spelled out
at some length the view of the intelligence community in general
and of CIA in particular on how the crisis had come about and how
it might develop. The President asked the group, which on this oc-
casion included advisers Clark Clifford and Abe Fortas as well as the
officials responsible for national security affairs, to read the paper. Its
theses also contradicted the "little Israel under Red attack" view.
While ONE conceded that Moscow might have encouraged Nasir
to believe that his forces could stand off an Israeli offensive once they
were deployed in Sinai, the estimators did not believe that "the whole
operation is a Soviet plan, or that the Soviets urged him to his present
course of action." Indeed, ONE said it believed that the Soviets
would almost certainly advise Nasir against a military show-down
with Israel. Noting that Nasir had won the "first round" and appeared
to be standing pat, this paper clearly implied that Israel, facing
"dismaying choices," might well react dangerously. The Israelis had
s Original drafts had said "two to three" days would be needed by the Israelis
to break the Sinai defenses, and "seven to nine" days to reach the Canal, but
this precision was sacrificed in the debate of coordination.
ApproWP r Release 2005/04/28 : CIA-RDP78T03194A000300010l05-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
SECRET Policy and Intelligence
the choice of risking a military strike, or of acquiescing in the "per-
manent closing" of the Strait of Tiran. Specifying Israel's dilemma,
ONE was "inclined to believe that unless the US and other major
powers take whatever steps are necessary to reopen the Strait, the
Israelis will feel compelled to go to war." In discussing the Soviet role
and probable actions, ONE repeated its earlier judgment that the
Soviets would not intervene with their own combat forces, even
though Nasir's defeat by Israel would, by extension, be a "grave set-
back" for the USSR itself.
Although it is nowhere spelled out in the intelligence record, the
cumulative impact of these judgments over three successive days
evidently led to policy decisions limiting the US material commitment
in support of Israel to a fairly narrow range of "defensive" military
items. Perhaps more important, it was made clear to the Israelis
that, if they chose to take the military initiative, they would have
to go it alone. Rarely has the intelligence community spoken as clearly,
as rapidly, and with such unanimity. The result was early adoption
of a policy posture in consonance with the intelligence judgment.
This was of course not the end, nor by any means the whole, of
the story of the intelligence contribution to policy planning up to the
early hours of 5 June. Once the Israelis saw where the wind was
blowing, they ceased the rather obvious gambits of the pre-May 26
period and took the US more fully, though of course by no means
entirely, into their confidence. On 1 June, pursuant to an agreement
the President had reached with the Israeli Foreign Minister
admitted that Nasir
would not attack Israel on the ground for the moment, although he
claimed that, if Israel did not act, a surprise Egyptian air strike
was "very possible." =asserted flatly that Israel had erred in not
striking Egypt earlier, while Nasir's deployment to Sinai was going
on. But most important, arned that Israel was being "forced
to act because of the inaction o others," and it could not wait "longer
than a few days or a week." When, on the next day, was recalled
ig with Israeli Ambassador Harman, he
felt the moment of decision must have arrived, and
that the decision must be to strike. The Director immediately informed
the President of this sensitive warning.
Approved For Release 2005/04/28: CIA-RDP78T03194A00( 0005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
Policy and Intelligence SIECRET
Directorate of Intelligence elements at CIA, configured in the so-
called Arab-Israel task force, had meanwhile come to essentially the
same conclusion. On 3 June the task force issued to the community
a self-initiated memorandum entitled. "The Current Focus of the
Near East Crisis," which warned that "all reporting from Israel shows
mounting pressure for a `decision'," while the Arabs, on their side
were "sniffing blood." In this situation, the task force emphasized the
dangers, physical as well as psychological, to US material and strategic
interests in the area, and observed that "the damage to the US
position in the area already appears serious." With these documents in
hand, the whistle of Israeli jets-and the crash of breaking embassy
windows-surely came as no surprise to those who were awakened
early on 5 June.
As indicated earlier, however, the story would be incomplete with-
out some reference to the flood of requests for memoranda which, in
addition to the requirements of the regular intelligence and estimative
media, inundated intelligence components during this period. The
records of the Arab-Israel task force give some of the flavor of those
days-and nights: titles included "Exercise of Overflight and Land-
ing Rights in Spain, Libya and Turkey to Deliver Materiel to :Israel";
"Nasir and a Future UN Presence Along the Israeli Border"; "Oil
Tanker Operations to Eilat" (the shipping people in CIA's Office
of Economic Research joined the Navy in scanning every ship about
which there was even a suggestion it might enter the Red Sea); "Es-
timated Costs of Crude Oil Imports to Israel"; "Egypt's Capacity to
Support a Sustained Mobilization"; "Reactions to the Forcing of the
Strait of Tiran"; "Implications in the Moslem World of Forcing the
Strait of Tiran." Nor, of course, did the intelligence community's
services to US policy on Arab-Israel questions end with the outbreak
of hostilities. But that is still another story.
The story told here is obviously one of a "success." The intelligence
community was "right," and the "right" answers reached the very
top quickly and in immediately usable form. Were we lucky? Did
we merely have on tap, for this occasion, a group of unusually percep-
tive analysts and capable drafters? In part, the answers are perhaps
yes. The present writer, having been one of them, is not inclined to
dismiss the idea that talented people were in fact involved. But he
is inclined to point out that the judgments were not concocted for the
occasion. On the contrary, the community had repeatedly addressed
itself to most of these very questions for a dozen years, through
Appro Per Release 2005/04/28 : CIA-RDP78T03194A000300010605-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
SECRET Policy and Intelligence
formal estimates and-at least as, if not more important in bringing
a body of experts to rub minds together-through the Arab-Israeli
Ad Hoc Working Group.
This group, which produced-and still produces-the "'Arab-Israeli
Handbook," had been meeting periodically under the aegis of CIA's
Office of Current Intelligence since before the 1956 Suez war. Origi-
nally focusing on deliveries of Soviet equipment to the Arab states,
the handbook had gradually expanded into a compendium, of political
and military facts and current military judgments. Moreover, over the
years, experts from CIA, State, DIA, and NSA had learned to know
each other, to work together, and to debate on the basis of a com-
monly-shared corpus of information. Thus, when Nasir made his move
and the Israelis reacted, the spadework on the central problems had
long since been done, and the policy makers could be presented with
informed judgments confidently arrived at.
Approved For Release 2005/04/28 : CIA-RDP78T03194A000005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL
No Foreign Dissem
The essentials of organizing
a counterintelligence service.
THE ANATOMY OF COUNTERINTELLIGENCE
A. C. Wasemiller
The first purpose of this study was to help the authorities in
emerging or young nations in which a counterintelligence capability is
lacking or deficient. Such countries are especially vulnerable in this
era, when Soviet skills in espionage, counterespionage, and subversion
have been refined for half a century.
Even within the US intelligence community, however, some con-
fusion and disagreement about counterintelligence persists. For ex-
ample, it is often misunderstood as another name for security. Because
the article strips away the flesh and reveals the bones of its subject,
it may be useful to us here as well as to others overseas.
The paper describes the basic structure and functions of a counter-
intelligence service in a free society. The subject is not, however, a
model CI service, if "model" is understood to mean an ideal or a
pattern of excellence, created to be imitated. In this sense of the
word, no model service exists. There are wide national variations in
such matters as laws governing espionage and security, in budgets
and manpower, and in the kind and intensity of threats. These differ-
ences are so great that a single model would not do for all countries,
so that each must develop its own CI organization specifically adapted
to its own environment and its own special requirements. It is possible,
on the other hand, to describe the essential or standard functions which
most such services share, and to show the kind of organization that
derives from these functions.
The inquirers should also be put on clear notice concerning the
gravity of the commitments they propose to undertake, and of the
eventual dimensions of the task. The fact is that a defensive service
usually must accept responsibilities which exceed the requirements of
security if security is construed, as it often is, to consist of passive
defenses against clandestine and covert attacks upon the installations,
personnel, and activities of official or semi-official bodies whose methods
and sources the government desires to protect against unauthorized
disclosure. Although it is possible to describe and even to create
Apprd R kkse 2005/04/28: CIA-RDP78TO3194A000300010'005-7
MORI/HRP PAGES 9-24
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Counterintelligence
a security service concerned solely with these defenses, such an or-
ganization would soon find itself unequal to its task. Established intel-
ligence and counterintelligence services, especially those of the USSR,
are too competent and too strong to be defeated or even contained
by purely defensive tactics. The counterintelligence service must be
aggressive. It must learn all it can about its country's enemies. It must
learn their secrets and be privy to their councils. This essay is intended
as a short course in how these things can be done.
Fundamentals
Counterintelligence is both an activity and its product. The product
is reliable information about all those enemies of a country who attack
it by stealth. Some of these enemies are professional intelligence officers
and the agents who serve them. Others act under cover to promote
subversion or insurrection rather than espionage or counterintelligence.
Still others may be non-Communists or anti-Communists who employ
the same underground tactics to try to take by stealth and force what
they cannot gain through winning the open allegiance of a free people.
As an activity, counterintelligence consists of two matching halves,
security and counterespionage. Security consists basically of establish-
ing passive or static defenses against all hostile and concealed acts,
regardless of who carries them out. Counterespionage requires the
identification of a specific adversary, a knowledge of the specific opera-
tions that he is conducting, and a countering of those operations
through penetrating and manipulating them so that their thrust is
turned back against the aggressor.
Certain pre-conditions must exist if a domestic counterintelligence
service is to be effective. Once these prerequisites are at hand, the
service can develop a capability to carry out its functions. The func-
tions, in turn, determine the structure of the service.
The primary pre-condition is that the service must be established
by law as an element of the central government. If its existence is not
based on law, its opponents will attack it openly or clandestinely, and
eventually they will weaken and even destroy it. If it has a legal basis
but is not a governmental entity, its position is little better; it cannot
survive indefinitely.
The service must be an element or arm of the executive branch
of the government. The executive may, at its own discretion, permit
the legislature a degree of insight into the service and its work. But
it ought not to permit any measure of legislative control, because if
App1Oved For Release 2005/04/28: CIA-RDP78T03ft8Df3W&1.0005-7
Approved For R ease 2005/04/28 : CIA-RDP78T03194A000300010005-7
Counterintelligence CONFIDENTIAL
does so, the service will be unable to protect the secrets which it is
legally charged with shielding. It will lose control of these secrets,
partly because too many will know them for effective security. In
addition, to the extent that they have control, legislators may try to
use it for factional rather than national purposes. The service will stand
in danger of becoming enmeshed in passing political struggles and of
suffering internal splits and dissensions which mirror the factionalism of
the political world.
The chief of the service must have direct access to the chief execu-
tive. The latter may interpose a person or group between himself and
the chief of service for the conduct of routine business. But if the
service is competent, it will from time to time obtain critical security
information which must go directly to the chief executive for reasons
of both efficiency and security. The need for direct access may arise
infrequently, and a wise chief of service will exercise prudence in
seeking it. The right to direct access, however, should be explicit and
unquestioned.
The central office, or headquarters, of the service will need regional
offices, except in a very small country. These regional offices should,
by law or service regulation, be subordinate to the headquarters. If
regional offices are autonomous or nearly so, the service can function
only through the slow process of coordination and persuasion. The
timing of counterintelligence operations is frequently dictated by
the initiatives of the adversary or prompted by anticipating these
initiatives. The delays which inevitably result from arguments about
jurisdiction and pleas for voluntary cooperation would result in so
many lost opportunities that the result would be a mounting heap of
failures. The degree of centralization is something else again. Demo-
cratic nations rightly distrust any domestic service which wields any-
thing even distantly approaching the power of a Gestapo or of the
KGB inside the USSR.
We are here primarily concerned with the kind of internal counter-
intelligence service which does not have police functions and. which
therefore conducts appropriate coordination with the police. Sometimes,
however, the two functions are blended. Many police forces have a
special branch employing much the same equipment and techniques
as those used by a counterintelligence service, and in some countries
the special branch is the sole counterintelligence service. Under such
circumstances, however, it is important that the special branch per-
sonnel be as adept in counterintelligence as in countering crime, and
Approrv'W&W1I se 2005/04/28 : CIA-RDP78T03194A000300018605-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Counterintelligence
that they recognize the significant difference between the two. This
is a difference in targets and timing rather than methods.
The CI specialist is waging a secret war against hostile foreign
intelligence services and against concealed subversion, whether it is
directed by a foreign government, the international Communist move-
ment, a local Communist Party, or any other internal or external foe.
The specialist in police work is waging a war against crime. The two
specialties merge when hidden hostile activity is also criminal, or when
the criminal activity is concealed and directed against the country
itself. When this is not the case, when the criminal is not a clandestine
agent or the spy is not committing a crime, the differences between
counterintelligence and police work are sharper. The duty of the
police officer, for example, is to arrest a culprit as soon as possible.
The counterintelligence officer, on the contrary, will usually prefer
not to show his hand until he has all the information he can get.
Or he may conceal his knowledge, even when all relevant: facts have
been dug out, in order to mislead his adversaries, to manipulate them
with or without their knowledge, and thus to make their efforts serve
his ends.
Whether the counterintelligence service should have police powers,
as distinct from police duties, is moot. Generally it will not need them
unless and until the spies and subversives who constitute most of its
targets commit an illegal act, at which point the police can be called
in to act as the executive arm if the counterintelligence service so
chooses. Some executive powers are very useful to a counterintelligence
service. Among these are the rights to take evidence under oath, to
require citizens to give testimony which is not self-incriminatory, and
to subpoena witnesses. Obtaining and using such powers may, however,
arouse public resentment, and the price may be too high. A counter-
intelligence service in a free land needs the respect and support of the
citizenry, which will fear and hate any internal service that uses
dictatorial tactics or that acquires a reputation for doing so. Therefore,
even if the law of the land allocates certain police powers to the internal
service, they should be used very sparingly, never merely for con-
venience, and only when a failure to employ them would probably
have grave consequences for the national security.
The director of the service may or may not have arbitrary powers
of employment. The law may, for example, prescribe that the service
will employ civil service regulations or procedures, including those
governing hiring. The director may be barred from employing certain
Apprpved For Release 2005/04/28: CIA-RDP78T0 @ 9A[10005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Counterintelligence CONFIDENTIAL
classes of personnel: known security risks, sexual deviates, criminals,
etc. All such restrictions would do no significant damage if applied
to the hiring of staff personnel. But the director must have the arbitrary
power to refuse employment to a seemingly qualified applicant and
to discharge an employee without publicly stating the cause. These
provisions are essential to the security of the service. The director also
needs the right to stipulate certain legally binding conditions not
ordinarily imposed. Among these are the obligations of the employee
to submit to physical search of his person or of objects which he wishes
to carry from the place of employment, to keep secret all information
about his duties even after employment ends, to submit to the service
for advance clearance the text of any speech or manuscript intended
for public release, and to report promptly and in detail any contacts,
official or personal, which are potentially or actually damaging to the
security of the service. It does not suffice to list such principles merely
in internal service regulations which lack legal force. The director
must have effective sanctions at his disposal.
If extant law does not include the equivalent of an official secrets
act, the director will be well-advised to consider the desirability
and feasibility of getting such legislation on the books. It is probable
that his charter will charge him with protecting classified informa-
tion, as well as methods and sources. But he may not be able to do
so if any journalist or other private person who comes into possession
of classified information can with impunity make it public.
The internal counterintelligence service should not be a military or-
ganization or part of one unless the principles of organization and
management outlined above can be followed. In most instances, it
would be difficult to do so because, in any military agency, the intel-
ligence and counterintelligence components are quite properly sub-
ordinate elements serving the purposes of command. The service, on
the other hand, should be solely and exclusively concerned with na-
tional counterintelligence. Its personnel should be professionals ex-
pected to devote their careers to the work.
Other departments and agencies of the government will also be
custodians of national secrets. The security of these other components
is therefore a matter of national counterintelligence concern, especially
if they have representatives abroad. However, the managerial and
operational responsibility for this kind of security should not lbe as-
signed to the internal CI service. Each government element should
be responsible for its own departmental security. One reason is that
Appn *4FF lase 2005/04/28: CIA-RDP78TO3194A000300019005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Counterintelligence
a department so charged is likely to maintain higher standards and
morale among its employees. Moreover, maintaining an effective watch
over the security of the installations, personnel, and activities of other
departments and agencies would be sure to exceed the capability of
even a very large internal service.
It does not follow, however, that the service has no part to play
here. On the contrary, it must try to establish high, uniform standards
of security for all. It must provide advice and training to others.
It should also keep them appropriately informed about hostile clan-
destine capabilities, personnel, and intentions. It ought to receive de-
tailed reports from any department or agency which suffers security
damage, collate this information, and draw conclusions. It should
maintain a central registry of all non-overt operatives used by other
departments and agencies, to prevent fraud and working at cross-
purposes. It should also establish and keep current another kind
of central file, containing information about known and suspected
spies and subversives in the service of adversaries and about their
superiors. In short, it needs to be kept fully informed about what
friend and foe are doing and to play a central, coordinating role
in the national intelligence community. But it does not play the part
of policeman for the community.
All the functions of counterintelligence derive from the nature and
resultant activities of the adversary. For an imaginary example, let
us suppose that country "X" is conducting espionage against country
"Y." The latter's counterintelligence service discovers that country "X"
has changed its system for communicating with its agents in country
"Y." Until recently it had done so through couriers who left and picked
up messages written in secret ink and concealed in dead drops. Now
most of the agents are sending and receiving coded radio messages.
The result will be the creation or sudden strengthening of a group
in the defending counterintelligence service which will intercept mes-
sages, conduct electronic direction finding, try to break codes, capture
radio operators and play them back, and so forth.
Generally speaking, the function of the internal counterintelligence
service is to protect the lawfully constituted government against con-
cealed attack. The government has other defenders to deal with open
aggression; the CI service is properly concerned only with hostile
clandestine and covert activity. Clandestine activity is that which
Appr?Xed For Release 2005/04/28: CIA-RDP78T031 Fj4QQUQQpX005-7
Appreved Fpr R Tease 2005/04/28 :CIA-RDP78T03184~ $4005-7
ounterinte Igence
the enemy tries to conceal totally. It usually takes the form of espionage,
counterespionage, subversion, or-much more rarely-sabotage.
Covert activity is not fully concealed; in fact, it is likely to take the
form of a newspaper article or radio broadcast, or even terrorism,
for which the widest possible publicity is sought. What the enemy
tries to hide in this type of action is his sponsorship or other involve-
ment. The goal of the CI service is to learn everything it can about
these two kinds of inimical action, and therefore about the people
carrying out the action, without letting these persons become aware
that the service is acquiring such information. Only by making avail-
able to the government information about its enemies which is com-
plete enough to include all essentials and which was acquired secretly,
so that the enemies remain unwarned, can the counterintelligence serv-
ice do the task for which it was created and designed.
No counterintelligence service can do its job alone. The Commu-
nist services and parties are world-wide organizations which operate
from Free Country "A" against Free Country "B," from "B" against
"C" (or "C," "D," and "E") moving so fluidly across and over national
borders that a defense which stops at the borders will lose its war.
Therefore the service must have a close working relationship with
other organizations, domestic and foreign, which can help it. The do-
mestic departments and agencies most likely to have functions of
counterintelligence significance are to be found in the executive and
legislative branches of the government and in the intelligence com-
ponents of the armed forces. The service also needs the cooperation
of the citizenry.
Within the legislative branch of government there may be various
committees also concerned with the country's security, and especially
with its defenses against subversion. The service will find it profitable
to maintain a liaison relationship with such groups.
The counterintelligence service will also need to maintain liaison
with other friendly services concerned with foreign collection as well
as counterintelligence. Collaboration with services in the former cate-
gory is useful because they sometimes acquire counterintelligence
as a by-product of positive operations. Moreover, their primary targets
in (and outside) the host country are representatives and installations
of Communist states. They thus share with the defenders of the coun-
try's security a solid common interest. The Communist services persist-
Appr *P N IAse 2005/04/28: CIA-RDP78T03194A00030001b005-7
App~o6*rfrftpse 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Counterintelligence
ently use diplomatic, commercial, journalistic, and other representa-
tions for cover. By working with non-Communist espionage services
attacking these targets, the CI service affords the foreign service added
protection and acquires useful information in exchange.
The need for liaison with foreign counterintelligence services is
obvious. Exchanging counterintelligence information freely within the
wide limits imposed by national considerations is the only way in which
the Cl service can cope with an attack so varied, persistent, and in-
tense that no service could hope to deal with it in isolation. The infor-
mation that can be obtained about hostile case officer "X" during his
tour of duty is not likely to suffice for the purposes of negating his
efforts or, better, recruiting him. These goals require all the informa-
tion about him which has been obtained during his total time outside
his Communist homeland-in other words, the help of all other non-
Communist counterintelligence services. For these reasons the liaison
branch is an important part of the CI service. Its structure and its
place in the service as a whole are discussed below.
The service will nevertheless have to get most of the information
that it needs through its own resources and methods. Some countries
may from time to time be faced by a significant clandestine or covert
threat which is non-Communist in nature (for example, a hostile non-
Communist neighboring country, a Fascist group inside the country,
a non-Communist opposition plotting to seize control of the govern-
ment by force). The service then sets up a corresponding group or
branch which studies the nature of the threat, acquires expertise, and
uses it to infiltrate the opposition or otherwise negate cr control it.
But when we consider the Free World as a whole, the non-Communist
threat is dwarfed by the danger of Communist activity. So much of
the service's energy and time must be devoted to the principal
adversary that it would be wrong to set up a Communist intelligence
services branch or a Communist parties branch within the counter-
intelligence service. The service as a whole should be permeated with
knowledge, skill, and a determination focussing on the chief target.
The service will rely upon clandestine methods to obtain its infor-
mation about the adversary for the reason already given: to keep
him from knowing what it knows. It will therefore need an operations
branch, which consists of specialists in clandestine methods. One ele-
ment of the operations branch should be concerned with planning
App!eved For Release 2005/04/28: CIA-RDP78T03'QW6 bW0005-7
Approl ~tgri ftqag&3005/04/28 : CIA-RDP78T03I949 0NOIpR05-7
future operations. That part of counterintelligence which is essentially
security work will be timed, for the most part, in response to adversary
initiative. For example, a hostile service tries to recruit a local citizen
as an agent; a microphone is discovered in the foreign ministry; or
a pro-Communist radio broadcast is suspected of having been instigated
by the KGB. Responses to these kinds of challenge cannot be planned
in advance. Counterespionage, on the contrary, secures the initiative
for the Cl service and is therefore the activity with which the plans
group is chiefly concerned. It also plans for non-CE opportunities that
will inevitably arise from adversary initiative or by chance, from
deception operations, for example, or an unexpected walk-in. Finally,
the plans group should be available for consultation with any na-
tional service planning an espionage (or other non-CI) operation and
wishing to avail itself of counterintelligence expertise in planning for
the security of the operation at the outset.
