STUDIES IN INTELLIGENCE [Vol. 19 No.1, Spring 1975]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78T03194A000400010013-7
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
58
Document Creation Date: 
December 16, 2016
Document Release Date: 
November 9, 2004
Sequence Number: 
13
Case Number: 
Publication Date: 
January 1, 1975
Content Type: 
IS
File: 
AttachmentSize
PDF icon CIA-RDP78T03194A000400010013-7.pdf3.63 MB
Body: 
Approved For Relea 'cTUDIES IN INT".E.LLIGENCE VOL. 19 No. 1 SPRING 1975 CENTRAL INTELLIGENCE AGENCY 25X1 j ARCHIVAL RECORD PLEASE RETURN TO D BL S AGENCY ARCHI d o App I194A00040N100134 3 6 8 25X1 Approved For Releas A000400010013-7 Materials in the Studies are in general to be reserved to US per- sonnel holding appropriate clearances. The existence of this journal is to be treated as information privy to the US official community. All copies of each issue beginning Summer 1964 are numbered serially and subject to recall. All opinions expressed in the Studies are those of the authors. They do not necessarily represent the official views of the Central Intelligence Agency or any other component of the intelligence community. Warning Notice Sensitive Intelligence Sources and Methods Involved NATIONAL SECURITY INFORMATION Unauthorized Disclosure Subject to Criminal Sanctions 25X1 25X1 25X1 Approved For Rele4se 2005/04/21 : CIA-RDP78TQ3194A000400010013-7 25X1 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Next 2 Page(s) In Document Exempt Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NO FOREIGN DISSEM Jack H. Taylor is Strategic Forces Officer in the Product Review Division, ICS. He has served in the intelligence community for some 20 years, principally in DIA and in the Office of National Estimates. For many years he was the principal drafter of the annual National Intelligence Estimate on Soviet strategic forces. Dino A. Brugioni and Robert F. McCort are veteran NPIC officers. Robert L. Managhan, with a doctorate in criminology, has been one of the in- telligence community's authorities on questioned documents for the past eight years. Gail Solin is a China analyst for the Office of Current Intelligence. Dr. Jerrold M. Post, M.D., with CIA since 1965, is Technical Director, Behavioral Sciences, Life Science Division, Office of Scientific Intelligence. Robert M. Clark sandwiched a Ph.D. in Electrical Engineering between eight years in Air Force Intelligence and five years with CIA. He is Chief of the Electronics Branch, Physical Science and Technology Division,, Office of Scientific Intelligence. Stanley Bergman retired after nearly 30 years of service to CIA and its predecessor organizations, including duty on Taiwan and in mainland China during and after World War H. SECRET Approved For Release 200/4)PF RM~ift3194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NO FOREIGN DISSEM CONTENTS Page Wohlstetter, Soviet Strategic Forces, and NIEs .......... Jack H. Taylor I Soviet weaponry: overestimated or underestimated. SECRET British Honors for Lundahl .......... Dino Brugioni and Robert McCort 9 30 years of leadership in photographic interpretation. Trends in African Forgeries .................. Dr. Robert L. Managhan 13 Danger: Con men at workl CONFIDENTIAL The Art of China-Watching ............................... Gail Solin 23 Problems of the China analyst. SECRET NOFORN The Anatomy of Treason ........................ Jerrold M. Post, M.D. 35 Psychological contributions to selective targeting. SECRET NOFORN Scientific and Technical Intelligence Analysis ......... Robert M. Clark 39 The birth and development of scientific intelligence. SECRET Intelligence in Recent Public Literature .............................. 49 SECRET Approved For Release 1qQ0 UNCtAMM78T03194A00040001001v3-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET Soviet weaponry- overestimated or underestimated? WOHLSTETTER, SOVIET STRATEGIC FORCES, AND NATIONAL INTELLIGENCE ESTIMATES Jack H. Taylor The summer 1974 issue of Foreign Policy carried an article by Professor Albert Wohlstetter titled "Is There a Strategic Arms Race?" In the article Wohlstetter took up the question of myths and realities in the "arms race." He sought to demonstrate that much of the public debate over the arms race has been driven by myths, among others the myth of overestimation-that is, the widespread belief that the Pentagon systematically overestimates the strength of Soviet strategic forces. Using the Defense posture statements as his basis, Wohlstetter showed that in fact during the mid-1960s the tendency was to underestimate in such things as ICBMs, SLBMs, and bombers (although earlier, in the "missile gap" era, the tendency had of course been quite the contrary). Since the article was published, I have examined National Intelligence Estimates going back to 1960 to see whether or not the same charge could be directed at the official judgments of the corporate body whose task it is to communicate the views of the U.S. intelligence community, the U.S. Intelligence Board, as set forth in the NIEs. I also checked estimative history as regards anticipated qualitative improvements in weapon systems and their predicted operational dates. I am satisfied on the basis of my research that Dr. Wohlstetter is essentially correct in the case of ICBMs during the 1960s. There are some minor differences between what the intelligence community said and the data Wohlstetter used, but not enough to make a case against Wohlstetter's findings. Take some examples of how the USIB tended to underestimate: NIE 11-8-63 forecast a spread of 370 to 670 launchers for mid-1969. The actual count in mid '69 was 858. NIE 11-8-64 was even more extreme. It forecast 410 to 700 launchers for mid-'70. The actual count was 1,292. The worst of the lot was the NIE issued in 1966. It forecast a spread of 800 to 1,120 for mid-'72. The actual count was 1,527. With the exception of the initial year, the actual count exceeded the projected annual spreads over the entire period covered by the estimate. (See Chart 1.) In reading the past NIEs, I hoped to find some clear rationale for the repeated underestimation. In many years the community expressed views essen- tially along the lines that the Soviets would not deploy as many ICBMs as the U.S. for fear of touching off a new round of deployment in the U.S., or that they would be content with a retaliatory force somewhat smaller than the U.S. force. In 1967, the rationale given for estimates such as 11-8-66 was that the MORI/H RP 1 from S~~E ~Fflrbved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 pg.01-08 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NIE Performance ICBM Launchers: NIE 11-8-66 v. Fact t600 ,- 1400 4--- 1100 H 1000 H 300 ! -- 3 oo I- 700 h- i 71 Spread in Estimate 4 proved For Release 2005/04/21 : CIA-RDP78TO3194A00040001 X ET Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 NIE Performance SECRET Soviets saw political and psychological advantages in having an ICBM force roughly the same size as that of the U.S., and that was said to be the goal of their deployment program. In other years, however, no clear rationale was presented for the projected numbers. In 1968, the text of the NIE established a lower side of the range for the future at 1,360 launchers (the number operational and under construction at that time). Because of several factors that could influence the size of the force, however, it did not estimate the maximum size it might reach.* I thought, when embarking on this venture, that it would be found that we had credited the Soviets with the ability to make rapid strides in weapons technology (leading to MIRVs, high accuracies, etc.,) and that consequent improvements in quality would permit Moscow to limit the quantity of weapons deployed. But this was not the case. Our judgments on when the Soviets were likely to introduce certain qualitative improvements into their systems fitted pretty well with what has actually happened. The "Missile Gap" I suspect, but obviously cannot document the fact, that part of the reason for the repeated underestimation of the growth of Soviet ICBM forces was a subconscious (or maybe even conscious) overreaction by the intelligence com- munity to the gross overestimation of Soviet ICBM growth during the days of the "missile gap." The intelligence community took quite a public flailing for that error of judgment. The "missile gap" era began in August 1957 when the Soviets carried out the first test firing of an ICBM. That firing and subsequent ones served to convince a large segment of the U.S. intelligence community, as well as sizable elements of Congress and the Department of Defense, that the Soviets were preparing to embark on an ICBM deployment program involving large numbers of missiles. From the late 1950s until September 1961, the tocsin was repeatedly sounded that the Soviets were outpacing the United States in ICBM production and deployment. Several statements made by Khrushchev during those years, both public and private, seemed to be encouraging such thoughts. The "missile gap" was much discussed during the Presidential campaign of 1960, and the NIE for that year serves in part to tell why. (See Chart 2.) NIE 11-8-60, dated 1 August 1960, contained three numerical estimates of Soviet ICBM strength for mid-1963. The Air Force estimated 700, the CIA 400, and the Army and Navy 200. State and the J-2 of the Joint Staff stated that they thought the number would be somewhere between the CIA number and the Air Force number. By mid-1963 the actual number deployed was less than 100. In NIE 11-8-61, dated 7 June 1961, opinion was again well divided. CIA estimated that by 1964 there would be 200 to 400 ICBMs deployed; State INR's spread was 300 to 500; Army and Navy liked 150 to 300; and the Air Force projected 850. By mid-1964 the number actually deployed was 191. The Air *State, DIA, and the military services all took footnote to this omission. They considered 1,800 launchers to be the upper limit. S jved For Release 2005/04/21 : CIA-RDP78T03194A00040001001%-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NIE Performance ICBM Launchers: NIE 11-8-60 v. Fact 800 700 State & J-2: Somewhere between A and B Approved For Release 2005/04/21 : CIA-RDP78T03194A00040001W?& Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 NIE Performance SECRET Force, bolder than the rest of the community, also projected ahead to 1966, estimating that by that time the Soviets would have 1,450 in the field. By 1966 the actual number deployed was 250. (See Chart 3). Data collected during the late summer of 1961 showed the community how wrong its estimates had been, and a Memorandum to Holders of NIE 11-8-61 was issued in September of that year. All agreed that there were probably 10 to 15 ICBMs deployed at that time (there were actually only 4) and that by mid-1963 the spread would be some 75 to 125; the number actually deployed by mid-1963 was 91, close to the center of the spread. The Cuban Impact I also feel that part of the reason for repeated underestimating was a lack of appreciation on the part of the intelligence community of how bitter Khru- shchev, and probably others in the Soviet hierarchy at the time, felt about the "facing down" they experienced as a result of the Cuban missile crisis in 1962. At that time the Soviets had less than 50 ICBM launchers operational, and we knew it. The Soviets knew they were dealing from a position of weakness and probably at least suspected that we were aware of their lack of ICBM strength. The chronology of the growth of their ICBM force fits very neatly with a deci- sion that might have been taken shortly after the pullout from Cuba to expand their ICBM force at a rapid rate and probably to a size never originally intended. Deployment of the SS-9 and SS-11 really started to take off four years after the crisis. Heavy Bombers Wohlstetter is again correct in the case of heavy bombers. From 1960 through 1971, the NIEs always phased out the Bison and Bear bombers at a faster rate than actually occurred. There has, in fact, been no reduction in the heavy bomber force for the past six years. I still think that the estimative judgments were logical, albeit erroneous. Why the Soviets would go to the expense of retaining such a small fleet of obsolete heavy bombers defies well-reasoned explanation. Submarine-Launched Ballistic Missiles In the case of Soviet submarine-launched ballistic missiles, Wohlstetter is somewhat wrong in his assertion that the tendency was to underestimate. The NIE history on those systems is mixed. From 1961 through 1963, the NIEs over- estimated. The spread of 160 to 250 projected for 1970 in the 1964 NIE was exceeded, but only in that one year. (See Chart 4.) (It is only fair to point out that the only NIE Wohlstetter used for these allegations about numbers of SLBMs was the 1964 projection, and that isn't cricket.) The subsequent 1965 estimate erred slightly on the high side in its projection for mid-1966, showing a spread of SLBMs for that year of 122 to 137. The actual count was 108. The projection for mid-1967 held at 122 to 137 and was pretty good but for the wrong reason; the unpredicted advent of the first Y-class in 1967 boosted the actual count to 124, within the NIE spread. In projecting beyond SA,. bved For Release 2005/04/21 : CIA-RDP78TO3194A00040001001 ?-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NIE Performance ICBM Launchers: NIE 11-8-61 v. Fact 1500 r 1400 F 1300 1200 I-- 1100 F- 700 I- 600 63 State (INR) Air Force I r Chart 3 7F V 4pproved For Release 2005/04/21 : CIA-RDP78T03194A0004000%1k N pe oed For Release 2005/04/21 : CIA-RDP78T03194A000400L1DD.1.3-7 SLBM Tubes: NIE 11-8-64 v. Fact Oct 1964 1967, the NIE considered only the ballistic missile submarines, and did not specify the numbers of tubes per boat. In doing so, however, the estimate was not too bad. It projected some 50 such submarines, including perhaps 7 of a new class, for mid-1970. The actual number was 47, including 13 of the new Y-class. Our projection in 1966 for mid-1971 fell well below the actual count for that year, principally because we had not yet established a production rate for the Y-class, and the Soviets had 21 of that class operational by 1971, as opposed to an estimate of 10. The NIE in 1967 also fell short in its projection for mid-69 and for mid-72 for the same reason. The 1968 estimate was quite accurate in its prediction, as was the one in 1969. The 1970 NIE's record for the years '71, '72, '73, and '74 was under, under, over, over-but the margin of error in each instance was 20% or less. The main reason for the overestimates in SLBM strength in the early 1960s was the fact that the size of the ballistic missile submarine force remained static from 1962 through 1966. The natural tendency in estimating when a new weapon SS , ved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET NIE Performance system is seen coming in is to project a continuing growth in that system and to anticipate the development of new, improved models. In retrospect, it is now clear that the Soviets opted to hold their SLBM force at a modest level of three- tubed G- and H-class submarines, equipped with short range missiles, until something more nearly approaching the U.S. Polaris system could become avail- able. And it did-the Y-class, fitted with 16 tubes. In sum, the USIB repeatedly erred after the mid-1960s in two out of three categories. No one can claim this as a triumph, and let us hope that the short- comings prove instructive in the future. As Wohistetter has observed, however: "Predicting the size and exact mixture of a potential adversary's weapon deploy- ments several years hence is a hard line of work. It is intrinsically uncertain, reversible by the adversary himself between the time of prediction and the actual deployment." proved For Release 2005/04/21 : CIA-RDP78T03194A0004000' l 7 Approved For Release 2005/04/21 : CIA-RDP8?T &QO QdWf3-7 20 years of leadership in photo interpretation BRITISH HONORS FOR LUNDAHL Dino A. Brugioni and Robert F. McCort Arthur C. Lundahl, Director of the National Photographic Interpretation Center from its inception to 1973, was awarded the Order of the British Empire, with rank of Honorary Knight Commander, in ceremonies at the British Embassy on 17 December 1974. In his presentation remarks, Ambassador Sir Peter Ramsbotham commented: "We are assembled today to do honor to a man whose devotion to his own country has been matched by remarkable services to our common good. Arthur Lundahl's work for the United States has been marked, amongst other honors, by the award of the National Security Medal, of which he was only the 15th recipient. The distinction which Her Majesty the Queen has now been pleased to confer upon him is only rarely awarded to a United States citizen. It is, indeed, one of the most senior ranks of the Most Excellent Order of the British Empire.... Mr. Lundahl will be joining the honored company of those whom the British Sovereign has rewarded over the centuries for services which go far beyond the call of normal duty. The distinction is richly deserved by one whose collaboration with the United Kingdom in the field of photogrammetry, photography, and photographic interpretation dates from the wartime period." Lundahl in his response called U.S. sharing of technical knowledge with the United Kingdom "a return on your investment in us," recalling that when World War II started, the United States: "had nothing in this highly technical field-no photogrammetrists, no photo interpreters, no manuals, no training aids-in short, no technology. The British shared their knowledge with us, including their precious instructors, at a time when they were fighting for their very lives. Those of us who were the recipients of that knowledge will never forget this gesture." If the United States had no such technology at the outset of World War II, Arthur Lundahl began amassing and developing the science and. winning commendations for it-almost as soon as he graduated from the University of Chicago with his geologist's degree in 1942. As a U.S. Navy officer from 1942 to 1946, Lundahl earned the Navy Com- mendation Medal, awarded by Admiral Nimitz, for his photo interpretation work in antisubmarine warfare. From 1946 to 1953, he was a civilian with the Naval Photographic Inter- pretation Center, first as Chief of the Photogrammetry Division and then as Assistant Chief Engineer. In 1953 CIA picked him to direct the program which later became the National Photographic Interpretation Center. He built it into an organization of 1,000 people surrounded by complicated machinery that MORI/HRP from pg. 09-12 F pQM6I r4 eQW1Y005/04/21 : CIA-RDP78TO3194A000400010019-7 ,. Rr?yO"Cf [ RN.Iga 105/04/21: CIA-RDP78TO3194A0004000L100dc 7 Approved For Release 2005/04/21: CIA-RDP78 031?4A00040~0100tk-7 LAW oved For Release 2005/04/21 : CIA-RU UOT& Ie OqW08RI43-7 wasn't even dreamed of until Lundahl decided there was need for such inventions. Under his guidance and direction, a totally new family of photo exploitation equipment was designed and developed to cope with the product of new collec- tion technology. In these advances, Lundahl fused the talents of seven disciplines-photo interpretation, automatic data processing, photogrammetry, graphic arts, com- munications, collateral research, and technical analysis-into organized NPIC teams. Along the way, he was elected President of the American Society of Photo- grammetry in 1954, played a major role in intelligence coverage of the Suez Crisis of 1956, and "surfaced" with the discovery of Soviet offensive ballistic missiles in Cuba in 1962, for which Lundahl received a personal commendation from President Kennedy and NPIC received a Presidential Unit Citation. In January 1963, the National Civil Service League gave him its Career Service Award as the "top photographic intelligence officer in the United States Government." On the occasion of his retirement in June 1973, Lundahl received the Na- tional Security Medal mentioned. by the Ambassador, the CIA's Distinguished Intelligence Medal, and the DIA Director's Award for Exceptional Civilian Service. The rare National Security Medal, authorized by the President for "distinguished achievement or outstanding contribution in the field of intelli- gence relating to the national security," was presented by Acting DCI Lt. Gen. Vernon A. Walters in a July 1973 ceremony. The citation said in part: "He has been a dynamic force for the improvement of intelligence vital to the security of the United States and world peace. His outstanding con- tributions have added new dimensions to the interpretation of the evidence acquired by the most sophisticated collection mechanisms. Mr. Lundahl's 20 years of exceptionally meritorious service with the Central Intelligence Agency has been marked by outstanding ability, imagination, drive, and dedication. His professional competence and personality have made him an inspiring leader in the Intelligence Community and a key adviser to many high Government officials." DCI William E. Colby, presenting the CIA's Distinguished Intelligence Medal, said it was awarded "in recognition of his career with the Agency which has been marked by his outstanding achievement of a distinctly exceptional nature in positions of high responsibility. A superb technician in the field of photographic