STUDIES IN INTELLIGENCE [Vol. 13 No. 4, Fall 1969]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010008-4
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
126
Document Creation Date:
December 16, 2016
Document Release Date:
December 14, 2004
Sequence Number:
8
Case Number:
Publication Date:
January 1, 1969
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000300010008-4.pdf | 6.72 MB |
Body:
5/01/26 : CIA
Approved For Rele
ase 2005/01/2b : GIA-14IDP76 I 0.3194A000300010008-4
STUDIES
INTELLIGENCE
VOL. 13 NO. 4 FALL 1969
CENTRAL INTELLIGENCE AGENCY
ARCHIVAL RECORD
PLEASE RETURN TO
25X1 AGENCY ARCHIVES, BLDG.
Approved For Release 200
-Ri28T031911934800010008-4
25X1
25X1
Approved For Rel
ease 2005101125 : CIA-KUI-'78 I 0
3194A000300010008-4
STUDIES
in
INTELLIGENCE
VOL. 13 NO. 4 FALL 1969
CENTRAL INTELLIGENCE AGENCY
ARCHIVAL RECORD
PLEASE RETURN TO
25X1 AGENCY ARCHIVES, BLDG.
Approved For Release 20
R2ti28T03 1 916:441000 1 0008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may
be written on any theoretical, doctrinal, oper-
ational, or historical aspect of intelligence.
The final responsibility for accepting or
rejecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion of the Board, the article
makes a contribution to the literature of in-
telligence.
25X1
25X1
EDITORIAL BOARD
ABBOT E. SMITH, Chairman
25X1
E. DREXEL GODFREY, JR.
LAWRENCE R. HOUSTON
HUGH T. CUNNINGHAM
Additional members of the Board are
drawn from other CIA components.
Approved For Release 2005/01/2VM-RDP78T03194A000300010008-4
25X1
25X1
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET
CONTRIBUTIONS
Contributions to the Studies or communications to the editors may
come from any member of the intelligence community or, upon in-
vitation, from persons outside. Manuscripts should be submitted
directly to the Editor, Studies in Intelligence,
land need not be coordinated or submitted through chan-
nels. They should be typed in duplicate, double-spaced, the original
on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Articles may be
classified through Secret.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office
dissemination center or the responsible Central Reference Service desk,
issues and on other questions call the Office of the
Approved For Release 2005/01/2%Egff-RDP78T03194A000300010008-4
Approved For Release
-2005t01-128-:-ettFRI5M-T031-94A000300010008-4
CONTENTS
Page
"Rolling Thunder" and Bomb Damage to Bridges 1
Kenneth C. Fuller, Bruce Smith, and Merle Atkins
Intelligence tackles an old problem in a new form. SECRET
Cloud Nine: A Problem in Intelligence Production 11
James W. Featherstone
Current intelligence delivers a maximum effort. SECRET
Winnowing Wheat from Chaff James R. Shea 19
Tracking down Soviet underground nuclear explosions.
SECRET
On the Accuracy of National Intelligence Estimates 25
Abbot E. Smith
More on the theory and practice of estimating. SECRET
Non-Electronic Agent Communications 37
Gabriel M. D'Echauffour
Rudiments of an ancient craft ever new. SECRET
Defense Against Communist Interrogation Organizations 49
Michael L. Mineur
Some guidelines for secret agents. CONFIDENTIAL
The Bogotazo Jack Davis 75
In retrospect: US intelligence and the explosion in Colom-
bia. SECRET
Platt's Law 89
DDI/New York Paul Corscadden 91
Intelligence during a Presidential transition. SECRET
The 30 September Movement in Indonesia . . John T. Pizzicaro 97
Some retrospective reflections inspired by recent research.
SECRET
Intelligence in Recent Public Literature 113
MORI
Approved For Release 2005/01fIECNA-RDP78T03194A000300010008-4
25X1
25X1
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Next 1 Page(s) In Document Exempt
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000=11131008-4
Intelligence tackles an old
problem in a new form.
"ROLLING THUNDER" AND BOMB DAMAGE
TO BRIDGES
Kenneth C. Fuller, Bruce Smith, and Merle Atkins
The program known as Rolling Thunder, a systematic but restrained
air offensive against selected economic and military targets in North
Vietnam, began on 2 March 1965. The basic objectives of Rolling
Thunder were to reduce the ability of North Vietnam to support the
Communist insurgencies in South Vietnam and Laos; to increase pro-
gressively the pressure on North Vietnam to the point where the re-
gime would decide it was too costly to continue directing and support-
ing the insurgency in the south; and to bolster the confidence and
morale of the South Vietnamese. As the days of the air campaign over
North Vietnam stretched into months, the requirement developed in
Washington and particularly in the White House for independent
assessments of the results. As a consequence, CIA was asked to make
its own assessment of the bombing campaign as well as to join the
Defense Intelligence Agency (DIA) in the preparation of an analysis
for the Secretary of Defense. The work on bomb damage to bridges,
which is discussed in this paper, is one example of the reporting on
the Rolling Thunder program. Although the extent of damage and the
cost of repair are the principal topics discussed here, the White House
was equally concerned to find out how much time would be needed
to restore lines of communication (LOCs ).
Background
North Vietnam's major contributions to the war in the south have
been its military manpower, its function as the control center for the
insurgency, and its function as the logistics funnel through which
materiel, mostly from the USSR and Communist China, has moved
into South Vietnam. Consequently the attainment of the first objective
of Rolling Thunder hinged almost entirely on the ability to impede
or stop the flow of men and supplies from North Vietnam to South
Vietnam. Although a number of different target systems were taken
under attack, the Rolling Thunder campaign was essentially and at
MORI/HRP
SECRET 1 from pg.
01-09
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Appmetqltor Release 2005/01/26 : CIA-RDP78TONVM80197300p40008-4
times almost exclusively an interdiction program. A standard bombing
strategy to achieve such a goal was to stop or slow military traffic in
rear areas by interdicting critical choke points along heavily used
LOC's. Bridges of course qualify as such, and during Rolling Thunder
more attack sorties were flown against bridge targets than against
any other fixed target system.
As the bombing campaign progressed, policy-makers and high-level
Presidential advisors started asking the intelligence community to
assess the effectiveness of the effort. Among the questions posed were
those on the status of damaged bridges and North Vietnamese counter-
measures to bypass the bridges. The Secretary of Defense specifically
wanted to know the number of bridges damaged, the estimated cost
of repairing the damage, whether or not the flow of traffic south was
being effectively impeded, how quickly the bridges could be re-
stored, and the net impact on logistics capabilities. Answering these
questions proved to be a knotty problem.
Number of Damaged Bridges
In one of his columns in 1966, Art Buchwald pointed out that avail-
able statistics suggested that the US apparently had destroyed all of
the bridges in North Vietnam many times over. He concluded that we
must be "dropping our own bridges on North Vietnam and then bomb-
ing them." Buchwald's quips contained much truth. During the early
months of the bombing campaign, depending on the sources being
used and the degree of discrimination exercised, one could get an
extraordinary variety of estimates of the total number of destroyed
bridges in North Vietnam, ranging from as low as 657 to as high
as 7,000. When total "bridge-kills" began approaching these incredible
numbers, it became apparent that a new basis of intelligence assess-
ment was in order. Before we could get at the matter of the true
extent and nature of the damage and the impact of the program on
the enemy's logistic activities, however, there were fundamental prob-
lems to be resolved including such basic questions as when is a
bridge a bridge. Within CIA the job was given to the Construction
Branch of the Office of Economic Research (OER).
Analysts from OER, in consultation with DIA, discovered that early
estimates of destroyed bridges were compiled almost exclusively from
pilot reports. Now it is very difficult for a pilot to assess accurately
the results of a strike while traveling at high speed and when the
2roved For Release 2005/01/26 : CIA-RDP78T03194A0OHM
App 0008-4
ApprtSislifitarriapjggise 2005/01/26 : CIA-RDP78T03194A000%2E9M008-4
target area is obscured by smoke and dust. To narrow the credibility
gap concerning the number of bridges damaged, OER analysts decided
that the only reliable method was to use "hard" evidence provided
through the eye of a camera rather than the fleeting evidence pro-
vided through the eye of a pilot. Starting in September 1965, there-
fore, a special task force consisting of personnel from OER and DIA
and the Imagery Analysis Service (IAS) spent many man-hours re-
viewing all reconnaissance missions flown over North Vietnam search-
ing for damaged bridges. This intensive search, completed in March
1966, revealed that 216 bridges actually had been destroyed during
the first year of the interdiction campaign, compared with 657 in what
were at that time the currently most conserative assessments. The
figure rose to a high of 541 destroyed bridges by the end of the bomb-
ing program in October 1968.
Once the principle of using aerial photography was adopted as the
sole source of information from which to make hard estimates, a
group of CIA/IAS photo interpreters was assigned the tedious but
important task of scanning all photographic missions looking for
damaged bridges. Each bridge crossing was measured and cataloged,
and a photograph of each was prepared for later analysis by OER.
During the three years of bombing, personnel in the Construction
Branch analyzed and filed over 2,500 prints covering some 600 bridges.
These photographs provided the basic input for answering many ques-
tions posed by the Department of Defense and the White House on
the effectiveness of the interdiction campaign.
Conceptual Problems
Before an accurate bridge count could be attempted, a number of
conceptual problems had to be solved. One such problem was how to
define precisely what constituted a bridge. It appeared somewhat
irrational to place a 10 or 20 foot water crossing in the same category
as the 1,000 foot bridge at Viet Tri or the mile-long Paul Doumer
bridge crossing the Red River near Hanoi. Many of the smaller cross-
ings could more accurately be described as culverts, causeways, or
simply improved fords, and thus were excluded from the bridge count.
Another problem that arose concerned the definition of a "destroyed"
or "damaged" bridge. Mere cratering of bridge approaches or "near
misses" in adjacent rice paddies could not be counted as damage
serious enough to interdict a water crossing. The concept of Severe
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A00030001i008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET "Rolling Thunder"
Damage Occurrence ( SDO ) was developed, therefore, to assess bomb
damage. An SDO was defined as damage sufficiently severe to deny
a crossing to users until a significant amount of repairs had been
performed, requiring considerable time, materials, and labor. For ex-
ample, serious damage would include a dropped span, a destroyed
pier, or a destroyed abutment. Holes in a deck, cratered approaches,
twisted superstructure, or a slight shifting of spans was not considered
serious damage.
In 1967 a study of the effectiveness of bombing bridges in North
Vietnam was made by OER analysts. A sample of 46 Joint Chiefs of
Staffs ( JCS ) target bridges which had severe damage was used. The
study covered the period from the start of bombing through January
1967. Photography provided most of the information for the assess-
ment of the extent of damage to the bridges, and bomb damage assess-
ment reports provided data on the volume and types of ordnance
used. The study revealed that there were 249 hits out of 11,744
bombs dropped, for an average of one hit for every 47 bombs dropped.
In other words, slightly over 2 percent of all bombs dropped succeeded
in damaging a bridge to such an extent that it needed extensive repairs.
Cost of Repair
In addition to an accurate count of interdicted bridges, policy-
makers wanted to know what it would cost to rebuild destroyed
bridges to their original state. The best method to arrive at an aggre-
gate cost figure would to be use North Vietnamese costs for bridge
construction in terms of dongs and then convert the dong figure
into US dollars according to an appropriate dong-dollar construction
ratio. This ideal approach could not be followed because of our com-
plete lack of statistical data on North Vietnamese construction costs.
The procedure finally adopted was therefore a compromise, but it did
enable the calculation of relative values.
The costing methodology involved selecting a number of US
bridges for which construction costs were available and which were
similar in design to many bridges in North Vietnam. Unit costs for
labor, materials, and equipment were calculated and then adjusted
to reflect construction inputs available to the North Vietnamese. The
result of these calculations indicated that $700 per lineal foot would
provide an order of magnitude for the cost of building permanent
Apprived For Release 2005/01/26 : CIA-RDP78T03194A000MEM008-4
ApproffalrfoiRtplope 2005/01/26 : CIA-RDP78T03194A000%9k44008-4
highway bridges in North Vietnam.' This figure was tested by
referring to reports from a prominent US engineering firm that had
estimated the construction cost of building 205 highway bridges in
Southeast Asia. These estimates averaged $740 per lineal foot, which
was within about six percent of the figure obtained by the OER
method.
In estimating the cost of repairing damage to a bridge, the struc-
ture was broken down into its component parts: abutments, piers,
and superstructure. Relative costs for each of these components were
then derived for each damaged bridge, and only the destroyed
components were considered in estimating the cost of both tem-
porary and permanent repair or replacement. The estimated total
cost figure for rebuilding all bridges to their original state rose
from about $10 million after the first year of bombing to over $30
million by the end of the Rolling Thunder campaign.
A similar approach was used in estimating the cost of construction
and repair of temporary wooden bridges. These crude, relatively
cheap structures of simple design were easy to build. It was calcu-
lated that the cost of construction averaged $50 per lineal foot
and required 30 men for each 20 feet of bridge under construction.
During the entire campaign, 292 temporary wooden bypass bridges
were built at an estimated cost of $10,000,000.
In addition to bridges, over 500 bypasses of other types were
constructed. These consisted of pontoon bridges, causeways, ferry
slips and fords, at a cost of approximately $3,000,000. In this instance,
the real burden was the requirement for large numbers of personnel
to construct, maintain, and repair these crossings. Manpower re-
quirements were far more burdensome than material costs, especially
during 1966 and early 1967. In these years it is estimated that 72,000
full time and nearly 200,000 part time workers were required to keep
the LOC's open. At the same time there were several Chinese en-
gineer battalions totalling more than 20,000 troops working on the
roads and railroads north of Hanoi.
Highway bridges were used as the basis for all estimates. The cost of recon-
structing railroad and combination (rail/highway) bridges was obtained, generally
.speaking, by doubling highway bridge costs. Railroad bridges are designed to carry
much- heaver loads than highway bridges, which means a significant increase in
the volume of materials used and much heavier foundations.
SECRET 5
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Appro_veslior Release 2005/01/26 : CIA-RDP78T031Q4A0Q0300010008-4
StCKt 'Roiling Thunder"
Countermeasures
One of Newton's laws states that "for every action there is a
reaction that is equal in magnitude but opposite in direction to the
action.' Three years of examining photographs of destroyed bridges
indicated that this dictum also applied to the North Vietnamese
program to counter the effects of the bombing. During the early
months of the Rolling Thunder program, the North Vietnamese were
unable to repair LOC's as fast as they were damaged. It took them
several months to organize their labor force and pre-position ma-
terials near anticipated areas of attack. After two years of bombing,
however, they had so organized their construction effort that they
built and repaired bridges and other bypasses faster than the crossings
could be interdicted. Their modus operandi was to rely on labor in-
tensive repair techniques and local building materials. They stockpiled
stone, bamboo, and timber near expected targets and assigned con-
struction personnel to nearby semipermanent work camps to maintain
and repair allotted segments of the LOC's. As the campaign neared
its end the North Vietnamese countermeasures had been perfected
to a point that many of the serious damage occurrences could be
repaired in hours rather than days. The main emphasis in the North
Vietnamese countermeasures program, and the main reason for its
ultimate success, however, was, the strategy of building multiple by-
passes for all important crossing points.
Types of Bypasses
The type of bypass chosen for construction was generally determined
by the nature of the terrain, and the number of bypasses constructed
at a crossing point depended on the importance of the route. Fords
were common in the mountainous regions where streams are shallow
and narrow. Cable bridges with removable decking were usually
constructed where the stream banks were high, and where the
streams were fairly narrow but deep. Temporary wooden bridges,
pontoon bridges, and ferries were predominent in the lowlands
where the rivers were too wide and deep to ford. Constructed fords
were the most common means to bypass damaged highway bridges,
especially in the early months of the bombing campaign. They
could be quickly built and repaired with local materials. They
could, of course, only be employed at shallow crossings where banks
were low. The construction of alternate bridges was also an effec-
tive countermeasure. The virtue of these bridges was their simplicity.
Appikwed For Release 2005/01/26 : CIA-RDP78T03194A000V66q1)008-4
ApproagnFgorrpuerlagpe 2005/01/26 : CIA-RDP78T03194A000NIM008-4
They were built from salvaged components and locally procured
timber, lumber and rock. Because of their short span design they
were easy and quick to build and repair, but difficult to destroy.
One innovative variety which appeared, unique to North Vietnam,
was the cable bridge, which proved to be a very effective method
for repairing or bypassing highway bridges. Parallel steel cables
drawn taut between anchorages on each bank were covered by
prefabricated wood sections which provided a removable deck. The
only method of interdiction was to bomb the cable anchorages
buried in the river banks, which proved to be a most difficult
assignment. Ferries and pontoon bridges were used at the 'largest
water crossing. Ferries are a relatively inefficient means of rapidly
moving a large volume of goods and were used mainly to carry
rail traffic over major river crossings. Pontoon or float bridges proved
to be effective bypasses for truck traffic. They were difficult to
interdict because they could be divided into sections and hidden along
river banks.
Number of Bypasses
The trend of the North Vietnamese countermeasures effort can
be illustrated by the change in the average number of bypasses
built for important JCS-targeted bridges. Repeated aerial photography
indicated that the numbers steadily increased, as shown in the
following tabulation:
TYPE OF BYPASS
Total number of damaged JCS-
targeted bridges' 46 52 54 54
Total number of bypasses 99 157 175 200
Of which:
Fords (including cause-
ways and culverts) 18 22 22 22
Alternate bridges 26 36 38 49
Cable bridges 9 14 15 16
Ferries and pontoon
bridges 46 85 100 113
Average no. of bypasses _
per bridge 2.2 3.0 3.2 3.7
THROUGH THROUGH THROUGH THROUGH
MAY 67 SEPT. 67 DEC. 67 SE:PT. 68
Joint Chiefs of Staff ( JCS ) targets were those designated under ground rules
established by the White House in an effort to avoid possibilities of escalating the
war, and those considered most crucial to its successful termination.
SECRET
7
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET "Rolling Thunder"
Why Bypasses?
The North Vietnamese preoccupation with the construction of
bypasses was a well-conceived response to the bombing campaign.
In effect, they dispersed their LOC chokepoints just as they had dis-
persed their POL storage facilities and other targets which gave their
system a built-in redundancy that greatly lessened its vulnerability to
effective air attack. Multiple bypasses at a single crossing generally
were placed so far apart that the dispersion pattern of a bomb stick
would bracket only one bypass at a time. ( See Figure 1.) Therefore,
where it may have taken one raid to interdict a crossing during the
early days of the bombing program, in later periods it took two or
three raids to interdict the same crossing. The most important rail/
highway crossing in North Vietnam is the Paul Doumer Bridge over the
Red River at Hanoi; at one time it was supported by 20 bypasses.
Multiple bypasses thus increased the probability that at least one
crossing at a site would always remain serviceable. In addition,
because it normally took as much ordnance to interdict a bypass as
to interdict the original bridge, the cost of bombing a water crossing
in North Vietnam increased much faster than the cost of repairing
it with cheap local materials. At the same time, US aircraft were
subjected to the same risks when attacking bypasses as when at-
tacking the original bridge.
After the Bombing Halt
The story of estimating bomb damage and analyzing North Viet-
namese countermeasures abruptly ended on 31 October 1968 when
the bombing program was stopped. However, the expertise and
voluminous files that were built up over three years of work are
still useful. These assets now provide the basis for estimating the
extent and speed of reconstruction rather than the cost and effect
of destruction. Also, they will provide a valuable data base for
the historian or anyone doing a post-mortem on the Rolling Thunder
program.
AppPoved For Release 2005/01/26 : CIA-RDP78T03194A00Ifi5JfIT0008-4
ApproNsgigrAgedue 2005/01/26 : CIA-RDP78T03194A0003408101008-4
Fluent.: I. Bypasses at Phuong Dinh, North Vietnam.
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000?M4008-4
Current intelligence delivers
a maximum effort.
CLOUD NINE: A PROBLEM IN
INTELLIGENCE PRODUCTION
James W. Featherstone
On the 24th of January, 1969, there descended upon the Directorate
for Intelligence at CIA a document that for a brief but frantic period
was to try the resources of the Directorate in some ways more
severely than they had ever before been tested. This document
was a National Security Council directive, later dubbed by those
who became affected by it, with appropriate irony, "Cloud Nine."
This directive called for an inventory of the international situation
as of 20 January 1969, in the form of a "current assessment of the
political, economic, and security situation and of the major problems
relevant to US security interests and US bilateral and multilateral
relations" world-wide. It demanded, in addition, "a discussion, where
appropriate, of the data upon which judgments are based, uncertain-
ties regarding the data, and alternative possible interpretations of
the data." To make certain that the response was properly pointed,
the directive posed, in 52 pages, a total of 893 probing questions
touching almost every country on the globe. The answers were to
be in the President's hands by the 20th of February, a matter of
26 days, including weekends.
Obviously this was a task of formidable magnitude, one that at
first glance appeared almost impossible of fulfilment in the time span
allotted. Of course, certain short cuts could be taken. It is always
tempting, for example, when confronted with a requirement of
large dimensions, to look on the shelf for already canned material
that could be dusted off, updated if necessary, and ladled out
lukewarm to the consumer. Another timesaving device is to by-pass
the usual processes of editing and review, sending forward imme-
diately from the typewriter the analyst's sweaty draft. Unfortunately,
although in many instances, at least, the analyst views the draft as
perfect, the editor thinks it is merely perfectible, and his ministrations
toward that laudable end take time.
In this case, it was decided that there would be no short cuts.
A really fresh look at the situation would be taken, candid judgments MORI/H RP
from pg.
SECRET 11_
Approved For Release 2005/01/26 : CIA-RDP78T03194A00030001u008-411-17
ApprgeeklEyor Release 2005/01/26 : CIA-RDP78T03194/Vp0Oulpg$172008-4
would be rendered, and the answers would be made as incisive and
unequivocal as it lay in our power to make them. Each answer
would be responsibly edited, and the entire lot would be reviewed
by two senior officers?one of them the chairman of the task force
established to complete the project?who would ensure that, sty-
listically and substantively, the whole massive response met the high
standards set by the DDI. In appearance the response was to be
neat and attractive, if not as psychedelically colorful as a Madison
Avenue product, and it was to be carefully packaged. And finally,
in the words of the Director, as far as CIA was concerned, at least,
the deadline would be met. His determination in this respect may
have been influenced somewhat by knowledge that the directive
had been levied also on the Departments of State, Defense, and
Treasury, putting the Agency, in a sense, in competition with them
for timely production of a quality product.
The manner in which inter-Office and inter-Directorate teams
were manned and organized ?to prepare the answers and get them
edited and coordinated is a complex story in itself. Here, however,
we propose to deal with a different aspect of the Cloud Nine problem,
one with which we are well acquainted especially in current in-
telligence production, but which is not generally thought of until
it becomes potentially a major obstacle, as it did in the case of
Cloud Nine. This aspect embraces the mechanics of reproduction,
the process of getting a clean draft typed, a final draft printed, and
a finished product ready for distribution to meet a deadline.
Anyone with any experience in the management of current in-
telligence is likely to be more familiar than he likes with the
sentence, "It's in the typewriter." This sentence, usually uttered
in a tone of bored indifference by a writer who has been asked what
has happened to an item that has a rapidly approaching deadline,
typifies an all too common feeling among professionals that once
the draft is written, the work is done and the project completed.
Would that it were so; our task would be much easier. Few, of
course, would buy the proposition that the clerical process is as
difficult or complex or even as valuable as the analytical/writing
process. But the fact remains that in many instances, unless the
analyst's work is typed and reproduced and distributed at the
right time, the analyst might just as well not have done it at
all, for all the effect it will have. So from this point of view, the
clerical process, whatever else its level in the scale of values in
Apprd?ed For Release 2005/01/26 : CIA-RDP78T03194A000AWFO508-4
Approvedid FfirriRelease 2005/01/26 : CIA-RDP78T03194A000%1NE01008-4
the profession of intelligence, is just as essential as the analytical
one. And it is played down or disregarded only at the peril of
derailing the entire train of intelligence production.
In the case of Cloud Nine, it was clear from the outset that
the production process, unless carefully managed, would unques-
tionably defeat us. This was partly the result of the sheer bulk of
the project. It stemmed also from the decision to start from scratch
and to apply the full editorial review machinery to the final product.
It was closely related, obviously, to the shortness of the deadline:
less than three weeks remained after the writing teams had been
organized in which to finish and deliver the product. And, of course,
the fact that all of the production personnel involved in Cloud
Nine had other duties that normally occupied them full time, duties
that still had to be carried on simultaneously, compounded an already
difficult situation. Given all of these factors, it was legitimate to
question whether the deadline would, in fact, be met as we plunged
into work.
It was estimated originally that CIA's response to the NSC di-
rective would require about 1,000 pages, and in actuality this estimate
was only slightly below the mark. Each original contribution would
be subjected to at least two levels of editing. No one, least of all
the analyst, was hopeful that minimum alterations in the first or
any subsequent drafts would suffice. The average editor is said to
live by the principle that the pen is mightier than the sword, and
it is commonly held that he forgets that both can be equally lethal
against their natural targets. So it was conceivable that every con-
tribution to the aggregate response would have to be typed a minimum
of three times and quite possibly, when finally reviewed, for a
fourth. The massive size of this typing load made it potentially a
serious obstacle to our meeting the deadline, a built-in impediment at
every stage of production between the writer, the reviewer, and
finally the print shop. A backlog of any consequence at any stage
of the process could cause us to miss the target date by a wide
margin.
In fact, the key to the success of any large operation of this
sort is to establish and adhere to a realistically phased writing-typing-
correction schedule that will ensure a smooth, steady, and controlled
flow of material from the writers through the editors to the printers.
This began, in the case of Cloud Nine, with scheduling the actual
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
ApprovedFor Release 2005/01/26 : CIA-RDP78T03194,4_000300010008-4
sEcRET Cloud Nine
writing so that the answers to the easier questions would be prepared
and edited first and the more difficult ones deferred until close to
the deadline. It was hoped, and indeed it turned out to be the
case, that the senior reviewers would be confronted on any given
day with no less and if possible very little more than they could
plow through in around ten hours. Since these two gentlemen con-
stituted a marked constriction in the pipeline, having to read every-
thing, it was mandatory that their part of the operation proceed
smoothly.
To ensure the essential control of the flow of material, a control
center was established in OCI's Publications Support group. Here
a number was assigned to each question in the NSC directive ( they
were unnumbered in the document itself) and notation made of
the team and office responsible for producing the answer and of
the scheduled date of delivery to the senior reviewers. As the
various answers were written, edited, and typed in second draft,
they were sent to the control center. The center, in turn, passed
them to the senior reviewers. When the latter had finished massag-
ing them, they were returned to the control center, which then
had them put on mats in final form and sent them to the print shop
for reproduction. The control center could tell at any time, and kept
the Task Force Chief informed, whether the production schedule
was being maintained, where any particular answer was at any
time, etc. The system made it possible also to have the individual
answers printed as they were completed, regardless of sequence,
and to ensure that assembly and pagination of the entire response
could be done in orderly fashion at the very end of the process.
Obviously it would have been fatal to hold the drafts until all
parts of the response were in and had been put in the sequence
required by the NSC directive before beginning to print them.
The production schedule was extremely tight, and there was little
latitude for slippage. We were fighting the clock to such an extent
that, rather than hand carry, we used the pneumatic tube system to
get papers from one part of the building to another without delay,
and to keep everyone busy. At one point, the tube system broke
down, causing a certain amount of panic until the missing papers
were located and extracted, and business could go ahead again.
Despite this and a few other lapses, our attack on the Cloud
Nine problem was well-organized, and it proved to be effective. The
Apprldted For Release 2005/01/26 : CIA-RDP78T03194A000SM1008-4
Apprty8s6FRWelease 2005/01/26 : CIA-RDP78T03194A000WW08-4
flow of manuscripts actually began earlier than expected, and no
large backlog developed at any time. But even with the best or-
ganized and most rational schedule, we would still have failed to
deliver on time if we had not had the MTST?Magnetic Tape Se-
lectric Typewriter. We had eleven, and sometimes twelve, of these
machines at our disposal, five of them in OCI's Publication Support
group and the remainder elsewhere in the Intelligence Directorate.
We could have used more, since not all of the substantive teams
had one available to them. The answers to the vast majority of
the questions, however, were put on magnetic tape after initial editing
and review had been completed by the substantive teams. The tapes
and the corresponding typed drafts were then delivered to the Con-
trol Center in OCI, where the tapes were retained while the senior
reviewers were working independently on their copies of the drafts.
The revisions made at this level were then, with the aid of the
MTST, incorporated in a finished, corrected tape and a final draft
typed simultaneously.
The advantage that the MTST has over the ordinary manual
or electric typewriter, and its unique contribution to Cloud Nine,
may not be apparent from this generalized description of procedures.
So to be a little more specific: At a reasonable estimate, probably
less than five percent of all the pages in the analysts' original type-
scripts were completely untouched in both levels of review. Retyping
all of these pages by hand would have been enormously time-consum-
ing, not to mention the strain it would have imposed on the typists
themselves. But when a draft on tape is run through the machine,
the MTST retypes automatically at a very high rate of speed. The
trained operator stops the machine wherever a correction is neces-
sary, enters the change on the new typed draft and the corrected
tape, simultaneously, and directs the machine to proceed until the
next change is encountered. By this means a clean, corrected draft,
together with a new tape, is rapidly produced with a minimum
of effort compared with what would be required without the MTST.
