STUDIES IN INTELLIGENCE [Vol. 2 No. 1, Winter 1958]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78-03921A000300190001-4
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
135
Document Creation Date:
December 16, 2016
Document Release Date:
December 8, 2004
Sequence Number:
1
Case Number:
Publication Date:
January 1, 1958
Content Type:
STUDY
File:
Attachment | Size |
---|---|
CIA-RDP78-03921A000300190001-4.pdf | 7.47 MB |
Body:
Approved For Release 2004/12/17: CIA-RDP18-0392 A
L #19
CON I EI"TIAL'
STUDIES
INTELLIGENCE
JOB N0. ~~g39d1(~
BOX P1fl, _ ---------
I EREIN
26X1
VOL. 2 NO. 1
LW
,1938
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
momm
Approved For Release E:I I(R7TE1A000300190001-4
Apprre't9 r'RILIE`2D1A - 78-03921A000300190001-4
Mia
All opinions expressed in the Studies are those of the
authors. They do not represent the official views of the
Central Intelligence Agency or of the Office of Training.
This material contains information affecting the National
Defense of the United States within the meaning of the
espionage laws, Title 18, USC, Secs. 793 and 794, the trans-
mission or revelation of which to an unauthorized person is
prohibted by law.
Approved For Release 2004/12/1RDP78-03921 A000300190001-4
CONFIDEI"IMAL
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
Next 1 Page(s) In Document Exempt
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
CONFIDENTIAL
Approved For Release 2004/12/17 : CIA~P78-03921A000300190001-4
CONTENTS
Page
Origin, Missions, and Structure of CIA
Lyman B. Kirkpatrick
1
Strategic Thinking and Air Intelligence
Major General James H. Walsh
7
Concepts for a Philosophy of Air Intelligence
Lewis R. Long
31
Developments in Air Targeting : The Military Resources
Model . . . . . . . . . . Robert W. Leavitt
51
Horrible Thought . . . . . . . . . W. A. Tidwell
65
ELINT: A Scientific Intelligence System
Charles A. Kroger, Jr.
71
Report on Hungarian Refugees . . . . Guy E. Coriden
85
Paper Mills and Fabrication . . . Stephen M. Arness
95
Lost Order, Lost Cause
C. Bowie Millican, Robert M. Gelman,
and Thomas A. Stanhope
103
Critiques of Some Recent Books on Intelligence
The New Class-An Analysis of the Communist System,
by Milovan Djilas . . . . . . . . Lena Marks
115
The Soviet Secret Police, by Simon Wolin and Robert M.
Slusser . . . . . . . . . . John Rondeau
123
We Spied . . . . . . . . . Walter L. Pforzheimer
131
Approved For Release 2004/12/17 'ALEJVTo-03921A0003001900d4QRI/HRP THIS PAGE
CONFIDENTIAL
Approved For Release 2004/12/17 $SDP78-03921 A000300190001-4
ORIGIN, MISSIONS, AND STRUCTURE OF CIA
Lyman B. Kirkpatrick
This is a brief summary of the history of the modern origin of
the central intelligence concept and thus of the Central Intel-
ligence Agency.
In 1940 the fortunes of Britain and France were at their
lowest ebb. Some high-level officials of the US Government
were predicting that Great Britain could not hold out against
the Germans. To check on this, President Roosevelt sent Colo-
nel William J. Donovan, prominent New York attorney and
winner of the Congressional Medal of Honor as Commanding
60+1, Regiment in SATnrlrl War T abroad to dis-
Oar-c-- of th
e
t
fi
rs
cover and eport his estimate of the sil, atioi1. Don-all
visited the Mediterranean area, and on his second trip talked
to leaders of both Britain and QFr~ance. His report indicated
that Britain would hold out, lit he urged that the US im-
mediately organize itself for global warfare. Donovan's par-
ticular interest was in the intelligence field, and he went to
talk to Secretary of the Navy Knox, Secretary of War Stimson,
and Attorney General Jackson about his concept of an agency
which would combine intelligence with the forces of propa-
ganda and subversion.
On 10 June 1941, Donovan proposed "a service of strategic
information." This service would have an advisory panel com-
posed of the chiefs of intelligence of the Army, the Navy, the
Department of State, and the FBI. It would draw its personnel
from the Army and the Navy and would also have a civilian
staff. It would not displace or encroach upon the intelligence
prerogatives of the established departments, although it would
collect information independently. This was the start of the
Office of the Coordinator of Information which combined in-
formation, intelligence, and clandestine activities. In 1942,
however, the Coordinator of Information was split and the
Office of War Information - the predecessor of the present
? US Information Agency-was created and given the respon-
sibility for all overt attributable propaganda, information, and
to the Office of Strategic Services - went the responsibility for
Approved For Release 2004/12/17 : P78-03921A000300190001-4 ``-
MORI/HRP PAGES 1-5
Approved For Release 2004/je~&YCIA-RDP78-03921A000300190001-4
clandestine activities and for research and analysis of intelli-
gence.
From the OSS the present day intelligence community in-
herited certain assets. Among these were records and some
methods and means of procuring both overt and secret intelli-
gence. There were certain basic counterespionage files devel-
oped with the advice and assistance of some foreign intelligence
services, particularly the British. There was a considerable
reservoir of knowledge of procedures for research and analysis
of basic intelligence information. There were some skilled per-
sonnel. Finally, but far from last in importance, there were
agreements with key foreign intelligence services.
The history of the OSS, and particularly its relationship with
other US intelligence organizations during World War II, is far
too detailed for discussion in this essay. But it should be noted
that shortly after the creation of the Office of Strategic Services,
top-level officials in the US intelligence community started to
think about a peacetime intelligence service. On 25 August
1942, Brigadier General John Magruder wrote a paper on a
proposed plan for a joint intelligence bureau which would be
an agency of the Joint Chiefs of Staff. For the next two years
there was considerable discussion of this and similar papers.
On 5 October 1944 a document was originated in the office of
General Donovan entitled "The Basis for a Permanent World-
Wide Intelligence Service." Certain of the principles enun-
ciated in this document are interesting,ta-mete. This service
would collect, analyze, and deliver intelligence on the policy or
strategy level. The proposed organiiai.on would have its own
means of communication and`corihroi over its secret operations.
It would not interfere with Npartmental intelligence and it
would not have any police function. An individual rather than
a collective responsibility for national intelligence was pro-
posed. Finally, the director of the proposed organization would
be responsible directly to the President.
It is interesting to note that Secretary of War Stimson com-
mented on the subject of intelligence coordination in his biog-
raphy "On Active Service in Peace and War." This quotation
reads: "Stimson was insistent that no impatience with its occa-
sional eccentricities should deprive the Army of the profits of co-
operation with General Donovan's Office of Strategic Services.
Throughout the war the intelligence activities of the United
Approved For Release 20049I0ffr: CIA-RDP78-03921A000300190001-4
IA-R Approved For Release 2004/12/17 : C C EDP78-03921A000300190001-
States Government remained incompletely coordinated, but
here again it was necessary to measure the profits of reorgani-
zation against its dislocations and on the whole, Stimson felt
that the American achievement in this field, measured against
the conditions of 1940, was more than satisfactory. A full re-
organization belonged to the post war period."
On 18 January 1945, the Joint Strategic Survey Committee
reported to the JCS on the subject of a central intelligence
organization. The members propose first a national intelli-
gence authority composed of the Secretaries of State, War, and
Navy and the Chief of Staffo :the President: There would be
an advisory board consisting of the heads of the various intel-
ligence services. The new organization would have the power
to inspect the operations of the various departmental intelli-
gence services and would have the responsibility for protecting
sources and methods.
At this juncture the press got in _Qf_the discussions for
creating a new intelligence organization and, on 9 February
1945, fairly complete details appeared in the Chicago Tribune
and the Washington Times Herald. There was considerable
furor, and some :members of Congress took a dim view of the
creation of what they felt might become a peacetime "gestapo."
Shortly after this - just a few days before his death -
President Roosevelt asked General Donovan to get together
with the heads of the various intelligence and security services
and get -a consensus of views on a central service. Donovan
did this and also went further and queried.,by letter, all of the
members of the Cabinet. Within the intelligence community
there was general agreement that a central service might be
appropriate, but there were several conflicting views as to
whether it should report to the Joint Chiefs of Staff, to the
Department of State, or to the President, and there was also
controversy as to whether there should be individual or collec-
tive responsibility for national intelligence. The response from
the Cabinet members was varied and ranged from yes to no.
After open hostilities had cea ed, as we all vividly remember,
there was almost frantic haste to demobilize not only the mili-
tary services but many of the war agencies. On 20 September
1945, the OSS was disbanded. Its Research and Analysis
Branch and its Presentation Unit were transferred to the De-
partment of State, its Secret Intelligence and Special Opera-
Approved For Release 2004/12/17 : 6FJP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
4 SECRET
tions Units were transferred to the Army, and the(forfne;=wvere
preserved in the Strategic Services Unit which reported to the
Secretary of the Army.
On 22 October 1945,a report prepared by Ferdinand Eberstadt
on possible unification of the Army and Navy ,recommended a
central intelligence organization and a national security coun-
cil. On 14 November 1945,the Secretaries of State, War, and
Navy met, discussed the proposed central intelligence organiza-
tion, and set up an interdepartmental working committee to
attempt to arrive at a unanimous recommendation.
The end product of these reports and committees was the
issuance on 22 January 1946 of the Executive Order creating the
Central Intelligence Group. ",.,.This Executive Order reflected
much of the thinking and work that had gone on during the
warms) A National Intelligence Authority was created, composed of
the Secretaries of State, War, and Navy and the Military Chief
of Staff to the President. The Director of the Central Intelli-
gence Group was designated by the President, and per onneia
were to be assigned,from_ the respective departments l well as
recruited from civilian life. The Director of the new Central
Intelligence Group was charged by the Executive Order with
preparing plans for coordination. The new organization could
inspect the activities of departmental intelligence if such in-
spection were approved by the National Intelligence Authority.
It could recommend policies and objectives. It was responsible
for correlating, evaluating, and disseminating intelligence and
for the performance of services of common concern and such
other functions as directed. The Executive Order explicitly
stated that the departments would continue to collect, evaluate,
correlate, and disseminate departmental intelligence. Finally,
an Intelligence Advisory Board, composed of the heads of the
service intelligence agencies, was established to advise the Di-
rector of the Central Intelligence Group.
With the creation of the Central Intelligence Group there
commenced a process of accretion of functions taken from the
wartime agencies and from departments which were anticipat-
ing reductions in budget under peacetime conditions. The
Strategic Services Unit was transferred from the Department
of the Army and became the Office of Special Operations
- charged with espionage and counterespionage functions. The
Washington Document Center was taken over from the Navy
Approved For Release 2004ggg41r: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/178EC,,h2DP78-03921A0003001900%1-4
and shortly after that the Army's German Military Documents
Center at Fort Holabird joined this unit and together became
the Foreign Documents Division. The Foreign Broadcast In-
formation Service, an organization with worldwide bases for
monitoring all non-coded radio traffic, which had originally
been under the Federal Communications Commission, was
transferred from the Army and became the Foreign Broadcast
Information Division. During World War II the Army and
Navy and OSSIand occasionally other agencies had al4. ap-
proached US businesses and institutions in search of foreign
intelligence information. An early agreement was reached
that this domestic collection should be performed as a service
of common concern by Central Intelligence with other agencies
participating as they desired, and this became the Contact
Division. Another illustration of the type of functions taken
on is the division of responsibilities with the Department of
State on biographic intelligence. (The list would be much too
long if we attempted to enumerate all of the functions acquired
in this method.
Slightly over a year- and a -half after the creation of the
CIG-on 25 July 1947-the Congress, utilizing most of the fea-
tures of this Executive Order, passed the National Security Act
of 1947 creating the Central Intelligence Agency.
the mission of the Central Intelligence Agency becomes
fairly obvious with the preceding background. The National
Security Act of 1947 describes the general mission with em-
phasis on coordination and on performing services of common
concern. It should be clearly noted also that the legislation
assigns two roles to the Director of Central Intelligence and the
Deputy Director of Central Intelligence - over-all coordination,
as well as the role of head (s) of an Agency.
Approved For Release 2004/12/17 : C9KRbp78-03921A000300190001-4
Approved For Release 2004/12/17 S0DP78-03921A00030019000~-4
STRATEGIC THINKING AND AIR INTELLIGENCE
Major General James H. Walsh
My purpose in this article is to discuss, in very broad terms,
some of the significant aspects of air strategy for the future
and the vital functions that intelligence must perform in order
to insure the success of future air operations. The suspicions
currently entertained that the Soviet sputnik may be getting
intelligence of both meteorological and cartographic nature re-
quired for accurate firing of ICBMs illustrate some of the possi-
ble relationships between air power and intelligence. In a rudi-
mentary way, even the first earth satellites point up the tasks
and capabilities of future intelligence systems required for
survival under conditions of international technological com-
petition - intelligence systems which must meet three basic
criteria: global coverage, instantaneous discovery, and abso-
lute accuracy.
I believe that we have a reasonably good understanding of
past and present concepts of air warfare and the relation of
intelligence to those concepts. it is far more difficult to look
into the future and to do so with the precision and clarity
needed to prepare ourselves effectively for the trials and dan-
gers ahead.
The reason for this basic uncertainty is not that many people
have neglected the problems of aerial technology and its stra-
tegic implications. The reason is rather that we are in the
midst of a technological revolution. Changes are becoming so
rapid, so penetrating and, in many instances, so contradictory
that the direct and indirect results of the technological revolu-
tion tend to control - and at the same time to confuse - the
nature and application of tomorrow's air strategy. Neverthe-
less, it is in this setting of dynamic technical change and a
world beset by what often seems an unlimited number of
related and unrelated political, economic, and military prob-
lems that we must attempt to examine the future direction of
air power.
To begin with, we already have seen major alterations in the
basic nature of air forces since World War II. The transition
00090/~RP PAGES 7-30
Approved For Release 2004/12/17 : (WKUP78-03921A0003 0 1-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
to jets, nuclear weapons, sonic speeds, countless black boxes,
and, to a degree, missiles typifies the changed environment
which governs today's air capabilities as compared with those
of 1945.
Fifteen years ago the RAF qualitatively was the world's lead-
ing air force. Today it is in third place. More important, it
is not in a class, by a broad margin, with the air forces of the
US and the USSR. It has neither the aircraft, the equipment,
the bases, the research and development, nor the funds to
become again a truly self-sufficient force, with strategic capa-
bilities as required by world conditions.
Fifteen years ago the Soviet Air Force was an adjunct of the
Russian army. Statistically it represented a force in quantity,
but it had poor operational know-how and no strategic capa-
bility. Its aircraft were fair, at best. Today the Soviet Air
Force is the largest in the world. It is equipped with modern
weapons, some of them as advanced as those of any other
nation. It has a well-funded and aggressive research and de-
velopment program. Although it still has many weaknesses,
the Soviet Air Force is making a bid for world air mastery.
The US Air Force also has come of age in the postwar period.
It has held the quality lead for most of that time and still holds
it for most of the important equipments. Its personnel are
superior in training and efficiency. But the USAF has prob-
lems, especially in areas outside the SAC program. Its progress
is not to be belittled, but in some areas its progress perhaps has
not been so fast or so forward as we would like it to be.
The fortunate aspect is that during the postwar period the
USAF has grown to be a global force. In fact, to this date, the
USAF - not forgetting its naval support - is the only global
force extant. This American capability is a fact of overriding
importance. It will remain a controlling factor in the inter-
national power equation, to a certain extent, irrespective of
technological slippage and of the inevitable acquisition by the
Soviet Union of a global missile force.
The most important single change since World War II is that
atomic airpower has become the dominant military force. The
only way a nation can deliver nuclear firepower overlong dis-
tances and in a short time is through the air. Sea and ground
delivery of nuclear warheads is important, particularly in spe-
cial situations. But in terms of a global nuclear war, these
Approved For Release 200W0KZIR'ET : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17E CG f2DP78-03921A00030019000) -4
systems - and some of the secondary means of aerial de-
livery - can do no more than furnish local, regional, and tac-
tical support to the strategic air strike forces.
One of the changes upon us deals with defense in nuclear
aerial war. Whereas the offense still seems to have outdis-
tanced defense, the old axiom that like weapons are the best
defenses against like weapons again could become true.
For the moment there is very little one can do when an
atomic explosion occurs except to be underground, fully
equipped with food and non-contaminated water or, preferably,
plenty of Irish whiskey. Nevertheless, the very possession of
nuclear weapons for defensive purposes may act as a "prevent-
ing" factor - not because even the best defense would be capa-
ble of halting an attack, but because a good defense system
would boost the force requirements of the attacker, lower the
probability that he can execute his plan with full success, and
thus, in some cases at least, tend to induce him to delay his
aggression until he has reached the required force and tech-
nological levels. It is in the nature of a "race," that the
aggressor may be unable to achieve such a posture of superi-
ority that he can dare take the risk of nuclear attack. If this
should be a vain hope, for example, because the defender has
failed to keep up with the pace of the race, the actual use of
nuclear warheads against incoming vehicles should reduce the
effectiveness of the offense.
Some of our forward looking scientists are optimistic about
the feasibility of employing anti-ICBM missiles, which would
take advantage of the greatest point of vulnerability of the
early ballistic missile, its fixed trajectory. Many ideas have
been proposed about nuclear predetonation and sophisticated
employment of modern electronics to interfere with incoming
nuclear attack.
There are a number of passive defensive steps which could
be taken to lessen the vulnerability of our retaliatory force.
These include the dispersal of aircraft and missiles, shelters,
and other forms of base hardening, short exposure times, rapid
reaction procedures, and maintenance of a substantial portion
of the alert force in the air at all times.
Unfortunately such systems can be very costly. They are
limited in their coverage and may not be reliable enough for
Approved For Release 2004/12/17 : LlP78-03921A000300190001-4
Aqr.roved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
the safety of personnel and certain equipment. Elaborate pas-
sive defenses tend to disrupt and slow the ability of an air force
to retaliate as rapidly as required. For these reasons the stra-
tegic effectiveness of passive defense is predicated upon effec-
tive warning. By warning I refer to technical alarms such as
radar and infrared sensing and to interrelated strategic and
tactical indications intelligence.
The true effectiveness of defense will be a function of the
scope, size, quality, and mental effort put into requisite weapons
systems needed to furnish capabilities for protection, warning,
interception, and countermeasure tasks. It may be dubious
whether or not even the best defensive system pitted against
combinations of different types of attack weapons ever will
attain a high kill rate, but this may not be the critical point.
Rather, countersystems embodying nuclear warheads and
built around effective warning and reaction responses suggest
that a nation may be able to close the gap between the power
of the offense and present limitations on defense. Such sys-
tems could pre-empt the advantage of surprise by sneak attacks
by an aggressive nuclear delivery force. They would force the
attacker into more elaborate and costly delivery means, pri-
marily large and massive raids which are susceptible to stra-
tegic and tactical detection and to interception measures.