Under the command of the chief of operations there should also be
a group concerned with technical services. Counterintelligence relies
heavily upon the various forms of surveillance. Foot surveillance teams
may need radio equipment, purchased or built by the technical services
group. The same is true for vehicular surveillance. All audio opera-
tions, microphone or transmitter, require equipment and expertise.
It may for instance be useful to have a double agent record. a con-
versation with an opposition case officer. Similarly, clandestine photog-
raphy is often used in counterintelligence work. A technical capability
to monitor all kinds of clandestine communications, including radio,
and to analyze suspicious documentation, is also essential. Moreover,
countering the technical attack of adversary services is a separate,
though closely related, specialty.
The CI service, accordingly, will need a group of scientific experts
capable of understanding all the technical equipment used in modern
CI, to the point of building such equipment if it is not available
or cannot be bought securely; of installing and maintaining it; of
training others in its use; and of anticipating needs through a re-
search and development program. An able technical services group
is just as important in an agrarian country as in a complex, highly
developed nation, because the adversary will press the technological
attack regardless of the environment. The group is logically subordi-
nate to the chief of operations because technology and operations
should go hand-in-hand. An independent technical group responsive
only to the chief of the service might too easily lose touch with prag-
CONFIDENTIAL
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300018605-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL Counterintelligence
matic operational needs. Placing the chief of operations in charge of the
technical services group will ensure that this does not happen, and
that he becomes familiar with the help that science can provide and
stays abreast of current developments.
No national CI service can afford to be wholly dependent upon
cooperative foreign services for the acquisition of counterintelligence
abroad, nor can it wait until the enemy is inside the nation's frontiers
before it begins to study him. The solution is the recruitment of certain
carefully chosen citizens, from government or outside it, who spend
significant amounts of time in Communist countries. These persons are
likely to have contact with the CI services of such countries of tem-
porary residence: diplomats who have social contact, for example, or
industrialists in whom a Communist service might reasonably be ex-
pected to take an operational interest. Such persons must be care-
fully screened before recruitment. Normally, they are told to remain
passive, neither accepting nor rebuffing hostile offers on their own
but reporting approaches immediately and following instructions there-
after. The CI service may also arrange to have one of its members sta-
tioned in each of the main embassies of its country, as security officer
or in some other suitable post. Such representation is valuable for the
conduct of liaison with other counterintelligence services and also
for investigations conducted in areas where the home country is
especially vulnerable to clandestine attack. Direct representation
abroad will, however, create difficulties for an internal counterintel-
ligence service unless there is careful planning and meticulous prior
coordination with other national elements represented in the same
country-the foreign service, for example, and certainly the foreign
ministry. Care must also be taken not to offend the host service or
government.
Persons in the first category (recruits rather than staff members of
the service) should be important enough so that the adversary service
will take them seriously and assign senior personnel to recruiting and
managing them, but they should not usually have access to important
national secrets unless that access can be concealed indefinitely from
the adversary.
The operations branch should also have an operating group with
separate sub-groups allocated upon either a geographical or a func-
tional basis. This branch runs the operations: surveillance and counter-
surveillance, penetrations, provocations, double-agent operations, tech-
nical and counter-technical operations, counterintelligence interroga-
ApplOved For Release 2005/04/28: CIA-RDP78T03C1 9?M k0005-7
ApprcrA 9rntRele se 2005/04/28 : CIA-RDP78TO3194A000300010005-7
9 CONFIDENTIAL
tions and debriefings, handling of walk-ins and defectors, joint opera-
tions with liaison, and so on. It is the largest component of the service.
If the country and its service are large, it is suggested that a geo-
graphic organization will prove preferable, because this kind of struc-
ture will permit appropriate grouping of language skills and area
knowledge.
If the service is small or has few language and area specialists at
its command, a functional arrangement may be better. In this event
the operations branch will need a minimum of four groups or sub-
groups, for counter-espionage, counter-subversion, counter-propaganda,
and operational security. Thus, counter-espionage conducts all opera-
tions directed against hostile foreign services engaging in positive or
counterintelligence activity in the country. Counter-subversion carries
out all operations aimed against subversive activity; its principal. target
will be the local Communist party and international Communism.
Counter-propaganda will monitor and control those propaganda ac-
tivities directed from concealment against the national interests by
foreign services or by local or foreign Communist parties. The key
words here are "from concealment." If the sponsorship of a propaganda
attack is openly acknowledged, the government can deal with it
openly. But if sponsorship is concealed, the government must depend
upon its CI service to ferret it out and expose it, suppress it, or
otherwise manipulate it so that it cannot harm the national interest.
Finally, operational security works closely with the plans group and
with other operational elements to ensure that the service's clandestine
activity is properly hidden from the outset and stays that way.
The second unit may be called Research, Records, and Reports
(RRR) . The Cl service must grow in knowledge and capability; it
is the function of the RRR component to see that it does so. As more
and more is learned about the adversaries, the information is funneled
into RRR, where it is organized, studied, recorded systematically,
filed and, retrieved, and used to produce the finished counterintelli-
gence which Operations needs in order to work intelligently. RRR
is not, however, restricted to close operational support. Operations
writes case reports; RRR writes summary reports based on case re-
porting, but it also writes strategic as well as tactical papers. It moves
from the KGB officer (who is the subject of operational reporting) to
the Soviet Embassy (tactical reporting) to a finished compilation of
what the service knows about the Soviet services (strategic reporting).
Moreover, as the result of such studies, RRR becomes the promulgator
Appro9ew or- Release 2005/04/28: CIA-RDP78TO3194A00030001 005-7
App pb\pQ .f jease 2005/04/28: CIA-RDP78103194A( 0i.300010005-7
c~ oun erm a igence
of counterintelligence doctrine. Scrutinizing the enemy's successes and
failures, as well as the triumphs and mistakes of its own service, it is
in a position to discern and express underlying principles.
From this generalizing activity, additional functions flow in the
areas of training and regulations. Some services make training an
autonomous or semi-autonomous function, headed by a director who
reports more or less directly to the chief of the service. The disadvan-
tage is that under such an arrangement training tends to grow isolated
both from the operational context (that is, the living or recent opera-
tions conducted by the service) and the immediacy of doctrine (the
constant learning from experience). Incorporating training into RRR
creates an organic rather than an architectural structure. The life
blood of operations and the living bones of doctrine thus become
natural parts of the body of training.
The service needs internal rules, and these are best when they are
a codification of doctrine. It is possible to write up internal service
regulations abstractly, on a basis of what seems theoretically de-
sirable, but such regulations tend to be legalistic, bureaucratic, and
arbitrary. One desirable aim is to issue as few regulations as possible,
to keep them simple in both language and intent, and to derive them,
like laws, from experience and probabilities in the real world rather
than upon theories and remote possibilities. Placing the regulations
group in the RRR Branch will help to ensure an unblocked flow and
transformation from operational facts to collated facts to underlying
and unifying concepts to a body of coherent doctrine. RRR will, of
course, check out draft regulations with the office of the Legal Ad-
visor and other interested elements of the service.
the service will of course have a central collection of file; or archives.
If the service is large or growing, its holdings are also likely to be
large or growing. Deciding what raw information should be destroyed
and what kept, how it should be indexed and filed, :how best to
retrieve it, who shall have access to it, and all the related questions
are matters peculiarly within the province of the RRR Branch. Ac-
cordingly, it should have the files or central library group under its
jurisdiction.
The remaining parts of RRR, like certain elements of operations,
can be organized geographically or functionally. Whichever kind of
organization was chosen for operations, it is desirable to match it in
RRR. If the structure is geographic and there is a USSR group in
operations, it is helpful if there is also a USSR group in RRR. If
Apprr4ed For Release 2005/04/28: CIA-RDP78T031SYA d& M4005-7
Appro 8gnF f%M3005/04/28 : CIA-RDP78T0319d&M 111g&05-7
the structure is functional, then only two more RRR groups may
suffice, a research and collation group and a studies group. The
former receives all raw and finished counterintelligence coming
from operations, from other elements of the service, from liaison, and
from any other sources. From this flow of mixed information it sorts
out the various subjects into separate holdings. It forwards to opera-
tions and other service elements useful counterintelligence which
those elements did not themselves produce. It also produces raw
or immediate CI reports of significance for the chief of service, for
other national services, other departments and agencies of the gov-
ernment, and for liaison exchange. It endeavors to assure that these
reports have a uniform format. Finally, the research group maintains
controls on dissemination and sources of its reports. The studies group
produces finished counterintelligence.
The third major component is the security branch. As has been
said, the security of operations is itself an operational function and is
therefore assigned to the operations unit. The remaining elements of
security are the responsibility of the security branch. These include
the security of methods and sources, physical security, and security of
personnel.
The Source Records and Control Group maintains the records of
all non-staff personnel formerly or currently employed by the service.
An officer of the service who plans the recruitment of a source submits
to this group all available information about the potential recruit,
and the group checks other service and governmental files as appro-
priate. It passes the results to the personnel security group if in-
vestigation of the prospective agent is indicated. If any other de-
partment or agency of the government, in addition to the national
counterintelligence service, recruits and directs clandestine or covert
assets, the personnel security group receives from the department or
agency concerned prior notification of intent to recruit. On this basis
it maintains an interdepartmental or government-wide roster of agents
and can thus give notice if one department plans recruitment of
a person already employed by another, of any derogatory infor-
mation, and of other contraindications.
The physical security group is responsible for fences, floodlights,
guards, passes, safes, and the like, and the personnel security group
conducts background investigations of potential staff and agent per-
sonnel. It also conducts investigations of any employee suspected
of serving a hostile service as a penetration or of otherwise jeopardiz-
ing the security of the service.
CONFID 1A
d ForrReTease 2005/04/28 : CIA-RDP78T03194A00030001 105-7
Approve
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Counterintelligence
The functions of the liaison branch were mentioned earlier. It may
be useful to divide it into two groups, one concerned with domestic
liaison (relationships with other elements of its own government), the
other with liaison with foreign services.
The service needs a minimum of four other offices: those of the
inspector general, the chief of administration and personnel, the legal
advisor, and the public affairs officer.
The inspector general has two main functions, in addition to routine
inspection. One is to prevent or detect abuse of the service by the
employee: theft, falsified reporting for personal gain, abuse of official
status for personal motives, and the like. The second is to prevent or
detect abuse of the employee by the service. Any staff employee who
believes that he has been treated unjustly and who has unsuccessfully
sought redress through normal channels should have the right of
access to the inspector general or a member of his office, and no
punitive action should result if he avails himself of this right. If this
avenue is not open, a frustrated employee can become highly dan-
gerous to the security of the service. The office of the inspector gen-
eral carries out its own investigations as necessary. The results are
made available to no one outside the office except the chief of the
service, who may at his discretion communicate them on a need-to-
know basis to another service component. For example, iF investiga-
tion undertaken by the inspector general on the basis of an employee's
complaint should reveal insecure or disloyal conduct by the: employee,
the IG will pass this information to the chief of the security branch,
who relays it to the chief of the personnel security group for action.
The office of the chief of administration and personnel handles
the payroll, assignment of vehicles, vacation rosters, office equip-
ment, promotions, and all similar matters.
The legal advisor and his staff maintain liaison with they legislative
branch of the government if the chief executive wants such liaison to
exist. The legal advisor's office reviews all service regulations before
promulgation to ensure compatibility with law. It drafts, or cooperates
in drafting, legislation not yet enacted but essential to the service.
The legal advisor counsels the chief of service on legal matters, in-
cluding the protection of sources and methods. He is also responsible
for ensuring that counterintelligence cases can be turned over to the
police without violation of the chain of evidence or other legal con-
siderations and without security hazard to the service itself.
Applbved For Release 2005/04/28: CIA-RDP78T0=4*Q bba 0005-7
Appro ed For R ase 2005/04/28 : CIA-RDP78T03194A000300010005-7
counterintelligence CONFIDENTIAL
The public affairs officer is charged with maintaining essential public,
non-governmental relationships. Private citizens who seek contact
with the service because they believe that they have significant in-
formation-or for any other reason-are directed to this office. So
are journalists, businessmen, and all other persons seeking non-official
contact.
It is vital to national security that all significant counterintelligence
obtained by governmental components other than the service, such
as the armed forces, or by non-governmental groups or private indi-
viduals, be funneled into the service, either through the liaison branch
or through the public affairs office. This information is screened and
collated by the research, records, and reports branch and entered
into files as appropriate. In this way the central holdings become the
national counterintelligence repository. Each department or agency,
other than the service, which conducts liaison with one or more
foreign intelligence or security services should provide the national
CI service with enough information about each such liaison relationship
so that the service knows at all times who is doing business with whom.
This paper has attempted to lay out the functions and structure
of the internal counterintelligence service. The problems that the
service faces are, of course, another matter: these will vary with the
size of the country and its population, the amount of support accorded
the service by its government and citizenry, the qualitative level of
the service's personnel and equipment, the intensity and skill of the
concealed attack by Communist intelligence services and parties, the
effectiveness of liaison and liaison exchange conducted with other
governmental departments and agencies and with foreign services,
the legal mandate of the service, and many lesser factors. The counter-
intelligence service of a stable country with few disloyal citizens is
plainly in a far more advantageous position than is a service in a
land in which revolutionary sentiment is widespread, the government
is unpopular, and the opposition is nearly strong enough to resort
to force or has already launched guerrilla war. Whatever the problems
and their gravity, any counterintelligence service can deal with
them more effectively if it manages to combine two seemingly antithet-
ical qualities: patience and aggressiveness.
CI work is laborious and involves frustrations which, if not met
patiently, will incline the service to hasty action, such as an abrupt
declaration that a Soviet intelligence officer is persona non grata,
ApprcRhIPW'KeV6arse 2005/04/28: CIA-RDP78T03194A00030001005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL Counterintelligence
or the quick arrest of a single spy. The service which has identified
a spy or his handler has taken the first big step. If it patiently studies
such people, it may in time be able to control them, not merely sup-
press their activity, which is then resumed by unidentified successors.
But patience by itself leads to the acquisition of counterintelligence
for its own sake, a grave error. All counterintelligence, in principle,
should be used as a basis for counteraction. The questions are, what
kind of action and when? Neither question can be answered until
the last piece of pertinent information is at hand.
The effectiveness of counterintelligence in the free world is cru-
cially important to all of us. As in the past, intelligence and CI serv-
ices properly continue to serve national ends. Yet the skilled coopera-
tion of the non-Communist services in all areas of common interest
is of growing importance. It is hoped that the facts and. ideas dis-
cussed in this paper will contribute in some small measure both to
internal or national capabilities and to our capacity for international
cooperation.
App $ved For Release 2005/04/28 : CIA-RDP78T03 Mt0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
No Foreign Dissem
Growing pains in
astronautics intelligence.
THE CASE OF THE SS-6
M. C. Wonus
The public display of a Soviet SS-6 rocket at the Paris Air Show
in 1967 jolted the US scientific astronautics intelligence community
into awareness of many weaknesses in its evaluative processes. These
revelations were of much greater intelligence significance than the
factual information gleaned from inspection of the missile itself.
The space rocket is one of the new intelligence targets to emerge
in the past decade, and its unique character has necessitated the
invention of new and comparatively sophisticated collection and
analysis devices. To insure the effective operation of these extremely
complex and expensive mechanisms, the results of their employment
require continuous evaluation. A variety of intelligence inputs including
telemetry and radar signature information had been available for a
number of years on the Soviet SS-6 system, but it was not until the
display of the SS-6 that the US intelligence community had a chance
to assess Soviet rocket technology directly and extensively. Its appear-
ance thus afforded the first real opportunity to evaluate the effective-
ness of the collection and analysis efforts which had been directed
against Soviet missile and space programs for a decade.
As a result it became possible to identify many shortcomings in the
analytical phase of the intelligence cycle. Successful attempts have
now been made to remedy most of these. The primary benefit to in-
telligence of the appearance of the SS-6 in Paris is thus not to be
measured by what it revealed about the technical characteristics of
the system, but rather by the subsequent improvements in our ana-
lytical processes.
In retrospect, it is clear that the principal shortcomings of our
analytical cycle did not result from mistakes in the interpretation
of the available data, nor from deficiencies in the quality or quantity
of the data. Instead, error most frequently arose from attempts to
relate Soviet technology directly to that of the United States,. It is
now evident that this approach involves a dangerous assumption, and
that Soviet technological approaches in the field of astronautics often
App FTor Release 2005/04/28 : CIA-RDP78T03194A000300020005-7
MORI/HRP PAGES 25-31
Apprgy ci.For Release 2005/04/28: CIA-RDP78TO3194AO0he 0 6 005-7 SS-
(a)
Q 0
-4 4 4)
mar,
w o
4-~ 19 aI
4) c "Q
,ht Q) Sri
rn m UI
by s. ?4
0bn b
T1 N H 4 0 1
0 o Q. U
$4 0 V - +~ tll ri Fy
Rf C3 a? ~+ N Q)
?r4 U1 a) bA (1) N F".
is -4 l cSI rl 0 c, ctf
$.G V (1) +f 4b QS +1
m z U? 'C3 U U in
cC S.+ v 1 .~ Ul
a r.
4J UI 0a 0 V V
Q ?rl 0 c t6 0 a) x:
P4 00 ;D rz 44 > 04
Approved For Release 2005/04/28 : CIA-RDP78T03194A063r06b110005-7
Approved For Release 2005/04/28: CIA-RDP78T03194A0003S00fr1 005-7
The
differ significantly from those of the United States. Erroneous judg-
ments reached by ignoring available intelligence because it gives
answers seemingly inconsistent with "our way of doing things" have
unfortunately been common in the scientific intelligence field.
Initial firings of the SS-6 occurred in late 1957. Although conceived
as an ICBM, it was immediately adapted to serve as a space booster,
and as such has been the workhorse of the Soviet space program for
the past decade, being flown with a variety of upper stages on several
different kinds of space missions. The frequency of its utilization
afforded opportunities to collect a wealth of intelligence information
about it during all phases of its flight. For example, telemetry was
available on the ICBM version from a period well before lift-off until
impact. It should have been possible to reconstruct the detailed
anatomy of the launch vehicle with considerable accuracy. The intel-
ligence assessment of the system, however, was disappointingly wide
of the mark.
The Specific Analytical Illnesses
In particular, the specific propellant combination employed by the
system was incorrectly determined because the volumetric ratio of the
bi-liquid was derived from a telemetry interpretation which assumed
the sustainer tanks were of the same diameter.
The most surprising feature of the SS-6, the use of multi-chambered
engines, was not recognized. This was due to an adverse influence of
US design practice on the thinking of intelligence analysts.
The specific impulse 1 of the first stage of the system, and the overall
energy capability of the stage, were incorrectly derived; both because
of the assumption that the area ratio of the first stage engines should be
related to the area ratio of the sustainer engine in about the same
manner as in engines of US design of the same type. Many intelligence
officers within the community were correct in their assessment of the
specific combination employed, but unfortunately their adversaries,
guided by the "divine righteousness of domestic design concepts,"
overruled their superior technical judgments.
The weight and thrust of the system were incorrectly derived, first
of all because of the error made in deriving the specific impulse of
1 Specific impulse is a measurement of the energy potential of a given mix of
propellant. Numerically, it is equal to the number of pounds of thrust developed
per pound of propellant burned per second.
Appro?9qr Release 2005/04/28: CIA-RDP78T03194A00030001(905-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
SECRET The SS-6
the first stage, and secondly, because structure factors, or structure
weights, were assumed, based on comparable US state-of-the-art in
vehicle fabrication and handling.
The detailed configuration of the four boosters was improperly
interpreted, principally because of the erroneous assumption that liquid
propellant tanks for large rocket vehicles would logically be formed
from right circular cylinders. Additionally, the general configuration
(parallel, or partial), was misinterpreted by many. This argument,
incidentally, grew into one of the major intelligence controversies of the
decade. Those who turned out to be wrong on this issue based their
decisions upon "domestic logic" rather than objectively interpreting
available intelligence information such as intercepted radio telemetry.
The basic Soviet philosophy of building and handling large rocket
vehicles was therefore misunderstood because of the foregoing errors.
On the other hand, there were some outstanding analytical achieve-
ments in the interpretation of the intelligence information collected
from the SS-6. Although a number of errors were made in the overall
assessment of the vehicle, the most important parameter, the payload
weight capability, was, however, derived correctly. This was possible
because the energy capability and major performance parameters
of the second stage were interpreted correctly. There was some
support for the view that the SS-6 employed a kerosene-base fuel,
but the majority view that the oxidizer was liquid oxygen turned out
to be correct. Although the number of combustion chambers was
incorrectly derived, the presence of four engines in the first stage
and one engine in the sustainer stage was correctly derived. The
detailed plumbing of the propulsion system and the positioning of the
propellant tanks were also correctly deduced.
The Diagnosis and Recommended Cure
An extensive investigation was undertaken into why inco:rrect results
were achieved in our initial assessment of this rocket vehicle. It was
first of all determined that the quality and quantity of the data which
were collected on the system were indeed adequate to permit the
analytical entities to accurately derive the performance, characteristics,
and configuration of the vehicle. The mistakes were almost entirely
the result of poor judgment.
First of all, the incorrect interpretation of the propellant combina-
tion employed in the second stage of the system gave our planners
Ap ved For Release 2005/04/28: CIA-RDP78T03194A00SWRBI0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
The SS-6 SECRET
a false impression of the Soviet state-of-the-art in propulsion and
propellants. The Soviet test engineers telemetered an instrumentation
device from both tanks of the sustainer stage which gave a time history
of the level of the propellant in each of the two tanks. Therefore,
if the diameters of the tanks were the same, the relative rates at
which the liquid surfaces were dropping in the tanks, as propellants
were burned, would represent the volumetric ratio at which the
propellants were being burned. The volumetric ratio of the propellants
is thus a very important input in the determination of the specific
propellant combination employed in a given missile. Considering the
general characteristics of the SS-6 sustainer stage, and using US tech-
nology as a standard, the intelligence community assumed that the
tanks were the same diameter. Unfortunately they were not. A mixture
ratio of about 1:1 was derived from this assumption, and when con-
sidered with other pertinent inputs such as specific impulse, the
specific combination was determined to be an amine-base fuel with
liquid oxygen as the oxidizer.