Depending upon which stage of production we are talking about,
this new draft is either a typescript designed for further review
or a mat for printing, if final review has been completed. We believe
that without the MTST, it would have taken about twice the num-
ber of typists twice the time to do the same job.
A final factor bearing on our success with Cloud Nine?intangible
but nonetheless critical--was the morale of the machine operators.
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A0003000111108-4
Appgtagfor Release 2005/01/26 : CIA-RDP78T03194Pegglitt0008-4
Theirs was an exacting task, and, despite the magic of the MTST,
a nerve-racking one because of the constant pressure on them to
get the thing done, and done accurately. Their performance was
splendid, their pride in their work obvious and justified. At one
point when the Task Force Chief inadvertently referred to them
as typists, he was politely but firmly told that they were machine
operators. The distinction is a valid one. The girls do have to be
trained to operate the MTST, and certain stages of their work are
somewhat akin to computer programming.
Between February 3, when Cloud Nine drafts began to pile into
Publication Support's office, and February 16, when the mats were
finished, the machine operators worked every day. The five in the
Publication Support group, alone, together with three proofreaders,
racked up a total of 378 hours of overtime. Their supervisor had to
watch them closely?a pleasurable occupation in any event?for signs
of exhaustion and falling efficiency. Occasionally he had to tell one
to pack up and go home. But he was most impressed by their energy
and drive and their devotion to duty, which clearly went beyond
any desire for overtime compensation.
Once the mats were done, the only remaining hurdles to be
surmounted were printing and assembling the answers. These tasks
were performed in Printing Services Division's plant on the seventh
floor of Headquarters Building, operating around the clock. Con-
sidering ?that the various parts of the project were delivered to
the plant piece-meal and were printed on arrival, without regard
for final order of the answers, the job of collation alone was staggering.
Small changes in the texts, moreover, were being introduced up
to the very last moment. Printing Services Division designated a
Control Officer for Cloud Nine who, in close coordination with
the Control Center in OCI, monitored the flow of mats into the
seventh floor plant and ensured that the printing schedule was main-
tained. High standards of appearance were demanded and met. And,
of course, in this as in other Agency components engaged in Cloud
Nine, regular routine work requirements had to be carried on at the
same time.
When Cloud Nine was finished and put together, it filled 7 volumes
and 1030 pages, counting inserts. The product was the result of a
team effort probably unparalleled in the Agency's history, involving
cooperation?smooth at all times?between elements of the DDP,
16
Approved For Release 2005/01/26 : CIA-RDP78T03194A00 0008-4
ApprenefflinVelease 2005/01/26 : CIA-RDP78T03194A0001k119008-4
ONE, DDI, DDRET, and DDS. The Director called it the most
extensive compilation of intelligence data and judgements ever as-
sembled in such a brief time span. It was delivered to the White
House a day before the deadline, and could actually have been
sent over two days early. But that would have been ostentatious
and might, besides, have promoted the dangerous view that Agency
deadlines can be clipped back more severely than they already are.
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A0003?Nap908-4
No Foreign Dissem
Tracking down Soviet
underground nuclear
explosions.
WINNOWING WHEAT FROM CHAFF
James R. Shea
Every year hundreds of seismic events occur in the Soviet Union
and are detected by sensors of the US Atomic Energy Detection
System (USAEDS ). Finding out which of these disturbances are
earthquakes and which are the dozen or so underground nuclear
events conducted each year by the Soviets is a major task for the
intelligence community. This has been of particular importance since
the signing of the Limited Nuclear Test Ban Treaty of 1963, which
required the Soviets to conduct all their nuclear tests underground.
Prior to the signing of the Treaty the Soviets were known to
have conducted only two underground nuclear tests, one in 1961
and one in 1962, although they may well have conducted some
additional underground nuclear events at yields below the detection
threshold. The Soviets probably did not, however, make major use
of underground testing from 1949 to 1963; after all they had well-
established atmospheric proving grounds at Semipalatinsk and Novaya
Zemlya and conducting weapon development tests in the atmosphere
was both easier, faster, and cheaper than to do them underground.
This all changed in 1963, and our interest in underground test
detection increased as a consequense.
A major factor spurring on improvements in seismic detection and
identification techniques was the possibility that a treaty banning
all nuclear testing, including that conducted underground, might
be signed between the US and the USSR. Such a treaty has been
discussed, off and on, for a number of years. An alternate proposal, to
ban all underground testing above a certain size or magnitude, has
also been discussed extensively, but no agreement has yet emerged.
Both of these approaches keep raising the question?how can you
tell if a distant seismic rumble from behind the borders of the
USSR is a natural event or a nuclear explosion, and can you be
confident enough in your identification to rely on national means
of verification rather than on-site inspection of suspect nuclear tests?
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300011)%08-4
MORI/HR
P from
pg. 19-23
AppmgiFor Release 2005/01/26 : CIA-RDP78T0.3194A0003Q0010008-4
Wheat From Chaff
When a seismic event is picked up on USAEDS sensors, it is
recorded ultimately in Washington as a seismic wiggle which is
then decoded by experts who decide, first, whether a seismic event
has in fact occurred, and second, whether receipt of the signals
by several separated seismographs enables an approximate location
of the event to be determined, much in the same fashion that
direction-finding is done to determine the source location for elec-
tromagnetic signals.
Once an event is established as Soviet in origin, various methods
are employed to determine whether it was an earthquake or an
explosion. For many events the "depth of focus" can be found (the
depth beneath the earth's surface at which the disturbance occurred),
and often this turns out to be so great that there is no question
that the event was natural, simply because no one can drill shot
emplacement holes to, e.g., depths of tens of kilometers. Other
seismic analysis tools such as "complexity" ( earthquakes normally
produce more complicated seismic records than do nuclear tests)
and "first motion" ( shock direction at the focal point is normally
outward, or compressive or an explosion and is compressive and
rarefactive in opposing quadrants for an earthquake) also help identify
some events. Shallow earthquakes put more energy into surface wave
motion than do explosions. Although deep earthquakes have about
the same surface wave motion as explosions they can be identified
by their depth as earthquakes. This method of discrimination becomes
ineffective for events of low magnitude because the seismic signal
becomes too small.
The Soviets conduct a number of tests each year at known proving
grounds, and these are the easiest of all to identify. The first Soviet
underground test was detected in 1961 in an area some 40 nautical
miles south of the normal atmospheric test area at Semipalatinsk.
Prior to this event the area in question had not been recognized as
a test site. After consideration of all the evidence, however, including
the fact that the area in which the event occurred was not a seismic
zone, was located close to a known test area, and contained sizable
mountains suitable for underground testing ( the Degelen chain),
the community concluded that this was indeed a probable underground
test site. Since then, of course, the Soviets have conducted many un-
derground tests. The total detected from 1961 to 4 July 1969 now
stands at 76. Most of these have been in the Degelen Mountains,
but a number have been at other areas within the Semipalatinsk
Aparaved For Release 2005/01/26 : CIA-RDP78T03194A00ggF0008-4
AppwrgatFmaeLsailf 2005/01/26 : CIA-RDP78T03194A000?NRE9008-4
Test Site. In general, a seismic event anywhere in the vicinity of
Semipalatinsk is presumed to be a nuclear test unless shown other-
wise. The same is also true of Novaya Zemlya, where the Soviets are
known to have conducted five underground nuclear tests, the first
in 1964. Although the Soviets used Novaya Zemlya for atmospheric
testing up to 1962, there was by no means unanimous agreement
that they had opened an underground test site when the first two
seismic events were detected there in the fall of 1964. The events
were, of course, brought under intensive intelligence scrutiny because
of the past history of Novaya Zemlya in atmospheric testing, the
relative lack of seismic activity in the area, and the presence of
sizable mountain peaks suitable for underground testing. The Soviets
confirmed for us that this was a test area by detonating there in
the fall of 1966 their largest nuclear test?about 1 megaton. A
clandestine report was also received describing rock slides from
this event and providing evidence of tunnelling by the Soviets
for emplacing their nuclear devices.
Probably the most interesting of the Soviet seismic events are
the so-called "out-of-area" tests they have conducted in the past few
years primarily for peaceful purposes. Here the assets of intelligence
were brought fully to bear on identifying what were presumed from
the start to have been probable explosions because of their oc-
currence in non-seismic areas of the Soviet Union distant from the
normal test sites. All told there have been six such events since
1965, one each near the towns of Ufa and Tyumen (slightly west
and east of the Urals, respectively), two near Karshi (just north
of the Afghanistan border), and two near Azgir at a site north
of the Caspian Sea. In some cases it took months of analysis
to establish that the events actually were nuclear explosions.
Although they were for peaceful purposes, the Soviets maintained
press silence about the events, making the job of tracking them
down much more difficult. We were aided in the case of the first
Karshi event in 1966 by Soviet articles about the great difficulties they
had had in shutting off a wild gas well in the Urtabulak deposit,
which was quite close to the location of this event. They had tried
a number of different techniques to seal off the well, but all had
failed, and it was at least conceivable that they might resort to
a nuclear explosion to stop the runaway well. The matter was thrown
into doubt when the Soviets listed this seismic event on their pub-
lished earthquake list, contrary to their previous practice. We finally
SECRET 21
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Wheat From Chaff
received good information indicating that this was indeed a Soviet
nuclear explosion to put out a runaway gas well. Because of its
proximity to this event, a seismic disturbance near Karshi in 1968
was also considered to be probably an explosion to seal off a wild
well. Other out-of-area events have generally been harder to pin down
as to identity and purpose, but information from intelligence sources
has provided a valuable supplement to that provided by the USAEDS
seismic net.
There remains the problem of the "unidentifieds," the much larger
number of events that are detected, but for which there is no ready
or probable explanation. Seismic means alone are unable to distinguish,
for example, between chemical and nuclear explosions. The Joint
Atomic Energy Intelligence Committee regularly examines small seis-
mic events that often later turn out to be Soviet high explosive
detonations (sometimes with yields as high as several kilotons) for
canal and dam construction. If the yields are large enough, tens of
kilotons or more, there is no question of their nuclear nature, but
at low or modest yields collateral evidence has to be brought to bear
to sort out the wheat from the chaff.
When all the foregoing techniques have been applied, the usual
result is that there are perhaps 20-30 seismic events per month of
magnitude 3.8 ( equivalent to a nuclear explosion yield of about 1
kiloton if fully coupled in bard rock) or greater that are not iden-
tified. We usually can in time identify the largest events. Those that
remain unidentified are for the most part rather small events. As
a result of progressive improvements in seismic detection method,
events of smaller and smaller magnitude are being detected.
This raises another question: at what point on the scale do these
small events become insignificant to us? If the Soviets are conducting
a few tests annually in the fractional to low kiloton range without
detection, is our knowledge of their nuclear progress, which has
already been severely hampered by lack of debris from their under-
ground tests, seriously reduced? The answer to this question is of
utmost importance in defining the seismic level below which under-
ground nuclear tests would not be allowed under a threshold test
ban treaty. A decision about such a definition would also be affected
by the possibility that underground shots could be "decoupled," that
is, conducted in an underground cavity in such a way that the
seismic signals from the explosion would be weakened by the time
ApprVved For Release 2005/01/26 : CIA-RDP78T03194A000W)1316008-4
AppwngtFifaeLeiw 2005/01/26 : CIA-RDP78T03194A000??181M9008-4
they reach the cavity wall. This would result in distant readings of
seismic signals suggesting a substantially smaller shot than was ac-
tually fired. Indeed, such a decoupled shot might not be detected
at all. Such a technique could permit the Soviets to experiment with
larger yields, and therefore possibly make more progress in the de-
velopment of nuclear weapons, than they would legitimately be en-
titled to under a threshold test ban treaty.
As matters stand at present, most of the unidentified events have
occurred in seismically active areas of the USSR, i.e., areas in which
earthquakes are relatively frequent. These events in seismic areas are
therefore presumed to have been earthquakes. An attempt is made
to develop collateral evidence that would indicate whether any of
these were nuclear tests, but because of limitations on intelligence
capabilities and resources, normally no firm conclusions about them
are possible. As a result, it is possible that the Soviets have "gotten
away with" some nuclear tests in seismic areas in recent years without
our knowing about it.
It is, however, fair to conclude that a combination of seismic record
analysis and intelligence analysis has been reasonably successful in
identifying seismic events occuring in the USSR, particularly those
in seismic areas. For events in seismic areas our capabilities are
less good when the yields are small, but fortunately, our concern
about missing a limited number of small yield tests is least in this
area. Any improvements in present intelligence capabilities to identify
small events in seismic areas probably will be limited and costly
to achieve.
SECRET 23
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000V1008-4
More on the theory and
practice of estimating.
ON THE ACCURACY OF NATIONAL
INTELLIGENCE ESTIMATES
Abbot E. Smith
Whenever I talk about National Intelligence Estimates to an in-
telligence training course, or to any other group, someone always
asks; How accurate have these estimates been; what is your score?
The question is perfectly legitimate but my answer is usually vague
and unconvincing. The purpose of this article is to try to explain
why the answer is so unsatisfactory, and then to explore the problem
further.
It would seem reasonable to suppose that one could get a truly
objective, statistical verdict on the accuracy of estimates. Go through
the papers, tick off the right judgments and the wrong ones, and figure
the batting average. I once thought that this could be done, and I
tried it, and it proved to be impossible. The reasons are various.
The Number of Estimates
Since National Intelligence Estimates began to be produced by
their present methods in late 1950, there have been some twelve or
fifteen hundred of them. Each of these papers, however, contains
a multitude of "estimates," that is, of statements setting forth an ex-
plicit or clearly implied judgment. Many of them also include one
or more footnotes of dissent, conveying an opinion in conflict with
the judgment in the text. I am sure that if one were to try and work
out an accuracy score covering the product of nearly twenty years
he would have to scan not less than 25,000 judgments, and prob-
ably far more. Even if one tested no more than ten or a dozen
NIE's he would find several hundred statements to be checked.
Most of these are restricted judgments, frequently appearing
in subordinate clauses, and usually introduced because they con-
tribute background to a more contentious or consequential estimate.
Most of them were probably not questioned or discussed. I would
guess that the vast preponderance of them were quite correct. And
if we assume for the moment that they could all be checked, and
that 95 percent of them did in fact turn out to be right, I still doubt
MORI/HRP
from pg.
SECRET 25 25_35
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET On Accuracy
that we would be justified in swelling with pride. Most of them
were simply too easy. Although indubitably matters of judgment, they
were not matters of difficult judgment. In short the batting average,
if it were arrived at, would be worth about as much as the batting
average of a major league team playing against a scrub outfit in
a sandlot. This is why a complete, objective, and statistical tally
would not be worth doing.
To be sure, we must not presume that because an estimative judg-
ment appears in a subordinate clause it is necessarily inconsequential.
Consider a sentence beginning: "Since the Soviet leaders will not
in the near future cease to distrust the United States . . ." If this
clause should prove wrong, not only would the rest of the sentence
be unsound but the foundations of most estimates about Soviet
policy would be undermined. Nevertheless, this is not a judgment
which anyone would score high on a list of estimative triumphs.
But suppose again ( as might well have happened) that sometime
in 1958 or so a sentence had begun: "Since no change is to be
expected in the Sino-Soviet relationship . . ." Such a clause would
certainly in hindsight rank high on a list of egregious errors, yet
it is not likely that in 1958 it would have been seriously questioned.
Common sense tells us that a box score of estimates must be
selective if it is to mean much; it must take account only of the
important judgments. In saying this, however, we have left behind
the wholly objective approach. Doubtless there are many estimates
which everyone would agree to be important, but there are many
others on which opinions would differ. The hard fact of life is that
the high-level consumer of NIE's?the only person whose opinion
really matters?is apt to judge the whole output on the basis of
two or three estimates which strike home to him. If they prove
correct, NIE's are good; if incorrect, they are bad.1
Incidentally, from a strictly professional point of view the intelligence esti-
mator would often rank his successes and failures differently from the way the
consumer would. For example, I know of several difficult estimates which proved
wrong, and wrong because they showed a failure to grasp the nature of forces
at work in a situation; these grieve me greatly, though so far as I am aware no
high-level consumer ever noticed them. And there have been some which received
high praise, but gave me little satisfaction; they were too easy, or they were merely
lucky.
26
Approved For Release 2005/01/26 : CIA-RDP78T03194A0005MIT0008-4
App 2005/01/262005/01/26 : CIA-RDP78T03194A000?NRE9008-4
The Difficulty of Checking
A great number of the judgments rendered in NIE's cannot be
checked at all as to validity; the facts are not available. This is
bound to be so; it is no reproach to intelligence collection or research.
We estimate, for example, that political leader X is in serious trouble,
but then it turns out that nothing much comes of it, and we may
never know whether he really was in trouble, or, if he was, whether
it was serious. Or we estimate that if the United States undertakes
a given course of action the response of other countries will be
such and such; but the United States never undertakes that action,
and we never know whether we were right or wrong. There are
of course a great number of "contingency" estimates, in sentences
beginning: "If such and such happens, then so and so will probably
follow." But the contingency never occurs, and the estimate can never
be objectively checked.
Often those judgments which can be checked have to be scored as
partly right and partly wrong; we would view them as "right on the
whole," or as "wrong by and large." Or again, suppose we have made
an imprudently precise estimate, as that the Soviets will at a given
time have 500 missiles of type X, and then they turn out to have 510.
Conceivably this might be an important error; more likely it would be
considered negligible. But how many more than 500 would they have
to have before the estimate should forthrightly be deemed wrong?
Estimative Formulations
The drafters of estimates are deeply conscious of two obligations:
to distinguish between statements of estimate and statements of fact,
and to convey as clearly as possible the degree of confidence with
which an estimate is delivered. On the second point Sherman Kent
has written in this periodical. His injunctions may be simplified as
follows: since the degree of confidence must usually be conveyed in
words, these words should as far as possible be uniformly used and
with full understanding of their meaning; for example:
a. Something "is possible" or "may be" true. This constitutes no judgment
of probability; it is in effect a statement merely that the thing under con-
sideration is not out of the question. But the fact that it is mentioned at all
constitutes a judgment that it is something worth bearing in mind.
b. Something is "probable" or "likely"; this means that there is about a 60
or 65 percent probability of it's occurring or being true.
Let us see how this affects the matter of scoring.
SECRET 27
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approy0 For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET On Accuracy
First, suppose that an NIE says that "it is possible" that such and
such may occur, and then it occurs. We could score this as a correct
estimate, which it was. But since a very large number of things are
"possible," was it really the kind of judgment that deserves to register
a plus for the perspicacity of the estimators? Perhaps it was, and
perhaps it wasn't; that will depend on what we were talking about.
Now suppose that the NIE says that something will "probably"
occur, and it does not. The estimate was strictly not 100 percent
wrong, for it only gave the event about a 60 percent chance of occur-
ring; perhaps it should be scored as 60 percent wrong. But pause a
moment, and suppose that somehow we come to realize that there
never had been any appreciable chance of the event occurring; then
the estimate was really about 100 percent wrong. Or suppose that we
come to know that there was indeed a 60 percent chance of its occur-
ring but that something happened?perhaps even an act of US
policy taken as a consequence of the NIE?which prevented it from
occurring; then the estimate was 100 percent right?or was it?
It ought to be observed that while the subtleties of the preceding
paragraph complicate the problem of making an objective and sta-
tistical study of the validity of NIE's they are of no consequence in real
life. The high-level consumer pays little heed to qualifications. If he
is interested in a judgment that something "probably" will happen,
and if it turns out not to happen, he denounces the estimate as 100
percent wrong, period. The saddest example of this was seen in the
ill-starred estimate of 19 September 1962, issued as the Cuban missile
crisis approached. That paper discussed at some length the possibility
that the Soviets would put "offensive" surface-to-surface missiles in
Cuba. Nowhere does the estimate declare even that the Soviets would
"probably" not do so; the presentation was obviously labored, difficult,
and inconclusive. Yet the late Senator Robert Kennedy, after the dust
had cleared away, wrote as follows in his book, Thirteen Days:
"No one had expected or anticipated that the Russians would deploy surface-
to-surface ballistic missiles in Cuba.
"No official within the government had ever suggested to President Kennedy
that the Russian build-up in Cuba would include strategic missiles. . .
"The last estimate before our meeting of the 16th of October was dated
the 19th of September, and it advised the President that without reservation
the U.S. Intelligence Board, after consideration and examination, had con-
cluded that the Soviet Union would not make Cuba a strategic base. . ."
This brings me to the next point.
AppNved For Release 2005/01/26 : CIA-RDP78T03194A00CSODBEID008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A00W141e008-4
On Accuracy
The Discrete Statement and the Context
Neither Senator Kennedy nor the many others who condemned
that NIE on Soviet missiles in Cuba were altogether wrong in doing
so. The text of that paper was labored and inexplicit. I think that a
reader might well have understood that it showed the intelligence
community to be beset by the gravest doubts and concerns. Never-
theless it conveyed an unmistakeable impression that the Soviets
would probably not do what they did. One may well say that in draft-
ing those passages we ought to have followed Sherman Kent's edicts
and come out with a clear-cut statement that the act was improbable;
as it turned out we might as well have been killed for a sheep as a
lamb. But it was the weight and impact of the context that carried
the judgment, rather than any explicit statement. What the estimators
probably wanted to convey was something like this: "We really think
it unlikely that the Soviets will do this thing, because it would be out
of accord with their conduct of affairs in the past, and probably turn
out to be disastrous for them; nevertheless, with the evidence as it is,
and bearing in mind the gravity of the matter, we think that the risk
of their doing it is so great that the US Government should provide
for the contingency that it may happen." My concern at the moment
is with the question: Supposing that the estimate had in fact said
these words or their equivalent, how would its validity have been
objectively scored? Still, I suppose, as wrong.
Most NIE's are not so dramatic in their implications, yet a great
many convey their message by the context, or rather by the total text.
They are something more than collections of discrete statements.
Many address questions such as these: what is the situation and what
the prospects in country X; what is the trend of Soviet military policy;
what is the nature and dimension of revolutionary potential in Latin
America; and so on. The validity of such papers depends only partly
upon the accuracy of each particular statement in them. It must also
be judged by the impact and tone of the document as a whole--the
choice of facts which are cited, the distribution of emphasis, the
cogency of argument, even the literary quality. I think that such a
paper could be basically correct even though it had a great many
statements which proved incorrect, and basically wrong even though
many statements were accurate.
Sophisticated estimating indeed ought almost always to be some-
thing more than bald prediction. The course of events is seldom
AppAccMor Release 2005/01/26 : CIA-RDP78T03194A000300021%008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET On Accuracy
inevitable or foreordained, even though hindsight often makes it look
that way. A good paper on a complicated subject should describe the
trends and forces at work, identify the contingent factors or variables
which might affect developments, and present a few alternative pos-
sibilities for the future, usually with some judgment as to the relative
likelihood of one or another outcome. Occasionally such a paper can
afterwards be deemed precisely "accurate"; more often it will be
difficult to arrive at a verdict in any fashion which can in the strictest
sense be called objective. It may be a very long time indeed before
we "know" the causes and background of great events. We still get
a new analysis, every year or so, of the forces that led to the American
Revolution; how soon shall we arrive at objective truth about the
forces currently at work in Southeast Asia?
What it comes to is this: a complete, objective, statistical audit of
the validity of NIE's is impossible, and even if it were possible it
would provide no just verdict on how "good" these papers have been.
Like the Bible, the corpus of estimates is voluminous and uneven in
quality, and almost any proposition can be defended by citations from
it. Obviously, if we are to make estimates at all we shall sometimes
make wrong ones. An assiduous and hostile critic could certainly make
up an extensive list of errors, some of which would be grievous. And
a friendly compiler could counter with a massive collection of correct
judgments. I usually say to the training course that, being knowledge-
able about the contents of NIE's, I believe that on the whole they have
been "good." But it may well be thought that mine is a biased verdict,
and moreover that since I am a maker and not a consumer of esti-
mates my opinion does not matter anyway.
Seldom if ever does a consumer of consequence pronounce on the
virtue of NIE's as a whole, though comments on particular papers or
particular judgments have been frequent. The more emphatic of these
comments are almost always adverse, since attention seems more
likely to be gripped by an important estimate that has gone sour
than by one that has turned out right. This is natural enough; it
distresses but does not astonish the estimator. Once in a while, how-
ever, the temptation to some sort of rejoinder is almost irresistible,
and in the following section I indulge myself.
On 1 August 1969, Senator Thomas J. Dodd delivered a speech in
the Senate during the debate on the Safeguard program. A part of this
Appraed For Release 2005/01/26 : CIA-RDP78T03194A00031E0tRIM08-4
AprEfAv5Wctpaplease 2005/01/26 : CIA-RDP78T03194A0OIStaalr0008-4
speech was devoted to the achievements, or non-achievements, of US
intelligence, and the theme was essentially in the following sentence:
The American intelligence community, although it has performed well in
certain situations, has not been impressive when estimating the intentions and
plans of our adversaries.
The Senator went on to support this contention by a list of specifics,
beginning with the failure to warn of the North Korean Communist
attack on South Korea, the subsequent intervention of the Chinese
Communists, and the earlier Soviet initial explosion of the A-bomb.
Leaving these aside ( because they occurred prior to the existence of
the present machinery for coordinating National Intelligence Esti-
mates) let us examine some of the others.
a. The intelligence community "failed to predict . . . accurately
the Soviet H-bomb."
Our performance in this respect represents in fact one of those
many instances where we were either good or bad, depending
on the way one looks at it. We did fail to predict it "accurately."
Yet an estimate in March 1953 said that field testing of a
thermonuclear device was possible by mid-1955, and further
that it would be unsafe to assume that the Soviets would not
have a workable thermonuclear weapon by mid-1955. On 18
August 1953, another NIE said that field testing might occur
at any time. Soon afterward it was confirmed by analysis that
the first test had in fact taken place on 12 August.
b. "In 1956 [the intelligence community] failed to alert us to the
Soviet invasion of Hungary . . . And, despite warning signs
which many of our lay experts took seriously [it] was also dis-
posed to discount the possibility that the Red Army would invade
Czechoslovakia to depose the Dubcek regime."
It is true that neither the invasion of Hungary in 1956 nor that
of Czechoslovakia in 1968 were forecast in National Intelli-
gence Estimates, which represent the consensus of the intelli-
gence community; in fact no such coordinated papers were
prepared on these situations in the months immediately pre-
ceding the invasions. In both cases, however, and especially
that of Czechoslovakia, various estimative memoranda and
current intelligence publications reported the state of high ten-
sion and the Soviet military build-up. Without saying that
invasions were likely, these papers emphasized that they were
SECRET 31
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Apprsmifior Release 2005/01/26 : CIA-RDP78T03194&000300010008-4
un Accuracy
possible, and were surely under consideration by the Soviet
leadership. The US Government was made aware that the
invasions might occur, though it was not assured that they
would occur.
C. "In the period immediately before the Cuban missile crisis,
the advance consensus of the intelligence professionals was that
the Soviets would not tempt the fates by deploying nuclear mis-
siles in Cuba."
I have discussed this above, concluding that despite various
qualifications that might be made, the Senator's verdict is
essentially correct. With respect to the performance of the in-
telligence community, however, an additional quotation from
Senator Kennedy's book is appropriate: "The important fact,
of course, is that the missiles were uncovered and the informa-
tion was made available to the government and the people
before missiles became operative and in time for the US to act."
d. "In 1957, the intelligence community was completely without
advance information on the Soviet Sputnik."
Strictly construed, the Senator's words seem to condemn the re-
sults of collection rather than of estimates, and in this sense
they may be correct. Nevertheless, in December 1955 an NIE
said that the Soviets could put an earth satellite into orbit by
1958, and in March 1957 another NIE estimated that they could
do so by the end of the year. They did, in October. We have
always considered this a praise-worthy example of good esti-
mating on the basis of very scanty informatoin.
e. "[After 19571 our intelligence community lapsed into one of its
very rare periods of overstatement when it advised the Eisenhower
administration that there was a massive missile gap between the
Soviet Union and ourselves. Today it has been documented that
the so-called missile gap was a Soviet-engineered hoax, and that
our intelligence community fell for phony information put out by
Khrushchev for the purpose of intimidating us."
We certainly overestimated the number of Soviet ICBM's which
would be operational around 1961. But we certainly did not
fall for a phony plant by Khrushchev. There was virtually no
hard information available, beyond the fact that the Soviets
32 LECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A0OuJuutn0008-4
Apprgypytagfcli,lease 2005/01/26 : CIA-RDP78T03194A00034ECORE0'008-4
had successfully tested an ICBM in 1957. The principal basis
for the overestimate was probably the opinion of the best US
missile experts in those early days as to the number of ICBM's
that could be manufactured in a given period of time, granting
a previous successful test. Nevertheless, the estimates were
wrong.
f. "In more recent years, conversely, . . . estimates of Soviet in-
tentions regarding the size of Soviet ICBM forces have turned
out to be woefully conservative."
A just criticism, despite a few defenses that could be put up.
These exhaust the Senator's list of specifics. Consider now some
further general observations which he made: the following quotation
combines three passages which were separate in his speech:
"When it comes to estimates of Soviet intentions, however, there is admittedly
a lot of guesswork involved. . . I think it pertinent to point out in this con-
nection that our intelligence community has erred far more frequently on the
conservative side than otherwise in their estimates of Soviet capabilities and
intentions. . . over and over again, the Soviet performance in the field of
armaments has either surprised us completely or substantially surpassed our
estimates."