Through all these means and measures the offensive may not
necessarily be priced out of business, but its effectiveness should
be reduced against its primary objective - the opponent's re-
taliatory force. Thus, it would be hoped, the attacker would
be induced not to strike because of the uncertainty over the
success of his initial blow and also because he would have to
risk his main force at excessive loss rates. In nuclear war the
first blow must be decisive: the retaliatory force must be killed.
It is quite clear that intelligence influences the effectiveness
of defense. Whatever the technical proficiency of a defense
system, it can be improved by better intelligence, whereas even
the technically most promising defenses can be invalidated
through intelligence failure anywhere along the "assembly
line" - from scientific intelligence to tactical warning. Per-
haps it should be observed that good intelligence would allow
the utilization of foreign scientific and technological achieve-
ments for the improvement of our own posture. Beyond pro-
Approved For Release 200491i;j : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A00030019000~ -4
SECRET
viding us with better design patterns, such intelligence also
would enable us to build our equipment to such specifications
as to optimize its capabilities against the enemy's weapons.
I should like to turn now to a discussion of various tech-
nological factors, some of them here now and some on the
horizon, and try to relate them into a strategic pattern.
During the years ahead we shall be approaching practical
terminal limits in certain key parameters of weapons systems.
We already may have reached what could be called terminal
explosive power, not that it would be impossible to achieve
higher yields.
Within the next few decades we probably will attain terminal
speeds, at least for terrestrial operations. We cannot exceed
certain speeds without being forced from the earth's gravita-
tional field. Before we achieve theoretical terminal velocities
we should reach a far lower practical speed limit for operations
directed against targets on the ground. We must remember
that the attainment of maximum speed in flight may require
more time than would be necessary to reach a terrestrial tar-
get at lesser speeds.
We certainly shall be capable of terminal ranges in the sense
that future air and missile systems will be able to circumnavi-
gate the globe at least once. I am convinced that there will
be no practical limits to altitude, although there may be tem-
porary barriers to surmount before manned and powered space
flight becomes a reality. Such restrictions could occur in
metallurgy, engines, communications, aero medicine, and nu-
clear components, among other fields.
Let me dwell for a moment on the relationship of altitude to
tomorrow's air strategy. In the immediate future, altitude
essentially will be a matter of tactical advantage inasmuch
as, with respect to powered flight, we still shall be competing in
heights measured by thousands of feet. We have come to
recognize that the attack force with the higher altitude capa-
bility, generally speaking, is the force with the greater penetra-
tion capability. To achieve tactical altitude advantage we are
moving into speeds up to Mach 3 as a result of improved rocket
fuels, higher thrust engines, aerodynamic advances, and even
newer black boxes. I am talking about situations up to 100,000
feet.
Approved For Release 2004/12/17 : c$ BP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
But today we also stand on the threshhold of entirely new
altitude dimensions. Space vehicles already have been climb-
ing to heights of 600 miles, and unpowered satellites, or sput-
niks, are flying around the earth approximately every hour and
a half, at heights up to over 1,000 miles. This altitude is by no
means a limit but soon will be exceeded. Disregarding the
future development of orbital flight, even at this point the
significance of the recent quantum jump is that we are acquir-
ing the capability of staying in the air.
This overriding technological fact will have the most pro-
found impact upon military operations. At present altitudes,
the airman must worry about hurricanes, fog, winds, and other
weather factors characteristic of the dense air which lies just
above the earth. Tomorrow's space flyers must be concerned
with meteoric showers, cosmic radiation, electronic barriers,
and Buck Rogers' conditions within his cabin. Instead of using
flight as a means of traveling from one point on the earth's
surface to another, either for friendly or unfriendly purposes,
the new problem will be to reach an orbit, maintain it, and
utilize nonpowered flight for scientific, military, and probably
economic purposes.
The flying machine of outer space will not spend 90 percent
of its time on the ground, but 100 percent of its time aloft. In
simple statistics, we are moving from transonic speeds and
periodic flights of several thousands miles in length into an
environment where speeds will be of the order of 16,000 knots
and "ranges," depending upon the height and shape of the or-
bit, easily may exceed 1 million miles per day and hundreds of
millions of miles per year.
The development of terminal weapons - in terms of ex-
plosive power, range, endurance, and speed - will not bring
the technological race to an end. Strategies will capitalize
on the new dimension of altitude and perhaps endurance rather
than distance as a decisive area of military competition. Mili-
tary superiority will be dependent upon relative advantages in
electronics, warning, and deception. Thus the sciences of in-
strumentation and intelligence will become truly decisive ele-
ments in the equation of a strategy in which the chief maneu-
vers seek to conquer altitude and achieve enduring control from
the ground to outer space.
Approved For Release 200,4t-A' : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A00030019009 -4
SECRET
Modern air strategy will be affected by a number of additional
problems, each of which could become crucial in varying cir-
cumstances. There is, for example, the requirement that a
portion of the aerial strength must be on constant readiness
status. A strike force that requires one or two days to get
ready is a military liability. Even in today's war it would be
caught on the surface.
An effective air force must be numerically strong and able
to get its combat aircraft into the air in time. It must be
located on a large number of bases, preferably distributed on
several continents and located at varying distances from the
enemy. Moreover, it must be supported by reconnaissance
forces operating vigilantly around the clock. Only such an air
force is in a position to achieve a strategic, though not neces-
sarily physical, invulnerability.
In former wars, material strength was the decisive factor.
The speed with which fire power could be delivered was an
important but still a subsidiary element. The nature of a
future war is essentially no longer a dispute about territory but
a competition for gains in the time dimension. This is because,
in the first place, technology is a variable in time. The speed
with which this factor varies will continue to increase as long
as technological progress continues. In the second place, sur-
prise being a key to success in air and missile warfare, the initial
rounds of conflict are little more than a contest to operate
faster than the opponent. Surprise attack will be successful
if the attacker moves faster than the defender. It will fail if
the defender's "reaction time" deprives him of targets and dis-
rupts the attack schedule.
Intelligence must come to closer grips with the time dimen-
sion. We are dealing not with one uniform period but with a
whole set of different time categories. There is the time prob-
lem of maturing manpower, scientific discovery, and technolog-
ical invention - measured in generations. There is the dura-
tion of research and development programs, decisionmaking,
production, and incorporation of weapons into battle orders -
a period of years to decades. There is the complex problem of
warning - ranging all the way from advanced strategic warn-
ing measured in weeks, months, or even years, to tactical warn-
ing, measured in minutes. There is the problem of reaction
time and interception, measured in seconds and microseconds.
Approved For Release 2004/12/17 : C REIP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
11 SECRET
Pre-emptive, retaliation, deterrence, counterforce, retarda-
tion, and disruption attacks all, in one way or another, are tied
to a specific time requirement. The more mobile warfare be-
comes, the more moving targetsare assuming significance, the
less it is a question of mere "capability" than of "capability in
time." An airplane carrying a high yield weapon can knock
out an air base; the problem is to destroy it at a time when the
target will be most lucrative - for example, just before the
moment when an attack is to be launched from that target.
Need I add that only intelligence can provide this all-impor-
tant "timing capability"?
Perhaps an additional illustration will clarify this thesis fur-
ther: "Reaction time in guided missiles." It is important to
count missiles in terms of numbers, warhead yields, and the
like. But the foremost problem is that of reaction time or
response.
If it takes a strategic missile force four hours to launch,
whereas the opponent can launch within minutes, the obvious
advantage belongs to the side with the shorter reaction time
- provided it has adequate warning. The 4-hour reacting force
will never leave the ground; its threat will be pre-empted. If
this is correct, it appears to be a mistake for intelligence to
count the degree of deterrent power primarily in numbers of
missiles or warhead yields. It will be necessary to assess, above
all, relative times of reaction.
Earlier we discussed the new parameters of altitude. It is
appropriate, I believe, that we reflect on the purpose of operat-
ing at such altitudes. The use of outer space will permit al-
most continuous observation of any point on the earth, a situa-
tion which, although not entirely without precedent, marks
a new departure in modern strategic warfare. Space platforms
are becoming indispensable elements of effective warning sys-
tems against future means of weapons delivery. Unless we
conquer space, a great deal of the scientific knowledge which
we require to remain in the technological race will not be avail-
able.
Furthermore, orbiting vehicles eventually will be used as
weapon carriers and thus will develop into crucial components
of offensive and defensive missile warfare.
All this poses the spectre of outer space military conflict
which will involve three phases: first, the competition to get
Approved For Release 2004Jg?k'r: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : S- P78-03921A00030019000 -
RET 15
vehicles into space in sufficient quantities to occupy desirable
orbits and to make profitable scientific use of orbital flights;
second, the development of military techniques for operating
from our own orbits and for countering the enemy's militarily
significant orbital activities; and third, the ability to neutralize
or destroy terrestrial and aerial components of orbital systems.
This new sphere of warfare raises some perplexing problems
in world relations. In addition to traditional surface bound-
aries, there will arise sovereignties over vacuous orbits and the
areas beneath them-a system of interlaced surface and spatial
boundaries thousands of miles in depth and tens of thousands
of miles in length.
A new pattern of international relations must be developed in
which orbits are occupied peacefully or conquered and in which
orbits must be delineated. During peacetime the nations must
respect each other's scientific and security operations in the
orbits, and in wartime, of course, the purpose will be to elimi-
nate all of the opponent's space vehicles. In turn, there must
be capabilities for protecting the satellites. It is clear that this
involves entirely new types of "aerial" operations, as it is also
clear that the diplomats and international lawyers will have to
do some hard thinking to settle peacefully the problems of orbit
allocation and orbit sovereignty.
The introduction of the orbital dimension into warfare sig-
nifies that factors such as Iron Curtains, the dispersal of air
bases and missile sites, and the ability of navies to "hide," so to
speak, in the vastness of the oceans will tend to lose signifi-
cance. The nature of the new implements is definitive enough
to suggest that the use of truly underground and of undersea
facilities may dominate the terrestrial scene. As a result, the
roles and techniques of surprise will undergo very profound
changes, the exact nature of which we cannot predict.
For a nation to exist and survive under these conditions, its
intelligence system must become a predominant security tech-
nique. Such a system must meet three criteria: global cover-
age, instantaneous discovery, and absolute accuracy. The sys-
tem must be fully operational both in war and peace. Intelli-
gence must be run not only for the benefit of, but by those who
are responsible for decisions of life or death.
I believe I have reached the point where it is necessary to
examine this strategic framework with its epochal implications
Approved For Release 2004/12/17 : @Wrlg5P78-03921A000300190001-4
IA6pproved For Release 20054q J~7 : CIA-RDP78-03921A000300190001-4
in the practical light of where we are today and to consider the
future directions we must take.
The problems of strategic and technological surprise are
becoming increasingly serious. The danger of tactical sur-
prise is not lessened when the enemy, in addition to a high alti-
tude and rapid strike capability, also has a capability for low
altitude air attack and may be developing mixed high and low
altitude offensive forces.
Taking an even broader view, we can say that the nuclear
explosive and the supersonic delivery vehicle have appeared at
a moment when society is quite defenseless against such weap-
ons. During the last few centuries, war has taken place at the
margins of society. Society supported the war from its produc-
tion surpluses and remained intact as a going concern despite
losses and devastations.
You recall that during ancient times, the situation was dif-
ferent. During the Middle Ages, every town had to be self-
sufficient for defense, with walls, moats, shelters, food, and
water reserves. Practically every citizen had to bear arms.
The American frontier town serves as a more recent example
of this dangerous way of life.
I believe that society eventually will adjust itself to the mod-
ern technology of destruction. Perhaps we may have to be-
come troglodytes; our ancestors were. Architects may develop
new types of resistant houses and "safe" urban settlements.
Perhaps we shall develop anti-radiation protection. The prin-
ciple of "hardening" can be applied to many human needs.
I am predicting only that the human mind will not stop in-
venting. After it realizes the grim threat of modern weapons,
society gradually but inevitably will take measures to assure
its survival. I am basing this prediction on my faith that mod-
ern man, morally and intellectually, is not inferior to previous
generations of 700 and 2500 years ago.
Whether this process of social adjustment is going to last
20 or perhaps 50 years I am unable to say. But during this
interim phase, humanity well may be passing through the
greatest peril of its existence. A war five years from now prob-
ably will be immeasurably more destructive than a war around
2000 A. D. Our security, therefore, must be tailored to get us
and the Free World safely through this immediate period of
extreme hazard.
Approved For Release 2004SIONBT: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CSA-RRDP78-03921A000300190001-4
17
It is this interim character of the present military situation
which confronts us with many perplexing problems. Defense
planning, which includes intelligence, is faced with numerous
paradoxes.
In this age of maximum offensive strength, there may be a
great deal of reluctance to use up-to-date weapons, simply be-
cause no one wants to unleash a nuclear war. Yet we must
prepare ourselves for a contest which requires us to put the
bulk of our resources into nuclear armaments. As a result,
we may have only limited capabilities to wage war in which
nuclear weapons do not provide the basic fire power.
Yet some people have gone so far as to advocate the retention
of full-fledged non-nuclear forces in addition to atomic forces.
It .is generally agreed that we should prepare ourselves to fight
with nuclear weapons. Yet some contend that we also should
retain a capability to fight in the style of World War II - high
explosives on the ground, at sea, and even from the air.
We probably could agree that the availability of non-nuclear
forces would be very advantageous. Several types of non-nu-
clear explosives will remain with us, even in the nuclear age.
Under certain tactical conditions, those may be even more ef-
fective than nuclear materials, which is the main reason why
they should be retained.
Unfortunately, the question is not one of advantage or dis-
advantage, or even of choice. The question is one of capability
in all aspects - manpower, military organization, research,
funds, training, equipment, tactics, and so on.
Suppose that we maintain both a nuclear and a non-nuclear
defense establishment. There is the high probability or near-
certainty that the investment in non-nuclear arms would be
invalidated as soon as the first atomic weapons are used. This
will happen, almost inevitably, at the first serious military set-
back of either belligerent.
But the question of non-nuclear armaments is not just a
matter of duplication. The cost of matching atomic systems
with non-nuclear weapons in terms of relative military effec-
tiveness would be exorbitant. More significant, such a second
force could not be established on any reasonable scale unless
we acquire two sets of our national resources, two sets of our
qualified manpower, and two sets of our country.
Approved For Release 2004/12/17 : bBARD)P78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
18 SECRET
Iam not raising the issue of limited versus general war. The
requirements of any local war situation can be met from avail-
able and programmed forces and resources.
Rather, I am addressing myself to the problem of attempt-
ing to build a non-nuclear force at the expense of our atomic
strike and defense units, which must be maintained at an in-
creasing degree of readiness because of the overwhelming pri-
ority of the Soviet nuclear threat to the US and the Free
World. We cannot turn back. There may be a collapse of
nuclear courage, but no longer can there be any doubt that
we have crossed the nuclear Rubicon.
A similar paradox confronts us in disarmament. If the
danger of attack could be eliminated by reductions of force
levels and by the outlawing of particular types of weapons, the
security of all nations unquestionably would be enhanced. The
trouble is that with the power of modern weapons, even minor
infractions to disarmament agreements may prove fatal.
After 1919, the Western Powers tried to control German arm-
aments. But practically every week a German arms violation
of the Versailles Treaty was reported. Many work shops re-
peatedly were discovered in which, it was said, machine guns
were being produced under the guise of baby carriages.
Nevertheless, the security of the Western Powers did not
seem vitally threatened, despite the fact that the Germans
maintained secret arsenals and continued surreptitiously to
produce weapons which they were not supposed to have. These
weapons did not seem powerful enough to pose a real threat to
Western security. Neither were the camouflaged divisions
which the Germans maintained secretly.
But in our time a nation which produces perhaps as few as
50, or as many as several hundred high-yield weapons could
become a real threat to the peace, even with makeshift delivery
vehicles, especially if other nations faithfully adhere to their
disarmament agreements. You are well aware of ominous in-
fractions to such agreements in North Korea.
The point is that we cannot go back in history and undo the
discoveries of nuclear fission, electronics, and aviation. We
have to live in the modern world. Technological progress will
tend to "break through" even the most elaborate and sophisti-
cated disarmament "controls." Each breakthrough will neces-
Approved For Release 2004 jtT CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 :giI PP78-03921A00030019000(1 4
sitate renegotiation of agreements. There will be little, if any,
stability and durability, let alone guarantee of assured inter-
national safety in such arrangements.
I confess that this is a very dismal picture. It will not be
changed by expectations that the human race will become
peaceful and angelic in the next 20 years. There are two
brutal facts which we have to remember. The first is that the
Soviet regime still is around. Although it sometimes seems to
be showing signs of middle or even old age, there is no new
evidence that proves that Kipling was wrong when he wrote :
"Make ye no peace with Adanizod, the Bear who walks like a
man."
The Soviets have not changed their basic objectives. Their
policies have remained constant in areas that count, including
their fantastic military preparedness effort. It is clear that
the Soviets do not expect that the millennium of peace has
dawned. While they prepare for war we cannot turn our backs.
When they talk conflict, we cannot risk to ignore the peril.
When they arm themselves with the most modern weapons, we
cannot reduce the magnitude of the threat by wishful thinking
about their supposed inability to do that which manifestly they
are doing.
We can philosophize that the Soviet Union will enter into an
evolution which, after some time, will transform the present
Bolsheviks into Jeffersonian Democrats or Puritan pacifists. I
do not believe that anyone who has studied Russian and other
revolutionary history seriously expects such a mutation will
take place.
Naturally, I do not postulate eternity for the Soviet system:
their time will come. The question is, when? So far, reports
about their demise usually proved quite "exaggerated." Their
resilience has been extraordinary. Distinguishing our hopes
from realistic planning assumptions, we would be foolhardy not
to give them an additional life expectancy of one or two
decades. We must assume that they will remain in power dur-
ing the entire period when the technological challenge to the
US will be at a maximum.
It is not certain, of course, that the Soviets deliberately will
launch an attack on the US. But at the same time we cannot
be sure they will not. In the same vein, there is no doubt but
that the social system of Russia is changing in many ways.
Approved For Release 2004/12/17 : G9 REb'78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
W SECRET
But is this necessarily a favorable development? One danger
surely is that if the Soviet dictatorship were liquidated by force
or otherwise, this event - which only optimists expect at this
time - could precipitate a major internal crisis. Such a crisis
would be uncontrollable. This means that it could lead very
easily to a world conflagration. There just is no way by which
we could conjure away the ominous dangers in our future.
This leads me to the second point of pessimism about peace
in the foreseeable future. It is a mistake to consider the Bol-
sheviks as the only cause of conflict. Wherever we look at the
continents today, there is plenty of politically combustionable
material. Old political structures are breaking down. New
nations are emerging. Most of them have their own imperi-
alistic ambitions, and some of the older nations show frighten-
ing signs of decay. Economic difficulties, cultural transfor-
mations, intellectual crises, and ideological passions acerbate
many of these political changes, not to mention inflammatory
propaganda campaigns, political warfare, and the like.
Unfortunately many of the political minds still function as
though we were living in the time of gun powder and sea power.
Few have grasped the significance of the modern technology.
There is a dangerous timelag between political thinking and
technological reality. As industrial technology advances,
psychological stability weakens. We must admit the possi-
bility that world society will grow sicker and ever more un-
stable, even as the descendants of Icarus reach out for the
moon.
