STUDIES IN INTELLIGENCE [Vol. 17, No. 2, Summer 1973]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000400010006-5
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
88
Document Creation Date:
December 16, 2016
Document Release Date:
December 2, 2004
Sequence Number:
6
Case Number:
Publication Date:
January 1, 1973
Content Type:
IS
File:
Attachment | Size |
---|---|
CIA-RDP78T03194A000400010006-5.pdf | 5.74 MB |
Body:
25X1
Approved For
SUMMER 1973
CENTRAL INTELLIGENCE AGENCY
VOL. 17 NO. 2
AR.CHNAL RECORD
PLEASE 1tETU1tN TO
25X1
~
AGENCY ARCHIVES,
1518
Approved For Release 2004/12/16 :CIA-RDP78T03~94A000400010006-5
Approved For Release 20q
SECURITY PRECAUTIONS
Materials in the Studies are in general to be reserved to US per-
sonnel holding appropriate clearances. The existence of this journal is
to be treated as information privy to the US official community. All
copies of each issue beginning Summer 1964 are numbered serially and
subject to recall.
25X1
25X1
All opinions expressed in the Studies are those of the
authors. 'they do not necessarily represent the official
views of the Central Intelligence Agency or any other
component of the intelligence community.
WARNING
This material contains. information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Secs. 793 and 794, the transmission or revelation of which
to an unauthorized person is prohibited by law.
25X1
WARNING NOTICE
SENSITIVE INTELLIGENCE SOURCES
AND METHODSINYOLVED
25X1
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Rel - T03194A000400010006-5
STUDIES IN INTELLIGENCE
EDITORIAL POLICY
Articles for the Studies in Intelligence may be
written on any theoretical, doctrinal, operational, ar
historical aspect o f intelligence.
The final responsibility for accepting or repecting an
article rests with the Editorial Board.
The criterion f or publication is whether or not, in the
opinion o f the Board, t/ie article makes a contribution
to the literature of intelligence.
EDITORIAL BOARD
HUGH T. CUNNINCHAM, Chairman
RICHARD LEHMAN LAWRENCE R. HOUSTON
BRUCE C. CLARAE, JR.
WALTER L.- PFORZHEIMEA
Additional members of the Board are drawn from
other CIA components.
25X1
Approved For Release 2004/12/16 :CIA-RDP78~03194A000400010006-5
25X1 gpproved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Next 1 Page(s) In Document Exempt
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
25X1
CONTRIBUTORS TO THIS ISSUE
25X1
Lt. CoI. James Murphy and Dr. K. Wayne Smith were both members of the
National Security Council Staff at the time the speech was delivered.
25X1 veteran Agency word-watcher, autopsied some of the
more elegant examples in our first issue of 1972. The flow has apparently
not slackened in the meantime.
25X1
ho delves into U.S. intelligence history, is ni the Office of
25X1
Approved For Release 2a
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONTENTS
Page
The Studies in Intelligence Awards ..................................... iii
Making Intelligence Analysis Responsive to Policy Concerns .............. 1
Lt. Col. James Murphy and Dr. K. Wayne Smith
A request from the consumer.
Liaison Training ...............................
Trials, tribulations, and some lingering doubt'
Elegant Writing: Report Number Two .......... .
The pen is sometimes flightier than the words.
Donovan's Original Marching Orders ............ .
How it all began.
7 25X1
25X1
Intelligence in Recent Public Literature ................................. 71
25X1
Approved For Release 2004/12/16 :CIA-RDP78T03194AOOp400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040D>71~OD06-5
A request from
the consumer
MAKING INTELLIGENCE ANALYSIS RESPONSIVE
TO POLICY CONCERNS
Lt. Colonel James Murphy and Dr. K. Wayne Smith
Should the intelligence analyst stay aloof from dssues that ~ seize
the policy makers he supports? .Here are two users o f finished intelli-
gence, both former members of the National Security Council staff, who
say "no:' They collaborated to write a speech on this theme which Col.
Murphy delivered be f ore a gathering o f intelligence o f f icers '(the Intelli-
gence Forum) in May 1971. An abridged text of the speech follows.
Let me begin with some observations about intelligence support :for the
preparation of National Security Study Memoranda-NSSMs for short. This
process is a systematized procedure by which the President directs the attention
of the bureaucracy to national security issues in which he has an interest or
needs to make a decision. It is a means of mobilizing the intellect and energy
of the government and focusing them on major foreign policy issues.
The personnel and informational resources needed to address these issues
are abundantly available. within the government, but they tend to be fragmented
among the various agencies including the intelligence community. The infor-
mation and expertise required for rational decision making are interagency in
nature. No single department or agency has a corner on the foreign policy
market, and that goes for the intelligence input as well.
Moreover, the NSSM process gives those who have the responsibility for
implementing and supervising the execution of foreign policy an opportunity
to participate in the formulation of those policies. And I need not remind you
that good intelligence information is essential, not only for making sound policy
decisions, but also as an essential ingredient for judging the performance of policy.
The NSSM process is founded upon several principles which have a direct
bearing on the intelligence response. The first is creativity. In a world of on-
rushing and complex change, we cannot be content with familiar ideas, or assume
that the future will be merely a projection o# the present and the past.
In March 1971, when the President wanted an analysis of the impact of
LAMSON 719 on the North Vietnamese logistic capability to support various
types and levels of warfare against South Vietnam in the fixture, we found that
the currently available intelligence data on supply flows was simply iriappro-
priate to measure the capabilities of the enemy. The data had been structured to
portray the magnitude of the enemy effort in terms of tonnage, and the results
of our interdiction operations in terms of truck kills, but without relation to the
effects on future levels of enemy activity.
Within the NSC Staff, a new analytical format was created by which the
existing data could be structured to indicate the implications for North Viet-
namese military capabilities. The CIA took this new analytical format and pro-
MORI/HRP
from pg.
01-06
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET Responsive Analysis
duced an outstanding study that was of direct use to the President in assessing
the significance of LAMSON 719 and assisted him in making policy decisions
concerning our future role and presence in Vietnam.
We have found in the NSC system that the initial :focus on the broader
questions of national objectives and purposes stimulates discovery of new per-
spectives, and produces innovative approaches to the specific issues involved.
I urge you to resist the strong temptation to fulfill the immediate demands of the
moment with familiar standard operating procedures. Rather, reflect upor~ the
issues in their policy context to determine the logical relationships between the
informational requirements and the issues, and then decide what information
needs to be presented and how.
1"he second principle o f the NSSM process is the quest for accurate, complete,
and relevant factual information. Too often the process of policy making has been
impaired or distorted by incomplete information and by disputes within the
government which resulted from a lack of common appreciation of the relevant
facts. It is an essential function of the NSSM process to bring together all of
the agencies of government concerned with foreign affairs to elicit, assess, and
present to the President and the Council all the pertinent knowledge available
and necessary to make policy that is thoroughly grounded in, and relevant to~, the
facts. It is on this rock that the intelligence community sometimes founders.
information is your stock and trade, and the inventory is jealously guarded
and highly regarded by several proprietors. Sometimes, the search for :facts
degenerates into a squabble about who is right, rather than what is right. ][ see
enough documents from various intelligence agencies to know that rarely does
any one agency possess all the revelant facts. Indeed, it would seem to me that the
structure of the intelligence community is such that no one agency could possibly
have all the facts. However, even with this conceded, I still hear disputes about
who has the better information, and invariably each proponent claims than his
data are best. The assessment of LAMSON 719 turned at one point into just such
a hassle. The President, for whom we all work, couldn't care less about whether
one agency's or another agency's sources are better truck counters. The agencies
involved could have served the requirements of policy making better if they
had analyzed their own information for trends and sought to establish meaningful
correlations and ranges of estimates encompassing both types of data. .
It took some methodological head knocking, but we were finally able to
focus on what was right rather than who was right, and this was done by com-
bining intelligence resources into meaningful patterns and relationships conducive
to policy making. I realize that intelligence producers suffer peptic ulcers when-
ever they're asked for "the facts:' It is in these moments that they have to be
honest with themselves about the reliability of their sources, and the accuracy
and completeness of their information. Usually, the pieces of informatior,~ far
outnumber the assured facts.
`l'he phrase "true facts" is neither a linguistic nor logical redundancy to in-
telligence officers. Certainly policy makers, however, cannot "wait until all the
facts are in." That is the job for the historians among your grandchildren. The
challenge to intelligence is to be able to see through the glass darkly, here
and now.
'I"he intelligence community has a natural and understandable inherent
conservatism, sometimes bordering on reluctance to commit itself to decIlara-
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Responsive Analysis SECRET
tions of fact. Indeed, a private jargon, little understood by the consumer, hedges
such statements. Estimated, believed, probably, possibly, may, and rr~ight are
examples of this special vocabulary. In fact, it reminds me of one of the first
meetings I attended in the Pentagon where I heard a distinguished Assistant
Secretary of Defense stand up and pound the table to insist that might was too
strong a word to use in a particular sentence under discussion! I don't know
what is weaker than might. But the policy maker must make decisions in a con-
text of nebulous visibility. The intelligence community must do all it can, even
at the occasional risk to its own credibility, to give the decision maker as much
clear insight as possible into the facts, and to make clear the hedges, risks,
and. consequences of error. Too often, the hedging seems self-protective, rather
than informative. And it is just as important for the intelligence community to
be forthright in identifying what we do not know, and. to assess the consequences
for policy of this ignorance. Risk and uncertainty are the environment of policy
making, and the intelligence community must share and seek to relieve some
of this burden. The "true facts" are that impossible dream. But relevant in-
formation and a rational, objective assessment of it remain the most essential.
intelligence responses to the NSSM decision-making process.
A third principle of the NSSM process is the provision of a full range of
feasible options. The President's leadership cannot consist merely in being con-
fronted with a bureaucratic consensus that leaves him no option but acceptance
or rejection of a single proposal, without any way of knowing what alternatives
exist. The NSSM system is designed to ensure that clear policy choices reach
the top so that various positions and alternatives can be debated fully. The
NSSM system ensures that all agencies involved receive a fair hearing before
decisions are made. Interagency participation begins with the working. groups
that draft the papers and continues right up through the review process, all
the way to the National Security Council itself. Legitimate alternative positions
reach the President without dilution. Differences are clearly identified anal de-
fended, rather than being. muted or buried in bureaucratic waffle and log rolling.
These features give the President confidence that his choices are genuine,
and enable him to put his own stamp on policy by the act of decision. I commend
to you this principle of a full range of options in the intelligence response to
the NSSM process. Much of the intelligence we all deal with is subject to varying
interpretations. It is not sufficient simply to forward information. The informa-
tion must be assessed and interpreted. We're all seasoned bureaucrats and well
aware of the pitfalls of bargaining for consensus. But differences of view are
legitimate, and the President should be aware of them and the impact on his
options for choice. Certainly where agreement is possible, it should be so stated.
But the ambiguity of many of the so-called facts leaves large openings for
varying but reasonable interpretations.
The significance of data to the policy maker must be made clear. The NSC
should be able to rely upon the intelligence community for these interpretations.
Moreover, the NSC should be made aware of differences and the reasons for
them. It is not enough simply to point out that disagreements exist. They must
be explained, not only in terms of the substance, but also in terms of the im-
plications for policy choices. If the intelligence community avoids this respon-
sibility, then others will move in to fill the vacuum.
Approved For Release 2004/12/16 :CIA-RDP78T03194A0004000100(~-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET F!esponsive Analysis
For years, the National Intelligence Estimates had epitomized this problem.
They hid as much as they revealed, if not more. In 1971, v~~ith some gentle but
persistent prompting by the NSC staff, some of the NIE's were truly outstanding,
particularly with regard to strategic forces. One reason is that these alternative
assessments and the areas of controversy were explicitly stated with accom-
panying rationale. This new feature has resulted in a quantum jump in the
value and utility of the NIE's for the policy maker. Reasoned alternatives give
the President a basis for rational choice, rather than intuitive chance, in his
policy decisions.
Crisis anticipation is the fourth principle of the NSSM system. The better
prepared we are in terms of foreknowledge and options, the more we can be
the master rather than the slave of events once a crisis breaks. Certainly, we
cannot anticipate fully the timing and course of a possible crisis. But we .can
take actions to help ensure that we have asked the right questions in advance,
that we have developed and explored our options, and have thought through
the implications of alternative responses. The intelligence community is often
the first to receive the tentative signals of impending crisis. While one flower
does not make a spring, its appearance should not simply be marked by a foot-
note. 'The intelligence community should develop a discriminating instinct for
crisis. I should add that this instinct should not be reined in by institutional
biases and values which dull the senses and force-fit data into preconceived
patterns.
I remind you of the Czechoslovak crisis and how stunned many were when
i# turned out to be something more than just another round of summer rna-
neuvers. 'his delicate instinct for crisis requires that the intelligence producer
have a reporter's nose for the news. He must be policy-oriented, be free to state
his opinions with their rationale, and not be constrained simply to writing copy
to fill out a daily bulletin. The intelligence producer must be .more than amiddle-
man between the collector and the consumer. He must evaluate his raw material,
assess the significance, and relate it to policy.
A fifth principle of the NSSM process is systematic anclysis. Policy cannot
be allowed to be merely the result of ad hoc piecemeal tactical decisions forced
as kneejerk reactions to the immediate pressures of events. A policy must be
considered in the whole context of the situation and our national interest. The
interagency nature of the NSC system assures that all relevant aspects o:F a
problem are considered in formulating policy choices.
Now. analysis is a systematic way of thinking, a manner of approaching
problems in an innovative, thorough and objective way. It requires the orderly
juxtaposition of facts and values in order to make reasoned judgments in decision
making. Analysis is not an occult science that produces immutable truth. It
is more of an intellectual art that seeks to illuminate problems and sharl,en
judgment. I will be the first to concede, on the basis of several years of painful
experience, that even good analysis does not necessarily bring on right decisions.
But I'm willing to take my chances that a decision rationally arrived at is more
likely to be right than an irrational one. Let me hasten to add that analysis does
not solve problems itself. It is not a substitute for imagination, leadership, or
wisdom. Tt brings out the bad news as well as the good. It does not make de-
cisions for you. But it does serve to discriminate between choices, separating
the knowable from the unknowable, the better from the ?worse, the patently
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Responsive Analysis 5ECRET
wrong from the approximately right. The decision maker is thereby able to
focus his attention on the issues requiring the application of his experience
and values and the exercise of his judgment.
I sometimes- fear that the intelligence community shortchanges its own
analytical efforts and shuns participation in such efforts on an interagency basis.
Too often the so-called intelligence input is simply a dry catalog of information
lacking focus on the policy matters at issue. While the intelligence community
is not charged with makinb policy, it does have the responsibility to participate
in policy making. This responsibility does not stop with the mere reportage
of the estimated facts. The intelligence input should include an analysis of the
data in relation to policy options. That the intelligence community is capable
of providing these analyses oriented to policy making has been amply demon-
strated in its contribution of the NSC Verification Panel's work in preparing
the SALT negotiating options.
The most crucial area for intelligence analysis is in the muddy field of
enemy intentions. The usual response is to sidestep the issue, with the claim
that the intelligence analyst can only provide assessments of capabilities. Capa-
bility analysis is essential to policy snaking, but someone has to make an edu-
cated guess as to intentions. It is not enough to know what the enemy could
think. What he is more likely to think is even more important to the policy maker.
Analysis offers a systematic and rational method for seeing through that glass
darkly-even if only with one eye in a fog.
Finally, the IVSSM system provides a means by which. policy implementation
can be reviewed, coordinated, and supervised. Once more, the intelligence com-
munity can provide some of the eyes and ears to detect the progress of policy
implementation and the pitfalls and dangers that loom up along. the way. It is
false to claim that these are the tasks of the so-called "operators"-that the in-
telligence job is done when the policy decisions are made. The intelligence
function carries through the entire policy process from inception to conclusion,
which includes monitoring implementation.