As I have tried to show in preceding parts of this article, it would
be idle to attempt to prove or disprove these statements by objective
and statistical analysis. With respect to numbers of Soviet weapons,
one could easily make up a list of projections which were too low,
another of those which were too high, another of those which were
substantially correct, and a final one?very short?of those which,
thanks more to luck than wisdom, were precisely correct. The projec-
tion of numbers, however, is the most precarious of all estimative
exercises; there is indeed "a lot of guesswork involved," especially as
one looks beyond the two or three years subsequent to the date when
the estimate is written.
Suppose we try one test, however, using the somewhat non-objective
criterion of "importance." Probably all would agree that it is im-
portant to forecast with reasonable accuracy the appearance of new
Soviet weapons systems, and to do so well ahead of their initial opera-
tional dates. Probably most would agree further that the weapons
systems mentioned in the following list were the most important to
SECRET 33
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Appgtegor Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
On Accuracy
forecast, though others might certainly be added. Here is the record
of NIE's in this matter:
a. In 1950 (the first year of National Intelligence Estimates in present
form), jet medium bombers were forecast for the Soviet forces in 1952; they
appeared in 1954.
b. In 1951, thanks to the appearance of a single aircraft identified as a
heavy bomber ( the so-called Type 31, never thereafter seen) heavy bombers
were thenceforth estimated to be brought into Soviet forces; they were in
1954.
c. In October 1953, an NIE said that a Soviet surface-to-air missile of
native design could be developed by 1955; the first SA-1 missiles (based
on a German design) became operational around Moscow in 1953; all sites
were operational by 1956. The first SA-2 battalion became operational in
1958 or early 1959.
d. In October 1954, an NIE said that the Soviets could have an ICBM
ready for series production about 1963, or at the earliest possible date in
1960; the SS-6 became operational in 1960.
e. In 1957, an NIE said that the Soviets could not have an ABM by 1962.
In 1959 the estimate was that the Soviets were pushing hard on the prob-
lem and could have a first operational capability with an ABM in the period
1963-1966; the Moscow ABM system began to be operational in 1968.
f. In 1965, an NIE said that the Soviets would probably produce a new
class of ballistic missile submarine, that it would almost certainly be nuclear
powered, and that it would carry perhaps 6-12 missiles of an improved type.
That NIE also judged that a new missile with about 1,000 n.m. range would
come into service in 1967-1968. These estimates were made purely on the
basis of Soviet requirements; there was no hard evidence of such develop-
ments at the time. In 1966 we saw the first unit of the new Y-class submarine
having 16 launch tubes, and the Soviets began testing a new missile with
an estimated range of 1,300 n.m.; this system?submarine and missile?be-
came operational in 1968.
g. In 1965, an NIE said that the Soviets could probably attain an opera-
tional capability with a multiple independently guided re-entry vehicle
( MIRV) in the period 1970-1975.
I think it true to say that in the past fifteen or twenty years no im-
portant new Soviet weapons system has appeared which had not been
heralded in advance in National Intelligence Estimates. The initial
operational dates have often been wrong, but as the above citations
indicate they have usually been wrong because they have set the date
too early; they have not "erred far more frequently on the conserva-
tive side than otherwise."
34
Approved For Release 2005/01/26 : CIA-RDP78T03194AOOME0008-4
ApprtgmeAcEeiratflease 2005/01/26 : CIA-RDP78T03194A000?peW008-4
To attack Senator Dodd's contentions is not to prove anything con-
clusively about the validity of National Intelligence Estimates as a
whole. There are a good many people within the intelligence com-
munity ( and probably outside as well) who feel that the net impact
of NIE's over the years has been to over- rather than under-estimate
Soviet military capabilities and intentions. If one of these persons were
to draw up a documented indictment, it could probably be countered
in the same fashion that I have tried to counter Senator Dodd's
charges; and still nothing would be finally demonstrated. The esti-
mator himself finds it useful to look into his record, not merely for
the satisfaction or chagrin he may derive from the exercise, but because
it may help him improve his performance in time to come. But the
man whose opinion counts most?the "high-level policy-maker"?
will never get his evaluation of NIE's from an exhaustive study of
them. He will have no more than a vague impression?an impression,
however, which will suddenly and emphatically crystallize whenever
an estimate crucial to his immediate concern proves wrong. Once his
view is thus formed it may take a long time to change.
SECRET q?
Approvecf For Release 2005/01/26 : CIA-RDP78T03194A00030001008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A0004Rep08-4
No Foreign IDissem
The rudiments of an ancient
craft ever new.
NON-ELECTRONIC AGENT COMMUNICATIONS
Gabriel M. D'Echauffour
Consider the following situations, all of which are possible. As a
matter of fact, all of them have actually occurred in the not too distant
past, and all may occur again at rather surprising places and times:
Situation: Outbreak of hostilities, closing of stations, evacuation of
station personnel, loss of contact with station assets.
Situation: Defector walks into station and requests asylum. Defector
agrees to return home for a specified sum of money. He ap-
pears legitimate and valuable, but his value would be
greater if he were in place.
Situation: Agent is recruited in country X, is transiting country Y on
the way home to the denied area. Station Y directed to meet
agent, provide certain clandestine training, and send agent
on his way.
Situation: Agent working for us in friendly area, in rather relaxed en-
vironment which permits face-to-face meetings with the
case officer. One day the agent finds that he is being trans-
ferred to a hostile area where face-to-face meetings will no
longer be possible.
Situation: Station recruits agent who is member of the local Com-
munist party. Agent's position precludes contact locally
without jeopardizing agent's position.
Situation: Local asset has friend or relative in denied area who he
feels is amenable to recruitment. Asset sent as legal traveler
into area to attempt recruitment.
Situation: Agent traveling for short vacation trip into a denied target
area.
Situation: Station asset, member of local Communist labor union, going
to Bloc country to attend Communist-sponsored labor
conference.
MORI/HRP
SECRET 37 from pg.
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-437-47
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Secret Writing
The above situations all have one thing in common: a means of
agent communications is needed. Secure communication is a vital fac-
tor in any clandestine operation, whether it be face-to-face or other-
wise.
In the above situations, one solution is to have recourse to non-
electronic agent communications techniques, also called chemical com-
munications, or in the slang of technical tradecraft, secret writing (SW).
The purpose of this article is to describe briefly the various methods
available and to outline considerations affecting their application. Our
object is to provide some guidance to those who may at some time be
confronted with the subject of SW, whether it be from a positive
collection viewpoint, counterintelligence, or in some other connection.
Note-Taking Devices
The first type of SW device we will consider?note-taking employ-
ing direct writing implements?has restricted, but very useful appli-
cation. Such implements consist generally of a chemical substance in
the form of a piece of ordinary pencil lead, or other various camou-
flaged hardware items containing secret ink, which may be used to
apply secret writing directly to paper materials. Since the devices are
used to write directly on paper, there is inevitably some disturbance of
the fibers of the paper. In some countries methods are known for de-
tecting such disturbances, and therefore direct writing is normally not
employed for correspondence transiting international borders through
mail channels in which effective chemical censorship may be encoun-
tered.
Even with this restriction, however, the direct writing technique
has many uses. It may be used for dead-dropped notes, or for notes
to be carried by case officers traveling internationally or in a difficult
operational area. This method has been used very successfully by
agents and cut-outs, who may carry the writing on newspapers,
magazines, and the like through border points, thus avoiding routine
chemical censorship, for passage to the case officer in the form of a
direct report, or in the form of debriefing notes containing data
which one would not trust to memory. The devices have been used
successfully by ships' crewmen, train conductors, aircrew members,
and legal travelers. Use of these devices might be considered in
preparing correspondence to be left in dead-drops as a precaution
against accidental discovery, perhaps by a child at play, or by the
AppPaved For Release 2005/01/26 : CIA-RDP78T03194A006N110008-4
Apprveff.lepirNsase 2005/01/26 : CIA-RDP78T03194A0003sTegy08-4
passer-by who kicks over a can and finds the drop. The technique may
perhaps also be considered for use by agents or case officers carrying
written material to forestall the possibility that severe illness, acci-
dental death, or some other untoward event might bring incriminating
written materials in their possession to the attention of local authori-
ties. In rare cases, the devices have been used within internal mail
channels where the chemical censorship is generally less effective
than in international mail channels, but in general this is not advisable.
The time required for training in the use of these devices usually is
from one to two hours, but as with other techniques the time varies
in direct proportion to the abilities of the agent.
Microdots
A more intricate method of SW, and one of the most fascinating to
amateurs as well as to students of tradecraft, is the microdot, a photo-
graphic reproduction of textual material reduced to one by two milli-
meters or less. This method is well-known to most of the sophisticated
intelligence services and continues to be widely and securely used.
Although microdots can be used both as an agent sending and a
receiving technique, they are primarily used in the latter application
due to the complexity of preparation.
In general, it takes almost the same time to train an agent to
receive microdots as it does to instruct him in the use of direct writ-
ing devices, but about two to four hours should be allowed. In ad-
dition, the media selected for carrying dots should be appropriate,
such as an envelope, a postcard, or some other plausible object. Most
important, however, the agent needs either natural access to a micro-
scope of approximately 100 power magnification or must be furnished
a microscope or other readout device. Scientists and doctors can easily
receive mocrodots since they usually have a microscrope and are well
versed in its use. Possession of such equipment is not so unusual,
however, that other individuals cannot plausibly have it.
The security of microdots obviously lies in the difficulty of de-
tecting them. ( Try spreading an ounce of black pepper on the floor
and finding a dot mixed into it.) This is not to imply, however, that
a microdot in a postcard or letter could not be found if the censors
were sufficiently interested in the particular item suspected of con-
taining one. This consideration is discussed at greater length below.
ApprZeSin Release 2005/01/26 : CIA-RDP78T03194A0003000113808-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Secret Writing
It is also practical to have agents "send" microdots. The difficulties
involved, however, are somewhat greater than in receiving, as the
agent must have some photographic dexterity, photographic equip-
ment, either normal or specially provided equipment, and some
degree of privacy. In addition, considerably more training time is
required. The Soviets frequently train their staff agents to send as
well as receive microdots, but after they are in place they usually
only receive. In the nature of the technique, microdots are not
generally appropriate for mass transmission of intelligence informa-
tion. Individual burying of each dot is required, and their use in
quantity would tax the agent's eyes as well as his nerves.
For ease of readout, a dot usually contains several hundred words or
less. Usually only one or two dots are sent at a time. As indicated
above, they are not pasted on the surface of the carrier but imbedded
within it to reduce the possibility of detection and avoid risk of de-
tachment in the course of normal handling.
Examination for the presence of microdots generally consists of
holding the suspect item in front of a strong light to look for small
dark objects buried within it. Since well-hidden dots cannot be
detected in this way, other tests may often be necessary.
Latent Image
Another photographic technique employed in clandestine commu-
nications uses a latent (invisible) photographic image, e.g., of a
secret message or picture, which is processed into a photographic
print such as a snapshot and rendered insensitive to light, but remains
recoverable by the agent by means of a photographic chemical
process. The process is well known to photographers and has been
described in open literature. Its security lies in careful calculation
of where and how it is to be used. It may be employed in agent
sending or receiving channels, but like the microdot, is more readily
used for the latter. Any agent who can normally receive photographs
in mail could be considered for this technique.
Liquid Ink Secret Writing
Historically, invisible inks have been used in secret writing since
antiquity. References to this can be found in ancient Greek and Roman
literature as far back as 230 B.C. The principle is relatively simple:
a chemical is dissolved into a quantity of solvent, usually water, to
Applaved For Release 2005/01/26 : CIA-RDP78T03194A00813088T0008-4
Apprgogi,Fffrgaease 2005/01/26 : CIA-RDP78T03194A000neM008-4
provide a colorless, or nearly colorless, liquid ink which is used to
write invisible messages with a stick or quill pen. Development is
usually by application of a different chemical which reacts with ?the
dried ink to produce a visible color which may then be read. There
are, of course, many different chemical combinations which behave
in this manner. Liquid secret writing is primarily restricted to agent
receiving, and the preparation of messages is by the technical staff.
One consideration in the choice of which of the many liquid SW
systems to use is the relative ease of recovery of the message by
the agent. The ease of recovery of the systems that may be selected
will vary considerably, and the choice will depend in part upon
how much privacy the agent has.
Carbon Writing
Although liquid inks still find operational application, they have
in recent years given way to carbon writing techniques. Apart from
the gains in chemical security which many, but not all, carbon systems
offer over liquid inks, there is a substantial gain in simplicity since
it is inherently easier for an agent to use a carbon. Liquid writing
is much more time-consuming in all respects, particularly in training
time and in the preparation of messages. With liquid secret inks,
it becomes difficult to maintain continuity in writing the message as
the ink dries, and what has previously been written disappears.
An SW carbon is essentially a piece of paper of normal appearance
which has been impregnated with small quantities of secret writing
chemical. When used in a manner similar to a black office carbon,
small quantities of the SW chemical transfer to another sheet, form-
ing a secret message. The many carbon systems differ chemically.
Messages prepared from some are easily developed, while others
require complicated and time-consuming treatment. For some, indeed,
a laboratory is needed. Each SW carbon may normally be used for
as many as fifty messages, and may be mounted in a pad of ordinary
writing paper for concealment. Training time required for carbon
writing is normally four to six hours.
The carbon technique is normally used by the agent to write to
his case officer, and most of the sophisticated intelligence services
have a good many systems of the kind. In this field, as in others
in the SW business, there is stiff competition to produce ever new
systems defying detection by hostile services. This involves a con-
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A00030004i8008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Secret Writing
tinning quest for new and more secure chemical combinations as
older methods become compromised. The object, of course, is to
stay ahead of the research of the opposition, and to outwit its
chemical censors.
Agent Training
As we have noted, the training time required for introduction of
SW techniques varies, depending on the aptitude of the agent, and
the nature of the techniques he is being taught. In many operations,
the time available for training is limited. It will be evident, however,
that training should not be slighted. Obviously, SW ought to be
taught to an agent in advance of his actual need to use it in an
operational situation. Time should be allowed not only for practice,
but for corrective re-training or instruction in an entirely new tech-
nique. Most SW methods appear relatively simple, but lacking
adequate training, the agent may make mistakes resulting in illegible
development of the SW, or at worst jeopardizing his personal security,
that of the SW system, and of the operation as a whole.
Since agent communications are a critical link in most operations,
pre-planning and introduction of techniques?including training and
establishing of practice channels?are certainly in order. It is rec-
ommended that an SW specialist be consulted at an early stage
in the planning and that the training be conducted by the specialist.
Prior planning in most cases will offer the opportunity for tailoring
the SW techniques to the case situation. Adequate training can help
avoid events such as the recent one in which the agent mistook
blank paper for his carbons and wrote twelve blank SW "messages"
over a year's time. Needless to say, this proceeding generated much
concern among his correspondents not to speak of the paper work.
Censorship and Operational Security
No discussion of SW would be complete without a consideration
of the security environment in which it is to be employed. In the
most general sense, this involves the matter of censorship. By defini-
tion, censorship means to withhold information or materials, which
are judged to be morally, politically, or otherwise inappropriate
or undesirable. With respect to programs designed to uncover secret
writing channels, one should use the term technical ( or chemical)
censorship, or even more appropriately "interception for technical
Appraed For Release 2005/01/26 : CIA-RDP78T03194A000??56g008-4
ApprfiofiltWrigglease 2005/01/26 : CIA-RDP78T03194A000gpectiq008-4
examination," since the process usually involves extraction of the sus-
pect item for physical examination, and its re-introduction into the
normal channel.
A large number of countries exercise censorship in varying degrees
in an effort to control the flow of written information, to provide in-
telligence leads, or in some areas, to control anti-regime activities
and the criminal element. To these ends some of these countries,
but not all, have developed technical facilities of varying effectiveness
for searching out and resolving secret writing. Most technically ad-
vanced countries have some capability in these respects.
Thus, the use of SW in an operation is predicated on one or all
of the following: a) to make the transmittal of information secure
against accidental discovery because of misrouting or accidental loss
by the carrier of the message; b) to protect intelligence against
discovery during mass, random, or selective opening of mail by
authorities or others who are only concerned with reading the 'visible
text; or c) to maintain security against efforts directed at uncovering
secret writing.
The security of an SW operation depends upon a number of factors:
a) the proper use of the SW materials which is related to training
time and quality; b) the technical ( or chemical) security of the
secret writing method employed; which is in turn related to c)
the technical capability of the opposition in the areas where the SW
is being employed. A method providing total security in Borneo
may not be secure in Russia. Equally important for security are the
non-technical operational circumstances, such as the agent's physical
security, how he posts his SW, and the consistency with which all
other non-SW security practices are observed to avoid attracting at-
tention to the operation, and to avoid stimulating a specific exami-
nation of the agent's mail, even though such examination should prove
fruitless.
In planning an SW operation, all these angles must be considered.
Generally, under-developed countries do not have a capability for
detecting SW, although they may be opening mail. Also, a liaison
service from a technically sophisticated country will not generally
provide a "friendly" country with its most effective methods for
detecting secret writing, because defensive chemical techniques are
inherently related directly to knowledge of offensive techniques. Thus,
SECRET
Approvea i-or Release 2005/01/26 : CIA-RDP78T03194A00030001008-4
Apprgye.dfor Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
ECKET Secret Writing
the service that detects and analyzes a system will logically incorporate
it into its battery of counterintelligence techniques.
Upon occasion, when routine mass opening of mail is taking place,
the examiners may be told to look for evidence of SW, such as writ-
ing impressions, or for letters which make no sense or appear other-
wise suspicious. Letters selected may then be passed to a technical
laboratory for chemical examination. Success will then depend upon
the relative security of the SW method employed and the capabili-
ties of the laboratory. Some countries, such as China, for example,
with its large manpower reserve, can afford to open and scan large
quantities of mail. None, however, can afford the manpower to look
for technically sophisticated secret writing on more than a fraction
of a percent of the total volume.
The risks in using SW can thus be minimized if the choice of
technique is properly made. The selection of a secret writing system
for a particular case depends upon the reliability of the agent, his
area of operation, the training time available, the privacy of the
agent, and the channels involved.
As noted above, the chemical security of SW systems and tech-
niques varies. Obviously the most secure and complicated system
cannot be given to every case, nor is it needed in every case. To
do so would insure that it would be quickly picked up in any
double-agent operations, or by other means, and would become
known to the opposition. The loss of a particular SW system in
one application, however, does not necessarily mean that it cannot
continue to be used in some other area. Indeed, depending on the
circumstances, it may even continue to be used in the same area.
Operational Considerations
SW should not normally be used except when an agent must have
clandestine means to communicate or when caution dictates provision
for contingencies. On the other hand, there have been instances where
SW was introduced to an agent merely to improve his reporting by
forcing him to be more concise. There have also been instances in
which SW was introduced to impress the agent with the profes-
sionalism of the organization. The writer handled a case in which
the agent was introduced to SW purely as a means of shocking him
into the realization that he was indeed involved in clandestine ac-
tivities. This helped induce him to take more seriously other opera-
Appriked For Release 2005/01/26 : CIA-RDP78T03194A000-M8kb008-4
Apprf4981tFoorr1Dlease 2005/01/26 : CIA-RDP78T03194A000nelin008-4
tional matters, such as surveillance and solicitation of information.
The Soviets apparently prepare their staff agents in SW communica-
tions as a matter of routine. SW does make demands on the time
of the case officer and agent and in some instances, introduces some
added risks to the operation. These can and should be minimized,
however, by careful training, planning, and selection of techniques
to be used.
The main questions to be answered when planning and selecting
SW systems can now be summarized. What countries of operation
are involved, that is, what are the SW channels? What is known
about the censorship and SW capabilities of the countries involved?
What is known about the importance of the agent in terms of access?
How reliable is the agent? Where will the SW message from and
to the agent be processed, and by whom? How much privacy will
the agent have? What is his profession? Who will train him? What
can he legitimately or plausibly have in his possession? What can
he carry across the border? In his position, would it appear logical
for him to send and receive mail? Is an accommodation address
available for the agent to write to? What languages will be used?
Normally the agent who writes SW messages should not reveal
his true identity in the visible part of the letter. In some cases
where the text of the secret writing may pinpoint the agent and
where it is feared local censorship can detect and develop SW,
it may be desirable to encypher the SW text. Generally, however,
the large volumes of mail being sent offers such a formidable task
to censors that only select suspect letters can be given thorough exami-
nation. Thus, the sheer volume of mail provides a great deal of
safety, and if proper attention is given to other security considerations
the agent's mail normally will never be suspected of carrying secret
messages. In areas where more stringent technical censorship is
expected, more secure techniques would need to be considered.
Accommodation addresses, which serve as the receiving point for
the agent's SW to his case officer, must be carefully chosen and
should as far as possible appear to be legitimate normal mail
channels. Generally, a letter to a country considered neutral or
friendly from the viewpoint of the country of origin is less suspect
than one to an unfriendly area. SW to the agent may directly iden-
tify him if intercepted and developed or otherwise detected. There-
fore, it is advisable to minimize the volume of SW messages sent
SECREJ
Approvea i-or Release 2005/01/26 : CIA-RDP78T03194A0003000116008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Secret Writing
to the agent, and desirable when possible to mail SW to the agent
internally in the country, thus circumventing international censorship.
It may be desirable where possible to have the agent write with SW,
but receive by encyphered radio broadcasts, with SW receiving only
as an emergency back-up technique.
Contingency Planning
Past experience has proven the value of establishing SW "stay
behind" capabilities in areas where direct contact with the agent may
be lost. This situation has arisen many times in the past. Equally
important is provision for the possibility that an agent may sud-
denly be transferred to an area where personal contact is precluded.
This also happens frequently. In many such instances, adequate
preparation for the use of SW may not be possible, especially
preparation through practice. Therefore, whenever SW may be a
possibility, steps should be taken to have the agent trained at the
earliest opportunity.
The writer has encountered a number of cases where SW was not
given to an agent because it was thought that the agent would
continue to be able to "travel out" frequently for personal meetings,
or that the agent was only going away for a "short period of time"
or that the agent's "present access doesn't warrant SW reporting."
Subsequently it developed that the agent could no longer travel
out, or found himself cut off for several years from personal con-
tact, or his access suddenly became valuable. Sometimes the con-
sequences of such changes may subsequently be corrected by train-
ing the agent through a third party or by having written instructions
dead-dropped to him. These are inevitably poor substitutes for pre-
planning. Case officers often tend to regard techniques such as carbon
writing as too simple to warrant the expenditure of time for training
and practice sessions. There are, however, many case officers who
have lived to rue this oversight, having experienced the frustration of
agents who cleverly have made technical innovations on their own
or, more commonly, have failed to remember technique, such as the
agent who wrote his message with his carbon and mailed the carbon
to his case officer. There have been successful SW cases after an
absolute minimum of training, or even training by written instruction,
but these are exceptional. In SW it is best to play it safe.
App&ed For Release 2005/01/26 : CIA-RDP78T03194A000?666k6008-4
Appgigg WriAtease 2005/01/26 : CIA-RDP78T03194A000?RH9008-4
In the dynamic scene of clandestine operations, technical tradecraft
in general will continue to expand and develop. Certainly secret
writing continues to evolve and to play its role in operational ac-
tivities, growing ever more complex, or as simple, as the situation
demands. The purpose of this article has been to enlighten and to
establish guidelines and a philosophy for non-technical personnel
who may be confronted at some time with situations?such as were
sketched at the outset of this paper?in which SW is the best
available solution.
SECRET 47
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03149ARCR80(1008-4
Some guidelines for
secret agents.
DEFENSE AGAINST COMMUNIST
INTERROGATION ORGANIZATIONS
Michael L. Mineur
The suggestions offered herein for practical defense against Com-
munist interrogation organizations are designed to be used very selec-
tively and with caution in the briefing of anti-Communist secret
agents running the danger of Communist imprisonment'. Because some
of the tactics outlined could be of use to other categories of persons,
such as prisoners of war, political prisoners, and noncombatants, this
study is offered with the reservation that it is not to be construed
either as a modification of official US Government doctrine or an
exhaustive treatment of the Communist system of prisoner manage-
ment and exploitation.
The Importance and Techniques of Preparation
Most of the available guidance on this subject is too much con-
cerned with the tactics of the conflict between the prisoner and
his interrogator after arrest, and not enough with the preparations
that the endangered agent can and should make in advance. His
preparations are very often decisive in determining the outcome of his
resistance effort. The agent must be prepared physically, organiza-
tionally, and mentally.
Among the most important physical preparations is to separate one-
self as far as possible from incriminating materials such as commo
plans, one-time pads, radios, secret inks, weapons, special cameras,
documents, and money in bulk. Linkage to incriminating persons must
be adequately covered, and all the standard procedures of operational
security and conspiratorial discipline must be understood and main-
tained. Plans for emergencies must be worked out in advance and
rehearsed. These plans should be set up for use under unfavorable
conditions, when one is under surveillance or suspicion.
Organizationally speaking, the agent should have made all possible
arrangements for the support and safety, rescue or warning of his
Briefers should bear in mind that some agents, getting the full briefing, might
decamp rather than take the risks.
MORI/HRP
from pg.
CONFIDENTIAL 49 49-74
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Appreoearmiftese 2005/01/26 : CIA-RDP78T03194A000300Q10008-4
Interrogation
family and others dependent upon him. He should have set up some
system whereby his sponsors will learn of his arrest?if it occurs?
at an early date, so that they can begin to help him. He should have
arranged a simple code for concealing information in any letters or
messages he might be able to send to his family, if the family is
witting of his secret activities or affiliations.
This is a grim subject, and part of the mental preparation?a most
important part?consists in accepting and living with these possibili-
ties. An agent conditioned to face them honestly is likely to be far
more capable and careful than the chance-taker who hopes somehow
to get by without self-discipline and without the intensive prepara-
tion that is the only way to success in any clandestine operation.
The agent should have studied the security service and interroga-
tion systems operating in his area and should have prepared himself
against surprise. The agent must prepare and thoroughly rehearse
his cover story and his fall-back cover story for his status, action, and
associations, and backstop them as far as possible. He will usually be
able to get help with this work from his sponsors. There is an inward,
or psychological aspect of imprisonment for which the prisoner must
be fortified. Prisoners with a high ideological motivation are able to
defend themselves and to continue to struggle against the opposition
longer than others, even under conditions of extreme hardship. Per-
sons who have strong religious beliefs are able to resist much more
effectively than those with a weak faith or none. A person under-
taking the dangerous work of the secret agent should in any case
develop an ideological basis. If not religiously inclined, he should
review in his mind the great cause of human freedom and the
price that others have willingly paid to defend and advance it.
Patriotism, the welfare of families and friends, and concern for his
own future self-respect, all help to reinforce the will to resist. Very
few persons are aware of how much hidden strength they actually
have. The medical profession, which has the opportunity to observe
persons fighting for their lives?often against incurable ailments?
can testify to the fact that, when a person makes up his mind to
resist, he can accomplish miracles.
The Arrest
It is, of course, essential that the agent, as a standard procedure,
maintain a level of preparation for ?arrest. However, since he has
to take chances in order to accomplish anything, it becomes important
50
Approved For Release 2005/01/26 : CIA-RDP78T03f99NRISRAb008-4
ApprwtsVrEcdstRAlease 2005/01/26 : CIA-RDP78T031a50A91008-4
to know something of the signs of impending arrest. History is replete
with accounts of agents arrested with incriminating evidence in their
possession long after they themselves had good reason to expect arrest.
Any change, however subtle, in the attitude of persons with whom
one is in everyday contact must be fully reviewed as to possible causes.
From the point of view of preparation, the agent should carefully
study people with whom he has casual contact, such as an apartment
house janitor, a storekeeper, a barber, for example. In a totalitarian
country, people of this sort are keenly alert. If they have been ap-
proached under some cover by a local security officer to provide
information about the agent, they will have received a tremendous
shock and their attitude toward the agent is bound to change. He
may observe signs of fear, sudden prying curiosity, avoidance, or
even unusual pleasantness, on the part of such persons. He ma:y have
nothing but a feeling that their attitude has changed. Such warning
signs should never be ignored.
If the agent is carrying out proper countersurveillance procedures
he may detect signs that he is under observation. Although one would
think that an agent detecting such signs would take strict measures
to remove evidence, in many cases he has simply continued on his
way?often with unfortunate results.
From time to time the agent may detect that his quarters, or his
place of work, have been tampered with. He may discover articles
out of place or missing, or signs of the rumpling of clothing in
drawers, and the like. There are simple methods of so arranging
various objects that their movement can be detected. Very frequently,
the secret search of one's premises is an important warning that
one is suspected. However, inquisitive persons and thieves also en-
gage in this kind of activity.
The arrest or disappearance of confederates or accomplices is, of
course, a warning that no one could misunderstand.
It is often possible for the sponsor of a secret agent to warn him
through some prearranged system of communication that he should
suspend operations, flee immediately, or the like. The most careful
preparation and planning is essential to assure that the agent will be
able to verify the authenticity of a warning, as well as to understand
it correctly. From time to time persons have been trapped by "warn-
ings" fabricated by the local security service and intended to stampede
CONFIDENTIAL 51
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
them into some unwise action. Persons who should have known better
have fallen for such simple tracks as an anonymous telephone call
from "a friend," an anonymous letter dropped into the mailbox or
shoved under the door, even a visit by an unknown well-wisher. Of
course, in the areas where resistance to Communism is high there
will be a person here and there who, out of the goodness of his
heart will assist an enemy agent. But in the vast majority of cases, in
a totalitarian country, fear of the consequences and general suspicions
of everybody effectively prevent people from helping each other
secretly?which is one of the main reasons why totalitarian govern-
ments survive.