It is unjustified, therefore, to expect that all nations will
observe restraint in order to avoid nuclear conflict. Perhaps
most nations will, but the odds are that there will be a few who
will act irresponsibly. Hitler was not the last specimen of his
type.
Recent sociological research asserts that a large percentage
of political rulers and regimes have been, historically speaking,
criminal in motivation and action. There is no doubt that
many rulers, especially those who acquired unlimited powers,
may have been, at least partly, insane. In fact, a German
historian coined the term "Caesarian insanity" in order to
describe the actions of many Roman emperors.
Although we have made some political progress, the world
nevertheless has had more than its share of insane, criminal,
Approved For Release 2004JO& : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CI RDP78-03921A000300190001 q
and power-hungry rulers during the 20th century. Crime and
insanity rates tend to rise as industrial civilization advances.
It may be very convincing to us to say that because of the
existence of hydrogen weapons the power-seekers should mend
their ways. This type of argument remains unconvincing to
the evil doer who is willing to accept the risk, regardless of the
consequences.
There is only one way to reduce the probability of criminal
aggressiveness. That is, to remain militarily overpowering
and mentally more vigilant than the would-be aggressor - to
outsmart and outarm him at every turn and to apply per-
suasive techniques to protect him - and us - from making a
miscalculation. It is not enough to possess what could be
called a "statistical posture of deterrence." The aggressor also
must be convinced that it is inadvisable for him to break the
peace. But do we master the techniques by which we could
have such an impact on the opponent's mind?
We are in the midst of a lasting crisis which Mao Tse-tung
has described as "protracted conflict." Political and psycho-
logical weapons are being used every day to advance the Com-
munist cause. In modern conflict, even though actual shoot-
ing may not be taking place, air power and the threat of almost
instantaneous massive destruction have become the key ele-
ments of the psychological as well as the physical struggle.
The extent to which we can deter the opponent from attack-
ing us determines our freedom of action on many of the world's
battlefields. If the level of our ready deterrent strength is too
low to provide the assurance that the enemy will not react with
an all-out attack, we could be inhibited in executing proper
defense actions in subsidiary theaters.
Deterrence is a necessary condition for the maintenance of
peace - and the waging of limited war - but it cannot be a
static condition if it is to keep that peace. If any nation
acquires a more effective weapons system, the best posture of
deterrence existing before the technological mutation is subject
to rapid nullification. We live in a world where the threats to
tomorrow's peace are developing today in the laboratories and
on the drawing boards.
It is true that so long as the two main competitors run neck
to neck, even a major advantage in one or more technological
fields may not necessarily upset the balance. A state of mu-
Approved For Release 2004/12/17 : (SKREJP78-03921A000300190001-4
Approved For Release 2004/1
SEC2/17 : RET CIA-RDP78-03921A000300190001-4
2
tual deterrence may be reached which essentially would mean
that a world conflagration could occur against the deliberate
planning of both the US and the Soviet Union. Hence I do not
believe that the Soviets merely are trying to catch up in the
technological race. On the contrary, they seem to have organ-
ized themselves to win the technological race on a broad front,
not only in many significant scientific areas but also in combat
operational strengths as distinguished from mockups and pro-
totypes. In other words, they may be trying to surpass us
simultaneously by at least one whole and perhaps two weapons
generations.
The technological race is the very essence of protracted con-
flict. It is the main event which we cannot afford to lose. The
essence of this conflict is not, as many of our contemporaries
believe, a series of limited wars in the jungle and in the desert.
Any American intervention into limited war depends crucially
upon our relative technological posture. If we lose the tech-
nological race we cannot fight on local and regional fronts.
Nor will an increase in our capability to fight in Bali or Tim-
buctu improve our over-all deterrence. It certainly is not likely
that, should the US fall behind in technological capability, the
Russians will press their advantage merely to get a few fringe
benefits. The struggle between Rome and Carthage is more
meaningful to our times than the formalized and restrained
war-tournaments of some epochs in the history of Christian
Europe.
Technological superiority in means of delivery is the essence
of success in nuclear war. The idea that nuclear war will take
the form of an exchange of mutual blows perhaps forecasts
correctly what is going to happen. However, this is not neces-
sarily a concept on which the military planner should work.
The purpose of planning for nuclear war is to achieve such a
predominance of strength that a nuclear blow can be delivered,
without the undue risk that a deadly retaliatory blow will be
returned. Even the Soviet military leaders who, during the
Stalinist period, belittled the importance of military surprise
now appear to recognize that surprise could be the condition
of nuclear success.
The acquisition and maintenance of a dynamic capability to
deliver a rapid and devastating blow - plus a proportionately
dynamic defense - are prerequisites to survival. The nation
Approved For Release 2004, g@: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 :S~ArDP78-03921A000300190001-4
which insures that its retaliatory force is, in fact, effective at
all times, is obtaining maximum protection against preventive
and pre-emptive attacks. The success of preventive war and
pre-emptive nuclear launchings depends upon the achieve-
ment of triple or quadruple surprise - technological, tactical,
timing, and conceivably strategic. The US can keep its re-
taliatory guard up only if it is able to render those surprises
too costly, too impractical, and too uncertain. Thus surprise
attack will be too risky for enemy resort only if the US keeps
ahead in technology and intelligence, as well as in its force
levels and, above all, in reaction times.
Should we lose tempo and should one or more of these four
pillars of our security crumble, the enemy's superiority may
become such that he need not use nuclear weapons except as a
threat. The so-called ultimate threat of large hydrogen weap-
ons could become "demilitarized" -- by manipulated fear.
Suppose the aggressor says : "I grant that you can retaliate,
but you will be completely devastated through my first blows.
We leave it to you whether or not you want to elect your own
death. If you retaliate, you will die, at best with the comfort-
ing thought that you have killed some of us. Or you may
survive under our whip. That is your alternative." It is
known that the Soviets are doing considerable research on
conditioned reflexes and brain-washing techniques. Manipu-
lated fear and the conditioning of the opponents' mental and
psychological reactions are strategic concomitants to nuclear
weapons. The Soviets don't overlook a bet.
Previous wars have lasted for years. Ever since the emer-
gence of a modern industrial society with its long mobilization
requirements, war could not be short. A future war may be
decided within a matter of a few hours. I think it is wrong,
however, to place all attention on the destructive phase of this
type of conflict.
In previous times, the length of the war allowed us to remedy
the shortcomings and omissions of peace. Today and tomor-
row, once the climax of the conflict has come, we shall be the
prisoners of our previous decisions. In that critical phase we
shall not be able to increase our force levels, acquire a new set
of technological weapons, adjust our tactics to outdo those of
the enemy, or even reassure the fearful and give orders to the
panicky.
Approved For Release 2004/12/17 : CSlWA'78-03921A000300190001-4
f,proved For Release 2004/g Ja7,,: CIA-RDP78-03921A000300190001-4
The protracted conflict may last longer than any previous
war. Although the climactic or decision phase of this conflict
may be short, still, the conflict could endure for many decades.
We are in the battle now. As a consequence, the main battles
are being fought by military forces in continued readiness, by
warning and intelligence services, by the research and develop-
ment community, by national and industrial planners, and by
budget makers, as well as by moral and intellectual attitudes.
Militarily speaking, the decisive phase could be won or lost
by the staff and operational officers who 5 to 10 years before
the shooting select or reject certain weapons systems, succeed
or fail in shortening lead times, organize offensive and de-
fensive forces, determine the balance between force elements,
and plan deployment and reaction times. It also may be won
or lost by the executive and congressional branches which de-
cide, with a timelag of 2 to 3 years, the force levels to be main-
tained in any technological phase; by the weapons require-
ment, procurement, and logistics planners within the military;
and by industry, all of whom, together, have the task of devel-
oping and producing superior weapons faster and in larger
quantity than the enemy; finally, by intelligence officers who
must try to forecast the relative strengths and weaknesses of
the strategic equation 5 to 10 years ahead. The latter will suc-
ceed - or fail - depending on whether or not they convince
the powers-that-be that their best estimates are valid.
In protracted conflict, the climactic phase may be war in its
most extreme form. If the climax is a matter merely of threat
and surrender, it will be the most "peaceful" of all wars. To
intelligence its most significant aspect should be that pro-
tracted conflict is a war during peace.
It is easy to enumerate the need to win the technological race,
the requirements for adequate numbers of weapons and forces,
the advantage of hardened and dispersed base locations, the
necessity for fast reaction times, and so forth. But the basic
reason these requirements are difficult to satisfy is that no
nation has the economic capability to live up to the exigencies
of protracted conflict in the early period of the nuclear age.
I am not talking about budgets which can be increased and
reduced. I do not mean various degrees of economic mobiliza-
tion and readiness. Rather, I refer to more fundamental
limitations.
Approved For Release 2004) p' : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 SJ&81DP78-03921A00030019009 -4
To win the technological race a nation needs numerical and
qualitative superiority in technicians and inventive geniuses.
Unless the most revolutionary educational changes are made,
it is unlikely that sufficient scientists and technicians will be
produced to satisfy the growing needs of increasingly complex
military programs. Even a program which marshaled all edu-
cational resources into scientific and technical curricula prob-
ably would be inadequate for acquiring that degree of technical
superiority and material effort which makes the launching of a
nuclear attack or the psychological threat of such an attack
a relatively riskless affair.
The cost of weapons systems is rising geometrically, while the
increase in productive capabilities proceeds much slower.
There is the problem of protecting and rebuilding our cities and
facilities to survive in a nuclear environment. This is a prob-
lem - so far largely untouched - which clearly accentuates
the severe limitations on our economic capabilities to meet the
challenge of the nuclear age. In this time of economic plenty,
scarcity still is the supreme fact of civilian and, above all, mili-
tary economics.
Material resources are not the only limiting factor. Time,
which is a major resource, also is in short supply. For ex-
ample, the time needed to transform a blueprint into a modern
weapons system has become such that a military force never
possesses an active arsenal without at least some obsolescence.
I mean obsolescent in the sense that certain tasks simply can-
not be accomplished against opposition or must be undertaken
at excessive risks and costs.
There is one inescapable conclusion from this discrepancy
between requirement and capability. It is this: the future
strategist has the potential choice of an entire technological
spectrum of weapons. At least several weapons systems will be
able to do the same task.
Because of the technological potential available to both sides,
he will have to decide whether to select a faster or slower
weapon, an explosive with greater or lower yield, a weapon of
endurance or of stealth. Should he guard against high or low
level attack? Should he dispense with manned bombers in
favor of missiles? Should he select an earth satellite
"anchored" approximately 21,000 miles above its target to de-
Approved For Release 2004/12/17 :bP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4 SECRET
liver nuclear firepower - or should he use a submarine from
which to launch a missile?
In practical terms the strategist can select only a limited
number of systems from this entire technical spectrum, which
will grow as we progress further into the scientific era. Strat-
egists on the other side have to make similar eliminations.
The chances are that the choices may not be identical because
of different strategic objectives, production capabilities, opera-
tional doctrines, concepts of defensive warfare, and so forth.
In turn, because the choices probably will be different on both
sides, the possibility of surprise and other major military in-
itiatives will increase.
Therefore, intelligence must forecast, in ample time and cor-
rectly, the enemy selection so that proper defenses can be de-
signed. Of course, the choice of the enemy may impose the
need for counterweapons, which may have a feedback against
our original weapons choice.
It is necessary to insure that the relationship between what
we actually have and what we require to counter the enemy's
principal threats is such that we are not accepting undue risks.
If we made a poor or overly narrow selection from the spec-
trum, if intelligence fails to guide the research and develop-
ment community concerning the enemy's probable selections,
we might invite attack, provide inadequate defense, and jeop-
ardize life and liberty. But if our intelligence is keen and our
armament effort generous we might ensure peace for the period
of the technological cycle.
We are in a conflict which has and undoubtedly will endure
for decades but which at present is changing complexion. Gen-
eral J. F. C. Fuller coined the term "machine warfare" to de-
scribe World Wars I and II. This expression no longer fully
applies to future "technological warfare."
I am afraid that the Communists have shown a rather sophis-
ticated understanding of the strategic problems involved in this
new form of technological struggle. They seem to understand
interrelations between social conflicts and technical and eco-
nomic competition. More than that, they are organizing them-
selves to achieve an overwhelming strategic posture in the tech-
nological realm. They are girding to win the technological
race against the US. Whatever the disadvantages of a dicta-
torial system, their regime responds to rapid decisionmaking.
Approved For Release 2004 t T CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : RETDP78-03921A000300190093-4
In this area, we do not seem to have matched their strategic
comprehension. We are said to have made the decision never
to strike the first blow. At the same time we have neglected to
introduce sufficiently into our thinking the fact that if the
opponent is allowed opportunity to achieve a broad tactical suc-
cess through an initial blow, the retaliatory strategy must be
more costly and complicated in order to compensate for the
risk and loss which could occur at the outset and weaken the
retaliatory force before it goes into battle.
Under the postulate that the enemy strikes first, defense
must be more expensive than under the postulate that we shall
not surrender the initiative. It follows that we must not be re-
luctant to pay the price of our security against an opponent to
whom we present the gift of the deliberate surprise attack.
The technological race has engulfed us exactly as a fast flow-
ing river occasionally catches the unsuspecting oarsman. Such
a situation cannot be met and overcome by preaching to the
river, by throwing away the oars, or by using only one of two
hands. In such a situation, all skills and all strengths are
needed to ride out the rapids and not get smashed against the
rocks.
The fundamental conclusion I want to leave is that the tech-
nological race, because of various economic limitations and po-
litical climates, may not be won by any super power engaging
in the competition, even with all its strengths. But this race
very well may be lost by a country which fails to put its con-
tinued best efforts into the challenge.
It is to a large extent the duty of the national intelligence
community to explain to our nation's leadership the true na-
ture of this strategic problem. I pray that we will not fail in
this task which is indispensable not only to our survival but to
the survival of civilization.
Intelligence has been getting the facts about the Soviet Bloc,
or at least enough of them to enable many right decisions to be
made. But we have not been able, often enough, to get our
information and evaluations accepted and acted upon. The
somber fact is that as professional intelligence people we have
not entirely grasped the meaning of protracted conflict in the
nuclear missile age.
I believe it not unfair to state also that as professional intel-
ligence people we have been disappointingly slow in under-
Approved For Release 2004/12/17 : ?DARBP78-03921A000300190001-4
Arnroved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
standing the nature of the pressing problems which are con-
fronting us. Only too often our categories of analysis and esti-
mates still reflect the strategic realities of a passing age. We
know all about the deposits of even the least important raw
materials, but we may miss major scientific discoveries. Our
battle orders of the infantry are considerably better than those
of earth satellites. We are adept in measuring floorspace, but
we are rarely engaged in comparing lead times. We are able
to refine our calculations of weapons yields to the first decimal,
but the analysts worrying about Soviet neuropsychology have
yet to break through to the national estimates. We produce
mountains of "data," but our progress in data handling para-
phrases Lenin's title, "one step forward, two steps backward."
We are considerably better in post mortems than in warning.
Our understanding of man's greatest resource, time, has re-
mained fuzzy in most areas.
All in all, although we often express our conviction as to how
important intelligence is to national security, we ourselves have
not quite realized the crucial position we are occupying in the
present power struggle. It is really the effectiveness of intel-
ligence which, together with the effectiveness of our scientists,
is the basis of technology. Beyond the development phase, in-
telligence is either a multiplier or a divisor of military strength-
in-being. It is the one "weapons system" which by necessity
is in constant touch with the enemy, regardless of whether
there is war or peace. And in war, of course, intelligence re-
mains a key condition of success.
But we must elevate our sights beyond the old saw of intel-
ligence being the "first line of defense." Intelligence is the fac-
tor which should make defense economically practical, tech-
nologically superior, and strategically victorious. In the mis-
sile age, intelligence literally will merge with the decisive weap-
ons system, lest the missiles be entirely ineffective.
But intelligence will not be able to do this job unless it comes
of age as a technological system in its own right. We must
get the equipment our ubiquitous, instantaneous, and ency-
clopedic mission requires. We must have the forces to operate
these tools. We must develop utilization techniques which are
at par with or better than those equipments. And we must
be able rapidly to feed our information to all users.
Approved For Release 2004"t 1f: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 SECRET lA-RDP78-03921A0003001900% 4
One feature will remain unchanged: the ability to think.
Electric computers and space telescopes are no substitutes for
common sense and judgment. Reasoning by false analogy,
preoccupation with minor problems to the detriment of major
issues, emphasis on decimals and disregard for the large magni-
tude, wrong philosophies about the rules of evidence, delusion-
ary procedures such as the piling of estimates upon estimates
- not to mention normal human failings such as prejudices,
wishful thinking, parochial interest arguments, and subver-
sion - all those will remain possible in the era of technologi-
cal warfare. The machines, even the electrons, are no better
than the brains they are designed to serve. It is gratifying
to think that when the machine proves to be inadequate - for
example, because it may take three months to "program" it -
common sense and "conventional thinking" still will be called
upon to take its place.
The plain fact is that the machine, however good, will not
replace the analyst. The machine will make the human brain
a more powerful tool - this is the main reason we need it in
intelligence. Intelligence technology is indispensable for the
rapid handling of thousands of data and for the reduction of
innumerable variables to manageable factors. This technology
is the key to speed, coverage, and accuracy; to computation;
and to experimentation with, and testing of, our conclusions
and estimates (for example, through "gaining" techniques).
But intuition and insight are necessary to make the ma-
chines work. In turn, intelligence technology will make its
greatest contribution if it allows deeper insights and ever more
creative intuitions. Man has remained the key factor in tech-
nological warfare, as he was the key to victory when rocks and
clubs were the most powerful weapons. Military, or in a
broader sense, conflict intelligence will be at its best when it
is based on brain intelligence : IQ's plus wisdom.
Pending the dawn of the technological age in intelligence,
we should face up more courageously to the facts of life, how-
ever bitter.
As a nation and as the core of the Free World alliance, we
have been underrating the danger for more than twelve years.
Why was intelligence not more reliable? Why did we fail to
see the obvious? Our own thought patterns and our intel-
Approved For Release 2004/12/17 : ?LRGRDP78-03921A000300190001-4
AADroved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
lectual isolationism have proved to be far more dangerous
enemies to our security than the Iron Curtain and the ominous
developments behind it.
Approved For Release 200: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/1 2~gN g 8-03921 A0003001900?1-4
CONCEPTS FOR A PHILOSOPHY
OF AIR INTELLIGENCE
Lewis R. Long
I should like to set forth certain concepts for air intelligence
that I feel would vitalize an air intelligence philosophy and
could lead to an air intelligence policy and doctrine consistent
with the dominant role that air power must play in the years
to come. I make no claim of originality in all these concepts;
nor do I consider that they alone would form a sound air intel-
ligence doctrine. However, together with the valid concepts
contained in the doctrinal manuals, they would, I am con-
vinced, provide better guidance to the field than has hereto-
fore been available.
I should like to emphasize that all the concepts presented
are meant to be applied within the framework of one overrid-
ing concept for a philosophy of air intelligence - that air intel-
ligence is geared to air power in a nuclear age and that it has
the same predominant characteristics as has the air force -
range, speed, mobility, flexibility, and penetrative ability.