inter- pretation and photogrammetry with few if any peers, Mr. Lundahl has been the leader in the development of these vital tools in the interest of our national security." At the same June ceremony, Admiral Vincent R. DePoix, Director of the Defense Intelligence Agency, in making DIA's award, commented that Lundahl's contributions to the Department of Defense had been no less significant. Noting that half of the photo interpreters at NPIC were DIA personnel, Admiral DePoix said Lundahl was almost unparalleled in winning the complete respect, admira- FOR OFFICIAL USJE ONLY 11 pprove or elease 2005/04/21 :CIA-RDP78T03194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 OR OFFICIAL USE ONLY Lundahl tion, and devotion of those with whom he had come in contact, and that the NPIC Director had always been mindful of special intelligence needs and interests of the Department of Defense. The future? On leaving NPIC in June, 1973, Lundahl expressed the hope that the technology developed for application to national security can now be applied to peaceful purposes in solving such problems as world hunger. He now is actively devoting his "retirement" to these goals. Approved For Release 2005/04/21: CIA-RDP78TQ3'1 ~4 6SlMUv'I'UC~3J1--LAY Approved For Release 2005/04/21 : CIA-RDP78T03199fp13-7 Danger: Con men at work! TRENDS IN AFRICAN FORGERIES Dr. Robert L. Managhan If the years after 1950 resounded with the noises of cold warriors thrashing about in the African bush, the last few years have been resonant with other sounds. The dedicated disinformation specialist from Moscow or Prague working the African scene has been displaced by a new and more ominous type of operator-the amateur. The less than delicate hands of the Soviets, East Germans, Czechs, and even the French if one wishes to accept the verdict of Newsweek,* have been noted in Africa over the years.** The goals of the disinformation efforts, often involving forged documents, were usually to denigrate the image of the United States and/or its representa- tives, to cause a break in relations between a host country and the United States, or to cause the expulsion of effective economic or diplomatic personnel. Considering the relative level of political sophistication found in the emerging countries, it was not a task requiring great skill and exactitude. While the Questioned Document Laboratory of the Office of Technical Services was normally able to demonstrate the forged nature of the documents, proving the identity of the perpetrator was sometimes another story. In many cases, the physical evidence was less than conclusive in proving the true origin of spurious documents. When a disinformation specialist paid attention to what he was doing, the adducible evidence was not very weighty in proving origin. Africa has always had its share of swindlers, hustlers, and good old-fashioned con artists. Historically, they were involved in the more esoteric forms of folk medicine and in relieving tourists of excess cash. Then some of the bunco spe- cialists realized that the new and inexperienced governments could be victimized as easily-and at least as lucratively-as individuals. It is just a short step from alleging a non-existent plot to fabricating documents to "prove" the allegations. Looking back with the advantage of hindsight, some of the fabrications surfaced in Africa have been hilarious. At the time, however, the situations engendered were far from humorous to those involved. The great majority of African leaders were not elected democratically. Most of them came to power by a coup, and hence they feared plots, coups, and threatened invasions by others seeking power. In an atmosphere permeated by intrigue and emigre plotting, it is no wonder that there is an overreaction to claims of plots, etc. A brief summary of the activities of some, but by no means all, of the individuals * `The War Over Secret Warfare," Newsweek, 30 September 1974, p. 39. "Hearings Before the Subcommittee to Investigate the Administration of the Internal Security Act and Other Internal Security Laws of the Committee on the Judiciary, U.S. Senate: "Communist Forgeries," Testimony of Richard Helms, 2 June 1961 (GPO, 1961) and "Testi- mony of Lawrence Britt (Ladislav Bittman ), " 5 May 1971 (GPO, 1971). C A1p5roved'For Release 2005/04/21 : CIA-RDP78TO3194A00040001001 13-7 MORI/HRP from pg. 13-21 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 CONFIDENTIAL Forgeries in our pantheon of forgers and fabricators may be of value to the reader in trying to understand the problem. Lemuel J. Walker, a twenty-eight-year-old Liberian, always wanted to be an "American Secret Service Agent." In the pursuit of this ideal, he managed to put a few dents in the armor of the American diplomatic stance in Africa. Starting at the age of 17, in 1963, Walker was arrested periodically for forgery and bunco operations by the Liberian police. Walker invented imaginary groups such as the "Student Imphital Program" and the "Joint Student Cooperative Superior Sciences Division" to bilk Liberian businessmen. Some time near the end of 1971, Walker began to formulate plans to achieve his heart's desire. With the assistance of a Liberian printer, Walker was ready to face Africa as "Clifton W. C. Kent," secret agent and "Assistant Director" of "Communications in Superior Sciences Activities, N.S.C., Fairbanks, The White House, The State Dept., The Defense Dept., Washington 25, D.C." (see Figure 1) and as "Walter H. Cliford," "Assistant Director" of the "Central Security Com- mission-Special Interlligence (sic) Agency, National Security Counsel (sic), The White House-The State and Defense Dept." (see Figure 2). Armed with printed letterheads and fancy identification cards also identifying him as "Cheyenne K. Lark" and several other names, Walker started to put together information culled out of magazines in USIS libraries and to type up documents alleging coups, plots, and invasions by the United States against African gov- ernments. Although any American would find a phone number such as "Ext. 20-8338-91-658886" (see Figure 1) somewhat ridiculous, the average African does not, because he is not acquainted with our telephone system. Walker put together a series of documents on his C.I.S.S.A. (Communica- tions in Superior Science Activities) letterheads alleging that the United States was going to spend a million dollars to assassinate President for Life General Jean Bedel Bokassa of the Central African Republic, and then invade the C.A.R. While the documents may appear outrageous to us, they did not seem so to Bokassa, who had come to power by a coup and assumed that others would use force in attempts to unseat him. Bokassa reacted swiftly to the documents by threatening to break relations with the United States. Technical analysis of the document eventually convinced Bokassa that the documents were indeed fabrications. Not long afterwards, President Achmed Sekou Toure of Guinea announced in his precise, oratorical French that the throats of all Americans in Guinea would be cut if there was another invasion of Guinea. Sekou Toure also had a sheaf of C.I.S.S.A. documents which were aggravating an already serious persecu- tion complex. At this time, Sekou Toure gave out one of his more remarkable pronunciamentos, "Documents can be forged, but the information is true." * A series of investigatory leads led back to Monrovia. With the cooperation of the U.S. Embassy and the Liberian government, it was determined that a "Clifton W. C. Kent" who tried to borrow money from the Embassy was identical with Lemuel J. Walker, the convicted bunco artist. Examination of Walker's prior written police confession established that he was the writer of the handwritten portions of the C.I.S.S.A. documents. Walker was finally arrested in Abidjan *Meeting 30 September 1972, Toure and U.S. Ambassador Terrence Todman. A~$roved For Release 2005/04/21 : CIA-RDP78T03194A0004 N Ff R l4L Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Available Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 Forgeries CONFIDENTIAL Figure 1. Samples of Walker's letterheads and rubber stamps. WIA D?WFIALRelease 2005/04/21 : CIA-RDP78T03194A00040001001l 7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 CONFIDENTIAL Forgeries 1`txe hearer of this card i az 4s 1M 't c rtxy, Agency cif the United, Star Sts t* ', tl t s , ax y 1J . IM plo s. at 7cink ial of the 1~T:. yot indfing tlaz! c rd mar to e eutlect One }tus drecl !)cellars re and A00roved For Release 2005/04/21 : CIA-RDP78T03194A00aM6I``M31 L Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 Forgeries CONFIDENTIAL in December 1972, while trying to peddle fabrications to three different govern- ments, and was extradited to Monrovia. Subsequent interrogation revealed that Walker was not in the employ of any other power. When arrested, Walker had a series of documents on him which he had prepared for passage to foreign governments. (See Figure 3.) A neurotic role-player with a desire for prestige and money almost managed to ruin U.S. relations with numerous African countries-and he wasn't really personally anti-American. While Walker was busily promoting his misspelled documents, Herman Essoka, a Cameroonian, was trying to peddle alleged secret cables from Soviet Foreign Minister Andre Gromyko and/or U.S. Secretary of State William Rogers. In a remarkable display of even-handedness, Essoka made the United States and the U.S.S.R. in turn the villain in his fabrications. Posing as either a translator in the code room of the U.S. Embassy in cities such as Cotonou, Lome, Libreville, etc., or as a translator in the code room of the Soviet Embassy in cities such as Lagos, Yaounde, Cotonou, etc., Essoka would claim to find evidence of a Soviet or U.S. coup plot in the form of a "secret coded telegram." Essoka had the United States plotting against the governments of Zambia, Sierra Leone, etc., and the Soviets trying to unseat the governments of Liberia and Chad. His "Andre Gromyko" appeared to have difficulties deciding whether to communicate in French or English; Essoka has the ability to write equally ungrammatically in French or English. A tense atmosphere over a period of several weeks in Sierra Leone was ultimately relieved when a friendly liaison service was able to show the president of Sierra Leone, Siaka Stevens, that Essoka had claimed to be working in the U.S. code room and the Soviet code room in letters written one week apart. Luis Manuel Gonzalez Mata-Lledo, a forty-six-year-old Spaniard, has managed to lead an exciting life. Expelled from a Spanish seminary at nineteen, Gonzalez served five years in the Spanish Foreign Legion and then made his way to the