Arrest occurs in two basic forms: overt and secret. In overt arrest
actions, the Communist services tend to use a good deal of manpower
to bar escape and to crash into the rooms of the suspect with the
minimum loss of time. Occasionally they will have access to the keys
to the suspect's lodging and use them for even swifter invasion of
the premises. Sometimes these services deliberately create a great fuss
during the arrest action, presumably in order to intimidate and
impress the population. Arrest in this form indicates the intent of the
authorities to liquidate the operation and formally charge and sen-
tence the persons apprehended. The agent is advised to plan his
resistance toward minimizing the offense, trying to get the charges
changed to criminal charges and in general to aim at leading the
arresting authorities to conclude that common crime is in fact the
principal activity of the arrested persons.
In case of overt arrest, the prisoner in Communist hands in a civil-
ized area can expect standard criminal processing, including photo-
graphing and fingerprinting, body search, replacement of belongings
with a prison uniform, medical check, a hot shower bath, and assign-
ment to a cell under close guard. In case of espionage suspects, these
procedures will be very thoroughly carried out. The arrestee can ex-
pect to confront one or more interrogators for a long time to come.
In the case of secret arrest, quite a few of these procedures may
be omitted. The prisoner may find himself in a safehouse, and the
physical search may concentrate on depriving him of the means of
suicide. The search for evidence may thus be a good deal less
thorough than it might otherwise be. There may be evidence of con-
cern for his state of mind in many cases; but in others the sternest
and most thorough processing will occur. The prisoner should keep
Appgved For Release 2005/01/26 : CIA-RDP78T03%1WASON40008-4
ApprimafgocrtiAlease 2005/01/26 : CIA-RDP78T031WRA9.AX9.008-4
alert to every nuance of the processing, as he can often gain clues
as to how much is known and what is intended. He should be par-
ticularly alert if he is left in the company of talkative guards or "fellow
prisoners" for long periods of time, as these persons will in all proba-
bility be plants trying to elicit information from him, and influence
his attitudes.
In secret arrest operations, the person detained is usually accosted
on the street by a number of men who "escort" him to prison or a
safehouse as inconspicuously as possible. Secret arrest as a rule means
that the arresting service has plans which require that the fact of the
suspect's arrest be concealed as long as possible. This does not neces-
sarily mean he is to be turned loose to be used as an informer, for the
intent may only be to gain time and avoid scaring others before
arrests can be made. It may mean that the arrestee is expected to pro-
vide evidence leading to the identification and arrest of persons not
yet known to the security service. Occasionally a person is arrested
on trumped up charges in the hope of getting him to provide evi-
dence against himself by surprise and under high pressure. The pos-
sibility also exists that the arrest has been undertaken secretly in
order to avoid embarrassment if the prisoner has to be released for
lack of evidence later?that is to say, the arrest is a bluff. But in a
good percentage of the cases there is a substantial prospect that the
person detained may be let loose to function as a doubled agent, and
the arrested person should take comfort from this circumstance and
plan his defense accordingly.
Interrogation
While the prisoner is being processed into his cell, last minute
preparations for his interrogation will be under way. The interrogators
who are to deal with the prisoner will be putting the finishing touches
on their interrogation plan and examining the materials recovered
during arrest and body search. Frequently, the prisoner will not be
interrogated for some time after entering his cell. During the interval
the prisoner should review the main points of his cover story and of
his fall-back story and decide what his attitude toward the interroga-
tors will be. He may be fed, briefed on the rules, and allowed to go
to sleep, only to be suddenly awakened and hurried off to an interroga-
tion cell.
CONFIDENTIAL 53
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
If the prisoner has been secretly arrested, his handling can vary
widely. He may not be searched. He may be brought to a safehouse.
He may be given a very friendly reception. On the other hand, he may
be subjected to very harsh and violent treatment, in an effort to force
or frighten a confession out of him. Harsh or violent treatment and
hasty interrogation are indications that the arresting authorities are on
a "fishing expedition" and do not really have sufficient information
and evidence in hand.
/n the initial stages of any interrogation it is best for the prisoner
to play the role of a well-intentioned, but confused and innocent
victim. The jails are full of prisoners who made the mistake of being
clear and precise in their replies to seemingly harmless questions.
The first thing every interrogator has to determine is whether his
prisoner can tell a straight story about anything, or whether he
is in a state of confusion. Prisoners are under no obligation to
collaborate with their captors by exhibiting good memories and
making coherent statements. This is the time to forget as much as
possible.
In all interrogation sessions, the prisoner should try to discover
the following:
a. What is known about him; more specifically, what evidence
does the interrogator have? Even Communist interrogators have
to have evidence to convict suspects, and they seldom have as
much as they pretend to have. Nothing should ever be admitted
unless the evidence that the interrogator exhibits is overwhelming.
In such cases the admission should be framed in such a way
as to mislead the interrogator as to the true nature of the evidence.
One should never assume that the case is hopeless and that one
might as well tell all.
b. Where did the interrogator get his information? The prisoner
often overlooks the fact that the interrogator may let slip information
which will indicate who betrayed the operation. By feigning
stupidity and confusion and pretending not to understand ques-
tions, the prisoner may maneuver the interrogator into making
further disclosures which may indicate the source of the betrayal.
c. What are the intentions of the authorities? By the time the
prisoner is in his cell, he will have many clues to analyze: The
arrest procedure, the search procedure, the remarks which the
Appi56ved For Release 2005/01/26 : CIA-RDP78T03C62k1ateN40008-4
ApprimgRaNlease 2005/01/26 : CIA-RDP78T031a/AFRAmoo8-4
arresting authorities may have made within his hearing, and other
circumstances preceding the arrest which he may call to mind.
Thinking these things over as calmly and as thoroughly as pos-
sible can help the prisoner to plan his defense.
d. How much importance do the authorities attach to the
prisoner? When the prisoner faces his interrogators, he can gain
valuable clues as to how much effort the opponent intends to
make in his case. He may find himself confronted with an expert
interrogator who knows the prisoner's language and background
very thoroughly, or he may find a relatively inexperienced and
ignorant interrogator working against him. The type of custodial
handling, such things as the number of persons making the arrest,
the speed and efficiency of his handling, ?the level of rank of
officers dealing with him, all provide clues in this direction.
In the period before arrest?and certainly before interrogation?
the prisoner should have made up his mind as to what facts he must
conceal at all costs. Such facts would include: the identity or hiding
places of other agents, the hiding places of items of evidence, the
true objectives of the operation, and important information concern-
ing his superior officers and his sponsoring organization.
Some General Rules
The rules which will help a prisoner to deal with his persecu-
tors fall into two general categories: rules concerning attitudes and
psychological defenses, and rules covering practical actions and de-
fenses.
The first psychological rule is never to give up hope, no matter
how desperate the situation appears to be. One must always bear
in mind that the opponent is not only human but in all likelihood
under heavy pressures of doubt and handicapped by fragmentary
information. In espionage matters so much is cloudy and confused
in even the clearest cases, that prisoners who know the game can
frustrate their opponents--if they persist.
The second psychological rule is to view oneself in custody as
continuing the fight with other weapons and on another basis.
The third rule is to view oneself as a patriotic hero fighting to free
his people. After all, the soldier fights in groups, from which he
draws courage. The secret agent generally spends most of his time
CONFIDENTIAL 55
Approved For Release 2005/01/26 : CIA-RDP78T03194A00030001-1108-4
ApprDyed For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
fighting singlehanded without this type of strong support. His fight
is waged against great odds; hence he deserves extra credit for
heroism?not condemnation as a "cowardly spy." One's own evalua-
tion of oneself tends to get across to associates?and guards and
interrogators are de facto associates of a sort, who may come to
respect the prisoner who respects himself in spite of themselves.
The safest pose is the pose of calm equality: "We are both doing our
duty according to our principles."
Rule four is in many ways the most important: Care must be taken
not to slip insensibly into the attitude that there is no world except
the prison, no future, and that the time scale of the prison is all that
counts. It must consciously be remembered that there is another
world and that one day the prisoner will have to face that world and
its rewards or punishment. Liberation may be very sudden and
soon?then what?
Rule five is to remember one's own importance. The agent, con-
fronted with the vastness of the prison and the clandestine activity,
tends in any case to come to consider himself and what he does as
unimportant. This is both a harmful attitude and an error: the agent
is often very important and never unimportant. He can within limits
continue to have an effect upon the world even while tied hand and
foot, possibly even a greater effect than when he was at large. He
cannot know what is going on behind the scenes of the opponent's
organization. His case may be a cause c?bre, or even the subject
of international negotiations. The prison administration, however, will
make every effort to make him appear to himself as the forgotten man.
Combatting Environmental Influences
The tactics of most Communist services are designed to weaken the
prisoner through relatively simple but highly effective methods.
"Brainwashing" as commonly understood is an inexact notion. The
prisoner can expect to be confined in a bleak and uncomfortable cell
illuminated with a very bright light 24 hours a day. He will be under
constant observation but unable to communicate with anyone. He
will be required to obey minute, irritating, and senseless restrictions.
His food supply will be inadequate and particularly deficient in vita-
mins. He will be deprived of sleep, required to sleep in a certain posi-
tion when he does get a chance to lie down, and may have to stand
for many hours on end. Interrogators and others will suggest that he
App*ved For Release 2005/01/26 : CIA-RDP78T03f61?6Mbi40008-4
Apprearcil.oFasia?lease 2005/01/26 : CIA-RDP78T03186fi4iRFRAI2008-4
is guilty of all sorts of things and may alternate their treatment with
sudden, unexpected interludes of kindness and even friendliness. The
alternation of this treatment, especially when one is not prepared
for it, can induce a state of mind gravely weakening the power to
resist. Many former prisoners have stated that they were most weak-
ened by friendly approaches after a long period of hardship. They
found themselves forgetting that the interrogator was their enemy.
They found themselves accepting the idea that they had to exonerate
themselves and rehabilitate themselves, succumbing to intense feel-
ings of guilt.
The interrogators, while they have a great deal of latitude and
authority over the prisoner's situation, nevertheless would get into
trouble, possibly quite serious, if the prisoner died or became de-
mented or crippled as a result of the treatment he had been subjected
to. The interrogator is not all-powerful. Prisoners should eat what-
ever food is placed before them to sustain their strength. With a little
practice, however, some persons can vomit at will, and it could be
effective if the prisoner suddenly did so upon the interrogator or in
his presence. No interrogator enjoys close and continued contact with
a prisoner who has lost control of his bowel movements. Fainting is
sometimes an effective gambit. This interrupts the interrogation and
creates time-wasting interludes while the prisoner is revived. The
prison administration takes care to forestall attempts by prisoners
to commit suicide. However, people have committed suicide in prison
through dashing their heads against the walls, through biting their
wrist arteries open, through inhaling items of food causing strangula-
tion, and through other ingenious methods. There is nothing to pre-
vent the prisoner from experimenting with suicide attempts in such
fashion as to alarm the interrogator, and it takes a pretty determined
interrogator to avoid making the prisoner's lot easier when this
threat becomes evident.
Immediately upon imprisonment the prisoner should devise some
method of keeping track of time. This is most difficult if there is no
daylight in the prison cell. The prison schedules and routines are often
deliberately varied in order to distort the prisoner's sense of time.
The prisoner can pass the time he records very profitably by engrav-
ing upon his memory, through the process of repeated recall, important
details about his opponents which will be valuable later on. Unless
the prisoner makes a conscious effort to memorize these details, when
CONFIDENTIAL
ApproveaFor Release 2005/01/26 : CIA-RDP78T03194A000300015d008-4
Approve4
CO rrsyNlAkleiase 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
he gets out of prison he will usually be unable to recall important
facts, dates, and the like. The prisoner should memorize the features
and mannerisms of the interrogators, particularly unusual items such
as an accent, a deformity, or some striking habit. He should attempt
to find out as much as he can about the building in which he is
housed, particularly its location. He should attempt to become familiar
with the guards, who in a sense are also prisoners. The "friendly"
guard, of course, is usually a provocateur, so he should be told noth-
ing of significance except what the prisoner wants to reach the ears
of his interrogators. However, cultivation of the guard can be used
to elicit interesting details from him and may enable the prisoner
to ease his own lot a little. Now and then the guard will be found
who is in fact sympathetic to the prisoner. The prisoner should at-
tempt to identify the vulnerabilities of interrogators and, of course,
always look for clues as to their identity. The intelligence services of
the free world are very well informed as to the identities of inter-
rogators and can match the information the prisoner supplies with
the information they already have to identify the interrogator fully
later.
People captured by Chinese or other Asian Communists may find
themselves imprisoned with a group of "reformed" prisoners, rather
than isolated. The other prisoners are under heavy pressure to "re-
form" the victim. They will endlessly argue with him, plead with
him, and abuse him, exerting moral pressure, and surrounding him
with an ideological environment that will cause him to feel deserted,
guilty, and hopeless. A person caught in such a situation can play
for time, as this process takes days and often weeks to be effective.
He can also use the situation to create confusion. For example, he can
tell different individuals "in confidence" very different stories, and if
he is good at dealing with people, he can create feuds amongst the
people seeking to "reform" him, playing one off against another.
The effects of isolation and inactivity quickly weaken all?espe-
cially persons who are congenial and like human company. We all
depend to a great extent on our associates for moral support and for
a feeling of reality. When held in a dark cell, all alone, day after
day, the desire for human contact, which can be satisfied only by the
interrogator, grows very strong in many persons. Worry becomes an
incessant companion. The tendency to see the interrogator more and
more in a heroic light and as a friend also develops. Most prisoners
AppAed For Release 2005/01/26 : CIA-RDP78T03199MERION3008-4
Approved For. Release 2005/01/26 : CIA-RDP78T03MOD30a010AL008-4
Interrogation iuttsJII
expect to find the enemy to be vile and revolting, and their resistance
is greatly weakened when they discover that the interrogator can be
a fine, clean-cut, idealistic, and quite charming person. The best de-
fense against this approach is to keep telling oneself this is just an-
other trick. If one can develop insight into one's own human weak-
ness, much of the effect of this trick will be lost. The prisoner should
realize that it is normal for a person in isolation to feel that he is
losing his mind, to feel extremely guilty, to feel terribly lonely and
anxious. The prisoner's fear that he is losing his mind is the best
guarantee that he will not lose it.
The personal equation in the relationship with the interrogator must
be borne in mind. Most people do not have dominant personalities or
great powers of leadership and persuasion. Some interrogators have
a great deal of such power. They are persons who exercise natural
authority over others, and the prisoner will find himself emotionally
affected by the demands of such commanding persons. Here again,
insight into one's own weakness is the best defense.
It is also particularly hard to resist the blandishments of an inter-
rogator who is obviously convinced of the justice of his own cause,
and sincerely attempts to "reform" the prisoner. It is well to remember
that some of the most sincere persons in history have been the most
vicious, such as, for example, Adolf Hitler. Sincerity is no guarantee
of the justice of a cause, but unless one is on one's guard against
it, one can become persuaded.
As long as possible, and certainly until the pressure becomes in-
tolerable, the prisoner should stick to his cover story. If he has worked
up a plausible story, and has learned it reasonably well, and has lived
his cover, he may be able to make the interrogator believe it. This
happens more frequently than most people think. The interrogator is
just another human being. In any case, as the interrogation proceeds,
the prisoner can elaborate and develop the legend or cover story,
especially if he has had the foresight to appear to be very confused and
mixed up in the beginning. If gaps in the cover story become appar-
ent, the prisoner can think up lies to insert. As the interrogation pro-
ceeds, he can rehearse these lies with the interrogator until the prisoner
himself begins to believe the story. If, after a long time, the prisoner
is forced to make a false confession he can use his fall-back cover
story and go through the same routine as he did with the first story.
Finally, if and when the prisoner is brought to admit that the fall-
CONFIDENTIAL
Approvea ror Kelease 2005/01/26 : CIA-RDP78T03194A0003000n008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
back cover story was a lie, he should go back to the original cover
story, telling the interrogator that he had told the truth the first time
and then had been forced to lie and now can think of nothing but
to tell the truth. It should be noted, and remembered, that the truth
would quite possibly not be believed in any case. It has been the
experience of many prisoners who, at an early stage, made a truthful
confession, that they received the same treatment as if they had lied.
The reason is that the opponent expects the prisoner to lie and very
often has no way of telling how much of his story is true and how
much is false, most cover stories being a mixture of truth and false-
hood.
During interrogation it is well to try to distract the attention of the
interrogator from sensitive items of information. This can be done
by pretending to conceal information of secondary importance in such
a way as to get the interrogator interested in prying it out of the
suspect. For example, a prisoner who has no confederates can tell his
story in such a way that the interrogator will conclude the prisoner
must have had help. Eventually the prisoner can involve innocent
persons?preferably persons loyal to the regime?thus causing the
investigative apparatus to waste a great deal of energy and, quite
possibly to arrest and interrogate persons who cannot possibly pro-
vide assistance.
Combatting Arguments
The prisoner can expect to be assailed with many arguments, all
intended to persuade him to cooperate. One argument that is fre-
quently effective is the statement: "We know all about your activities
anyway. What I am doing is giving you a chance to explain and justify
yourself." While this argument seems silly to a man who is not in
prison, it has been extremely effective with many prisoners. Threats and
promises are often made in a linked fashion. For example, the prisoner
may be told he will be executed as a war criminal unless he cooper-
ates, in which case he may be redeemed and even allowed to go free.
Particularly effective is the trick of minimization. The interrogator
takes the position that the prisoner was a dupe, really did not intend
to commit a terrible crime, was victimized by his superiors, did not
understand what he was doing, and so forth. The interrogator says
that he fully understands the prisoner's activities and reasoning and
might do the same if he were in the prisoner's shoes. This technique
Apprtged For Release 2005/01/26 : CIA-RDP78T031caVRARP4008-4
Appritoyeercil.oFggigielease 2005/01/26 : CIA-RDP78T031e68gRitip008-4
is quite effective in inducing a prisoner to make small admissions. Once
such small admissions have been made, they are used to pry more
and more information out of the victim.
Another argument which is very effective when several persons in
the same network have been arrested is based upon the natural dis-
trust people have for each other. The interrogator will say or imply
that the other persons arrested have long since confessed, putting the
blame on the victim now being interrogated. The prisoner is then
asked what he has to say in his defense, and if he believes he has
been betrayed, he may easily fall into the trap of trying to put the
blame on his accomplices. The only safe rule, no matter how over-
whelming the evidence may be that others have confessed, is to stick
to the story, and under no circumstances to attack one's associates.
Political arguments are often effective, especially against prisoners
who do not know the inside story of Communist activities. People will
be confused by long quotations from political authorities attacking
their beliefs. It should be remembered that the devil himself can
quote Scripture to his purpose. Often quotations from very great men,
such as Abraham Lincoln, are twisted and edited to suit such pur-
poses. Very effective is the "inevitable victory of Communism" ap-
proach. The prisoner is told that soon his homeland will be occupied
by Communist forces and that he will be personally responsible for
what happens to his family and friends if he does not cooperate. He
will be told that Communist success is only a matter of time, and that
he is wasting himself trying to prevent it. He will be told that he is
pulling the chestnuts of other countries out of the fire, that he is a
dupe of the capitalists, that his superiors are quislings and that the
only way out is for him to help his enemies.
A particularly dangerous interrogator is a convert to Communism
who was formerly on the prisoner's side of the fence. He can say,
"I used to believe the same way that you do. I changed my mind for
such and such reasons, and you can do the same." The convert can
persuade the prisoner to hope that he too can be redeemed by con-
version. After a long and miserable time in prison, this temptation
becomes very strong. The best defense for the prisoner is to remember
that conversion under duress is always suspect, and that, if the man
interrogating him is a genuine convert, the circumstances of his con-
version could not have involved duress.
CONFIDEIIIIAL
Approvea ror Kelease 2005/01/26 : CIA-RDP78T03194A00030046008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
A prisoner can sometimes waste a great deal of the interrogator's
time by long and involved descriptions of trivial affairs and matters.
This is particularly effective if, from the beginning, the prisoner has
used complicated constructions and confusing non sequitur in his ex-
planations. When stopped in a rambling discourse, the clever prisoner
flounders and gets mixed up, loses the thread of what he was saying
and then winds up starting at the beginning once more. Most inter-
rogators tend to let the prisoner talk in the hope that he will say
something of value. In most Communist prisons the interrogator is
required to report the prisoner's statements in writing. The more con-
fused and rambling the information is, the more time-consuming and
repulsive the task of transcription becomes.
In some circumstances it may be profitable for the prisoner to tell
the interrogator that the day may come when the interrogator?like
a number of the Nazi Gestapo?may find himself on trial as a war
criminal. Some interrogators fear this ultimate fate. A prisoner can
sometimes profitably attempt to involve the interrogator in an ideologi-
cal discussion. Most Communists render lip service to Marxist ideology,
but know as little about Marx as the average religious person knows
about the Bible, the Torah, or the Koran. It does no harm to ask for
Marxist literature. Anything which will delay or sidetrack the inter-
rogation can be useful. Sometimes such literature will be supplied
on demand, and the ingenious prisoner can contrive to waste the
interrogator's time and energy in fruitless ideological discussions. The
prisoner who knows the laws pertinent to his case can often quote
it to help himself. Communist law is usually a farce, but it is a farce
that Communists are expected to maintain.
Warning
In all cases, whether or not the prisoner undertakes to arouse the
curiosity or the fears of the interrogator, great care must be taken
not to arouse personal hostility. One of the most foolish and dangerous
things a prisoner can do is to incur the personal hatred of the guards
or the interrogators.
It is customary in most Communist prisons for the prisoner to be
required to sign the written protocol of each day's interrogation. If
the prisoner has had the foresight not to carry specimens of his own
handwriting with him, he can sign the protocol in a distorted hand-
writing (which he should have memorized). However he signs, he
ApprVied For Release 2005/01/26 : CIA-RDP78T031?WWW4?8-4
Approved For Release 2005/01/26 : CIA-RDP78T03a5n9Wm10008-4
Interrogation
should always first write, "I have read this document," and then cross
his signature over this line of writing. This is legal in most Communist
prisons and hinders the use of the signed protocol as if it were a
signed confession. To the limits of his ability, the prisoner should
refuse to countersign documents written in a language he does not
understand.
Coping With Interrogator Tricks
In addition to environmental influences, direct accusation, and
moral pressure, the prisoner will have to deal with a great many
tricks of the interrogation trade. There are so many of these that a
full catalogue is impossible. Most of the tricks, however, are relatively
simple, and once one has studied the pattern of trickery and types of
common tricks outlined below, one should readily be able to spot
most of them. It should be noted that these tricks are not confined
to Communist interrogators, but are used by police and other interroga-
tors all over the world. The defense suggested will be discussed in
connection with the individual approaches.
A most obvious trick which is still surprisingly effective is to ask
the prisoner why he thinks he has been arrested. The trick is very
simple and very often provokes the prisoner into making disclosures
which the interrogator had never suspected. The best defense is some
statement which fits into the cover arrangement. If, for example, the
prisoner is posing as a national of some other country, he may infer that
he has been arrested because it is the policy of the local government
to persecute citizens of his country. Whatever explanation the prisoner
volunteers should be along the line of imputing persecution, or error,
or blackmail, or some other discreditable motive to the arresting au-
thority. This is part of the basic posture of the prisoner of rejecting
any implication that he could be guilty of an offense. As always, the
reply should not be conspicuously clear. It is always safe to say one
has no idea, but this reply is negative, and attacking is usually a
better defense.
Sometimes the prisoner will find himself accused or suspected of
activities in which he has never engaged. This can be a trap, for it is
quite possible that the prisoner, in his haste to establish an alibi by
proving where he really was at a given time, will provide the arrest-
ing authorities with information of great importance which they
did not have and may not even have suspected to exist.
CONFIDENTIAL 63
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
AppriuMABMvse 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
Sometimes elaborate scenarios are set up to induce the prisoner
to believe that he is not, or not yet, under interrogation. For example,
he may find himself awaiting processing in a cell with two or three
other "prisoners," one or more of whom are actually informers. These
persons will seek to involve him in a harmless conversation. The wise
prisoner never forgets that there is no harmless conversation in. prisons.
The prisoner may be asked to fill out some simple form concerning
his belongings, and involving notification of relatives, employer, or
friends. By filling out such a form the prisoner may provide the inter-
rogator with a specimen of his handwriting and often a great deal of
useful information. If forced to fill out any forms, the prisoner is well
advised to use a distorted handwriting and to put in false or mis-
leading information. Occasionally an interrogator will pose as a tech-
nical specialist. That is to say, a "guest" of the interrogation staff rill
be left alone with the prisoner on the pretense that the interrogation
has been interrupted to "talk shop." Depending on the cover story that
the person under interrogation is supporting, he should or should not
go along with this trick.
A particularly devastating trick is to compel the prisoner to tell his
cover story or legend backwards. It is, therefore, a good idea, when
memorizing a cover story, literally to learn it forwards and backwards.
When a question of alibi arises, that is to say, a determination of
where the prisoner was at a certain time, the prisoner who has not
lived his cover is especially vulnerable. For example, the prisoner may
state that at a certain time he was at a certain hotel in a certain
city. The interrogator makes a note of this and then, after some hours
or days have passed, calls the prisoner in and says that he has in-
vestigated the alibi and asks the prisoner whether he noticed any
unusual event during his alleged stay at the hotel. Conversely, the
interrogator may tell the prisoner that at the time he was supposedly
at the hotel, there was a hold-up or some other spectacular event.
This he will do in the course of a "conversation" and the prisoner, in
his effort to sustain his alibi may go along with the interrogator's
fabrication and so trap himself. The interrogator, of course, may not
let the prisoner know that he has been trapped. The best defense of
a prisoner who has not been at the place he claims to have been is
to plan in advance to claim a place where he could have been sleep-
ing at the time something unusual occurred. He could, for example,
in the hotel situation, easily have missed even a fire in some other
part of the hotel through being asleep.
AppPgwed For Release 2005/01/26 : CIA-RDP78T03f0AM6110110008-4
Appri?nvOrg6:::?critiNlease 2005/01/26 : CIA-RDP78T031t048MM008-4
The interrogator may have an enormous file on his desk and look
into it from time to time as if reading about the prisoner. He may
speak as if he knows a great deal, dropping names, mentioning
addresses, even telephone numbers. This type of technique can be
exploited to the prisoner's advantage, for the interrogator, in his
efforts to impress the prisoner, may let slip many valuable items of
information, including the extent of his own ignorance.
Some interrogators have success with very simple tricks such as
staring silently at the bridge of the suspects nose. This gives the
suspect the feeling that the interrogator is looking through him. Most
persons cannot stand a sustained silence. The wise prisoner will simply
sit and stare back.
Sometimes interrogators resort to very persistent and detailed ques-
tioning about matters about which the prisoner has no knowledge,
with the result that, when a question is slipped in to which the
prisoner can provide a satisfactory answer, he will feel relieved and
let fall information he should keep to himself.
Sometimes a prisoner is plied with questions which make no sense.
Most persons worry about losing their minds or at least self-control
in such situations and naturally assume that they themselves are slip-
ping, when in fact the interrogators are deliberately talking nonsense.
It is a good idea to play around with this trick to keep the interrogator
talking nonsense as long as possible, as this gains one time.
On occasion prisoners are stripped naked and made to stand before
one or more interrogators for long periods of time. Sensitive individ-
uals find this extremely trying. We all rely upon our clothing to sustain
our image and our status. One good defense against this kind of thing
is to begin to cough and sneeze and tremble and to show preoccupa-
tion with the physical rather than the mental result of such indignity.
A common expedient is to upgrade the prisoner's living conditions
as he becomes more cooperative. He may begin prison life in a dank
or mosquito infested cell and advance to a cell which may even have
a carpet and a private toilet. He may be confined with other prisoners
who pretend to have a dreaded disease, such as tuberculosis, a venereal
disease, or a skin disease, or even leprosy.2
Persons who have visible leprosy are no longer infectious. Tuberculosis bac-
teria exist everywhere in prisons anyway. Venereal disease cannot generally be
communicated without the cooperation of the victim.
CONFIDENTIAL 65
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
AppasicgdirtMaase 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
A prisoner of importance may find himself in the hands of a
"medicarspecialist who gives him psychological examinations and may
tell him he is on the verge of insanity and suggest that he take some
injection. Everyone has heard rumors of the use of truth serums
and other debilitating drugs, "brainwashing" drugs, and the like, and
many persons are disposed to feel that no one could blame them for
confessing when confronted with or injected with drugs.
As a matter of fact, a determined person can successfully resist
truth serums and other chemical gadgets. It is obviously very frightening
to be visited by a soi disant medical specialist suggesting shock treat-
ments, nerve resection, frontal lobotomy, or castration as a means of
"helping" the prisoner to become "normal." These expedients lose
their effectiveness, however, if the prisoner realizes they are tricks,
and that a prison administration will not usually countenance any
such activities.