Once again, too, this rnonitorship needs to be conducted with at least one
eye on the effect for policy. You must be not over-fascinated with information for
its own .sake. To be useful, information must be related to policy-past, present,
and future.
In summary, the intelligence response to the NSSM process has been a
reflection. of the strengths and weaknesses of the intelligence community itself.
In general, responsiveness in providing needed information has been good, though
prodding has sometimes been required to elicit that information in a form more
meaningful to the decision maker. I would say that the greatest improvement
needed in the intelligence community is for it to begin anticipating the needs
of the policy makers, and to take the initiative in providing information structured
to these needs.
Let me illustrate)
The other day I sat in an intelligence briefing on the results of some recently
acquired information. A fellow NSC policy analyst in the audience told the
briefers that over the past six months the intelligence community had been re-
porting agreat number of discrete bits of information regarding the quantita-
tive increase of the Soviet presence in Egypt. He reminded the briefers that
the Arab-Israeli confrontation was still a matter of national security interest,
Approved For Release 2004/12/16 :CIA-RDP78T03194A0004000100~16-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET Responsive Anc-lysis
that there was at least continuing talk of possible agreements, and that U.S.
interests were involved. He suggested that, in light of the disconnected informa-
tion flow, it was about time we had an analytical summary that would bring
us up to date on the situation and reveal the implications for our policy. The
intelligence officer's supervisor was there and he agreed that this was "a good
idea" and that he would "see about doing it." Ladies and gentlemen, that ";good
idea" should have come from the intelligence community itself l
You read the newspapers. You know the issues. But do you see your oppor-
tunity? Expand your vision. Relate intelligence information and .requirements
to the needs of the policy makers. Don't ask me what is my need-to-know. Ask
yourselves instead what needs to be known. Analyze the issues! Analyze your
information) And analyze the meaning of the information in terms of policy
implications.
In conclusion, the principles of the NSSM process-creativity, factual in-
formation, afull range of options, crisis anticipation, systematic analysis, and
policy implementation-are good principles for gauging the intelligence re-
sponse. Iwas asked to say what was "wrong" with that response. I have given
you my views on how you can strengthen that response and magnify the value
of your essential contribution to the decision-making process. I want to finish
by saying that I already see many indications that the intelligence community
is aware of these problems, and that the kinds of actions I have recommended
are being taken.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET
Military secrets in
an open society
Known to the intelligence community simply as the "Yale Report" is a
document of 627 pages whose proper title is Estimates o f Capabilities o f the
United States Combat Forces in Being [as of] I September 1951. In a way, it
was' a special sort of National Intelligence Survey of gross order of battle of
the U.S. military services in the early days of the Korean war. But to be more
explicit without some necessary background is likely only to add confusion to
that which these two lead sentences have initiated. Let me begin at the beginning.
There were many trials in the early days of the National Intelligence Esti-
mate-none much stickier than a reluctance on the part of our colleagues from
the service intelligence organizations to deal in what they called the "intentions
of the enemy." The most senior and often most articulate of the military repre-
sentatives who came to coordinate the NIE's had absorbed the old service doctrine
which held that a G-2 did not handle the matter of intentions-that this was
the Commander's job. I'm sure readers of this publication are familiar with the
doctrine and its rationale; in any case this is no place to rehearse it. Be it said
that our Director, General Walter Bedell Smith, whether or not he knew of
the doctrine, did not want it applied in the NIE's and indicated to us of the Office
of National Estimates that an NIE on the military stance of ?the USSR would
riot be complete until we had given the reader our best thoughts on how it
was likely to use its vast military apparatus.
NIE 3, published 15 November 1950, is entitled Soviet Capabilities and
Intentions, and the appearance of that word in the title was in itself no small
tribute to General Smith's powers of persuasion. The text of the paper skirted
the subject with a permissible discussion of "courses [of action] open to the
Soviet government," which on balance was about as far as a prudent man would
wish to probe into probable intentions.
Less than a year later (2 August 1951) the second NIE on the Soviet Union
went to press under the title Probable Soviet Courses o f Action to Mid,1952.
Here again there was among our military colleagues a desire to fight the problem,
and one suspects that had the estimate not been laid on by the Intelligence
Advisory Committee (the precursor of the USIB ), its completion might have
surpassed our powers. As things stood, the compliance which was accorded IAC
requests was not of the sort which made for an imaginative appraisal of possible
or probable strategic thinking in the Kremlin.
Matters became really difficult when the estimating machinery was asked
for an NIE on the "Likelihood of a Soviet Attack upon Japan:' If one were to
play this out according to the letter of old military intelligence doctrine, one
would reply with adead-pan listing of Soviet military strengths-in-being in
the Far East and some paragraphs on the logistic problems of their reinforce-
ment from garrisons in the West. That such a paper would be wholly nonrespon-
MORI/HRP
from pg.
07-21
Approved For Release 2004/12/16 :CIA-RDP78T03194A0004000100~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
live to the request apparently seemed to some of our colleagues a far less heinous
offense than getting into the business of Soviet intentions. hurthermore, to write
of these intentions as affected by Soviet knowledge of U.S. farces then deployed
in the Far East was to compound the heresy. To them, the entire matter of
"own forces" was not any part of the business of intelligence, and even though
"own forces" stationed in occupied Japan obviously constituted a major :item
in any Soviet calculations of the attackability of japan, we were supposed to
shut our eyes to the fact. Any reluctance on our part so to do merely under-
scored the impropriety of undertaking the NIE.
As the reader will have perceived, these were the hard days in the life of
the national estimators.
What's the Soviet Estimate o f the United States?
There were those on our side at our coordination sessions who in oral argu-
ment would try to make points by imagining out loud how the Soviet leaders
were estimating probable future developments in the policies and defense atti-
tudes of the United States government. Their plan and hope was that in trying
to depict the U.S. as they thought the Soviets would see it, they would stimulate
their inhibited colleagues into thinking and talking and ultimately writing what
they thought to be the likeliest lines of Soviet policy. If they could not be stifmu-
lated into positive action, at least they might be edgecl away from sinnple
obstructionism.
To the end of getting a discussion started, William Langer, the first director
cif the Office of National Estimates, took an oblique but nevertheless praise-
worthy approach. On 5 June 1951, he wrote a memorandum to CIA's Projects
review Committee (the institution which, among other things, passed on ap-
plications for funds for tasks to be done outside the Agency on a contractual
basis). Mr. Langer's statement of the problem read as follows:
ivlany National Intelligence Estimates deal with the probable intentions of the
Kremlin. It may be assumed that in deciding upon a course of action, the Kremlin is
influenced by its estimate of the U.S. power available to counter that course of
action and by its estimate of how U.S. policy makers are likely to use that power.
An NIE nn the intentions of the Kremlin cannot be written without ONE's having
ari estimate of the Kremlin's estimate of U.S_ capabilities and intentions. To procure
such an estimate is the problem.
l:n the next paragraph Mr. Langer indicated his requirement for an imaginary
Soviet estimate of U.S. military forces in being as of 1 September 1951, and
:mother such estimate regarding probable U.S. intentions with respect to the
world situation. He stressed the desirability of having they work done outside
the Agency and noted that informal enquiries had already indicated that a
group at Yale and perhaps another at Columbia could do the work during the
summer vacation. What they would turn up without access to classified materials
would have the virtue of showing what the Soviets could ,learn about the U.S.
with minimal intelligence effort.
The project received the committee's blessing, and with the end of the
academic year a group was organized in New Haven under the supervision
of a senior member of Yale's department of history, William H. Dunham. He
+?ecruited 15 peop]e from six departments of the university in addition to history:
i~iology, chemistry, classics, English, mathematics, and physics. All were trained
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
researchers who already knew how to use a great library and who were quick
to adapt their general professional competence to the new and strange require-
ment. Afew of them, notably Basil Henning and Archibald Foord, had had intel-
ligence experience with the Navy during the war, and had a feel for the subject
matter and the need for spare factual prose. They and the rest of the team got to
the task in late June, and with a total outlay of 99 man-weeks of labor wound
it up as of 1 September 1951.
The U.S.: an Open Book
Confining themselves to unclassified printed materials fully within the
public domain, they uncovered what to us of the intelligence calling was a
bewildering array of factual information about the size and composition of the
U.S. military establishment, about major military units, their organization, train-
ing, state of readiness, and their weaponry and its performance characteristics.
In short, what they found out and wrote down in 10 weeks' time was a good deal
more than a very promising start on the military chapter of a National Intelligence
Survey on the United States.
The section devoted to the army, for example, totaling some 120 pages with
its appendix, begins with paragraphs on the state of mobilization, the army
field forces, continental commands, overseas commands, tactical organization
of the regimental combat team (the smallest unit under scrutiny) , the division,
corps, field army, and army group. The bulk of the material presented is devoted
to the order of battle of army units of the Zone of the Interior, Far Eastern
Command, ground forces in Europe, and other overseas commands. In the
appendix, the structure of divisions and RCT's in combat in Korea is cited down
to the level of specialized companies, along with their tables of organization and
equipment. The final pages are devoted to the geographical whereabouts of
a strange mix of some 251 army units ranging from the First Infantry Division
in Darmstadt and the Seventh Infantry Division in Korea to the 8111 AU signal
service in Okinawa and the 764 AAA gun battalion in the Canal Zone. For all
of them there is an APO number.
The dozen and a half pages devoted to army weapons hit the high spots of
the new automatic small arms and machineguns, mortars, recoilless rifles, artillery,
tanks, liaison aircraft, and helicopters.
In the pages on the Navy (about 80) , there is a listing of the civilians
and admirals in charge of the Navy Department in Washington, in the Naval
Districts, of the Atlantic Fleet, Naval Forces Eastern Atlantic and Mediterranean,
and the Pacific Fleet; there is a summary paragraph on overall manning strength;
and a section on ships in commission which includes, in addition to the larger
ships, destroyers, submarines, and destroyer escorts. (There was no effort to
enumerate minesweepers, patrol vessels, and so on.) After one section devoted
to ship modifications (notably of carriers to handle heavier aircraft) and another
to construction of new ships, there comes a long treatment of the naval air arm.
Here are discussed the then nine classes of combatant air units, with notations
about the types and numbers of aircraft in each, along with a good deal of
information about their deployment on carriers and shore stations.
Among the units one finds a note about Heavy Attack Wing 1 which the
report correctly assessed as the Navy's first component capable of delivering
the atomic weapon. (This was a datum to which the Navy had assigned a
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040001000~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
justifiable secret classification.) Then comes a round-ups of Marine Corps
aviation. There are appendixes devoted to the performance characteristics of
the planes being operated by both Navy and Marine Corps. The paragraphs
devoted to deployment of major ships, by class and name, to the Atlantic, "Medi-
terranean," and Pacific Fleets are followed by a discussion of principal naval
bases and naval air stations and facilities, a discussion of new weapons, and
development in undersea warfare. The launching of the :First nuclear-powered
submarine (well-publicized, to be sure) is noted.
Air Force Section Bulkiest
The section on the Air Force is the bulkiest (222 pages) . As with the
passages on the Army and the Navy, this one begins with the table of organza-
tion, both civilian and military, at the headquarters in Washington and at the
principal air commands within the continental U.S. and overseas. Then comes
a discussion of the 95-wing Air Force which, at that time, ,vas the strength to-
ward which the service was endeavoring to build, a discussion of numbers and
types of aircraft, the brief pages on personnel, a rather full treatment of the
13 commands in the Zone of the Interior-notably the Strategic Air Command,
'Tactical Air Command, and the Air Defense Command-arid the five overseas
commands. Then comes 100 pages about the aircraft: the operational inventory,
production and production schedules, and performance characteristics of bomb-
ers, fighters, transports, helicopters, trainers, liaison, and experimental models.
The report's final 150 pages come in five sections, one each devoted to
weapons (26 pages ), electronics (31 pages ), Atomic Warfare (12 pages ),
Biological Warfare (39 pages ), and Chemical Warfare (42 pages) . Of these
the one dealing with atomic weapons, in ~~hich the authors attempted to pene-
trate the country's first-ranking secret-thz size of the nuclear stockpile-and
those dealing with CW and BW seemed offhand the most dramatic.
Tlie Atomic Warfare section takes off from the official report of Henry D.
Smyth and estimates the U.S. stockpile of atomic bombs to lie between 600 and
2400, with the favored number about 1500 bombs of the Hiroshima yield (20,000
tons TNT equivalent) .
In the C W pages, due consideration is given the U.S. government's activities
in "producing and perfecting" the new nerve gases as well as continuing to
carry in inventory mustard, lewisite, phosgene, and others of World War I fame.
The extensive section on BW lists seven laboratories (under government
supervision) which were engaged in BW research and seven others (all asso-
ciated with private or state universities) which were doing }3W-related research
under government contract. Next comes a table occupying three pages which
lists the bacteria, viruses, and other pathogens in the arsenal or under con-
sideration, along with their targets (man, domestic animals, plants) and favored
methods of delivery. This is followed by long discussion of individual pathogens:
botulinus, tetanus, the organisms producing pneumonic plague, glanders, tu-
Iaremia, brucellosis, anthrax, and a group of specific viruses and rickettsiae.
Throughout, the need to know about such things for defensive purposes is
recognized, but the main thrust of the report is the U.S. concern with these
biological weapons as an offensive weapon. One cannot escape a feeling that
the U.S. had developed and was retaining a very considerably capability in this
field.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
To come back to the origin of the whole project: one would be justified
in assuming that the Soviet leaders had very precise notions as to the inventory
of U.S. foxces in being at the end of 1951, and were in a position to make con-
fident estimates as to the capabilities of those forces in any of several possible
war situations. How the Soviet leaders estimated U.S. intentions-which was
part two of the project-became a doubly stillborn exercise.
As matters turned out, it was much more difficult to obtain the services
of outside Sovietologists who would play at writing the Soviet estimate of
probable U.S. courses of action than of lining up a group like that at Yale.
We did enter arrangements for the "Intentions" study and furnished the authors
with a copy of the capabilities study just discussed, but the result was a dis-
appointment. It may have been that we had set our sights a bit too high. In the
end, it did not make all that amount of difference.
In the first place General Smith's concern to have National Intelligence Esti-
mates wrestle with the imponderables of an adversary's probable intentions,
which was forcefully communicated to his colleagues on the Intelligence Advisory
Committee, began to filter down to the troops, and the resistance we had met
in the early days began to melt. To our considerable surprise we were able for
example to finish the estimate of the likelihood of a Soviet attack upon Japan
with no more than the normal pains of doing coordinated speculative intelligence.
So by the time the Yale Report was in, reproduced in suitable quantity, and
ready for distribution, with the "Intentions" paper close behind it, they main
reason for the exercise had largely disappeared.
But this was by no means the end of the matter, and the use to which the
Yale Report was soon put was one which, to say the least, we had not anticipated.
This all began when General Smith received a very cursory and preliminary
briefing. The occasion was social-our director was having a small gathering
to honor some foreign colleagues. Over in a private corner of the room he asked
me of the progress of the work at Yale. I told him that the report was already
in, that I had rapidly gone over the conclusions with Mr. Henning on the
basis of which I would hazard two guesses: (a) that there was in the public
domain enough information to piece together an all-but-complete gross order
of battle of U.S. forces-in-being, and (b) that the voluminous study which
the Yale group had written was probably about 90 percent correct. I can only
guess that it was General Smith who conveyed the gist of my xemarks to Presi-
dent Truman, but of one thing we may be sure and that was that Mr. Truman
had got the word.
He got it just about the time he was working on a new Executive Order
aimed at giving greater protection to certain categories of classified information.