Dominican Republic. After joining the Dominican intelligence service, he worked his way up to the position of assistant director by 1962. His career in the Dominican Republic came to an abrupt halt when he embezzled $28,000. Since 1962, Gonzalez has been in trouble with the authorities for insufficient funds in his checking account, for possessing the wrong passport, and for bilking young ladies out of their dowries. His career as a forger and fabricator started in 1963 when he tried to sell forged evidence implicating Rafael Trujillo in a plot to assassinate Dominican President Juan Bosch. After a second try at selling forgeries to the Dominican Embassy in Paris, this time under the name "Dr. Miguel Abrantes," Gonzalez tried to approach the U.S. Embassy in Algiers as a representative of the notional "Third [Spanish] Republic Movement." By early 1967, Gonzalez was posing as a former Cuban intelligence officer and claimed to be working for another notional group called "Conferencia Vanguardia Latino-Americano" which was going to run a guerilla infiltration of Brazil from a Cuban base in Conakry, Guinea. Although rebuffed by the Brazilians, Gonzalez returned to the fray as "Captain A. L. Maedo" approaching the U.S. Embassy in Brussels with the same story but with the United States as the target. The "Vanguardia" plot was successively offered to the Venezuelans, Columbians, and Dominicans. Although slightly discommoded by an arrest on a false passport charge, Gonzalez moved to Paris in late 1967 when he became "A. Despadrel" C4RF1IFiAk Release 2005/04/21 : CIA-RDP78T03194A0004000100'1g-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 CONFIDENTIAL Forgeries UNITED STATES OF AMERICA MILITARY IN T ERLLIGENCE Col. William Moore 6peerai Secto-Section (MARINE UNIT) PENTAGON Washington, 25, DC I am herewith sending you the letter that I just received C-3A from Youssef El All in Tripoli stating that the Israelis are insisting on carring out their operation at a time oppoture to them, but without instructions from either Tel-Aviv or the agency here. According to.his letter as you will see for your- self, they are acting very much disorderly and perfunctory, as a matter of fact, they have automatically refused to cooperate with either Khalil or Abdullah. We already received a reply from Cairo but it is very discour- aging, the feller do not at all work for the Egyptian War Dep- artment, he simply got his information from somewhere we still can't trace up to now, but he was intrepitity enough to colle- seven thousand dollars from the boys there and vanish; I mean the man vanished in thin air. Did you get that personally and confidentialli message I send by Director Kent? If so, please advise what you suggest I sho- uld do as I wouldn't like to get into any misunderstanding or any argument with my superiors here. We send two boys to Warna and Al Aziziya regions, they are the areas that is on Kadaffi plan for constructions by the Egyptians; according to report I received from the man at the economy and industry Ministry. I wish you a very happy birthday and give my regards to every- one in the famaly, I hope to see you soon. (K) section C~i+j?alk Approved For Release 2005/04/21 : CIA-RDP78T03194A00(Q018@1N IAL Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Forgeries CONFIDENTIAL of the "Liberation Front for Latin America" and "Rudolfo Campos," a Colombian national traveling on an Algerian passport with information to sell the Libyans on an alleged Soviet intelligence organization. To bolster his story he manu- factured his own KGB file cards which he filled out in his own curious mixture of Cyrillic and Latin characters. After a year or two trying to peddle his deck of KGB cards, Gonzalez had a change of heart and sold the Cubans a stack of self-designed CIA file cards. Gonzalez' anti-Cuban activities started again in late 1969 when he designed "Operation Lubumba" (sic), a Cuban invasion of Zaire. This time, posing as "Dr. Rogelio Garcia Castro," he also favored the Ivory Coast, Gabon, and the Cameroons with Cuban invasions via Conakry. After surviving temporary housing in a French jail, and prior to his German jail term for forgery in 1971, Gonzalez designed the fabricated U.S. invasion of Mali. This plot had the CIA and the FBI joining a joint Spanish-Portuguese group which would invade Mali by marching through Mauretania. From the end of 1971 and through 1972, Gonzalez concocted his "Operation Amanacer" documents, which were offered and/or sold to numerous South American countries including Mexico, Honduras, Nicaragua, Bolivia, Brazil, Costa Rica, Ecuador, and Venezuela. By just changing the name of the country on his master copy, Gonzalez was able to proffer documents to all. In the "Amanacer" plots, Gonzalez used the name of "OSPAAL," an actual Cuban propaganda mill, as the sponsoring group for his Cuban invasions. In one of the more remarkable footnotes to history, Gonzalez managed to get the entire Soviet colony in Bolivia declared persona non grata. He passed documents to the Bolivians which claimed that Cuban guerrillas in Conakry would be loaded on Soviet ships and would sail across the Atlantic and then somehow attack Bolivia. Nobody appeared to notice that Bolivia has no coast-line. After several more attempts to peddle anti-Cuban documents in South America and Africa, Gonzalez turned against the United States again and is believed to have been the author of information alleging U.S. involvement in the attempted coup of 1972 against King Hassan of Morocco. When last heard from in 1973, Gonzalez was selling information to the Cameroonians in Paris, posing as a German, and selling undeveloped films of "secret bases for anti- governmment plotters" to the Moroccans. The "Moroccan" films turned out to be pictures taken during carnival season in Germany. In September 1971, an individual calling himself "Dr. G. H. D. Opal" first came to our attention with an alleged plot by the "African High Command Unit" to assassinate President Banda of Malawi. The assassination was to be carried out by a "Patricia Morley," allegedly an American citizen employed by Orbitair. The mysterious "Patricia Morley" was to carry out the plot by poisoning him with "phentic acid." It should be mentioned that phentic acid is another name for carbolic acid, the substance that gives library paste its pungent odor. In 1972, Dr. Opal was selling information to the Liberians on the plans of the "Clean Africa Committee," a notional group allegedly planning to eliminate African leaders who were not sufficiently pro-African. This time "Patricia Morley" was to assassinate President Tolbert of Liberia by putting phentic acid in his swimming pool. (See Figure 4.) It has been (1#F ,epr Release 2005/04/21 : CIA-RDP78T03194A000400010010-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 cMQASSY 0F1T11E REF J- C ~JA Jew t ~ ~~ h ~_ nvcr~ ' r --4 ~i s sn` -n y~ l t,__ aX z p (Q( /~ GQl Cca- 3t{ C U-0 -D 1 5 1 'I L1 7 4,' CT J ?~ ~l Lti~ c~ Y e (ftik 1w cx GI VI, S, ~(~ ? it Q h^ iS a Ic~C~~ b~ h~~c 1'11iSS {ic Drl ;~ lErr~ ~1~1v_r~ Sl~a ~uJS8l(SG~ l~. ~~C,i, e~~~~ ~(; Ala p poke Lv 1 (cQ -~ t> voY vik ? + ~;I ?p~ a~ ecfr~ 2G, atr1;,~- C)~i ,~. SW imMA~1~ peo1 c P Poicc~ i C lVr1~ a Jta9 ~a~'~~e{~~S tio+ Yv~c~~~r L v ~p~t~ ~n2 a e~ eaL" ~t fSVi oQsL9Q t i- ~~4C( .y k a( z~ a-2 D ?ti~l i ~Q +~ is l i s a t o b~G~v~ 'f- 1 p ? t'iS _ N [T t Cam. Yv~ f ~?~ ~. I t $ C~ cam` SQ 1~EU ' wi a, Pp~ 1 C1 ~ /Q i S Lc { ~la., S SGT-QC.IGQQ 1' 73-1- r4 Figure 4. The "Phentic Acid" Assassination Report. Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Forgeries CONFIDENTIAL calculated that 200 pounds of carbolic acid mixed into the water of a pool of average size would make a 5 percent solution which would be efficacious in eliminating athlete's foot, but would be far from lethal unless ingested. Assuming that one could clandestinely slip half a ton of carbolic acid into a pool and mix it-perhaps with an outboard motor-it might be injurious to health if one swam a few laps in it. No prose could describe the prospective odor of such a mixture nor the unlikelihood that an unsuspecting victim would dive into the solution. In August 1973, Dr. Opal managed to get documents into the hands of Sekou Toure of Guinea. This time, President Toure was to be assassinated with a .39 caliber Wembley (sic) under the direction of Patricia Morley. While Orbitair is a legitimate firm, they have never had any employee by the name of Patricia Morley. In addition to getting the mythical Patricia Morley confused with a real USIA employee who had TDY'ed to Conakry, Sekou Toure managed to combine the Patricia Morley fabrication with the gleanings from all the emigre letters available to his intelligence service and come up with a monster plot against Guinea by all her neighbors. Before the rhetoric died down, Guinea had broken relations with Senegal and the Ivory Coast. The Senegalese were contacted in December 1973 by Opal with documen- tation from the "Free Africa Committee" about an alleged plot to kill President Senghor, again with that ".39 caliber Wembley." A second plot by Patricia Morley against Senghor included the use of "phentic" which by now was "like a camera and is operated like a camera." While Lemuel Walker is still in jail, it is expected that he will be released one of these days. Hermann Essoka, Luis Manuel Gonzalez Mata-Lledo, and Dr. G. H. D. Opal and several others are still free, somewhere, busily sharpening their tools for the next sting. An educational program in some of the African countries has impaired the effectiveness of these forgers/fabricators, but there is still work to be done in countering Walker and his ilk. With amateur mer- cenaries like these at work in Africa, it is no wonder that professional Bloc disinformation specialists have been able to turn their attention to other areas. CQW4K61J dr Release 2005/04/21 : CIA-RDP78T03194A0004000100073-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A00040gjj %jf3-7 No Foreign Dissem The following article does not answer any questions about what is going on inside China today. It is not intended to. It deals simply and solely-and with an unusual degree of self-deprecation--with the state of the art of the Sinologist or China-watcher. This article is for those who wonder what problems the China analyst has, what tools, techniques, and assets he can bring to bear, and how confident he may be in the end product. Note at the outset that the title calls it an "art," not a "science." The Editor THE ART OF CHINA-WATCHING Most knowledgeable observers agree that information on, and analysis of, events within the People's Republic of China has advanced now to the level of "Kremlinology" about 15 years ago. It is no semantic accident that observers of the Chinese political scene are more often called "China-watchers" than "Sinologists," while analysts of the Soviet Union are frequently referred to as "Kremlinologists." The art of China-watching is imprecise at best, and hardly deserves yet to be callled Sinology. The explanation, or blame, for this often frustrating situation lies mainly with the way the Chinese conduct their affairs. To say the Chinese have a penchant for secrecy is almost an understatement. Some Chinese have said privately that they deliberately try to hide important domestic events from their northern enemy, the Soviet Union. While there is certainly an element of truth in this, the Chinese are also anxious to conceal information from the Chinese populace and from the outside world in general. The secrecy syndrome applies more often to domestic than to foreign affairs. By its very nature, Chinese foreign policy inevitably makes itself known. With a second country involved, Peking has had less success in hiding its foreign policy. On the domestic front, however, there have been for the past several years serious policy differences and genuine personal animosity among the Chinese leaders. It is these schisms that Peking seems most anxious to hide--from the Chinese populace, in order to promote confidence in the leadership and relative stability at the grassroots; from the Soviet Union, because Peking believes Moscow has tried and will try again to exploit differences in the Chinese leader- ship; and from the rest of the world, perhaps for similar reasons and also because the Chinese seem to believe that their internal affairs are none of our business. They complained bitterly about Western press coverage of Chinese domestic politics last year. They did not like the interpretation presented in the articles, but neither did they say anything to clarify the situation. The Aging Leadership By most standards, China is a peculiar country. It has perhaps the most aged leadership in the world. Four of the five vice-chairmen of the party are in their seventies. The chairman, Mao, is 81. In the government bureaucracy, MORI/H RP which exists alongside the party structure, there is no head of state. In fact, from pg. 23-33 SWPP~aved For Release 2005/04/21 : CIA-RDP78T03194A0004000100?3-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET China-Watching as with most major decisions, it took the Chinese several years of debating the issue to decide whether to abolish the job. Until January, when the post was officially dropped, it was filled on a temporary basis by an 88-year-old party veteran. Without a head of state, the highest ranking government official is the chairman of China's legislature. He, too, is 88. Since the Communists came to power in 1949, China has been run by es- sentially the same small group of aging revolutionaries. As a rule, they do not retire. They tend to remain in office until they die or are purged. Thus far, very few have died. Because they are roughly the same age-that is to say, old indeed-there is the danger that they will all die nearly at once, leaving a relatively inexperienced group of younger officials to take over the world's most populous country. Only in the past two years has this old leadership made a concerted effort to bring younger people into the top ranks of the party and government hierarchies. By Chinese standards, "younger" generally means men in their sixties. Being elevated so recently, these younger officials will probably not have much time to show their administrative and political talents, especially the ability to survive the political maneuvering, backbiting, and rivalries that are likely to emerge when the old leadership finally passes from the scene. Because the leadership has been relatively tardy in beginning to put together a succession arrangement, China watchers have little information to go by in trying to predict the outcome of a possible succession struggle and the directions Chinese policy will take in the coming years. Why the leadership was so slow in recognizing the obvious need to groom younger officials remains a mystery, but no firm steps were taken until the party congress in August, 1973, 24 years after coming to power. Vacancies and Unannounced Appointments There are, of course, many mysteries on the Chinese political scene. For more than three years there was no officially designated defense minister, al- though it was fairly obvious who was acting in that capacity. The man was finally given the job publicly in January, but why he wasn't named earlier is yet another unanswered, and perhaps unanswerable, question. The man is 76, which means the Chinese will have to go through this same apparently arduous process of choosing a defense minister again in a few years. The previous defense minister was Lin Piao, Mao's designated heir who allegedly died in a plane crash fleeing to the Soviet Union after an abortive coup attempt. All the events surrounding Lin's political demise and death will probably never become known, but the incident has had a profound effect on the Chinese leadership. It has fed their fears of possible Soviet meddling in China's domestic affairs and has transformed the once glorified army into an institution now viewed with considerable distrust. In typical Chinese fashion, Lin was privately vilified by name in documents circulated within China, but for the public record he was just an unidentified "political swindler." Everyone in China and outside knew that the "swindler" was Lin, and the Chinese probably were aware that they were fooling no one with their attempts to conceal his identity by not using his name publicly. Nevertheless, it was not until nearly 2,4 For Release 2005/04/21 : CIA-RDP78T03194A00040001 ?K& APP CADi9rloaefich og Release 2005/04/21 : CIA-RDP78T03194A000400Q40Qgf-7 two years after his death that the Chinese propaganda machine started to attack Lin by name. The defense portfolio was just one of many jobs that remained vacant for years on end. For several years there was no army chief of staff, no finance minister, no one in charge of health, no one in charge of public security, and, despite the growing importance of China's oil industry, no minister of petroleum. At no time since 1971 have all of China's provinces had an officially designated top man. Each time a new job opens up in China, it evidently becomes a political nightmare just to get a small group of people to agree on who should fill it. Most Chinese, even those in officialdom, can at best take only wild guesses as to who sits in what job until the appointments are announced by the Chinese press. Because the Chinese people, and even many officials, are often kept in the dark about domestic politics, the usual problems of obtaining clandestine informa- tion about denied areas are magnified in the case of China. Officials abroad are often as confused about domestic developments as western observers are. An amusing exchange ensued last year when the Peking press began to attack the Italian film maker Antonioni. One official abroad asked another what the attacks were all about, and the reply was that there had been no explanation from Peking. Meanwhile, China watchers in Washington and elsewhere were frantically poring over the articles, certain that they were of enormous significance but not at all united about why they were. Propaganda Analysis Over the years, China watchers have developed some analytical tools, much the same as those used by Kremlinologists, to help break through the fog. The Chinese, for their part, as their perceived need for secrecy has increased, have devised a number of schemes to render these tools less useful than they might once have been. One rule of thumb is that in their propaganda the Chinese do not say things by accident and rarely say anything directly. They did not, for example, attack Antonioni for nothing, and they probably were trying to convey other messages beside their distaste for the film he made about China. One theory was that the attacks were directed at someone in the Chinese leadership who was known to be an Antonioni fan, another that they reflected a hardening of Chinese views toward cultural exchanges with the West. While the various theories arrived at through propaganda analysis usually lead to lively debates among China watchers, rarely can any single theory be proved conclusively. Complicating the process of analyzing propaganda is a relatively "free" press in recent years, at least for those in the highest levels of the bureaucracy. The party's offical newspaper has been known to carry two articles on the same subject in the same issue, expressing diametrically opposed views. Because no one "faction" in the leadership has exclusive access to the press and because even signed articles are usually in pseudonym, China watchers can never be absolutely certain whose views are being expressed in a given article. Imprecise though it may be, propaganda analysis is often the only way to keep track of an important political development as it evolves. Last year the Chinese waged a major political campaign, almost exclusively through prop- SApproved For Release 2005/04/21 : CIA-RDP78T03194A000400010039-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET China-Watching aganda, that attacked two corpses-the fallen defense minister, Lin Piao, who died in 1971, and the ancient sage Confucius, who died some 2500 years ago. The propaganda articles discussed major figures and events from the Chinese past, but the historical figures seemed to be surrogates for people in the current leadership, and the events often resembled current problems. Accepting the premise that the historical figures did in fact represent current leaders, the problem of course was to determine which ones. With little more than propaganda to go on, China watchers came up with widely differing interpretations. Adding to the confusion, some historical figures who had been consistently praised for implementing progressive policies suddenly were attacked in other articles. The reverse took place. All this suggested that different people in the leadership were promoting their own favorite historical figures, i.e., those who stood for themselves, and denigrating the other stand-ins. Confucius, of course, was consistently attacked, sometimes for very specific and detailed misdeeds. For example, he was criticized for being finicky about food and insisting that his meat be sliced just so. This accusation, though obscure to China watchers, probably was very revealing to the small group of leaders at the top who know one another's habits thoroughly. No information