The Cuban interrogators have used a particularly devastating
expedient to break the will of prisoners who resist: the false firing
squad. A common variation of this trick is to have the prisoner
brought out to witness the execution of some other prisoner. Some-
times the execution is real and sometimes it is staged. He then is
told his turn is next, he is blindfolded and led to the stake, a volley
of blank cartridges is fired. The effect of this is naturally overwhelming,
and is heightened when the prisoner is told, after he discovers he
is still alive, that the next time he may not be so lucky and then
he is given one more chance to tell his story. One defense against
this trick is the knowledge that he will not be executed as long as
he has not provided the information the regime seeks. As a matter
of fact, prisoners nowadays are seldom executed without some form
of trial, even in Communist areas, because of the effect upon the prison
administration of allowing too much arbitrary mistreatment of
prisoners. As far as is known, Communist services make little use of
electromechanical "lie detectors" or polygraphs, apparently because
the general hypocrisy and paranoia of Communist societies make it
impossible to get reliable results. On occasion some trickery employ-
ing a machine represented to be a "lie detector" may be employed.
The person interrogated is best advised to deny any imputations by
the machine that he is lying.
A variant of interrogation trickery that is as old as the hills but
still traps many persons is the "good guy", "bad guy" trick. This
66
Approved For Release 2005/01/26 : CIA-RDP78T03S9V6MMI10008-4
Apprmy@ichFotalease 2005/01/26 : CIA-RDP78T0318WARWAn008-4
is worked as follows: One interrogator consistently harasses, insults
and badgers the suspect, accusing him of lying, threatens him with
violence, pushes him around and in general behaves very badly. The
other interrogator is a friendly and rather well-intentioned man
who plays the role of the friend of the prisoner, attempting to re-
strain the "bad guy" and protect the prisoner. Eventually the prisoner
is left alone with the "good guy" who then attempts to win the prisoner's
confidence by condemning his colleague. Strange as it seems, many
a prisoner falls for this trick. Most persons are now aware of the
existence of mirror windows or two-way mirrors and realize that
someone may be watching them. Ordinary mirrors, however, are
occasionally used so that the interrogator can watch the prisoner
and his reactions while appearing to look elsewhere. The interrogator
may go to some other part of the room to fumble with a drawer or
some other object and casually make a remark to the prisoner which
contains frightening implications, and observe how the prisoner reacts
when he does not believe he is under observation.
Interrogators often seek to aggravate a prisoner by pointing out
such signs of guilt as sweating, crossing and uncrossing of legs, nail
biting, blushing, or aversion of the eyes. Persons not guilty of anything
become exceedingly nervous and uncomfortable when under inter-
rogation. In point of fact, only hardened criminals and aberrant
personalities of certain types behave calmly in such a situation. The
best defense is to say one is always nervous and ill-at-ease when in-
terrogated or questioned or even in conversations. The display of
horrible photographs of bombing victims, murder victims, or other
atrocities occurs occasionally. The interrogator calls to the prisoner's
attention that he is responsible for atrocities. This provocation has
two objectives. It can make a person feel guilty, or it can provoke
him into attempting to justify the acts of the power he supports.
The best defense is to deplore these misfortunes and to take no
stand whatsoever with regard to them.
The prisoner finds himself in a particularly hazardous situation
when he makes some small admission and the interrogator tries to
use this to pry more information out of him. Of course, "the longest
journey begins with a single step," but there is no law that says
that a person, having made one step, necessarily has to take further
steps. An admission or a slip of the tongue can be used by the
resolute prisoner to lure the interrogator up a false trail.
CONFIDENTIAL 67
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
CONFIDENTIAL Interrogation
Some interrogators will provide the prisoner with pencil and paper
and demand that he write his life history. This is a very tiring and
time-consuming activity. If the prisoner has maintained his posture
of confusion effectively, there is nothing to prevent him from preparing
a most confused biography. A great deal of time can be gained in
this way, as well as much peace and quiet for recovery of equilibrium
and review of the situation.
The prisoner should conceal all knowledge of foreign languages,
as far as possible. The interrogator will be very interested to identify
the foreign languages spoken by the prisoner and may use a number
of tricks, such as suddenly addressing the prisoner in a language
he is suspected to know, or speaking to a third person in this
language, while observing the prisoner. He may say something uncom-
plimentary or startling about the prisoner, seeking to cause a visible
reaction. If a strange language is spoken in his presence, the prisoner
should always make the appearance of trying to hear and understand
what is said. Many prisoners who know a foreign language act ostenta-
tiously uninterested in such a situation, but the normal behavior of a
man who does not know a language is to listen attentively in the effort
to catch a word here and there, finally to give up and lose interest.
Prison informers are not usually brought forward while there is
intensive interrogation, but may be after the prisoner has been in-
terrogated or if he is held indefinitely in detention pending investiga-
tion. The prison informer can be exceedingly dangerous or useful
depending upon the skill of the intended victim. It is wise to regard
all fellow prisoners as informers. Especially suspect, however, should
be persons who warn the prisoner against other inmates of the jail,
persons who are quite healthy in spite of the miserable prison con-
ditions. The informer often has the task of discouraging a resistant
prisoner. The prisoner should never lose sight of the fact that con-
tact with an informer or other provocator gives him an opportunity
to supply deception information to the interrogation staff, while
pretending to be telling the truth in confidence.
The interrogator will tell the prisoner, "we are alone and can
talk completely privately." A tape recorder may be ostentatiously
displayed and turned off so the prisoner can talk "off the record."
Many tall for this although common sense should tell them that no
prisoner is ever alone with any interrogator. Even if several people
are not listening in on concealed microphones and recording on
Appr6eed For Release 2005/01/26 : CIA-RDP78T0311t45iiatb114008-4
Apprpnygil.oFgoartilglease 2005/01/26 : CIA-RDP78T031VMANNAM008-4
concealed machines, what the prisoner tells the interrogator will
be told to everyone needing to know and often enough to the world-
at-large. In fact, no prisoner can ever be sure he is truly alone
anywhere. Not only are peepholes and audio devices easily employable,
and closed circuit TV a possibility, but the prisoner may find himself
quartered in a cell with a person he has every right to trust and who
is in fact trustworthy, in order that concealed devices can pick up
their conversation. Stool pigeons confined in a cell with a prisoner
may point out a "hidden" microphone and involve him in a discus-
sion outside its range, where another microphone is known to them
to be hidden.
Propaganda Exploitation
One of the most painful ordeals the agent-prisoner has to undergo
is the attempt of the apprehending service to exploit him for propa-
ganda purposes. Efforts may be made to get him to denounce his
sponsors and the regime he has been serving in favor of the Com-
munist system, both on paper and in public before cameras. De-
pending on the intentions of the Communists, the prisoner may have
to undergo a show trial or some other legal farce. Show trials usually
require that the prisoner rehearse his part in the show until it is
letter perfect. Commonly, he will be rehearsed in a story which
displays him as pleading for mercy and as the victim and/or accomplice
of a capitalist machination.
One gambit used with success in many cases is to invite or allow
the prisoner ?to write one or more letters to his loved ones. These
letters must conform in many parts to a prescribed text. If the agent
has prepared for this contingency in advance by arranging a simple
open code with his loved ones, he can use this opportunity to convey
useful information. The code must be simple, and cannot convey
complicated ideas. Provision in such a code should be made to
send at least the following messages:
a. What is stated about my situation is (is not) true.
b. I am ( am not) being severely maltreated.
c. I suspect (know) I was betrayed by
d. The enemy knows ( does not know) who my accomplices
were.
e. The enemy has a source in
CONFIDENTIAL 69
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Apprez5egffalkase 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
In some show trials, prisoners have had the courage to denounce
their rehearsed pleas. In the case of a prominent prisoner this
action may have some value, as the foreign press may be represented
or hear of it. However, in the average show trial no reporters other
than Communist sympathizers will be in the courtroom. The most
heroic conduct on the part of a prisoner ordinarily will not be men-
tioned by such persons. As a rule, therefore, the prisoner should aim
to make himself as uninteresting and useless for propaganda purposes
as possible. The propagandists do not like to put on a show with
unreliable persons?or persons who show of symptoms of crippling
mental or physical mistreatment which might arouse the sympathy
of an audience. All trials end with a predetermined verdict on which
courtroom conduct, unless it is bitterly hostile to the Communists,
will have no effect.
The thing to bear in mind in refusing cooperation in propaganda
exercises is that in the long run it will have no effect on the fate
of the prisoner whether he complies or not. On balance he will prob-
ably be better off if he does not comply. For some reason, the
Communists tend to inflict more suffering and demands on the
weak than on the strong.
At times the prisoner may be trapped by technical devices used
without his knowledge. He may be asked to review some progaganda
statement out loud and then state what he thinks of it. A secret
tape recorder will be set up to record his voice apparently saying
what in fact is merely being read. It is, therefore, advisable for anyone
given anything to read to read it in silence. Sometimes statements of
the prisoner are taken out of context and merged with something he
said elsewhere to make a damaging statement. There is little the
prisoner can do to guard himself against an effort of this kind unless
he says nothing at all, which is always a method to be tried but
can seldom be sustained long if the interrogator chooses to employ
drastic measures.
Penitentiary, Escape, Release
Once the prisoner has passed through the sentencing procedure, the
interest of the authorities in his case declines very sharply, although
attempts may later be made to recruit him as an informer. The pris-
oner should bear in mind that entry into a penitentiary with a long
sentence does not necessarily mean that he will serve this sentence.
Apaiived For Release 2005/01/26 : CIA-RDP78TO3CAMMVIN0008-4
Apprmygg0Fart1Dlease 2005/01/26 : CIA-RDP78T031eMifigiM2008-4
Important captured Communist agents are from time to time ex-
changed for agents of the West. From time to time there are diplo-
matic negotiations, as in the case of the Cuban and the East German
prisoners, resulting in the release of thousands of individuals: who
had resigned themselves to many years in prison. There is the pos-
sibility of escape. There is the possibility of the overthrow of a Com-
munist regime. This is a danger that the regime is constantly preoc-
cupied with. In the recent case of Czechoslovakia, an explosion of
the entire Communist system in Europe was thought to be imminent.
This can and will happen again and again, possibly with increasing
frequency. The prisoner should bear these consoling factors in mind.
In the penitentiary or concentration camp the prisoner will again
find human association. Among the prisoners he meets there will be
persons with whom he can cooperate, but there will also be secret
informers against whom he must defend himself and whom he can
also exploit by telling them whatever it is he wants the authorities
to believe. The prisoner should always beware of special officers in
the prison who have a stature higher than the guard personnel, es-
pecially "welfare officers" or "morale officers", or "political indoctri-
nation officers". These are very often state security service men re-
sponsible not only for keeping an eye on the prisoners, but for watching
the guards. Some of the guards will be extremely venal and others
will hate the regime.
The prisoner should look upon himself in the penitentiary as con-
tinuing the fight in a special situation, not simply as a man who is
out of action until release. His conspiratorial skills and training can
be used to good advantage in the prison. He can learn a great deal
more about conspiracy in the prison. This is, after all, the school of
conspiracy in which the Communists learned their trade. A prison is,
in a very real sense, a typical Communist country in miniature. Skill-
ful and determined prisoners have effectively operated within such
penitentiaries safely and for long periods of time to create great diffi-
culties for the prison administration, organize escapes, subvert guard
personnel, and sabotage the installation.
In considering escape plans and confederates, the prisoner must
never forget that the prison administration from time to time may
induce provocateurs to suggest escape, and thus dupe the prisoners,
later visiting heavy additional punishment on them. A provocation
of this kind generally destroys escape ideas for quite a long time.
CONFIDENTIAL 71
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
ApprealFrogiftelase 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
A provocation which is elaborate, but sometimes is used, is to
allow the prisoner to escape in company with another prisoner who
is actually a member of the security service. Usually the escape is
"miraculous" and the prime mover is the provocateur. The intent is
to win the confidence of the prisoner. In a variant of this trick,
the prisoners escape, and meet the confederates of the provocateur,
who profess to distrust the prisoner, consider him a stool, become
very angry, and threaten to kill him unless he can prove his loyalty
by proving that he has been operating against the regime. The temp-
tation to betray operations and contacts under such conditions is
strong. The best defense is to say nothing on the grounds that one
can never trust anyone and take one's chances, for it is after all
by no means unusual for one prisoner to help another escape without
ulterior motives.
The prospects and conditions governing physical escape and sub-
sequent evasion of controls vary so widely that only very general rules
can be given here:
a. Be careful whom you trust ( see above on types of provoca-
tions).
b. Be realistic as to the prospects of success: it is one thing to
get out of a prison; it is quite another to get out of the country,
and it may be foolish to try physical escape if other factors are
tending to promote the chances of early release. Prison guards may
be lax because there are other obstacles to escape beyond the
perimeter.
c. Do not aggravate your situation by committing serious crimes
in the escape effort; for example, murdering a guard will usually
result in a death sentence. Of course, there may be occasions of
active warfare in which the prisoner in his escape action is in effect
undertaking guerrilla warfare. This is not commonly the case, how-
ever, for a secret agent arrested in alien territory.
d. Beware of becoming involved in escape plots from which
you may later want to withdraw. The others plotters may decide
you know too much.
e. Above all, never become involved with persons who are sin-
cere but indiscreet.
Release from prison can come about, as already mentioned, through
a number of factors over which the prisoner has no control. One
72
Approved For Release 2005/01/26 : CIA-RDP78T03RAIMV60008-4
ApplimhOrigelease 2005/01/26 : CIA-RDP78T039?fflip4p008-4
of the ways to get out of enemy custody most easily is to get oneself
recruited as a double agent, that is to say, to let oneself be "turned".
The hostile service, of course, is aware of this, but sometimes has
no choice but to try to recruit agents from among its captives. It
is well for the agent to memorize the factors which can make him
a desirable "turn around" for his captors:
a. Special access or other capability to accomplish something
for them.
b. Lack of publicity in his case.
c. Fundamental "job loyalty." If a man conveys the impression
that he has desperately and loyally defended the interests of his
sponsor so long as he thought the sponsor was in the right, only
turning his coat when he came to see how wrong his sponsor was,
he will win a great deal more trust than if he gives the impression
of merely yielding to pressure.
d. "Unpacking." In general, before a person will be considered
really "doubled," he will have had to make a full confession of
his activities. It is possible to display the appearance of this pro-
vided the planning has been thorough, even while concealing vital
information. The agent can best plan his ultimate "confession" ( really
a third cover story) at his leisure in his cell after he has had many
sessions with his interrogators and has discovered what they
actually know. He can devise a story which explains the known
factors and makes him look attractive from the point of view of
potential to do things the opponent wants him to do. Woven into
the story should be factors which induce the opponent to think
he can control the potential "double agent" through blackmail. For
example, the prisoner in the course of "unburdening his soul" can
confess to serious but not easily checkable misdeeds, such as em-
bezzlement or fraud. Confession to crimes such as murder is fine,
provided investigation by the opponent will confirm that such a
crime was in fact committed, the guilty person not apprehended,
and the prisoner could have committed it. The prisoner may "betray"
an ambition to become a figure of power in his homeland which can
only be realized by collaboration with the enemy. The prisoner
must be very careful in pretending to become "converted" to the
opponent's faith. Protesting too much is usually suspect, but true
believers seeking converts are often quite vulnerable to being de-
CONFIDENTIAL 73
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Apprusg8E4Inse 2005/01/26 : CIA-RDP78T03194A000300010008-4
Interrogation
ceived by the pretence of belief on the part of others. Easy capit-
ulation is, of course, fatal to any hopes of emerging as a double
agent.
Most prisoners in jail for clandestine operations find themselves
free as a result of one or another event unexpectedly and suddenly.
A word of caution is in order: There is a tremendous temptation to
share one's joy and information with all one encounters in the first
wild elation of release. This should be rigorously suppressed, for
only harm can come from spontaneous disclosures, even when fully
true, to unauthorized persons before coordination with the original
sponsor has been effected. Publicity may for example alert the person
who betrayed the prisoner, so that he may escape or destroy evidence.
Whatever is said will be twisted by certain publications to the det-
riment of sponsors, friends, and relatives and thus may endanger in-
nocent persons. Public recriminations against the Communists for
treatment received in prison can hinder the release of other prisoners,
and possibly damage secret operations which are under way. For
maximum effect, release stories have to be enriched with information
not known to the released or escaped person, and publicized at the
right time and place. It may be desirable to avoid any publicity, as
this may be just what the opposition hoped to achieve.
Above all, the prisoner should never forget that one can turn
almost any situation to one's advantage with a little luck and care-
ful planning.
ApAlved For Release 2005/01/26 : CIA-RDP78T039/016MittP410008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000MR110008-4
Distant events shape the
craft of intelligence.
THE BOGOTAZO
Jack Davis
On the afternoon of 9 April 1948, angry mobs suddenly and
swiftly reduced the main streets of Bogota to a smoking ruin. Radio
broadcasts, at times with unmistakable Communist content, called
for the overthrow of the Colombian government and of "Yankee
Imperialism." Many rioters wore red arm bands; some waved ban-
ners emblazoned with the hammer-and-sickle. A mob gutted the
main floor of the Capitolio Nacional, disrupting the deliberations of
the Ninth International Conference of American States and forcing
Secretary of State Marshall and the other delegates to take cover.
The army regained control of the city over the next day or two.
But not before several thousand Colombians had been killed. It was
the bogotazo.
The reaction in Washington was also dramatic and swift. Congress-
men and commentators alike lamented that Communist Russia had
scored a signal victory in the Cold War. The recently organized
Central Intelligence Agency in particular was rebuked for having
provided no warning of this "South American Pearl Harbor." And
on 15 April the Director of Central Intelligence defended the Agency's
performance, first before a congressional subcommittee investigating
the failure of US intelligence, and then before the Washington press
corps.
This article attempts to assess the impact of the bogotazo on the
history both of Colombia and of the CIA. The passage of two decades
is a mixed blessing in this undertaking by one who was not a partici-
pant. Some formerly disputed aspects of the affair seem clear in
retrospect; other aspects remain or have become murky. Those among
the readers who personally experienced this dramatic episode, either
in Bogota or in Washington, are urged to transmit comments to the
editors of the Studies, so that a more definitive account can be
written for the history of the Agency. MORI/HRP
from pg.
SECRET 75 75-87
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Apprimilhor Release 2005/01/26 : CIA-RDP78T03194A00190010008-4
Bogotd: The Aborted Revolution
One thing now seems clear amidst the confusion that still surrounds
the bogotazo: Colombia in 1948 was closer to social revolution than
it has ever been before or since. The old order was under challenge
from a forceful and extremely popular politician, Jorge Eliecer Caftan,
and the poor in the cities, especially Bogota, were in a rebellious mood.
But it was the assassination of the one that turned on the dreadful
violence of the other. No one else was able to harness the savage
energy of the mob; certainly not the feckless Colombian Commu-
nists, though they tried. The government preferred to blame the
riots on Communist agitation and foreign intrigue, rather than to
address itself to the underlying causes of popular discontent. Today,
some twenty years later, the same elite, somewhat expanded and
more enlightened, still controls Colombia. Indeed the bogotazo has
served as an antidote to revolution, because the ruling classes now
tend to avoid the excessive partisanship and disdain for the welfare
of the masses that helped set the stage for the rising of the poor
on 9 April?"Black Friday"-1948.
Throughout nearly all its history, political and economic power in
Colombia has been monopolized by a small elite which has ruled
through either the Conservative or Liberal Party, or through some
combination of the two. Leaders of national stature who attempted
to organize the masses against the oligarchs were rare. Caftan was
one such. He was himself of humble origin and mixed blood. He
was a staunch antagonist of oligarchical rule and a spellbinding orator.
His keynote was "I am not a man, I am a people."
Yet by 1948 Caftan had captured control of the Liberal Party,
which was the majority party even without his broad personal fol-
lowing. Only a split of the Liberal vote between Caftan and an
oligarch nominated by the Party had enabled the Conservatives to
capture the presidency in 1946. Caftan was a strong favorite to
win the presidency in the election scheduled for 1950. His role as
Liberal Party leader, naturally enough, somewhat curbed his license
to attack the oligarchs of both parties.
The bogotalios, usually resigned to their poverty, had turned bitter
in the years immediately following World War II. Times were bad;
the rich made their clever adjustments, but, the poor suffered simul-
taneously from soaring prices and declining job opportunities. Also, in
the usual pattern of Colombian history, the return of the Conservative
76
Approved For Release 2005/01/26 : CIA-RDP78T03194A0001Mb008-4
AppnvgeoilaFzgr Release 2005/01/26 : CIA-RDP78T03194A000MIN9008-4
Party to power in Bogota in 1946 meant that its partisans in the hin-
terland, with the help of the army and police, were intimidating
their Liberal counterparts. Early in 1948 Caftan had addressed a
rally of 100,000 in Bogota and demanded an end to government per-
secution and violence.
The gaitanistas were angered still further by the fact that their
hero had not been appointed to the Colombian delegation to the
International Conference of American States which convened in
Bogota on 30 March. Moreover, Foreign Minister Laureano Gomez,
to the Liberals the most feared and hated Conservative leader, had
been selected to head the Colombian delegation and thus had been
"elected" president of the Conference. There is evidence that some
supporters of Caftan, apparently with his knowledge and perhaps
mild encouragement, were considering the possibility of a coup d'etat
for 1948. This probably reflected their awareness of the growing popu-
lar discontent and their doubts that a fair election would be held
in 1950. In any case Gaitan's murder on 9 April also put to death
a potentially revolutionary moment and the bogotazo was no more
than its wake.
The assassination took place on a downtown street as Caftan was
walking to lunch. The murderer was apparently one of those fanatics
or psychopaths we say may never be excluded from calculations on
the safety of dignitaries. His motives cannot be known for certain,
for he was battered to death on the spot by frenzied bystanders.
Inevitably, charges were raised of the complicity of the Conserva-
tive Party, of the Communists, and of the US. But no strong evidence
of a political plot has ever been produced.
Naturally enough the outraged populace of Bogota was convinced
that the Conservatives were the culprits, and its vengeance was di-
rected primarily toward the Party's symbols, though also toward
those of the oligarchy generally. Laureano Gomez's newspaper build-
ing and his suburban estate were destroyed. The mobs that attacked
the Capitolio were looking for Laureano (though they were also
The assassin was identified as Juan Roa Sierra. The Colombian police indicated
that he was seeking revenge for a relative slain by an Army officer, who had been
acquitted on 8 April on the strength of a legal defense by Caftan. A subsequent
government-sponsored study of the affair by Scotland Yard agents does not men-
tion this story, but pictures Boa as a mystic with delusions of grandeur who had
sought a political appointment from Callan and had been given a run-around.
SECRET 77
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
ApprgoiEFTor Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Bogotazo
shouting anti-US slogans). Cathedrals and priests as well as public
buildings and commercial establishments were made targets, be-
cause the Church was associated with both the Conservative party
and the old order.
What of leadership? Caftan's stalwarts gave the mob some early
political direction, hoping to topple the government. The red arm
bands were the traditional symbol of the Liberal Party. The Commu-
nists had long planned to disrupt the Conference but before the as-
sassination had attempted nothing risky or substantial. After the
start they also did what they could to enlarge the disorders and
to give them a political direction. From time to time they gained
access to the microphones at radio stations captured by rebel forces.
Through the Soviet Embassy they also had access to clandestine
stations and to printing presses. But the Communists were neither
strong enough nor popular enough to take command. Caftan had
stolen most of their thunder through his own populistic appeals.
In terms of both radio time and street leadership the bogotazo was
mostly a gaitanista affair. In any case, frenzy and drunkenness soon
diverted the mob from its interest in political vengeance and revolu-
tion, to violence and looting as ends in themselves.
There were many foreign radicals in Bogota at the time, to
advertise their causes in the publicity extended to the Conference
of American States. Fidel Castro, then 22 years old, happened to
be one of them. Thorough investigations indicate that he played only
a minor role. Castro subsequently reported that he tried to turn the
mob into a revolutionary force, but was defeated by the onset of
drunkenness and looting. The episode may have influenced his
adoption in Cuba in the 1950s of a guerrilla strategy rather than
one of revolution through urban disorders.
Most of the police in Bogota were pro-Liberal and gaitanista in
their political loyalties. Many joined the mob or handed over their
arms soon after the rioting began. In contrast, the army, slowly aug-
mented from provincial barracks, stood by the government. The
soldiers followed the orders of their officers and shot volley after
volley, point blank, into the crowds. This?together with the stead-
fastness of the Conservative president, the growing concern of many
Liberal leaders about the anti-oligarchical nature of the affair, and
the unwinding of the mob's fury?brought a sharp reduction in vio-
78
Approved For Release 2005/01/26 : CIA-RDP78T03194A000YRA008-4
Apprgc;ToilaFzoor Release 2005/01/26 : CIA-RDP78T03194A000gpelai9008-4
lence within a day or two. But continued sniping, dislocations brought
on by a general strike, and a dispute over the burial site for Gaitan
kept the capital city unsettled for another week.
Events in the outlying cities were much less significant, though not
devoid of drama. Some Communists were able to raise the Soviet
banner over the town hall of Barranquilla. Apparently it took but
one army officer to tear it down. Liberal partisans gained control of
Cali temporarily. A presumptuous group of local Communists: then
declared the establishment of the "Soviet Socialist Republic of
Colombia." Here too the army swiftly reestablished government con-
trol. The officer in charge was the then obscure Colonel Gustavo Rojas
Pinilla, whose effectiveness and devotion to duty were duly noted
in Bogota.
As it turned out the bogotazo probably had its most lasting impact
on the countryside. Political violence involving feuding Liberal and
Conservative bands, never completely absent in Colombia, had been
increasing in tempo since the return to power of a Conservative gov-
ernment in 1946. (The Liberals previously had ruled since 1930.) In
the period before April 1948, the Conservatives, with help as we
have indicated from army and police, had been getting the best of
it. With the news of the bogotazo, Liberal partisans struck everywhere
with fury. But soon Conservative bands had better arms and were
able to retaliate. Rural warfare reached a new high level known as
La Violencia, which was to claim more than 200,000 lives in the
following decade. This remarkable bloodletting, stimulated by the
bogotazo and nourished by the deeply rooted feuds between Conser-
vatives and Liberals, also reflected the hard times economically, the
attractiveness of violence as a way of life for many peasants, the
ineptness of the government, and the senseless factionalism of the
country's more civilized politicians.
The inability of the civilian leaders to curb either the rural violence
or their own bitter political disputes opened the way for Rojas
Pinilla, now a general, to take control as military dictator in 1953.
He made progress in reducing rural warfare; but by 1957 his regime
had become so arbitrary and corrupt that he was put out of office by
the oligarchy and the military establishment. The former in particular
feared Rojas' efforts to organize a mass anti-oligarchical party. In
1958, to curb such tendencies and to preclude future bogotazos, the
civilian leaders set up a remarkable coalition government called the
SECRET
Approvea ror Release 2005/01/26 : CIA-RDP78T03194A0003000M008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Bogotazo
National Front that has prevented Liberals and Conservatives from
competing for office directly.2 They have over recent years considerably
curbed their partisanship, and worked, with modest success, toward
improved conditions for the poor. The National Front is scheduled to
run to 1974. Another bogotazo is possible; but for the moment there
is no revolutionary leader of stature, and the poor, while perhaps
discontented, are not seething.
Washington: The Aborted Investigation
The- Washington reaction to the Bogota riots was heavily influenced
by the initial responses in Colombia of the Conservative government
and of Secretary of State Marshall. The Colombians charged that
both the assassination and the riots were parts of a "premeditated
movement inspired by Communists and undesirable foreign elements"
to sabotage the conference. Marshall reported to the press that the
riots had been Communist-inspired and as such were an extension
to the Western Hemisphere of the tactics of subversion and violence
that the Soviet Union was employing in Europe. He insisted that the
conference continue in Bogota (as it did), so that international com-
munism would be denied a victory over the free countries of America.3
In 1948?the year of the Communist takeover of Czechoslovakia,
of concerted Communist drives to gain power in France and Italy,
and of the beginning of the Berlin blockade?a deliberate Soviet ex-
tension of the cold war to the Western Hemisphere was indeed a cred-
ible phenomenon to many US observers. The following is from a New
York Times editorial (April 14):
"Backing up the findings of the Colombian Government, Secretary of State
Marshall and other delegates to the Inter-American Conference have now
likewise accused Soviet Russia, and its tool, international communism, of in-
stigating the riots that wrecked Bogota and cast a pall over the whole West-
ern Hemisphere. Basing their judgment on first-hand information and per-
sonal observation on the spot, they see in the tragic events which interrupted
their deliberations the same powers and patterns at work as in the attempted
insurrections in France and Italy. And that makes Bogota, as Mr. Marshall
said, not merely a Colombian or Latin American incident but a world affair,
and a particularly lurid illustration of the length to which Russia is willing
to go in its no longer ( cold war) against the democracies."
Among other features, the office of president is rotated between the parties and
the congress is divided equally between them.
Within a few days after the riots the Colombian government began reporting
that the assassination had been a non-political act. In time Marshall indicated that
he believed that the Communists had taken advantage of the disorders but had
probably not directly initiated them.