Because air forces have the capability of flying to any point
on the globe and returning to any desired location, air intelli-
gence must provide basic information to guide such flights in
peace or in war. Because air forces exert a dynamic impact on
all forms of international relations, air intelligence must be pre-
pared to expose for the scrutiny of air commanders the entire
structure of other nations and to advise and assist in the deter-
mination of air strategy and policies.
In the established principles for the successful employment
of air forces it is considered that the air forces are an entity.
Even so, air intelligence must be considered indivisible and re-
sponsive at all levels of operation to employment as a single
aggregate instrument. Air intelligence must be employed for
the attainment of a common objective, which -in essence -
is to contribute to the security of the nation. Air intelligence
provides the key to proper employment of the air forces in ex-
ercising the initiative in many different conditions of interna-
tional relations, in taking advantage of different opportunities
Approved For Release 2004/I 2/l]- Y f'-03921A00030019M ..WHRP PAGES 31-50
Approved For Release 2Q j3 .f J -RDP78-03921 A000300190001-4
as they occur, and also in creating. opportunities in which bene-
fits to the US may accrue by the utilization of air forces in peace
or in war. Air intelligence must also guide the air force in ex-
ploiting the principle of surprise, in order to attain both mili-
tary and psychological advantages through speed, deception,
audacity, originality, and concentration. For the present, air
intelligence must concentrate on indications of imminence of
hostilities, without neglecting information on capabilities and
vulnerabilities of potential enemy countries. This concentra-
tion of effort not only will contribute to the security of our
forces but also will provide guidance for combat operations if
war is forced upon us. Finally, air intelligence must be care-
fully coordinated through proper control.
CONCEPT NUMBER ONE. Intelligence agencies are never
more at war than in periods of nominal peace. The logical out-
growth of this concept is, of course, the fact that the success
of the initial phases of war (and in this thermonuclear age
these probably will also constitute the decisive phases) will de-
pend on the quality of intelligence produced in peace. Most
people can understand and pay lip service, at least, to the lat-
ter idea, but they balk completely at a rational consideration of
the first one when it comes to providing tangible support
needed by the intelligence structure. I have never, in peace-
time, seen an intelligence staff at any echelon that was not
undermanned, overworked, and restricted in its operations by
a lack of real appreciation on the part of the command for the
goals the intelligence section had set for itself to accomplish
in the light of the command mission.
At all echelons intelligence staffs must have adequate num-
bers of the best qualified personnel, maximum equipment, facil-
ities, and funds; maximum freedom of action; and coequal
status with other major staff elements. It can be categorically
stated that if the air force intelligence structure had all the
support it could profitably employ - and fully justify - in
peacetime, its resources would be ample for any type of war we
might become involved in.
Let us now analyse each of the requirements (personnel, ma-
terial support, freedom of action, and coequal status) in terms
of what other writers have had to say, bearing in mind these
three basic intelligence missions : to provide timely warning of
the imminence of hostilities (whether on a total or limited war
Approved For Release t2EWiAi1lA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
CONFIDENTIAL 33
basis); to provide detailed knowledge of the capabilities and
vulnerabilities of potential enemy nations and of friendly and
neutral nations; and to provide the best possible intelligence as
to the intentions of foreign nations, particularly those that are
our potential enemies.
PERSONNEL. During wartime, all the services drew heavily
on civilian professions for manning intelligence posts. Law-
yers, insurance adjustors, investigators, police enforcement of-
ficers, scientific and technical personnel, and teachers were put
into uniform; and, by and large, these people carried the intel-
ligence workload of the services. By and large, too, their con-
tributions compared favorably with those of professional mili-
tary people. There have been numerous attempts made to
identify the qualifications for intelligence personnel. Farago 1
lists ten major groups of traits which "the good spy is supposed
to possess" in order to qualify for that particular aspect of
intelligence work. For the most part, these same traits could
be used as a starting basis for selection of personnel for other
intelligence tasks.
First of all, his morale must be high and he must be
genuinely interested in the job ahead.
Second, he must be energetic, zealous, and enterpris-
ing.
Third, he must be resourceful, a quick and practical
thinker. He must have good judgment and know how
to deal with things, people, and ideas. He must be pro-
ficient in some occupational skill.
Fourth, he must be emotionally stable, capable of great
endurance under stress. He must be calm and quiet,
tolerant and healthy.
Fifth, he must have the ability to get along with other
people, to work as a member of a team, to understand
the foibles of others while being reasonably free of the
same foibles himself.
Sixth, he must know how to inspire collaboration, to
organize, administer and lead others. He must be will-
ing to accept responsibility.
1 Farago, Ladislas, War of Wits (NY, Funk & Wagnalls Co., 1954),
p. 187.
Approved For Release 2004/1 2/1Q'Qt f)&MPM-03921 A000300190001-4
A proved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
34 CONFIDENTIAL
Seventh, he must be discreet, have a passion for ano-
nymity and know how to keep his mouth shut and pre-
serve a secret.
Eighth, he must be able to bluff and mislead, but only
when bluffing and misleading become necessary.
Ninth, he must be agile, rugged, and daring.
Tenth, he must have the ability to observe everything,
to memorize details accurately. He must be able to
report on his observations lucidly, to evaluate his ob-
servations and relate them to the greater complex of
things.
MATERIAL SUPPORT. I should like to stress the importance
of allocating the maximum in equipment, facilities, and funds
to intelligence work in time of peace with a quotation from
Sun Tzu,2 the Chinese military oracle, whose writings on the
art of war in 500 B. C. have influenced military thinking down
to this day.
Hostile armies may face each other for years, striv-
ing for victory which is decided in a single day. This
being so, to remain in ignorance of the enemy's condi-
tion simply because one grudges the outlay of a hun-
dred ounces of silver in honors and emoluments is the
height of inhumanity.
One who acts thus is no leader of men, no present
help to his sovereign, no master of victory.
Thus, what enables the wise sovereign and the good
general to strike and conquer, and achieve things be-
yond the reach of ordinary men, is foreknowledge.
In speaking of the cost of the British secret service as a
whole (both positive and counterintelligence), Seth noted :
In 1913 the Secret Services cost 46,000 pounds; in
1939, 500,000 pounds; during the recent war 52,000,-
000 pounds annually; and in 1953, 5,000,000 pounds.
. . . It is worth many times this amount, for though
the American, French and Russian (secret) services
2 Sun Tzu Wu, The Art of War (Translation by Lionel Giles, Introduc-
tion and notes by B/G Thomas R. Phillips, Harrisburg, Pa., The
Military Service Publishing Co., 1944).
2Ronald Seth, Spies at Work, London: Peter Own Limited MCMLIV,
p. 202.
Approved For Release iYOIVgIi4TIS-LA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
CONFIDENTIAL 35
are now more extensive than at any time in this cen-
tury, British secret service still maintains its lead in
performance and results.
Farago gives a somewhat different order of magnitude for
British expenditures for intelligence. He said that the 1954
budget was three million pounds and that this amount was the
highest in the entire history of the British Secret Service. He
pointed out, however, that this figure is deceptive because it
represents only allotments from public funds and he adds:
"The bulk of Britain's intelligence revenue comes from private
funds, such as dividends of the Anglo-Iranian Oil Company,
some of whose shares are held by the Admiralty." 4
Farago then gave an indication of what US military services
are spending for intelligence. In fiscal year 1955, the Army
asked for $54,454,000 for intelligence, and for fiscal years 1952-
54, inclusive, the Army spent a total of $176,400,000 on intelli-
gence. Yet this represented less than one-half of one percent
of the total Army budget.5 Then, stressing his thesis that the
cold war is a "War of Wits," Farago pointed out relative ex-
penditures for intelligence in the Continental Army and in the
services today: 6
Between 1776 and 1781, George Washington spent
approximately eleven percent of his entire military
budget on intelligence operations. The fact that today
we spend less than one percent of our peacetime mili-
tary budget on these same activities shows how little
effort is being made to solve the "friction" by intel-
lectual means rather than brute force.
From the contacts I have had with various British intelli-
gence officers, visits to JIB (Joint Intelligence Bureau) and
some of the intelligence officers of the Air ministry, and from
comparing the results of British intelligence with those of USAF
intelligence, I am certainly inclined to agree, at least partially,
with Seth's last statement for the quality of British intelligence
production is invariably very high, and the quantity compares
favorably with that produced by the much larger USAF intelli-
gence staffs. The British traditionally have been willing to
Farago, op. cit., p. 50.
Ibid., p. 51.
? Ibid., p. 345.
Approved For Release 2004/12/1QOi5RMBPW&03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
36 CONFIDENTIAL
spend a great amount of money, time, and effort in the collec-
tion of intelligence information, more, perhaps, than most
modern nations. They have not, in other words, weighed re-
sults obtained by intelligence efforts on a completely pragmatic
basis, as we "practical Americans" are inclined to do; they know
that one cannot package intelligence results on a "pound-for-
pound" basis. So for the past two hundred years they have
been preeminent in the field. This is not to say that they have
not made serious mistakes; but, by and large, their intelligence
estimates have been remarkably sound. Moreover, they have
used periods of nominal peace to extend and consolidate their
intelligence activities, not only for the purpose of preparing
for the next war but also (what is even more important) pre-
paring for the peace to follow.
FREEDOM OF ACTION. As background for a discussion of
the need for granting maximum freedom of action to air force
intelligence, I should like to quote the following passage from
the Report of the Task Force on Intelligence Activities: 7
Effect of Diplomacy on the Over-All Collection of In-
telligence.
The task force has recognized the incompatibility in
method between the practice of diplomacy and the
more direct and active operations incident to the col-
lection of intelligence and the conduct of cold war.
While all contribute to the end in view, conflicts be-
tween them must be resolved, usually on a high level,
and always in the national interest. It must be real-
ized that diplomacy is not an end in itself; that while
political ends must be served and unjustifiable risks
avoided, the collection of intelligence is a vital element
in the fight to preserve our national welfare and ex-
istence. Instances have come to the attention of the
task force where too conservative an attitude has pre-
vailed, often to the detriment of vigorous and timely
action in the field.
Although the foregoing comment was made in connection
with a discussion of the intelligence activities of the Depart-
Intelligence Activities, A Report to the Congress, by the Commission
on Organization of the Executive Branch of the Government, June
1955, pp. 42-43. (Hereafter referred to as "Task Force Report.")
Approved For Release g@ 4 TI A-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
CONFIDENTIAL 37
ment of State, it is every bit as applicable to air intelligence As
to the Department of State because the air attache system,
which is a major contributor of intelligence information, func-
tions as an integral part of the State Department's Foreign
Service.
It is altogether appropriate that, generally speaking, diplo-
matic considerations take precedence over the collection re-
quirements of the attaches. Nevertheless, within the frame-
work of that principle (which is a part of the principle of civil-
ian control over the military establishment), it should be ob-
vious from the implications of the Task Force findings that a
less conservative attitude toward opportunities for collection
of intelligence information should permeate not only the diplo-
matic service but also the military establishment.
I shall not devote much attention to detailed suggestions for
carrying out intelligence operations. My concern is with the
promotion of principles that would provide the type of climate
in which competent people, using their innate intelligence and
ingenuity, can devise an infinite number of ways in which to
collect and produce air intelligence - ways which must, of
course, be within the framework of US national objectives at
all times. Nevertheless, I feel very strongly that we should
take a page out of the British Secret Service book and put our
intelligence collection efforts on a basis where they can pay
their own way, at least in part. This would be a long-term
proposition and it would be impossible of achievement under
the existing regimentation that governs all business enter-
prises in which the government is officially engaged.
COEQUAL STATUS WITH OTHER MAJOR STAFF ELE-
MENTS. There is, as far as I can discern, no rhyme nor reason
in subordinating intelligence as a staff section to operations.
My biggest objection to the subordination of intelligence to op-
erations lies in the fact that the operations officer is automati-
cally placed in the position where he frequently makes purely
command decisions. The intelligence officer is supposed to
advise the commanding officer as to what the enemy can and
probably will attempt to do that would interfere with the ac-
complishment of the command mission. The operations officer
is supposed to advise the commanding officer as to what
his own forces can and should do. The commanding officer
is then in a position to weigh both his own and the enemy's
Approved For Release 2004/12/lC(DQU EIgHPP&03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
38 CONFIDENTIAL
capabilities and to make a sound command decision as to
command action. It is totally wrong for the operations officer
to make such a decision, for the commanding officer is thereby
deprived of the full value (and probably full information) of
enemy capabilities, vulnerabilities, and intentions. Zacharias,
commenting on the fallacy of subordinating, told the Con-
gressional Committee investigating the Pearl Harbor disaster
that one of the organizational deficiencies which was a con-
tributing factor was: 8
That the planning officers were allowed to take over
the Intelligence function of evaluation. This resulted
in individuals without a full knowledge of the Japanese
or their psychology determining what the Japanese
might do. This practice applied not only in Washing-
ton, but also at Pearl Harbor, where the erroneous con-
clusion was reached by the planning officer that there
was no chance of an air attack on Pearl Harbor.
CONCEPT NUMBER TWO. Success achieved by intelligence
in peace will determine the outcome of the war.
General Kuter stated: 9
In jet-atomic warfare there will be no room for gross
errors of judgment. There will be no time, should hos-
tilities start, to correct mistakes in the types of forces
that we have provided, the manner in which they have
been organized and trained, or the way we fight. And
the terrible penalty for failure could be quick and com-
plete defeat.
Many factors are involved in any satisfactory an-
swer. But one thing is sure. The question cannot be
answered satisfactorily unless we have the proper doc-
trine, and unless the doctrine is accepted.
For years the US has believed that its greatest military po-
tential lay in its industrial might. The validity of this belief
was demonstrated in World Wars I and II and again in Korea.
We can be sure that any Soviet attacks against this country
will be planned to destroy not only our retaliatory force but
also our industrial potential. Thus we can see that "no longer
8Zacharias, p. 253.
? Kuter, Lawrence S., Lt. Gen., "No Room For Error," Air Force Maga-
zine (AWC Curriculum Handout #36-4-a, 24 November 1955).
Approved For Release @M~laiRI;IRIA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/1j 0 hNV7A- 03921A00030019000 94
will the US or any other country be able to build up its mili-
tary forces and rely on its industrial potential after the war
has begun." 10
Intelligence must be developed before war breaks out if it is
to influence our preparations, provide a foundation for our
planning, and guide early phases of operations. It is true that
Mr. Allen Dulles, present Director of the CIA,11 achieved un-
precedented success in the history of espionage with the intelli-
gence network he established in Germany, operating from
Switzerland, during the war.
. . . Through this network Mr. Dulles managed to
start a conspiracy within the high command of the
German armies in the south and to bring about the
surrender of the very army on which Hitler was de-
pendent for the prolonging of the war from behind the
legendary "Alpine redoubt."
However, the situation in Japan was a far different matter.
Through shortsightedness and perhaps ineptitude and inex-
perience, the US had failed to establish the groundwork for an
effective espionage system in Japan, notwithstanding the fact
that Zacharias and other authorities on Japan had been aware
of the need and had advocated such prior planning. In view
of the steadily deteriorating relations that existed between
Japan and the US right up to the surprise attack against Pearl
Harbor, this failure to develop, in advance of war, a workable
system for systematic collection (in Japan) of intelligence in-
formation during the war that most intelligence personnel
were sure was virtually inevitable is an extremely black mark
against the US intelligence agencies of that time. Moreover,
this country made no serious effort to establish an intelligence
net within Japan during the war because it was felt that the
effort was far too great in relation to its possible value. Farago
pointed out that it is a virtual impossibility ".. . to set up a
local network in an enemy country under wartime condi-
tions. . . ." 12 [Allen Dulles' success notwithstanding]
10 Thomas K. Finletter, Power and Policy, New York: Harcourt, Brace
and Co., p. 256.
Farago, op. cit., p. 183.
Ibid., p. 182.
Approved For Release 2004/1 2/120 -03921 A000300190001-4
proved For Release 20rJ0N 12/17 :ILIA-RDP78-03921A000300190001-4
41T C
How can we account for the fact that, against all reasonable
odds, the US did establish a satisfactory espionage net in Ger-
many after war started but failed to do so in Japan, its other
major enemy? I suggest that the reason lies, among other
factors, in the accessibility of Germany before the outbreak
of war. In other words, more Americans and individuals from
Allied nations had contacts before the war in Germany than in
Japan. Interestingly enough, the Soviets failed to re-establish
within Germany an adequate espionage net :
. . . when their original. network, known as the
Rote Kapelle or Red Orchestra, was smashed. They
managed to create such networks only in countries of
their wartime allies, Canada, the United Kingdom,
and the United States, and in neutral Switzerland, tra-
ditional battleground of international espionage.13
The Soviets did achieve remarkable success in Japan (remem-
ber the Sorge espionage case?) 14 It seems to me that there is a
direct correlation between the accessibility of a potential enemy
country just before the outbreak of hostilities and the proba-
bility of being able to establish (or re-establish) and maintain
an espionage net in that country after war breaks out. What
does this mean, as far as the US is concerned at the present
time? If it is difficult to penetrate the Iron Curtain today,
it will be even harder when war breaks out. Therefore, we
must go all-out to penetrate it, and to establish many strong,
diversified, and versatile nets as soon as possible. We cannot
do this under the existing limitations of personnel, equipment,
and funds. Yet maximum reliance must be placed on the
ability of intelligence to decide by whom, when, where, and in
what strength the US may be attacked. The responsibility of
the Directorate of Intelligence (ACS/I, since 1 July 1957),
USAF, is to develop this information regarding our suscepti-
bility to air attack - this in an air-nuclear age.
CONCEPT NUMBER THREE. Air intelligence must, on a con-
tinuing basis, encompass all aspects of power in foreign na-
tions (political, economic, and psychosocial, as well as mili-
tary), both in the present and in the historical perspective.
Moreover, it must speak out on matters of national strategy.
18 Ibid., p. 182.
14 Ibid., pp. 163, 166, 179, 181, 212, 219-220.
Approved For Release C 1411?NTIA1A-RDP78-03921 A000300190001-4
Approved For Release 2004/12CONC A-RDP L8-03921A000300190001-4
Heretofore, air intelligence (as well as army and navy in-
telligence) has confined itself primarily to an evaluation of the
military power of foreign nations. The National Security
Council has directed the air force to interest itself primarily in
intelligence of foreign air forces and has assigned responsi-
bility for covering other aspects of national power to the other
US intelligence agencies.
It has long been an American tradition that the military
establishment should remain free from the "taint of politics."
As a result, the military has shied away from any contact with
political problems. This even reached the point before World
War II where few of the regular military establishment exer-
cised their constitutional right to vote in elections.
This fear of military domination in our national life stems,
of course, from our inherited distrust of all forms of tyranny
and autocracy. Before the time that military power became
inextricably tied to the other forms of national power, perhaps
even as late as the First World War, this attitude may have had
some validity in our national consciousness. However, Clause-
witz would not have subscribed to the complete separation of
military thinking from the remainder of national life and activ-
ities. He pointed out that war is merely an extension of na-
tional, political policy by other means.' Hitler demonstrated
his conviction that war is merely a "mopping-up process" by
capitalizing on the gains made by his fifth column. Certainly
the Marxists have from the beginning showed the world by
word and deed that the line of demarcation between politics
and military action is extremely nebulous.