has ever turned up as to who in the current leadership is noticeably picky about food, but un- doubtedly the individual in question and his colleagues recognized the target immediately. When Chinese leaders attack one another through the use of information known only to themselves, it not only leaves China watchers overseas baffled, but makes it impossible for most Chinese officials to understand who is being attacked. In fact, officials and the Chinese populace in general were all instructed to study the same propaganda articles, without explanation, that the outside world was puzzling over. They, too, had to be China watchers, and their specula- tion as to who was under attack covered the entire political spectrum in the Chinese leadership. A Chinese official even guessed that the target was the 88- year-old acting head of state, who was extremely frail and died a year later. One Chinese, expressing his frustration over the obscure criticism of Confucius, posted a notice on a public building that read "why are we attacking someone who has been dead more than two thousand years?" To their credit, China watchers were generally quicker to recognize the importance of the anti-Confucius campaign than were many Chinese officials. One of the pitfalls of propaganda analysis is that certain catch phrases used repeatedly over the years can mean different things at different times. The term "three-in-one combination," for example-the organizational principle for the formation of local administrative organs-meant at its inception a combi- nation of experienced officials, military men, and "the masses," i.e., ordinary workers or peasants. In recent years, however, as the military has fallen into disfavor and many workers and peasants have shown themselves to be incompe- tent administrators, the phrase has now come to mean a combination of old, middle-aged, and young officials. Failure to recognize the change in meaning would leave a China watcher several years behind the times, leading him to believe that the Chinese were still interested in having soldiers, workers, and peasants share the management of the local administrative units. Proved For Release 2005/04/21 : CIA-RDP78T03194A00040001%% C W8pAggr Release 2005/04/21 : CIA-RDP78T03194A00040% 113-7 Subtle changes in the propaganda line are often extremely significant, and a China watcher can be left high and dry if he misses the changes. In its heyday, the army was the model for, all of China. Everyone was exhorted to learn from the army. When in recent years the Chinese added that the army must learn from the people, this was the Chinese way of telling the outside world that the army was falling out of favor with the leadership in Peking. Propaganda analysis would be incomplete without a careful study of the propaganda line coming from each of the provinces and comparisons between them. Sometimes, differing lines from various provinces mean only that the local leadership is confused about what to do. In some cases, however, the differences are very meaningful. When ex-defense minister Lin Piao was still in power, many provinces said the army was founded by Mao and commanded by Lin; others said the army was founded and commanded by Mao. With the advantage of hindsight, it is clear that even well before his fall, Lin's authority had begun to erode. What is not clear is whether those provinces that failed to mention Lin in this context were merely expressing their own dissatisfaction with him or whether they were acting on instructions from leaders in Peking who were working to oust him. In this case, as in many others, China watchers will probably never know the answer. They can probably make an educated guess, however, that those provinces which say the army should "obey" the party contain military men more willing to submit to party authority than those provinces which say the army should merely "respect" the party. The Pecking Order Another favorite tool of the analytical trade is the scrutiny of leadership appearances. The order in which Chinese leaders are listed can be a reliable gauge of their relative standing in the leadership. The Chinese have often cir- cumvented this system by listing their leaders in the Chinese equivalent of alphabetical order. On major holidays, the Chinese used to hold mass rallies in Peking, with the entire leadership standing before the assembled crowds. Who stood next to whom was another clue to the importance of individual leaders, but in recent years the rallies have been abandoned. Instead, several small groups of leaders appear in different parks in Peking, thus avoiding a public display of the entire pecking order. When several important officials fail to appear over an extended period of time, it often means that a leadership meeting is in session. When at the same time the top officials in many of China's 29 provinces do not appear at home, the betting is that Peking has called in leaders from the provinces for a large meeting. In August, 1973, as China watchers awaited a party congress, Peking threw the intelligence community off the track: the national leadership attended a table tennis match, and, on the same day, a provincial leader gave a speech at home, several thousand miles from Peking. As it turned out, the party congress was in session during the time. In what was an obvious effort to hide the fact, the meeting was adjourned in midstream to allow national leaders to appear in public; the provincial leader, who obviously did not attend the congress, was elected in absentia to the party's ruling Politburo. SECRET 27 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 A%ravd For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 China-Watching When all else fails, Peking resorts to outright deceit. In January, a secret party meeting elected a new party vice chairman from the ranks of ordinary Politburo members. After the meeting, in order not to tip the public, the new vice chairman was listed not among the other vice chairmen but among ordinary members of the Politburo. Thus the meeting and the new appointment remained a secret until Peking chose to reveal it. In the hands of the wrong people, the game of appearance watching can result in widely speculative and highly sensational conclusions. When a national leader does not appear in public over an extended period of time-say a month or more-the Chinese people themselves, who watch appearances just as analysts do, invariably begin rumors about their political demise or death. On one occa- sion, after Madame Mao had not appeared in public for a couple of months, some Chinese devised a wild story to explain her absence: they concluded that she had had a fight, including fisticuffs, with her husband, and he had killed her. She reappeared a few days later, however, with no black eyes. In the case of Mao, who has often withdrawn from public view for long periods, rumors of his death have plagued analysts for years. If accounts from Chinese officials and ordinary people over the years were compiled, it would ap- pear the man has died at least 20 times since the mid-1950s. Today, he remains alive and relatively well, considering his advanced age. Reports of Mao's death naturally send shock waves throughout Washington officialdom. Because there is no way to verify or discredit these reports until he appears again in public, some China watchers have more than once been forced to conclude tentatively, and even sometimes in writing, that he was dying. With the Chinese tendency toward secrecy, it is impossible to predict how soon after Mao's actual death the Chinese will announce it. There are, of course, a few who still maintain Mao has been dead for years, and the man seen greeting foreign visitors is actually a double. Does Logic Help? Logic, or common sense, is sometimes the China watcher's only tool for assessing the veracity of a piece of new information. The problem is that the Chinese, who are not without common sense themselves, can often disregard it when they choose to. In July 1973, when the first report of preparations for a party congress appeared in China watchers' in-boxes, many tended to reject it. The party's anniversary had passed a few days earlier without so much as a major article in the Peking press extolling the virtues of the party. If a party congress was in fact in the offing, it was reasoned, surely the Chinese press would have made more of the party's anniversary. Additionally, the leadership was still sharply divided over a number of serious issues and showed no signs of resolving differences; the party apparatus in several provinces was still a shambles. Under these conditions, there seemed no point-indeed, it could be disastrous- to convene a party congress. The Chinese, who were obviously as aware of their problems as China watchers were, held the congress away. To be sure, the congress was something of a disappointment. Many important issues remained unresolved, and the congress seemed to raise more questions than it answered. When, in December, a secret party meeting took some major steps toward resolving some of the prob- Ap'}$roved For Release 2005/04/21 : CIA-RDP78T03194A000400010ffT CARaw9hF,f Release 2005/04/21 : CIA-RDP78T03194A00040 SECRET 3-7 lems, the question was raised again as to why the congress had been held in August; it obviously would have made more sense to wait until December, when the political climate was apparently more suitable for major decisions. Logic does not fail in every case, however, and it sometimes allows the China watcher to second-guess even top Chinese officials correctly. At the August 1973 party congress, Premier Chou En-lai announced that the National People's Congress, China's legislature, would convene "soon." At the time, the anti-Confucius campaign had just begun and was likely to cause further divisive- ness among the leadership and have major repercussions throughout the country. With a major political campaign just getting under way, many China watchers believed that chances of holding the National People's Congress under these cir- cumstances were very slim. Nevertheless, no China analyst worth his salt is going to contradict Chou En-lai and say in writing that the premier has either taken leave of his senses or does not have a firm grip on the political scene in China. Chou, as it turned out, had indeed miscalculated: the National People's Congress was not held until a year and a half later. This was not the first time Chou had "misspoken." Earlier, he told a western reporter that China's harvest would show an increase over the previous year. A month later, he had to retract that statement; the harvest had in fact shown a four percent drop. China