It was immediately obvious upon seeing the vehicle in Paris that
the lower tank of the sustainer had a significantly smaller diameter
than the upper tank, as a consequence of the manner in which the
first stage sections were faired into the sustainer section. Because
of this, the volumetric ratio of the propellants was really about :1.60:1,
in contrast to the 1:1 ratio which had been derived from telemetry. The
propellant combination in the case of the 1.60:1 ratio would logically
be kerosene for fuel and liquid oxygen as the oxidizer, consistent with
the Soviet announcements at the time. Thus, an erroneous assumption
overemphasizing the importance of comparable US practices, led the
community astray. This was the first lesson learned from the reassess-
ment, and an important one to consider in future efforts of this type.
Since we were absolutely confident of the scale factor of the ac-
celerometer telemetered from the sustainer stage of the SS-6, deter-
mined through a study of on-pad telemetry, we were certain of the
derived specific impulse of the second stage. Although a great deal
of acceleration information was available on the operation of the
first stage of the vehicle, from which a specific impulse value of that
stage could have been independently derived, deficiencies in our
analytical methodology limited this direct derivation. In the absence
of a direct computation of the first stage specific impulse, the intelli-
gence community again turned to US technology for an indirect deriva-
tion of this energy value. It was correctly assumed that the first and
Appr egEor Release 2005/04/28 : CIA-RDP78TO3194A000300020005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET The SS-6
sustainer stages of the SS-6 employed the same propellant combina-
tions. Thus, by "scaling down" the sustainer specific impulse value,
according to US optimum design, the SS-6 first stage value was
determined.
Again, we went astray. As is typical of the Soviets, they adapted
a single rocket engine for use on both the first and sustainer stages
of the vehicle. Consequently, the area ratios and the vacuum specific
impulse values were nearly the same in both stages. Intercepted
telemetry from engine parameters gave this indication of common
engines in both stages. However, rather than believe this direct
evidence, the community once again erroneously relied too heavily on
US design precepts. Thus, lesson number two was that the Soviet
approach to rocket engine design can be radically different from that
of the US, and that a direct comparison of the type made above can be
dangerously misleading. The community should have attempted to
remedy the deficiency in its analytical capability, in order to solve
for the specific impulse of the first stage directly.
The failure of the intelligence community to recognize that a multi-
chambered engine was employed in the SS-6 was embarrassing. In
this instance a lack of telemetry from the early firings of the system
contributed significantly to the failure. Considering the other indicators
available, however, the engine configuration should have been recog-
nized. When the Soviets fly multi-chambered engines they generally
employ special instrumentation to monitor the pressure trail-offs
of the individual chambers. This special monitoring is easily recog-
nizable, but is generally carried only on the earlier flight tests of a
system. The community was denied this initial indicator because
powered flight telemetry was not intercepted from these early firings
of the SS-6.
A combination of the comparatively high specific impulse and
thrust level of the SS-6 engine, considering the 1957 time frame when
it was being initially flown, however, should have alerted analysts
to the fact that something was amiss. In addition, the strategic system
which preceded the SS-6 in research and development flight testing,
the SS-4, as well as systems which immediately followed it, such as
the SS-5 and SS-7, incorporated multi-chambered engines. Analysts
within the community were reluctant to accept the multi-chambered
engine configurations of both the SS-4 and SS-5, even ir. the light of
evidence that such was the case. Although the tendency was not as
clear as in the case of the SS-6, it seems rather certain that the analysts
Apprred For Release 2005/04/28: CIA-RDP78T03194A000???M005-7
ApprveedSSoo Release 2005/04/28: CIA-RDP78T03194AOOOMP05-7
were reluctant to accept these indications because of the radical dis-
agreement with US design philosophies.
The error made in the derivation of first stage specific impulse,
combined with the failure to recognize that the same engine was
used in both powered stages, resulted in a poor assessment of the struc-
ture weight of the first stage of the system. Although this was not
of serious consequence to intelligence consumers, a more accurate
assessment would have been of considerable help to analysts in their
overall interpretation of the vehicle. The vehicle also turned out to be
much more rigid than had been deduced by relating it to comparable
US vehicles. Other incorrect findings in the analysis of the SS-6, in-
cluding the thrusts and weights of the stages and the true configuration
of the booster stage, were also principally prompted by undue stress
on analogies in US rocket technology.
The combination of several incorrect results thus gave planners an
erroneous concept of this highly significant Soviet system. In matters
of space research, this may not be considered wholly intolerable. If
the intelligence target in this instance had been an intercontinental
missile delivery system, however, the consumers might not have been
disposed to be so charitable.
The episode of the SS-6 thus illustrates the familiar tendency of the
constituents of our analytical machine to get locked into inflexible de-
partmental attitudes. It shows that these can be mistaken, and it
shows the difficulty of making corrections. From the point of view
of the individual analyst, the lesson is clear. He should by all means
be very much aware of domestic technology associated with his assign-
ment, but he should never feel safe in assuming that the Soviets are
necessarily taking the same route as the US in their solution of related
technological problems. Assumptions which must be made in the in-
terpretation of the data should be based upon previous design phi-
losophies of the target nation, or upon general indications available
from the data base, and seldom, if ever, upon domestic philosophies.
And finally it goes without saying that the analyst should also :remain
aware of his grave responsibility for being objective in his interpreta-
tion of the data, particularly in his dealings with counterparts in other
analytical entities of the government.
ApprolFlor Release 2005/04/28: CIA-RDP78T03194A00030001%b05-7
Approved For Release 2005/04/28: CIA-RDP78T0319&9 A&W, 05-7
No Foreign Dissem
Central intelligence becomes an
agency, still struggling to estab-
lish its position and function.
DCI HILLENKOETTER: SOFT SELL AND STICK
Arthur B. Darling 1
The man to succeed General Vandenberg at the head of the Presi-
dent's information service had been under consideration for some
time. Though often credited with the choice, Admiral Souers took
no part in selecting Admiral Roscoe H. Hillenkoetter. Another per-
sonal representative of the President, Admiral Leahy, did.
While Ambassador at Vichy from 1940 to 1942, Admiral Leahy had
formed a high regard for his naval attache
's skill in working with the
French underground. Hillenkoetter was expert at helping patriots
escape into Africa and acquiring information from both French and
German sources. "He never got caught." Earlier, he had been so
successful with Ambassador Bullitt in Moscow and in Paris that the
State Department wished to keep him; the Navy, according to Leahy,
had had to recall him into service so that he might learn something
about ships.
In 1942 Hillenkoetter organized an Intelligence Center at Pearl
Harbor for Admiral Nimitz and won his commendation. Then General
Donovan tried to get him to take charge of OSS operations in the
Pacific, but the Navy would not release him. After the war he returned
to Paris, where he was engaged in collecting intelligence when he
was ordered, against his wishes, to Washington to become Director
of Central Intelligence.
Admiral Leahy and Navy Secretary Forrestal recommended Hil-
lenkoetter to their fellow members of the National Intelligence Au-
thority 2 when the Army asked to have Vandenberg returned for high
' Adapted from a history of central intelligence to 1951 prepared by the author
in 1953. For previous portions see Studies VIII 3 p. 55 if, X 2 p. 1 if, XII 1. p. 55 If,
XII 3 p. 79 if, and XII 4 p. 73 if.
2 Predecessor of the National Security Council.
Approved ForrRelease 2005/04/28 : CIA-RDP78TO3194A0003
WUART~ PAGES 33-56
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL DCI Hlillenkoetter
command in the nascent USAF. It was on February 17, 1947, that
the NIA and the President approved this assignment for the recently
promoted Rear Admiral, effective when Vandenberg should leave.
The date is to be noted. It was but five days after Vandenberg had
been named, as DCI, executive agent for the Secretaries of State,
War, and the Navy in intelligence matters, an event which was to
have a decided effect upon Hillenkoetter's administration of the
Central Intelligence Group and its successor Agency.
From the point of view of central intelligence, it may well be
said that General Vandenberg should not have been called back into
military service at that time. He had been in charge of the CIG
for less than a year; its new offices were not in full working order.
He had just established in the minds of the departmental secretaries
that the DCI ought to be their executive agent. He had not convinced
the departmental chiefs of intelligence that he was an officer above
[hem, not under their control. They were not accepting the distinc-
tion between advice and consent. They were still, as Vandenberg
left and Hillenkoetter came in the spring of 1947, endeavoring to
have the business of the DCI come before them, constituting the Intel-
ligence Advisory Board, for consent or dissent on its way to the Na-
tional Intelligence Authority.
General Eisenhower, responsible in large part for the recall of
Vandenberg to the Air Force, may have known little or nothing of
these matters. But he readily agreed, testifying on the pending CIA
legislation that May, that frequent change was wrong; there should
be stability in the office of Director of Central Intelligence. Three
years, Eisenhower then thought, should be the least term of service,
subject of course to exigencies.
One may wonder why the third DCI was not drawn from the
Department of State. It was, so to speak, the State Department's
turn after one each from the Navy and the Army. There was in fact
a plan fostered in the State Department to make Allen W. Dulles
the first civilian DCI. Robert Lovett had mentioned him to the
secretaries in November 1945; his effective work for OSS in Switzer-
land had attracted attention. He was publishing a book on his ex-
periences. His views had been sought on scientific intelligence by
the Technical Advisors of the Joint Research and Development Board.
Ile was soon to give testimony before Congress on the need for
central intelligence and its possibilities as a civilian career.
App' ived For Release 2005/04/28: CIA-RDP78T0 t 0?W66k0005-7
ApprB~?$Fpenkoestese 2005/04/28: CIA-RDP78T031L96M?J9M,&4005-7
No answer to the question can be final. There were personalities in-
volved. President Truman's own ideas and opinions of men had been
at work when he abandoned the Office of Strategic Services, let Dono-
van return to his law practice, and established the Central Intelli-
gence Group; then in the first days of CIG Secretary Byrnes raised
objections which led Truman to emphasize that this was his per-
sonal information service and Admirals Leahy and Souers his personal
representatives.3 Congressional antipathies toward the Department of
State were endemic for many reasons, including the suspicion that
it was infested by radicals. But the most important factor may have
been the influence of the Army and the Navy, supported by Admiral
Leahy, who were uneasy at the prospect of a preponderant central
intelligence organization now moving from the basis of executive
order to institution by law.
Legal Status and Practical Problems
The Central Intelligence Agency would be created by the Na-
tional Security Act of July 26, 1947, whose main purposes were the
establishment of an independent Air Force and the unification of the
military departments under a Secretary of Defense. Much work had
gone into drafting an enabling act for the CIA, but it was decided
that the time was not ripe for so complete and detailed a measure.
Some of its provisions were too controversial and subject to attack
by other agencies; objections would at least delay the passage of the
unification act.
In the draft National Security Act proposed by the President, the
brief section devoted to the Central Intelligence Agency provided
essentially only that such an agency, under a DCI, should take over
from the CIG the functions it was performing under executive di-
rection and should be responsible to the National Security Council,
replacing the National Intelligence Authority. The Congress, how-
ever, because of fears that such a carte blanche to the Executive might
some day be abused, added amendments in which some functions,
prerogatives, and limitations of the new Agency and the DCI were
spelled out.
Headed by a DCI who might be drawn from either military
or civilian life, the Agency, according to the Act now before Congress
in final form, was to advise the NSC on the policies and objectives
Approc T use 2005/04/28: CIA-RDP78T03194A000300010005-7
Appre Ffr j ase 2005/04/28 : CIA-RDP78T03194A000300010005-7
DCI Iiillenkoetter
of the national intelligence mission and make recommendations for
the correlation of departmental intelligence activities. It would cor-
relate, evaluate, and disseminate the national intelligence product.
It would have no police powers and would not infringe on the in-
ternal security functions of the FBI. All intelligence relating to the
national security should be open to the inspection of the DCI, and
he was responsible for safeguarding the sources and methods of in-
telligence. He could terminate any CIA employee at his discretion.
The Agency should perform such services of common concern as
the NSC might judge to be most efficiently so centralized, and it
should have other functions and duties related to intelligence that
the NSC might assign.
These stipulations followed generally those of the President's Di-
rective of January 22, 1946, which had set up the CIG. There were
slight modifications and differences in emphasis. There was now less
distinction made between the functions of the Agency and those
of the DCI with respect to the departmental intelligence agencies,
and the DCI was no longer empowered to inspect the activities of
the latter. His right to fire employees at discretion was new; strictly,
in CIG he had no employees of his own. A significant omission from
the Act was any provision for an Intelligence Advisory Board com-
posed of the departmental intelligence chiefs to work with the DCI.
He was empowered to appoint an advisory committee if he wished.
But the departmental chiefs were determined that the IAB should
he perpetuated and should have governing functions. They had
been annoyed that Vandenberg insisted upon being in a sense their
superior, certainly not their servant. Now Hillenkoetter, a newcomer
among the admirals and generals, was made at once sharply aware
of the animus toward Vandenberg for getting himself designated the
executive agent of the Secretaries of State, War, and the Navy. The
military men let Hillenkoetter know that the Army and. Navy had
been in existence a long time while he was merely head of a civilian
agency but recently established.
Vandenberg had urged that the DCI be designated Advisor to
the NSC in the National Security Act. This suggestion was too con-
troversial, but the concept remained in the CIA function of advising
the NSC on intelligence matters pertaining to the national security.
Admiral Hillenkoetter thus had authority from Congress to advise
the National Security Council if he chose without first consulting a
board of departmental intelligence chiefs-unless of course the NSC
App-11A ved For Release 2005/04/28: CIA-RDP78T0A-16WM40005-7
Appro,y& HFI~en" elkep ea a 2005/04/28 : CIA-RDP78T031 " 9. l05-7
should direct him so to consult. This direction the members of the
expiring Intelligence Advisory Board were determined to obtain.
The new DCI furthermore inherited complicated relationships with
the joint Chiefs of Staff and the Research and Development Board
in the national military establishment, and with the Atomic Energy
Commission quite apart from the latter.4 The production and delivery
of scientific intelligence-vital to all three, the joint Chiefs, the RDB,
and the AEC-would have been difficult enough to accomplish had
there been complete cooperation among the departmental intelligence
services and the central intelligence organization, as there was not.
Matters were still to be arranged in detail with the Federal Bureau
of Investigation, particularly with regard to the coordination of counter-
espionage activities. The problem would trouble the CIA Office of
Special Operations for some time to come.
Admiral Hillenkoetter had also to contend with internal turbulence
and disagreement due to ceaseless rows among the ambitious or
pertinacious or zealous men who are found in any young and growing
enterprise. There was friction between the Interdepartmental Coordi-
nating and Planning Staff and the Office of Reports and Estimates.
Within ORE, the conflict between its Branches and Intelligence Staff
had brought about a reorganization in less than a year after its estab-
lishment to replace the Central Reports Staff.' Boundaries between
the Office of Operations and the Office of Special Operations were still
to be marked at every point. Within OSO, just completing the absorp-
tion of the Strategic Services Unit which had preserved some wartime
assets of the OSS, there were plans to shift secret operations from a
functional to a geographic organization.
Something had to be done to stop the Intelligence Advisory Board's
interminable bickering and delay over every issue. The Interdepart-
mental Coordinating and Planning Staff which General Vandenberg
had established to work for him with the IAB had been effectively
thwarted in that purpose by the interposition of successive ad hoc
IAB committees. This battle continued as Hillenkoetter took up the
task of revising the directives of the old NIA and CIG for the new
National Security Council. In view of the great amount of work done
on them through the previous year, this should have been a relatively
simple task. It proved to be far from that.
`See Studies XII 4 pp. 86-94.
See Studies XII 4 pp. 75-78.
Approve0o~Refease 2005/04/28 :CIA-RDP78T03194A000300010005-7
AppEcbvt IFIMM ase 2005/04/28: CIA-RDP78T03194A000300010005-7
DCI Hillenkoetter
Three Anti-Centralization Thrusts
When Admiral Hillenkoetter took responsibility as DC'I and head
of CIG on May 1, 1947, Admiral Inglis with close support from
General Chamberlin was pressing measures in the Intelligence Ad-
visory Board which General Vandenberg had opposed. One of these
would disperse the production of intelligence among the departments
according to their dominant interests, as had been done for collection.6
To complicate the issue, controversy over air intelligence was rising
between the Navy and the Air Forces which were about to become a
separate department under the National Security Act. The Navy
wished to keep its own air intelligence.
Another measure called for redefining "strategic and national policy
intelligence" notwithstanding the fact that an explicit formula had just
been established by the National Intelligence Authority.? The produc-
tion of this final intelligence-coordinated national estimates for the
makers of policy-was the responsibility of the Director of Central
Intelligence. Admiral Inglis, however, would have it made clear that
the control of "operational" intelligence was still reserved to the armed
services. In other words, the DCI would have to produce his national
estimates without access to items of military information, however
pertinent to those estimates, if the service chose to withhold that knowl-
edge from his estimating staff. Inglis maintained that "strategic" intel-
ligence and "national policy" intelligence were separate and distinct,
not the unitary concept of General Donovan, who had originated the
phrase, and others who had followed him in central intelligence.
The third measure to greet Admiral Hillenkoetter as he came to his
first meeting with the IAB on May 15, 1947, was Admiral :[nglis' plan,
first submitted the preceding February 20, to have all recommenda-
tions of the DCI to his superiors pass through the IAB. The agenda
for a meeting of the NIA should be referred beforehand to the IAB
together with copies of all papers to be considered. IA]3 members
should either informally express concurrence or furnish comments to
the DCI for transmission to the NIA. On important matters any mem-
ber might request a formal IAB meeting to discuss proposals before
they were submitted to the NIA.
The counterpart paper prepared in CIG on behalf of the DCI em-
phasized that the IAB was advisory to him. He was not responsible
'Ibid. pp. 80-83.
'Ibid. p. 86.
App` ved For Release 2005/04/28: CIA-RDP78T0 tXQWbb 10005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A0003000 005-7
DCI Hillenkoetter CONFIDENTI
to it but to the NIA. He was not at liberty to reveal to the IAB all
recommendations which the NIA requested of him. This of course
was so true with respect to budgeting and expenditure that the de-
partmental intelligence chiefs, though curious, never sought to interfere
in these matters, thus prejudicing their right with regard to others.
On the first of the three measures, decentralization of production,
the new DCI endeavored to maintain the position of his predecessor
that he should have supervision over the production of intelligence by
the several agencies. The IAB, however, agreed to successive phrasings
of a directive which left out all specific reference to the DCI and
stipulated merely that the production work should be done. The
minutes of the meeting do not state that Admiral Hillenkoetter ex-
pressed disapproval, but neither do they record his assent. Although
he let the action of the IAB pass for the moment without disapproval,
he still had the right to recommend his own ideas to the NIA along
with the IAB proposal.
The hope had been that there would be few split opinions in the
IAB, that differences would be removed in its deliberations so that the
NIA would receive from the DCI and his advisers considered and
concerted judgments, the result of true coordination. It was ideal to
talk of thus resolving problems and reconciling opposite views. But
the right of decision had to belong either to the DCI or to a majority
of the Board. In terms of political science, sovereignty must reside
somewhere, either in the will of an individual or the tyranny of a
majority.
The issue was clearly drawn. Admiral Hillenkoetter inherited from
General Vandenberg the view that the position of the DCI was the
official central intelligence position regardless of dissents. Admiral
Inglis, General Chamberlin, and other chiefs of intelligence in the
departments clung to the opinion that they had inherent right to make
the IAB a working staff of the National Intelligence Authority which
their secretaries constituted with Admiral Leahy, personal representa-
tive of the President. In accordance with this theory, the IAB was
entitled to know the agenda of the NIA in advance. Navy Secretary
Forrestal had come to this conclusion by June 26, 1947, when the
NIA met for the last time.
Agent of the Secretaries
The theory had been given some support by Admiral Leahy. In the
preceding July he had admonished Vandenberg that the President held
Approc ORWALe 2005/04/28: CIA-RDP78T03194A00030001( 5-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL DCI Fllenkoetter
the departmental secretaries primarily responsible for coordinating in-
telligence activities. He had advised Vandenberg to drop the word
"agent" and put in its place the phrase "act for" the NIA." Since then,
however, he had modified his position to endorse Vandenberg's desig-
nation as executive agent of the secretaries." Now in the NIA meeting
of June 26, 1947, Leahy stood by this position, and when interviewed
on the subject in 1952 he still favored the idea that the DCI should
be individually responsible. There should be room for dissent, he said;
the policy-makers had the right to accept the dissenting view. But-
and he made no distinction between estimates and other questions
in this respect-the DCI alone was responsible for the central intelli-
gence opinion, in questions of coordination as well as other matters.
In the historic final meeting of the National Intelligence Authority
on June 26, 1947, however, Admiral Hillenkoetter declared before
Secretaries Marshall, Patterson, and Forrestal and Admira! Leahy that
the DCI did not need the authority which they had given to General
Vandenberg on February 12, to act as the executive agent of the
Secretaries of State, War, and the Navy. Its revocation, Hillenkoetter
said, would create better feeling with the agencies represented on the
Intelligence Advisory Board. If he should need the authority in the
future he would he the first to request its reinstatement. Both General
Chamberlin and Admiral Inglis were present to hear this abnegation.
Secretary Patterson, who had favored the grant modified by the
right of an aggrieved agency to appeal through its secretary, would
offer no objection to the withdrawal if the authority were no longer
needed. Admiral Leahy remarked that he saw no reason for withdraw-
ing it though he would agree if Hillenkoetter wished to have it re-
voked. Secretary of State Marshall was concerned to know if the with-
drawal would adversely affect the relationship between the central or-
ganization and the departmental agencies; Hillenkoetter replied that
on the contrary he expected the relationship to improve, and Marshall
appeared to be satisfied. Secretary Forrestal, whose assent j:n February
had been fairly reticent, came out now with a definite stanE; the DCI's
authority to issue orders in the names of the secretaries, he said, made
CIG look like a Gestapo and caused unnecessary friction. Further dis-
cussion was not recorded. It was agreed to withdraw the authority.
'Studies XII 3 pp. 83, 88.
0 Studies XII 4 p. 86.
App Ebved For Release 2005/04/28: CIA-RDP78T0 9 iJ 0005-7
Approved For Release 2005/04/28: CIA-RDP78TO31~~NFIDEP~TIAL005-7
DO Hillenkoetter
Last NIA Directive
Admiral Inglis followed up the advantage which Admiral Hillen-
koetter had given him. He argued at length his plan for IAB control
of DCI recommendations in Hillenkoetter's second meeting with the
IAB on July 17, 1947. There were present the usual representatives
of the intelligence services and the aides who served on their ad hoc
committees. Mr. Eddy, for the State Department, took the side of the
DCI. But General Chamberlin, along with General McDonald for the
Air Forces, supported Admiral Inglis. The IAB was intended to be
something more than an advisory council, they said: it had authority
to commit the departments to action; it brought their intelligence serv-
ices into cooperation with the central agency.