At the top of his list of secrets to be safeguarded were those concerning the
U.S. military, but he also recognized that the State Department, the FBI, and
the CIA also produced and disseminated material of similar sensitivity. On 24
September 1951 he issued an Executive Order (Number 10290) which set the
new pattern for safeguarding of these materials, a class of .stuff which was to
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040001UD06-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
be known as "security information." Paragraph 4 of the order undertakes a short
{and not wholly satisfactory) definition of the material at issue:
t;lassified security information. The term-as used herein-means official in-
formation, the safeguarding of which is necessary in the interest of national security
:ind which is classified for such purpose by appropriate classifying authority.
What the order was trying to get at was a separation of all classified govern-
ment utterances into two categories: those which directly affected the nai;ional
security-such things as intelligence, sensitive areas of international relations,
but especially military matters of an operational nature--and those which dealt
with other things. It was the President's intention to give tl~ie first broad category
the benefit of special protection. Needless to say the American press was fearful
of the consequences of the order and let its fears be known. Mr. Truman went
nut to meet it in his press conference of 10 days later.*
He started by reading a statement which began: "There has been considerable
misrepresentation and misunderstanding of the Executive Order issued on Sep-
tember 24, 1951, relating to the handling of information whaich has been classified
in order to ,protect the national security." At this point he interrupted himself
with an acl Zib. He said: "And right here I want to stop and tell you that
Central Intelligence had Yale University make a survey, and that survey found-
and they had no connection with the Government that 9?i percent of all of our
information was public: property."
Iie then continued with a close but not verbatim rendering of the document
before him until he got to its end when he added: ".. ,and remember that 95
percent of our secret information has been revealed by newspapers and slick
magazines, and that is what I am trying to stop:' **
The newsmen had awaited the question period with breath abated. When the
time came {and it came immediately after the sentence quoted above) the first
request was "Can you give us some examples of what caused this order?" Mr.
'I'ruman's answer began with reference to an article in Fortune magazine vvhich
had published a diagrammatic map showing seventy-odd places in the U.S.
where one or another phase of the atomic energy program was going forward;***
he then took up some aerial photographs of principal American cities ''`with
arrows pointing to the key points...." Naturally the newsmen were soon politely
asking about the impropriety of publishing information which had been released
by the Department of Defense or cleared by the Atomic Energy Commission,
or, as in the case of the air map of Washington, by the "Civil Defense Ac(min-
istration." After an unremunerative exchange, the conference came back to the
Yale Report and once again the President reiterated his sentence with the "95
percent' in it. In answer to the question "How far did this Yale Survey figure
*Mr. Truman came to the conference of 4 October 1951 with a mimeographed hand-out.
In his presentation he not only made some verbal departures from its text, but also interpolated
some trenchant ad fibs. T'he result is that comparative rarity, two slightly different official
texts. One is what Mr. Truman actually spoke, to be found in Public P?pers o f the Presidents
r>f the United St?tes: Harry 5. Truman, vol, for I Jan. to 31 Dec. 1951 (GPO, Washington., D.C.
1695) pp 554-560. The other is the unmodified text of the official handout, but witlh Mr.
`Ctuman's ad fibs. This is in the New York times, 5 October 1951.
**'I'6+is final clause may be a distorted echo of what I believe :I had told General Smith
about the Yale Report. On the other hand it may be something wholly Mr. Truman's own.
*""The Atom and the Business Man," Fortune, XXXIX, No. 1 (Jan. 1949) pp 53 and ff.
App~-~ved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
in the decision to put out this order?" the President replied, "I didn't sign the
order until I got it."
The Aftermath
By all odds the most remarkable thing about this press conference was Mr.
Truman's unawareness of just how open the open society of America was. Like
a good number of other innocents (a lot of them in the intelligence community )
who gasped at the large amount of apparently classified information in the Yale
Report, he did not fully understand that practically all of it had been formally
or informally declassified at one time or another by the action of the Secretary
of Defense, or by one of the service secretaries, or by an official empowered
to speak for one of them. As Arthur Krock wrote in a column in the New York
Times (7 Oct. 1951) someone "in a position to know the background of the
President's lecture" suggested that the "boss had just got a bum steer:' It was up
to the White House Press Secretary, Joseph Short, to issue with stunning
promptness a statement of clarification. It ran in part:
The President has directed me to clarify his views on security information as
follows:
1. Every citizen-including officials and publishers-has a duty to protect
our country.
2. Citizens who receive military information for publication from responsible
officials qualified to judge the relationship of such information to the national
security may rightfully assume that it is safe to publish the information.
3. [Citizens who receive this sort of information from improperly qualified
sources should be most guarded in passing it along.]
4. The recent executive order does not alter the right of any citizen to publish
anything.
The statement did much to allay the fears of the press but not its curiosity
about the Yale Report and the CIA's interest. The university answered all queries
with "the project was completed for the Division of External Research of the
government. All details are confidential-so we cannot say who participated
[in it]";* the Agency answered with no comment whatever. In a short time overt
press and public concern about the Yale Report declined to zero.
Meanwhile, back in the South Building at the 25th and E Street campus,
we sat on a large quantity of the 827-page document. In a few days, however,
General Smith authorized the circulation of one copy to each of the IAC prin-
cipals. Some of their top staffers xead the document, and one of the purposes
behind the undertaking began to be realized, though perhaps not as fully as we
had desired. What filtered down to the intelligence officers who represented
their organizations at the meetings devoted to the coordination of the National
Intelligence Estimates was that a far less expert intelligence service than the
Soviet could know a very great deal about the inventory of American military
strengths. This was, after all, one of our principal objectives and to this extent
the enterprise had achieved a modest success.
As I have remarked earlier, the doctrinal objection to venture estimates
into the realm of the other man's probable intentions had begun to soften, even
before the Report and its counterpart dealing with the Soviet estimate of
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010'D?6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
probable U.S. intentions were completed.* Thus we were not obliged to pursue
the somewhat devious attack which had prompted the study in the first place.
We had, of course, plenty of troubles trying to agree about how the Soviet
leaders saw the world scene and what they probably plarmed to do about it,
but the difficulties were the normal ones relating to substance, not those pro-
ceeding from a reluctance to violate what had once been basic doctrine. (And so
i.t has been ever since. )
13ut the Yale Report did cause a considerable stir in a direction we had
not anticipated. General Smith and Mr. Truman were not the only ones to take
cognizance of what anyone could learn about our armed services without half
trying. A lot of us whose experience in our government's service had been
confined to intelligence were not aware that our field was one of the few
relatively protected ones in the area of national security. I, for one, assumed
that since our ill-wishers were so successful in masking the details of their
armed establishments, the U.S. too made similar but less successful efforts.
:Indeed, as I look back on the scores of non-intelligence military briefings I
received in Washington and in the field, I cannot recall a single one designated. as
"tmclassified," though I will warrant that much of what was conveyed under
high security classifications had been or soon would be public property.
This essay is not the place to undertake a full discussion of what here i s an
important though peripheral issue: the issue of "secrecy in government" or-
and more especially-that phase of it which bears upon the security classification
of information regarding our military establishment. On the other hand it is
hard to avoid it altogether.
t`:lassi f ication and Declassification
Three aspects can be ticked off briefly: First, almost everything regarding
the U.S. military-whether or not committed to paper-gets classified at some
point in its life. Often this occurs for the best reason in the world, more often
for reasons not good at all. Second, the recent rule which establishes a system
of automatic step-by-step downgrading to one side, there is and has been a
tendency for the higher classifications to absorb the lower. Third, except for
the automatic downgrading matter noted above (which by the way came long
after 1951) there has been little-if any-formal rational across-the-board
effort to downgrade or declassify. This is readily explained in terms of the
staggering magnitude of the task. Thus there has been in years past the inevitable
tendency for formal classifications, once given, to stick. Thais was obviously the
case at the time of the Yale Report.
I use the modifier "formal" advisedly, for there are those who observe the
classification because that's what the book says to do, and those who don't.
In fact, there are and long have been two pretty well defined separate universes
within the security apparatus of our military.
There is the one universe inhabited by the normal run of people (military
and civilian) who know their service's regulations with respect to the formal
classification of a vast encyclopedia of information regarding military mati:ers.
For those under Army discipline in 1951, the publication Army Regulations No.
*This, the "Intentions" half of the exercise, came to us a month or so after the com-
pletion of what I have been calling the Yale Report. As noted earlier, it fell a good distance
short of our hopes, and we decided to file it without reproducing and circulating it.
Ap~,~oved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
380-5 was the ruling text. In a good number of pages it endeavors to define,
in the abstract, the categories of military information deemed Top Secret, Secret,
and Confidential, and to give substance to the abstract definitions with a wealth
of specific illustrations. For those under the Navy and Air Force there were, of
course, similar publications.
By far the greater part of the people in the first universe made no effort
whatever to keep book on what formally classified matters-over-classified or
misclassified to begin with-had been down-graded or declassified as a result
of compromises, leaks, the simple passage of time, or conscious decision at the
upper echelons. As already noted, no one made nor does anyone now make
a systematic effort to keep this kind of book. In consequence there is an under-
standable tendency among these people to go on treating documents (and their
content) which were initially slugged, say Secret, as Secret irrespective of what
their classification has become in real life. This is the course of conscientiousness,
if not simple prudence. Those low on the totem pole who cavalierly take the
law in their own hands do so at the risk of crossing their security offices and
getting bad marks in their personnel jackets or worse.
When we in intelligence had good reason to seek information which lay
nominally within these operational security frontiers, we more frequently made
contact with these cautious and conservative interpreters of the rules than with
the others. Often our questions received diffident answers; sometimes we were
urged to take the matter up to higher echelons: well up, say, into that other
universe.
Who May Override Classifications?
This second universe is the one of the high civilian officials in the defense
establishment, and sometimes the high military themselves. We may assume
that these people too know all about the formalities which are owed classified
information, how it is to be issued, transmitted, and stored. With equal confidence
we may assume that of the many regulations regarding this sort of material, the
one they know the best is the one at the beginning of the publication which tells
them that virtually none of the preceding need apply to them. * To be sure,
common sense-if no higher law-indicates that things having to do with
communications systems, intelligence sources and methods, movements of forces
and diplomatic negotiations in train, sensitive military R and D, plans, and a
*Department of the Army, Army Regulations No. 380-5. Section I,3. Application.-b.
In the application of policies for the safeguarding of Classified Security In-
formation, consideration must be given to the fact that practical limitations will
often hamper the attainment and maintenance of absolute protection. Consideration
also must be given to the need for the dissemination of information to Congress,
the public, or other Government activities, other agencies of the Department of De-
fense, and Navy contractors as well as to the Army Establishment. Likewise, progress
in material development, commercial experience, and industrial capacity may lie of
greater value to national defense than the absohtte safety of a specific item of Classi-
fied Security Information. ,
( This text is quoted from the issue of Regulations of G June 1952. I have been unable
to locate a copy of those in force for the year in which the Yale Report was written, but I
am assured that the message of this paragraph appeared in earlier versions. The message,
furthermore, is in force today. See, for example Department of Defense Information Security
Program Regulation, July 1973 (DOD 5200 1-R ), para. I-604. )
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~96-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
few other topics ought not to be made public. But to the people of this second
universe goes the right to disregard classifications when they conclude that the
national interest is better served by doing so. They have been known to project
this right beyond their departmental jurisdictions over into other territory,
including that of intelligence and diplomacy.
We must understand, however, that a Secretary of Defense (or a service
secretary) will be under a number of pressures to talk freely.. Some of these come
from the public, the news media, or the political realities o:E democratic govern-
ruent; some, and often t:he most insistent, from a legitimate inner urge to tell
fellow citizens and especially their representatives in Congress that he is per-
forming the vital defense functions with which he has been entrusted. Indeed the
commonest channel of declassification is probably through the Department
of Defense and the military services themselves, and its principal tributary is the
stream that runs between the Pentagon and the Hill. The civilian authorities
testify fully and frankly on the record, reserving for themselves the right to
review the transcript for secuity before it goes to the GPO and out to the world.
Their underlying philosophy is to delete a little rather than a lot.
Should one of these officials display an understandable reluctance to ;give
equal time to his nonsuccesses, he may be sure that congressional spokesmen
in the opposing party will not. Nor will these spokesmen confine their remarks
to off-the-record proceedings in committee. If they feel that they have a vrell-
documented case, they may make it on the floor for the benefit of the readers
of the Congressional Record. In the ensuing debate much more will be aired
than the simple non-success which the initiating official wished to play down.
In addition to this volume of nominally classified information issued through
one channel or another directly to the American public, there will be genuine
secrets which are released with a different audience in mind. This will be the
sort of information which the U.S. government may choose to convey to our
allies for one set of reasons, or to our ill-wishers for another. Such, for example,
would be one Cabinet officer's divulging to a meeting of allies the intelligence
sources behind some critically important U.S. estimates, or another's using an
open forum of foreign statesmen as the place to articulate the secret U.S. estimate
of the numerical strength of the Soviet operational ICBM force. In this case
his real desire was to have the message reach Moscow.
1'n the Name o f Public Relations
But revelation of the nominal secrets of the first universe do not stop here.
There is yet to be contemplated those which pour forth through the military's
own public relations bureaux whose functions are among the most vital. After
all, the armed services are in loco parentis for millions of the nation's sons and
daughters; they must try to induce them to enlist and-once enlisted or drafted-
they must do everything possible to lighten the burdens of service. They must
reassure families and the public at large that the troops are being properly
cared for, properly trained for a multitude of duties besides combat, and provided
with equipment which will assure their optimum performance with a maximum
chance of returning to civilian life in better shape than they left it. Rivalry
between the services results inter alia in each one's touti.n.g in public its new
weapons and new methods of bringing them to bear. The kind of reluctance
nne would normally associate with the publicizing of new military technology
Ap~oved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
yields to the demands of a good public image, or morale within a given service,
and even to the demands of the contractors who have developed the new
machines of war.
The public relations divisions of the services are very large enterprises,
and their task is just what it sounds like. They are in continuous contact with
the news media-their news- and feature-people-with the magazines, and
technical journals; they are in close association with the host of privately-spon-
sored periodicals devoted to a score of milita~ specializations-the infantry, the
surface fleet, long-range aviation, and so on. These journals in turn carry the
advertisements of the contractors wherein are related in as full detail as is per-
missible-and beyond-technological triumphs which lie behind the accuracy,
reliability, simplicity, ruggedness, power, and so on of the military device at
issue.
Publications like the Army, Navy, Air Faroe Register; the Army, Navy, Air
Force Almanac; and the Stars and Stripes (several editions in different parts of
the world) which in the course of their business print a voluminous literature
of service order of battle could not be in business at all without an unofficial
but nevertheless full service support.
With these volumes of material relating to the military being given to the
media, the opportunities to guess at what is being withheld on security grounds
are manifold and inviting. Furthermore the odds are not exactly stacked against
a correct guess: if you tell a man that 2-I-1-I-X=5, he needs something less than
a graduate degree to divine that X=2. If he wishes to confirm his solution, access
to knowledgeable sources and the wiles of the practiced newsman or secret in-
telligence agent can usually do the trick.
More Releases than Leaks
The bulk of the materials which the Yale group had exploited belonged
to the general category of official and semiofficial releases from various com-
ponents of the defense establishment; what the group drew from the "news-
papers and slick magazines" was significant, but of far less importance. That
the group amassed this welter of data probably caused little surprise among the
relatively small number of witting officials in the Defense Department. A one-
time highly placed official of one of the services said to me that the only part
of the project that surprised him was that anyone should be surprised at its
findings. Offhand, he thought that there was virtually nothing regarding the
American military which was properly secret. He did except the areas which
I have noted earlier. That was abouk it; he seemed wholly relaxed that all the
rest was out in the open for all to see. Had he seen the Yale Report it would
have been old hat to him.