analysts seldom ignore statements coming directly from Chou-with good reason. The occasional slips, however, can cause confusion. Statements by high-level Chinese officials on the internal conditions in the country are so rare that the China watching community must pay particular attention to them, but there is cause for some caution on this score. A member of the party's ruling Politburo, in response to a question about the anti-Confucius campaign, calmly answered, "We know what we are doing." At the time, the campaign had already caused major disturbances in several provinces and was beginning to affect the economic sector. In fact, shortly after that statement was made, the campaign was all but turned off. Its only visible result had been a decline in production, clearly not the intent of the leadership, and China watchers have a right to question whether the Chinese did in fact know what they were doing or whether they merely knew what they wanted to do but were not sure they would be successful. It is also possible that the Politburo member was lying through his teeth or that, while others in the leadership did indeed know what they were doing, this person, who most observers would conclude was ultimately a loser in the political sweepstakes of 1974, did not. Leadership Speeches While statements by Chinese officials are frequent and relatively easy to come by, China's leaders stopped making public speeches about domestic po- litical affairs several years ago. One Politburo member tours the provinces giving addresses on agriculture, but save for these and two general wrap-up speeches by Premier Chou En-lai at major leadership meetings in the past two years, no Chinese leader had gone on public record regarding internal affairs since the mid-1960s. This situation contrasts sharply with that of the Soviet Union. In recent years Moscow had held party congresses on a fairly regular basis; the congresses SECApproved For Release 2005/04/21 : CIA-RDP78T03194A00040001613-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET China-Watching hear a major address that usually drags on for hours, in which party leader Brezhnev reports on party affairs, and another long speech by the Soviet Premier on the economy. These speeches and many others delivered on less ceremonial occasions are made public. At China's last party congress-only the third since the Communists came to power-Mao was said to have made a few brief opening remarks, which were not made public. In fact, Mao has not made a public speech since 1949. While Soviet analysts chew on marathon speeches by Brezhnev, China watchers must content themselves with the brief, usually enigmatic, quo- tations that Mao issues periodically. Chou En-lai's two speeches were a mixed bag of political, economic, and foreign affairs. Even at the National People's Congress, China's vehicle for re- porting on and ratifying government policies, there was no separate report on the economy-at least no report that was made public. Precedents and Past Performance One analytical tool that has been all but rejected by China watchers is the use of precedents. The Chinese have broken with past practice on several occasions in the last two years, and China watchers have frequently been led astray by trying to predict events on the basis of past patterns. The party congress is a good example. Congresses have usually been preceded by a plenary session of the party Central Committee. The plenum, held in secret but revealed after it is over, usually issues a call to convene the congress. On its first day, Peking announces the opening of the congress and issues periodic reports during the session. The congress is usually held in Peking's grandly named building, the Great Hall of the People. Lights burning late at night in the building, and large numbers of cars, buses, and limousines parked outside are visible signs to Peking residents that a major meeting is in session. In August 1973, however, there was no Central Committee plenum, no sign of activity at the Great Hall of the People, and presumably no congress. As China analysts watched and waited for the usual signs, Peking surprised every- one by announcing that the congress was over. The National People's Congress of 1975, held in January, revealed another break with precedent. This meeting has usually been a public affair: banners in Peking greet the delegates as they arrive, foreign visitors have attended, and the press builds up the event with frequent references to it. On several earlier (and abortive) attempts to hold the conclave, the press did indeed refer to it, and more than once the New Year's Day pronouncement from Peking indicated it would be held within the year. This year, the New Year editorial ignored it, but the meeting was secretly held two weeks later. In an important departure from the standard way of doing business, wide- spread personal attacks on high ranking party and military officials throughout 1974 have thus far had no visible effect on their political health. During the Cultural Revolution, if an official was publicly criticized in wall posters, this spelled the end of his political career-in most cases he was either about to fall or had already been stripped of his power. Officials attacked in wall posters last year, however, adopted a very casual attitude toward the process; some even went out of their way to point out the posters to foreign visitors. None of Ap&pved For Release 2005/04/21 : CIA-RDP78T03194A00040001051X-gET Approved For Release 2005/04/21 : CIA-RDP78T03194A00040g?1OQ ,3-7 China-Watching Ct KK those attacked last year, including some who came under extremely heavy fire in several different provinces, have been purged. Today, wall posters are ap- parently not as damaging as they were a decade ago, but China watchers were misled into thinking one of the party vice-chairmen was purged because he was widely criticized in posters. Peking Directives Directives from Peking, in essence the laws of the land, are usually a good way to gauge the intentions of the leadership. Ironically, as knowledge of the contents of these directives has increased, thanks to clandestine collection efforts, the number of directives issued each year has steadily declined. From some 90 in 1971, to perhaps 60 in 1972, to 44 in 1973, the number bit an alltime low of approximately 27 last year. With such a large country to manage, presumably there are a number of issues demanding the attention of the leadership and requiring specific and authoritative instructions from Peking. Disagreements in the leadership over a number of questions may have con- tributed to the declining number of Peking directives. In some instances, these differences manifest themselves in contradictory directives. The occasional re- versals are usually short-lived and have not affected the general trend of events, but they raise important-and puzzling-analytical questions. How can one faction in the leadership be strong enough to push through a directive one day but be unable to get it enforced the next? How can they block a personnel ap- pointment for months but suddenly be powerless to stop it? And who, in fact, are "they"? Last year, most directives from Peking set strict limitations on the conduct of the anti-Confucius campaign: officials could not be criticized by name; wall posters, written by the general populace to expose the "crimes" of unnamed officials, could not be posted outside public buildings where foreign visitors could see them; and people were not to bring their complaints to Peking but were to stay in their provinces and resolve their differences at home. Suddenly a new directive was issued which said just the opposite: it was all right to attack officials by name, posters could be put up anywhere, no effort was to be made to prevent foreign visitors from reading them, and the people were invited to come to Peking to express their grievances. Taking Peking at its word and acting in accordance with the latest official directive, a number of people descended on Peking, mounting posters throughout the city attacking several important officials by name. The poster writers were quickly suppressed: they were harassed, and sometimes jailed, by the security forces, and their posters were often torn down as soon as they were put up. The poster writers were then sent home to their provinces, and from then on the campaign proceeded as though the latest directive had never been issued. If the new directive came as a surprise to China watchers, it must have been an even greater surprise to the unfortunate people who acted on it and got themselves arrested for following Peking's latest instructions. There are times in the China business when having solid information about a particular event is more confusing than it is enlightening. If the event is re- ported in the western press, it can even be a nuisance. For example, a large ied For Release 2005/04/21 : CIA-RDP78T03194A000400010013317 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET China-Watching meeting was held in Peking in the summer of 1973, as China watchers were looking for signs of a party congress. Because the meeting was public, reporters got wind of it and accounts of the meeting appeared in the western press. China watchers knew the meeting was not a party congress-it was too large-but do not know even today what that meeting was all about and some wish they had never known of its existence. Despite the vicissitudes of China watching, analysts in some cases are better informed about the situation in China's provinces than China's own national leaders are. As early as 1970, for example, it became obvious to China watchers, through intelligence reports and provincial radio broadcasts, that urban youth sent to live and work in the countryside were being consciously discriminated against with the acquiescence of local authorities. The situation seemed to come as something of a shock to Mao, when he first learned of it in 1973. A school teacher, with a son out in the country and apparently with contacts who could see that messages got to the leadership, sent a letter to Mao describing the living conditions of urban youth in the rural areas. Mao was outraged and ordered that steps be taken immediately to end discrimination against these young people. Not until 1974, however, after Peking had long since issued yet another directive on the subject, did local authorities begin to move on this question. Cases of major disruptions or flagrant disobedience in the provinces, of course, eventually come to Peking's attention. In such cases, national leaders acting as trouble shooters often visit the province in question to help solve the problems. In