The success of intelligence in government, declared Chamberlin, was
dependent entirely on cooperation. He called for an ad hoc committee
to draft a new paper. General McDonald supported him, and so an
ad hoc committee of the familiar persons took over once more the job
of trying to reconcile the fixed views of the intelligence chiefs and
the concepts of the DCI.
There was much discussion in the same meeting on the origin of
the concept "strategic and national policy intelligence." Admiral. Inglis
made clear that he was willing to accept the concept so long as control
over "operational" intelligence was not taken from the armed services.
It was finally agreed that his view should prevail until the joint Chiefs
of Staff had finished reorganizing their joint Intelligence Committee.
At that time the definition of "national" as distinct from "departmen-
tal" and of "strategic" as distinguished from "operational" intelligence
might be agreed upon among most if not all interested parties.
At the next meeting of the Intelligence Advisory Board-on July
31, five days after the President approved the National Security Act-
it agreed to ask that the National Security Council, when formed,
should continue all of the directives under which CIG and the IAB
were functioning until it could make such changes as it saw fit. Ac-
cording to the Act, its provisions should go into effect one day after
the Secretary of Defense took office or the sixtieth day after it became
law, whichever came earlier. This gave time for the IAB and its
ad hoc committee to finish up the business of gaining control of the
DCI. The result was one more NIA directive under the old. setup
before Forrestal became Secretary of Defense-on September 17, 1947,
in the midst of rising tension over Russian activity against the Marshall
Plan.
Appr&J@bJ Wiese 2005/04/28: CIA-RDP78TO3194A00030001& 05-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL DCI I-lillenkoetter
The report of the ad hoc committee reconciled the views of the
DCI and the TAB by finding for the most part in favor of the latter.
It should have some governing power. All recommendations from the
DCI to the National Intelligence Authority and its successor, the
National Security Council, should be submitted to the TAB in writing,
with the necessary attachments and with voting slips denoting con-
currence, dissent, or the request for an TAB meeting. Its members
should have seven working days to consider each subject. Any recom-
mendations, proposals, or other papers which any TAB member might
originate should similarly be sent to the others. A recommendation by
two or more members would be submitted to the NIA or NSC along
with the opinion of the DCI.
A suggestion of the ad hoc committee for incorporating that part
of the Fifth NIA Directive which authorized the DCI to act for the
NIA "in coordinating all Federal foreign intelligence activities related
to the national security" met resistance from both the Army and the
Air Forces. It involved control over matters of espionage and counter-
espionage which the Army was not yet willing to concede in any form
to the Central Intelligence Agency. This part of the ad hoc committee's
plan for control by the TAB was therefore deleted.
Admiral Hillenkoetter allowed the report of the ad hoc committee
on Admiral Inglis' original proposal, thus modified, to become the
Eleventh NIA Directive on September 11, 1947. It was but nine days
before he took office under the provisions of the Act of Congress, when
the National Intelligence Authority ceased to exist. Why he did not
withhold his approval of a measure placing him under the restrictions
of his Advisory Board is not to be explained by a desire to reverse
Vandenberg's policy. He had under consideration at the time a pro-
gram for continuing the essentials of that policy. He stood ready to
accept advice and to safeguard the right of dissent but would not
yield his independent right of making recommendations to his supe-
riors in the National Security Council.
Perhaps it would have been to his ultimate advantage if Hillen-
koetter had settled the issue then and there. But he found tempers
so high and feelings so hard that, as he put it later, he preferred to
indulge in a little "chicanery" and let the Eleventh Directive go through.
After all, he said, both sides must have known that it would not remain
AppiWved For Release 2005/04/28: CIA-RDP78T031 Mbl PAI0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
DCI Hillenkoetter CONFIDENTIAL
determining. He hoped that in time everybody would cool. Whether
or not the DCI was called the executive agent of the secretaries was
not of great consequence.
On the same September 11, 1947, Admiral Hillenkoetter sent to the
Secretaries of State, War, and the Navy and Admiral Leahy a memo-
randum of suggestions for the first meeting of the National Security
Council which they were about to constitute, with a copy for Admiral
Souers who had been named Executive Secretary of the NSC on Au-
gust 17. Hillenkoetter suggested that he and his associates in CIA
should prepare papers on. a set of new NSC directives within sixty days
following the establishment of the NSC. This administrative detail
had not been discussed with the IAB in accordance with the provisions
of the Eleventh NIA Directive. Moreover, Hillenkoetter went on to
suggestions of policy which also had not been discussed with the IAB.
At least we have yet to find evidence that they had.
One was that there should be a subcommittee of the National
Security Council to act as the NIA had acted in control and supervision
of the DCI and CIG. The idea had been discussed in the congressional
hearings, where Allen Dulles especially had advocated a small govern-
ing authority over the DCI and CIA and where Donovan of course
still insisted upon having only one responsible officer, the Secretary
of Defense, between the DCI and the President. Hillenkoetter sug-
gested that the subcommittee to furnish "the active direction" might
be merely the Secretaries of State and Defense. His alternative was
to add the Secretaries of the Army, Navy, and Air Force, but he pre-
ferred not to, so that the Department of State would not be over-
shadowed by the military establishment. And then he proposed that
the Director of Central Intelligence should sit with the National
Security Council as "observer, counsel, or advisor," to keep in touch
with the thoughts of the NSC and to answer its direct questions.
In August there was some uncertainty whether Hillenkoetter would
continue the Intelligence Advisory Board. By September 19, however,
its members had been informed that he intended to use his authority
under the National Security Act and have an advisory committee to
help him carry out his functions and those of his Agency. He told them
that he wished also to readjust the interdepartmental Coordinating
and Planning Staff so that it might work with a standing committee of
the new Intelligence Advisory Committee. This one standing committee
for the departmental intelligence chiefs would take the place of the
successive ad hoc committees they had been using. Members of the
Approc d TTbe 2005/04/28 : CIA-RDP78TO3194A000300010b5-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL DCI Hillenkoetter
Standing Committee would remain in their respective agencies but be
ready on occasion to go over to CIA and confer with ICAPS. ICAPS
too would be composed of representatives from the departments, but
these men, as officers in CIA, would not always be able to vote accord-
ing to the wishes of their departments. The hope was that the Standing
Committee for the IAC and ICAPS for the DCI would somehow be
able to reconcile differences and reach coordinated recommendations.
But it did not work out as Hillenkoetter hoped. The Standing Com-
mittee was to behave like its predecessors, the ad hoc committees of the
old JAB.
On September 19 Hillenkoetter sent formal recommendations to the
National Security Council for its first meeting on September 26: all
of the NIA and CIG directives should continue in full force until
changed; CIA should have sixty days in which to submit revisions.
He presented his plan for the new Intelligence Advisory Committee
in a separate memorandum. Then on the following day, September 20,
1947, he took office as the Director of Central Intelligence under the
National Security Act.
Ilillenkoetter's General Counsel advised him on July 29, 1947, that
under the National Security Act, just approved by President Truman,
the DCI as head of CIA was "solely responsible for the performance of
the Agency's duties." He therefore could go to the NSC without wait-
ing upon advice from a committee. Any committee which he chose
to have would be his own. Its membership might be supplied from
the respective intelligence services, but they would sit at his request.
They might take adverse opinions to their own departmental heads,
who constituted the NSC with other appointees of the President. But
his advisory committee would in no sense be a governing board to
control his thought or action. There was no idea that its members had
first to give their consent before he could proceed.
Admiral Hillenkoetter, in his memorandum of September 19 to the
NSC, accordingly pointed out that he was not obligated to continue the
old Intelligence Advisory Board. He might have a committee which
for all intents and purposes would continue the Board, but it would be
more subject to his control. He requested therefore that the National
Security Council should authorize participation by members from the
several departments in what he named "the Director of Central In-
telligence's Intelligence Advisory Committee." He would have repre-
Apppved For Release 2005/04/28: CIA-RDP78T031 QftiQQ0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
DCI Hillenkoetter CONFIDENTIAL
sentatives of the State Department, of the Army, Navy, and Air Force,
and of the Atomic Energy Commission to serve as the permanent
members of the committee. Others would come at his invitation.
The DCI would supply the secretariat for the committee. It would
meet on his call as chairman. Any dissent by a member of the com-
mittee would be formally recorded so that it would accompany the
DCI recommendation to the NSC. The DCI would avoid discussion
of any matters on which members had not yet studied the related
papers and obtained if possible the opinions held in their respective
departments. He wanted a concerted opinion before making a recom-
mendation to the NSC. In deference to the wishes of Admiral Inglis
and General Chamberlin, Hillenkoetter's proposal provided also that
recommendations from two or more members of the committee would
be presented to the Council.
The first response to Hillenkoetter's suggestions of which we have
record came on September 23 from Robert A. Lovett, Acting Secretary
of State. (Secretary Marshall was attending the Assembly of the
United Nations in New York.) The proposal for a subcommittee of
the Secretaries of State and Defense to handle CIA affairs for the
NSC found favor with Lovett, but he wished to add the personal rep-
resentative of the President in order to make it an authority com-
parable to the old NIA. The DCI should attend as a non-voting
member. It would be desirable also to have him present in the meet-
ings of the full NSC.
Lovett wrote that the DCI should consult with an advisory board
to insure "prior consideration by the chiefs of the intelligence services"
of matters which should come before the NSC. This made clear that
the Department of State wished there to be an advisory board for
coordination at the so-called working level; the secretaries ought to
have the benefit of its deliberations when they discussed intelligence
matters in the NSC. There was no implication, however, that the DCI
should be subject to a governing board of the departmental intelli-
gence officers.
The second reaction to Admiral Hillenkoetter's program came in the
National Security Council on September 26. It adopted his recom-
mendations that the old directives remain in full force and that sixty
days be allowed in which to submit any necessary revisions. The In-
telligence Advisory Board, therefore, continued to have legal stand-
ing until it should be replaced by a new directive. It was decided that
the DCI should attend all NSC meetings as observer and adviser.
App& 4ase 2005/04/28: CIA-RDP78TO3194A0003000:6005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL DCI Flillenkoetter
He was authorized to submit the CIA budget for 1949 to the Bureau
of the Budget.
No action was taken at this meeting with regard to establishing a
subcommittee to direct the Agency, nor is there record of opinion on
Hillenkoetter's proposal for an advisory committee. But there is evi-
dence elsewhere that there could have been considerab'.'.e discussion
of these DCI suggestions in the first meeting of the NSC. Secretary
Royall of the Army wrote on October 6 that the subcommittee was in-
compatible in his view with the purpose of the National Security
Council, which was supposed to operate as an entity on all matters
within its cognizance, giving broad directives to the DCI.
This statement might have been construed as an invitation to Admiral
Hillenkoetter to manage the CIA as he saw fit, looking to the NSC
only for guidance in large matters of policy. But it was quite apparent
that the Secretary of the Army did not so intend. Royall was taking
exception to the suggestion of a small governing board consisting of
the Secretaries of State and Defense to the exclusion of the Secretaries
of the Army, Navy, and Air Force. His demurrer was closely related
to other things to come. Admiral Souers knew this well, and prevailed
upon Admiral Hillenkoetter to withdraw the suggestion or. October 17.
Hillenkoetter's suggestion of a new advisory committee came under
revision in the office of the NSC's Executive Secretary. Both Admiral
Souers and his assistant, James S. Lay, had been in the Central Intelli-
gence Group from its beginning. Together they changed the wording
in several places with Admiral Hillenkoetter's consent. The DCI was
made to recommend rather than request. His proprietary emphasis on
the DCI's advisory committee was softened-"the Intelligence Ad-
visory Committee proposed by the Director of Central Intelligence."
Souers eliminated the provision that recommendations from two or
more members of the IAC were to be sent by the DCI to the National
Security Council. He did this on his own responsibility as Executive
Secretary, on the grounds that the chiefs of intelligence already had
proper access to the NSC through their superiors, the secretaries of
the departments. This provision, drawn from the Inglis plan, is not to
be confused with the stipulation that the dissents of IAC members be
submitted to the NSC along with the opinion of the DCI. The DCI
might properly report disagreements with his own position that came
out in the deliberations of his advisory committee; but :here was no
reason he should be used as a vehicle for the initiatives cf the depart-
mental chiefs of intelligence. As Hillenkoetter remembered it, after
Appried For Release 2005/04/28: CIA-RDP78T031@ggk@005-7
enV
ApprBf l-fil?r eI tare 2005/04/28: CIA-RDP78T031L9 BUTAQ005-7
some discussion he flatly refused to relay to the NSC their proposals
that he opposed.
Approvals of the plan for the advisory committee as modified by
Souers and Lay came back to the Executive Secretary from Secretary
of Defense Forrestal on October 10, from Secretary of the Air Force
Symington on October 17, and from Acting Secretary of State Lovett
and Chairman of the National Security Resources Board Hill on Oc-
tober 20. No replies from the Secretaries of the Army and Navy are
filed with these, but a memorandum from the Secretary of the Army
for the Executive Secretary was sent on November 26, 1947, through
the office of the Secretary of Defense. Forrestal's Special Assistant kept
a copy in forwarding it before the Secretary had yet seen it.
Secretary Royall opposed Hillenkoetter's plan. He declared that the
DCI had been required by the first NIA directive to refer all recom-
mendations through the intelligence Advisory Board, which therefore
not only performed the service of advising the DCI but also insured
that there would be full departmental coordination of all matters before
they were submitted to the NIA. He insisted that the new Intelligence
Advisory Committee should have a mandatory review of the same
nature. It was due notice that in the NSC the Army would support
General Chamberlin and Admiral Inglis rather than Admiral Hillen-
koetter.
On Wednesday, December 3, a formal communication from the
National Security Council to the DCI enclosed Secretary Royall's
memorandum and requested DCI comment on it for "concurrent
consideration." Hillenkoetter did comment within the week, orally
before the departmental secretaries and chiefs of intelligence, Souers,
and Forrestal in the office of the Secretary of Defense. Hillenkoetter
remembered this conference vividly, he said, as one of the dramatic
moments in his life. He could recall the words almost as they were
spoken. But let us bring to the same point the parallel story of the
NSC directives before we enter into the historic occasion.
The NSCID Battleground
It was evident by this time in another quarter that the intelligence
services of the armed forces were entrenching against Hillenkoetter
as they had in the preceding fall against Vandenberg. Members of the
Interdepartmental Coordinating and Planning Staff and representatives
of CIA operating offices had gone systematically to work revising and
ApprovQeciFFor Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
Appreoe j Jirse 2005/04/28: CIA-RDP78T03194A000300010005-7
DCI Hillenkoetter
consolidating the old NIA and CIG directives according to the Sep-
tember 26 instruction of the National Security Council. The NSC direc-
tives "NSCIDs," were to lay down the principles, and directives issued
by the DCI, "DCIDs," would carry the relevant administrative orders.
Drafts of the new measures were ready by October 16 and circulated
for discussion within the Agency on October 20. Three days later
revisions had been completed and forwarded to the DCI's deputies,
assistants, and legal counsel for further suggestion. The directives were
practically in order for submission to the Intelligence Advisory Board,
as Acting Secretary Lovett had advised be done. There had been no
concealment of this activity within the Agency. The Director had sent
a memorandum about the undertaking to the departments on October 9.
The only reply to the October 9 memorandum came from W. Park
Armstrong, Jr., Acting Special Assistant to the Secretary of State and
representative of the Department on the IAB, and it reflected indirectly
the displeasure of the departments at this activity in the Agency. It
gave also a direct view of the tension between the State Department
and the members of the military establishment. It proposed that the
new directives should define intelligence in conformity with the con-
cept of national intelligence which Vandenberg had got approved on
February 12, 1947 by the National Intelligence Authority."" This would
hardly please Admiral Inglis.
Armstrong urged moreover that the DCI's right of inspection over
the operations of the intelligence agencies as well as their materials
be restored, as provided in the President's Directive of January 22, 1946.
But Armstrong would go farther and specify that the DCI should
determine the causes of omissions, inadequacies, or duplication and
propose corrective measures to the NSC. The suggestion may not have
been just a broadside aimed at the chiefs of intelligence in the armed
services. There were suspicions in CIA that Armstrong was thinking
of his own Department, where the chiefs of geographical areas op-
posed his work in research and intelligence just as they had McCor-
mack's.""
Armstrong's letter, however, was trained on yet another target. The
State Department had in common with the armed services antipathies
toward the Central Intelligence Agency. The proposal in regard to
the DC Xs right of inspection carried with it a repeal of the section
Ibid. p. 86.
"Studies XII 1 p. 72.
Approved For Release 2005/04/28: CIA-RDP78T03fQW5 J I'0005-7
Approp AR 2005/04/28: CIA-RDP78T0319 P 11&j05-7
in the Fifth Directive authorizing the CIG to undertake research and
analyses.12 Armstrong would have "centralization of functions" only
when, by agreement among the departments and CIA, such functions
could be "most beneficially and effectively accomplished on a central
basis." His contention was. that the intelligence agencies of the depart-
ments should each produce finished intelligence in the fields of their
dominant interests, and the DCI should perform the inspection to see
to it that they did. CIA would not produce national intelligence from
source materials which it had processed for itself but from the finished
departmental intelligence.
Along the same line of reasoning, Armstrong proposed to abandon
the directive of February 12, 1947, in which CIG had laid down the
national requirements for the collection of intelligence on China.13
These, classified as economic, social, political, scientific, and military,
were matters of primary interest to the respective departments and
not the immediate concern of the central agency. With this sug-
gestion, Armstrong could count upon entire agreement from General
Chamberlin.
The CIA reply to Armstrong on November 3 was lacking somewhat
in candor. It said that almost everything he desired had been in-
corporated in the drafts which would be complete and ready for
delivery to the departmental chiefs of intelligence on November 10.
Actually, there was no provision in the drafts for CIA's abandoning
research and analysis on "source materials" and depending on finished
intelligence from the departments for the construction of national
estimates. The directive with regard to the national requirements for
collection in China, too, was to be incorporated in a new NSCID. But
then Armstrong was to have another chance in the IAB and, as it
proved, in yet another ad hoc committee if he wished to press his case.
Telephone calls went out to the members of the IAB by November
13, inviting them to a meeting with the DCI on November 20, 1947,
to discuss the proposed NSC and DCI directives. These were to go to
the NSC on November 26, as it had directed in its first meeting two
months before.
Stalling in the IAB
The conference of the intelligence chiefs with Admiral Hillerikoetter
on November 20 was notable, but not for analysis and criticism of
'a Studies XII 3 p. 81 f.
1' Studies XII 4 p. 83 if,
CONFIDENTIAL 9
Approved For Release 2005/04/28 : CIA-RDP78T03194A00030001 x005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL DCI Hillenkoetter
the proposed directives. The chiefs spent time arguing whether or not
they were the Intelligence Advisory Board. It was idle discussion. The
IAB continued to exist so long as. the First and Eleventh NIA Direc-
tives remained in effect, and the NSC had decided on September 26
that the old directives should continue in full force at least sixty days.
Admiral Hillenkoetter may have befogged the issue by pointing to the
fact that there no longer was an NIA to which the Board might report,
but he himself accepted the IAB as. such when he accepted its request
that the proposed NSCIDs and DCIDs be referred to an ad hoc com-
mittee for discussion with ICAPS.
The meeting of the IAB on November 20 was notable, then, for the
demeanor of its members. The naive observer might have thought
that they were relatively uninformed and so piqued at being taken by
surprise, that being conscientious men who did not like to be un-
prepared for their duty, they were provoked because they were not
ready. We have followed these men and their aides, however, through
a year of meeting and maneuvering over the duties and responsibilities
of the Director of Central Intelligence, the facilities and functions of
the central intelligence organization, and the relationship which the
DCI was supposed to have with the departmental intelligence agencies.
The thought is hard to resist that the IAB members were present
on this occasion not to cooperate in an enterprise of common concern
but to take exception to this, to be hesitant over that, in a word to
stall and delay. They had had not just the ten days since receipt of the
November 10 memorandum to consider the proposals. They had been
engaged with almost all of these matters as members either of the
TAB or of its ad hoc committees. for more than ten months.
Instead of pressing his case for a quite different concept of
central intelligence Armstrong announced that the State Department
had not been able to arrive at a firm position on the directives. Secretary
Marshall was leaving for London; Mr. Lovett had the matter in hand,
but the Department could not be committed as yet. Hillenkoetter
hoped that the members of the Board, as heads of the intelligence
agencies, might be able at least to get through the first four directives,
having to do respectively with the duties and responsibilities of the
DCI, with collection, with production, and with the objectives of na-
tional intelligence. But Armstrong insisted that as these matters were
coming before the National Security Council, the head of each intel-
ligence agency must have the position of his department established
before he could speak finally.
Apbved For Release 2005/04/28: CIA-RDP78T0A9Q AR111'Ba0005-7
Appr?vdI.. ROMPe 2005/04/28: CIA-RDP78T031a"X( 005-7
This was turning the function of the advisory committee upside down.
If this were the true interpretation, the DCI could not seek the advice
of his advisory committee with regard to his recommendations to the
secretaries in the NSC until they themselves had made up their minds
on what they wished their intelligence officers to advise the DCI to
advise them. Admiral Inglis cut straight to the point. As chief of Naval
Intelligence, he said, he was not the "mouthpiece of the Secretary."
What Inglis had to say in the meetings was his own opinion.
But Admiral Inglis did not like the present situation. The Agency
had produced these papers "on its own initiative and its own author-
ity"; they should have been considered by the IAB while being formu-
lated. Had they been new papers, there would have been more strength
in his argument. But they were revisions of things with which Inglis
himself had been conversant for much more than a year.
General Chamberlin concurred that the procedure being used by
CIA here was difficult for them. Chamberlin had other things to do
as chief of intelligence for the Army; he could not turn his responsibility
off or on "at somebody else's command." As far as he himself was
concerned, he said, he had come "unprepared to discuss these papers,"
but his subordinates had worked on them and found many things to
challenge. There were "important differences of principle," he said,
that had never been approached, nor included in past directives.,
What those principles were he did not specify.
Later on, however, he revealed a marked difference in principle
between Admiral Inglis and himself over the propriety of expressing
their own views in the advisory committee. General Chamberlin ob-
jected to a procedure in the committee which might "drive a wedge"
between the chief of intelligence in a department and his superior
the secretary; this completely destroyed "command principles." He
would be inclined, he said, "to keep quiet at all times" because he
would be afraid that an action in the committee would be appealed
over his head.