Maybe that reaction would have been the correct one, for in comparison
to what the Yale Report could have been, it was no great shakes. Some of its
shortcomings derived from the limitations built in to its terms of reference
which-it will be recalled-stipulated a tally of gross order of battle of U.S.
forces-in-being as of 1 September 1951. Othors derived from the scant amount
of time allowed for the completion of the study, which in turn obliged the project
supervisor to recruit staff where he could find it within the Yale community,
and largely without reference to any specialized talent it might possess in
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Report
U.S, military matters. But suppose it had been otherwise: suppose that the terms
of reference had had no well-defined outer limit, and that the group pushed
on until it ran out of valid and relevant material; suppose that the ceiling on
available time and funds had been very considerably raised and that the staff
comprised two or three score top-drawer professional specialists. Could any one,
n.o matter how long a resident of that second universe, be wholly unshaken as
he contemplated the new study? I somehow doubt it, especially if the study
had been artfully packaged in two parts.
'Che first of these parts would be the bulk of the report, say a few thousand
pages which would deal with the unspectacular matters of the Yale Repport,
but do it more thoroughly and accurately. The second would be a systematic
arrangement of what the project supervisor would consider as unpleasant sur-
prises. It would show that as a result of the general relaxation of securit?~ on
matters which no one in the second universe cared about, a large number of
the true secrets of state which they did care about lay about in the open, all but
~tncloaked.
i'Vuclear Stockpile
1, case in point: Among 1951's secrets of state, few ranked in importance
with the size of the U.S. stockpile of nuclear weapons. There were no more than
a handful of Americans who knew how many A-bombs, as they were then called,
had been assembled and were ready to go. The section of the Yale Report called
"Atomic Warfare" nevertheless essayed an estimate. The man who composed it
vas a physicist whose principal focus of interest was not the viscera of the
atom nor the nature of nuclear explosions. Needless to say, his wartime ex-
perience was remote from the Manhattan District. With these limitations he
embarked upon a search of the open literature. Drawing principally upon the
well-known Smyth report,* an article by Sir John Cockcroft,** and a few other
articles in popular scientific journals and the New York Times, he made acal-
c:ulation regarding the probable rate of the production of plutonium and uranium-
235 between 1945 and 1951, and another as to the probable number of bombs
on the shelf. Those of us who read these conclusions in 1951. were consumed
with curiosity to know how well he had done. Of course, the few government
officers who were in a position to say could not give us a grain of satisfaction.
Now, twenty-odd years later, one such officer has received authorization to
give along-after-the-fact evaluation and to give it under the security classifica-
tion of this article. Interesting indeed are his comments.
Ln the first place he finds that the Yale professor's estimates were wrong
and wrong on the high side. He goes on to say that the error was wholly un-
necessary. He points out that fine Yale professor missed two bits of highly sig-
nificant public information: the first had to do with the power levels at which
the Hanford reactors were working. This had been picked up by a Soviet secret
agent working for the KGB control in Ottawa and was published in the Re,gort
*llemy D. Smyth, Atomic EtterRy for Military Purposes (Princeton 1945). This report
first appeared as a U.S. Government publication.
* *Sce Bulletin o f the Atomic Scientists (Nov 1950) p. 329.
Ap~oved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Reporf SECRET
of the [Canadian] Royal Commission* which investigated the espionage ring.
The other appeared in none other than the AEC's semi-annual reports to Congress
of 1949 and 1950. With these data and a higher degree of expertise in isotope
separation and bomb design, the high-ranking secret of the stockpile could have
been penetrated to a nicety. The odds are heavily in favor of the Soviets having
done just that.
This case is a classic in its way. Once the atomic weapon was tested, then-
shortly after-used in anger, the single most important secret surrounding the
whole vast nuclear weapons enterprise was gone. Now everybody knew that
controlled large-scale nuclear explosions were possible. Professor Smyth was
an official spokesman for the U.S. government, and his report was a piece of
deliberate disclosure. If the U.S. government had tried to continue into peace-
time the security wraps which it had thrown around the Manhattan District
during the war, it would have found the costs prohibitive. It would have had
to cope with numerous powerful and angry groups (led by the nuclear scientists
and the media) who were claiming an unlawful abridgement of rights guaran-
teed under the First Amendment. The Smyth report is a classic example of a
libertarian government retreating to a prepared position and endeavoring to
hold the security line at that point. The government correctly reasoned that in
the absence of such a maneuver, uncontrolled leaks would be more hurtful
to national interests. From there on, a minor slip over at the AEC, a snippet of
significant information picked up by a Soviet secret operative, and the Russians
had the essences of the secret of the stockpile. With the publication of the snippet
in the unclassified Canadian Report it was almost anyone's in exchange for some
legwork and thought.
Biological and Chemical Warfare
How many other of the true military secrets of 1951 would have fallen in
such a constellation of circumstances? It is a guess, and not too risky a one at
that, that the U.S. stockpiles of biological and chemical warfare weapons could
have been known, although this was far from the intent of the Defense Depart-
ment. The Yale group had no trouble in finding a rich unclassified literature.
Oddly, it missed one of the documents in the BW area which was a rough BW
counterpart to the Smyth Report. This was the memorandum which George W.
Merck, a war department special consultant for biological warfare, wrote for
the Secretary of War, and which the War Department released to the press
on 3 January 1946.**
The Merck report tells of the history of the BW program, which began in
anticipation of a need for defense against biological weapons the enemy might
employ. It tells of the establishment of the early civilian. agency under Mr. Merck;
of how iritelligence regarding German BW capabilities which arrived in De-
cember 1943 made necessary a change in the purely defensive posture of the
program, and a change in the first administrative arrangements. The program
was broadened and put under the Chemical Warfare Service of the Army. The
*Ottawa [27 June] 1946.
**War Department; Bureau of Public Relations; Press Branch. "Biological Warfare";
8 mimeographed pages.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010dQ6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET The Yale Reporf
report goes on to explain that while the main objective in the U.S. BW program
was still
to develgp methods for defending ourselves against possible enemy use of biological
warfare agents, it was necessary to investigate offensive possibilities in order to
learn what measures could he used for defense. It was equally clear that the possi-
bility of retaliation in kind could not be disregarded in the event such agents were
used against us... .
The report tells in general terms of the activities of the program and lists
some of its "more important accomplishments." Needless to say, the most of those
mentioned were the spin-offs with a definite bonus in such agreeable areas as
pure science, public health, and plant pathology. Toward the end comes the
pregnant paragraph whose topic sentence is:
Steps are being taken to permit the release of such technical papers and reports by
those who have been engaged in this field as may be published without endangering
the national security,
If one may be permitted to do a bit of reading between the lines of the
Merck report, using something a good bit more substantial than pure intuition,
one perceives in a flash that the document was largely designed to forestall
fiiture embarrassments. None knew better than the Army of the hundreds of
civilian scientists once in the program who were returning to their peacetime
pursuits and who in the uncensored atmosphere of their laboratories would be
rf~(atively free to talk of their hitherto highly classified research. Biological war-
fare was a nasty expression, and clearly the Army was eager first to acknowledge
of its own free accord that it had indeed engaged in BW work, and second to
stress that its primary concern had been "defensive" anal "retaliatory," not
"c ~ffensive.'?
How the Merck report affected the substance of articles on BW that soon
began to be published one cannot say; it is difficult to believe that it did not
have an effect on the quantity of books and articles devoted to the subject. By
1951 any foreign intelligence service with a respectable publications procure-
ment enterprise. could have had a highly enlightening little library on the I3W
capabilities of the United States. As in the case of the A-bomb, even had it: so
desired our government could not have stifled these voices in peacetime without
risking a minor upheaval. Accordingly it did the only thing it could to mitigate
the worst of the bad effects which it perceived on the horizon. In all likelihood
it issued the Merck report with this aim in view. That it also gave the intelli-
gence services of our ill-wishers a long and exhilarating free ride was merely
one item in the cost-sheet of our blessings.
It is of more than passing interest that in an exercise c>f 1948 the combined
intelligence resources of the United States and the United Kingdom produced
relative to the Soviet BW and CW capabilities only the sentence that virtually
nothing was known. If there had been a requirement on the subject in 1951, our
intelligence community could have done only a mite better.
And for us who serve in the intelligence profession of our country this is
the nut of the matter. I am happy to report that I know no one among us who
would amend the Bill of Rights just to make things difficult for our opposite
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
The Yale Report SECRET
numbers in unfriendly lands, but some way or another no one should blame us
for the youthful pique we feel when we compare our lot to theirs. But pique
and our lament on the injustices of life to one side, it still seems objectively im-
proper that American intelligence endeavoring to construct, say a Soviet order
of battle or the probable performance of a Soviet weapons system still under
R and D should have to pick around in informational garbage pails for un-
matched molecules, while our Soviet counterparts endeavoring to do the same
for the U.S. parallels can get it by a letter to the GPO or a subscription to Aviation
Week and Space Technology.
Something exactly akin to this sentiment was what moved Mr. Allen Dulles
to say out loud, "Sometimes I think we go too far in what our Government gives
out officially and what is published in the scientific and technical field. We tell
Russia too much. Under our system it is hard to control it." * Something akin
moved Mr. Truman to sign and defend Executive Order Number 10290 whose
main point was to assure
that military secrets in the hands of these other [civilian] agencies should be pro-
tected just as much as when they are in the hands of the military departments.... It
would not make any sense to have a paper containing military secrets carefully
locked up in a safe in the Pentagon, with a copy of the same paper left lying around
on the desk of a lawyer in the Justice Department.**
This simple and commonsense thought was unfortunately obscured at the press
conference and in subsequent press coverage as a result of someone's having
"given the boss a bum steer."
The order, however, was in effect and stayed in effect for two years* * * and,
of course, had little visible effect. It did not affect what high officers of the
de:[ense and service departments (both civilian and military) might wish to
convey to the Congress, and on the record, and it seems to have done little to
stem the tide of purposeful and inadvertent leaks.
The Yale Report could have just as well been written under its protective
canopy in 1952 or 1953-or for that matter under subsequent executive orders
in any of the 20 years which have followed. In fact if it were tried again and
this time with greater expertise and a snore relaxed deadline, the results would
probably be far more of a shock to the intelligence calling, and of no more
consequence to the course of national policy.
*US News and World Report, 19 March 1954. p. 54.
**New York Ttimes, 5 October 1951, quoting President Truman.
* * *Superseded by Executive Order # 10501 of 1G Dec. 1953.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~b6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL
No Foreign Dissem
Trials, tribulations, and
some lingering doubts
The oldest and probably the most consistently productive liaison the CIA
maintains with intelligence services of other nations is the relationship we and
our parent organizations before us have enjoyed Much
of our original skill and capability we owe to the training and advice of the
and since that time we ourselves have had the ex-
perience of setting up liaison with the intelligence services of other friendly
nations. We have thus learned to understand to some extent the concern ex-
pressed by some of the veterans when they contemplated the connection
between the older and more experienced and the new one
from across the sea.
The underlying uneasiness was genuine, and must be common to all intelli-
gence services when they consider establishing official connections with other
smaller and less experienced services. Will the result be the creation of a Franken-
stein's monster?
It may not be a monstrous moment, but surely it must be one of life's most
embarrassing ones when a Chief of Station in a small friendly country is suddenly
confronted with the fact that his Ambassador's office has been bugged with
techniques and equipment his own station has provided to the host government's
security service. At such moments does one rage, remonstrate, explain, excuse,
laugh, or boast? If so, to whom?
More important, should such experiences make us hesitate or refuse to
maintain liaison with other services? This question has been recurring regularly
for many years, and the answer always seems to be that on balance we benefit
from liaison with other services, and that although we use great caution in what
we teach and give to them, we must face the fact that even the simplest and
most basic of clandestine techniques can be used against us just as readily as
against a common adversary.
Very well, we establish liaison, but must we train the younger or smaller
services? If so, to what end do we train them? Is it simply to make them better
services? Is it to make them more friendly to us? Is it to enable us to carry out
joint operations with them, or to use their services against targets we otherwise
might not be able to attack?
One of the area divisions of the Clandestine Service recently made a de-
tailed survey of its liaison operations, and it is somewhat surprising to find that
the survey was not very helpful in answering some of the more traditional and
tiresome questions which bother us a11. It did reveal some interesting facts about
training, however. Perhaps one-fourth of the services we have trained, for in-
stance, rank in the category of "above average-very good," or "near profes-
sional" category. All the rest rank as fair, inefficient, or below. One of these
MORI/HRP
Approved For Release 2004/12/16 :CIA-RDP~~T~~~4A000400010~XD6-5
23-31
25X1
25X1
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Liaison Training
lower category services has received large sums of money and large amounts
of training, but is nevertheless judged so low professionally that it is probably
not penetrated by the opposition because "it would not be worthwhile fo,r the
opposition to do so." The dry comment which followed this observation was that
"no lower classification seems possible."
'T'raining by itsel f will not necessarily make a better service. It can help, but
other factors weigh heavily, such as national pride, tenure, pay, recognition, and
public respect. These things we cannot supply. When poor services are trained by
us, they often remain poor services, and it therefore follows that when we do
set about training such a service we must aim that training carefully, and plan
it with great care and common sense.
The Agent and Liaison Training Branch (ALT) of the Office of Training
should participate in such planning, although of course the decision wh,E>ther
to train+is one which i:S the responsibility of the operating division. One of the
first questions that arises after this decision has been made is, where should
the training take place. Instructors from ALT, most of them operations officers
on rotation, have some strong opinions here.
Tt is obviously cheaper to send one or two instructors and a few hundred
pounds of training aids and material to the field than it is to bring a score or
more students to the U.S. and feed and lodge them for a month while we i`rain
them. In fact, ALT is at present geared to handle groups of a maximum of four
Trersons in the U.S., and larger contingents of trainees would require prohibitive
extra expense and effort.
Moreover, the value of training students in the atmosphere and locale of
their future operations can hardly be overstated. Street exercises are less artificial;
the problems encountered are real, and solving them is more than a mere aca-
demic exercise. It is sometimes even possible for the instructor to train his charges
by means of operations against real targets, thus not only providing the local
service with well-trained young operations officers, but giving them a leg up on
their own tasks as well.
The trainer must also teach with an eye to the local. realities which will
later confront his student. It does no good to train a man in the use of certain
types of public facilities or professional equipment and support if such things
are not within. his reach at home. One of the first tasks of an ALT instructor
when he is assigned a new program is to find out what the ,area is like and vvhat
equipment, money, and personnel are available to his trainees for their future
operations. If he fails to find out these things and adapt his training to them,
he may gravely mislead his students and waste a lot of their time.
Security is another factor. Training in the United States exposes safe sites,
administrative personnel, and other training personnel who are used in role-
playing or rabbit capacities in street exercises.
Finally, there is the problem of language. ALT can train in the major lan-
guages without the use of interpreters, but is often called upon to train in the
less common languages. These instances may require the use of interpreters,
translators, and equipment for reproducing training material in the language.
Such services are often difficult to get at headquarters, but are more readily
available in the field.
Un the other hand, there are some valid reasons for wanting the training to
lre done in the U.S. The element of reward is one of the most important of these.
Ap~oved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Liaison Training CONFIDENTIAL
A trip to the U.S., all expenses paid, is a coveted prize in most countries, and
it is therefore not surprising that stations are often under great pressure to send
liaison students to the U.S. for training. Ideally, training should never be used
to camouflage a goodwill trip to this country. Purposeless training is at best a
waste of time and money, and at worst can be downright harmful. In the real
world, however, training is often the only way the travel can be rationalized to
the satisfaction of all concerned, and so long as we are not deceiving ourselves,
the device can be useful. The instructor should be told fully and frankly, how-
ever, if the training is a secondary reason for the travel, and the trainees them-
selves should also have at least a tacit understanding of the situation.
Training in the American environment may make it easier for the foreign
visitor to convince himself of the communality of interests. The prestige of the
student is also enhanced by training in the U.S. Although he might in reality
get more useful training at home than he can in the U.S., the fact remains that
the record of a course of instructian abroad weighs much more heavily in a
man's personnel file than a notation that he completed a course given locally
by an imported instructor. If our purpose in training is partly to assist certain
specific individuals in their careers, we should give serious consideration to
bringing them here for it.