It can and probably will be argued that air intelligence
should "stick to its knitting" and concentrate on ascertaining
the strengths and weaknesses of foreign air forces in the tradi-
tional fashion (in which the army is supposed to develop intel-
ligence on foreign ground forces; the navy, on foreign naval
forces; the air force, on foreign air forces; and the State Depart-
ment and CIA, on foreign political and economic strengths and
weaknesses). However, as it is air power that will have to
carry the brunt of any initial contacts with the enemy, as well
as continuously to seek out and destroy all aspects of the enemy
"Karl von Clausewitz, General, On War (Translation by O. J. Mattij s
Jolles), Washington, D. C.: Infantry Journal Press, 1950, p. 16.
Approved For Release 2004/1 2/1 ONRIDE RM-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
42 CONFIDENTIAL
warmaking potential and will to fight, air intelligence must
have the capability of advising the Chief of Staff, USAF, where
and when to hit the enemy in order to hurt him most.
It seems incontrovertible to me that we have reached a place
in history where the military establishment, particularly the
air force, must concern itself with political problems (as well
as the economic and psychosocial problems) - the traditional
American feeling in the matter notwithstanding. General
Samford, Director of Intelligence, Headquarters USAF, agreed
on this point, in response to a question asked by the writer,
following his lecture to the Air War College. He stated, in
effect, "There is a growing community of thought that the mili-
tary establishment should get into the fields of political and
economic warfare, as well as psychological warfare." 16 Air in-
telligence, obviously, must be in the vanguard of this new
approach.
CONCEPT NUMBER FOUR. Intelligence must take a dy-
namic approach. In speaking of the fact that data on the
Soviet Bloc are inadequate, the Task Force Report on Intelli-
gence Activities considered that security measures adopted by
the Communists have been exceptionally effective, particularly
in comparison with American security measures, which make
it relatively simple for foreign nations to collect vital secrets.
The task force admonishes, however:
. . . The information we need, particularly for our
Armed Forces, is potentially available. Through con-
centration on the prime target we must exert every
conceivable and practicable effort to get it. Success
in this field depends on greater boldness at the policy
level, a willingness to accept certain calculated politi-
cal and diplomatic risks, and full use of technological
capabilities.17
Opportunities to increase air intelligence coverage of Soviet
capabilities and intentions include:
a. The increasing of our clandestine operations and efforts
to infiltrate the iron and bamboo curtains from all peripheral
countries, taking maximum advantage not only of border-
Samford, John A., Major General, "Objectives for the Use of Force,"
lecture to Army War College, 2 January 1956.
14 Task Force Report, op. cit., p. 69.
Approved For Release ZO4MOPJtRIT(AAI6-RDP78-03921 A000300190001-4
Approved For Release 2004/1 2//b4+ RNpr 8-03921 A000300190004134
crossing techniques on land and by air drop but also neutral
shipping and US submarines, particularly in the Arctic Ocean
and the Black Sea coastal areas.
b. The establishment of contacts with and provision of sup-
port to (in return for services rendered) agents from among
known governments in exile, such as those from the Baltic and
East European Satellite nations; the known 10,000,000 Chinese
living outside China, as minority groups throughout Asia; all
known religious organizations, business firms, and govern-
mental agencies throughout the Free World having dealings
with the Soviet Bloc; all known visitors to Soviet-dominated
territory, such as trade union officials, scientists, airline and
shipping crewmen, and others; and all defectors from iron cur-
tain countries.
c. The attempt to bribe, intimidate, subvert, or otherwise
cause Soviet and Satellite diplomats, government officials, tech-
nicians, or visitors abroad to "double" for us upon their re-
turn - or to defect and remain in the West.
d. The making of surreptitious photographic penetration
flights with high capability aircraft at irregular intervals, to
cover peripheral areas.
e. The purchase of controlling interest in the most active
Western firms having dealings with the Soviet or Satellite na-
tions in order to use these firms to collect intelligence informa-
tion, spread favorable propaganda, subvert Soviet and Satellite
nationals, and otherwise create situations behind the iron and
bamboo curtains that would be favorable to the West.
f. The employment of such outstanding historians as Alfred
J. Toynbee; political scientists, as Professor William M. Mc-
Govern and Dr. Robert Strausz-Hupe; geographers, as G. Don-
ald Hudson; ethnologists, as Margaret Meade; and authorities
on Russia and Communism as Dr. Marc Szeftel and Mr. James
Burnham. The individuals named represent only a few of the
potential list of qualified consultants; the profound and
detailed knowledge of foreign peoples and areas in their re-
spective professions that is possessed by people of this stature
would furnish a wellspring of ideas of inestimable value to air
intelligence. In addition to enriching the staff with people of
this caliber we should hire outstanding representatives in the
advertising and public relations fields (preferably those having
experience in foreign areas), who can assist the factual experts
Approved For Release 2004/12/1(ZOI96t 15lPI1-03921A000300190001-4
A roved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
44 CONFIDENTIAL
in packaging the ideas we want to use in our "War of Wits"
with the Soviets, this struggle for the minds of men.
CONCEPT NUMBER FIVE. Intelligence should be used as an
offensive weapon, one capable of influencing the outcome of
either the cold war or any hot war, peripheral as well as total.
Although there are no apparent indications that the Soviet
Union, during the next few years, intends to take action of the
sort that would surely precipitate another world conflict, we
must be always on the alert to the possibility that such a con-
flict might arise through miscalculation on their part. The
dangers are greatest in the peripheral areas, where Satellite
peoples might get out of hand and take action "from which we
cannot retreat without disaster; then the chances of keeping
war limited are very remote." "I
The difficulty is not in the lack of desire to exercise such
restraint, but in the fact that the things we stand to lose are
of such great value that there is no chance of limiting phases
of conflict. To have mutual understanding and agreement be-
tween enemies is essential if conflict is to be localized. What
does this mean to air intelligence? Simply this : we must pro-
duce intelligence on every facet of enemy life. To do this, air
intelligence should control or at least coordinate all air force
agencies that to any degree operate in enemy territory or attack
behind enemy lines or perform other than strictly military
operations in areas that may become the scene of battle or in
areas where, in the cold war, the air forces encounter Com-
munist influences.
CONCEPT NUMBER SIX. Intelligence must be used system-
atically. Commanders, policymakers, planners, and opera-
tions personnel at all echelons must rely upon, then plan, then
act not only upon intelligence but also upon intelligence recom-
mendations - within practical limits of our own capability and
feasibility of such recommendations. We have long expressed
as a principle of intelligence the concept that it must be
supplied to the interested command in time to be of use.
Unfortunately, in intelligence circles there has not been, it
seems to me, equal emphasis placed upon submission of intelli-
gence to the commander and his staff in such a form and so
convincingly expressed that it will receive the prompt attention
Approved For Release 9i4.i i?IRlti cLA-RDP78-03921 A000300190001-4
Approved For Release 2004/12~6 Nfi-5lj R 8-03921 A0003001900gj-4
and responsive command action that it warrants. Stressing
the need for reducing the margin of error inherent in any
human undertaking, General White pointed out the need for
educating our planners and our leaders. He said that poor
command decisions and inferior or unimaginative staff work
would nullify the tremendous effort that has gone into develop-
ing an extremely expensive air force. He added:
. . . Superior employment of air weapons must be
based on complete understanding of the nature of air
warfare, the political and military context within
which the air forces are operating, and a sound but
imaginative understanding of targets and weapons.19
There also has been entirely too little emphasis on the con-
cept that command plans and action should be based on in-
telligence. This has not always been the fault of intelligence.
Nevertheless, too often in the air force, particularly, operational
plans have been prepared with absolutely no regard for thQ
intelligence estimate of enemy capabilities and intentions that
these selfsame plans were designed to counter. In my experi-
ence as a staff officer at various echelons of command, there
have been few instances in which command war plans, emer-
gency plans, or operations plans have actually been geared to
the intelligence that gave rise to the necessity for such plans.
More often than not, the intelligence annex is merely prepared
at the same time as the basic plan and the other annexes and
all are stapled together at one time. The proper procedure,
and the one that we in intelligence at USAFE (US Air Forces
in Europe) were finally able to sell to the planners, should be
this. The intelligence estimate of the situation is prepared
first and given to the commander and to all his staff agencies
in advance of the planning cycle. The basic plan and all the
annexes (including the intelligence annex) are then prepared
simultaneously, with a view to countering the threat indicated
in the intelligence estimate.
I believe this failure to take the intelligence estimate into
consideration at every stage in the planning cycle in the mili-
tary establishment stems by and large from an American pre-
White, Thomas D., "The Current Concept of American Military
Strength," AU Quarterly Review, Vol. VII, Spring 1954 (AWC Cur-
riculum Handout #56-2-B, 22 November 1955).
Approved For Release 2004/12/11ZOt51abP-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
bb CONFIDENTIAL
dilection for ignoring in the policymaking cycle available in-
telligence regarding the capabilities and intentions of actual or
potential enemies.
It seems to me that the intelligence family must find some
way not only to improve the quality of its product but also to
stimulate an acceptance of that product and a willingness to
act upon it. The process of making positive recommendations
by intelligence for command action would, I believe, materially
improve this situation and would lead to a command acceptance
of a principle advanced by General Ridgway, when he was Chief
of Staff of the US Army. He stressed the fact that the present
world situation makes it more important than ever to have com-
plete information upon which to base economical deployment
and effective employment of army forces, as well as to avoid sur-
prise (obviously the same principle applies to all military
forces). General Ridgway stated: "Adequate intelligence con-
stitutes the fundamental basis for the calculation of risks, the
formulation of plans, the development of materiel, the alloca-
tions of resources, and the conduct of operation." 20
CONCEPT NUMBER SEVEN. Intelligence must continuously
estimate enemy intentions as well as capabilities and vulnera-
bilities. One of the biggest reasons that commanders at times
have made their own estimates, rather than accept those of
their intelligence officers, is simply that the intelligence officers
havebeen unwilling to "go out on a limb" and estimate enemy
intentions. Before the early 1930's the "method of intentions"
was used by the US Army. It was a method used by the elder
von Moltke. Shortly before 1936 the American Army adopted
the "method of capabilities," which had been the method used
by Napoleon.21
Admittedly the "method of intentions" is a difficult one and,
for the inexperienced intelligence officer, nonhabit forming be-
cause the probability of error is extremely high. Success for
this method depends not only on an intimate knowledge of the
mentality of the opposing commanders as well as the tactical
doctrine of the enemy but also upon such intangible things as
the physical and mental condition of the opponent, his normal
reactions, and reasoning processes. On the other hand, the
"Farago, op. cit., p. 8.
21 Command and General Staff School, "Military Intelligence," p. 7.
Approved For Release RT.1 tA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : C ENDP78-03921A0003001900943,-4
CONFIAL
"method of capabilities" takes into consideration all lines of
action open to the enemy. It does not discard any possible line
until the enemy's dispositions are such that, even though he
desired to adopt that line, he is physically incapable of doing
so. Thus it strives by elimination to reduce the possibility
down to one - the only one line of action which the enemy can
take. This is the ideal, as far as intelligence is concerned, but
it is seldom reached.
CONCEPT NUMBER EIGHT. Intelligence is no longer a func-
tion of command, except at the higher echelons. All of the
services (particularly the air force) have traditionally paid only
lip service to the principle that intelligence is a function of
command. This has been amply demonstrated by a lack of
provision for suitable intelligence staffing between World War
I and World War II and by a demeaning of intelligence func-
tions. My reasons for believing that intelligence should no
longer be considered a function of command at all echelons are
different from either of these.
In the first place if an all-out global war should occur, the
US intelligence operations should be centrally controlled. Sec-
ond, the entire intelligence process cannot reasonably be car-
ried out at all echelons; therefore, even in a prolonged period
of cold war, air intelligence operations must be, if not actually
centrally controlled from Washington, at least concentrated in
a small number of locations where the complete intelligence
process is directed by one individual. Unquestionably, in the
past, commanders of squadrons, groups, wings, even air divi-
sions and air forces occasionally may have felt a twinge of
conscience because they have been unable to see their way clear
to carry out all the intelligence functions that manuals said
they should, from collection through dissemination. These
individuals may now draw a sigh of relief, as I view it; for in
the air force, their primary intelligence function is to dissemi-
nate down to the troops air intelligence that has been received
from higher echelons.
It may be argued that I am hereby cutting the rug out from
under the principle I previously expressed - that the intelli-
gence officer should not be subordinated to other staff officers
but should report directly to the commanding officer. On the
contrary, in these lower units, and even when his recognized
Approved For Release 2004/12/1 QOi%RLQ l PW-03921 A000300190001-4
A roved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
CONFIDENTIAL
duties are in accord with his actual duties, I still feel that the
intelligence officer at every echelon of command should remain
responsible only to the commanding officer or the chief of staff,
and not to any other staff officer! He must maintain this inde-
pendence of other staff considerations in order best to present
to his commander the most complete intelligence picture and
the most reasonable intelligence recommendations, even though
he himself may not have developed either the intelligence esti-
mate of the situation or the recommendations based on it.
At the major air force command levels there is no question
in regard to major staff level standing for the intelligence
officer as intelligence should continue to be for his commander
a complete function of command, in the traditional sense. At
the lower echelons, intelligence would still be a command re-
sponsibility, but rather more in the "special staff" tradition
than the "general staff" concept.
CONCEPT NUMBER NINE. Major headquarters staffs should
get out of the operational aspects of intelligence to the maxi-
mum extent possible and should confine their attention largely
to policymaking and flash or spot estimating functions. This
concept is closely related to some of the thinking indicated in
the discussion of the preceding concept. Compared with the
present tables of distribution, the intelligence staff of Head-
quarters USAF and the major subordinate commands would be
relatively small. These staffs, however, would be comprised of
highly qualified personnel, representing the maximum intel-
ligence capability in the air force. Their functions would be
primarily policymaking, inspection, liaison, and estimating.
They would be prepared to give flash estimates of indications
of the imminence of hostilities and spot estimates, as required
by the commander and his staff. They would exercise staff
supervision not only over the intelligence activities of all sub-
ordinate units of the command, but also over the collection and
production activities of the intelligence centers belonging to
the command; these centers would perform the operational
aspects of the intelligence process for the entire command.
CONCEPT NUMBER TEN. Air Intelligence (to include coun-
terintelligence) must keep under continuous review and, to
the maximum extent possible, must downgrade and publish its
files concerning enemy capabilities, activities, and intentions.
Approved For Release QQQ4j1 j.I,rQIA-RDP78-03921 A000300190001-4
Approved For Release 2004/1 2/l j6t &-[W.f -03921 A000300190001--4
49
What I am proposing is nothing less than declassifying cer-
tain carefully selected items of intelligence and counterintelli-
gence regarding Soviet activities and providing such informa-
tion to the American public on a planned basis. Let the Amer-
ican people get this information, but from authoritative sources
and not from newspaper columnists.
Probably the most violent opposition to this proposal will
come from some of my fellow intelligence officers, because tradi-
tionally, intelligence has had a moral responsibility to protect
its sources, and rightly so. Nevertheless, intelligence files are
bulging with information that represents such a conglomera-
tion from so many sources that no one source could possibly be
harmed by its disclosure. Let us substitute this type of infor-
mation for at least some of the detailed data on our own mili-
tary establishment that we now hand out so freely. I am confi-
dent that the public reaction to this policy would, in general, be
very favorable, and that in the long run, the story of air power
and the capabilities of the air force to safeguard the security
interests of the US can be made synonymous in the minds of
the American people.
So let's stop giving aid and comfort to our potential enemies
and start a program designed to discomfort them on a global
scale - by informing and arousing the American public and
the rest of the free world with factual knowledge of Soviet ac-
tivities and intentions. For example, an article in the Sep-
tember 1955 Reader's Digest discussed the disturbing story of
the manner in which the Communists, who had infiltrated the
military services and governmental structure of Iran, were pre-
vented from taking over the entire country by the merest ac-
cident. As a result of the investigation, it was disclosed that
five hundred Iranian officers were implicated in the plot, in-
cluding numerous high-ranking individuals in both the Army
and the police departments.22
This story, terrifying in its implication for other countries,
would, I submit, have had a much stronger impact on public
awareness of the Communist threat to the world today had it
been officially released by a government intelligence agency,
rather than by a commercial writer. This is the type of run-
Joseph A. Mazandi and Edwin Muller, "The Hunch That Saved
Iran," Reader's Digest, September 1955, pp. 59-60.
Approved For Release 2004/1 2ICC0IJEIRl3f F 418-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
50 CONFIDENTIAL
of-the-mill basic intelligence available to the services which
should be released to the public as soon and as fully as is prac-
ticable and, in any event, before some sharp news reporter can
capitalize it.
CONCEPT ELEVEN. All air intelligence concepts must be con-
sidered dynamic, kept under constant review, and revised to
meet changing world situations. It follows that air intelligence
philosophy must be considered in its broadest sense as a con-
stant search for principles. The doctrine and policies result-
ing from this process must be changed as new concepts are
developed.
In this context, General Kuter provides another valid con-
cept for developing an air intelligence policy, although he was
applying it in the larger sense to the whole spectrum of air
force thinking. "A true air doctrine accepted and exploited is
the key to a sound military policy. We have the doctrine, now
we must exploit it in a common strategy." 23 We don't, as yet,
have an air intelligence policy or doctrine in writing, but if
USAF will adopt that last admonition of General Kuter's as
the basic air force intelligence policy, it will be only a matter
of time until we have an air intelligence doctrine - one on
which the commands may then soundly base their own intel-
ligence policies.
Approved For Release 2@WAijffN1CY,t-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190051-4
SECRET
DEVELOPMENTS IN AIR TARGETING
I. THE MILITARY RESOURCES MODEL
The basic objective for air targeting is to present measure-
ments of the ability of the enemy to take actions which
threaten our national security. These measurements must be
presented in such a way as to guide our action against the
enemy's strengths. This objective is usually broken down into
subobjectives which illustrate clearly its breadth and com-
plexity. Expressed in terms of courses of enemy action which
are unacceptable to the US, these subobjectives are, in descend-
ing order of importance:
1. To deliver atomic weapons against the US, our forces
abroad, and our allies.
2. To resist the penetration of his airspace by our air forces.
3. To develop and produce potentially decisive weapons or
weapons systems.
4. To conduct large-scale land and naval operations against
our forces and our allies.
5. To develop and maintain the economic, political, and psy-
chological strengths necessary to support prolonged military
operations.
With the development of new weapons and weapons systems,
however, and the resultant capability of a single aircraft or
missile to deliver the equivalent of millions of tons of TNT on
one mission, the analysis and presentation of the strengths
supporting the first three subobjectives have assumed ever-
increasing importance and urgency. This compression of fire-
power in time brings the realization that the decision in future
wars may be reached in a matter of hours or days at most.
Old problems have been accentuated and many new ones cre-
ated by these developments. For example, selection of target
systems to achieve the subobjectives time-phased in the order
shown above is no longer sufficient. Analysis must produce
not only a priority of targets within each subobjective and
target system, but also an indication of how many of them
MORI/HRP PAGES 51-64
Approved For Release 2004/12/17 : SECAMP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
5 SECRET
must be attacked to achieve the objective. Thus analysis by
increments in time and space is becoming an essential element
in the targeting process.