General McDonald for the Air Force then unleashed his statement.
Analysis of the proposed directives had revealed to him, he said, that
it was going to be necessary for him to recommend many changes. It
would be impossible to cover the directives that afternoon; no attempt
therefore should be made to go into either their philosophy or their
composition. There should be an ad hoc committee "for the purpose
of reconciling views." And so there was another such committee, made
up of the familiar aides who by now must have been expert on the
CONFIDENTIAL 5
Approved For Release 2005/04/28 : CIA-RDP78T03194A0003000'f0005-7
App~p~ l~~ ~~ase 2005/04/28: CIA-RDP78T033D 194A00030 0t 10005-7 lenk
philosophies, the details, and most assuredly the conflicting views. This
was to become known as the Ad Hoc Committee.
Admiral Gingrich, who was relatively new, having come on the IAB
to represent the Atomic Energy Commission, went to the heart of
the situation. "One point I might mention, Hilly," he said, "there
doesn't appear to be any provision in these first two directives here
for an intelligence Advisory Committee, or Board, such as is executed
under our old setup." Hillenkoetter replied that the law gave him the
power to appoint an advisory committee. All present must have known
that he had submitted his plan to do so on September 19. The mem-
bers of the IAB in any case were not to be diverted from their intention
to have the NSC direct him to establish such a committee as they
wished. The matter went to the Ad Hoc Committee.
No one could have been surprised at the revisions of the drafts by
that group. The changes, often small in detail, were persistently
designed to restrict the DCI, to make him defer to the Intelligence
Advisory Committee, and to remove his supervisory authority over the
departmental intelligence agencies. The new draft of NSCID 1 out-
lined the duties of the DCI and his relations with the IAC: The IAC,
consisting of the intelligence chiefs from the Departments of State,
Army, Navy, and Air Force, the Joint Chiefs of Staff, and the Atomic
Energy Commission, was to advise the DCI on "all recommendations
and advice" to the NSC and upon his own directives or administrative
orders for carrying out the NSC directives. He should act for the
National Security Council "through the Intelligence Advisory Com-
mittee." The coordination of intelligence activities should be accom-
plished "by recognizing primary departmental requirements and by
supporting the intelligence agencies."
The DCI was to disseminate intelligence subject to the security
regulations of the agency in which the information had originated.
He was to perform services of common concern as determined with
the TAC. He was to obtain personnel from the departmental agencies
in agreement with their intelligence chiefs. He was to arrange with
the latter for "surveys and inspections of departmental intelligence
activities."
Here the Ad Hoc Committee had made a slip, but it was soon
corrected. Though Armstrong for the Department of State recom-
mended DCI inspection of departmental intelligence activities, the
chiefs of intelligence for the armed services could not contemplate
such interference with their operations. When the measure came from
Appr red For Release 2005/04/28: CIA-RDP78T034Wb1Q3 J b005-7
Apprctyer I e ag#gp 2005/04/28: CIA-RDP78T0319 PP#j Rp05-7
the meeting of the IAB on December 8, the words "intelligence
activities" had given way to "intelligence material," and control of
even such inspection by the department concerned was restored
before NSCID 1 was issued by the NSC on December 12.
Admiral Hillenkoetter notified the Ad Hoc Committee on November
25 that he could not accept as a whole its revisions in the drafts of
the NSCIDs. He called another meeting of the intelligence chiefs
for December 8 to consider the changes which he would make in the
committee's proposals, and he sent those changes to them on December
1 so that they might bring to the meeting whatever statements of
nonconcurrence they chose to submit.
Records are not available for all of the determining events between
the action of the Ad Hoc Committee on November 24 and the meeting
of the IAB with Hillenkoetter on December 8. But memories of some
who participated are still keen. There is recorded evidence to show
why the chiefs of intelligence were in a different mood from that of
November 20. And the minutes of the meeting on December 8, steno-
typed but never circulated, have come to light.
When Hillenkoetter learned on November 26 of Secretary Royall's
opposition to his plan for the new Intelligence Advisory Committee,
he went to Forrestal. Forrestal had approved the plan in October.
There followed some days of telephoning and conversation, and then
Forrestal called a meeting of the armed service secretaries and their
chiefs of intelligence, a representative of the State Department, and
Souers. Hillenkoetter was there to explain his plan for the operation
of the Central Intelligence Agency under the National Security Act.
Forrestal had declared to Congress in the preceding spring that the
Agency, after the Security Council, would be the most important
institution in the forthcoming Act.
As Hillenkoetter recalled the scene in the office of the Secretary
of Defense, Forrestal asked for no opinions when Hillenkoetter had
finished his statement but turned to Admiral Inglis and General
Chamberlin on one side of the table. Forrestal did not include the
representative of the State Department in his glance. Nor, apparently,
was the representative of the Air Force in his line of fire. He spoke
directly to Inglis and Chamberlin: "You are not going to interfere with
this thing," he said. "It is going to run as Hillenkoetter says. Do you
both understand that now?" Hillenkoetter was quite sure of that last
Approvedorr elelase 2005/04/28 :CIA-RDP78T03194A000300010 5-7
Ap vNFERIrTIL RAelease 2005/04/28: CIA-RDP78TO3194A000300010005-7
~ DCI Hillenkoetter
question and of the remark to him later by Admiral Inglis: "He talked
to us like a couple of plebes. I guess that makes us your servants now."
The record is not yet clear whether this meeting came before or after
Forrestal received a note written on Friday, December 5, by Van-
nevar Bush, head of the Research and Development Board. It seems
likely that Bush's letter arrived shortly after he had told the military
and naval chiefs of intelligence what they were not to do. In any event,
the statements by Bush, chief adviser to the Secretary of :Defense on
scientific matters, added weight to Hillenkoetter's authority when he
met with the chiefs of intelligence again on Monday, December 8, to
discuss their differences over the NSCIDs.
Bush declared with effectively restrained language that the Central
Intelligence Agency was not in a good position to provide scientific
intelligence to the Atomic Energy Commission, and Mr. Souers should
be warned of the situation. To amplify his statement, Bush included
memoranda from officers in his organization who were in direct touch
with events. His chief of intelligence reported that under the leadership
of the State Department's representative the Ad Hoc Committee was
seeking more authority for the Intelligence Advisory Committee. The
director of his program division reported that the intelligence chiefs
wanted an executive order, apart from the NSC directive, to establish
the IAC as the "governing committee" of the CIA. In this situation
the officer responsible for scientific intelligence in the Agency was
"completely stymied." Bush urged that someone "at the highest level"
determine the relationships between CIA and the "operating" services
so that the production of "information, detailed intelligence, and
integrated strategic intelligence" could proceed.
Hillenkoetter read this statement in the meeting of December 8.
The response of General Chamberlin was that he was not conscious
there was any question whether the Intelligence Advisory Committee
was to be a controlling or an advisory body. "I frankly adm:.t," he said,
"it is an advisory body"; others might have a different opinion. He
felt that he had authority to commit his own department "on certain
things" in agreement with other members of the IAC and carry out
the decisions "loyally without any command to do so." Thus the IAC
could eliminate a lot of "minutiae" but would still be an advisory
committee.
The position was tenable, and it was logical after the admonition
from the Secretary of Defense that CIA was going to :run as the
Director of Central Intelligence said. But there had been some evolution
Apo&ved For Release 2005/04/28: CIA-RDP78T0S At bi10005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
DCI Hillenkoetter CONFIDENTIAL
in the thinking of the Army representative since the meeting on
July 17 when he had called the IAB "a little more than an advisory
body," and that on November 20 in which he maintained that the
DCI's right of appeal to the secretary of a department over the head
of its chief of intelligence destroyed "command principles."
There was action in the meeting of December 8 which the steno-
typist could not record. The memory of Hillenkoetter's General
Counsel, who was present, is certain on that score. Although the rec-
ord is one of friendly words in half-finished sentences, Hillenkoetter's
demeanor was as strong as Lawrence Houston ever saw him use.
Houston sat where he could observe faces and catch fleeting expres-
sions. As General Chamberlin's overtones conveyed his acknowledge-
ment that "Hilly" was the boss, Houston saw an aide of the General
"turn white." Admiral Inglis sat shaking his head in an unmistakable
no.
The representative of the Navy had attended nearly every meeting
of the IAB from its beginning under Souers in February, 1946. Ad-
miral Inglis had insisted all along that in most respects CIG, and
then CIA, should be a cooperative interdepartmental activity. To
the statement by Vannevar Bush that the Agency had to be either
"almost completely self-sufficient" or "a small coordinating body"
surrounded by strong departmental agencies, his response was now
that there could be a "middle ground" for the Agency. As an "in-
tegrated operating agency," he said, it should have as little interference
from the Advisory Committee as possible; the IAC should be "purely
advisory, and absolutely nothing more." But in the relationships be-
tween the central agency and the departmental intelligence agencies,
it should go beyond advisory capacity; it had something to do with
"liaison, coordination and implementation." That was his "philosophy,"
he said, "for whatever it was worth."
There was further discussion in general terms. But the remainder
of the meeting on December 8 was given for the most part to ex-
amining in detail revisions which the Ad Hoc Committee had made
in the NSCIDs. For the time being the Director of Central Intelligence
had his way. With the exception of the change regarding inspection
of "intelligence material" and the inclusion of a phrase regarding
"national policy" intelligence that was later deleted, NSCID 1 went to
the NSC practically as it had been recast in CIA on December
1. Hillenkoetter sent with it on December 9 the suggestion that
Appr MFlse 2005/04/28 : CIA-RDP78T03194A000300016605-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL DCI Hillenkoetter
the NSC might name the DCI chairman of the IAC to emphasize
that it was an advisory body to help him and not a "Board of Di-
rectors or Board of Management," but the NSC approved it on Decem-
ber 12 without this addition.
App j ved For Release 2005/04/28: CIA-RDP78T03L?@ q f&l0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3 94 0ID0~3r0Q011L0005-7
COA
No Foreign tDissem
Brief guide to a common
form of deception.
SPOTTING PHOTO FAKERY
Dino A. Brugioni
When Soviet troops moved into Czechoslovakia in August 1968,
television viewers in Poland were shown film apparently depicting
the enthusiastic welcome the invaders received from the Czechoslovaks.
The Polish audience was not told that it was in fact seeing a re-run
of a film strip dating from 1945. This simple deception was an ex-
ample of "photo fakery." Here we will look at other, somewhat more
subtle photographic methods often employed. Although an expert
job of fakery may defy detection even by another expert, there are
some telltale signs anyone should look for.
Photo fakery as practiced by the Communists is usually employed
to display their actions in a pleasing light, and to portray their
countries and their leaders to the best advantage. It is also used as
a form of propaganda support for the ongoing campaign against
the United States and its allies. In any specific case, the intention is
often revealed by detection of what may have been hidden, elimi-
nated, or altered.
Visual Evidence
Photography has long been recognized as an important source of
intelligence. Like other kinds of sources, however, photographs can
be forged, faked, or otherwise altered to suit the purposes of the
originator. Notwithstanding, the notion is still fairly widespread that a
photograph of a given item is sufficient proof that the item in fact
existed in the state shown by the photograph. This simple view can
no longer be accepted. As a matter of fact, the art of faking pho-
tographs is as old as photography itself. Thus, portrait photographers
discovered many years ago that removal of wrinkles and skin blem-
ishes pleased customers. Although the public has perhaps become
more skeptical than it used to be of "before and after" pictures or
other photographic gimmicks employed in advertising, these devices
have certainly not entirely disappeared.
Appr6&!IFQP FkM66se 2005/04/28: CIA-RDP78T03194A0003000'i005-7
MORI/HRP PAGES 57-67
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL Photo Fakery
Early techniques for altering photographs were relatively simple,
but recent advances in optics, in the manufacture of film, and in
laboratory processing have permitted great refinement of old tech-
niques, and provided versatile and effective tools to propaganda, psy-
chological warfare, and intelligence agencies. Some attempts at photo
fakery are still amateurish and obvious, but the best work these days
is subtle and sophisticated.
Properly used, a faked photograph can be a more effective and
subtle weapon than a forged document. In propaganda or intelli-
gence work, it can lead an adversary to wrong conclusions or cause
him to dissipate his energies. The fact is that the veracity of pho-
tographs is rarely questioned. Intelligence analysts are accustomed to
being critical of documentary intelligence, and as a matter of course
attempt to establish its veracity and the credibility o:E its sources.
Unfortunately, no similar critical attitude is generally applied in the
appraisal of photography. Indeed, most analysts would probably not
consider themselves qualified to make technical judgments of this
nature. No manual on faking photography is known to this author,
and manuals that treat the art of altering or retouching photography
are concerned almost exclusively with techniques for enhancing the
artistic or purely technical values of photography, and not with de-
tecting alteration of the original negative or other manipulations for
purposes of deception.
The purpose of this article is to warn intelligence analysts against
accepting photographic evidence of Communist origin uncritically
and to provide a few practical suggestions on how those lacking
technical expertise can detect fakery in photography. The examples
here presented have been selected from those collected in the course
of research over the years by the National Photographic Interpreta-
tion Center, and other U.S. intelligence components. It is worth noting
that Communist photographic forgeries were brought to the attention
of the U.S. Senate as recently as 1961, and have been the object of
continuing interest on the part of successive Directors of Central In-
telligence.
Kinds of Faked Photographs
There are four kinds of faked photographs, distinguished by differing
techniques: montages; retouched photographs; and retouched mon-
tages. The fourth category-false captioning-differs from these in
Appi5&ed For Release 2005/04/28: CIA-RDP78T03t Q 6AMJD005-7
Approved o FarkRyease 2005/04/28 : CIA-RDP78T031a6AMBf 005-7
that tampering with the photograph itself is not a necessary ingredient
of the fake.
A montage can be made either with photographic prints, resulting
in what is known as a "paste-up" montage, or it can be made with
negatives. The negative montage is the more effective of the two.
Montages are widely used commercially for producing trick or ar-
tistic effects, assembling murals, and for advertising purposes. Ex-
tensive use is made of montages for portraying, and generally exag-
gerating, the industrial and scientific accomplishments and the mili-
tary might of the Soviet Union and its allies-and others-as well as
for many other propaganda and deception purposes. On occasion,
photographs are altered for security reasons.
A retouched photograph differs from a montage in that only
one photograph is used. By applying airbrushed paint or solvents, or
by scraping, and by a variety of other techniques, the technician alters
details, or obliterates portions of a photographic image. It is pos-
sible to tone down or disfigure images, and even to create an image
that was not on the original negative. Since a hand brush or an
airbrush is frequently used for this purpose, the terms "brushed-in"
and "brushed-out" are often used in connection with retouching, even
though many other artistic and laboratory techniques are used.
The third and most common type of fake photograph combines
retouching and montage. In this type of photograph, an attempt is
made by means of retouching techniques to soften the sharp edges
of the cutouts usually apparent in a montage and to blend the varying
tones and textures of the cutouts into a unified whole.
The falsely captioned photograph differs from the other groups
of fake photographs in that the photograph usually is not altered.
Proper captioning of a photograph normally includes descriptive
data regarding the "who-what-where-when" of the subject. Photographs
in Communist publications, however, are frequently printed with
misleading or completely false captions, and the date of the photog-
raphy is often omitted entirely. About the ,only way to unmask this
kind of deception is to compare suspect examples with prints of
known veracity. Where a date has been provided, however, close
scrutiny of details will sometimes detect anachronisms that give the
show away.
In Figure 1, the photographs on the left appeared in a Czechoslovak
aircraft journal with captions indicating that they were scenes in a
Czechoslovak jet engine factory. Actually, at least one is a retouched
ApproQ 1F!P`Rh1Ie 2005/04/28 : CIA-RDP78T03194A000300010805-7
Appa)NFI.For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
TIAL Photo Fakery
FIGURE 1. False Captioning and Retouching
photograph of a factory in the United States. An artist has provided
the technician on the right with coveralls, and a Czechoslovak "no
smoking" sign has been added'., but note the different tone and texture
of these added items.
Faking Techniques
Many technical factors have to be considered in the difficult task
of creating a successful fake photograph. Details, perspective, and the
relative sizes of objects and the distances between them mist be
kept in scale to produce a convincing result. Because of the inherent
limitations of the camera lens, objects at different distances from
the camera are in varying degrees of focus and have different tones
and textures. Tone is the tint, shade, or hue of an object. In black-and-
white photography, tone is the relative lightness or darkness of
the shades of gray in the scene, Texture is the arrangement, size,
and quality of the constituent parts of an object; it is the quality by
which one determines that an object is rough or smooth, firm or loose.
Since retouching or the creation of a montage usually results in
inconsistent variations of tone and texture, the technician will fre-
quently reproduce a fake by the halftone process. This is a technique
of representing shadings by dots produced by photographing an ob-
ject (or, for instance, a montage) through a fine screen. By subjecting
retouched photographs and montages to the halftone process, dots are
substituted for continuous tone imagery, and this more or less climi-
Approved For Release 2005/04/28: CIA-RDP78T0 b&&10005-7
'QhW
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Photo Fakery CONFIDENTIAL
nates break lines and variations in tone and texture. Most newspaper
reproductions of photographs are produced by this process, and
practically everyone is aware that the sharpest lines and strongest
contrasts of a glossy print are softened and blurred in newspaper
reproductions.
Shadows of objects arc present in most photographs, and in creating
a convincing fake, the technician must make all shadows fall in the
same direction and be consistent in relative size and shape with the
objects photographed. The technician must also account for any mo-
tion or action and corresponding reaction represented on the photo-
graph, and all elements of the photograph must be consistent in this
respect. Obviously, smoke does not blow in different directions from
the stacks of adjacent factories. Finally, the creator of the fake must
make sure that his masterpiece as a whole is all of a piece. He must
insure, that is, that elements added to or deleted from the photograph
do not result in incongruity; a soldier does not wear naval insignia,
nor does a watchmaker have pipe wrenches on his workbench.
The means of detecting a. fake as described here are effective only
when the faker has been careless or in the occasional instances when
the original unchanged photograph is available for comparison. As
noted, however, a good fake photograph is remarkably difficult to
make, and the alert intelligence officer armed with a knowledge of
what to look for can often avoid being taken in.
Clues to the Detection of Fake Photographs
The first and most obvious clue to fake photography is its source.
The intelligence officer should have the same ingrained skepticism
of photographs that he has of other documentation from Communist
sources. Imbued with this basic skepticism, he should look for the
following clues.
Clues to a montage. Since the final product of a montage made from
prints is another photograph, the result cannot possess quite the same
textures and tones of objects as depicted in the originals. Thus, such
a "paste-up" montage will often appear flat and gray as compared with
an original photograph. The montage made with negatives, while
retaining much of the quality of the originals, still presents problems
to the technician when he attempts to blend tones and combine
textures. Hence, on negative montages, certain images tend to stand
out from other images in the photograph. To detect either type of
montage, the intelligence officer should look for identical images
Appr6 hIk9Iese 2005/04/28: CIA-RDP78TO3194A00030001`bb05-7
Apppg eA&gARjLease 2005/04/28: CIA-RDP78TO31 oV0Va00y 005-7
App&ed For Release 2005/04/28: CIA-RDP78T03'QK6M005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
Photo Fakery CONFIDENTIAL
in the photograph. He should also look at the corners of images for
match or join lines, the result of improper illumination at the time
the montage was photo copied. The artist often fails to remove crop
lines which indicate the presence of two or more photographs.
Combining two or more photographs in a montage often results in
incongruities violating principles of action and reaction or technical
consistency. This is the clue! to the fake in Figure 2: not one person
in the large crowd depicted is looking up at three helicopters flying
a few feet over their heads, nor does there appear to be any prop
wash.
Clues to retouching. To detect this type of fake, the intelligence
officer should look for flat unbroken lines where objects appear to
have been removed from the picture. In doing this, the artist often
fails to remove parts of objects and to add an appropriate texture
to the area. Such clues are visible in the retouched photograph of a
hangar shown on Figure 3. The uncluttered. gray area in the depth of
the hangar on the right is in sharp contrast to the clutter in the rest of
the hangar and is a clue to "brush-out" retouching, possibly to delete
items for security purposes. A careless technician has provided positive
evidence of retouching here by failing to brush out the stabilizers
of two aircraft that have otherwise been deleted.
Placing a retouched photograph under magnification often reveals
the marks of the artist's brush or artificial discoloration. When some-
thing is added to this type of photograph, the telltale features may be
abrupt texture breaks and a flat, painted appearance. The perpetrators
of photographic fakery often forget the shadows in retouching or in
Appr WF0eF l &se 2005/04/28 : CIA-RDP78T03194A00030001 05-7
Apr&SMrfX[ease 2005/04/28: CIA-RDP78T031 QAn?OD0010005-7
o fflry
montages, and the tip-off to the intelligence officer can be an object
which does not cast a shadow, shadows falling in different: directions,
abnormal tonal contrasts in shadows, or shadow-object ratios which
do not match. Shadows falling in opposite directions are a Clue to
deception on Figure 4. In this photograph of an alleged Communist
Chinese amphibious exercise, shadows from the door of the landing
ship in the left background fall to the right, but shadows on the
amphibious tank in the foreground fall to the left.
Scale and proportion. Scale is the ratio of image size to the actual
size of an object.. If the size of one object in a photograph is known,
the relative sizes of other objects can be determined by photogram-
metric methods. When the size of one object appears to be out of
proportion to the sizes of surrounding objects, the photograph should
be suspect as a fake. Faulty proportion is the tip-off to the fake shown
on Figure 5. The missiles in this photograph are identified as SA-2
surface-to-air missiles known to be 35.6 feet in length. If scale and
proportion in this montage were correct, the marching men on the
right would have to be pygmies. A crop line, characteristic of a
montage, is apparent along the top of the shrubbery partially concealing
the missiles.
Depth of focus. The terms depth of focus, depth of field, and depth
of definition refer to the characteristics of lenses, and relate to size
64 C.0 ved For Release 2005/04/28: CIA-RDP78T03'f94A0IIU306DT0005-7
Appro
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300 10005-7
Photo Fakery CONFIDEN IAL
of the area within which details are sharply defined in front of and
beyond an object focused on. Notice that the aircraft and the peasant
shown on Figure 6 are some distance apart but in the same sharp
focus. At the lens setting which would give this depth of focus, the
distant foliage should also be sharply defined. The fact that the
foliage is instead blurred indicates that more than one negative was
used to make this print. The intelligence officer should compare the
sharpness of objects in the foreground and background of photographs
for indications of fakery.