AppR9ved For Release 2005/01/26 : CIA-RDP78T03194A000=0)008-4
AppreoviocjaFzoor Release 2005/01/26 : CIA-RDP78T03194A0004810008-4
The US reaction to the bogotazo?in particular the talk of an in-
telligence failure and the search for a scapegoat?was conditioned
not only by cold war jitters but also by election year politics. The
Truman administration was already under attack from its Republican
adversaries for, among other things, being inept and naive in the
ways of combatting Communism. Governor Dewey, campaigning for
the Republican presidential nomination, had been attacking Truman
for the shortcomings of the recently-established Central Intelligence
Agency even before the Bogota riots. Then on 12 April he let loose the
following blast:
"If the United States had the adequate intelligence service it should, it
would have known about Communist plans for the Bogota uprising in ad-
vance. Knowing what goes on in the world is just as important as know-
ing how to handle it. The Panama Canal is vital to our security. Yet because
of the dreadful incompetence of our present government, we apparently
had no idea what was going on in a country just two hours bombing time
from the Panama Canal.
"During the war the United States had the finest intelligence service
operating all over South America under J. Edgar Hoover. After the war
Mr. Truman ordered the entire service discontinued. He cut off our ears
and put out our eyes in our information service around the world." 4
Dewey's attack in good measure reflected the prevailing attitude
in this country toward the role of intelligence organizations. The shock
of the surprise Japanese attack on Pearl Harbor and the subsequent
wartime emphasis on prediction of enemy attack led many Washing-
ton observers to believe that all crises should be predicted in advance.
Thus, only a grievous intelligence failure would have caused us not
to have had prior warning of the Bogota riots ( especially insofar as
they were part of a well-planned Communist conspiracy).
At least several congressmen thought so, including Rep. Clarence J.
Brown ( Republican, Ohio). On April 10, the day after the riots,
Brown urged an investigation of the intelligence community by the
House Committee on Expenditures in the Executive Departments.
This committee had sponsored through the House the National Se-
curity Act of 1947 under which CIA had been established. Brown let
it be known that he intended to call first Admiral Roscoe H. Hillen-
koetter, Director of Central Intelligence, and then representatives of
the State Department and of the military intelligence services.
From a report on the speech in The New York Times, 13 April 1948.
SECRET gl
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
ApprggegTor Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Bogotazo
At this point the motives, actions, and interactions of participants
become private and complicated. Hillenkoetter made some abortive
attempts to quash the investigation. He apparently also became con-
vinced that the CIA record on the matter was a good one. He dis-
cussed strategy with President Truman who apparently encouraged
him to confront the congressional critics with the CIA record. Truman
and his political advisors, qua Democrats, may have decided that
such a course might strip Governor Dewey of a political issue and re-
dound to the credit of the Administration as well as of the Agency.
In any case Hillenkoetter did appear on 15 April before an executive
session of a special subcommittee of the Committee on Expenditures.
Representative Brown, chairman of the subcommittee, opened by
stating that it was authorized to investigate the CIA to "learn whether
the Secretary of State and other high officials were promptly warned
that a revolution was impending in Colombia, and that their attend-
ance at the Bogota Conference might endanger their lives and bring
embarrassment to the United States."
From his hard charging testimony the Admiral appeared to be any-
thing but a reluctant witness. He rebuked his critics by stating that
CIA had known of "unrest in Colombia" and of the "possibility of
violence and outbreak aimed primarily at embarrassing the American
delegation and its leaders," and that this information had been trans-
mitted to officials of the State Department.
He then read excerpts from classified CIA intelligence reports,
based on information received from agents in Bogota during Janu-
ary-March 1948. These talked of Communist plans to demonstrate
against and block the progress of the conference. Some of the reports
indicated that at least one advisor to Caftan was an advocate of
social revolution and was in contact with Colombian Communists
and the Soviet Embassy.
IIillenkoetter in his testimony charged that Embassy officials in
Bogota had blocked the transmission to the Department in Washing-
ton of a key report. He said that this report, dated 23 March, indicated
"confirmed information that Communist-inspired agitators will at-
tempt to humiliate [the] Secretary of State and other members of
[the] US delegation . . . by manifestation and possibly personal
molestation," upon their arrival in Bogota. ( This would of course have
taken place late in March.)
Appgied For Release 2005/01/26 : CIA-RDP78T03194A000-WAR008-4
Apprggsltripor Release 2005/01/26 : CIA-RDP78T03194A000gp60008-4
This was a period of endemic wrangling between State and CIA.
Some Department officials believed that the Agency was trying to
build an "empire" abroad; Agency officials for their part resented
State's reluctance to provide cover for Station personnel and the
interference of ambassadors with the transmission and dissemination
of CIA reports. Thus, Hillenkoetter may have raised the issue of inter-
ference to spark congressional support for the Agency's position.
Also, the Admiral apparently felt that he had erred in not disseminat-
ing this particular report (which had been transmitted to CIA Head-
quarters) on his personal authority as Director of Central Intelligence,
and he may have wanted to present the facts of the case to the
congressional investigators in the most favorable light.
In any case, his charges served to give the critics of the administra-
tion a new target for attack in the Bogota affair?the State Depart-
ment. Representative Brown made a big point of the intereference
issue at the hearings ( and subsequently before the House and at
press conferences). He said that Congress in establishing CIA had not
intended for State to have the power of veto over Agency reporting
and that he would work to see that the will of Congress prevailed on
the matter. State, moreover, was now subjected to criticism from
Brown for not having called off the conference after being warned by
CIA of pending disorders.
Then, after the executive session, someone called in the press,
perhaps Representative John W. McCormack ( Mass.), the only Dem-
ocrat at the hearings. And Hillenkoetter at the subcommittee's direction
read his testimony?complete with excerpts from top secret reports
and charges against State?to reporters at dictation speed.
State reacted the same night with its own news briefing. The
State spokesman cited classified reports from the Bogota Embassy
warning of possible disorders and molestations of delegates during
the Conference. The State reports were more general than the CIA
documents but covered similar ground. The Department said that
Secretary Marshall had known of these warnings before his de-
parture, and had brushed them aside with "salty remarks," stressing
that it was "quite ridiculous to suppose that the twenty-one Ameri-
can republics should even consider being intimidated by the protesta-
tions of one kind or another from Communists, or anyone else." State
made it clear it had received no warnings of assassinations or major
rioting.
SECRET 83
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Bogotazo
The story?of explanations, charges, and countercharges complete
with release of classified information?became the lead item in major
newspapers around the country on 16 April. That afternoon, for
the benefit first of the House of Representatives and then of the
Washington press corps, Representative Brown repeated his charges
of an intelligence fiasco, now directing his fire mainly against the
Administration and the State Department. The story thus again got
prominent newspaper coverage on 17 April. Next came a period of
weeks during which editorialists, political columnists, and radio
commentators turned their attention to the story. Officials of CIA
reported that the more perceptive journalists came around to sup-
porting its role in the affair. Officials at State made the same claim.
When Secretary Marshall heard of the rousing events in Wash-
ington he ordered an end to the public dispute between State and CIA,
and to the airing of classified documents. His authority was sufficient
to have his will prevail, though he probably was aided by growing
embarrassment among senior White House advisers and leaders of Con-
gress. The Brown subcommitte never reconvened?despite the Chair-
nan's public statements that he planned to call witnesses from State
and the military intelligence organizations, and even Marshall himself
when he returned to the country. Marshall's success in continuing the
conference despite the devastation of Bogota and in obtaining a reso-
lution condemning international Communism soon produced news
stories of US diplomatic successes and decreased attention to charges
of intelligence failures.
Inside CIA
As dramatic an event as the bogotazo was in the first year of the
Agency's history, it is difficult, twenty years later, to point with
confidence to any specific impact on the course of affairs. Admiral
Iillenkoetter was convinced that the Agency's record of warning was
a good one, and a number of critics were disarmed by his testimony.
Yet some within the Agency appear to have reacted as if the Bogota
affair had indeed been an intelligence failure, or at the least a warning
of institutional vulnerability to charges of not having adequately
forecast one or another crisis. The bogotazo thus appears to have
been one event?perhaps a pivotal early event?that led to a strong
emphasis in reporting upon "beating the newspapers" on any story
Apriiived For Release 2005/01/26 : CIA-RDP78T03194A006568E0008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Bogotazo SECRET
of crisis involving Communists. One veteran observer speaks of a
"Bogota syndrome," that is, an extraordinary concern with early warn-
ing of crises and emphasis on the Communist angle.
There apparently was soul searching on the intelligence side of
the house as well. The Office of Reports and Estimates ( so remembers
one veteran) had discussed in staff meetings the possibility of dis-
orders during the conference. The consensus was that the Colombian
government would be able to control the disorders, and no warnings
were published in the monthly Review of the World Situation as
it Relates to the Security of the United States, or in other serials or
special reports. The bogotazo may have produced considerable pres-
sure for greater attention to the publishing of warnings of possible
crises, especially those with any Communist connection. Considering
the Cold War atmosphere at the time and the mandate of the
collectors to concentrate on Communist affairs, such developments on
both sides of the Agency were probably inevitable, with or without
the stimulus of the bogotazo.
The bogotazo may have been one factor ( doubtless a minor one)
leading to the establishment in 1950 of the Board and Office of
National Estimates. Some observers and commentators during 1948
concluded that the Bogota affair revealed weaknesses in the analysis
and coordination of intelligence that exceeded in importance any
weaknesses in collection. The Eberstadt Report to the Hoover Com-
mission (i.e., the Report of the Committee on National Security
Organization to the Commission on Organization of the Executive
Branch of the Government), of November 1948, made this point
without specific reference to Bogota:
"The greatest need in CIA is the establishment at a high level of a small
group of highly capable people, freed from administrative detail, to con-
centrate upon intelligence evaluation. The Director and his assistants have
had to devote so large a portion of their time to administration that they
have been unable to give sufficient time to analysis and evaluation. A small
group of mature men of the highest talents, having full access to all informa-
tion, might well be released completely from routine and set to thinking about
intelligence only. Many of the greatest failures in intelligence have not been
failures in collection, but failures in analysing and evaluating correctly the
information available."
The assassination of Gaitan was very probably a private and irra-
tional act and, as such, an unpredictable event. To that extent, so
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300005008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Bogotazo
was the bogotazo.5 Yet a closer understanding of Colombian politics
at headquarters might have produced far greater concern about the
attitudes of Caftan and his devout followers, and less about the plans
of the small and far from bold Communist forces. Secretary Marshall,
however, would probably have dismissed warnings of political tensions
as summarily as he did warnings of Communist disorders.
This is not to say that at the time all hands within CIA were
attributing too much importance to the Communists as a factor
in Latin American instability. The 12 May 1948 issue of the Review
of the World Situation as it Relates to the Security of the United
States presents an analysis which has withstood the test of history:
'The disturbances which interrupted the Bogota Conference are more
properly attributable to the basic political and economic tensions prevalent
in Latin America than to international Communist conspiracy. Without ques-
tion the Communists were conspiring to embarrass and discredt the Confer-
ence, and they were quick to seize the opportunity afforded by the outbreak
of violence. That outbreak, however, was clearly the spontaneous reaction
of Liberal partisans, already on edge as a result of acute political tensions
and party violence, to an assassination no doubt erroneously attributed to
the Conservative government.-
There are perhaps some lessons in the bogotazo for assessing con-
temporary crises in Latin America:
(1) When a critical situation is as fully developed as was the
case in Colombia in 1948 (i.e., the presence of a rebellious popular
mood, of a virile radical leader, and of reports of coup plotting),
the intelligence community with its current resources on Latin
America will almost certainly be tuned in generally. Complex prob-
lems of timing and interpretation, however, will probably still rise.
(2) The actual moment that gives birth to revolutionary violence
or to violence without revolution will often depend on a chance
combination of circumstances and will thus be largely unpredictable.
(3) Many potentially revolutionary situations will not produce
social revolutions; strong leadership with broad popular appeal
will almost always be an essential ingredient.
Richard L. Stokes, in the St. Louis Post-Dispatch, 17 April 1948, attributes
the following to a State Department official: "Only Superman and Steve Canyon
combined could have learned that, at 1:15 p.m., on April 9, six blocks away from
the meeting place of the conference, Jorge Eliecer Caitan would be shot to death
by a personal enemy named . . . Sierra. Such pinpoint predictions of acts virtu-
ally unpremeditated are beyond the power of any human intelligence service."
AppWed For Release 2005/01/26 : CIA-RDP78T03194A00ffigegIT3008-4
ApprEpovgeolaFz. Release 2005/01/26 : CIA-RDP78T03194A000MOR008-4
(4) Assessing the role of Communists in a revolutionary situation
takes special care; their noise and dramatic presence may not be
based on much actual strength and popular appeal.
(5) Finally, an outbreak of violence, even of dreadful violence,
need not permanently weaken the reigning regime.
SECRET 87
Approved For Release 2005/01/26 : CIA-RDP78T03194A0003000q6008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
PLATT'S LAW
All old-time analysts in the profession have heard of Platt's Law;
few are familiar with its exact terms. Like Darwin's theory of evolu-
tion, it has often been distorted or misrepresented, giving rise to
grave errors. For the guidance of the young we publish herewith the
original formulation of this seminal discovery, as recently exhumed
from ancient files.
25 August 1951
Mr. Sherman Kent
Office of National Estimates, CIA
My dear Mr. Kent:
As one of the earliest purchasers and most constant readers
of your classic on "Strategic Intelligence," I am writing to invite
your attention to the omission from your ( otherwise) excellent book
of a fundamental principle in the production of intelligence.
Assume the following situation:
1. You have prepared after much thought and wide discussion
the first draft of an Intelligence Estimate. This draft contains certain
details and statements which your careful study of the problem leads
you to believe should be included.
2. This first draft is reviewed by the first echelon above your
own. Members of this echelon read your details. After thus getting
the benefit of your explanations, they find these details self-evident and
so eliminate them from the paper along with many of your other
pet phrases. So the second draft is prepared stripped to the bare es-
sentials.
3. The second higher echelon, on reviewing the second draft
thus cut to the bone, finds many of the bare statements lacking in
proper justification or background. This second echelon therefore
insists on the inclusion of more explanation and details. So the third
draft is prepared, restoring the details and pet explanatory phrases
which echelon No. 1 cut out.
4. In turn, the next higher echelon reviewing this third draft
and receiving the benefit of the explanations now once more included,
finds these details unnecessary and cuts them out. . . .
MORI/HRP
89 from pg.
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-489-90
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
5. And so on, from echelon of review to echelon of review ad
infinitum.
General Principle derived from the above universal experience:
Whether or not the necessary explanatory details and pet phrases
of an, intelligence paper appear in the paper as finally published,
depends entirely upon whether the number of higher groups which
successively review the paper is even or odd respectively.
I have, Sir, the honor to be your humble follower in the study
of fundamental intelligence principles,
Washington PLATT
Brigadier General USAR-Hon.
one-time AC of S, G-2 Armored Force
AC of S, G-2 XIX Corps in ETO
Commanding General 98th Infantry Division
now Lower echelon Intelligence Officer, OSI-CIA
Appiaed For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000n30008-4
No Foreign Dissem
Intelligence during a
Presidential transition.
DDI/NEW YORK
Paul Corscadden
Within hours after the polls had closed on 7 November 1968, Presi-
dent Lyndon Johnson invited President-elect Richard Nixon to the
White House to plan for the smooth transition of power by Inaugura-
tion Day 1969. Summoned to attend the meeting of the two men on 11
November were a number of President Johnson's key policy advisers
and administrators?including the Director of Central Intelligence,
Richard Helms.
Decision at the White House
President Johnson had determined at the outset of the 1968 cam-
paign to provide intelligence briefings for the major candidates, After
the nominating conventions, Vice President Hubert Humphrey,
Mr. Nixon, and the independent George Wallace had received brief-
ings from Mr. Helms on Soviet strategic farces, the political situation
in South Vietnam, and the Russian intervention in Czechoslovakia.
Now, prior to the inauguration, Mr. Johnson proposed to make avail-
able to his successor the same intelligence product shown to him.
Consequently, he instructed the Director of Central Intelligence to ar-
range intelligence support of the President-elect and key members of
his staff at their temporary headquarters in New York City.
Such arrangements had proved make-shift in the past. An impro-
vised situation room at the Commodore Hotel in New York had been
visited no more than a few times by Governor Sherman Adams prior
to the inauguration of President Eisenhower in 1953; John F. Kennedy
had been briefed two or three times by Allen Dulles before he took
office on 20 January 1961. Mr. Helms 'determined, in keeping with
President Johnson's wishes, that Mr. Nixon should benefit from a more
sustained effort. The DCI assigned to the Directorate of Intelligence
responsibility for providing support to the incoming administration.
The Office of Current Intelligence would be the executive agent, col-
laborating with other Agency components as required.
SECRET 91.
Approved i-or Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
MORI/HRP
from pg.
91-96
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET DDI/New York
The DCI decided to send a three-man team to New York to confer
immediately with the President-elects chief aide, Robert Haldeman,
at the Hotel Pierre at Fifth Avenue and Gist Street. The Deputy Di-
rector of Intelligence, the Director of Security, and the Deputy Chief
of the Office of Current Intelligence left for New York the next day.
On the advice of the Secret Service, the President-elect had estab-
lished offices on the 38th and 39th floors of the Pierre. Access was by
way of an elevator that was monitored at lobby level by special agents
with short-wave radios and a direct telephone line to a command post
on the 39th floor. Security's New York office had arranged with the
Secret Service for the Agency officers to be admitted and also for the
installation in the suite occupied by the President-elect, himself, of a
safe for storage of classified documents.
The Nixon staff agreed that CIA should establish at its own expense
a secure area to house a combination Situation and Reading Room to
which members of the staff could come to read classified documents
after they had received their security indoctrination. Space was not
readily available in the Pierre, which, in any event, the Secret Service
had already discovered could not be rendered truly "secure"?so it
was decided to locate the Agency's outpost, dubbed "DDI New York,"
in the basement of the Nixon Campaign Headquarters at 450 Park
Avenue, at the southwest corner of Park Avenue and 57th Street. This
site, which was formerly the world headquarters of the North American
Missionary Alliance and was slated to be demolished, would attract
far less attention than the Pierre. It also served as the office of Richard
Allen, who then functioned as the President-elect's principal staff ad-
viser on foreign policy.
The DCI, the Executive Director, and the DDI approved plans for
the facility, and OCI assigned two officers to man it. The staff was
completed by a secretary drawn from the New York Domestic Con-
tacts field office plus two experienced communicators from Head-
quarters.
The area selected for the Agency's facility was adjacent to an ele-
vator and not far from the building's boiler room and heating plant;
it had served during the campaign as a mimeograph room and now was
used as a catch-all for broken office machinery, discarded press re-
leases, and a wide assortment of debris. The Office of Logistics was
given 72 hours, a weekend, to transform the area into a habitable
Appnved For Release 2005/01/26 : CIA-RDP78T03194A0061RESIPT0008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300_040008-4
DDI/New York sKRET
office. Logistics personnel hauled furniture, safes, and office equip-
ment by van from Washington, arriving on Park Avenue early on a
Sunday morning?shortly after a special security team had "swept"
the premises. They quickly emptied the area, painted walls and ceil-
ing, sealed off air ducts leading to other floors of the building, installed
window air-conditioners below sealed street-levels grills, and rewired
all of the electric circuits to allow for the installation of communica-
tions equipment.
Such frantic activity had not gone unnoticed by other occupants of
the building, who assumed that the "Secret Service," ?the "Federal
Bureau of Investigation," or some sensitive military agency had
moved in and would, inter alia, assume responsibility for the physi-
cal security of all the President-elect's staff offices and even for the
protection of Mr. Nixon's family. The Office of Security had decided
not to identify the operation as Agency-sponsored but, rather, to allow
anyone who learned of its existence to draw whatever conclusions he
chose. Before long, staff secretaries were calling to ask that someone
"behind the Black Door" investigate the disappearance of office sup-
plies and even find a purloined television set. The supervisor of the
staff mailroom demanded one day that an Agency communicator
"taste" canned hams sent as a Christmas gift to the President-elect.
Effective 19 November with an eye to production schedules in the
Office of Current Intelligence, communications between New York
and Headquarters were open from 0500 to 2100 each weekday, from
0500 to 1300 on Saturdays, and from 1700 to 2100 on Sundays. Ex-
cept for a one-day interruption because of power failure, communi-
cations remained open until late on the morning of 17 January 1969.
The daily Vietnam Situation Report arrived the evening of its pub-
lication in Washington; the Central Intelligence Bulletin and The
President's Daily Brief came soon after five o'clock each. morning.
Ad hoc, crisis reporting could be sent at any time, and the Agency
Operations Center was able to alert staff officers in New York to critical
developments during non-duty hours. Daily courier service, which
had begun on 13 November, continued through 25 November as a
stand-by measure.
Flexibility and availability were to be the keynotes of the operation.
A complete set of publications in a sealed envelope marked "Eyes
Only - the President-Elect" would be delivered daily to Rosemary
ApprKS5Vor Release 2005/01/26 : CIA-RDP78T03194A0003000f0008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET DDI/New York
Woods, the President-elect's secretary, in Mr. Nixon's office. Nixon
staff members who had access to the intelligence publications were
to come to the facility whenever convenient. Current publications,
along with appropriate National Intelligence Estimates, special
memoranda, intelligence handbooks, and various graphic aids were
prominently displayed.
For the first ten days, only "finished" intelligence was made avail-
able. It soon became apparent, however, that the needs of the new
administration did not coincide in every detail with those of the
Johnson administration. The foreign press had begun to speculate
openly about the incoming administration, its personnel, and its policy
options. This and other information was available to the White House;
little of it would reach the Nixon staff unless some vehicle were de-
signed to convey it.
The Director of the Office of Current Intelligence on 29
November compiled the first "Nixon Special," an "Eyes Only," all-
source intelligence memorandum for the President-elect. The Foreign
Broadcast Information Service transmitted directly to New York
foreign press treatment of the new administration.
On 2 December, the "intelligence portfolio" was passed to Harvard's
Professor Henry J. Kissinger, whose appointment as Special Assist-
ant for National Security Affairs was announced by the President-elect
at a news conference at the Pierre. The same afternoon Kissinger came
to the Agency facility on Park Avenue for a briefing. He was shown cur-
rent issues of all of the intelligence publications available in the fa-
cility, told what had been delivered to the Presientelect, and was
pledged the utmost cooperation on the part of the DCI. He was also
assured that the Agency was prepared to be as helpful as possible in
shaping the types and subject matter of reports and publications and
their format to meet the wishes of the new administration. Kissinger
asked for time to become familiar with the demands that would be
made on him by the incoming Chief Executive, but promised to ar-
range as part of his daily schedule a 15 minute intelligence briefing.
He also accepted the offer of Agency officers to advise him immediately
of any critical world development requiring the attention of the
President-elect. Two days later, at a meeting at the Pierre, Kissinger
requested a series of one-hour briefings on major problems confronting
the new administration?briefings to be fitted into his schedule where-
ever possible.
AppR3ived For Release 2005/01/26 : CIA-RDP78T03194A00MMT3008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000M9.008-4
DDI/New York
At a meeting with DDI/New York officers on 14 December, Kis-
singer directed that Attorney General-designate Mitchell was to re-
ceive The President's Daily Brief, The Central Intelligence Bulletin,
and all other reports in which he had expressed an interest. He had
been one of the first for whom Haldeman had requested a security
clearance on 12 November but subsequently was not available for in-
doctrination by Agency officers until after the President-elect unveiled
his cabinet. Mitchell, a towering figure in the Nixon staff, was to be-
come a major consumer of these publications. One of the Agency offi-
cers met almost daily with the Attorney General-designate until the
last day the Nixon staff worked in New York.
The President's Daily Brief had been uniquely tailored to the needs
of the outgoing administration?just as its predecessor had been
shaped to the reading preferences of President John F. Kennedy. The
authors Of the PDB 'could assume that President Johnson and his prin-
cipal advisers were familiar with the background of most of the sub-
jects covered each day and were often able to employ a shorthand style
without sacrificing clarity or breadth. The President-elect and Kis-
singer, however well read, lacked familiarity with many of the prob-
lems dealt with in the PDB.
This situation had not been unanticipated by the Agency. In fact, the
Office of Current Intelligence already had begun to devise a new ver-
sion of the PDB for Mr. Nixon and his aides. Considerably expanded in
length, the new brief had been circulated for comment to the DCI,
DDI, and other principal officers in the Agency. With their 'concur-
rence, it was decided to send a new PDB to New York.
Because of Kissinger's crowded schedule, his briefings were held
on a somewhat ad hoc basis. The probing questions of the incoming
Assistant to the President for National Security Affairs, his insatiable
demands for assessments of the significance of even isolated develop-
ments on a low order of probability, meant that far more speculative,
estimative 'analysis than normally characterizes current intelligence
reporting was required. It was therefore decided to supplement the
topics covered each day in the PDB and the occasional briefings by
the DDI/New York officers with more detailed backup pieces by
DDI analysts. These reports were written as soon as the makeup of an
issue of the PDB was known in Headquarters and were sent to New
York at convenient hours during the day. On 'several occasions senior
analysts with special competence in the areas dealt with in these an-
nexes came to New York to meet with Kissinger. By the middle of
AppracIlbr Release 2005/01/26 : CIA-RDP78T03194A00030001N08-4
Apprioyed For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET DDI/New York
January The President's Daily Brief had been totally redesigned to
meet Mr. Nixon's preferences. The new brief would consist of three
sections?Major Developments, Other Important Developments, and
occasional annexes?all double-spaced and printed on legal sized
paper bound at the top.
The first section, Major Developments, was subdivided into sections
on Vietnam, the Middle East, Soviet Affairs, and Europe. This was
not a static listing. As developments warranted, some areas could be
dropped, others added. The second section, Other Important Devel-
opments, was intended to highlight problems which?though not yet
critical?could in time engage US policy interests. The annexes were
to fulfill the same role as the "problem papers" that had been sent
to New York.
Under the Johnson Administration, the PDB had been published at
five o'clock in the morning, six days a week, and delivered to the White
House an hour later. However, in order that he and his National Se-
curity Council staff would have time to mull over the intelligence re-
porting before meeting the Chief Executive, Kissinger proposed that
the PDB be released at 5 or 6 in the afternoon, for delivery to him that
same night and to the President the following morning. Changing the
publication time meant an additional lag of 12 hours in the reporting
time, but Kissinger pointed out that so-called "late starters" could be
reported in The Central Intelligence Bulletin and specifically called
to the President's attention. This arrangement, he believed would
most satisfactorily meet the new President's plan to hold regular
meetings with his key advisers at nine or nine-thirty each morning.
Kissinger surmised that he would brief the President for 30 minutes
each morning, immediately following these staff conferences.
By the middle of January, DDI/NY had served its purpose. The
Offices of Security, Logistics, and Communications stood by to re-
move files and communications equipment and to transport them under
guard to Washington over the weekend. At 0730 on 17 January, a two-
man security team was already guarding a moving van that had been
loaded with most of the furniture from the basement suite. Inside the
building, packers were boxing the last of the files, and a communi-
cations technician stood by to dismantle the teletype equipment once
Headquarters approved a request to do so. The last message, request-
ing this permission, was sent at 0840 EST. It was the 523rd message
sent or received since the facility had opened and the 2,179th page of
text.
AppFeved For Release 2005/01/26 : CIA-RDP78T03194A00WU110008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A00039M4108-4
Retrospective reflections inspired
by recent research.
THE 30 SEPTEMBER MOVEMENT
IN INDONESIA
John T. Pizzicaro
Early in 1969, the Special Research Staff of the Directorate of In-
telligence published an extensive analysis of the Indonesian upheaval:
Indonesia - 1965, The Coup that Backfired, by Helen Louise Hunter.
It is classified SECRET-NO FOREIGN DISSEM, and may be obtained
from the Directorate of Intelligence with appropriate authoriza-
tion. Mrs. Hunter's study is reviewed in the following pages by
a senior officer of the Central Intelligence Agency who served in In-
donesia throughout the coup period. His observations on the events
described are sublective, and the conclusions summarized are his own.
The publication of Indonesia - 1965, The Coup that Backfired is an
important event for serious students of the Asian scene. Before it be-
came available to the intelligence community there existed no reliable
analysis of an episode that not only defied full comprehension at the
time it occurred, but has since retained an aura of mystery and, indeed,
controversy among observers in and out of government. We are there-
fore grateful to Helen Louise Hunter for her impressive accomplish-
ment in distilling out of masses of intelligence reporting an orderly,
coherent and historically defensible treatise. Mrs. Hunter has gone well
beyond the limitations of conventional research, and has produced a
book?readable, intelligible, enormously interesting.
The question has been raised?and it remains valid?could not this
analysis have been produced without heavy classification or, better,
with none at all? The need for a definitive treatment of the subject has
been acute, for reasons that will be indicated below. And certainly
Mrs. Hunter's study could hold its own in the public domain with ap-
propriate modification. The fact of the matter is that virtually all
source material used in The Coup that Backfired was obtained origi-
nally via clandestine channels, and its release would have entailed
serious complications. Hence, the decision to stand on Secret classifi-
cation.
It must first be noted that almost no one these days is objective about
Indonesia. People who have lived there either love it Or hate it; many MORI/HRP
from pg.
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A00030001&8-4 97-111
AppgEntfor Release 2005/01/26 : CIA-RDP78T03194A0pnOscp000l0008-4
of them leave bewitched. Scholars who have never set foot in the
country adopt it sight unseen, and fight for eventual access. The excep-
tion to all this is Helen Louise Hunter. She speaks no Indonesian, has
never been to the country, and has no axe to grind. But she has done
her homework with painstaking thoroughness, and has developed
cogent answers to all the important questions. Although Mrs. Hunter
would be the last to claim final say on the complexities analyzed in
The Coup that Backfired, it is hard to visualize a more definitive treat-
ment of that historic event on the basis of information currently
available. Her paper was submitted in draft to a cross-section of CIA
and State Department officers who had served in Indonesia during the
coup period, thus permitting minor changes in detail and atmos-
pherics; as far as substance and the logical flow of the narrative are
concerned, her account cannot be faulted.