The complexity of these problems and the speed with which
they must be solved have led to the introduction of new statis-
tical methods and of new machine computing techniques into
the targeting analysis process. For example, immediate
assessment of the damage and contamination effect of a given
attack will be necessary in order to determine the destruction
required of succeeding attacks. This involves a continuing
evaluation of target priorities and of net offensive strengths
throughout an air offensive until a decision is reached. Two-
sided war-gaming offers the best possibility for providing the
answers needed for this and similar problems. Because of the
time element and the great volume of data required by the new
statistical techniques, high-speed electronic computing is
essential. By this process hypothetical but highly probable
military situations in both peace and war can be examined and
tested for the types of detailed targeting information needed
by the analyst to guide and evaluate target selections. Only
in this way can the total targeting effort truly be said to pre-
sent measurements of the enemy's strengths in such a way as
to facilitate action against them.
During the last several years it has become increasingly
apparent that mathematical "Monte Carlo" and "input-out-
put" type models offer a new and promising technique for "war-
gaming" and for analyzing a nation's economic and military
resources for targeting purposes. The rapid advances in the
speed and data handling capacity of modern electronic com-
puters have now made these models feasible for application to
many air targets problems.
The purpose of the mathematical models is the selection of
targets for optimum forestalling of enemy courses of action.
This requires the models to answer the following questions in
order.
1. Present situation
a. What is the size and composition of the enemy mili-
tary establishment (military resources) ?
b. What is the size, composition, and productive ability
of the enemy economy (economic resources) ?
Approved For Release 2004t'/4ffr CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET 53
c. What levels of military action will these resources sup-
port?
2. Mobilization capability
a. What would be the size and composition of enemy
military resources and economic resources after an all-out
mobilization period of x months?
b. What levels of military action would these resources
support?
3. Evaluation of damage
a. For any specified bombing attack what would be the
yield and location of all exploding weapons?
b. Given these explosions what would be the size and com-
position of the post attack military and economic resources
(including population) ?
c. Given the post attack resources what level of enemy
military action could be maintained?
4. Recuperation
What would be the size and composition of enemy mili-
tary and economic resources y months (or days) after the
specified attack, taking into account repair, rebuilding, con-
version of other facilities, and new construction?
For "war-gaming," that is, estimating net offensive capabili-
ties, the above questions must be asked about our own country
as well as about the enemy country.
The system of mathematical models which would answer
these questions is shown schematically in Figure 1.
The air battle, the damage, and the contamination models
would answer questions 3a and b above. Discussions of these
models are planned in subsequent issues.
The remaining questions concerning the present, post mobi-
lization, post attack, and post recuperation capabilities of the
military and the economy are the province of the military re-
sources model, which includes economic resources.
Procedurally, the military resources models determine the
number and size of missions, both offensive and defensive of
various types, which each country can carry out in a given span
of time. This information is fed to the air battle model which
together with the damage and contamination models deter-
Approved For Release 2004/12/17 : MA IDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
54 SECRET
M-DAY D-DAY
MILITARY
RESOURCES
MODEL
MILITARY
RESOURCES
MODEL
DAMAGE
MODEL
AIR
CONTAMINATION
MODEL
BATTLE
MODEL
DAMAGE
MODEL
CONTAMINATION
MODEL
MILITARY
RESOURCES
MODEL
MILITARY
RESOURCES
MODEL
Approved For Release 2004,Rkif- CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : k- 78-03921A000300190001-A
RET 55
mines the military, economic, and population resources re-
maining in each country after a period of air battle. The dam-
age information is in turn fed back to the military resources
model which determines the number, type, and size of missions
which each country can carry out after the first phase of air
battle. The process is then repeated for later phases of the air
battle.
If the models can, as is believed possible, answer the ques-
tions posed we have an exceedingly powerful tool not only for
target selection, but also for estimating the capability of a
country to carry out military action now and in the future
under various conditions and assumptions. The testing of
alternative target systems in the first and succeeding phases
can lead to the choice of the optimum target system for any
of several different strategic situations.
When then, is the military resources model and how is it de-
signed to answer the questions put to it?
The military resources model is an input-output model. This
is a kind of mathematical model about which it has been said,
it is much easier to understand what it is expected to do than
how it does it. What the military resources model is expected
to do is to estimate the capabilities of a military establishment
and its supporting economy to carry out military action. The
essential problem of making this estimate is that everything
must be considered simultaneously.
It is not enough to know that the capacity of the aeroengine
industry is so many engines per month. One must also know
whether there is enough steel (or electric power, copper, petro-
leum, ball bearings, and so on) to produce these engines while
at the same time the tank, gun, shipbuilding, ammunition, and
many other key industries (including reconstruction in a post
attack period) are also requiring steel. Furthermore, not only
the direct demand for steel must be considered. The aero-
engine industry consumes not only steel but also aluminum,
electric power, transportation, and many other inputs, the pro-
duction of which also requires some steel. In short, to know
the capabilities of one industry we must account for require-
ments of all industries for a vast range of raw materials, labor,
capital equipment, components, goods in process, transporta-
tion, and communications. Input-output models are a tech-
nique for doing just this. An input-output model shows for
Approved For Release 2004/12/17 : GOGRE P78-03921A000300190001-4
Abpproved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
JP SECRET
each industry (or military activity) the requirements for sup-
plies from each other industry.'
The military resources model consists of three sub-models or
grids; the military grid, the economic grid, and the transpor-
tation grid. The economic grid is in turn broken down into
geographical regions which are related to each other by the
transportation grid. The military resources model can be
illustrated schematically.
ECONOMIC GRID
Each of these grids consists of an inventory of resources and
a table of coefficients in the form of inputs required per unit
of output. For the economic grid the inventory of resources is
the capacities of all producing industries. The table of coeffi-
cients shows material, labor, and capital inputs per unit of in-
dustrial output; for example, kilowatt hours of electricity per
ton of aluminum and tons of aluminum per heavy bomber air-
craft. The military grid shows labor, equipment, and supplies
required per unit of military activity; for example, tons of fuel
per flying hour, number of aircraft per wing, tons of ammuni-
tion (by type) per division month, and so on. Its inventory
of resources is the number of military units of each kind and
their associated equipment. The transportation grid has as
its output units of transportation capacity on a regional basis.
This grid acts as a restraint on both the economic grid and the
military grid as transportation can be a bottleneck or restraint
both in the economy and within the military structure itself.
1 See Studies in Intelligence, Vol. 1, No. 4, "The Role of Interindustry
Studies in Economic Intelligence," Robert Loring Allen, p. 97.
Approved For Release 200,M(Z': CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET 57
Without knowing the full complexity of the statistical and
computational procedures (which is awe-inspiring) the reader
can now visualize the operation of these grids in answering our
initial questions. The military grid shows for a given set of
military forces the level of combat actions that could be main-
tained if the economy provides all the supplies the military re-
quires. The coefficients of the military grid determine the re-
quirements of the given level of combat actions from the econ-
omy. The economic and transportation grids determine how
much of these supplies can be forthcoming from the existing
inventory of economic resources.
At the present time the economic grid of the Soviet Bloc has
been largely completed. It has been constructed in two
parts-one covering the USSR and European Satellites and
the other the Peoples Republic of China. For the European
Bloc the grid distinguishes 240 producing industries or sectors
and their materials, components, capital equipment, and labor
inputs. Five test runs have been made and evaluated.2 On
the basis of the evaluation of these test runs, application of
this grid to certain types of live air targets problems is now be-
ing undertaken. However, a substantial data improvement
research program is going concurrently.
The military grid has been under development for about nine
months. It is expected that test runs of this grid will be made
in the summer of 1958.
The- transportation grid has been under development for
about six months, and it is expected that test runs of this grid
will be made in the summer of 1958. The construction of this
grid is being undertaken on two fronts. The first involves the
geographic disaggregation of the economic grids in terms of
local regions. The second consists of the development of a
transportation grid based on these regions. To date, 159 re-
gions covering the USSR have been designated, outlined, and
coded. The transportation net has been divided according to
these regions and the terminals and links within each region
coded and catalogued. The 159 regions correspond to Soviet
oblasts wherever possible in order to take advantage of the data
Distribution of these runs has been made throughout the intelli-
gence community. A few copies are still available for interested
readers.
Approved For Release 2004/12/17 :3MRDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
58 SECRET
on production and transportation published by the Russians.
The effort to gather Soviet source information for the grid is
linked to a concerted effort to gather applicable data, both
classified and unclassified, from all other available sources.
The enormous complexity of the computations involved in
model analysis makes hand calculation completely unthink-
able. In the economic grid for the European Soviet Bloc, for
example, there are per unit of output of each of the 240 sectors
the commodity input requirements from each of the other 239
sectors. This will be further broken down into 159 geograph-
ical regions. Thus the number of coefficients to be simultane-
ously processed theoretically could be of the order of 240 x 240
x 159, or about 9 million.3 For any major problem millions of
individual arithmetic steps may be involved. Modern elec-
tronic computers, however, can perform this job. The revolu-
tionary aspect of these computers is the speed with which they
can file, sort, recall, and manipulate large masses of data.
These partially routine steps in arriving at intelligence esti-
mates on large areas, such as the Soviet Bloc, have always been
time-consuming and cumbersome. For the more difficult an-
alytical problems, electronic computers together with mathe-
matical models provide the analyst with a tool for considering
and holding in juxtaposition a great many more of the ele-
ments of the analysis than formerly was possible. This tech-
nique does not, by any means, eliminate the human judgment
factor. Rather it is believed that it will prove to be a powerful
tool in assisting intelligence analysts and planners to make
better judgments, and to be able to make them more rapidly.
Some of the more specific applications of the military re-
sources model to air targets problems are presented below.
1. Enemy Capabilities
The military resources model can be used to assess the
capability of the economy of the Soviet Bloc to mount and sus-
tain elements of military strength during a pre-attack period
under varying Bloc objectives, policies, and assumptions. The
government is constrained to work its available resources and
within technological relationships. If it wants a jet medium
The number is actually smaller since many of the coefficients are
zero. Only a machine, however, could remember which ones are
zero.
Approved For Release 2004/4 eWETCIA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CI REDP78-03921A000300190001-
bomber regiment it must provide planes, bombs, crews, air-
bases from which to operate, and so on, in specific quantities.
If a ton of steel is needed the government must see that steel
mill capacity, pig iron, scrap, coal, labor, and so on, are avail-
able in the correct amounts. If more steel capacity is needed
it must provide the steel, concrete, machinery, and so on, in
the right quantities and types to construct a new steel mill.
These resource restraints and technological relationships are
set out comprehensively and in detail by the military resources
model. The ability of the economy to support the mobiliza-
tion of desired combinations or "mixes" of air, land, and sea
forces can be measured. A typical problem would be a deter-
mination of the maximum "balanced" air, land, and sea forces
which could be activated in a specified mobilization period with
specified stockpiling and capital expansion policies. In addi-
tion to measuring the maximum activation of combat units,
the economic grid can be used to determine under a variety of
Bloc policies and objectives the maximum capability to pro-
duce specific weapons such as guided missiles and H-bombs at
specified times.
However, the economic-industrial grid does not take into
account any restraints or bottlenecks that might develop
within the military structure itself. Therefore, the outputs of
the economic grid are fed into the military grid as inputs. The
military grid is then used to assess the capability of the Soviet
Bloc military structure to mount and sustain, during a pre-
attack period, elements of military strength fully prepared to
engage in combat activities required by given strategies. The
ability of the military structure to support desired combina-
tions or "mixes" of air, land, and sea combat activities can be
measured under varying Bloc mobilization objectives, policies,
and assumptions. In addition to measuring the maximum
combat capabilities that can be sustained, the military model
can be used to determine the capability of the military struc-
ture to put into operation specific weapons, such as guided
missiles, within the available military resources, that is, trained
personnel, missile sites, logistics, and repair facilities.
The transportation grid would then be used to establish any
transportation restraints or bottlenecks which might develop
within the economy or military structure itself.
Approved For Release 2004/12/17 : GEC- 1P78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
60 SECRET
2. Effects Analysis
Following their use in pre-attack situations, the three grids
of the military resources model can be used to determine the
capability of the Bloc economy, military structure, and trans-
portation system to re-mount various types of military strength
in the post-attack period after air attacks of different scope
and intensity. The analysis can be applied to various time
periods after the air attack. In very short periods of time only
the military, or possibly the military and transportation grids
might come into play, as the answers needed would be the avail-
abilities within the immediate military structure of the Soviet
Bloc to re-cycle air attacks and to sustain ground and naval
action. These answers would be in terms of availabilities of
aircraft, runways, fuel, men, and ammunition to produce flying
hours, and the needed inputs to produce ground division
months and units of naval action. The longer the time period
involved the more industrial and economic resources must be
analyzed and brought into play as supporting military re-
sources. In the analyses of recuperation periods of over a few
months the economic-industrial grid is heavily drawn upon.
However, the model as a whole is designed to cope with imme-
diate post-attack military assessment, as well as long range
economic and industrial recuperation assessment.
3. Selection of Air Targets
One of the outstanding advances of the model-computer
technique is the possibility of rapidly testing a great variety of
simulated air targets problems, using various assumptions, and
considering air attacks of varying magnitude and scope. Opti-
mum air target systems can be developed for a variety of cir-
cumstances as a result of repeated running of both pre-attack
capabilities problems and post-attack air target effects prob-
lems (a. and b. above). The resources such as airfields, mis-
sile sites, storage, supply, repair facilities, and industrial and
transportation installations which prove to be limiting factors
or bottlenecks in pre-attack mobilization problems and in the
re-mounting of combat activities in the post-attack period be-
come the air targets. The same techniques applied in simu-
lated problems would, of course, be applied to actual hot war
problems.
Approved For Release 200q tN : CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : SCRD 78-03921A000300190001-
4. Feasibility Testing
The necessity for balancing the internal flows within the
matrix of an input-output model make this type of model par-
ticularly suitable for testing the internal consistency of either
announced Soviet Bloc plans or of US intelligence estimates of
Soviet Bloc military or economic growth patterns. For exam-
ple, the internal consistency of either Soviet Bloc plans to
mount military strength or US intelligence estimates of Soviet
Bloc military growth plans can be tested. Estimates inde-
pendently projected for various types of air combat strength
can be tested one against the other in order to determine
whether or not the total projected strength estimate is internal-
ly consistent and whether or not such total strength can be sup-
ported by the Soviet Bloc military structure. The economic
grid can be used to check production estimates independently
arrived at for various military end products to determine
whether or not the production pattern so established is eco-
nomically feasible. The transportation grid should be of great
help in checking estimates of Soviet Bloc transportation pat-
terns and capability.
5. Mobilization Indicators
The military resources model can be used to establish indi-
cators of mobilization build-up. By testing the model under
various assumed mobilization conditions certain economic
changes as well as changes within the military structure can be
identified as indicators of partial or complete mobilization.
Specific changes in the use of resources can be identified as in-
dicating specific types of mobilization.
6. Intelligence Collection Indicators
In using the military resources model to solve a series of
simulated air targets problems, certain areas of economic and
military activity will be shown to be of critical significance to
the capability of the Soviet Bloc to mount and maintain mili-
tary strength. These critical sectors are those on which it is
most important to obtain accurate, current data for targeting
purposes. Thus the priority list of air targets intelligence re-
quirements can be sharpened, and emphasis can be placed on
the collection of certain key military and economic data.
7. Inputs for Operational Models
The military resources model is to be used to translate any
given over-all military strategy into requirements upon the
Approved For Release 2004/12/17 : 666P78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A0003001.90001-4
62 SECRET
economic-industrial, transportation, and military structure for
the creation of military formations and military resource ele-
ments together with the necessary military supporting activi-
ties in both pre- and post-attack situations. Operational
models such as the air battle model, currently being tested,
serve to indicate these requirements in a realistic manner.
The military resources model is designed to provide appropriate
inputs for these operational models in the form of units of com-
bat capability and to reflect the output of operational models
in changing requirements upon the military structure. Thus
the military resources model can define the maximum levels of
combat activity possible within the limitations of the Bloc mili-
tary and economic structure at any specified time.
8. Data Requirements ,
The validity of problem solutions provided by the military
resources model is dependent upon the accuracy of the data
inputs as well as the logic of the mathematical design of the
model. Each of the component parts of the model - the eco-
nomic grid, the military grid, and the transportation grid -
has its own data requirements which must be initially assem-
bled and subsequently kept up to date.
The economic grid contains a classification of economic ac-
tivity in the Soviet Bloc in the form of three submatrices or
grids; the commodity input grid, the capital input grid, and
the capital expansion grid. The data requirements of the com-
modity input grid or matrix consist of the commodity inputs
per unit of production for each of the 240 sectors of the matrix.
These sectors cover most of the commodities produced in the
Bloc. The data requirements of the capital input matrix con-
sist of the inputs of capital equipment and labor per unit of
production of each of these same commodities. The data re-
quired by the capital expansion matrix consist of the com-
modity and capital inputs necessary to increase available cap-
ital by one unit. The data described above are in the form of
technological coefficients which reflect the technological rela-
tionships currently operating as the economic restraints in any
desired mobilization or recuperation by the Soviet Bloc. In
order to reflect fully the flexibility of the Soviet Bloc economy
in meeting mobilization or wartime requirements the data in-
puts must reflect not only production processes currently in
use but also the alternative processes which could be used to
Approved For Release 20044 kgf. CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 ~E -DP78-03921A0003001900BJ-4
break bottlenecks, or stoppages resulting from air attack. Thus
the economic grid requires the introduction of all practical
alternate input coefficients in order to establish realistic tech-
nological restraints. Because production technology changes
with the passage of time, these coefficients must be continually
scrutinized to insure that they reflect current technology. In
addition, changes are necessitated in the classification of com-
modities and capital equipment in the light of experience
gained in using the model for various types of problems. Those
economic sectors which prove to be the most sensitive to mobi-
lization or recuperation demands may require a more detailed
or disaggregated classification in the model, whereas less vital
sectors may be further aggregated.
The running of a simulation on the economic model requires,
in addition to the technological coefficients, data on the eco-
nomic resources available to the Soviet Bloc for the time period
being considered. Thus for each of the 240 commodity groups
in the grid, current data on Bloc capacity, inventory, and for-
eign trade must be assembled.
The data requirements of the military grid of the model
parallel those of the economic grid, but pertain to military
activities rather than economic activities. As previously men-
tioned, the output of the military grid, equivalent to commodity
outputs in the economic grid, is in units of frontline activity,
for example, flying hours of a specific type of bomber. For
each such military activity data on inputs of other military
activities as well as inputs of industrial commodities must be
determined. In addition, for each unit of military activity the
requirements of military capital aggregated in the form of
"resource elements" such as airstrips, naval bases, and repair
facilities must be determined together with the inputs neces-
sary to expand a military "resource element" by one unit. As
in the case of the economic grid, input data for alternative
processes of producing a unit of military activity must be
assembled and all coefficients in the grid must be kept in accord
with the most modern logistical processes used by the Soviet
Bloc. In the running of simulations on the military grid, data
on total Soviet Bloc capacity, inventories, and possible incre-
ments from foreign trade for each of the military activities in
the grid should be available for the time period under consid-
eration.