1talation as a clue. Halation is the fog or halo in a photograph
around the image of a highly reflective surface or light source. It is
caused by lights in a night photograph or by reflectors or curved
surfaces in bright sunlight. A faked photograph may show halation
around one object and not around similar objects oriented in the same
direction with respect to the sun. In the case of a night scene, halation
may appear around some lights but not others. Thus in Figure 7, the
tip-off is duplicate halation montaged to make this Chinese oil field
appear larger. Perspective and scale are also faulty since the sup-
posedly more distant items in the top half of the picture are the same
size as those in the lower half.
Appro'VRYPP Ok se 2005/04/28: CIA-RDP78TO3194A0003000110*005-7
Appxe> e mr ease 2005/04/28: CIA-RDP78TO31 4A0 0300010005-7
App oved For Release 2005/04/28: CIA-RDP78T0f1A0 10005-7
Approved Fo Release 2005/04/28: CIA-RDP78T031L9C7NriBj9AQ005-7
Photo Fakery
Conclusions
Every intelligence officer should be aware that photography can be,
and sometimes is, faked before its dissemination. Viewing Communist-
source photographs with a critical eye, the analyst can detect and take
steps to neutralize a good deal of this kind of deception. A basic
knowledge of the concepts and mechanics of faking photography as
presented here can thus pay worthwhile dividends to our total
intelligence effort.
ApproQQWJPFMMAe 2005/04/28: CIA-RDP78TO3194A000300010 705-7
Approved For Release 2005/04/28 : CIA-RDP78TVW3080M1 P905-7
The intelligence war between the
British and Irish Intelligence Services.
MICHAEL COLLINS AND BLOODY SUNDAY
Martin C. Hartline
and
M. M. Kaulbach
Until Easter Week 1966, the statue of Lord Nelson stood peacefully
on its column in Dublin Square. It was blown up on the eve of the
50th anniversary of the Easter Rebellion, which the British had finally
subdued on that very spot. Although the figurative decapitation of the
hero of Trafalgar made the front page of The New York Times, the
event was but a footnote to history, recalling one of the most news-
worthy stories of the early 1900's, The Irish Revolt.
For nearly four hundred years prior to the Easter Rebellion of 1916,
Irish nationalists had been fighting British colonialism without success.
The most striking difference between the Easter Rebellion and the
uprisings of the past was that this new Irish revolt occurred at a most
unpropitious moment for the British. The war against Germany had
strained and exhausted the economy of Great Britain. Resources to
arrest the growing insurgency in Ireland were not available.
Despite the disruptive effects of World War I on Great Britain, it
would have been unrealistic, even in the land of the leprechaun, for
the Irish to expect to defeat by conventional military tactics the world's
foremost military power. In fact, most of the leaders of the Irish na-
tionalists felt that the opportunity for success rested squarely on their
capability to exploit Great Britain's lack of will to continue a costly
and domestically unpopular war. Their eventual success in doing so
constitutes a classic example of the effectiveness of unconventional
warfare in forcing a powerful adversary to the negotiating table.'
The Irish intelligence service was one of the architects of the victory.
The Director of Intelligence of the Irish Republican Army during
the last act of the drama was Michael Collins, already a legendary
figure when he was appointed in the summer of 1919. He had been
' On 5 December 1921 a treaty was signed granting Ireland, less the six counties
of Ulster (Northern Ireland) Home Rule. Under Home Rule, although Ireland
remained within the British Empire, the Irish were given primary responsibility
for domestic affairs with Britain retaining control over defense and foreign affairs.
Approvepd ForrRelease 2005/04/28: CIA-RDP78TO3I94A0( O
a
%GES 69-78
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Bloody Sunday
in the movement since early 1916, and had earned the cachet attached
to deportation and imprisonment for a year in a British jail. By 1919,
the Crown was offering # 10,000 in rewards for Collins "dead or alive."
Despite this tempting offer and hard times in Ireland, very few
dared to offer assistance which would aid the British in capturing him.
The few who were tempted met a quick end. The familiar [RA calling
card found on the bodies of informers, "Convicted Spy Executed by
Order of the IRA," proved to be a sufficient deterrent. Frequently,
informers were tried in absentia. It is sufficient to recall Co1P.ins' remark
regarding the accused to guess at the outcome of these trials: "For
the future the rule should be guilty until proven innocent."
Collins has often been described by both friends and foe,; as a cold-
blooded character. His remarks after the bloody execution of a number
of British intelligence officers and informants bring out this aspect
of his character.
My one intention was the destruction of the undesirables who continued to
make miserable the lives of ordinary decent citizens.
I have proof enough to assure myself of the atrocities which this gang of
spies and informers have committed. Perjury and torture are words too easily
known to them. If I had a second motive it was no more than a feeling such
as I might have for a dangerous reptile.
By their destruction the very air is made sweeter. That should be the future's
judgment on this particular event. For myself, my conscience is clear. There
is no crime in detecting and destroying, in war-time, the spy and the informer.
They have destroyed without trial. I have paid them back in their own coin.'
Although informers were dealt with ruthlessly, Collins came close
to capture a number of times. On one occasion a Black and Tan 3 raid-
ing party besieged a house where Collins was present. He calmly
walked down the stairs, brushed the intruders aside, and bolted out the
door before they knew what had happened.
Soon after this incident, Collins had a master builder named Batt
O'Connor construct a secret room, with sleeping quarters, on the
same premises. O'Connor succeeded so well that the next time
the Black and Tans staged a raid, Collins was able to continue a
meeting then in progress without interruption.
'Rex Taylor, Michael Collins, London, 1958.
'The Black and Tans were not members of the British regular army but a
new force recruited for service in Ireland. They were drawn heavily from the
unemployed and received their name from their attire-khaki coats, black trousers
and caps.
Aa39oved For Release 2005/04/28: CIA-RDPWIT1 b4 OWW10005-7
Approved For Release 2005/04/28: CIA-RDP786~~?eJA03gi0~Q , 05-7
Bloody Sun ay
The Collins Organization
Collins surrounded himself with a small group of counterintel-
ligence operatives-soon labelled the Inner Circle-who directed the
penetration of various British installations. Their network eventually
extended from Ireland to America, England, and Egypt. It penetrated
prisons, postal facilities, and government departments from the British
headquarters in Dublin Castle to Whitehall itself. Sympathetic postal
officials in London, Dublin and generally throughout all of "Ireland,
enabled the Irish service to intercept, and decode many of the
oppositions' cipher messages.
Recognizing the need to compile information on their opposition,
the Inner Circle very early in the struggle established a central
records center, eventually called the Brain Center, within 200' yards
of Dublin Castle. A lawyer's office provided the cover, and although
its unusual clientele increased in number, this dual-purpose estab-
lishment went undetected.
Presumably the IIS established its "Brain Center" so dangerously
close to Dublin Castle to hasten the dissemination of reports received
from Broy, Kavanagh, Neligan and MacNamara, all trusted em-
ployees of the British, but agents of the IIS. This records center
contained dossiers on personalities of security or operational interest
including military leaders and government officials, as well as cap-
tured and stolen documents and extensive ciphering and deciphering
material.
The British Intelligence Service (BIS) apparently lacked detailed
information about the Inner Circle and the Brain Center, although
it certainly felt their presence and Michael Collins' influence. In
consequence, the BIS set out to capture Collins, hoping thereby to
neutralize the Irish apparatus. One of the BIS' earliest efforts in
this direction was turned into a propaganda extravaganza by the
IIS. A convicted forger in a London prison, one F. Digby Hardy,
mailed a letter to Lord French, Governor General of Ireland, offer-
ing his services as a spy. Lord French accepted the proposition.. Hardy
was to travel to Ireland and establish contact with the IIS.
Hardy's letter, however, had been intercepted and transmitted
to IIS Headquarters, where Irish operatives began to amass a dossier
of incriminating information concerning Hardy's past. Collins per-
mitted Hardy to make contact with the HS, and shortly there-
Appro9f IFR IR Is9%S5/04/28: CIA-RDP78T03I94A0003000I 405-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Bloody Sunday
after arranged what Hardy had been led to believe was a confer-
ence with IIS officers. Those present were in fact American and
British journalists anticipating the scoop that Hardy was shortly to
provide.
During this meeting the leaders of the IIS confronted Hardy with
his infamous past, his letter to Lord French, and his mission to
penetrate the ITS. When Digby learned the true identity and pur-
pose of his host, he made a full confession, hoping thereby to ob-
tain leniency from his inquisitors. Because of Digby's cooperation,
the IIS spared his life and gave him until the next morning to be
out of Ireland. The story made international news headlines, and
the BIS suffered a humiliating reversal before world opinion.
Not all British efforts were as transparent as the Hardy fiasco.
An experienced BIS officer named Burn, alias Jameson, succeeded
in penetrating the "Inner Circle" of the IIS and in winning for a
short time the confidence of Michael Collins. Jameson had come
to the attention of the IIS while feigning Bolshevism as a member
of British Labor circles, all the while performing in the role of agent-
provocateur. Jameson impressed Collins with schemes to obtain arms
and money from the Soviet Government.
An unsubstantiated report from Dublin Castle, and the near cap-
ture of Collins while engaged in a clandestine meeting with Jameson,
provoked suspicions and the IIS prepared a plan to test Jameson's
loyalties. With deliberate carelessness Collins permitted Jameson
to see parts of a bogus document which referred to important papers
held in the home of a pro-British ex-mayor of Dublin. Jameson in
turn relayed this information to Dublin Castle and soon afterward
the Black and Tans raided the ex-mayor's home. Predictably, perhaps,
shortly after the raid Jameson's body riddled with bullets was found
bearing the familiar IRA execution card.
In their penetration efforts IIS operatives were considerably more
successful than the British. Early in the conflict, the IIS recruited
and ran-in-place four Dublin Castle officials: Ned Broy, James Mac-
Namara, Joe Kavanagh, and Dave Neligan. During their weekly de-
briefings, these agents passed valuable information to Collins at a
Dublin safehouse owned by Tom Gay, an inconspicuous librarian.
One of these agents, Ned Broy, who had access to the headquarters
of the Dublin Detective Force, arranged to be on duty alone one night
during which Collins was able to make a midnight visit and spend
several hours of the early morning there reading secret documents
and gathering valuable information.
Apff@bved For Release 2005/04/28: CIA-RDRD$ff AV4E.?0Q 1 10005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Bloody Sunday OFFICIAL USE ONLY
Although Broy, Kavanagh, Neligan and MacNamara provided
Collins with extremely useful information, the most valuable of all
Collins' penetrations was the mysterious Lt. G., a member of British
military intelligence and one of Collins' chief agents and confidants.
Not only was Lt. G. able to pass information concerning troop
movements, order of battle and military plans that enabled the IRA
to ambush British troops and supply convoys, but he also provided
Collins with advance warning of British plans to raid suspected
IIS installations.
In Collins' personal notebook-diary, there appear seventeen notes
initialed "G," of which the following is but one example:
"Don't overdo. The road to Parnell Square is too well trod.
Fifteen men, including you, went there (to Vaughn's Hotel) last
night between 9 and 11 p.m." 4
Little else is known of Lt. G. but his case demonstrated the abili-
ties of the IIS to recruit and run-in-place an unusually valuable
and well-placed British military intelligence officer.
The Cairo Group
Despite the efforts of Dublin Castle to stymie the IIS, the British
position in Ireland in 1919 had so deteriorated that the British au-
thorities in Whitehall decided that radical measures were required.
Heretofore the British had been concentrating on controlling the
general public and only sporadically fighting the IIS. But Irish suc-
cesses had nevertheless mounted. A major assault was in order. Ac-
cordingly, certain of the most experienced British deep-cover CI
officers were called to Ireland and directed to seek out and assassi-
nate the Inner Circle of the IIS.
At the time of the Irish Revolt most of these operatives were
stationed in Cairo. One by one, they arrived in Ireland, travelling
under aliases and using commercial cover, several taking jobs as
shop assistants or garage hands to avoid suspicion.
The so-called -Cairo Group was directed by two men, Peter Aimes
and George Bennet. These individuals maintained liaison with three
veterans of the campaign, Lt. Angliss, alias McMahon, who, had
been recalled from Russia to organize intelligence in South Dublin,
an Irishman by the name of Peel, and D. L. McLean, the chief
Apprc@0C0a 4Y05/04/28 : CIA-RDP78T03194A00030001tb05-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Bloody Sunday
of intelligence at Dublin Castle. Besides being more experienced
intelligence operatives than those earlier working in Ireland, the
members of the Cairo Group increased the threat to the Irish be-
cause they immediately reorganized the British intelligence effort,
which until their arrival had been decentralized and uncoordinated.
They moved quickly to correct weaknesses. Their accomplishments
led ultimately to the events of "Bloody Sunday."
Although the IIS was aware that changes were taking place on the
British side, it was some time before it ascertained the identities of the
Cairo Group. Their first break came following the execution of
John Lynch, an Irish Treasury Official, by the Group. After this
episode, Lt. Angliss, drunk and despondent, divulged his participa-
tion in the execution to a girl who inadvertently passed this in-
formation to an IIS informant. The remaining members of the group
were identified after an unwitting landlady revealed to another IIS
informant that several of her British guests regularly went out very
late in the evening. At the time Dublin was under a very strict
curfew, and only authorized personnel were allowed on the streets.
The individuals in question were taken under observation by the
surveillance and enforcement arm of the IIS-called the Twelve
Apostles 5-which determined that they were in contact with pre-
viously identified members of the Cairo Group. To the Twelve
Apostles, this meant that they were instrumentally involved with
the Cairo Group.
In addition to the information provided by these sources, a com-
paratively low-level technical operation revealed the identity of an-
other key participant in the Cairo Group. Shortly after the new
British team arrived in Ireland, Michael Collins had received a type-
written death notice reading:
"An eye for an eye
A tooth for a tooth
Therefore a life for a life." 6
Collins ignored the message but filed the letter, as he did all cor-
respondence bearing upon his intelligence and related activities.
'The Twelve Apostles were responsible for surveillance and executions. Because
they operated in friendly circumstances and enjoyed popular support, they
were efficient and effective.
'Jacqueline Van Voris, Constance de .Markievicz in the Cause of Ireland,
Amherst, Mass., 1967.
'Zd
App aved For Release 2005/04/28: CIA-RDPAWd l4 9bk 4'0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Bloody Sunday OFFICIAL USE ONLY
Soon afterward, the IIS intercepted the following letter from Capt.
YZ addressed to Capt. X, War Office, Whitehall, England:
Dear X,
Have duly reported and found things in a fearful mess, but think will
be able to make a good show. Have been given a free hand to carry on and
everyone has been charming re our little stunt. I see no prospect until I have
got things on a firmer basis, but still hope and believe there are possi-
bilities . . .'
The IIS hurriedly recruited a typewriter expert, who determined
that the typeface of the Captain YZ letter matched that of the death
notice sent earlier to Michael Collins. Captain YZ was therefore
linked to the Cairo Group and thereafter was the object of special
investigation. In the end, by intercepting correspondence, examin-
ing contents of wastebaskets, tracing laundry markings, duplicating
hotel room keys, and similar efforts, all members of the Cairo Group
were identified and placed under surveillance.
Before all this had been accomplished, however, the Cairo Group
had begun to close in. Three IIS senior officers, Frank Thornton,
one of the Twelve Apostles and the man responsible for maintaining
the surveillance of the Cairo Group, Liam Tobin, the senior officer
in charge of the IIS "Brain Center," and Tom Cullen, his assistant,
were arrested. Unable to break the cover stories of Thornton,
Tobin, and Cullen, the British interrogators released them. Tobin
and Cullen were detained only a few hours. Thornton, however,
underwent a gruelling interrogation for ten days.
These arrests understandably alarmed the IIS. Shortly after Thorn-
ton's release, Collins received information that the Cairo Group was
planning more arrests. Fearful that additional interrogations would
be successful and reveal IIS personnel and installations, Collins
met with his staff and formulated the plans for "Bloody Sunday."
On 17 November Collins had written to Dick McKee, Com-
mander of the Dublin Brigade:
Dick . . . have established addresses of the particular ones. Arrangements
should now be made about the matter. Lt. G. is aware of things. He suggested
the 21st. A most suitable date and day I think. "M"'
Early Sunday morning, November 21, 1920, while most of Dublin
slept, eight groups of IIS officers including the Twelve Apostles
went into action. They executed eleven British intelligence offi-
' Piaras Beaslai, Michael Collins, Soldier and Statesman, Dublin, 1937.
'Rex Taylor, Michael Collins, London, 1958.
ApprWeF04 Fk?&a "05/04/28: CIA-RDP78TO3194A00030001b 05-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Bloody Sunday
cers. As many more marked for extinction escaped. McMahon and
McLean were among those executed. Of the leaders of the Cairo
Group, only Peel escaped. Most of the others who escaped had
not been direct participants in the British plan.
The British reaction to "Bloody Sunday" was quick. Carloads of
Auxiliaries s were almost immediately dispatched to Croke Park, Dub-
lin where a large crowd had assembled to watch a football game.
Accounts of what followed are conflicting, but one of the most widely
reported stated that the Auxiliaries fired into the crowd, killing four-
teen and wounding many others. Despite the confusion, Dick McKee
and Peadar Clancy, who both had participated in the liquidation
of Bloody Sunday, along with an innocent visitor to Dublin were
arrested and taken to Dublin Castle, where shortly thereafter they
were executed.
Bloody Sunday remains a day of infamy in British history: and
the day after remains equally infamous in Irish history. But once the
violence of the two days is dismissed, it seems clear that the British
plan to destroy the Irish service failed. By acting first the IIS had
delivered the coup de main to the British intelligence network in
Dublin.
Cathal Brugha, then Irish minister of defense and chief of staff,
later assessed the outcome as follows, in words which were perhaps
applicable to the conflict between the intelligence services:
"We proved for all time that no nation however great, can either govern or
destroy a little country if the will of the little country be set. We proved it by
'The Invisible Army."' 10
Books
Barry, Tom B. Guerrilla Days in Ireland. New York: The Devin-Adair Co., 1956.
Beaslai, Piaras. Michael Collins, Soldier and Statesman. Dublin: The Talbot
Press Ltd., 1937.
Beaslai, Piaras. Michael Collins and the Making of a New Ireland. Dublin: The
Talbot Press Ltd., 1927.
'In addition to the Black and Tans the Auxiliaries were recruited in England
to serve in Ireland with the police. The men were ex-officers of the army, qualified
for no pension, and were not under military discipline.
10 Shaw Desmond, The Drama of Sinn Fein, London. 1923.
AppTdwed For Release 2005/04/28: CIA-RDP70FB1V1MAm9B3OM W005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Bloody Sunday OFFICIAL USE ONLY
Bennett, Richard Lawrence. The Black and Tans. Boston: Houghton Muffin
Company, 1960.
Brady, Edward Mark. Ireland's Secret Service in England. Dublin: The Talbot
Press Ltd.
Carty, James. Ireland from the Great Famine to the Treaty. Dublin: C. J.
Fallon Ltd., 1951.
Collins, Michael. The Path to Freedom. Dublin: The Talbot Press Ltd., 1922.
Coogan, Timothy Patrick. Ireland Since the Rising. New York: Frederick A.
Praeger, 1966.
Denieffe, Joseph. A Personal Narrative of the Irish Revolutionary Brotherhood.
Cambridge: Houghton, Mifflin and Co., 1906.
Desmond, Shaw. The Drama of Sinn Fein. London: W. Collins Sons & Company
Ltd., 1923.
Gleason, James Joseph. Bloody Sunday. London: Peter Davies Ltd., 1962.
Gwynn, Denis Rolleston. The Life of John Redmond. London: G. G. Karrap
and Co., 1932.
Lieberson, Goddard. The Irish Uprising 1916-1922. New York: Hinkhouse Inc.,
1964.
Lyons, Francis S. L. The Fall of Parnell. Toronto: University of Toronto Press,
1960.
Macardle, Dorothy. The Irish Republic. Dublin: Irish Press Ltd., 1951.
O'Callaghan, Sean. The Easter Lily: The Story of the IRA. New York: Roy
Publishers, 1938.
O'Leary, John. Recollections of Fenians and Fenianism. London: D. Appleton
and Co., 1896.
Phillips, Walter Alison. The Revolution in Ireland, 1906-1923. London: Long-
mans, Green and Co., 1927.
Pollard, H. B. C. The Secret Societies of Ireland. London: Philip Allan and Co.,
1922.
Tansill, Charles Callan. America and the Fight for Irish Freedom. New York:
The Devin-Adair Co., 1957.
Taylor, Rex. Michael Collins. London: Hutchinson and Co. Ltd., 1958.
Van Voris, Jacqueline. Constance de Markievicz in the Cause of Ireland. Am-
herst, Mass.: The University of Mass. Press, 1967.
Williams, Desmond. The Irish Struggle. London: Routledge and Kogan, 1966.
Articles
Dilnot, F. "Ireland Under Sinn Fein." Outlook, January 1919.
Harding, John W. "Ireland's Reign of Terror and Why." Current History,
September 1920.
Macdonald, W. "Underground Ireland." Nation, June 1960.
MacNeill, J. G. S. "Agent Provocateur in Ireland." Contemporary, November
1918.
Marriott, J. A. R. "Heel of Achilles." Nineteenth Century, June 1920.
Plunkett, H. "Irish Question." Living Age, March 1919.
Turner, E. R. "Sinn Fein and Ireland." World's Work, November 1920.
Contemporary Reports
"The Crises in the British Empire: India, Egypt, Ireland." Current Opinion,
June 1919.
"Defence of the Irish Executions." Nation, August 1916.
Appr M Ft I a * '05/04/28: CIA-RDP78T03194A00030001Zb05-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Bloody Sunday
"England's Iron Hand on Ireland." Literary Digest, September 1919.
"Insurrection in Dublin." New Republic, November 1918.
"Ireland From a Scotland Yard Notebook." Atlantic, June 1922.
"Irish Executions." Nation, June 1916.
"Michael Collins, Most Terrifying of all Sinn Feiners." Current Opinion,
December 1921.
"Those Irish Executions." Literary Digest, May 1916.
App?Bved For Release 2005/04/28: CIA-RDP7,$TfQitIA6A_W VO& 0005-7
Approved For Release 2005/04/28: CIA-RDP78T03194A000gP8Rb1.005-7
No Foreign Dissem
On the difference
between cover and
clandestinity.
THE OLD WINSOCKIE SYNDROME
W. B. Lavender
Several years ago a station succeeded in placing a clandestine
microphone and transmitter in the office of the local chief of a hostile
intelligence service. The audio quality was excellent, the LP was
conveniently located and the translator routinely produced tran-
scriptions within 48 hours. Over a period of time the installation,
combined with other activities, produced considerable information
about the activities of the hostile service: among other things, it was
busily attempting to penetrate the local trade unions.