The key questions, of course, are relatively few in number, and have
been asked repeatedly by interested observers since 0730 hours on 1
October 1965. Who was Untung, and what was the 30 September
Movement? Why were the generals murdered? Was the Indone-
sian Communist Party the prime mover, or was it an innocent by-
stander on the sidelines of an internal army upheaval? Was there a
Generals' Council? What was President Sukarno's role? Answers
to these basic questions emerged a very short while after the event,
fragmentary at first, but gradually achieving perspective, and have gen-
erally withstood the scrutiny of time and the availability of new in-
formation. But the picture is not complete, and it may never be.
A curious feature of the upheaval was that while the march of
events was fairly dramatic and at times noisy, most developments?
especially in the early stages?were shielded from public scrutiny and
made little sense to the unassisted observer. Overt sources were
limited in access and utility. Even the redoubtable American press
corps had a rough time of it during the early weeks, and was able to
meet its reporting requirements effectively only by extensive piggy-
backing on US mission sources for both background and detail. In time
the situation eased. The Indonesian press began to flex its muscles
under Army supervision. People began to talk, and the rumor mills
resumed operations. By and large, though, throughout the eight to ten
months following the coup attempt, overt information remained
inadequate and decidedly inferior to that available to the US Govern-
ment from clandestine sources,
98
Approved For Release 2005/01/26 : CIA-RDP78T03194A0OWN.10008-4
Appal:giftEdr Release 2005/01/26 : CIA-RDP78T03194A00a1M0008-4
Inevitably, there were periods of uncertainty and speculation as to
what was happening and why, and what would happen next. The
25X1 most striking of these occurred during the first 24 hours. Contact with
ources had long before been
placed on a maximum security basis, owing to the extreme tension and
sustained threat to the American presence that characterized the months
of mid-1965; prearranged schedules applied until such time as they
could be adapted to meet the requirements of the new emergency.
Should the latter have been foreseen? Ideally, yes. In practical terms, it
would have been asking a great deal to predict an event that, for all
its similarity to the traditional fire and brimstone drama of the Ramay-
ana, defied both the logic of historical dialectic and the apparent drift
of Indonesian politics. An interesting facet, however, is that for weeks
25X1 in advance of the coup,I reporting on developments within
the Indonesian Communist Party?the so-called PKI?gave a graphic
and detailed picture of its activities which led directly and, as we see it
with the advantage of hindsight, inexorably to the events of 1 October.
These included the caching of arms and grain, military training of
youth and women cadres at Halim Air Base, and?most important?
the reorganization of party structure in the greater Djakarta area
along military-tactical lines. The signs were clearly there, and a field
appraisal of the situation was being coordinated in draft with the Em-
bassy when the coup brake.
In Java, where ironies compound themselves, the wayang kunt 1 is
normally cited by foreigners to explain the inexplicable or to account
for whatever in Indonesian behavior defies Western comprehension.
Late in the evening of 30 September, this writer attended a wayang
in the suburban district of Manggarai. It was held outdoors in the
village market place under the auspices of the mayor, and attended by
a throng of contented-looking Indonesians from the neighborhood. The
handful of foreigners present sensed no hostility whatsoever. As the
show went on, the seats grew harder, and by 0100 the period of en-
chantment had passed; the next day was a working day. The road
home was along Djalan Krakatau, past the house of the Army com-
mander, General Yani, and farther on past that of Brigadier General
Sutojo, both scheduled for execution within a few hours. There was
The shadow play, based on stories adapted from the Hindu epics, and tradi-
tional entertainment of Indonesian village life.
SECRET_
Approved i-or Release 2005/01/26 : CIA-RDP78T03194A00030009190008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
no hint of menace in the shadows of the darkened street. The flickering
light and jingle of an occasional trishaw suggested a most ordinary
night.
Morning came, bright and fresh, Djakarta's best time. But it was
Friday, and one should remember that in Indonesia things always
happen on Friday. The route from Kebajoran to the city seemed nor-
mal enough until reaching DjaIan Thamrin and turning east on Mer-
deka Square. At that point the mood changed with the scenery. Strange
troops guarded the intersections. Why strange? It is difficult to
say, but they were not the usual custodians of local peace and order
that Djakarta residents grew to recognize. They were infantry with
serious faces and unfamiliar shoulder patches, armed and deployed
tactically. The gates of the Gedung Telekomunikasi were closed
and the area swarmed with troops. Further on, the American Em-
bassy was similarly encompassed. Instead of the khaki-uniformed Mo-
bile Brigade who customarily guarded the outer premises, infantry
held the line, a heavy machine gun at the gate, although making no
attempt to interfere with people arriving for work. It was a perplexing
sight for seven-thirty in the morning. The next few minutes witnessed
a rump staff meeting in the Embassy lobby, chewing over a story told
by the Assistant Air Attache about a firefight behind his house in
Kebajoran shortly before dawn. His servants reported that a general
had been killed. Which general, he did not know. It turned out later to
have been Pandjaitan.
After comparing notes briefly with Embassy colleagues and officers
reporting in, I felt that some personal reconnaissance was in order,
particularly since the telephones were all dead. A meandering route by
Volkswagen past the houses of key generals and other points of mili-
tary interest proved revealing. General Yani's house was cordoned
off at each end of the block by military police. General Nasution's
house was likewise inaccessible. The residence of Major General Par-
man was apparently deserted, but not under guard. A short distance
away, Brigidier General Sukendro's residence was closed up tight?
not surprising since he was away on a visit to Peking?and that of
Brigadier General Magenda showed no signs of life. The streets
throughout that sector of the city were remarkably empty and quiet.
Nearby commercial districts lacked their customary bustle, although
they were by no means deserted. Approaching the Square again, green
uniforms abounded. They swarmed about the Gambir railroad station
on Merdeka Timur and on up toward Army Headquarters. Strategic
ApproiAl For Release 2005/01/26 : CIA-RDP78T03194A0003666f8b08-4
ApprfassleFspar Release 2005/01/26 : CIA-RDP78T03194A000gETR9008-4
Command Headquarters (KOSTRAD) across the street had its share
too, and although they looked like the others to the unpracticed eye,
there was a difference. It was discernible, though hardly appreciated
at the time, in the small patch of white cloth the former wore on their
left shoulder bar. (By morning on 2 October Suharto's men were
wearing a similar identification, but colored red.) Lastly, the For-
eign Department, its 'attractive white facade and pillars gleaming in
the morning sun, was 'observed under heavy guard. Exactly what all
this unfamiliar military pomp added up to became a little clearer when
the writer returned to the Embassy to hear that Radio Indonesia
had come on the air, proclaiming the existence of the 30 September
Movement. The name of Lt. Col. Untung was on the way to becoming
a household word, and the activities of the so-called Generals' Coun-
cil appeared to have some bearing on the events of that unusual
Friday morning.
To fathom the sequence of events thereafter, there is no better way
than to sit down with The Coup that Backfired and follow Mrs.
Hunter's tracing of its labyrinthine path. She has much to offer,
even to those of us who, having been there, profess to understand
what happened and why. Her paper is organized rather uniquely and
in a way that lends itself to the layman's comprehension. The first of
its four main sections deals with the events of the coup itself. The
second focuses the movements of all leading personalities from the
time of the coup until the curtain rings down on their particular
act of the melodrama. Next she examines the plot itself as it un-
folded during the critical month of September, the period when
plans were made and in a sense the outcome of the coup fore-
ordained. The fourth section, and in Mrs. Hunter's opinion the
most important, concentrates on the final sequence of events lead-
ing up to the coup, including the decision to carry it out. An
extremely helpful summary and statement of her conclusions are
provided at the end. There is also an evaluation of the primary source
material on which the entire analysis is based, namely, the pris-
oner interrogation reports produced by the Indonesian Army. Mrs.
Hunter is careful to distinguish between her categories of material?
fact as established in the public domain, testimony of the coup par-
ticipants, and conjecture, whether her own or that of others. The key,
of course, to any 'serious interpretation of 'the kaleidoscopic and some-
times contradictory pattern underlying this episode devolves on the
validity of the Army interrogation material. The author accepts it as
SECRET
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300M008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
essentially valid, and her reasons for doing so are cogent. The reader's
task is further facilitated by a first-rate graphics representation of the
coup highlights, including the only effective map analysis this writer
has seen, plus some helpful time-and-movement diagrams, and, last
but not least, a host of excellent photographs.
With respect to the Communist Party, the author makes it crystal
clear that PKI bore the major responsibility for planning and implemen-
tation of the entire operation. Other important Indonesians, not
necessarily Communist, were also intimately involved. The ultimate
question, and one which Mrs. Hunter scrutinizes with care, bears on
the role of President Sukarno. She concludes that the evidence re-
flecting his full involvement is not conclusive, and from a legal stand-
point she is probably correct. Yet as a practical matter the evidence
Mrs. Hunter marshals so graphically in these pages can hardly be
construed as signifying anything less than Sukarno's intimate involve-
ment from the outset. The question is admittedly not open-and-
shut, and from the Indonesian standpoint there have been valid grounds
for abstention from full and public attribution of responsibility to
the former president. Witness General Suharto's extremely careful
handling of the issue.
As a problem of intelligence acquisition and analysis, it is interest-
ing to note how Sukarno's role in the 30 September affair became at
once the central and vital question for both the Indonesians and those
of us foreigners who were engaged in looking over their shoulders.
Initially it was approached rather cautiously in discussion, sometimes
pointedly avoided. Before long, however, it was clear that the question
was under discussion in high cabinet circles, civilian and military. As
diffidence faded, similar reflections appeared at lower levels of govern-
ment. It was soon apparent that in Army circles talk on the subject
had taken on a brutal frankness. Well placed sources quoted Nasution
and Suharto directly, notwithstanding the fact that those personages
remained fairly circumspect in their public utterances. By late October
there were indications that Sukarno's removal on grounds of his in-
volvement in the coup was already under consideration. As attitudes
of leading Army figures crystallized, with General Nasution figuring
as the hard-liner, the pattern was reflected in extensive reporting from
a wide variety of extremely well-placed sources. Throughout Novem-
ber the pressure intensified and talk of an Army move to eliminate
Sukarno, by assassination if he would not acquiesce, echoed in both
military and political circles.
AppriAqd For Release 2005/01/26 : CIA-RDP78T03194A0003668fg008-4
25X1
25X1
Approved For Release 2005/01/26 : CIA-RDP78T03194A000.30.=.0008-4
Indonesia stutti
This period, it will be recalled, coincided with the killing of vast
numbers of Communists or presumed Communist sympathizers
throughout the country. Although Djakarta was spared the horrors of
that nightmare, the city was by no means exempt from the emotions
that gave rise to it. Thanks to tight Army discipline and intensive se-
curity measures sustained over many months, an explosive situation
was kept under control. On the other hand, bitterness against the
President continued to mount. More and more people believed! that
he was just as guilty as PKI leader Aidit. And yet Sukarno, recovering
from the state of shock that characterized his behavior in early Oc-
tober, had once again begun to play his cards skillfully. He refused
to panic. He temporized on critical issues, minced his words on all
possible occasions, and gave no sign of willingness to concede another
inch to General Suharto. Many observers at the time believed he held
the current edge in what was clearly a struggle for ower. His da s,
however, were numbered. By mid-December
undertook a detailed analysis of the situation, an a vise
that events were moving toward a showdown. Information t en
available left most of us convinced that Sukarno was in-
deed a witting participant in the 30 September conspiracy. Whether
the move against the Army leaders had been his original idea, or
whether he merely responded to the advice of his henchmen, was con-
sidered essentially immaterial. The critical point was that Sukarno's
endorsement of the coup plot made it feasible; his participation gave
it an excellent assurance of success. Without him the plan would have
been totally unrealistic. Headquarters was told that an appreciable
number of highly placed Indonesian leaders had reached similar con-
clusions. Under the circumstances it was felt that the objective va-
lidity of their views was far less important than the fact that they en-
tertained them. Grounds for direct action were thus available; the
showdown was believed to be near at hand.
Two courses of action appeared open to the Army, each predicated
on the assumption that history could not be turned back 'and that Su-
karno could never regain his former ascendancy. On the one hand,
Suharto might opt for gradual assertion of authority over the operation
of government; Sukarno could be neutralized slowly but steadily and
relegated to figurehead status while the Army tightened its 'control.
Or, Suharto could undertake more or less immediate action to 'strip
Sukarno of his authority. His decision, was be-
ing made for him?in part by the desperate economic situation of the
SECRET
Approvea ror Release 2005/01/26 : CIA-RDP78T03194A0003006?2008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
country which cried out for ameliorative action, and even more so by
the intensifying political pressures converging on him, both within the
Army leadership and among the younger political elements beginning
to emerge as factors to be reckoned with. The latter included organi-
zations of university and high school students, already quite vocal in
their attacks on the President.
25X1 The analysis of the situation was discussed at some
length within the Mission. Embassy opinion leaned toward the first of
the two alternatives proposed.I I the grad-
ual approach would not suffice under the circumstances facing Gen-
eral Suharto. Thus, in concluding its rather lengthy commentary,
25X1 bri 23 December that the next few wee,
would probably see a resolution of the impasse, with the Army taking
direct steps to terminate President Sukarno's control over the govern-
ment. Mid-January 1966 saw the crisis come almost to a head, precipi-
tated by student demonstrations over the cost of living. But the Army
failed to follow through, and Sukarno was given another month or so
in which to attempt his final maneuvers. The redoubtable old tyrant
did his utmost in the cabinet reorganization of 21 February; he fired
General Nasution as Minister of Defense, and appointed more leftist
sycophants to ministerial posts than anyone realized were still above
ground. That was the beginning of the end. In a few days the stu-
dent upheaval, under Army patronage but a remarkable phenomenon
in its own right, engulfed Djakarta and paved the way for Suharto's
move on 11 March when he forced the President to sign over to him
authority for all measures required for the safeguarding of security
and government stability.
Not all Indonesians today view Sukarno's elimination with equa-
nimity. Pockets of support and even affection for him can still be
found, particularly in the Nationalist Party strongholds of Central
Java. By virtue of them Sukarno remains a. factor in Indonesian poli-
tics. He is, of course, no more than a factor; he is certainly not a
power.
An interesting sidelight on Sukarno's role in the 30 September
Movement is the almost total lack of interest in it displayed by the
American academic community. The latter, strongly influenced by
George McT. Kahin and the Modern Indonesia Project of Cornell's
Southeast Asia Program, have been much more attentive to the role
of the Indonesian Communist Party in the coup and to the fate it has
Applidakd For Release 2005/01/26 : CIA-RDP78T03194A00CROME113008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A00Q30QQ10008-4
Indonesia 5ECRET
suffered as a consequence. The fascinating thing about this rather un-
usual bias is that it developed in full bloom very shortly after the coup
itself. It was couched then, and has been ever since, in language par-
alleling that used by the PKI when the latter on 2 October explained
its relationship to the 30 September Movement: The Party merely
endorsed the patriotic action of Lt. Cal. Untung in forestalling the
expected counterrevolutionary coup of the Generals' Council sup-
ported by CIA. What happened was an internal Army affair, but in
the words of the leading Communist newspaper the support and sym-
pathy of the people were on the side of the 30 September Movement.
Over the ensuing weeks this theme was developed in greater detail
at Cornell, but except for an occasional article bearing on it, almost
nothing reached print. There was method in Corneffs cautious ap-
proach to the matter, based on concern lest the Indonesian military
learn of the latter's hostility and decide to curtail access to the coun-
try. To date the so-called Cornell "white paper" remains unpublished,
though it is available in the form of an unsigned dissertation dated
1 January 1966, classified STRICTLY CONFIDENTIAL, entitled A
Preliminary Analysis of the October I, 1965 Coup in Indonesia. The
Indonesians are naturally aware of the Cornell position, and they re-
sent it. The scholars predicate their position in large measure on a
total rejection of the Army reports of prisoner interrogation, claiming
that they are based on torture and fabrication, and they place little
or no credence in the published confessions of the coup principals or
testimony of other witnesses before the Military Tribunal. They ar-
gue that since the interrogation reports are not openly available, who-
ever gains access to them must be in league with the Army. In ac-
tuality, the trial evidence covers much of the same ground and offers
ample food for thought to the interested reader. And there is the
nub of the problem. Are the Cornell scholars really interested? Are
they willing to consider any radical deviation from their own pre-
conceptions? This is a harsh insinuation, but it must be weighed. Ruth
McVey, who for many years has been a major luminary and authority
on Indonesian Communism closely associated with the Cornell group,
took the firm position in 1965 that the PKI would not move directly
to seize power, being content to settle for the slow but steady progress
it had registered in the preceding ten years.
This view has by no means been confined to the Cornell group.
Donald Hindley of Brandeis and J. M. van der Kroef of Bridgeport
took similar positions in their respective books published in 1965 be-
AppgcaTFor Release 2005/01/26 : CIA-RDP78T03194A0003001A008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
fore the coup. It has been the Cornell group, nonetheless, that has
held most dogmatically to the idea that the PKI became the scape-
goat in the Indonesian upheaval and was unjustly saddled with re-
sponsibility for it. In this writer's opinion there is a serious question
of intellectual integrity involved in the issue. How better to defend
the thesis that the PKI would not do what it did than to argue that
it did not in fact do so?
A reflection of the amount of vitriol that can still pervade a gather-
ing of intelligent men and women over an issue of this character was
noted in last April's meeting in Cambridge, Massachusetts, of the Con-
ference on Asian Studies, in a confrontation between Guy Pauker of
Rand Corporation and several proponents of the basic Cornell thesis.
Pauker is an authority on the Indonesian Army and well read on the
subject of the coup, his views on the latter being generally compatible
with those depicted in Mrs. Hunter's analysis. After presenting his
brief but cogent monograph, The Rise and Fall of the Communist
Party of Indonesia, Pauker was attacked viciously for his reliance
upon Army interrogation reports which according to one of his inter-
locutors (Roger Padgett, then of Cornell), Pauker knew were doctored.
The attack was snide and ad hominem, a clear aspersion on his in-
tellectual integrity. Donald Hindley arose subsequently and criticized
Pauker's reliance upon the doctored reports, but conceded that he now
agreed with Pauker's conclusions regarding PKI involvement. The cha-
rade was carried further when another participant needled Hindley
for endorsing Pauker's conclusions while disparaging his sources.
To allay any reasonable doubts about the authenticity of the in-
terrogation material, the Appendix to Mrs. Hunter's study should be
ready with care. She treats the matter with detachment, concluding
that there is no evidence whatsoever to support the charge of doctor-
ing or fabrication on the part of the Army. Convictions die hard,
though, and one may safely surmise that were The Coup that Back-
fired to be declassified and made public, it would be attacked by the
academicians with a ferocity at least equal to that aimed at Pauker,
and for the same reasons. Among the better known writers on In-
donesian developments, Ruth McVey has had comparatively little to
say in print since October of 1965. She is said to be working on the
definitive book concerning the coup and its denouncement, hopefully
to establish the PKI's innocence of responsibility for the 30 Sep-
tember affair. It will be welcomed by the many scholars who share her
views and who look with disdain upon the opinions of Guy Pauker
ApprdOed For Release 2005/01/26 : CIA-RDP78T03194A000M5M008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A00Q305010008-4
Indonesia btL,Kt I
and Arnold Brackman, both of whom are working on books of their
own on the same issue, and who maybe presumed to reflect a pro-
Army bias.
This academic skirmishing might perhaps be safely ignored were it
not for the difficulty in which it leaves the informed reader who has
no access to classified material, as well as the serious student of Asian
history and politics who seeks to evaluate the Indonesian upheaval of
1965-66. Of the two, the man in the street who reads books is in the
more advantageous position. He now has Robert Shaplen's Time Out
of Hand: Revolution and Reaction in Southeast Asia (Harper and
Row, 1969), most of which also appeared in The New Yorker (Is-
sues of November 23, 1968, May 24 and May 31, 1969). Shaplen does
an excellent job of making a complex subject readable. It is clear that
he has been briefed in great detail by Indonesian military sources and,
not impossibly, by US officials conversant with the same material,
covering events up to late 1968. The latter point is of particular in-
terest because Shaplen is thus able to draw upon information of quite
recent vintage, which he exploits to great effect in asserting the 'com-
plicity and responsibility of former President Sukarno. He does this in
sharper terms than Mrs. Hunter has seen fit to adopt, notwithstand-
ing her vastly more detailed and incisive analysis of Sukarno's
role. In both, the key element is the testimony of Brigadier General
Sugandhi (Sukarno's Minister of Information), the details of which
were not known until comparatively recently, and then only through
clandestine channels. It is difficult to take the Sugandhi testimony
at face value and sustain any doubt about Sukarno's intimate involve-
ment.
One curious feature of Shaplen's otherwise extremely well-informed
survey is his acceptance of the original story of the kidnapped gen-
erals' maltreatment at Lubang Buaya. Whether for purposes of dra-
matic heightening of his account or because he actually believes it,
Shaplen holds to the tale of torture and multilation of the generals
by frenzied Communist women. The story is untrue, although in the
early days following the coup attempt it was bruited around widely
and given general credence. Apart from this, Shaplen's observations are
strikingly consistent with Mrs. Hunter's. The similarity is in fact so de-
tailed that one is led to wonder whether or not Shaplen was given
access to the classified account.
On balance, The Coup that Backfired constitutes a unique contri-
bution to intelligence annals. It is regrettable that an analysis of corn-
Appg9Por Release 2005/01/26 : CIA-RDP78T03194A0003001143008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
parable quality is not overtly available to serious students of Indo-
nesian affairs. While Pauker and Brackman may in time produce books
capable of dealing frontally with the proponents of the Cornell thesis,
it is doubtful that either version will match The Coup that Backfired
in depth or scope. At some future date it might therefore be well to
reconsider the possibility of declassification. Until that occurs, MTS.
Hunter's study must remain the province of a somewhat limited pro-
fessional audience, much of it already entertaining preconceived views
of what the 30 September Movement was all about. As one of the
worst offenders in the latter respect, this writer is now happy to claim
a clearer perspective and even stronger convictions on the how and
why of that event.
Let it first be noted that the year 1965 saw the Indonesian Com-
munist Party embark on a collision course with the Army. The gauntlet
was thrown down brazenly by Chairman Aidit in January when he be-
gan to press for NASAKOM-ization of the armed forces.2 This was
followed not long afterward by a proposal made to President Sukarno
for arming the peasants and workers, the so-called Fifth Force. The
initiative was Aidifs, and it contrasted sharply with the apparent
passivity of the Army leadership. Sukarno's initial response was some-
what diffident. He purported to be unimpressed, made occasional am-
bivalent observations on the subject, but avoided commitment. As the
weeks wore on, however, he displayed increasing signs of interest in
the Aidit proposals, and the Army was not slow to take the hint. Major
General Mokoginta, Panglima of the North Sumatra Regional Com-
mand and anything but pro-Communist, began training local militia?
i.e., peasants and workers?in what he described as anticipation of
President Sukarno's forthcoming instructions.
The point is that there was nothing in the posture or behavior of
the Army leadership during those critical months to suggest concerted
initiative, whether in the form of resistance to Sukarno's domination
or in active response to the PKI challenge. The existence of the Gen-
erals' Council is said to date from that period, but the testimony of
the coup principals and other Sukarno supporters is extremely vague
as to where the idea originated. In any event, out of it came the story
NASAKOM is the acronym representing Sukarno's basic concept of the State,
predicated on representation and participation by the key elements of Indonesian
society?the Nationalists, those of religious persuasion ( i.e., Islamic), and the Com-
munists. NASAKOM-ization of the Armed Forces would have entailed full Com-
munist participation in command and administration.
ApprilAd For Release 2005/01/26 : CIA-RDP78T03194A0003666f1008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Indonesia SECRET
of the generals' plot to take over the government, which subsequently
served as the ostensible basis for planning and implementation of the
30 September Movement. While the charge of coup plotting can be
dismissed as without foundation, the idea of a secret grouping of gen-
eral officers had some basis in fact. In approximately January, 1965,
a number of generals closely associated with Army Commander Gen-
eral Yani began to meet with some regularity to discuss a variety of
problems facing the Army. I on the delib-
erations of this group, described colloquially by its members as the
"brain trust," reflected an acute concern on their part with what all
recognized as a determined PKI effort to force them to the wall. The
group included Generals Suprapto, Harjono, Parman, Sukendro, and
Sutojo, all of whom, with the exception of Sukendro, were killed on
1 October. Most of the officers were official members of the Army
General Staff, and in that capacity they had every reason to meet
regularly. None was a commander of troops, without which no coup
attempt could be successful. Over and above these considerations,
to argue that the brain trust was at least 'construable as a conspira-
torial body, while it has a certain plausibility, is to ignore the basic
fact of life prevailing in the first nine months of 1965, namely, that
the morale and political 'outlook of the army leadership at that period
were so bad, and its leadership so divided and at odds with other
elements of the armed forces, as to render it incapable of pursuing
an adventurous course of action.
A flurry of concern unquestionably developed in midsummer over
Sukarno's health. But it cannot be shown for certain that it did any-
thing more than stimulate the basic drift of events already under way,
which, however one chooses to read the signs, represented a syste-
matic effort on the part of President Sukarno and his principal con-
stituents to neutralize any capacity for independent action that the
army may have possessed. The role of President Sukarno during that
phase of the development has been variously interpreted. In attempt-
ing to reconstruct it following the coup, gen-
erally saw the President as a witting and willing participant, and to
some extent swept along under pressure from the Aidit and probably
the Subandrio forces. His role as we saw it was to provide 'authority
and legality for the action undertaken and to provide insurance against
failure.
Today Sukamo's role ?stands Out in much bolder relief. The im-
pressive testimony of key communist members of the conspiracy, plus
AppgaRor Release 2005/01/26 : CIA-RDP78T03194A000300191%008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
SECRET Indonesia
new reporting from Army sources showing extensive involvement in
the 30 September Affair on the part of important military figures
previously thought to be above suspicion, offer an image of Sukarno
as a prime mover, a dominant force in the enterprise. In retrospect,
there is no other satisfactory explanation for the dynamics of the year
1965. Without Sukarno as an active sponsor, the PKI would never have
embarked on its collision course with the army. It is almost incon-
ceivable that Subandrio, regardless of his dreams of ultimate succes-
sion to the presidency, would have moved ahead of his master. The
same applies to Air Force Marshal Omar Dani. The cleavages within
the armed forces were indeed real; but only under Sukarno's active
instigation would senior non-Communist military leaders have dared
to participate in a violent move against their colleagues in the top
army command.
Why would Sukarno have seen fit to accelerate a process already
going well under his full control? Perhaps he was simply in a hurry.
The Indonesian revolution was no ball of fire. After twenty turbulent
years its energies had flagged. Sukarno may have taken his cue from
Mao Tse-tung. Certainly, had the coup succeeded, there would have
been Red Guards aplenty to scour the archipelago in a massive purge
of counterrevolutionaries.
Why did the coup fail? The answer is simple according to the basic
tvayang motif: The wicked giant, supported by witches from the for-
est, tried to seize the kingdom; but ?the good prince, in alliance
with friendly gods, prevailed. The triumph of good over evil. Some
say that the coup wag poorly planned and badly executed. By West-
ern standards, that may be so. Yet, notwithstanding its short and futile
life, the coup failed by a hair's breadth. The pivotal factor was prob-
ably the killing of the generals. Had they not been killed, but merely
sequestered, and thus in Indonesian style eliminated from public life,
the coup would almost certainly have been carried off successfully.
Conversely, if the Untung forces in accordance with the plan had suc-
ceeded in killing all the generals, the operation would probably have
accomplished its objective. Nasution's survival not only frustrated the
plotters and shattered their composure. More importantly, it provided
a continuity of authority within the Army and lent moral assurance
to Suharto in the critical early hours. Success might still have been
achieved in the face of Nasution's survival had Sukarno himself not
lost his nerve. Instead of holing up at Halim Air Base for twelve
critical hours, the President's logical move would have been to return
Appre14id For Release 2005/01/26 : CIA-RDP78T03194A00035M1008-4
ApprpnypocnIeFm Release 2005/01/26: CIA-RDP78T03194A000nntEt008-4
at once to the palace, call in all military commanders and the cabinet,
and assert his full authority in the crisis. At that stage Suharto lacked
the momentum he later developed. He would not have dared to clash
head-on with the President. The old magic would have prevailed,
as it had done so many times in the years past. Instead, Sukarno sat
and waited, but nothing happened. Suharto and a comparative hand-
ful of Army officers regained their composure, and took quick stock
of the grim reality staring them in the face. Yani and his strongest
officers were gone, presumably dead. Whatever the name of the game
was, it was a question of survival. By the time Sukarno had pulled
himself together it was too late. The Suharto/Nasution duuravirate
was firmly established and the transition had begun.
ApprogMr Release 2005/01/26: CIA-RDP78T03194A00030001Yd08-4
Approved For Release 2005/01/26: CIA-RDP7opkINAg?p3M1,0008-4
INTELLIGENCE IN RECENT PUBLIC LITERATURE
POWER IN THE KREMLIN. By Michel Tatu. (London: Collins,
1969. 570 pp.)