Approved For Release 2004/12/17 : ( R iI'78-03921A000300190001-4
Aooroved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET
The introduction of transportation factors into the military-
resources model requires an analysis of the Soviet Bloc eco-
nomic and military commodity flow structure in terms of geo-
graphic regions, thus greatly increasing the data needs. For
each region the types and amounts of transportation facilities
available must be determined in order to establish the freight-
handling capabilities of each region. For example, the analysis
of the USSR railroad system, currently underway, requires for
each terminal, link, and region estimates of the terminal motive
power and freight-car handling capacities, rail-link capacities,
and regional car-day requirements. In addition to these trans-
portation data requirements, the Soviet Bloc production and
consumption pattern must be established by geographic region.
This task requires the identification of the types and amounts
of economic and military capital facilities, or "resource ele-
ments," available in each region. In addition, the Soviet Bloc
"bill of goods," or final demand for military and civilian goods,
must be determined by geographic region. The regional con-
sumption of goods for military, government, and civilian use as
well as the regional consumption of construction materials and
producer durables must be estimated. Only when all these
data are introduced into the military resources model can the
transportation restraints, or "bottlenecks" under specified
mobilization and recuperation conditions be identified.
The data problem is formidable, but considerable progress
has been made, and. new sources of data are being found and
exploited. The data requirements for the model-machine tech-
nique do not represent a marked change from the require-
ments of traditional methods of analysis. However, the rigor-
ous analysis made possible by this technique or method simply
makes existing data deficiencies more apparent. Moreover,
this technique has the additional advantage of enabling the
analyst to identify those specific data requirements which are
the most crucial in target analysis by subjecting the data to
various types of sensitivity testing, e.g., the variation of coeffi-
cients, and data aggregations. The model also offers a means
of testing the reliability of coefficients in the light 9f known
output patterns of past years. It is believed that these various
testing techniques will contribute to a sharpening of the pri-
ority list of intelligence collection requirements.
Approved For Release 200VgL27r: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-
RET 65
HORRIBLE THOUGHT
The headshrinkers' literature is full of remarks about the
efforts of mankind to avoid thinking. As a matter of fact, I
rather imagine that a very small proportion of the brainpower
of the most creative thinker alive is ever devoted to creative
thought. In our society a fairly large proportion of this small
amount of creative thought is devoted to finding ways to help
mankind avoid thinking. Games, alcohol, tranquilizers, TV,
and business routine can all be used to help an individual fill
24 hours a day without ever having a creative thought. We like
cliches because they help us sound confident without thinking.
This does not mean that the average man is idle. On the con-
trary, he is probably a very active and useful citizen. As a
matter of fact, idleness is generally abhorred because it leaves
a vacuum that is an invitation to thought.
You and I may be exceptions to this general pattern in some
small degree, but I want the reader to recognize that if this
paper contains one small original thought, it will be here only
as a result of tremendous psychic effort spent in overcoming
my own urge not to think, and that if this thought, in its turn,
stimulates any creative thinking in the mind of the reader, it
will be only over the opposition of your shrewd and dogged sub-
conscious which tries so hard to protect you from the rash act
of thinking.
Having drafted this challenge to the reader's subconscious,
I now propose that we think about some of the problems of in-
telligence. (I almost said "look at some of the problems of in-
telligence." This just goes to show you how my subconscious
abhors the sound of the word "think.") To pose the problems
that I would like us to think about, I want first to go back into
a little intellectual history. Some of the readers will be much
more familiar with the events that I am about to describe than
I am, but here at least is my version.
In the early days of the postwar intelligence effort, the at-
tention of the intelligence community was focused primarily
on the interpretation of surface phenomena. Some of the
MORI/HRP PAGES 65-7q
Approved For Release 2004/12/17 : SBAREDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
66 SECRET
questions at issue were almost unbelievably naive. For ex-
ample, there was not complete agreement on the general nature
of the Soviet Communist system, and there was a great deal of
discussion about the role of local Communist parties; some peo-
ple feeling that these were indigenous parties, and other peo-
ple feeling that they were part of the Soviet apparatus. Dur-
ing this period there was no agreement concerning standards
of analysis in the intelligence community. At one extreme,
some people used biased and emotional arguments without re-
gard to system. At the other extreme, some people claimed
that local Communist parties were not part of the Soviet ap-
paratus because there was not enough evidence on this question
to settle the matter in a court of law. As time went by, how-
ever, the intelligence community more and more came to accept
the standard techniques of political sciences, economics, soci-
ology, and so forth, and attempted to conform to academic
standards and rule of evidence.
General agreement on standards of thought tended to shift
the major problems inintelligence into the realm of facts. If
it was agreed that a given situation should be interpreted by
the use of the techniques of economics then the size of the
gross national product of a country involved in the situation
under study became an important fact, having great bearing
on the final analysis of the situation. The intelligence com-
munity, therefore, went through a period several years ago in
which major questions of the fact were important issues. Some
of us remember the blood and sweat shed over the numbers of
Soviet planes produced, the size of the gross national product
of Communist China, and the adequacy of the Chinese rail-
roads. The list could continue ad infinitum.
The focusing of the intelligence community on major ques-
tions of fact led to the development of additional techniques
for the establishment or verification of facts. Some of these
techniques, like the factory markings program, could be gen-
erally understood and accepted throughout the community.
Even in this field, however, and in related fields involving so-
phisticated statistical techniques, acceptance of the new meth-
od was neither immediate nor complete. Other techniques of
analysis in political and social fields also left some members of
the intelligence community gasping in their wake. At this
point, the intelligence community entered a stage which will
Approved For Release 2004 fAtT CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET 67
always be with us to some extent. It is the stage in which
arguments about fact are caused by the technological gap be-
tween the informed and the uninformed analyst. This is a gap
that training and experience have narrowed considerably and
which probably can be narrowed even further in the future,
but it probably will exist to some degree as long as some parts
of the intelligence community develop new methods and new
ways of thinking and other parts of the intelligence community
lag in knowledge and understanding. It is not necessarily a
bad phenomenon. It at least means that somebody is out in
front and doing some thinking. It keeps the other fellows on
their toes.
As a result of over 10 years of development, the intelligence
community has now reached a high level 'of sophistication in
the application of standard techniques of analysis to intelli-
gence problems. Subsidiary methods such as style of writing
and the manner of presentation are excellent. The community
seems to have learned how to produce very good answers to
intelligence problems without generating an undue amount of
internal friction. All this is cause for considerable pride and
satisfaction.
As good as we may be, however, we are obviously not good
enough. We have just seen a classic example of one of our
major outstanding difficulties in the question of US policy to-
ward the launching of the Soviet earth satellite. There was no
failure of intelligence to report the facts relating to the Soviet
satellite program well in advance of the event, and intelligence
also pointed out that this event would be of distinct advantage
to the Soviet Union in the field of political prestige. Intelli-
gence had done the job our customers normally expect of us,
and yet in a real sense, the US was caught napping. The US
prepared a plan of what to do after the Soviets had launched
a satellite, but we did not take any action or even decide to take
any action before the event. In other words, our planners did
not fully recognize the magnitude of the blow the Soviet
launching would give to our prestige. It would be very easy for
us to sit back smugly and blame the unfortunate consequences
on the policymakers, who were adequately informed in advance
but who did not take adequate action in advance. Could it be
that we have not yet established adequate confidence in our
product in the minds of our consumers? Could it be that the
Approved For Release 2004/12/17 :SRDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
68 SECRET
fault still lay with the intelligence community? Could it be
that we have not yet devised the proper method of presentation
which would permit us to say "damn it, we mean it!"
If we are willing to recognize that it is possible for intelli-
gence to "fail" even when it is shrewdly accurate and timely,
we might find further food for thought in looking at the prob-
lems that we are being shrewdly accurate and timely about.
They tend to be problems that have a fairly immediate practical
application. No one could object to our tackling such problems.
When one looks for analysis in depth or in terms of long-term
trends, however, we find that it is generally lacking in our for-
mal publications. The bold analysis, the sharp intuition, the
long step ahead, and the provocative ideas are generally found
in informal bull sessions; in "think" pieces that have no true
status; in the internal staff memoranda of ONE, OCI, and so on;
and in some of the briefs and background material used by the
DDI on an ad hoc basis. They are almost never found in the
formal papers put forward by the community for the sober
guidance of our planners and policymakers.
There are strong conservative influences in our present sys-
tem of producing intelligence which would tend to resist change
in anything involving method and type of analysis, form of
presentation, and so on. Might we not be at a point of develop-
ment, however, where we need to make a quantum jump in the
conduct of intelligence? Is there any way in which intelligence
can learn to say better "we mean it," "these are the problems
that may arise in consequence," "these are the decisions that
must be decided?" How can we extend our analysis in time
and depth beyond present dimensions and yet carry with us the
conservative elements in the intelligence community?
There might be changes in organization or in the mechanics
of presentation which might improve our impact on the formu-
lation and execution of national policy. These things should
be explored, but no such changes could create, by themselves,
the change in the intellectual and visceral impact of intelli-
gence that we must aim for. The only sure way to conduct
national affairs with greater wisdom is for the responsible of-
ficials to think smarter thoughts. There is no mechanical or
organizational substitute for brains. Intelligence is an im-
portant and integral part of the process by which we conduct
our national affairs, and intelligence officers, therefore, have a
Approved For Release 2004k~IT CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : E~~-1 I P78-03921A00030019000094
tremendous responsibility to apply themselves to new ways of
thinking which will give us a more brilliant insight into the
dynamic world and our constantly changing place in it.
The real area in which we must seek improvement, there-
fore, is in that related to analysis. Perhaps we must learn to
pose a different kind of question to ourselves. Perhaps we need
to learn to think on a different time scale. Perhaps we need
to develop even more new methods of analysis. Perhaps we
need to do some combination of all of these things, and many
others as well.
There are probably many different ideas that should be ex-
amined. Here is a sample of the kind of thing that we might
think about. Might it not useful for us to engage systemati-
cally in backward analysis from hypothetical cases? For ex-
ample, intelligence predicted the launching of the Soviet earth
satellite and said that it would have unfortunate consequences.
But let us suppose that several years ago we had posed the fol-
lowing question: "What would be the impact on the policy
situation of the US and on its prestige if the Soviet Union were
to accomplish some technological breakthrough which would
support a Soviet claim for Soviet supremacy in the field of sci-
ence and technology?" If we had had this sort of analysis, it
might have been possible for us to point out in a much more
meaningful manner the way in which the Soviet missile pro-
gram and the development of a Soviet earth satellite might
place the Soviet Union in the favorable situation envisaged in
our hypothetical analysis. We could pose other similar ques-
tions such as : "What will be the effect on the world political
situation when Soviet industrial production equals US indus-
trial production?" "What would be the consequences if all
of the `third force' groups backed by the US came to power and
`right wing' parties disappeared?" "What would the world
look like after 20 years of disarmament and `peaceful coex-
istence?'" Analysis of these questions might put a vastly dif-
ferent light on intermediate developments leading toward the
hypothetical situation we have posed for ourselves.
There is undoubtedly room for improvement in our work, but
unfortunately as we get better and better, we have more and
more justification for continuing to think and do exactly as
we have been thinking and doing. This is more and more justi-
fication for not thinking creatively about improvement. We
Approved For Release 2004/12/17 : 66C1JP78-03921A000300190001-4
A roved For Release 2004/1 17 : CIA-RDP78-03921A000300190001-4
E ET
know, however, that there will always remain an important
challenge to us in intelligence as long as the US does not
act to accommodate itself adequately to world developments.
What do you think that we should do about it?
Approved For Release 2004 tZ/jjT: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : -ETP78-03921AOO1O!
ELINT
A SCIENTIFIC INTELLIGENCE SYSTEM
Charles A. Kroger, Jr.
During the initial phases of the Battle of Britain] a German
bomber, relatively safe under cover of darkness, flew over the
blacked-out landscape head' for Lond n., At a specific mo-
ment)the bomber dro` T! ombs, w c$'a c rately hit their
target, and another successful German Luftwaffe attack was
history. Electronic advancements by the Germans made this
possible. British interception and analysis of this new elec-
tronic bombing, device countered the Germans' success and
continued Q render less effectivevery subsequent electronic
advantage the Germans developed. In a parallel manner ,the
Germans developed a highly effective electronic intelligence
effort directed against the Allied raid orginating from Britain.
This phase of electronic intelligence, utilizing electronic means
to determine enemy electronic capabdi.tie,., began in England
just before World War Tana has been an ever increasing effort
which today is called ELINT.
ELINT is a coined word for the process of electronic intercept
and analysis or electronic intelligence - a process about which
very little has been written. The intelligence officer, unless he
is in the electronics field himself, has had little contact with
ELINT. By directive 1 ELINT is defined as: "the collection
(observation and recording), and the technical processing for
later intelligence purposes, of information on foreign, non-
communications, electromagnetic radiations emanating from
other than atomic detonation sources." In simple* -terms,
ELINT is the detection and analysis of radiations from foreign
electronic devices for the purpose of extracting information of
value to intelligence.
Just as a flashlight radiates a beam of light observable
human eye, electronic devices emit or radiate nonvisible, rion-
audible radiations which are detectable and recordable, using
electronic devices just as the human ear hears sound. This
interception or collection of enemy radiations is the first stage
of ELINT.
The formal definition restricts ELINT to "noncommunica-
tion electromagnetic radiations other than atomic detonatioll'ORI/H RP PAGES
71-83
Approved For Release 2004/12/17 :1 RIkTbP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
72 SECRET
sources." This means that ELINT is responsible for all radia-
tions except those used in voice or other communications such
as radio or telegraph and those resulting from atomic sources.
What other kind of radiations are there? To--name a few with.
which ELINT deals, there are radiations from missiles and mis-
sile guidance devices, radiations from developmental labora-
tories and field testing- stations working on electronic devices,
radar, navigational aids, anti-aircraft and aircraft gun direc-
tion, air-to-air or air-to-ground identification signals? and so on.
"Technical processing for later intelligence purposes" means
subjecting the collected ELINT raw data, usually in the form
of beeps on a magnetic tape or wire, to a detailed analysis by
use of complex electronic equipment. This equipment permits
the analyst to hear with his ears, to see on an oscilloscope, to
measure very accurately, to photograph, to compare with
standards and to investigate the intercepted signal in as many
ways as are necessary to identify the characteristics of the
foreign device. When the "technical processing" is completed 3
the technical analyst can pass to the intelligence analyst de-
tailed information on the location and capabilities of the for-
eign device. The intelligence community can then combine
this information with other knowledge to estimate the over-all
competence and possible intentions of foreign powers.
For a technical look at what ELINT really is let us turn for
a moment to basic physics. Here we remember that electro-
magnetic energy, like light, travels in waves. These waves vary
in length and form a spectrum. We are all familiar with the
rainbow with its colors ranging from red, having waves of 760
millimicrons in length (400 million megacycles/sec), to violet,
with waves of 385 millimicrons in length (800 million mega-
cycles/see). This color spectrum is a part of the electromag-
netic spectrum. The radio portion of this electromagnetic
spectrum is used primarily for communications and military
weapons. Currently, the military weapons use radio waves
varying from a few thousand cycles (waves per second) up to
100 kilomegacycles (one hundred billion waves per second).
The following diagram illustrates the position of the radio and
color spectrums in the over-all electromagnetic spectrum and
an expansion of the radio spectrum showing the bands where
different Soviet electronic devices radiate.
Approved For Release 2004/1j'tCIA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17: S P78-03921A0003001900073
Approved For Release 200412/17 :$BVP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
74 SECRET
For a specific example of how ELINT works, let us_ take a__
simplified look at Soviet radar. Soviet radar devices radiate
electronic impulses at certain frequencies and in definite beams
searching the sky for long distances and great altitudes for any
object that may be present. When these impulses strike an
object they bounce off and return to a ground or airborne re-
ceiver which calculates the length of time between emission
and reception and the strength of the signal received. From
thi -tl e Soviet radar operator can generally tell the size, speed,
direction, altitude, and other pertinent information about the
unseen object. Our Strategic Air Command, with its retalia-
tory mission, urgently requires every possible bit of information
on Soviet radars - particularly on their location and capa-
bility. This is where ELINT goes to work. By intercepting,
amplifying, recording and analyzing an enemy radar signal or
pulse,.. ,can learn all about it. By studying the type of radi-
ation, its modulation (AM, FM, pulse) its pulse repetition rate,
pulse duration, pulse shape, its radio frequency (position on
the electronic spectrum), its antenna pattern characteristics,
and so on, we can identify the radar, compare it with known
information, ascertain its range, location, use, and other essen-
tial information required to evaluate its capability as a radar
and its susceptibility to countermeasures.
This same process of ELINT pertains to any and all enemy
electronic devices including airborne intercept devices used by
guided missiles, guided missile launchers, fighter aircraft, long-
range and short-range navigational aids, ground controlled in-
tercept height finders, anti-aircraft and aircraft fire control
radar, blind bombing devices, electronic radiations emanating
from scientific laboratories or production plants,.aii'so-on.
What do these radiated signals sound like? Frankly,they
sound like noise or radio static during a thunder storm T---
--fact, before the more euphonious term of ELINT was coined, the
British called it "Noise Listening" and, during World War II,
had a "Noise Listening Bureau."
Although ELINT is a very complex field - constantly looking
beyond present knowledge of electronics to fulfill its role of pro-
viding timely information on new foreign electronic develop-
ments, it need not be pushed aside as too complicated to be
understood. Because of its complexity, some members of the
intelligence community are inclined to throw up their hands
lease 2004t,tfr?T CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET 75
and ignore this potential tool. However, ELINT is not too
difficult to comprehend or use, nor is it an end in itself, but it
can contribute essential, accurate information to the intelli-
$ence process.
F Scientific intelligence and, in particular, ELINT, or electronic
intelligence, had its start in England immediately before World
:'War II. Early in 1939 the British Committee for the Scientific
i
no
n
e
.
g
ca
o
of new German weapons. One scientist, Dr. R. V. Jones, was
appointed to look into the matter. Before he even started his
task the war broke out and in June 1940, Dr. Jones, after con-
siderable study, concluded that the Germans had developed a
radio beam by which their bombers could operate over England
regardless of weather, darkness, or cloud cover and still be most
accurate in their blind bombing. This beam, just a little more
than one-half mile wide, passed directly over London. Based
on Dr. Jones' conclusion, steps were immediately taken to find
any possible countermeasures. A Royal Air Force search air-
craft was outfitted and it accomplished its mission of looking
fQr_and - detecting this German beam. Technical analysis of
this information provided the radio frequency and other char-
acteristics of the beam, thus permitting the British to jam it
and render it . ineffective. Henceforth, many bombs intended
for London fell harmlessly on the open countryside. This in-
terception and analysis of an enemy electronic radiation (later
known as Knicklbein) was the birth of present day ELINT.