One summer while the audio operation was active, a headquarters-
controlled contract agent was sent to the area to spend several
weeks in each of a number of the capitals in the area. His mission
was to spot, assess, and develop trade union officials for use in an
area-wide international trade union operation. The contract agent
was utilizing impeccable-indeed, legitimate-academic cover. He
was well-known as a specialist in the area and he had produced a
number of scholarly works dealing with the development of trade
unions. For his visit to this particular station, a case officer was as-
signed to handle the contract agent and clandestine contact arrange-
ments were made by cable.
The contract agent arrived on schedule, contact was duly made,
and the following day the case officer reported to his chief. After
making the previously arranged clandestine contact, the case officer
and agent had gone together to the coffee shop of the agent's hotel,
where they drank coffee together while discussing the operation. The
case officer reported with considerable amusement that at one point
the chief of the hostile intelligence service, accompanied by one of
his known agents, had come into the coffee shop. When it was ob-
jected that the contact with the contract agent was supposed to be
clandestine and the case officer was upbraided for meeting publicly
in the coffee shop, the case officer had a triumphant reply: "But
we have natural, legitimate cover for meeting openly. I actually took
Appre u or Release 2005/04/28 : CIA-RDP78TO3194A00030001 05-7
MORI/HRP PAGES 79-82
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET Old Winsockie Syndrome
a course from the agent at Old Winsockie University a few years
ago, so there is nothing at all unusual about my meeting with my
old professor."
The case officer's confidence was shaken, however, when 48 hours
later the transcript from the audio operation became available. The
chief of the hostile intelligence service had returned to his office
from the coffee shop and for over an hour, in a discussion with a
colleague, he had berated American intelligence and its activities
in the labor field; his particular anger was directed toward the
newly discovered fact that the academician was an American in-
telligence agent, an obvious conclusion to be drawn From his as-
sociation with the station case officer so shortly after the professor's
arrival.
It should be noted that up to this point the station had no reason
to believe that the case officer himself was known or suspected to
be intelligence connected; but he obviously was, and his public
association with the agent, no matter how casual it appeared, im-
mediately led the Opposition to correct conclusions concerning the
agent.
The incidents related above graphically illustrate a fallacy which
became known to a small group at the station involved as the "Old
Winsockie University Syndrome"-the mistaken belief that, as long
as a cover story is on tap, clandestine relationships can be success-
fully carried out through overt contacts. The case officer and the
agent had perfect cover for meeting-a legitimate professor/ student
relationship. However, the Opposition neglected to ask why the two
were together and jumped immediately to correct conclusions; while
the cover story retained the perfection of truth, unused, and known
only to the two people involved.
The case cited above is unusual only because, due to unique cir-
cumstances at that particular station, the fallacy was so thoroughly
and promptly exposed. The "Old Winsockie University Syndrome"
is unfortunately to be found in a great number of operations, in
which "social cover" or "business cover" or some other plausible
reason is adduced for overtly meeting individuals with whom our
relationship is, or should be, clandestine. The Syndrome is so firmly
ingrained that one case officer, who had taken over from his prede-
cessor a recruited agent and had continued to handle him in clandes-
tine meetings, recently reported that he was actively attempting to
arrange an overt acquaintance with the agent so the two could then
App$?ved For Release 2005/04/28: CIA-RDP78TO3194A00 Q0005-7
rom .51
/04/28 :CIA-RDP78T03I94A000 005-7
Appr ygVproCC ea a 2005
meet overtly-the purpose being to "increase the security" of the
relationship.
Officers seem to be particularly prone to meet staff agents with
unofficial status under "social cover." The usual pattern is that the
case officer in an official installation and the staff agent outside be-
come close friends; one or the other drops in casually for a drink
after work, the two families invite one another to dinner, and with
one thing and another the two get together at least once a week
and frequently more often. They conduct their business in the privacy
and comfort of home, and are "secure" in the knowledge that their
relationship is so obviously innocent and overt that no one could
possibly suspect any clandestine activity. This is, usually, rationali-
zation pure and simple. Case officers who take the trouble ob-
jectively and honestly to assess such "social cover" will more often
than not realize that the only people they see "socially" so frequently
over a long period of time are those with whom they have an opera-
tional relationship. If one or the other of the participants is known
or suspected by the Opposition of being intelligence-and it should
be remembered that official cover is usually pretty thin-the other
will automatically become suspect merely because of the association.
It is instructive to look at our own operational reporting to note
how often we have classified people as "probably IS" because we
have noted them in the company of known or suspected intelligence
officers. The Opposition does the same, and the effectiveness of an
agent may be reduced just as much if his status is suspected as it
would be if the Opposition had positive proof. Particularly in the
case of staff agents, who usually are put in place under a cover ar-
rangement with considerable difficulty and expense, it behooves all
operators to make an extra effort to avoid suspicion.
As indicated above, the Old Winsockie University Syndrome is
not used exclusively to rationalize "social cover," but to rationalize
any open operational contact with agents. In one case reported re-
cently the agent in question is a tradesman, with whom the case
officer would normally have no social relationship at all. The Syn-
drome explains the weekly evening visits to the case officer's home in
terms of repairing electric appliances which keep breaking down. Thus
a ready answer is available should someone ask about the visits; but
no one has asked and no one is likely to do so. The Soviets or the
local service, if they have noticed the visits, draw their own con-
clusions and are not interested in explanations.
Apprc r Release 2005/04/28 : CIA-RDP78T03194A000300010605-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET Old Winsockie Syndrome
The necessary ingredient for clandestine relationships is not cover,
but clandestinity. Such relationships should be hidden through use of
tradecraft, not flaunted in the hope that observers will assume the
truth of whatever legend we have chosen to explain the situation.
This is not meant to imply that there can be no secure overt re-
lationship with agents. Indeed, there are areas where the US com-
munity is so small that deliberate avoidance of such a relationship
between, for instance, two US nationals would be, if not impossible,
at least highly unusual. However, if there is to be an overt rela-
tionship it should be kept completely natural and separate from the
clandestine one; e.g., a social relationship should be kept just that,
and clandestine business should be conducted in clandestine meet-
ings. A social relationship carried on for operational reasons will
not appear natural for the very good reason that it is in fact not
natural; meetings will invariably be too frequent and tco exclusive,
since clandestine business must be carried on. If operational busi-
ness is carried out clandestinely, however, purely social meetings are
likely to attract no attention. The frequency of social meetings will be
normal; and usually there will be other people present tc chaperone,
and by their presence emphasize the innocent nature of the con-
tact.
The operational climate in no two locations is precisely the same,
and tradecraft must be adapted to local conditions rather than ap-
plied blindly. Too many stations, unfortunately, get into the habit
of "adapting" tradecraft right out of existence, using the specious
reasoning that "here" things are different, and that it is not necessary
to be clandestine "because we went to Old Winsockie University
together." It is admittedly a lot easier to run operations on that
basis; but it is not very professional and not very secure. It would
be profitable for all case officers to take an honest look at present and
future operations to make certain that we are keeping them clan-
destine; and that we are not merely putting our faith in "cover," in
the blind hope that relationships will be interpreted as we wish.
App8ved For Release 2005/04/28: CIA-RDP78TO3194AO068Q T0005-7
Approved For Release 2005/04/28: CIA-RDP78T031 tff4i1A005-7
No Foreign Dissem
COMMUNICATION TO THE EDITORS
Dear Sirs:
In the Winter, 1968 issue of Studies in Intelligence, Sherman Kent
shared with us his reminiscences of how the Studies came to be
founded, and drew up a balance sheet evaluating the first dozen
years of its publication. The founders had in mind a journal which
would serve to develop the methodology of intelligence as a discipline,
and Mr. Kent classes the articles which have been published as falling
into the categories of intelligence history, theory and doctrine, and
method.
Few would argue with Mr. Kent's favorable assessment of the
contribution that Studies in Intelligence has made to the intelligence
profession, but there is something to be said for starting a periodical
devoted to the content of intelligence. According to virtually every
criterion intelligence is a scholarly discipline, just as sociology,
chemistry and English literature are. Although each field of study
has its own characteristics, they all share many attributes: the for-
mulation of problems, the gathering of evidence, testing hypotheses,
scrupulous impartiality and the drawing of conclusions in conformity
with the available information.
The requirements of security impose limitations on the intelligence
scholar but do not significantly alter the similarity between his
work and that of other scholars. Research workers in this as in
all fields are plagued by gaps in information, inadequate conceptual
frameworks, personal deficiencies in training and knowledge, loss of
information due to faulty memory and bad filing, insufficient ex-
changes of views with others working in the same and related
fields, and excessive conservatism in enunciating and testing new
hypotheses.
Each field of study has peculiarities that make it especially vul-
nerable to these difficulties in proportions differing from those of
other fields. The last two items on the above list seem to be especially
pertinent to intelligence. While members of the intelligence com-
munity work together in close physical proximity compared to, say,
anthropologists, this advantage is more than offset by organizational
divisions and the lack of' communication which tends to be imposed
by a secure environment.
Appro~ RWT 6e 2005/04/28: CIA-RDP78T03194A000300% 6H7RP PAGES 83-85
Approved For CONFIDENTIAL Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
To The Editors
More serious is the conservatism which naturally follows from
the deadly seriousness of the subject matter with which intelligence
officers deal. In an academic environment, mistakes are accepted
as part of the price that must be paid for advances in knowledge,
or, at worst, result in a diminution of personal reputation. In the
field of national intelligence, however, the possible consequences of
wrong conclusions extend to the very worst catastrophes. The new
intelligence analyst quickly learns that the most unprofessional pos-
ture he can assume in a given case is an extreme one; the unforgiv-
able sin is to be "alarmist." Previously coordinated judgments tend
to be repeated since this obviates the necessity for breaking new
ground. The avoidance of appearing to make errors at times seems
a higher virtue than the publication of accurate and timely intelli-
gence. While the killing of intelligence between the analyst and the
policy-maker is the most serious potential consequence of these
circumstances, the actual danger of this is not great. Especially in
critical situations, professionalism is likely to triumph over bureaucra-
tic timidity.
However, the ability to transmit finished intelligence to its ultimate
consumer is no guarantee that the analytic process is being carried
out under the most productive circumstances. Indeed, the need to
be "right" in producing finished intelligence is probably the most
serious barrier to the stimulation of creative thinking. While informal
discussions and the coordination process do provide some oppor-
tunities for exchanging ideas, this is pretty much a hit-or-miss propo-
sition.
Intelligence analysts need a periodical comparable to, say, the
American Political Science Review or the American Historical Review,
journals which have counterparts in other scholarly disciplines. There
does not appear to be any publication at this time which fulfills this
need. Studies in Intelligence deals only incidentally with substantive
analysis and, moreover, its classification is too low. But it serves a
valuable function and probably should not be tampered with in any
major way. Other publications, such as monthly reviews, are produced
through the usual administrative channels and therefore do not pro-
vide the necessary outlet.
The editing of a scholarly intelligence journal of the type here
advocated involves special problems. The quality check provided by
supervisors and the coordination process would be absent, thus im-
posing a greater burden on the editor. To make the project work as
intended, only the loosest sort of control should be placed on the
Appiloved For Release 2005/04/28: CIA-RDP78T0:fQ 1lX10005-7
Apprcjvec~heorE eles se 2005/04/28: CIA-RDP78T03I 991 t?WJRP05-7
0
editor. He should be responsible for the logic of argument, the
presence of evidence, the clarity of the writing-in other words, the
general quality-but not for the correctness of the conclusions. He
would have to exercise careful judgment to encourage the free ex-
change of ideas while avoiding half-baked and cranky material
simply not good enough for publication in other forms.
To be successful, such a project would have to possess recognized
priority. Corners could easily be cut in the production (by mimeo-
graphing the final product, for example) but not in the substantive
work leading to the final product. The importance of the project
should be emphasized by its placement in the organization-the
editor, for example, might be responsible directly to a principal offi-
cer. The editor should not be burdened with time-consuming outside
responsibilities which would prevent him from doing his job effec-
tively and he should be given adequate secretarial support. It goes
almost without saying that he should be an experienced intelligence
officer capable of doing the job as well as commanding the respect
necessary to generate the widest possible participation.
The periodical here envisioned ought to have certain characteristics
not common to most other intelligence publications. Since the purpose
is to encourage the writing and dissemination of new ideas, bureaucratic
roadblocks which might frustrate this should be eliminated. The most
obvious way to accomplish this is to bypass the usual chain of com-
mand. Authors should be able to submit articles directly to the editor
of the publication without reference to superiors or to any coordina-
tion process.
Articles published in this way might include material that is in-
correct, or only partly valid. The publication therefore ought to be
restricted in its circulation and bear any notation that might be neces-
sary to discourage the indiscriminate use of its contents in finished
intelligence. The circulation of the periodical should, however, be
broad enough to reach virtually all analysts who are responsible for
finished intelligence, but not so broad as to require an unnecessarily
low level of classification. Moreover, there should be a section devoted
to lengthy letters to the editor, or a policy of publishing articles in
rebuttal-which would encourage healthy controversy.
Herbert Schlossberg
ApproVCe a~ MAa a 2005/04/28: CIA-RDP78TO3194A00030001 c5-7
Approved For Release 2005/04/28: CIA-RDP78T031 CONFIDENTIAL005-7
No Foreign Dissem
INTELLIGENCE IN RECENT PUBLIC LITERATURE
SAILOR IN A RUSSIAN FRAME. By Cdr. Anthony Courtney.
(London: Johnson. 1968. 256 pp. 35s.)
"I'm not a Profumo, but ..." was the title on the illustrated hand-
bill, with photos to match, which was sent to the British press and the
wife and political friends and enemies of retired Royal Navy Com-
mander Anthony Courtney, Conservative Member of Parliament for
Harrow East, in August of 1965. Before a year had passed, Courtney
had lost his wife, his seat, and most of his business as a result of a
KGB political action operation in the heart of London. His book is
the story of why the Soviets "framed" him and how he fought back, and
almost won. The episode vividly exemplifies how the Soviets employ
assiduous data collection and personal provocation in political action.
Courtney's father had exported machine tools to Russia during World
War One and became a Russophile, leading his son to practice one-
upmanship among his schoolmates with assiduous study of Hugo's
Russian Course, Part 1. A tour with the China Station in the late 20's
as Sub Lieutenant of H.M.S. Cornwall gave the younger Courtney
practical experience, particularly with the "many delightful girls in
the White Russian clubs and cabarets" of Shanghai, and probably pro-
vided the first entries in RIS files. In 1933 he had been awarded nine
months' leave to study Russian in Rumania. In 1935 he spent his sum-
mer leave in the USSR. Subsequently he was assigned to the Naval
Intelligence Division of the Admiralty in London to re-write the "Rus-
sian Intelligence Report." This gave him a chance to meet Soviet
military officers in London, including Marshal Tukhachevsky. Back
to ships by 1937 and married in 1938, he was not involved with Russia
again until he was assigned as Deputy Head of the British Naval
Mission to Moscow in October of 1941. By his own account he made
the most of his year there to get close to the natives, and after the
war he was placed in charge of the Russian Section of the Naval In-
telligence Division for almost three years. At the end of 1948 he was
assigned as Chief of Intelligence Staff to the Flag Officer, Germany.
In 1951 he returned to the Admiralty and retired in 1953 with a small
pension, no capital, but ". . . three assets: a naval training, a good
knowledge of three languages and the best wife a man has ever been
blessed with." During the next five years he sought election to Parlia-
ment, finally succeeding in 1959.
Appro chi tThIse 2005/04/28: CIA-RDP78TO3194A00030001 c 05-7
MORI/HRP PAGES 87-92
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Recent Books: The Courtney Case
During the same five years, he also sought with some success to
re-establish his father's commercial trade with Russia and other eastern
countries, and broadcast a weekly talk in Russian on the BBC. He
exhibited at the Poznan fair in 1955, 1956, and 1957; in the last year,
after a property dispute, he was escorted out by the UB, never to
return. He therefore turned to Moscow, where he renewed old acquaint-
anceships and made new ones, so that by early 1961 he was on top
of the wave commercially, politically and socially, having made his
maiden speech in Commons on the hope for improved Anglo-Soviet
relations through commerce and adding China to his list of Commu-
nist trading posts. Two years of negotiations had resulted in that rarity
of east-west trade, a successful contract with the Russians. In March,
however, Courtney s wife of 23 years, "the first Elisabeth," died of a
heart attack, and here his fortunes changed.
In the summer of 1959, while staying at the Hotel Ukraina, Courtney
had met "a pleasant woman" on the INTOURIST staff, Zinaida
Grigoryevna Volkova. By the following year, "Zina" had accepted an
invitation to the theater. In May of 1961, there was held in Moscow
the first British Industrial Exhibition since the Revolution, with which
Courtney had much to do. Despite meetings with the Khrushchevs and
Suslov, Courtney found life rather boring, since many of his friends
were away from Moscow on vacation. Not so Zina, however; she had
given up part of her annual holiday from INTOURIST to work at the
exhibition.
"Since Elisabeth's death her attitude towards me had been notice-
ably warmer, and she knew full well how desolate life had be-
come, now that there was no wife waiting for me on my return to
England . . . . Just how it occurred, I have no idea, except that it
-was certainly on her initiative, but it is a fact that for the first and
last time in our acquaintance she came up to my [hotel] bedroom
after dinner and stayed there with me for several hours. Our affair
was not a success. It was therefore not altogether surprising that on
the next occasion when we met she expressed some distress at having
behaved in the way she had, saying she knew now that it was not really
what I had wanted ... In June, 1961, rightly or wrongly, the thought
never entered my head that a successful operation might in fact have
been mounted by the KGB against myself."
A year after Elisabeth's death, Courtney married another Elizabeth
(with "z" this time), the widowed Lady Trefgarne, in the Crypt
Chapel of the House of Commons. His new wife, a Director of the
ApI3BBved For Release 2005/04/28: CIA-RDP78T0t"{ QWQ, 10005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Recent Books: The Courtney Case CONFIDENTIAL
family firm of machine-tool manufacturers, was quickly accepted as
both a commercial and political asset, and in 1962 travelled with him
on a trip to Moscow, Leningrad and China. Zina took her sight-seeing.
Despite his increasing dependence on the Soviets for his business
success (or perhaps because of it, in that he may have feared to be
charged With a conflict of interest), his speeches in Commons often
criticized the Government for failure to protest KGB harassment of
British Embassy personnel in Moscow. In the light of the Vassall and
Blake cases, he also spoke to the House on what he considered Foreign
Office incompetence in the security field. (He had personal knowledge
of Blake since he had arranged Blake's naval cover to attend a special
Russian course at Downing College, Cambridge, just after World
War II.)
He also made an increasing number of trips to the Soviet Union,
and it was there that he received at his hotel a letter which had come
through the British Embassy, from his wife. "The letter was very much
to the point. My wife had decided to leave me, as our marriage had not
turned out the success she had hoped: no more specific reason was
given . . . I duly telephoned my wife at home and managed to per-
suade her to change her mind. But great damage had been done.
The telephone call, which I was forced to make on an open line from
my hotel, had undoubtedly let the KGB discover that there was a
weak link in the Courtney armour." The file was growing swiftly.
Courtney survived the general election of 1964 but lost half his ma-
jority in the general trend toward Labour. In November an incident
occurred which he does not describe in detail but which seems to have
involved a fortnight's indiscretion on the part of his wife, and in Jan-
uary Courtney's eldest stepson, the leader of the Conservative Party
(then Sir Alec Douglas-Home), and he all received anonymous letters
"from a source or sources which appeared to be very well-informed
about my wife's private life," suggesting he resign "as our M.P." Then,
his critical review of a Soviet book on the naval history of World War
II for the Evening Standard was attacked in Red Star. By March, 1965,
when he was next to visit Moscow, he realized that he might be in
danger there, and wrote a letter to the Foreign Secretary for his wife
to mail in case anything happened to him. Although his business efforts
seemed to go better than ever, one old friend of 23 years' standing
refused to accept a call or a visit, which Courtney could only interpret
as an urgent warning.
ApproctN hike 2005/04/28: CIA-RDP78T03194A00030001 W05-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
CONFIDENTIAL Recent Books: The Courtney Case
He nevertheless continued his criticism of Foreign Office security
and his efforts to get the Soviets to agree to the first chartered Anglo-
Soviet commercial concern with three British and three Soviet directors.
In July 1965 he was to visit the Soviet Union again, but three days
before his departure Sir Alec Douglas-Home resigned from the Leader-
ship of the Conservative Party and Courtney could not leave London.
Ten days later, two days before the Summer recess, members of the
press and Parliament received copies of an illustrated handbill which
"contained six photographs, five of them being of myself-with ap-
propriate captions .... Two of the photographs represented me in
company with a woman (or women) in circumstances which plainly
indicated sexual intimacy." The impact of a special mailing to his wife
was apparently not lessened by the fact that he had told her about the
incident with Zina in 1961 soon after their marriage in 1962.
The remainder of the book is an engrossing picture of Courtney's
fight to retain his political position in the face of his Party's unseemly
haste to dump him as a candidate, his winning of his constituency's
support and overthrowing the local Conservative leadership, and his
subsequent, heartbreaking loss of his seat by 378 votes while the
former leadership sat on its hands. Ten weeks later hi;; wife was
granted a divorce, and March 1967 saw a special party meeting packed
with Young Conservatives choose one of their number to be the
prospective conservative candidate for Harrow East. "For me the deci-
sion was a blow that seemed politically mortal. The process set in
train by the KGB in August 1965 had been completed."
It must be admitted that Courtney probably gave the Soviets even
more cause for enmity-and perhaps hope for success-than he makes
explicit in the book. In 1947 or 1948, he had had "certain ideas in-
volving the use of fast surface craft and submarines in cooperation
with the SIS," and after he contacted "C," I "discussions took place
about the feasibility of obtaining information from the Black Sea
area" using such craft. Unfortunately the man SIS assigned to the dis-
cussion was Kim Philby, who "listened to my proposals with interest,
for he had a wide knowledge of Turkish affairs and his support was
essential if Naval Intelligence was to make any contribution to the
common effort in the Black Sea." Yes, indeed. "But nothing whatsoever
emerged from this meeting ... Nothing daunted, in 1949 or 1950,
Apl5lfbved For Release 2005/04/28: CIA-RDP78T03 O O kT4Aa 0005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Recent Books: The Courtney Case CONFIDENTIAL
when assigned as Chief of Intelligence Staff to the Flag Officer at
Hamburg,
"Once again I found myself working closely with the Secret Intelligence
Service, and at last I had the opportunity to put some of my ideas into
practice by providing the SIS with direct naval assistance in the Baltic .. .