Some other factors which tend to recommend training in the U.S. are the
availability of supplementary instruction in specialized subjects from other com-
ponents such as TSD, Commo, and Records Management, and the availability
of other training personnel for role playing or for teaming up with students in
practice operations. Such professional assistance is difficult to come by in
the field.
Weighing the pros and cons usually leads to the decision to train abroad.
More than two-thirds of all liaison training programs are done in the country
of origin. When the number of students is calculated, rather than the number of
programs, training abroad takes care of about 92% of all liaison trainees.
Training in the field is a demanding job. The instructor has many eyes
watching him with intense and often critical interest the eyes of the students
whom he must impress with his professional qualifications; the eyes of station
personnel, who quite properly expect that this training should render a net
profit to the station and the agency; and the eyes of the hierarchy of the host
service, who are watching closely to see how good the training is, how good the
CIA is, and what the CIA thinks of the host country and its service. The in-
structor has no back-up staff to fill in for him, or provide him with emergency
assistance. He often has been able to comprehend fully what the program ought
to be only after he has arrived in the field, when it is too late to make adequate
compensation for faulty planning at headquarters. The range of skills which the
instructor is expected to be qualified to teach is frighteningly broad, and
faltering in any one of these skills can undermine his presumptive authority
in others. No individual can know everything there is to know about this pro-
fession, of course, and instructors soon learn that maintenance of authority
sometimes requires them to gloss over the inevitable gaps in their professional
qualifications. As Satchel Paige used to say about pitching baseball in his later
years, "When you can't out-throw 'em, you gotta out-cute 'em:'
If it were merely a question of teaching young rookies the mysteries of an
unfamiliar art, the strain on the instructor would be minor, but in actual prac-
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010C~$-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Liaison Training
tice he is often confronted by a class of students of quite disparate ages and
backgrounds, and often of equally disparate assignments within their parent
services. The same class may include near-illiterates and college graduates,
assigned variously as records management officers, criminal investigators, or
border patrol guards. The faces the instructor looks into may vary in expression
from rapt attention to disdainful challenge.
The selection of students is obviously a key factor in graining courses, and
among the many difficulties we encounter in this process there is one hardy
peremiial for which we have never yet found a solution. Ideally, for our pur-
poses, the station should make the choices, but for obvious reasons this pre-
rogative is in practice nearly always reserved to the chief of the service. 'Chis
i n. part explains (and often increases) the disparities of background and ass ign-
rnent just mentioned, since backscratching and politicking almost inevitably
enter the picture. An instructor may note inwardly early in the course that
Student X is a fathead, and upon discreet inquiry finds out that by wild conci-
dence Student X's uncle or cousin or brother-in-law happens to be Foreign
Minister or President of the Republic. The instructor is stuck: with him, however,
an. d must resign himself to the braking effect which Student X's underendowed
brain will have on the progress of the rest of the class. Not surprisingly, Student
Xes crop up in their most extreme form in the least developed countries, where,
moreover, the liaison relationship itself is in an early stage of development. It
is even quite likely that one of the major justifications for the training in the
first place has been the station's desire to accelerate the budding of this
relationship.
The tensions of such heterogeneous classes are often exacerbated by a big
cultural gap between instructor and students. How does the instructor from
the pragmatic, factual and often impersonal western culture create an intelli-
gence officer to satisfy his own standards out of the imprecise, abstract, emo-
tional and family-oriented son of some far eastern nation? In these cases, the
difference in language often signals a profound difference in thought patterns
and psychological orientation. The instructor must be acutely aware of such
differences, and of what he can accomplish in spite of them (or perhaps by
means of them) . He knows that there may be certain concepts he can never
get across because the culture and language of his students cannot cope vrith
them.
Having made the decision to train, the operating division should im-
mediately bring the Training authorities into the picture, because a great deal
needs to he done, and the sooner an instructor can be assigned (probably t:wo
instructors if the class is to exceed ten persons) , the better the preparations
anal the subsequent training can be. The instructor will need to consult at length
*The reverse is also true, of course. There are ideas and concepts in other cultures which
we can comprehend only dimly or not at all, often to our own disadvantage. One thoughtful
Vietnamese trainee who had just completed an exercise in agent acquisition commented to his
instructor that he had done things by the book in the exercise, but without real conviction.
"I do not believe," he said, "that a Vietnamese could ever successfully recruit a man with
tl3ese personality characteristics, although he may be an excellent target for an American. 'the
Vietnamese would he put off by the candidate's directness and his readiness to talk about
things which a Vietnamese approaches carefully and indirectly, if at all. On the other hand,
if you want to recruit a Vietnamese you will profit a great deal more by seeking ways to use
family influence on him than by searching for chinks in his ideological ;armor:'
A~~roved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Liaison Training CONFIDENTIAL
with the country desk to find out precisely what training is desired, and how
it is to be done. He will ask the desk bluntly whose idea the training is, because
it may make a great difference to his program if it has been offered on the
initiative of the case officer, the station, or even the headquarters desk, and
has perhaps been accepted somewhat reluctantly, rather than being urgently
requested by the liaison service because it discerns its own need and has
confidence in our ability to help.
The instructor will want to make sure that the field station is prepared to
furnish a site, blackboards, paper, pencils, duplicating facilities and other class-
room supplies. He will pay special attention to the subject of film projectors. He
will want to know if the station has one, and if it is in good shape.. Visual aids
to instruction are perhaps the most important auxiliary tool the instructor has,
and of these aids, motion pictures have the greatest impact and utility.
If it were only a matter of getting good projection equipment, the instruc-
tor's lot would be a happy one, but, alas, when it comes time to go to the film
library he flinches inwardly, because we are still training students with many
of the same films which were in use when the instructor himself was a trainee.
Most of these are excellent films, and of course-the basic techniques of clandes-
tine operations do not change radically with the passing years. As Allen Dulles
pointed out in his Craft o f Intelligence, Sun Tzu, in the year 400 B.C., wrote
down the basics of espionage, much as it is practiced today. In addition to
traditional techniques, however, one must consider the probable subconscious
reaction of the 1973 student to a training film in which a surveillance team
wears Dick Tracy hats and suits that are just a shade removed from the zoot
variety, and where television is so new that it is exhibited as the latest scien-
tific invention to be added to the arsenal of the clandestine operator. Will the
student attribute the same kind of senility to the other elements of the agency
which is training him?
It is easier to point out the problem than to solve it, for film production
costs more than the uninitiated can imagine. When one contemplates a pro-
fessionally produced film of about 20 minutes' duration, he may already be
thinking in terms of $100,000. In discussions of this situation, the suggestion
is almost invariably proffered, "Why not produce films with our own people
and technicians?" The answer is that our technicians, outstanding as they usually
are, are not organized or equipped for this kind of job; and contrary to their
own opinions, most of our intelligence personnel cannot act for sour apples.
Attempts to use them in past productions would by comparison make Howdy
Doody look like Sir John Gielgud-and we have seen from unpleasant expe-
rience that an amateurish training film is worse for our students than no training
film at all.
As if the hoary age of most of our films were not handicap enough, more
than half of our most useful films are restricted to showing for U.S. citizens, and
the instructor must therefore arrange to .have the same old reliables available at
the station, among which are "Walk. East on Beacon," "Ring of Treason," "The
Thief," `PNG," and perhaps half a dozen short reels on specific subjects such
as dead drops, surveillance and countersurveillance, and personal meetings.
Unfortunately, the solution to our film problems is largely one of finances, and
budgetary possibilities are not the same in 1973 as they were in 1953.
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040001~006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Liaison Training
Training programs are usually devised to give basic skills to new officers,
and the curriculum usually includes instruction in basic operations, security,
clandestine communications, agent acquisition and handling, observation and
description, surveillance and countersurveillance, and reporting. Not the least
important, and usually the most lacking, is knowledge of records management
techniques and the importance of records to the intelligence organization..
The programs are usually scheduled by the stations to begin on a Monday,
and the experienced training officer will try to arrive at the latest by the Thurs-
day just preceding the start of the course, for he needs time to adjust his inner
clock to the jet lag, and has a number of preliminary matters which must be
taken care of. He will make a special point to let the field know of his exact
arrival date, so that the case officer in charge of the liaison training wial be
sure to be on hand for Friday consultations.
He will first want to look over the training material which he has sent
ahead by pouch, to see if it is all there and in good shape. He will need to
verify that the station projector is of a vintage somewhat later than The Birth
o f a Nation, and that i.t is in working order, with exh?a projection and e:KCiter
lamps and drive belts. He will want to look over the training site, to make
sure that it is capable of handling the class with a minimum of discomforlt and
distraction, and to arrange the furnishings to suit his needs as much as possiible.*
He also must make sure that he has the means to travel between his hotel
and the training site and the station without a great waste of time. He must
either get the loan of a station car, rent a vehicle, or arrange to be driven from
place to place as required. Taxis are usually undependable and unsatisfactory
For this purpose. Field officers are so often overoptimistic about their capability
to fill this need that experienced instructors usually insist upon having their
travel orders include authorization to rent a car when needed.
Not the least important of the preliminary work is a call on the head of the
service for which the training is being provided. It is not always possible t:o set
up such a meeting, of course, although training officers usually urge the station
in advance to do everything passible to arrange it. Failing the head of the see?vice,
some other high official connected with it can serve the: purpose. There is a
multiplicity of motives behind this desire for an interview with the mighty.
[n the first place, the prestige and authority which is liven to the instructor
and his program by the appearance of, or at least strong endorsement by, the
head of the service may mean the difference between a perfunctory attendance
and performance and a lively and successful course of instruction. Most in-
structors quite unabashedly contrive at some time during the course to point
out casually to their charges something to the effect that "C>eneral So-and-Sc~ was
quite emphatic when he told me he wanted this particular thing stressed iri this
training." Of special benefit is the inauguration of the training course by the
head of the service himself, by means of an introductory address an the first day.
''One instructor reported that a program 1~e had recently completed in Indochina was
probably his worst effort, because he had found out after classes began that the classroom
was part of an ammunition storage warehouse. His lectures were regularly punctuated by the
loud crack of cases of 105-mm. HE ammunition being dropped from a truck bed to the concrete
floor. It was not the noise that disturbed him. He just refused to believe the ordnance of:ficer's
reassurance that the shells would not explode when unloaded in this fashion.
Ap~ved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Liaison Training CONFIDENTIAL
Another matter which the instructor will want to take up with the afficial-
dorn of the liaison service is the problem of attendance. He will plead with
the service not to extract a student or students. casually from the classes to
attend to other official duties except in emergencies of the direst sort.
Then he will need to find out what ground rules this authority may want
to establish for practical street exercises. Are there areas of the city which
are to be considered off limits to~ training exercises? Can other local government
or service personnel be made available as rabbits or drivers or in other support
capacities? Do they have communications equipment for surveillance work? Are
there live targets they would like or permit the class to work on?
The question of an assessment of the students often arises, also, but not
because the instructor brings it ..up. I3e will avoid it if he can, because of all
the tasks he may be confronted with, perhaps the most difficult is that of making
a fair and honest assessment of 20 or more students after four weeks of instruction.
If the subject arises, he will usually try to impress upon the requesting official
that such assessments are subject to chance and personal bias, and can result
in grave errors and injustice to individuals. If they must have some kind of
judgment, it is much safer and more trustworthy for the instructor to cite any
students who have stood out in the class as particularly apt, and to describe
their accomplishments when appropriate, but without any stated or implied
negative reports on th.e slower students. The Minister's nephew who becomes
chief of service in 1975 is not likely to be cooperative if he knows that in 1973
we pointed out that he lacked the brains and the drive to be a good intelligence
officer.
If, in spite of the instructor's demurrer, the service still insists on assess-
ments of all students, it can be done, of course, but the instructor needs to
know of the requirements at the outset so that he can gear his instruction and
the exercises as much as possible to produce for him the elements he needs to
make the judgments. It would seem gratuitous to point out that the instructor
also ought to know their names, but in the case of one program in a Latin
American country the instructor had to tell the head of the service that he could
not give him an assessment on the students because he had never been given
names, numbers or aliases for any of the students. The instructor surmised that
a Student X from some previous course had managed to work his way into the
upper administrative levels of that service.
This reluctance to assess students for their parent services does not imply
any hesitancy about assessment for station purposes. Instructors, as a matter
of fixed routine at the completion of training, give the station as complete an
assessment as possible of all the students and. of the course in general.
It may come as a surprise to some that not all the peoples of this world
regard the eight-hour day as an establishment of the Almighty. In some of the
more horrible of the earth's climates, an eight-hour day could probably accom-
plish no more than asix-hour day anyway. In any event, the instructor should
be well aware of the work tolerance and attention span of his charges. As Jahn
Kenneth Galbraith said after visiting a particularly torrid town in India, "In
India the difference between working and not working is not decisive:' The
same might be said for other countries, but our instructors must be ready to
discern the difference, nevertheless, and respect it.
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040001UV06-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Liaison Training
FIaving made his preliminary arrangements, the instructor now has the
weekend in which to review his material, his notes, his course schedule, and
any data he may have been able to acquire on the individual students. He must
plan how he intends to break the class down into groups or teams for the live
exercises. He must study maps of the city, traffic patterns, rush hours, and other
factors which may have a bearing on practical exercises.
fIe will never be totally ready, but finally the day of launch arrives and he
is an the podium, with the head of the service to introduce him if he is lucky.
After he has been suitably inflated and introduced, has taken care of the
administrative details of haw the class is to be run and security attended to,
and how the seating arrangement is to be maintained, he is ready to go. He
now beetles his brow portentously, jabs a finger at his class and begins:
"Clandestine activity is a part of everyday living. We all act clandestinely for personal
reasons Yrom time to time, and if you don't believe it, consider the times that you,
yourself ...: '
[n the coming weeks he will get to know this collection of faces very well
indeed, for he is expected to insert behind each one, whether it is black, brown,
swarthy, fair, oriental, or blue-eyed, the skills and attitudes of the professional
intelligence officer. He will wave his arms and draw diagrams and tell war
stories and regale the students with tales of intrigue and derring-da, usually of
his own heroic exploits against an implacable and clever enemy. He will order
them into the street to make a clandestine meeting with an unknown, to pass
rt supersensitive report, to prepare a casing report for a desad drop. He will rail
at them for clumsy evasive techniques in surveillance prablems, and will pray
silently that they will outwit him and show that the instruction is sinking in.
I3e will slap backs when back-slapping is likely to be appropriate and well
received, and will compliment, kid,. and criticize. He will be elated when he
strikes that magic spark any teacher cherishes but sees so seldom. He will be
disappointed but resigned when one of his favorite war stories falls flat. He
will regularly be astonished at some of the things his students do or say.
Consider, for example, the instructor who was trying to teach a grotap of
earnest young men from a new African. nation which is struggling to adapt
its rich tribal traditions to the needs of world affairs. The instructor had
assigned the class the task of passing a message to a contact in the street without
being detected. One of the students asked him if it was all right to use magic.
The instructor, an old warhorse with great sympathy for his charges, replied
without hesitation that if the student was in fact practiced in those arts, it was
altogether acceptable to pass the message by magic.*
Ones of the most difficult tasks for an instructor is to teach an exotic skill
while at the same time keeping his student imbued with the desire for simplicity
of design and plan. One instructor, who had seen many an overelaborate meeting
plan in his life, was still unprepared for the personal meeting exercise he moni-
tored between two of his students in another small African capital. The "`case
officer" had selected a site in full view of the Communist Chinese Embassy, for
reasons That were not clear to the instructor, and the "agent" was standing at the
"`['his same instructor had aheady had enough of a problem finding a way to teach carefully
timed personal meetings to young men who not only did not own watches, but who ~NOUId
not have known how to tell time by them if they did.