The Germans altered their beam system and soon began using
a better system utilizing intersecting beams referred to as the
"X" apparatus, which provided greater accuracy. These beams
were at a different frequency than Knicklbein, requiring new
search and analysis before the British solved this new threat
and took countermeasures. With the "X" apparatus, the
bomber flew along an electronic beam while its position along
the beam was observed from a German radar station on the
continent. When the bomber was over the target, it was told
to drop its bombs By now Britain's ELINT capability of inter-
cepting and analyzing this electronic information was quite
effective and continued to grow in scope and importance
throughout the war.
During World War II theUS_jhade extensive use of electronic
intercept devices in - i the acific- and European Theatres of
Approved For Release 2004/12/17 :5E R PP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
76 SECRET
Operation. Special USAF and Navy planes equipped with
ELINT receivers ferreted out the secrets of German and Jap-
anese antiaircraft radar and aircraft warning devices. From
the use of such planes the word "fgr,'' was ~ oined- a term
presently applied to aircraft equipped to inves iga a enemy
electronic radiations. Among the most deadly weapons di-
rected against the Eighth Air Force were the German antiair-
craft guns which were equipped with extremely accurate radar
directors known as "Wurzbergs." The close formations of
American aircraft made a juicy target for the more than 16,000
German antiaircraft guns. By use of radar intercept equip-
ment (ELINT equipment) information was obtained which per-
mitted the use of jamming devices, and thus the one-billion
dollar investment of the Germans in their Wurzberg radars was
jiterall)ruined by the countermeasures made possible through
ELINT. Knowing we had this capability, the Germans began
a frantic search for non-jammable radar equipment, but the
war vi as.cver before they succeeded.
Following World War II there was a period in which interest
in ELINT, as in many wartime activities, tapered off. Some
effort continued but the real push to provide intelligence on
electronic advancements in other countries was not initiated
until the USSR clamped down its Iron Curtain. Since that
timhe collection and analysis of electronic signals radiating
behind the Curtain has been the constant goal of ELINT. Since
the birth of ELINT in 1940 the effort has grown in size, cost,
importance, complexity, coverage, and capability, and, like
most scientific efforts, is making yesterday's limits, today's
capabilities.
Electronic intercept, to use one connotation of ELINT, pro-
vides factual information. Unlike the collection of much in-
telligence information where we are forced to rely on word of
mouth, memory, or integrity of source, electronic radiations are
intercepted and recorded by machine. If a signal is being radi-
ated it can be recorded and later reported accurately even by
someone who doesn't understand all that he is doing. Because
of this factual nature, ELINT has provided substantiation of
many intelligence estimates based on other intelligence
processes.
During World War II, Air Force B-24 aircraft and radar-
equipped Navy Catalina aircraft were assigned the job of locat-
Approved For Release 2004/igd&fiCIA-RDP78-03921 A000300190001-4
Approved For Release 2004/12/17 : CIA-RRETDP78-03921AO00300190001-4
SEC 77
ing enemy radar in the Pacific. They spotted and pinpointed
Japanese air-warning sets scattered all the way from the Solo-
mons to the China coast. A few days before the Leyte landing
in October 1944 one of the ferrets discovered a new Japanese
radar on Suluan Island at the mouth of the Leyte gulf. As
this radar commanded the approaches to the Leyte coast line
it was necessary to eliminate it and this was done on a com-
mando raid by the US Rangers.
Currently, ELINT is providing the Strategic Air Command
with the intelligence it requires on the location and range of
Soviet radar. Through ELINT, information is acquired on the
method, capability, and limitations of Soviet long-range navi-
gation systems upon which their atomic bombers rely. Soviet
missile tests are monitored by ELINT and the point may soon
be reached where, by interception and analysis of the telemeter-
ing signal from Soviet missiles, we will acquire missile per-
formance data vital to our National Intelligence Estimates.
(Telemetering is the electronic system used in missile testing
which records, codes, and transmits to ground test stations such
things as missile speed, flight path, guidance, skin tempera-
tures, and other behavior characteristics of the missile in
flight.)
Since early in World War II_ the Army, Navy, and Air Force
each hexpended varying degrees of effort on ELINT, and in
1952 the Central Intelligence Agency entered the ELINT field.
Although much of this individual endeavor was valuable, in
1954 better organization was given to ELINT - organization
on--a national level. The lack of proper dissemination of val-
uable intelligence produced by one organization but not always
readily available to the others in the community was noted as a
serious problem. When this situation came to the attention of
the National Security Council a study was made, and National
Security Council Intelligence Directive No. 17, entitled Elec-
tronic Intelligence (ELINT) was issued (in May 1955).
NSCID-17 established the first national policy for ELINT and
it is still the basic authority for the national ELINT program.
It directed that :
a. The US Communications Intelligence Board
(USCIB) shall be the national policy body for ELINT.
Approved For Release 2004/12/17 : COK-REP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
78 SECRET
b. The Department of Defense and the Central In-
telligence Agency shall be responsible for their respec-
tive ELINT collection activities.
c. The technical processing of all ELINT shall be
accomplished in a jointly-staffed center administered
by the Department of Defense.
d. All data collected by the collection agencies shall
be made available to the National Technical Process-
ing Center (NTPC).
e. The NTPC shall effect the fullest and most expe-
ditious processing possible and furnish the results to
the interested agencies.
The present national organization for ELINT is rather com-
plex, with many interlocking organizations and many formal
and informal coordinating committees. The important con-
sideration is that each of the services and CIA is free to run its
own collection operations designed to furnish information it
alone requires, but is, expected to submit all collected data to
the NTPC subject only to the minimum delays necessitated by
prior exploitation for urgent tactical or operational purposes.
One can immediately see the strong vertical organization for
ELINT within each major component. It should also be appre-
ciated that much horizontal collaboration is being accom-
plished by joint participation in such organizations as the
NTPC and AFOIN-Z in an effort to coordinate individual activi-
ties into a national ELINT program.
In October 1953 a study was made of ELINT in CIA. This
resulted in the appointment of an Agency ELINT staff officer
and in the preparation of an Agency ELINT program which the
Director of Central Intelligence approved on 29 May 1954.
Within the Agency ELINT is organized generally as follows.
The Office of Scien?ific Intelligence develops targets and
requirements for ELINT collection, furnishes scientific and
technical guidance to Agency collectors, and performs the tech-
nical analysis and collation of ELINT with all source material
in the production of scientific intelligence. The Clandestine
Services conducts a continuing review of the, potential and
ca al~jl ties for covert ELINT collection, implements peci =c
clandestine activity in response to approved ELINT require-
Approved For Release 2004gg 1E7T: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : c P78-03921A0003001900017-A
nients, and coordinates US ELINT clandestine activities with
foreign governments. The Office of Communications arranges
for research, development, and procurement of ELINT equip-
ment as required to support clandestine ELINT collection. The
CIA ELINT Staff Officer advises the Deputy Director of Central
Intelligence and appropriate operating components on the
formulation, implementation, and coordination of ELINT
plans, policies, and programs.
On the national level, much work has gone into summarizing
what each organization requires in the ay of information on
enemy electronic developments. This sizeable' task has re-
sui.%ed in a formal statement of the currently definable Specific
ELINT Collection Requirements (SPECOR). This collection
guide is based on the priority of the National Intelligence Ob-
jectives. It has been disseminated throughout the services and
CIA field units for guidance as to what information the intelli-
gence community requires and in what priority.
To realize the need for an adequate requirements system,
consider that the ideal ELINT system is one capable of collect-
ing all signals of interest and extracting all of the useful infor-
mation from each signal. This is neither possible nor prac-
ticable, -ho ver. The questions of just what signals are of
interest and just what information about them is needed must
be answered in the light of the gaps in our intelligence. Thus,
as in other branches of technical intelligence, ELINT is faced
with the problem of relating scientific techniques to intelli-
gence problems.
In general, ELINT targets fall into two major categories.
The Army, Navy, and Air Force, charged with the military de-
fense of our country, are primarily concerned with the location
and capability of all enemy radar ,,on a current. basis. This is
referred to as the Radar Order of Battle (ROB). The Air
Force, for instance, must know where the heavy concentrations
of enemy radar are so that its planes can either skirt the area
or take proper countermeasures. The largest portion of inter-
cepted enemy electronic information falls into this category of
maintaining an adequate radar order of battle. CIA, on the
other hand, is primarily interested in scientific break-through,
or in not being surprised by new enemy electronic develop-
Approved For Release 2004/12/17 : ARTP78-03921 A000300190001-4
8Approved For Release 2004ECRE7 : CIA-RDP78-03921A000300190001-4
ments. This means that most ELINT effort is directed toward
the interception and analysis of new and unusual electronic
signals. Naturally in the course of searching for new and un-
usual signals, much order of battle information is received.
This serves, in addition to supplementing the services opera-
tions, as a basis of comparison to determine what is new and
unusual. The ELINT objectives of first priority to CIA relate
to those signals which have yet to be intercepted or for which
the radiating source has yet to be seen. Specifically, the
targets are as follows :
a. Those non-communication signals which are, or
are suspected to be, associated with the Soviet or
Satellite ability to deliver atomic or other weapons of
destruction - that is, guidance or telemetry signals
associated with missiles, airborne navigation, and
bombing systems.
b. Those non-communication signals which are or
are suspected to be associated with the Soviet or Satel-
lite ability to defend their countries against the deliv-
ery of atomic or other weapons of destruction -that is,
early warning, ground-control intercept, gap-filling
radars, surface-to-air weapons systems, airborne weap-
ons systems, ground surveillance systems, jammers,
and so forth.
c. Those signals occupying an unusual portion of
the radio frequency spectrum not normally associated
with Soviet or Satellite equipment.
The equipment involved in ELINT is elaborate and com-
plex. To make matters worse, the higher _ up the frequency
spectrum you go the shorter your intercept range becomes,
and the present trend toward higher frequencies means that
ELINT equipment must get closer to the target or be designed
with greater ranges, both of which approach the impossible.
ELINT equipment falls into two main catagories: collection
equipment (airborne, maritime, fixed station, or agent-carried)
and analysis equipment (used on the ground to reproduce,
readout, and analyze the collected information). Basically,
the major components of an ELINT collection system are the
antenna, receiver, recorder, direction finder, and analyzer.
Approved For Release 2004 WtT CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
SECRET 81
The antenna corresponds to the human ear. It is that com-
ponent which first detects a signal. It is, of course, desirable
that the antenna be very sensitive or, as we say in ELINT,"ehave
high antenna gain.' This permits the maximum intercept
range. The ideal antenna system would have the following
characteristics :
a. a continuous and fixed broad area coverage,
b. very broad electronic spectrum coverage,
c. very high gain,
d. inherent capability for giving directional in-
formation.
These requirements are not all compatible. In practice it is
necessary to compromise in order to gain a workable system.
The decision as to which of the desirable characteristics can
be safely compromised, and to what extent, is based on the fre-
quency range of interest and also on the specific ELINT target
under consideration. For instance, broad area- coverage may
be obtained by either of two means - a broad beam antenna
fixed in space or a narrow beam, scanning antenna. The first
method demands a sacrifice in gain; The second limits the
time coverage of any part of the total area.
Following receipt of the signal by the antenna it is passed to
a receiver. The function of the receiver is to convert trans-
mitted information available at the antenna into a form that
can be measured and recorded. Basically1two general types of
receivers are in use today - the superheterodyne and the
crystal video. The operating characteristics of each receiver
may be outlined as follows:
Superheterodyne - slow scan.
a. inherently high sensitivity,
b. good frequency resolution,
Approved For Release 2004/12/17 : iMP78-03921A000300190001-4
Approved For Release 2004/12/17 : CIA-RDP78-03921A000300190001-4
82 SECRET
c. prohibitively long search time in many cases.
Crystal video - wide open.
a. low sensitivity reducing maximum probable
range,
b. frequency resolution problems,
c. search time considerably less than the super-
heterodyne.
From the receiver the signal goes neat to the recorder where
the signal is stored on magnetic tape or wire. There are two
main reasons for recording signals. A permanent record of the
signal is required for future analysis and for records, and on
signals of short duration or higher complexity the operator
may not have enough time or capability to evaluate the signal
parameters before the transmission is ended.
Direction-finding equipment issometimes utilized during the
interception of the signal. It displays incoming signals on an
oscilloscope or other azimuth-reading device giving the direc-
tion of the arrival of the signal.
Analyzers in the ELINT collection system are sometimes used
during interception to provide a preliminary observation of the
type of modulation and to measure the repetition rate, dura-
tion, and general shape of signal pulses. Signals are usually
presented by a cathode ray tube (similar to a television screen),
which provides a moving picture of the shape, size, and nature
of the incoming signal pulse or wave form. The pictures are
usually photographed as a permanent record. It should be
pointed out that ELINT collection devices need not be huge
as are those used in ground, sea, and some airborne
operations. Quite to the contrary, considerable use is made of
miniature equipment no larger than a book. ELINT collection
equipment is usually designed for the specific situation in-
volved, whether it be a 60-foot parabolic antenna on the ground
or a tiny unassuming, ~and-carried package.
The major comphts of an ELINT analysis system vary
greatly with the purpose of the analysis. Order-of-battle
analysis is often done automatically by IBM-type equipment.
The analysis that CIA performs is not for order of battle but is
to identify new and unusual signals. For this, man-operated
equipment is required and an analysis position contains at least
Approved For Release 2004 k//&: CIA-RDP78-03921A000300190001-4
Approved For Release 2004/12/17 -SE-DP78-03921A0003001900gi-4
I EARPHONES
RE DU EN CY
TO PLAY TAPE LOCATION ON
FROM NECOR OCR FRED ENCY
SPECTRUM
NUMBER OF AND SIGNAL BEAM WIDTH
SPACE BETWEEN ANU ROTATION AND/OR
51GNALS NOD PATE
the following fundamental equipment: a tape transport used
for duplicating or monitoring; a counter that measures and
illustrates the modulation frequency; an ink-on-paper recorder
to draw a continuous trace of the signal amplitude; an oscil-
loscope, which permits observation of the wave form; a vibra-
lizer to display modulation frequency components versus time;
filters to separate signals; a rapid-advance movie camera; and
a host of other equipment to permit the analyst to scan great
volumes of tape and film to separate that minute portion which,
upon detailed analysis, may prove to be a new electronic devel-
opment.
It is hoped that this basic discussion of ELINT will provide a
general concept of this complex scientific intelligence process.
It should be realized that in the interest of readability many
points have been simplified and technical details omitted so as
not to confuse the non-technical reader.
If one considers that one-third of the cost of a modern fighter
aircraft goes for electronic equipment and that most of the
electronic devices which make up this equipment radiate sig-
nals, then one begins to understand how much there is to learn
of Soviet capabilities by examining their use of electronics.
This also applies to ground and sea weapons, including missiles.
Recent news reports of Soviet developments in the scientific
field demonstrate how heavily the Russians are relying on elec-
tronics and how advanced their development is. The Soviet
earth satellites with their radiated signals are a responsibility
of ELINT. ELINT must continue to intercept and to analyze
Soviet electromagnetic emissions preferably in the research and
development stages in order to keep abreast of Soviet electronic
advancements and to attempt to predict future capabilities.
Approved For Release 2004/12/17 :F&f4~ttP78-03921 A000300190001-4
Approved For Release 2004/12/a XE-0392lA0003001900%4
REPORT ON HUNGARIAN REFUGEES
Guy E. Coriden
The Hungarian Revolution of October 1956 provided an un-
precedented opportunity for the collection of intelligence on a
Soviet Bloc country. Each of the many facets of intelligence
activity played its role. Every known Free World and Bloc
intelligence organization was involved. Every Hungarian
refugee who could toddle was a potential target for an intelli-
gence-minded group. It is obviously impossible, therefore, to
claim with good conscience to tell the "intelligence story" of
the Hungarian Revolution. It is also impossible to get the
many participants to agree on which of the many efforts was
the most fruitful. This, then, will be the account of one
activity - the collection of the intelligence information and
material from the Hungarians who were admitted to the US.
Other operations will be mentioned only as they are considered
pertinent. Because the opportunity was unique, certain adap-
tations in intelligence collection methods were required to take
full advantage of it. The object was to extract the maximum
amount of intelligence at a minimum cost while still abiding
by decent rules of human conduct. As the methods used were
necessarily determined by the processing and resettlement pro-
cedures as well as by the official US Government attitude to-
ward intelligence exploitation, it might be well to begin with a
brief historical background.
The story of the revolution has been told many times, prob-
ably best by the UN in its massive report. The outbreak took
place on 23 October 1956, and in the months following, it is
estimated that 188,000 Hungarians found refuge in Austria and
18,000 in Yugoslavia. As of 1 September 1957, approximately
35,000 of these refugees had accepted asylum in the US.
In early November 1956, when it became apparent that a
massive influx of Hungarians was going to have to be resettled,
it was decided that Camp Kilmer, New Jersey, would be the
processing center for all of the refugees. Because the installa-
tion was an Army camp, the Army was charged with the initial
responsibility for coordinating the resettlement effort and pro-
viding all of the housekeeping services. On 12 December 1956,
MORI/HRP PAGES
85-93
Approved For Release 2004/12/11Eh 'L03921A000300190001-4
Proved For Release 2p AO&ly~A-RDP78-03921 A000300190001-4
however, the President appointed a civilian Committee for
Hungarian Refugee Relief under the chairmanship of Mr.
Tracey F. Voorhees. This Committee has coordinated all activ-
ities in connection with "Operation Mercy." In the process it
utilized the services of more than 20 volunteer and govern-
mental agencies. From the arrival of the first refugees on 21
November 1956 until early May 1957, when Camp Kilmer was
closed, transportation was provided by 214 MATS flights, 5
Military Sea Transport Service (MSTS) ocean voyages, and 133
flights chartered by the Intergovernmental Committee for
European Migration (ICEM). The Bureau of Immigration
and Naturalization and the Public Health Service performed
the functions necessary for admitting aliens to the US, and
various charitable-religious agencies arranged for most of the
resettlements. Part of the job of fitting the individual's skills
to available employment opportunities was performed by the
National Academy of Sciences and the US Employment Service.
The processing and resettlement was handled with an amazing
degree of efficiency, and the sympathetic attitude of the Ameri-
can people was so sustained that by early May it was possible
to close Camp Kilmer. About 32,000 of the refugees had been
dispersed to various parts of the country, and those remaining
are being shuttled through the St. George Hotel in Brooklyn.
Lest the cursory nature of this account convey the idea
that this was a simple and smooth process, remember that the
operation involved the complete transplanting to the US of a
large number of participants in a violent revolution who had
lost most of their possessions and who had little or no knowl-
edge of the English language. Only 6,500 of these could come
under any available immigration quota. The rest were ad-
mitted under the Attorney General's discretionary authority,
and the rules were established and changed several times.
Indeed, methods and procedures were developed, abandoned,
and reinstituted many times in the early days of the operation.
Also the prevailing attitudes, both official and public, changed
appreciably over the months. In the early days the primary
concern was to provide a humanitarian welcome for the vic-
timized Hungarian people. Every effort was made to avoid
incidents which might cause unfavorable comment. This atti-
tude was motivated by a genuine sympathy and admiration for
the Hungarians and a determination to take full advantage of
Approved For Release Yll