I was struck by the potential capabilities of stripped-down ex-Kriegsmarine
'E' boat hulls, powered by the incomparable twin Mercedes-Benz 518 diesel
engines. With my assistants . .. at Hamburg and Kiel I was frequently at
Lubeck and Flensburg and other smaller harbours such as Eckernforde and
Kappeln, from which we mounted our operations. Little did I know that the
penetration of the Foreign Office and SIS by the Russian Intelligence Service
must have not only doomed our efforts from the start, but had involved me
personally in sending many a brave man into the jaws of a Soviet trap."
Not only that but, as the press has reported for years now, the boat
crews and even. the teams themselves were penetrated, in both the
Baltic and Black Seas and probably in the Far East as well.
It is amazing that Courtney's post-war commercial enterprises got
as far with the Soviet Union as they did, and in fact his success only
becomes plausible in the light of his deduction that it was leading him
into an elaborate trap. He believes that trap was to have been sprung
on him in Moscow in July 1965; that he was to be held to exchange
for Soviet spies such as the Krogers or George Blake, then in jail in
England; that he escaped the trap only when he had to cancel the
trip at the last minute because of a Party crisis; and that the handbill,
originally designed to discredit him and render him defenseless while
in a Soviet dungeon, was simply too far along to be stopped by the
bureaucracy when the KGB realized he had not arrived on schedule
in Moscow.
Perhaps, but it seems more likely to this reviewer that the KGB
planned to recruit him-or perhaps even tried just before the trip-
and that the publication of the handbill was a vindictive substitute
for the original plot. Courtney naturally does not want to admit that
perhaps the Soviets had reason to believe he would be vulnerable to
recruitment, but by then his publicly expressed "weakness for blondes"
had been documented in his KGB dossier for 35 years. It may in fact
have figured in the UB action against him in 1957. As he put it later
to the press, "I knew the danger of microphones but never thought of
cameras. This was before James Bond and ... the idea never occurred
to me." He obviously thought he could have his cake without paying
the baker, and probably had been doing so for some years.
Courtney's writing is excellent, his index professional, and his ap-
proach, considering the subject, dignified. Above all, however, we must
Appr6GW idlhlase 2005/04/28 : CIA-RDP78TO3194A000300013005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL Recent Books: The Courtney Case
respect his political and personal courage in this matter, even though
it was described in some quarters as "cheek," since the KGB's role
was never proven. The subject matter must have been a'most irresist-
ible to the British press in the wake of the Profumo affair, but it was
relatively restrained, perhaps influenced as much by libel laws as by
a sense of fair play and anger at Soviet high-handedness.
But worse was to come than is mentioned in the book: in March,
1968, Courtney won a suit against his former friend, the out-voted
ex-head of the Harrow East Association, Sir Theo Constantine, for
repeating Courtney's estranged wife's statement that the incident
depicted in the photographs must have occurred in 1963 after their
marriage, rather than in 1961 before it, because in 1961 he did not yet
wear that kind of "underpants." This must have seemed to Courtney
the lowest blow of all and it apparently undermined the Party's faith
in him beyond recall. Whatever the facts of the affair, we can only
wish with Courtney that the Conservative voters of Harrow East had
risen to the occasion and cast their votes, if not for Courtney, at least
against the KGB.
R. H. Sheepshanks
App ed For Release 2005/04/28: CIA-RDP78T031? DB QAQ005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY
THE OKHRANA: The Russian Department of Police. A Bibliography
by Edward Ellis Smith. (The Hoover Institution Bibliographical
Series XXXIII. Stanford University. 1967. 280 pp. $10,00.)
The Russian imperial secret service, the Okhrana, is the only major
security establishment of the twentieth century about which a com-
prehensive bibliography, including material from its own files and
interrogations of its leaders, could possibly appear as an open pub-
lication. It went out of existence in 1917, when the provisional regime
took over and the revolutionary mobs destroyed most of the centrally
and provincially kept records. The Bolsheviks promptly established
their own Cheka, but in no way as a continuation of the Okhrana.
Instead of safeguarding the secrets of the predecessor agency, the
Cheka of the Soviets publicized and exploited them to serve their
purposes.
Despite the voluminous Soviet writings about the Okhrana, how-
ever, nothing has as yet come out of the USSR in the form of bibliog-
raphy on this important agency of the old regime. The present volume
coming from the Hoover Institution is therefore unique, perhaps the
only publication of the kind in the West. It is also logical that such a
book was prepared at the Hoover Institution, well-known as the most
comprehensive repository of the Okhrana materials. Its holdings in-
clude the nearly intact archive of the Paris headquarters, which du-
plicated the records kept at the home office in Petrograd, as well as
voluminous data on international intelligence operations which were
not as fully recorded at the capital.
The author points out in his introduction that "no general work
exists encompassing the Russian security-intelligence organizations
for the period from 1881 to 1917," the Okhrana's span of life. Various
authors have written about it, but "narrowness of treatment and bias
mark most works on the Okhrana," so that the resulting tracts on the
subject are notably subjective. He is entirely correct in this respect,
and his own analysis of the titles and contents does not entirely escape
the taint of the partiality of the authors.
Some of the writings discuss the Okhrana's antecedents with cen-
turies-old origins, dating back to Ivan the Terrible and his Oprichnina,
and follow stages of evolution as landmarked in imperial decrees and
statutes. For an understanding of the Okhrana, and the subsequent
ApprdQl'8MWFM6Fa!Ql1M5/04/28 : CIA-RDP78TO3194A00030001@@05-7
MORI/HRP PAGES 93-98
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Recent Books: Miscellaneous
Soviet security establishments, such historic factors and mores under-
lying the whole system of Russian counterintelligence and counter-
espionage, past and present, are of cardinal significance. The Okhrana,
as sponsored by the imperial decrees, and as described by some of its
former top officials in exile, was an essentially humane agency for the
preservation of law and order. Its task was to safeguard the existing
regime and specifically to neutralize or eliminate the elements that
threatened it: the anarchists (nihilists), assassins, revolutionaries, and
other political troublemakers. In contrast, the writers on the revolution-
ary side universally dubbed it as a tyrannical and brutal police state
within the state. Their flood of propaganda precluded any objective
writing about it at home or abroad.
No matter how wild the accusations or distortions, the Okhrana
itself, or the government behind it, could not and would not commit
itself in its defense. Because of the imperative secrecy about the agency,
it could not reveal facts. It consistently chose not to deny any ac-
cusations. It could not make public that it was perennially under-
staffed, with an average of a few dozen officers and employees in each
major city and province, while propaganda had raised the figure into
tens of thousands of officials and spies in every gubernia. It chose not
to explain that the Okhrana was not in charge of the gendarmes and
the city police, or that the prison administration and the Siberian exile
camps were in no way under its control. The Okhrana was essentially
an investigative agency targeting at subversives at home and abroad
and using any available methods to penetrate their groups and control
their activities. Its plans and operations could never be publicly con-
firmed or denied even when the adverse propaganda contained ele-
ments of truth. As a result, the literature about the Okh:rana has re-
mained to this date essentially one-sided, all contra, with only an
occasional morsel of pro and, therefore, hardly anything objective
in-between.
Smith's Okhrana bibliography epitomizes this situation. He has a
total of 909 entries of books, pamphlets, articles, compendiums of
reminiscences, some isolated rosters of police and Okhrana personnel,
circulars, and the like. Over two-thirds of the bibliography refers to
newspaper articles and editorials which, in turn, are almost exclu-
sively from the revolutionary and post-revolutionary Communist and
other leftist press. Although the writers of articles draw on reminis-
cences or post-revolutionary discoveries of certain Okhrana acts, bias
is seldom concealed. The post-revolutionary, officially approved
Appyyved For Release 2005/04/28 : CIA-RDP TFWll1 AW.J?PQj'0005-7
Approved For Release 2005/04/28: CIA-RDP78affl~~A~-Q8bp208~'ILY05-7
Recent BooKks: Miscellaneous
writer, likewise, could not depict the old security service as anything
but a beastly conspiracy against the Russian nation. Also included are
the works of two Okhrana defectors, Leonid Menshchikov and Mikhail
Bakai. Smith describes them as valuable in illustrating modus operandi,
but these authors were disputed by other revolutionary writers as in-
correct. Smith considers Valerian Agafonov's book Zagranichnaia
Okhranka (Okhrana Abroad - Kniga, Petrograd, 1918) as probably the
best available work on the Paris Okhrana. He analyzes it chapter by
chapter. Agafonov served as a member of the commission sent to Paris
by Kerensky's :regime to investigate Okhrana archives. As a revolu-
tionary (Agafonov was once engaged in Burtzev's counterintelligence),
he wrote about the Okhrana only what was acceptable to the new
rulers. For instance, he was fully informed about Paris Okhrana's
counterintelligence operations against Germany after August 1914,
yet his book made no mention of that substantial achievement against
the enemy at war. Works like Agafonov's, praised by the compiler of
the Bibliography, should instead be marked as partisan and overly
subjective.
The major part of the present compilation is given the general title
of "Operational Methodology" which, in turn, is subdivided by sub-
headings on "Internal Security" and "Operations Against Revolution-
aries" and "Other Organizations and Movements," at home and abroad.
A professional counterintelligence analyst would no doubt use a dif-
ferent approach. The titles under "Internal Security" are a mixture
of writings that could be classified under other chapters. Some are
treatises on government policy and regulations; others, articles on in-
dividuals and their experiences with Czarist authorities; but none add
up to a definitive description of how the internal security service was
organized and how it functioned. The longest chapter, on "Operations
Against Revolutionaries," is perplexing. It contains an analysis of 217
titles, but these deal almost exclusively with reminiscences about
arrests, police brutality, life in prisons, court trials and exiles in
Siberia. The Okhrana, although a special section within the Depart-
ment of Gendarmes, could have played only a secondary, if any, role
in making arrests and trying or exiling people; by law it was not a
punitive agency. This section also refers to one interesting pamphlet
containing instructions on how the revolutionaries are to behave in in-
terrogations. These instructions, published in 1900, are in no way dif-
ferent from current day guidebooks for subversives caught by the
authorities.
ApprdQX99&LF aR 05/04/28: CIA-RDP78TO3194A00030001$$05-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
OFFICIAL USE ONLY Recent Books: Miscellaneous
The chapter heading "Intelligence Against Other Nations" is espe-
cially unfortunate since none of the writings included under it are
concerned with this subject. Only works dealing with Russian revolu-
tionists abroad are listed. The Okhrana's operations were limited in
peacetime to the pursuit of Russian revolutionaries, anarchists, and
other troublemakers. This was the assurance the Czarist government
gave to thirteen other nations which in the decade before World
War I signed a pact to cooperate in such pursuits. Russia strictly
adhered to this pact as long as there was no war. In the conflict with
Japan, however, the Okhrana in Paris placed a strong team of opera-
tives into Belgium who succeeded in intercepting and decoding mes-
sages of the Japanese military attache there. That complex operation
was fully described by Ivan Manasevich-Manuilov, the staff officer
in charge. A copy of his notes is among the Okhrana files al: the Hoover
Institution.
Okhrana officials abroad themselves protested against Okhrana op-
erations against other nations. For example, the archive at the Hoover
Institution contains a set of dispatches to the home office objecting
to an indirect assignment for gathering intelligence on the Austro-
Hungarian navy and the ports of Trieste, Fiume and the Dalmatian
coast. Bound by law, the Okhrana staff abroad refused to comply with
such requests in time of peace.
With the outbreak of World War I, the Paris Okhrana soon con-
verted its activities to counterintelligence and counterespionage tasks
against Germany, Austria-Hungary and Turkey. Some ingenious op-
erations were mounted, and the Okhrana records at the institution
give a comprehensive account of the methods of handling the respective
double agents, of the network stretching into a third country (Switzer-
land to Germany), of disinformation to confuse the enemy, and the
like. Assuming that Mr. Smith had access to the Okhrana files, one
would ask why that material is omitted from his Bibliography.
Other data at the Hoover Institution should not have been omitted.
The archive contains reams of printed regulations and circulars from
the home office dealing with the agentura structure, its functions and
legal restrictions. Folders of circular letters show how various officials
and agents were dismissed from the agentura because they failed to
comply with regulations. Other printed materials, some of which are
in the Okhrana archive and others of which may be available in
libraries elsewhere, deal with statutes and imperial decrees regulating
internal security agencies. A bibliographer cannot disregard that phase
App ved For Release 2005/04/28: CIA-RDP l h141U 0QbItY0005-7
Apprtecent F~o0s I%h2e2jj cujV28 : CIA-RDP78JptbWJA8gp3 ff 005-7
of literature, for that would look as if he had adopted the slogans of
the revolutionists forever proclaiming that the Okhrana officialdom
disregarded its own laws. Mr. Smith included only N. T. Volkov's com-
pilation Zakony politsii (Police Laws), but that work, published in
1901, was superseded by volumes of other legislation, much more perti-
nent to the Okhrana structure and tasks.
Still other materials, some well-known, could have been included.
The Duma's stenographic records of the sessions discussing Okhrana
scandals merit inclusion in this bibliography. From the standpoint of
operations abroad, the Okhrana recruitment of foreign agents, organi-
zation of teams, liaison with foreign services, penetration of post offices
of host countries, live surveillance, and other such topics were occa-
sionally on the agenda of the parliaments in Paris and Rome. As a
result of interpellations, the press of the two countries was able to
disclose the names and activities of most of the Okhrana agents in
France and Italy who were nationals of the two countries. The parlia-
mentary debates often went into such details from agent revelations
that mention in this bibliography would seem appropriate.
In his introduction, Mr. Smith set the question of how it happened
that perhaps the first and best modern security-intelligence agency,
at the height of its efficiency, failed in its mission to protect tsarism.
He refers to historians who blamed it upon Russia's military defeats
in World War I. That, no doubt, was the paramount cause, but the
implied Okhrana efficiency or strength to combat the underground
no longer existed in 1914-1917. The efforts of the agentura at home and
abroad at that time were turned away from the revolutionists. Mr.
Smith's bibliography does not show this, but the fact stands out that
all major Okhrana agent assets abroad and most of its operators, espe-
cially after 1915, were harnessed to the Allied war effort. The Okhrana
archive attests to that fully. It contains accounts of how three or four
staff members operating from all Allied capitals mounted a double
agent network to mislead the German general staff, as illustrated by
the case of agent Dolin. It includes reams of materials which show
daily liaison on counterespionage with the Allied Command in Paris
and coordination with the British through an Okhrana outpost at
Newcastle, England. Several key men among the Okhrana detectives
were converted into deep cover agents, as for instance Henri Bint
and his team, for third country espionage operations, for example from
Switzerland into Germany, and the Jollivet family of Okhrana agents,
and other minor operatives.
Approve Fcl A1 F~eeasse 2005/04/28: CIA-RDP78TO3194A000300010097
05-7
Appr Qr Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
I Al SE ONLY Recent Books: Miscellaneous
These shortcomings do not diminish the worth of Mr. Smith's book
in a broader sense. To say the least, it shows how the ;-evolutionary
writers distorted the true picture of the Okhrana and how and why
the few apologists for it failed so utterly. It should be of greater value
to the historian than to the intelligencer, to the sociologist rather than
the student of law enforcement. And the intelligence official, too, in
this broader sense, should find the book worthwhile for reference.
With few exceptions, the book is properly and well indexed, and has
a glossary of terms and a roster of periodicals consulted. The notations
on each volume are adequate. Nuisances are the endless recurrence of
typographical errors, mistakes in dates, too casual translations of Rus-
sian titles into English, and unexplained abbreviations. These may be
considered as minor faults, but more consistency in transliterating
proper names would normally be expected in an academic publication.
Thomas G. Ther'.celsen
THE ZINOVIEV LETTER. By Lewis Chester, Stephen Fay, and Hugo
Young. (London: Heinemann. Philadelphia: Lippincott. 1968.
218 pp. $5.95.)
The intelligence officer who vaguely remembers the Zinoviev letter
only as a relatively minor incident in British politics during the
'20s will do well to reflect on this book. Its publication is an indica-
tion that the matter is far from dead these forty-five years later. At
the minimum, the book demonstrates that the episode of the Zinoviev
letter was incredibly complicated, and that it was as many have long
suspected and the Soviets have long insisted, a black pra.:)aganda op-
eration, one with massive repercussions unforeseen.
The bare public facts, it will be recalled, were that the London press
published the text of an inspirational letter to the British Commu-
nists bearing the signature of Zinoviev, Chief of the Comintern, only
days before the General Election of 1924, in which one of the main
issues was Labourite Ramsay MacDonald's allegedly pro-Bolshevik
policy. Labour lost the election, and the trade treaty with the Rus-
sians which had been awaiting ratification by Parliament withered on
the vine. British relations with Moscow were blighted for years there-
after.
The authors demonstrate that the letter was almost certainly forged
by a small group of White Russian conspirators in Berlin, who were,
we are told, astounded by the results. The details of how the letter
A~p ved For Release 2005/04/28: CIA-RDP7f$fifd9014 f0:1 MY0005-7
MORI/HRP PAGES 98-100
Appr ed Fo Re~leasMe 2005104128: CIA-RDP78 '~~9~AJ0 0((9 ~.05-7
ecent ~oo s~ Miscellaneous
was surfaced in London, and by whom, are also reasonably well estab-
lished as a result of what must have been a major effort in journalistic
detection. With regard to the question of how the letter found its way
to London, the authors resort to ingenious but not entirely convincing
speculation. They themselves point out, however, that the moment
the forgery left the hand of its contrivers, the European intelligence
services came on the scene, so that it ought not be surprising that the
trail grew dim.
The wonder is rather that so much can be reconstructed from public
or non-official sources. The authors make a point of emphasizing that
they received no assistance in their researches from the British :Foreign
Office or intelligence services. Their expressions on this point betray
a certain ambivalence with respect to the desirability of official help.
"It is tiresome," they say, "to find the Foreign Office of today sitting
pat on the departmental errors of nearly half a century ago." They go
on to make the generalization that reliance on unofficial sources "is
the way in which any unauthorized history involving the intelligence
services must be written; and on the whole it tends to be a more fruit-
ful exercise than the rehearsal of romantic escapades doctored to
satisfy the present controllers of M15 and MI6." On the other hand,
they do not say whether they sought assistance from the Soviet au-
thorities. One wonders what they might have thought fitting to record
in the way of obiter dicta had they done so.
All of which brings this reviewer to raise perhaps an unfair com-
plaint about this otherwise exhaustive reconstruction of a long-past,
fateful series of events. The authors invite acceptance of their finding
that the British press, Conservative party, Foreign Office, intelligence
services, and individuals of distinguished report were all in one way
or another co-conspirators in a colossal fraud. By implication, they
also invite acceptance that the Soviet intelligence services stood idly
by throughout the perpetration of a most damaging covert attack on
essential Soviet interests. This really will not do. It may be that the
Soviet side of the story can never be told. It may be that it would take
another book to explain why not. In any case, it does seem that the
authors ought to have displayed some awareness-as they do not-
that the question of the role of Soviet intelligence in this extraordinary
episode does in fact arise from their own analysis.
With that reservation, The Zinoviev Letter can be recommended,
not perhaps as bedside reading, but as a fascinating, indeed tantaliz-
ing document. It ought to be very useful in the training syllabus.
ApproM'Fb i IRAUW5/04/28: CIA-RDP78T03194A00030001(o'(1005-7
ApjUf~y1ALoG 1 M005/04/28: CIA cenntP Books 1 Mic el00300us 0005-7
MORI/HI
Unravelling the tangled threads of the story, and deciphering the au-
thors' innuendoes would unquestionably be excellent exercise. For the
less energetic, The Zinoviev Letter will still be good value, even for
those who think they have no illusions about the technique of black
propaganda as a weapon of calculable or controllable effects.
Joseph O. Matthews
BAY OF PIGS. By Albert C. Persons. (Birmingham, Alabama: Kings-
ton Press. 1968. 96 pp. $1.50.)
For once a book concerning the Central Intelligence Agency and the
Bay of Pigs has received little publicity. The author is a journalist and
flier who was recruited with a number of other American pilots to
perform support missions for the Brigade of Cuban Freedom Fighters
who went ashore at the Bay of Pigs. Of primary interest is his account
of what he personally saw or was involved with which comprises the
main part of the book. He also speculates on other aspects of the
episode and allocates blame and praise as he sees fit. On the whole,
however, his account is not by any means hostile.
P. O. W. By Douglas Collins. (New York: W. W. Norton and Co.
1968. 310 pp. $5.95. )
This interesting work relates World War II escape and evasion
experiences in a corner of Europe (Czechoslovakia, Hungary, and
Rumania) that has been touched only lightly by comparable narratives.
If it suffers in detail for having been written 20-odd years after the
fact, it gains in perspective.
Captured at Dunkirk, the author, Douglas Collins, spent the next
four years trying to escape. Altogether he broke from custody 10 times.
Starting from the heart of Germany, he gradually worked his way
south and southeastward. His seventh escape was from Hungary. The
eighth and ninth efforts in Rumania took him to the Bulgarian frontier,
as close as he ever got to Turkey, his goal. When the Red Army oc-
cupied Rumania in 1944, Collins was flown to England, thus, he
shortened his captivity by months and had the satisfaction of being
back in Europe with the British Army when Germany surrendered.
The specifics on how and why Collins was recaptured while at-
tempting to cross Hitler's Europe would make good evidence for any
esFQr~jlease 2005/04/28: CIA-RDP9 *4009 D'40005-7
01
Apprnved ~r R1 a se 2005/04/28: CIA-RDP71UMOA -99b0~3089 Qp05-7
ecen oo s: isce aneous
text on evasion. The boldness that made him a great escaper seems,
in the wisdom of hindsight, to have been his undoing as an evader.
Collins' accounts of some of his experiences have value as general
World War II history, particularly his data on the Ploesti air raid of
August 1943 and his portrayal of the German retreat from the Wal-
lachian plain.
ApprovvedlFoArReleasee-2D05/04/28: CIA-RDP78TO3I 94A00030001 &105-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Next 2 Page(s) In Document Exempt
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
Approved For Release 2005/04/28 : CIA-RDP78T03194A000300010005-7
CONFIDENTIAL
Approved For Release 2005/04/28: CIA-RDP78T0MKAM$K10005-7
Approved For Release 2005/04/28 : CIA-RDP78TO3194A000300010005-7
SECRET
25X1
Approved For Release 2005/04/ qR'TA-RDP78T03194A000300010005-7