Ap~ved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Liaison Training CONFIDENTIAL
site, stiff as a ramrod, his back to the wall across the street from the embassy,
his arms folded over his chest. When it was time for his prospective contact
to arrive, he began to dance a sedate but energetic jig, his arms still folded, and
he continued to do so until the "case officer" arrived and took up a position next
to him, assuming the same arms-folded posture, and joined him in the dance.
Having established something thereby, they then ceased dancing and walked
together to another place to talk, The instructor observed later that this hardly
seemed to be a satisfactory system of recognition and safety signals, but he had
to admit that no passerby or occupant of the embassy across the street was
likely to surmise that this tableau was in fact a clandestine meeting between
two secret operatives.
Although the instructor covets the services of the head of the liaison organ-
ization at certain times, his presence is not uniformly useful, as one instructor
of a recent class in a small Latin American republic will testify. His students
had set up a stakeout against a real and important target, using support from
their own agency to devise individual cover. The head of the service (a military
intelligence service) decided to don civilian clothes and go by for a discreet
personal inspection of the stakeout. Proud of his students, the instructor stayed
at some distance from the scene and watched with a stinking heart as the
officer strolled near awhite-suited ice cream vendor, only to have the latter
leap from his bicycle, snap to attention, and execute a smart military salute.
One instructor still recalls with some bemusement the student who went
out on an exercise and was not seen again for three days. When he returned,
he explained that when he went into the drug store to buy the bar of soap,
according to the plan, he had been hit over the head with a bottle. He seemed
to feel that the explanation was sufficient, for he volunteered no further details,
and the instructor did not ask for any. One never knows.
Of such rugged and varied stuff are made the citizens of other countries
whom we initiate into our clandestine society. On the final day of instruction,
critiques, and wrapups, the euphoria of a mission completed sometimes almost
overwhelms students and teachers alike. In these instances a party is likely to
ensue, and in accordance with religious scruples and capaciousness of purse,
people may get mildly drunk or ecstatic. Great oaths of fidelity and eternal
friendship are sworn, and vows to reassemble at some future date to reaffirm
the ties of clandestine brotherhood. You, sir, are the greatest instructor ever
born! And you, my friend, are one of the best students I have ever had! To your
health, sir! And to yours! Long live democracy! Long live friendship and
decency! Down with bad people! To hell with Communism!
And so another liaison class has been taught, and the instructor, weary but
reasonably pleased with himself, looks over his little chicks and wonders
which of them is going to bug the American Ambassador next year.
Approved For Release 2004/12/16 :CIA-RDP78T03194A00040001 Q~06-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL
The pen is sometimes
flightier than the words
ELEGANT WRITING-REPORT NUMBER TWO
Richard T. Puderbaugh
If you missed my first report,* I should explain to you that I have been
designated Chief Word Watcher, Western Hemisphere Division, and have been
instructed to submit reports from time to time on outstanding examples of
elegant writing in what is best known as the Clandestine Service. It has been
some months since my first report, and I must say that I have been impressed
by the response. Elegant writing has definitely begun to attract the attention
of our officers.
There are some areas which still need improvement, nevertheless. Too
many of our writers are still utilizing the word "use" where they could just as
well use "utilize" and get the same meaning out of it. The mitigate/militate
ratio is merely holding its own, when in fact we ought to be expanding our
use of "mitigate against." As to the flout/flaunt ratio, we may even be losing
ground, and I urge you all to be especially watchful for instances of contempt
for the law so that we can be sure that it gets flaunted rather than flouted.
There is also one point which I failed to make in my first report, because
quite frankly I didn't think we were having any trouble with it, but I now find
that that is not the case. The problem is in the modern and forceful use of the
words target, aim, fault, and blame. It is oldfashioned to aim at a target. One
targets at an aim these days. The same can be said for blaming people for being
at fault. Today we fault them for being to blame. This is a process of shaping
meanings which delights us veteran word watchers, and I can even see possi-
bilities in these words for an entire reversal of meaning, as happened with
our old friend sanction. Think of the linguistic genius it required to give one
word two diametrically opposed meanings! "The U.N. today sanctioned sanc-
tions against Israel." It is an aim we should target at.
Here are a few samples of elegant writing, selected at random from my
collection of the past six months:
"The actions must be completed in as quickly a time as possible."
"Transmitted hereto for your retention and information....'
"We regret that reference cable was ambivalent and apparently misleading."
"They described him as a friendly type who loves entertaining people."
"He has been out visiting the grass roots."
As you read, it will become evident to you that our best work during this
period has been in our descriptions of people and the things they do. One
of the most impressive of these is the following: "Although sleeping at the time
MORI/HRP
from pg.
33-37
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Elegant Writing
of the officer's contact, the American Consul talked to Mr. Doe on 25 September,
and was lucid and alert." You can't tell whether that is a dangling participle
or a non sequitur, and therein lies its charm.
"The reference, made in a letter, by Doe's wife to Doe having gotten himself involved
in espionage, though, might be indicative of something, albeit: enigmatic."
"He believes the risk will be minimal ? if students and instnictors utilize reasonab]'.e
jurisprudence in the, course of the exercise; '
"He incurred the intense displeasure of the war ministry and ;general officers close
fo the president recently by pubically advocating abolition of the congressional.
xutharitv."
[ showed that last one to my friend, the Senior Officer, who pronounced
it a typographical error and therefore not really deserving of high marks. I
would agree if it were only the absence of the "1" between the "b" and the "i",
but the addition of the "al" as the penultimate syllable can hardly be a ~typo-
graphical error, and the author of that sentence therefore gets top grades from
me for his effort, especially since he had the great good sense to avoid any
actual description of the gestures a man makes when he pubically advocates
something.
`Ti.1is announcement by the two officials should put an end to specific rumors of one
frin.q the other, or vice versa."
"At that time they were in the first stages of a broken marriage."
"Even the carrot and stick approach of offering a higher income did not produce
results."
"The old man, although infirm, obviously is not on his dying bed."
The following three quotations demonstrate what I have come to cal]! the
Puderbaugh Principle of Traumatic Terseness. We all know what a great impact
one can achieve by making portentous statements in few words. "Lafayette,
we are here." "I cannot spare this general. He fights." Now observe how much
greater an impact can be achieved when the short statement describes the totally
unexpected--not to say unbelievable:
"Toe and his wife had a daughter of four. When he last saw her she was pregnant: '
" 3+'ulano's wife is in her late twenties and their daughter, Mary, is aged about four.
The latter is rather pale and sickly. She doesn't like Graustark very much. She smokes."
"Mengano was one of seven children, and was raised without a father who was
killed by a log in a forest:'
Given the rather consistent distortion of our work by the news media, the
public might be pardoned for supposing that people in our profession live in
a James Bond kind of world. If the truth were to be told (and it can certainly
be deduced from the foregoing demonstrations of Puderbaugh's Principle) ours
is much more of a Tolkien world than a Bond world. They people we deal with
are surrounded by dangers Bond never dreamed of, and that may explain why
they feel impelled to begin enjoying life, and reproducing :it, at a very early age.
While we are on the subject of descriptions of persons and their doine;s, I
must announce with some sadness that a writer from another agency has Kwon
*"Minimal" is a very OK word this year.
Ap~4roved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Elegant Writing CONFIDENTIAL
this year's Grand Prize for Baroque Bloviation. CIA has done some fine things,
but nothing to compare with the following analysis which a Defense Department
officer wrote about the wife of a government official in his country of assignment:
"She has a presentable personality with a modern posture, who is well versed in
world affairs, where by modern standards she is considered to be a whole person."
Another non-CIA writer has been granted an honorable mention for ex-
cellence in Freudian Implications. He is a senior foreign service officer at one
of our embassies, who informed his Washington office:
"The editor of a respected weekly called on me today to discuss the current political
situation which he predicted would come to an end very soon."
It must be the golden dream, the cherished Nirvana, of our harried friends
in the State Department-that moment when a political situation comes to
an end.
In no other instance did I find our writers to have been bested by those
of other agencies, although I do have an item of special interest from USAID
which I shall present to you later in this report. Our writers are especially good
in those constructions which separate vital sentence parts from one another
and place high-class words between them, selected and arranged so as to give
the reader many minutes of enchantment as he searches for the meaning. The
first of these sentences also evokes folk-feelings of the ancient past, echoing the
syntax of the Germanic Mother Tongue.
"He helped his daughter, with whom he is quite close, out financially."
"We feel that the university, while still an important target, is less so than it once was.
Even if it were, the situation on campus makes the operation impossible."
The beauty of that last quotation at first seemed to me to lie in its antece-
dent anarchy, but upon closer examination I discovered that the anarchy is
much more pervasive than a mere indiscipline of pronouns and their antecedents.
Here it is entire thoughts which are launched from their pads and enter orbit
without ever achieving rendezvous with sister components.
Closely related to the foregoing examples of skillful disarticulation of sentence
parts is the practice of redundancy. It is not difficult to be redundant, of course,
and no special merit attaches to the mere repetition of a thought twice in several
dozen words, but when you can express the same idea three times in five words
you are in a class by yourself:
"That would make his estimated ETA on or about 5 July."
For technical excellence in tautology, that sentence is the best of the season,
but for a symmetry which closely approaches poetry I think we would have to
give the prize to this one:
"If Doe were arrested as soon as feasibly possible. . . .
There are some sentences which mirror a truly and innately elegant soul-a
writer who not only puts down elegant sentences, but whose thoughts are ele-
*The moment when a political situation reaches its zenith, on the other hand, has never
been better described than by a State cable from North Africa in the mid-50's which may
antedate Mr. Puderbaugh's research: "Tlie seething cauldron is approaching the crossroad,
and. it is beyond the power of the French to get it back on the tracks:' One sighs that these
cables had no visual aids. [Editor.]
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Eleganf 1Nri1`ing
gantly arranged. Here is a sentence which comes from the mind of just such. an
aristocrat, a writer who is modern enough to have no compunction about ending
a sentence with a preposition, but who at the same time steadfastly avoids any
ellipsis of relative pronouns:
"In order to return, he had to be guaranteed work and a house which to move into."
I shall now list a number of items which do not fall into any special Word-
watcher classification, but which deserve our respectful attention all the same:
"The SDNT, the largest and only exile group in Graustark...."
"IIe was determined not to defend red tape for its own sake."
"Misnomering of ammunition is illegal."
"We apologize for the readibility of the copies." "
"Parall.elly, we plan to start work on another project."
"We opted not to reopen the question to avoid the risk of needlessly beating a dead
horse." *"
"That would be opening the magic Pandora's box."
"We would be foolhearty if we were to dismiss it lightly."
"'['}ie}= threw Molotov cocktails against five downtown stores during daylight hours in
lightening demonstrations:'
A word is in order here about lightening demonstratio~ks. I have had many
discussions about this with associates in headquarters who have never been
to the field, and who think the reference is really to lightning demonstrati~~ns.
It is surprising that this kind of objection can come from people who live in
Washington, D. C., for they have witnessed the real thing right in their own
city. Briefly, any demonstration which reduces a downtown store's inveni:ory
by several tons, or sets fire to its premises, can without hesitation by classed as
a lightening demonstration. Demonstrations which include the use of Molotov
cocktails are, by definition, lightening ones.
I was especially pleased during this period to see that one writer had ex-
tended the use of the word majority beyond anything our people had ever dared
before. There had been a serious flood in his area of assignment, and in due course
he reported that "the majority of the water had receded," and thereby implied
that there was a minority of the water still around. From s,ad experience, how-
ever, Ihave learned not to trust such statements about the majority of, say,
the money, or the weather, or the pollution, because I have found that many
of our writers don't really know the definition of majority, and may in fact: be
talking about a plurality of these things. So I recommend great care with this
usage.
In conclusion I want to report to you about a writer who works for USA.ID,
who recently came to my attention. I know we must not proselyte, but if there
*An apology which might well be made for much of our official correspondence.
*"Analogies have a way of losing their relevance as years pass. The writer of this sentence
was wise enough to perceive that dead horses are not what they used to be, One must be
careful to distinguish between those dead horses which it is bootless to beat, and those which
can be turned into a profitable enterprise only by the application of the bastinado.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
6
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Elegant Writing CONFIDENTIAL
is any way to get this man to transfer to our agency we should try our best to
do it. He is clearly of managerial stature. He writes:
"We must steer a careful course between doing nothing about future plans and
doing the irrelevant."
That statement comes close to the beauty of Ring Lardner's masterpiece,
"Although he was not a good outfielder, he was not a good hitter, either." It is
a question of keeping one part of a sentence from ever knowing what the other
part is doing, and it is this kind of perfection toward which we must continue
to strive. Few of us can hope to attain such high levels of elegance, but we must
not let the seeming unattainability of the goal keep us from doing our best at
all times. You can rest assured that any activity you engage in to equal or better
the foregoing examples of elegant writing will be sanctioned by the highest
authority.
Approved For Release 2004/12/16 :CIA-RDP78T03194A0004000100~~-5
Approved For Release 2004/12/16 :CIA-RDP78T0319~QQQIDENTIA~06-5
How it all began:
DONOVAN'S ORIGINAL MARCHING ORDERS
Thomas F. Troy
Two quotations will set the stage for this inquiry into the orders under
which Colonel William J. Donovan was set up in business by President Franklin
D. Roosevelt as this nation's first chief of intelligence and special operations.
The first quotation comes from Breckinridge Long, Assistant Secretary of
State, 1939-1944, a man who figures no more in this paper but who was a close
observer of much to be narrated here and who, moreover, kept an interesting
diary. As one of three assistant secretaries working under Secretary of State
Cordell Hull and Under Secretary Sumner Wells, "Breck" Long administered
both the Department of State and the Foreign Service and, as he perhaps under-
standably complained in his diary, was responsible for 23 of the 42 divisions of the
Department. This wide-spread coverage several times brought him in contact with
the work of the new Coordinator of Information (COI)-the job FDR officially
gave to Donovan on 11 July 1941; and Long was quick to arrive at the following
characterization of this New York Irishman, military hero, and Wall Street lawyer:
"Bill Donovan-`Wild Bill' is head of the C.I.O. [sic]-Coordinator of Information.
He has been a thorn in the side of a number of the regular agencies of the Government
for some time-including the side of the Department of State-and more particularly
recently in Welles'. He is into everybody's business-knows no bounds of jurisdiction-
tries to fill the shoes of each agency charged with responsibility for a war activity.
He has had almost unlimited money and has a regular army at work and agents all
over the world. He does many things under the nom de guerre of `Information':' 1
The second quotation gives the other side of the coin, and quite appropriately
comes from Donovan himself. With reference to a different matter than the
specific one which provoked Long's outburst, and writing not in a diary but
to the President, the Colonel, "angry and indignant," denounced the circulation
of "the well-worn lie" that he had 90 representatives working in Latin America.
He attributed the repetition of this story to an effort to prove that he had "gone
into a field which you had not allocated to me." Then Donovan laid it on the
line: "You should know me well enough to know that I do adhere strictly to
7ny orders and make no attempt to encroach upon the jurisdiction of anyone
else:' [Italics mine.]
"My orders" ... ah, there was the rubl Just what were those orders? That
was, in effect, the question that many in Washington, throughout the summer
1Breckinridge Long, The War Diary of Breckinridge Long: Selections from the Years
1939-1944, ed. Fred L. Israel (Univ. of Nebraska Press, Lincoln, Neb., 1966) p. 257. This
passage was written on 10' April 1942; on 20 December 1941 Long had noted (pp. 233-34)
that Donovan was hard to "control," and that his organization was "composed largely of
inexperienced people" who were also "inexperienced ... in dealing ...with ...confidential
information: '
2 Memorandum from William J. Donovan to President Roosevelt, No. 452, 27 April 1942,
Donovan. Papers, "Exhibits Illustrating the History of OSS," Vol. II, "The Office of the Coor-
dinator of Information," Tab YY. Hereafter the short title is Donovan Papers, "Exhibits," and
this will cover both Vols. I and II.
MORI/HRP
from pg.