Looking back, one finds it a little hard to tell now whether the
figure of Khrushchev looms so large in our memories because his suc-
cessors somehow seem so small or because he was in fact a man of
considerable political 'stature. Whatever the, truth of the matter, the
years from roughly 1957 to 1964 were certainly lively ones on the in-
ternational scene, and we can thank Khrushchev for some of our most
anxious and entertaining moments. Bu i now along .comes Michel Tatu,
a Frenchman who spent most of these same years in Moscow watch-
ing the Kremlin at close range, and we can thank him (among others)
for the news that while Khrushchev was so busy bedeviling his ene-
mies abroad, his opponents at home were just about as busy bedevil-
ing him!
Tatu's book, Power in the Kremlin, From Khrushchev to Kosygin,
is an unabashed exercise in Kremlin?logy. As one reviewer has already
observed, moreover, it is Kremlin?logy at its best. And it may be more
than that: it may indeed be the best Kremlin?logy, i.e., one of the best
single works ever written about domestic Soviet politics. This book
does for the political scene in the USSR?in particular, the "Unmaking
of a First Secretary"?approximately what the first of The Making of
the President series does for the American, a feat all the more remark-
able because Tatu, quite unlike White, had no real access to Soviet
leaders and no entree into the closed, murky world of Soviet politics.
I praise this work highly in full awareness that its author is a com-
petitor of sorts, as well as a colleague. And I should mention that
William Hyland, co-author of The Fall of Khrushchev, 'a shorter work
which covers some of .the same territory, and which, alas, was pub-
lished at about the same time, perhaps would not agree with me. But
I also praise it because I wish to make clear at the outset that Tofu's
volume is an excellent study and?as we say in the trade?should
be must-reading for all students of the Soviet scene. But this is a serious
book and it deserves a serious critical review.
Power in the Kremlin ( a crisp and apt title) surveys its subject
under five major headings: The U-2 Affair and Its Consequences, The
22nd Party Congress, The Cuban Fiasco, The Fall, and The Collective
MORI/HRP
from pg.
OFFICIAL USE ONLY 113 113-117
Approved For Release 2005/01/26: CIA-RDP78T03194A000300010008-4
ApprcdfficFat Ilrimeta05/01/26 : CIA-RDP78T03194A000300010008-4
Recent Books
Leadership on its Own. Emphasis in the first three of these sections
is placed on the struggle of Khrushchev's opponents to resist his poli-
cies and to restrict his powers and, in the fourth section, on their ulti-
mately successful efforts to remove him from office. Thus, for exam-
ple, in the discussion of the U-2 incident, Tatu makes the point that
it "played a decisive role in the reversal of Soviet policy," and in ad-
dition, helped to lead to the formation of an informal but effective
anti-Khrushchev coalition (including Kozlov and Suslov) among
Khrushchev's top colleagues. The fifth section concerns itself with the
post-Khrushchev collection and is much less interesting than the
others.
It does not really matter that most of Tatu's central theses are
familiar and that a fair amount of what he has to say concerns pre-
viously explored territory. His notions about the domestic political
impact of the U-2 affair, for example, coincide quite nicely with simi-
lar sentiments expressed earlier in Karl Linden's book, Khrushchev
and the Soviet Leadership 1957-1964, which deals essentially with the
same period. But Tatu arrived at his conclusions independently of
Linden, and indeed Linden's ideas were by no means unique when
they first appeared. Moreover, it should be recalled that Tatu did
not wait until the publication of Power in the Kremlin to reach judg-
ment. He did so, in fact, as the events were actually taking place,
both in Le Monde and in conversation with Western diplomats in
Moscow (including US diplomats). He thus helped at the time to
shape everyone's ideas about politics in the Kremlin, including those
of intelligence analysts in Washington (this one included). In any
case, the validity of Tatu's examination and the importance of his
ideas does not rest on when they appeared or, for that matter, on
their originality.
Tatu's theme is grand, but along the way he by no means neglects
small but nonetheless illuminating episodes. He reminds us, or tells
us for the first time, of some fascinating incidents. As late as 6 May
1960, for example, after the U-2 had been brought down, Khrushchev
publicly reasserted his oft-repeated belief in the sincere desire of
President Eisenhower for peace. But later in the same month, a
spokesman for conservative interests in the CPSU had this to say:
-Yes, we wanted to believe Eisenhower, we wanted to believe him for the
sake of peace on earth . . . But unlike certain simple-minded persons, we
were not exactly moved to enthusiasm by the President's foggy, evasive state-
ments." (reviewer's emphasis)
Appr11ov4
ed For Release 2005/01/26 : CIA-RDPWIFeSt14g4MSOMAY0008-4
Approved For Release 2005/01/26 : CIA-RDP7ELQ3,194A0.Q39008-4
Recent Books Ub
"In order to appreciate the outrageousness of such statements," com-
ments Tatu, "it should be noted that the Chinese themselves went no
further in their criticism of Khrushchev at the time, and occasionally
used the same words."
Tatu also occasionally throws out an interesting and provocative
question which he leaves the reader to answer for himself. Sometimes
these questions are rather startling in their implications. He asks, for
example, whether the Berlin crisis of 1961 brought about the subse-
quent increase in Soviet military expenditures, or whether, conversely,
the need of the military to strengthen the armed forces brought about
the crisis.
As is perhaps already evident, Tatu's work is not for those who like
their political analysis in the manner of Mary Barelli Gallagher or who ?
are seeking a light summer entertainment. It is overly long, and will
surely tell most readers more than they want to know. And, almost as
if he could not bear to discard notes he had made during the event,
Tatu sometimes overburdens his account with detail which seems
irrelevant and inconclusive.
A more serious charge is that, to paraphrase the clich?Tatu ne-
glects (although he does not completely ignore) the forest for the
trees. As indicated, many of the trees which he studies with such en-
thusiasm are simply of little account as timber. The part of the forest
most neglected is, not surprisingly in a book of this character and in-
tent, foreign policy. But Tatu overdoes it; he tends to regard interna-
tional problems almost wholly in a domestic light. The following sen-
tence, for instance, strikes me at least as decidedly odd: "Nothing else
of any significance was in fact touched on kat the Congress) apart
from the Albanian and Chinese problem, which was only a form of
the struggle for power projected on to the international scene. . ." (re-
viewer's emphasis.)
A part of the problem is that, as described by Tatu, there is a certain
lack of connective tissue between events, especially international
events. Links between domestic and foreign events are too often simply
referred to in passing, if at all. Thus, for example, in the sections deal-
ing with Khrushchev's difficulties during the winter of 1963, there
are few references to Soviet foreign policy. This is important for several
reasons, but notably because developments in this area clearly rein-
force Tatu's thesis that Khrushchev's policies?e.g., de-Stalinization
and economic reform?were in trouble. There was a close parallel be-
ApprgerRg likgaatiK05/01/26 : CIA-RDP78T03194A00030001110%08-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
tween Khrushchev's internal setbacks and what was happening to his
principal foreign policies. These too, were running into effective op-
position. Clearly, the conservatives led by Kozlov wished to retrench
abroad as well as at home. It will be recalled, for example, that Khru-
shchev's interest in a nuclear test ban treaty, strongly expressed in the
immediate aftermath of the Cuban missile 'crisis, came to naught until
he was able to pick up the thread again in June, after his defeat of the
conservatives.
In a larger sense, a similar fault can be discovered in Tatu's treat-
ment of the missile crisis itself. The period leading up to that crisis
is covered in some detail on the home front ( though perhaps inade-
quately explored on the international scene). But since he attributes
almost everything to the lure of Berlin, Tatu tends to neglect the two
principal Soviet motives in the affair: Khrushchev's desire to overcome
US strategic superiority and to damage US prestige; and his more per-
sonal, though equally important wish to improve his own position.
Tatu does not discuss in this context the whole discouraging pattern
of events, domestic and foreign, in the two years preceding Cuba. He
thus does not explore the notion that the Cuban gamble reflected
Khrushchev's extreme frustration and even desperation, that in fact
Khrushchev was impelled by his failures on both the internal and in-
ternational fronts, and that he sought in this way to recover lost mo-
mentum abroad and to forestall his ouster at home.
It may be an occupational fault of Kremlinologists and Kremlinology
to neglect, relatively speaking, the international scene and its impact
on Soviet politics. This is perhaps not surprising, given the rigors and
necessary emphases of the art. There is also the matter of time. Tartu
admits that Kremlinology must grope, and that takes time, a lot of it.
Precious little may be left for explorations of the foreign field, except
insofar as it may seem to intrude on the convoluted world of internal
Soviet politics. In any case, few practicioners seem very much con-
cerned with the need for looking very far beyond the walls of the
Kremlin itself.
The importance of this work does not lie, however, in the marginalia
mentioned above. And it was admittedly not Tatu's purpose to pro-
vide us with a full account of Khrushchev's foreign policies. The signifi-
cance of the book is twofold: it is the most thorough and persuasive
account yet of the nature of Soviet politics during the Khrushchev
era?an era described at the time by many Kremlinologists (includ-
AppricAd For Release 2005/01/26 : CIA-RDP79f6PAAVEJS3W6008-4
AppkoemItFBooroEelease 2005/01/26 : CIA-RDPWRIM038atp008-4
ing many within the US Government) as politically placid and lack-
Mg in high-level contention; and it is as such the one account most
likely to make an impression, even indirectly, on those in the West
whose business it is to respond to and contend with the Soviet chal-
lenge. In Tofu's words: "No policy of relations with Moscow can be
planned intelligently without regard to the capital question of how it
affects the struggle for influence at the top level of the Soviet Union.
For this purpose, the symptoms of that struggle which are visible to
the outside world must be taken seriously however slight they may
seem."
Richard W. Shryock
WESTERN ECONOMIC WARFARE, 1947-1967: By Gunnar Adler-
Karlsson. (Stockholm: Almqvist & Wiksell. 1968. 319 pp. 64 Sw.-kr.)
This book is an analysis of the postwar trade control programs of
the US and its allies against the USSR and other Communist coun-
tries. The major portion of the book is devoted to the historical de-
velopment of the trade control programs. The most interesting por-
tion, however, is the evaluation of the impact of the controls and the
judgment that these failed overwhelmingly to achieve their objectives.
The author's argument is well documented, but his conclusions are
overstated and need to be substantially qualified.
Controls on exports to the Communist world have been with us for
two decades. The two chief systems of export controls applicable to the
Communist countries are the unilateral controls based on the US Ex-
port Control Act of 1949; and the multilateral controls administered
since 1949-50 in cooperation with our European allies and japan
under the aegis of the Coordinating Committee (COCOM). These
two sets of controls, designed principally to delay and complicate the
ability of the USSR (along with the Warsaw Pact countries and Com-
munist China) to ,augument its military potential, were adopted
during the height of the cold war.
The scope of both lists has been reduced and interpretation of con-
trols has been liberalized over time; nevertheless, there has been con-
siderable friction between the US and its allies over what should be
exported to the Communist world. In the early postwar period when
our allies were economically dependent on the US, when Stalin was
molding his "closed" economic bloc, and during the Korean war, there
MORI/HRP
from pg.
AppPoWS'ArY2sAeateig005/01/26 : CIA-RDP78T03194A000300b170008-4117-123
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
was closer official adherence by the allies to the stricter US inter-
pretations. After the death of Stalin in 1953, the Korean armistice,
and the growing economic recovery in Europe which produced compe-
tition for foreign markets, there was pressure in COCOM for a re-
laxation of trade controls.
All COCOM countries, including the US, are in general agreement
concerning the embargo of items on the international Munitions and
Atomic Energy lists, but broad disagreements exist on the COCOM
International List I, where items have both civilian and military uses.
The COCOM International List I is the lowest common denominator
for export controls, and any participating country is free to apply a
higher level of controls. US controls are wider in scope and more vig-
orously enforced than those of Western Europe and Japan, because
the US is more inclined to look on the Communist countries as posing
a strategic threat, while other Western countries tend to regard the
Communist countries as a vast potential marketewhich must be ex-
ploited before US competition makes it impossible to do so.
It is Mr. Karlsson's purpose, he says, to look at the history of this
"embargo" policy "reluctantly adopted by the West European govern-
ments.. . to analyze both the political forces which created the policy,
and the economic effects which it may have had on East-West trade
and on the balance of power between the Communist bloc and its
Western adversaries." The generous proportions of his book testify to
the fact that he approached his task with a vengeance. The 8"x101/2"
volume has more than 200 double-columned pages liberally interlarded
with diagrams and tables; there are more than 1,000 source refer-
ences and footnotes (many rather long and fortunately relegated to
the back of the book), and more than 50 pages of trade statistics in
the appendix. Ostensibly the author also consulted numerous sources
in his research, including more than 100 periodicals in a half-dozen
languages. His bibliography includes about 200 authors?from the
best known experts on the Soviet economy to numerous lesser lumi-
naries.
The history of the controls programs, which takes up roughly half
of the book (all or major portions of chapters 3, 4, 5, 6, 7, 9, and 10),
is the strongest part of the book. The obvious painstaking research
using unclassified materials has resulted in a well-documented unclas-
sified history of the trade controls program. Those of us who have ac-
cess to classified sources and particularly those who at least are gen-
ApproNid For Release 2005/01/26 : CIA-RDP7811MigliAdifte0p0114Y008-4
Approved For Release 2005/01/26 : CIA-RDP7N03194.4000381p008-4
Recent Books FICIAI: USE
orally aware of the trade controls program and some of its history
might question the utility of Mr. Karlsson's monumental effort. The
book's chief distinction would appear to be its encyclopedic proper-
tions rather than any new contributions or insights into the question
of the merits or lack thereof of the trade controls prop-am. Our col-
leagues in academia, however, who are not privy to classified mate-
rials, may well regard Karlsson's book as a major contribution to the
literature on Western export controls, particularly its historical de-
velopment. This is not to say, however, that some of the motives and
reasoning for various trade controls actions that he attributes to policy
makers are necessarily true. Thus, there is some reason to doubt that
during the period 1947-53 American leaders "had no vision of peace
beyond the collapse or defeat of Soviet power . . . and that the Ameri-
cans hoped to achieve a collapse after which the Russians would come
and beg for renewed trade relations, now on American conditions."
(pp. 88-89).
The theme which runs throughout the book is that the embargo
policy, which Karlsson says was instigated by the US and perpetrated
on its allies over the last two decades, has been futile; that numerous
diversions have undermined the controls; that the embargo has caused
considerable ill feeling among our allies; that depriving the Commu-
nist countries of Western goods helped Stalin consolidate his Eastern
European domain, promoted autarky, and affected development of
East-West trade up to 1953; that the costs imposed on the USSR by the
denial of certain goods were negligible; and finally that it failed to af-
fect perceptibly the growth of the Soviet economy and Soviet military
power. The book, in fact, is an almost unrelieved indictment of the
Western trade controls programs allegedly nurtured by the United
States and foisted on our hapless allies in the early postwar period.
It is certainly true that there have been many diversions. This fact
has been well documented in classified and unclassified sources. It is
also true that much ill will has been generated because of trade con-
trols. However, it is highly debatable that Western trade controls
were more than marginally influential in fostering the creation of
Stalin's economic bloc in the East. As to the development of East-West
trade up to 1953, we can only be sure that trade controls had a major
impact on US trade with the Communist world. Commodity scarcities
pursuant to the Korean conflict, inward direction of trade among the
USSR and Eastern European countries, and the liberalization of trade
Appr9fEic*r 14Feilt19605/01/26 CIA-RDP78T03194A000300818008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
among Western European countries all played a role in the stagna-
tion of trade between East and West at that time.
Karlsson's thesis that controls have had little impact on Soviet eco-
nomic growth is based on a comparison of "non-realized imports" (the
difference between actual imports from the West and the estimated
value of imports in the absence of controls) with Soviet GNP. This,
he says, would have affected only one-tenth to one-half of one percent
of GNP during the height of the embargo period (pp. 189-90). He
states that the bottleneck effects of the embargo restrictions may have
affected a greater share of the economy and that an exaggerated esti-
mate might be a slowdown in growth from the "potential 8 percent to
the actual 7 percent" during the 1950's. Based on "these exaggerated
assumptions" the effects of the embargo policy would have been to re-
tard economic development during the decade of the 1950's by one
year.
A study undertaken in the intelligence community several years
ago confirmed the thesis that controls have had little impact on growth.
It concluded that a complete embargo by NATO would have caused,
under generous assumptions of impact, the equivalent to the loss of
only a few months' increment to output in the USSR and Eastern
Europe. It has not been possible, moreover, to identify any of the items
imported from the COCOM countries by the USSR and Eastern Eu-
rope for which there would be no possible substitute.
The principal justification for export controls for many years has
been their contribution to or maintenance of the technological lag in
the USSR. It is in this area that Karlsson's arguments are weakest.
The denial of some goods undoubtedly has had an impact on those
economic capabilities that lie at the edge of advancing technology. In
this sense, the quality of Soviet economic growth must be inferior to
what it would be otherwise. The current pattern of trade controls is
aimed primarily at those goods whose technology the USSR has had the
most difficulty mastering.
The technological gap between the USSR and the developed West
is large and is probably widening, as a recent classified study inch-
cates. This statement is at odds with Karlsson's evaluation of Soviet
technological prowess, which he attributes in part to the "efficient
organization of R & D work" there (p. 124). On the contrary, he
sees little point in controlling exports of technology to the USSR, other
than those clearly possessing strategic significance. Karlsson's argu-
AppRolibd For Release 2005/01/26 : CIA-RDPMFBEINIP1091534304110008-4
Approved For Release 2005/01/26 : CIA-RDP7N03194A00030W008-4
Recent Books FICIAL" USE 0
ments seem to be derived mainly from statements made in the
Gaither report in 1958 regarding the rapid pace of Soviet military
development (p. 123). Indeed, the USSR has achieved near-parity
with the US in technology for producing many types of weapons
and space equipment, and even superiority in a few areas. Soviet
priorities, however, have favored the military sector. According to
the above-mentioned report, second priority has been given to the
basic industries whose output directly supports both military produc-
tion and the investment programs essential to rapid growth--steel,
fuels, electric power, producers' equipment, and more recently, chem-
icals. The bulk of the output of these industries is produced with tech-
nology obsolescent by a number of years relative to that predomi-
nantly in use in the West; e.g., technology for producing computers,
peripheral equipment, and solid-state electronic components (a 5-
year lag and widening); the Soviet technological composition of
machine tools is inferior because of its poor quality and preponder-
ance of general-purpose tools; production technology and product
mix of the Soviet automotive and tractor industry are obsolescent;
all aspects of Soviet petroleum technology lags well behind the US
as does much of Soviet chemical technology.
Contrary to Karlsson's evaluation of the efficiency of Soviet II & D,
the technological gap exists and is largely due to the Soviet system
of planning and economic administration which retards innovation.
The importation by the Soviets of Western technology and equipment
valued in billions of dollars during the 196(Ss has been designed to
help overcome this gap. The denial of key advanced Western tech-
nology and equipment via export controls, moreover, has contributed
td the technological lag. The lag is in some degree attributable to the
US unilateral trade program because a substantial amount of key
advanced Western technology is covered by US patents and licenses.
The relaxation of Western controls undoubtedly would lead to
changes in the ,composition of Communist imports from the West.
Such imports would feature equipment and technology for priority
sectors where the lag is greatest, e.g., computers, microelectronics,
petroleum refining and exploration, metal finishing, thermal power,
and certain chemicals. The contribution that such imports would make
to Communist economic growth is, of course, unquantifiable. In-
directly, such imports would help to improve the general economic
OFFICIAL ()Nix 121
Approvea ror Keiease 2u05/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
performance of the USSR and Eastern Europe and, thus, would
make it possible for them to allocate more resources to military pro-
duction than otherwise would be the case. Some of these items, com-
puters, for example, have military as well as civil uses and, thus, would
directly strengthen the Soviet strategic/military posture.
As noted above, denial of strategic goods for two decades did not
prevent the USSR from building a formidable military establishment
at home as well as in Eastern Europe. The military sector is the first
claimant of goods and services in these countries. Denial of Western
technology and equipment, therefore, has had minimal impact on the
size of Soviet military programs. On the other hand, the denial of
Western technology and equipment probably has increased the costs
and reduced the effectiveness of Soviet military programs, and delayed
development and deployment of some weapons systems. Technolog-
ical lags appear to have been absorbed in Soviet military systems at
a cost of reduced effectiveness, e.g., through weight penalties in
aircraft; more cumbersome command, support, and communications
systems; limited flexibility; and reduced reliability.
Controls in the past decade probably have retarded Soviet produc-
tion technology in semiconductors and other electronic components
by denying access to silicon and germanium metals, the processing
machinery for these metals, and transistor and diode production lines.
This delay, in turn, has probably contributed to present lags in digital
computer production technology, which has remained embargoed.
The Soviet lag in production technology for large high-speed com-
puters probably would be a constraining factor in the size and pace
of deployment of a nation-wide ABM system. The US lead in de-
veloping a MIRV system may also be attributable in part to computer
superiority. Optimal nuclear warhead design requires large com-
puter capacity.
The current Soviet lag in the field of microelectronics contributes
to computer deficiencies. The USSR does not yet produce integrated
circuits on a commercial scale. Failure to acquire adequate supplies
?of integrated circuits may retard the deployment of on-board missile
guidance packages and reduce the accuracy of missiles. In the general
field of military applications, unrestricted access to Western micro-
electronic components and/or technology would enable the USSR to
Apdned For Release 2005/01/26 : CIA-RDP/iFlfdS+64AYA396151Y0008-4
Approved For ?Release 2005/01/26 : CIA-RDPUT0319A/MOUR+0008-4
Recent Books FFICIAL:
replace existing Soviet-made components in a wide variety of military
gear with smaller, lighter, and more reliable Western components.
The quantity, quality, and variety of Communist output of telecom-
munications equipment falls far short of meeting Communist require-
ments. As the USSR increases its investment in sophisticated weapons
systems, such as ABM and offensive missile systems, increasing re-
quirements will be generated for a wide variety of telecommunica-
tions systems for strategic application. Included among these systems
are hardened communications facilities in target areas, under
ground control links for hardened missile sites, automated nation-
wide command and control functions, and facilities for rapid and
secure data and voice transmission. The USSR's capability in the
telecommunications techniques needed to satisfy these requirements
is deficient, and numerous attempts to acquire Western technology
and equipment have been made in recent years. The lack of adequate
high-rate data transmission equipment in particular is a serious
hindrance to the deployment of an ABM system, which requires an
intricate network of communications facilities, connecting radars,
computers, command and control centers, and defensive missiles.
The impact of US and Western trade controls on the USSR and
other Communist countries has been less than originally hoped for.
However, they were never intended to bring the USSR to its knees, as
implied by Karlsson. They have not slowed Soviet economic growth
noticeably in the past but they have contributed to the technological
lag which is the major factor in the current economic slowdown.
The have not prevented the USSR from becoming a formidable
military power, but they have denied it equipment and technology
which would have upgraded some weapons systems, and in any
case probably have helped delay the deployment of certain weapons
systems. What this has meant in terms of costs to the Communist
world cannot be quantified. The costs to the Western alliance, par-
ticularly with respect to the loss of political capital by the US, should
be weighed in the balance, of course. The viewpoints of our Western
allies in assessing the strategic significance of exports relative to com-
mercial gains are different from that of the US. Protected by the US
nuclear umbrella, the options are easier for our Western European
allies.
Robert S. Kovach
ApprgIEF% ea 05/01/26 : CIA-RDP78T03194A0003000%3008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
ASSASSINATION BUREAU, INC. By L. Natarajanan. (New Delhi:
Perspective Publications, 1967.)
This book is a lurid account of five political assassinations in Asia
during the past twenty years. It is a reprint of articles previously
serialized in the nominally independent Indian leftist weekly, Main-
stream (circulation, 4,000). It cannot be treated as a serious work.
What we can discern of the motives behind such a publication may,
however, he of some interest.
L. Natarajanan is a pen name of Nikil Chakravarty, an Indian
Communist Party member for more than 30 years. An Oxford Uni-
versity student in the 30's, when he joined the British Communist
Party, he had personal acquaintances among India League and
Congress Party leaders that have stood him in good stead over the
years. The first fifteen years of his party work were devoted to "com-
bining legal and illegal activity"; he was a party journalist and, when
occasion demanded, a wartime member and later (1948-50) a leader
of the clandestine technical apparatus of the CPI, under various aliases.
From 1952, when he wrote American Shadow over India for the
party press, his career followed a different course. Aligned with
Ajoy Ghosh, the new Secretary-General of the party, he was used in
party contacts with Soviet Bloc embassies, and eventually became
head of the India Press Agency, a Communist Party "news" outlet
created with Soviet financial backing. After Ghosh's death he moved
away from open association with the party but strengthened his rela-
tions with the Soviets, who also financed the establishment of Main-
stream. At one point in 1959-60, it was reported that he was taking
on "counterintelligence duties" with Americans as his target, when
the party took new steps to create a secret mechanism. What is known
is that he has for 'several years published numerous articles on CIA
in Asia in various outlets, virtually all of them elaborate fabrications.
The first case treated is the assassination in 1947 of General Aung
San, the leader of the nationalist Executive Council that governed
Burma in the first post-World War II period, and the subsequent
execution of the organizer of his assassination, U Saw. The second is
the murder in 1949 in South Korea of Kim Koo, a leading political
opponent of then President Syngman Rhee, and the third the shooting
in 1951 of Liaquat Ali Khan, Prime Minister of Pakistan. The last two
cases are those of Ceylonese Prime Minister Bandaranaike who met
MORI/HRP
from pg.
124-126
Apph3led For Release 2005/01/26 : CIA-RDP7aMtlaSISASSI03D60.10008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A0000001.0008-4
Recent Books oFFIcIAL USE ?Nay
violent death at the hands of two Buddhist monks in September 1959,
and of the Japanese Socialist Party leader Asanuma, stabbed at a pre-
electoral meeting in September 1960.
Soviet apologists and agents of influence have special problems
in dealing with the question of political assassination. One difficulty
is, as Khoklov and other Soviet defectors have stated, that the USSR
has resorted to assassination for many years, although mainly of
political ,oppositionists who fled from Soviet territory. In this book
the author addresses another problem, the fact that not all victims
of political assassination operations attributed to the imperialists can
be identified as simonpure fighters against capitalism and imperialism.
The central idea appears to be that the British and the Americans
use political assassination against erstwhile puppets, a theme which
is consistent with Soviet efforts in the CENTO, SEATO, and OAS
treaty areas to drive wedges between the US and cooperating political
leaders. In the Burmese case, it is U Saw, the organizer of the assas-
sination of Aung San, who is betrayed by his masters. An interesting
sidelight in this case is the fact that the Soviet Union, in its attack in
early 1969 on the Chinese and their Southeast Asian puppets,
claimed Aung San as the leader of the "good" Burmese Communists
at the end of World War II, whose death made it possible for
Maoist sectarians to break up the Anti-Fascist People's Freedom
League, thus playing into the hands of the imperialist enemy.
In the Korean case, the Americans are cast as the villains behind
both the elimination of Syngman Rhee and the death of his opponent,
Kim Koo. The idea that no Korean should trust the US is reiterated.
The stream-of-consciousness account of Syngman Rhee's thoughts sug-
gests that the author of the piece?Indian or Soviet?has found a
way of communicating with the spirit world.
The Pakistani case is built around a supplementary theme used in
Soviet wedge-driving?that the British and Americans will use any
means necessary against each other in their struggle for colonialist
hegemony, and that their failures to expose each other's crimes arise
in the last 'analysis from the fact that they are tied together by their
crimes. Apparently the person who inspired this piece believes in the
validity of the old Nechayev principle of conspiracy, that the best way
of making a fellow conspirator reliable is to lead him to commit a crime
and to hold the knowledge of his guilt over his head.
ApprgifaiAl* NA6a2tliS05/01 / 26 : CIA-RDP78T03194A000300H05008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
OFFICIAL USE ONLY Recent Books
The case of "Sword" (S.W.R.D.) Bandaranaike, again suggests the
theme that a collaborator will be liquidated if he begins to see the
error of his ways and to move away from his subordination to the
imperialists. Again Anglo-American mutual jealousy and mistrust is
woven into the story along with the idea that an agent shared between
the two may be the local villain of the piece.
In the Japanese case, which in one or two places also suggests either
spirit-world sources or a penetration in the US Embassy in Tokyo,
the book again plays on the theme of an assassination as a sequel to
an unsuccessful American effort to influence a political group, in
this instance, the Socialist Party of Japan.
Neither the "facts" presented, the professional ability of the writer,
nor the interpretive analysis of why these assassinations were neces-
sary to the US and Britian are likely to have impact even in India.
They are, however, useful for Indian Communists who need a ration-
alization that can be acceptable from a Marxist-Leninist point of
view for the fact that the opponent they condemned yesterday as an
imperialist puppet may be today's forgotten man, as far as the "im-
perialist beast" is concerned. Some erstwhile friends of the West in
South Asia who turn against the US or Great Britian also may find
the stories handy polemic aids when they cannot frankly explain
to their associates why they have turned toward the USSR.
Apprb24d For Release 2005/01/26 : CIA-RDP7M094A056366111111008-4
25X1
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4
Approved For Release 2005/01/26 : CIA-RDP78T03194A000300010008-4