39-69
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010Q06-5
A roved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Donovan
and fall of 1941, wanted answered definitely. That was, in effect, the question-
as will be seen-that prompted the Director of the Bureau of the Budget twice
in the first seven months of Donovan's official existence to recommend to the
President that COI's area of activity be newly defined. That question, indeed,
also caused Donovan himself, three months after taking office, to toll the Presi-
dent that their original decision to put nothing in writing was wrong. That
question, in fact, has never really been answered; and it is the purpose of this
inquiry to make an attempt to do so.
The answer will be sought in reconstructing three episodes in roughly the
first six months of COI's history: (1) Donovan's meeting with the President on
18 June 1941 when FDR gave the go-ahead sign on COI; (2) the drafting of
the order which made COI official on 11 July; and (3) the next few months
when that order was implemented.
The Roosevelt-Donovan Meeting, 18 June I94I
Contrary to a common misconception, Bill Donovan was not a close friend
of the President. They had been at Columbia Law School at the same time but
had not known one another. They were from opposite sides of the State of New
York: Donovan from Buffalo, and FDR from the Hudson River Valley. They
were also from opposite sides of the socio-economic tracks; Donovan was an
Irish Catholic, the grandson of immigrants, the son of a railroad yards superin-
tendent, while FDR, the squire of Hyde Park, was a WASP before the acronym
was common coin. Also, and more importantly perhaps, they were from
opposite sides of the political fence; Donovan was as much alife-long Republican
as FDR was Mr. Democrat. Their paths had only occasionally crossed as when,
for example, Donovan unsuccessfully ran for the governorship of New York
when Roosevelt was elected President in 1932. It was not, then, until 1940 that
Donovan, in his fifty-seventh year, and FDR, one year older, were brought
together on the same side of the tracks.
What accompished this was Adolf Hitler and the European War he launched
in September 1939. There is no need here to do more than state the common
revulsion and alarm felt by both men at the prospect of Nazi hegemony in Europe
and abroad. Donovan, probably because he was a private citizen, was way out
ahead of the President, however, in urging all-out aid to Britain as an essential
element: in the defense of the Western Hemisphere. Because of this attitude,
because of his prominence in Republican and national affairs, because of his recent
travels in Germany, Ethiopia, and Spain, and probably on the recommendation
of his good friend, the new Secretary of the Navy, Frank Knox, Colonel Donovan
was sent by President Roosevelt to England in the summer of 1940 to report
on Britain's chances against the expected Nazi assault. Six months later the
President again sent him abroad, this time on athree-months tour of Britain,
the Balkans, the Middle East, Spain, and Ireland.3
After both trips, Donovan, the President's representative who talked day
after day with heads of state and their chief advisors, reported to the President-
at least on 9 August 1940 and 19 March 1941. There are no good records of
these conversations, but it is safe to say that Donovan, whose mind :ranged over
s See this writer's "COI and British Intelligence: An Essay on Origins," (CIA, 1970), esp.
Ghs. II and III. Hereafter referred to as "COI: '
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T0319~~~1$~~I(~g06-5
Donovan
every aspect of the war in Europe, particularly singled out for the President's
attention the whole range of unconventional warfare activities that had been
brought to the fore by the Fifth Cohimn and British counter-measures. He must
have given Roosevelt some idea, however brief, of his thinking on a new agency
to handle "white" and "black" propaganda, sabotage and guerrilla warfare,
special intelligence, and strategic planning.4
Donovan Proposes "Service of Strategic Information"
Eventually, probably late in May of 1941, Donovan was asked by the
President to put his proposal in writing, and this he did in a "Memorandum of
Establishment of Service of Strategic Information," dated 10 June 1941. The
document, which of course is fundamental in the long line of papers outlining
the COI-OSS-CIA objectives and tasks, is as interesting for what it does not
say as for what it .does say. Since it was soon, on 18 June, to receive the
Presidental stamp of approval, it is well here to take a close look at it.6
(Appendix A )
In a few words-934-Donovan laid out his argument, proceeding from
general to particular, for a "Service of Strategic Information." The basic
proposition was the interrelationship of strategy and information: without the
latter, strategy was helpless; and unless directed to strategy, information was
useless. The second proposition measured the information required in terms of
total war-"the commitment of all resources of a nation, moral as well as
material"-and Donovan particularly stressed the dependence of modern war
on "the economic base." The third proposition was the flat assertion. that despite
the activity of the Army and Navy intelligence units, the country did not have
an "effective- service" for developing that "accurate, comprehensive, long-range
information without which no strategic board can. plan for the future." The con-
clusion was the essentiality of "a central enemy intelligence organization which
would itself collect either directly or through existing departments of govern-
ment, at home and abroad, pertinent information" on the total resources and
intentions of the enemy.
As an example, he cited the economic field where there were many weapons
that could be used against the enemy. These weapons were so scattered through-
out the bureaucracy, however, that they could not be effectively utilized in the
waging of economic warfare unless all departments of the government had the
same information. This brief passage will appear more important, in this inquiry
into Donavan's marching orders, when we touch upon the difficulty that Donovan
was soon to have with the Economic Defense Board, which considered economic
warfare its bailiwick.
Another brief-and apparently deliberately vague-passage is the one deal-
ing with radio as "the most powerful weapon" in "the psychological attack
against the moral and spiritual defenses of a nation." Certainly Donavan was
one of the first fully to appreciate the significance of the- Nazi use of the radio
as an element of "modern warfare." In this memorandum, however, he con-
tented himself with boldly stating that the perfection. of radio as a weapon
required planning, and planning required information, which could then lead to
`Ibid., Chs. IV and VIII.
`Donovan Papers, "Exhibits," Vol. I, Tab B.
Approved For Release 2004/12/16 :CIA-RDP78T03194A0004000100~~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Donovan
action by appropriate agencies. There was no felt need to spell out the role of
radio in psychological warfare and clandestine communications.
In terms of secret activities, the most revealing part of this Memorandum is
not the text but the organizational chart accompanying it. Where one would
expect frankness, he gets obscurity, and vice versa. Hence, the coordination of
information-the main subject of the paper-is entnisted to directors of "Collec-
tion and Distribution" and of "Classification and Interpretation"; and the radio
weapon is the province of the "Director of Supplementary Activities"; whereas
the chart shows what the text nowhere mentions, namely, the two directors of
"Mail, Radio, Cable Interception (Censorship )" and of "Codes and Cyphers."
Only the "Director of Economic Warfare Material" accurately reflects its textual
counterpart.
Presumably Donovan sent this Memorandum to the President on or shortly
after 10 June. At least on the next day FDR told Grace Tully that he wanted to
see Ben Cohen, old friend, adviser, and legal draftsman, before he returned to
his London post and "also Bill Donovan."e Presumably again, at least in the
light of subsequent events, the President v EDB
with data relating to the postwar situation, and Richards was asked at the 16
July conferences to state the need of his unit for postwar planning. Also, an un-
dated statement of the functions of the "Economic Branch" shows that it was to
"formulate plans for the coordination of post-wax planning activities" of the
various agencies, to collect and "popularize" information on such planning for
the President and department heads, and also to encourage such planning by
industry, labor, and agriculture.g2
5. Writing the peace: Milo Perkins is the indirect source of the Donovan
claim that the President had told him to write the peace. Accoxding to Hall,
wxiting on 8 September, Dr. Baxter vas "disturbed by the rumors that Donovan
has been commissioned to write the peace and believes that the State Depart-
ment was also quite concerned." Baxter was further quoted as saying that some
of his friends had been approached by Donovan, before the COI order came
out, "asking them to serve with an organization similar to the House inquiry
of the last war." Baxter was further quoted as saying that no such organization
should be established and the function should be left with State, but that
Donovan did not agree with him on this point.33
6. Basic Strategy Planning: There is no reason to doubt that Donovan
aimed to influence basic political and military strategy. Others may have thought
"policy" was not the field of COI, but Donovan did not think that way, at least,
in the period under consideration. He aimed to gather and interpret the data
"bearing on national security," and working through the "coordination com-
mittees" to make recommendations to the President. Again, an early but un-
dated, statement of functions shows that the "Research and Plans Branch" was
to assist in the development of strategic plans, advise the Coordinator on na-
tional policy, prepare "popular" reports on strategic subjects for the President,
and maintain such liaison as would insure the "full utilization of the expert
facilities in the various departments and agencies in the determination of national
policy:' s4 Just how far Donovan expected to go in this direction is arguable,
but it is not surprising if Hall and others thought the "Donovan organization"
hoped to develop as "the secretariat of [a] high strategy group" within the
defense organization.
Conclusion
By now it must be clear that there was anything but clarity in the listing
of the functions that COI was to perform. First of all, we know only that the
President approved Donovan's memorandum o# 10 June which called for the
establishment of an organization to collect information on enemy countries and
to use the radio as an instrument of modern warfare and that the President
also underwrote Donovan's plans for secret and subversive activities. Secondly,
the order of 11 July authorizes Donovan to collect, analyze, correlate, and dis-
82 This document appears in the BOB Records in company with Hall's reports of 16 July
1941, and there is no reason to doubt that it belongs there.
?3 Hall's Memorandum of Conference, 8 September 1941, on "Developments in the Office
of the Coordinator of Information," BOB Records, Folder 212.
?" Cf. Note 52 supra.
b5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
seminate information bearing on national security and also to carry out "supple-
inentary activities" as requested by the President. We know also, from the
drafting of the order, that Ben Cohen thought the new COI would not interfere
with the "morale function" of La Guardia's office or the need for the projected
Economic Defense Board. Thirdly, as just reviewed, Donovan was quickly in-
volved in a whole host of activities which could not possibly have been touched
upon, spelled out, and agreed upon in the conference that Donovan had with
the President on 1$ June.
The conclusion here is that Donovan was given a charter marked by vague-
ness, contradiction, and open-endedness. The vagueness is clear on the face of
the 11 July order, and Smith had pointed this out to the President a week before
it was issued. It was so vague even on the basic function of the Coordination of
Information that some people concluded, honestly presumably, that his job was
simply to "digest" others' reports to the President. The most patent contradiction
contained in the ord.Pr, although not spelled out, was the authorization to conduct
world-wide radio broadcasts even though Nelson Rockefeller clearly had a
monopoly on such activity as far as South. America was concerned. The open-
endedness-the coordination of data bearing on national security-Donovan
was clearly quite prepared to exploit to the full, and it is not surprising that people
like Breckinridge Long were soon accusing him of poking his nose "into every-
body's business."
This conclusion raises the question of President Roosevelt's understanding
of what he was doing when he issued such a charter to the Colonel. For an
answer, the writer can only fall back on others' analyses of 1?DR's administrative
principles and procedures, anti here there are at least two schools of thought.
James MacGregor Burns has described the President as "...avoiding commit-
ments to any one, man or program, letting his subordinates feel less the sting
of responsibility than the goad of competition, thwarting one man from getting
too much control... ; ' and it was this approach that "pro:mpted him to drive his
jostling horses with a loose bit and a nervous but easy rein:' sg On the other
hand, Dean Acheson has rejected as "nonsense" the idea that Roosevelt liked
"organizational confusion which permitted him to keep power in his own hands
by playing off his colleagues one against the other;" instead, says the former
Secretary of State, under FDR, "civil governmental organization ...was messed
up ...for the simplest of reasons: he did not know any better." 86
Let the last comment on the President's style go to William O. Hall, who,
thirty years after the events .narrated here, observed that: "Donovan was a
pusher, an empire-builder, a man with a sense of mission, whose ~ activity had
"the effect of stirring up the military and the State Department, and FDR was
happy to see this:' sz
"s James MacGregor Burns, Roosevelt: The Soldier o f Freedom (Harcourt Brace Jovanovich,
New York, 1.970), p. 53. More recently, John P. Roche noted in his King Features Syndicate
column (Washington Post, 22 May 1973) that: "[Roosevelt's] technique, to simplify, was
always to Rive subordinates overlapping jurisdictions. Thus Jesse Jones of the Reconstruction
Finance Corporation, Harry Hopkins, and Secretary of the Interior Ickes (to take one hypo-
thetical case) would each he ,given the impression by F'DR that he was in charge of some
major aspect of domestic policy. Invariably the three would get into a fight on any significant
policy question and-since it was impossible to settle it among themselves-the President
would wind up as the arbiter."
61 Acheson, Op. cit., p. 47.
bz William O. Hall, private interview, Washington, D.C., 16 September 1970.
bb
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Donovan CONFIDENTIAL
MEMORANDUM OF ESTABLISHMENT OF
SERVICE OF STRATEGIC INFORMATION
Strategy, without information upon which it can rely, is helpless. Likewise, information
is useless unless it is intelligently directed to the strategic purpose. Modern warfare depends
upon the economic base=on the supply of raw materials,. on the capacity and performance
of the industrial plant, on the scope of agricultural production and upon the character and
efficacy of communications. Strategic reserves will determine the strength of the attack and
the resistance of the defense. Steel and gasoline constitute these reserves as much as do inen
and powder. The width and depth of terrain occupied by the present day army exacts an
equally wide and deep network of operative lines. The "depth of strategy" depends on the
"depth of armament: '
The commitment of all resources of a nation, moral as well as material, constitute what
is called total war. To anticipate enemy intention as to the mobilization and employment
of these forces is a difficult task. General von Vernhardi says, "We must try, by correctly
foreseeing what is coming, to anticipate developments and thereby to gain. an advantage which
our opponents cannot overcome on the field of battle. That is what the future expects us to
do."
Although we are facing imminent peril, we are lacking in effective service for analyzing,
comprehending, and appraising such information as we might obtain, (or in some cases have
obtained,) relative to the intention of potential enemies and the limit of the economic and
military resources of those enemies. Our mechanism of collecting information is inadequate.
It is true we have intelligence units in the Army and Navy. We can assume that through
these units our fighting services can obtain technical information in time of peace, have
available immediate operational information in time of war, and on certain occasions obtain
"spot" news as to enemy movements. But these services cannot, out of the very nature of things,
obtain that accurate, comprehensive,, long-range information without which no strategic board
can plan for the future. And we have arrived at the moment when there must be plans laid
down for the spring of 1942.
We have, scattered throughout the various departments of our government, documents
and memoranda concerning military and naval and air and economic potentials of the Axis
which, if gathered together and studied in detail by carefully selected trained minds, with
a knowledge both of the related languages and technique, would yield valuable and often
decisive results.
Critical analysis of this information is as important presently for our supply program
as if we were actually engaged in armed conflict. It is unimaginable that Germany would
engage in a $7 billion supply program without first studying in detail the productive capacity
of her actual and potential enemies. It is because she does exactly this that she displays such
a mastery in the secrecy, timing, and effectiveness of her attacks.
Even if we participate to no greater extent than we do now, it is essential that we set
up a central enemy intelligence organization which would itself collect either directly or through
existing departments of government, at home and abroad, pertinent information concerning
potential enemies, the character and strength of their armed forces, their internal economic
organization, their principal channels of supply, the morale of their troops and their people
and their relations with their neighbors or allies.
For example,. in the economic field, there are many weapons that can be used against
the enemy. But in our government these weapons are distributed through several different
departments. How and when to use them is of vital interest not only to the Commander-in-
Chief but to each of the departments concerned. All departments should have the same infor-
mation upon which economic warfare could be determined.
To analyze and interpret such inforrr~ation by applying to it not only the experience of
Army and Naval officers, but also of specialized trained research officials in the relative scien-
tific fields, (including technological, economic, financial and psychological scholars,) is of
determining influence in modern warfare,
Such analysis and interpretation must be done with immediacy and speedily transmitted
to the intelligence services of those departments which, in some cases, would have been supply-
ing the essential raw materials of information.
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
CONFIDENTIAL Donovan
13ut there is another element in modern warfare, and that is the psychological attack
against the moral and spiritual defenses of a nation. In this attack the most powerful weapon
is radio. The use of radio as a weapon, though effectively employed by Germany, is still
to be perfected. But this perfection can be realized only by planning, and planning is dependent
upon accurate information. From this information action could be carried out by appropriate
agencies.
The mechanism of this service to the various departments should be under the direction
of a Coordinator of Strategic Information who would be responsible directly to the President.
This Coordinator could be assisted by an advisory panel consisting of the Director of FBI, the
Directors of the Army and Navy Intelligence Service, with corresponding officials from other
governmental departments principally concerned.
The attached chart shows the allocation of and the interrelation between the general duties
to be discharged under the appropriate directors. Much of the personnel would be drawn from
the Army and Navy and other departments of the government, and it will be seen from the
chart that the proposed centralized unit will neither displace nor encroach upon the FBI,
Army and Navy Intelligence, or any other department of the government.
i'he basic purpose of this Service of Strategic Information is to constitute a means by
which the President, as Commander-in-Chief, and his Strategic Board would have available
accurate and complete enemy intelligence reports upon which military operational decisions
could be based.
Washington, D.C.
June 10, 1941
William J. Donovan
A{~roved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Donovan CONFIDENTIAL
DESIGNATING A COORDINATOR OF INFORMATION
By virtue of the authority vested in me as President of the United States and as Com-
mander in Chief of the Army and Navy of the United States, it is ordered as follows:
I. There is hereby established the position of Coordinator of Information, with
authority to collect and analyze all information and data, which may bear upon national
security; to correlate such information and data, and to make such information and data
available to the President and to such departments and officials of the Government as
the President may determine; and to carry out, when requested by the President, such
supplementary activities as may facilitate the securing of information important for
national security not now available to the Government.
2. The several departments and agencies of the government shall make available
to the Coordinator of Information all and any such information and data relating to
national security as the Coordinator, with the approval of the President, may from time
to time request.
3. The Coordinator of Information may appoint such committees, consisting of ap-
propriate representatives of the various departments and agencies of the Government,
as he may deem necessary to assist him in the performance of his functions.
4. Nothing in the duties and responsibilities of the Coordinator of Information shall
in any way interfere with or impair the duties and responsibilities of the regular military
and naval advisers of the President as Commander in Chief of the Army and Navy.
5. Within the limits of such funds as may be allocated to the Coordinator of Infor-
mation by the President, the Coordinator may employ necessary personnel and make
provision for the necessary supplies, facilities, and services.
6. William J. Donovan is hereby designated as Coordinator of Information.
(Signed) Franklin D. Roosevelt
THE WHITE HOUSE
July 11, 1941
* ~ ~ x~ a.
~
(Federal Register, Tues., July 15,
1941.
p. 3422-23.
F.R. Doc. 41-4969; Filed, July 12,
1941;
11:53 a.m.)
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET
INTELLIGENCE IN RECENT PUBLIC LITERATURE
DORA REPORTING and UNDER THE PSEUDONYM DORA. By Alexander
Rado. (Nepszabadsag, Budapest, 1971, and Oktyabr, Moscow, 1972. )
Alexander Rado, the Hungarian geographer-cartographer who headed a
Soviet espionage net in Switzerland during World War II, has published two
versions of his memoirs. In October 1971 the Budapest daily Nepszabadsag
published excerpts from his memoirs,* and from February to June 1972 the arch-
conservative Soviet journal Oktyabr did the same. Despite the differences in
length (the Russian being approximately five times as long as the Hungarian )
both versions are remarkably similar in tone and content. The Hungarian version
appears to be a summary of the Russian rather than an independent work. There
are, however, two noteworthy omissions in the Russian version.
Rado notes in the Hungarian version that he was awarded the Order of
Lenin during the war for his intelligence activities (Hungarian version, p. 44) .
In addition, he states that he returned to Hungary in 1955 "after long and serious
trials" (Hungarian version, p. 81) . This remark is probably an oblique reference
to his years of imprisonment in the USSR. The deletion of the date is probably
an attempt to avoid recalling to the minds of Soviet readers the still sensitive issue
of Stalinist excesses. Oktz~abr's Stalinist editor, Vsevolod Kochetov, is partic-
uIarly unlikely to want to raise the subject. The failure to mention Rado's Order of
Lenin may be a careless error, but it is also possible that it reflects a Soviet desire
not to over-emphasize Rado's contribution. The government has consistently
maintained that the USSR won World War II practically single-handed, and that
its great victories resulted not from the skills of its spies but from the valor of its
warriors.
Another significant omission in both versions of the memoirs is the total
absence of any reference to Rado's life as a spy prior to 1935. The omission is
deliberate. Rado tells us that the Soviets gave him the source materials for his
work, and there is plainly every reason to assume that the KGB edited both the
Russian and Hungarian versions. The omission of Rado's life as an agent of Soviet
military intelligence during the late 1920's and early 1930's reflects the typical
Soviet sensitivity about this period. On 20 February 1968 Komsomolskaya Pravda
printed an article by V. Chernyshev called "Code `Dora'." It included the
following passage: "As a Hungarian emigre Rado went to study in Germany in
the 20's. He worked tirelessly, graduated brilliantly from the university, and
defended his dissertation.... After the Nazis came to power, the young anti-
Fascist scholar lived in Paris, and on the eve of the Spanish Civil War, in 1936,
crossed over into Switzerland." Not a word about when and where Rado was
trained in espionage, or about his clandestine work and contacts in Germany.
And very little about his Soviet case officers, who remain anonymous. This silence,
which the Soviets are at pains to maintain for the entire Rote Kapelle during the
1920's and early 1930's, suggests that they still have assets meriting such protection.
Rado's memoirs inadvertently indict Moscow's intelligence services for
inefficiency and poor planning. Moscow first instructed Rado to establish a cover
operation in Belgium in 1935. The site was later changed to Switzerland (see
below). One might assume that Moscow would already have worked out plans
MORI/HRP
from pg.
71-76
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010~b6-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET Books
to support his intelligence activities. The evidence does not support this con-
clusion, however. The change of sites (Belgium to Switzerland) is not a valid
excuse because Soviet agents in Belgium, France, and Germany experienced
the same problems that Rado faced in Switzerland.
If it is assumed that Rado was ready to begin his real work after he opened
Geopress in 1936, Moscow had almost five years before the German invasion of
the U.S.S.R. to arrange to support him and his net. The memoirs, and even more
so the traffic, reveal that the Center was unprepared. Rado was plagued by fi-
nancial difficulties, and security had to he broken by using agents from outside
his net to get funds to him. Even transmitters and operators were in critically
short supply despite the time available to secure both. In 1942 and 1943 Rado was
still recruiting operators, and on the eve of his arrest "Jim" was still struggling
to get parts to assemble another transmitter, Even an inadvertent admission of the
inefficiency of Soviet intelligence activities is noteworthy in a day when their
prowess is sometimes exaggerated.
t?alsif ications and Cnniradictions in Rado's Narrative
't'here is an interesting conflict between the Russian and Hungarian versions
of the memoirs about the decision on where to locate Rado's intelligence net.
According to the Russian account, the authorities in Moscow originally instructed
Rado to set up his cover operation in Belgium. Rado claims that he believed
Belgium was best suited to his cover. The plan. failed in December 1935 when
Belgian officials refused to grant Rado a residency permit. Rado was then in-
structed to set up shop in Switzerland. It would appear from this account that the
Swiss location was a second choice; but such an interpretation conflicts with
the Hungarian account. Here Rado implies that he was originally instructed
to set up his operation in Switzerland and suggests that he preferred this location.
The Hungarian version contains only a passing reference to Belgium as a possible
site for Rado's work and creates the impression that it was not seriously con-
sidered. (See Part I of the Russian version, p. 40; Hungarian version p, 8. )
'1"he two versions are also contradictory about the date when he succeeded in
establishing a W/T link with Moscow. In the Hungarian account Rado claims
to have done so in January 1940, whereas in the Russian he implies that it hap-
pened in March 1940--after a visit from "Kent." The earliest message :From
"Albert" (that is, Rado) to the Director is dated 6 June 194(1. The message appears
only in the memoirs and may be a fabrication. Consequently, either date-January
or March-could be correct; both can also be wrong.
Rado claims that Margherita Bolli ("Rose" or "Rosa") was largely respon-
sible for the breakup of his net in 1943. He asserts that she violated security by
having an affair with a young German, named Hans Peters, who turned out
to be an Abwehr agent. Rado explains that "Rose" was seen with his wife (Lena
Rado) and was thereafter targeted by the Germans. The explanation is plausible,
but it conflicts with one offered by Alexander Foote, a member of Rado's net.
Foote claims that Rado was responsible for the identification of "Rose" as
a member of the net. According to Foote, Rado was having an affair with "Rose."
IIe was seen with her in a restaurant, and the result was the German decision to
target her. Foote agrees with Rado that the German approach was made through
Ilans Peters. (Russian version Part III, p. 7; Foote, Handbook for Spies, p. 116. )
Ap~goved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Books SECRET
The involvement of "Rose" with Peters is fact, and .the variations offered
by Rado and Foote are both plausible. But both men have adequate reasons to
fabricate-Rado to :furbish his own image and Foote to denigrate Rado's role
while enhancing his own. Neither variant has been substantiated.
Rado repeats the well-worn allegation that "Werther," "Olga," "Anna," and
"T'eddie" were codenames for organizations, not individuals. This claim is not
substantiated by the traffic, and Rado also contradicts himself on this point.
These subsources were handled through "Sissy," and 'the traffic indicates that
there was conflict between "Sissy" and Rado over releasing their identities.
Moscow also tried unsuccessfizlly to force "Sissy" to identify them. If, as Rado
claims, these names stood for organizations, there would have been no reason
for Rado or Moscow to demand that "Sissy" identify them because there would
have been no persons to identify. They were in fact individuals, however, and
Rado's narrative inadvertently supports this conclusion.
Rado asserts, for example, that "one of `Lucy's' sources, to whom I gave
the name "Olga," served in the OKW communications headquarters." This
passage is certainly a description of a person. Rado also slips when he refers
to "Werther," "Anna," "Olga," and "Teddie" as " `Lucy's' agents." Deception is
also betrayed by the Hungarian version. In this account "Olga" is allegedly the
Oberkommando der Luftwaffe, not the OKW of the Russian version. (Russian
version, Part III, pp. 3, 13-14, 25; Part IV, pp. 14, 18; Hungarian version, pp. 40,
58-59. )
As noted above, Rado included "Teddie" among the cover names of organiza-
tions, not persons. Yet, in the Hungarian version (pp. 58-59) , he also described
"Teddie" as a person: " `Teddy' undertook to get the information [requested by
Moscow]. In the middle of April, :however, he sent word that for the time
being he could not take out the secret documents to copy them for us. He
promised to send detailed information, instead of the documents .the risk
was very great, and `Teddy' worked slowly out of caution." (Russian version, Part
IV, p. 25; Hungarian version, pp. 58-59. )
Rado is obviously trying to follow the established Soviet position by ob-
scuring the roles of these individuals. What is unclear, however, is why this
bit of deception is carried out so poorly. One possible explanation is that the
Soviets have created, through Rado, a book designed for a large lay audience.
Like Soviet forgeries, the memoirs were fashioned for immediate impact. Rado
says in the preface that the Soviet authorities provided the materials with which
he worked, and the KGB has consistently shown a disregard for scholarly exegesis.
In the case of "Luise," Rado distorts the facts in the other direction-that is,
".Luise" was the cover name for an organization, not an individual. Rado asserts
that he "had given the cover name `Luise' to the officer in the Swiss intelligence
office from whom we had gotten this report. The Center had great n?espect for
this source." The message referred to is dated by Rado as 6 April 1941. It is not in
our holdings. The first reference to "Luise" that we have is dated 21 October
1941. It includes this statement: "In the future I shall call the intelligence section
of the Swiss General Staff `Luise."' 'Thus, unlike `Werther' et al, `Luise' was not
an individual. Rado's claim that the Director "had great respect for this source"
is also false. The traffic from the Director to Rado clearly indicates that Moscow
had serious doubts about the reliability of the information provided by `Luise.'
( Russian version, Part II, p. 13; Hungarian version, p. 28) .
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010886-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
SECRET Books
Eariy in the summer of 1943, according to Rado, the Germans discovered
`Bill,' "a female secretary in the German Military Procurements Commission in
Switzerland." She was fia-ed for her intelligence activities. The last message in
the memoirs citing Bill' as a source is dated 18 May 1943. Rado alleges that the
deciphering of this message led to `Bill's' discovery and his decision to order `Sissy'
to break contact with `Bill.' This is fiction. Messages in our holdings dated 28
June 1943 and 1 September 1943 are sourced to `Bill.' They contain the same
type of information attributed to `Bill' in the message Rado dates 18 May 1943.
(The message in Rado's book may be invention; at least, it does not appear in
our files.) `Sissy' could not have broken contact with `Bill' in early summer., nor
could `Bill' have been fired at that time, because she was still providing infar-
rnatian in late summer 1943. (Russian version, Part III, pp, 27-28. )
In both versions of his memoirs Rada deliberately distorts the date of Otto
Punter's involvement with the Rote Drei and the role of Rudolf Roessler (`Lucy') .
1'he er~rars in this case as in all the others are not the result of an old man's failing
memory, because Rado admits having had access to "original documents in the
files of the Soviet Union." The purpose of these distortions seems to he to burnish
the images of both mean because of their pro-Communist leanings. He alleges,
for example, that he met Punter in 1938 (Russian version, Part I, pp, 59-60;
Iungarian, p. 15). It is more than likely that Rado is lying because a message
from `Dora' to the Director, dated 15 July 1942, identifies Punter as a new source.
It is highly improbable that Punter would have been recruited two to four years
before Moscow was informed.
Rado also claims that `Lucy' and Christian Schneider (`Taylor') worked
without pay, in return only for operating expenditures. Allegedly, they believed
that the U.S.S.R, was the "most- implacable enemy of Hitlerism, and on its struggle
depended the outcome of the war." At least in the case of `Lucy,' and probably
also of `Taylor,' this statement is a lie and Rado knows it. `Lucy' was awell-paid
mercenary, Rado's messages to the Director refer to `Lucy's' demands for pay-
ment, and the Director had to keep sending reassuring messages about finances.
7:'wo mincer points merit mention. In the Russian version (Part II, p. 22 )
of the memoirs Rado describes `Lang,' whom he does not identify as Georges
Blun, as a professional military intelligence officer. More correctly, `Long' was
a professional journalist with experience in intelligence work.
In the Hungarian version (p. 79) Rado erroneously calls `Sissy' Esther Rosen-
darfer. He does not ,give a true name for her in the Russian version. Her real
name is Rachel Duebendorfer. Again, there is clearly no possibility of error.
Alexander Foote identifies her correctly as Duebendorfer in his Handbook for
Series. Rado read Foote and refers to Foote's book in his own memoirs. This dis-
tortion may be a minor attempt to muddy Western records.
-Rote Drei traffic in Rada's memoirs
Although many or all of the messages not in our holdings but published in
the memoirs may he inventions, analysis of all messages in the memoirs and,
where possible, ~ comparison with messages in our holdings revealed no pattern
of deception. Most of the messages not in our holdings an-e described as sent
from Switzerland and as providing intelligence on the plans and disposition of
the German armed forces. Sorne few, sent by the Director, contained requests
Ap~oved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Approved For Release 2004/12/16 :CIA-RDP78T03194A000400010006-5
Books SECRET
for additional information ar comments on the operation, of Rada's intelli-
gence net.
Both the Hungarian and Russian versions of the memoirs contain messages-
dated 1 January 1942 and 22 June 1943 respectively-which purport to relay
Vatican efforts to negotiate a compromise peace settlement between the Western
Powers and the Axis. The messages do not appear in our holdings, but they do
have some basis in fact. The Vatican was hostile to Communism, and in late 1941
it was involved in negotiations aimed at a compromise peace settlement. Never-
theless, the information contained in the messages may be fabricated. They appear
to represent an attempt by Rado and/or his advisors to link the Vatic