this context, discrimination against urban youth is a relatively minor problem and one that is not likely to reach the ears of China's leaders on its own. Local officials, after all, are not going to report to Peking that they are deliberately giving urban young people a hard time, but this is exactly the kind of information that refugees are best qualified, and most likely, to report to China watchers. Paradoxically, the intelligence community can beat the Chinese leaders on this issue, not one of especially high priority, while the Chinese can consistently outfox us on the major issues that we watch so closely. Disinformation In addition to the usual analytical problems, Peking has two enemies- Moscow and Taipei-who insist on inundating the world with disinformation. China watchers can usually quickly discern and discard the more obvious fab- rications, but the press is less discriminating. Lies often become accepted as facts simply because they appear in a number of western newspapers. The heavy- handed disinformation tactics have often led China watchers to disregard any information coming from either Moscow or Taipei. This is unfortunate, because on several occasions they have both come up with sound, accurate, and important information. The Chinese Nationals somehow manage to get the full texts of a number of Peking directives, and these are not hard to distinguish from those that they fabricate. The Soviets, for their part, scooped everyone on the election of a new member of the Chinese Politburo and also correctly predicted the pre- cise dates during which the National People's Congress would be in session. China watchers must be careful not to throw out the baby with the bath water. Jproved For Release 2005/04/21 : CIA-RDP78T03194A0004000 ' Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 China-Watching SECRET With all the ins and outs of China watching-the layers of secrecy, the shifting political winds, the analysis of obscure propaganda articles, the scrutiny of leadership appearances-those less close to the China scene are tempted to view the China problem as insoluble and to write the Chinese off as "inscrutable." China watchers, of course, do not have that luxury, and most of them would disagree that the Chinese are impossible to understand. It may seem ridiculous to others that China watchers learned to distinguish military officers from enlisted men, when ranks were abolished and insignia removed, by the number of pockets on their tunics, or that some China watchers have noticed a remarkable correla- tion between those Chinese leaders who wear sunglasses in public and those who eventually lose their jobs. That is, after all, the unique feature of the China watching business: there are almost no clues that are not worth following up. On those rare occasions when there is solid information about a major develop- ment, the often divided China watching community can usually agree on its implications and on Chinese motivations. It is not hard to understand the Chinese; it is just hard to get information about them. WiWed For Release 2005/04/21 : CIA-RDP78T03194A00040001001 -7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET Psychological contributions to selective targeting Jerrold M. Post, M.D. Mission: to recruit a Soviet national in a third country. In most of our overseas installations, we are heavily outmanned. Therefore our first task must be selective targeting-to identify among the 80 or more Soviets in a particular installation the small number who both have access to important intelligence information, and are accessible to us. How do we further narrow the field so as to concentrate our limited resources on the targets who are most likely to work for us against their own country? Applied research on the psychology of treason suggests that a process of psychological selective targeting may help in this task. Although it is often said that "every man has his price," we make the assumption that not everyone can be recruited-that for all practical purposes, a man who is at one with himself and his country is not recruitable. For an individual to participate in espionage against his own country, there are two basic requirements: there must be a psychologically fertile soil (i.e., the in- dividual must have the capacity for the task), and there must be proper pre- cipitating circumstances. He must be both able and willing. You cannot make someone do something he can't do; you cannot make someone do something he doesn't want to do. If it is true that the decision to work against one's country is fundamentally an individual commitment, what is the role of the case officer? It is to identify individuals with the psychological capacity for working against their country, and to facilitate their decision to act. What we are particularly interested in identifying is individuals who have a pattern of split loyalties, who can sham loyalty on the surface while actually being disloyal under the surface. Individuals who sustain loyal relationships with families, friends and co-workers are intrinsically less interesting as targets than individuals who have conflicts in their loyalties. Thus, the nature of the marital relationship is one key indicator of how an individual conducts his relationships. Although not everyone who betrays his wife is about to betray his country, the Soviet who plays the role of loyal husband while actively pursuing extra-curricular interests is more interesting as a target than the Soviet who has a sound and sustaining marital relationship. Similarly, the individual who does not get along with his boss, who feels undervalued, who is blocked in his career, is much more attractive as a target than the individual who is at the same level or ahead of his peers in terms of his career advancement, who seems to get satisfaction from his job, and who gets along well with his boss and. co-workers. MORI/HRP from pg. 35-37 SW4Jjfrbved For Release 2005/04/21 : CIA-RDP78T03194A0004000100315d-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET Psychological Targeting Between the ages of 35 and 45, all persons go through a period of psycho- logical reevaluation when they realize their youth is at an end, that all their hopes and ambitions are not to be satisfied. Feelings of marital and job dis- satisfaction are apt to peak at this time, and we can infer from marital and work behavior which individuals are finding this period most stressful. Audio can be extremely useful in making this discrimination. For some, the feelings of self-doubt and dispair reach critical proportions at this time-the so-called mid-life crisis. As a way of regaining their sense of competence and significance, of proving themselves, at this time some men are impelled to act in significant ways. Nearly all of the major agents in place and defectors were impelled to act during this life period. Unable to fulfill themselves within their own system, they sought new ways of proving themselves through their espionage. One particular psychological quality which we find in spades in the major agents in place and defectors is narcissism or self-absorption, egocentricity. In- dividuals who are highly self-absorbed, who consider themselves entitled to special consideration, who feel they are destined to play a special role, have an insatiable appetite for recognition and success. Even when by external criteria they are doing as well or better than their peers, they may feel very dissatisfied. But when in external reality they are blocked in their careers, are embedded in unrewarding marriages, such individuals are particularly apt to suffer, to harbor grievances, to collect injustices, and at times to be motivated to strike back at the individuals or the system not gratifying their needs. Thus we should try to identify vain and arrogant individuals who consider themselves superior to others and are impatient with ordinary frustrations, who feel entitled to succeed. Some individuals have this quality to such a degree that they come to feel they have a special role to play in history, what we have come to identify as the Messiah complex. When we identify a highly narcissistic individual who has a pattern of split loyalties, so that he feels he may have a special role to play in saving his people from the system, we have identified a very ripe target indeed. Just as the marriage can provide useful clues to individuals with patterns of split loyalties, so too the family background can provide useful leads. Indi- viduals who are brought up in homes by united parents at one with the regime are less interesting as targets. But there is a high percentage of family disrup- tion through death, prolonged separation, or divorce and parental conflict in the childhood of defectors and agents in place. Two patterns of particular interest are loyalty to dissidence and dissidence to loyalty. Some of our major assets have felt extremely close to relatives who opposed the regime or had been bruised by the regime. Their act of treason was an act of loyalty to dissident parents. On the other hand, rebellious youth whose parents are highly identified with the regime are a particular interesting target group. What better way to strike back at your father, the KGB colonel, than to take a whack at the establishment? This has been a central motivation for some of our major assets. Getting a fix on the target's childhood and adolescence and the quality of the relationship with the parents can thus provide some extremely useful clues. Agroved For Release 2005/04/21 : CIA-RDP78T03194A000400015ECR T Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Psychological Targeting SECRET Psychological selective targeting is nothing more than loading the dice in our favor. Although none of the items enumerated is critical in and of itself, if in surveying our target population, we can identify individuals who have several of these features, we may be identifying individuals who have the stuff of which useful defectors-in-place are made. It is a fabric, a pattern we are trying to discern. And when we can identify individuals who came from a fractured family background, who were rebellious as adolescents or had parents bruised by the regime, who show a pattern of split loyalties in their relations with their wives and co-workers, who feel especially entitled to succeed and be recognized, who are showing signs of stress in the critical mid-life period, we have identified highly susceptible individuals. SEA( Foved For Release 2005/04/21 : CIA-RDP78TO3194A000400010913-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A00040%'113-7 The birth and development of scientific intelligence SCIENTIFIC AND TECHNICAL INTELLIGENCE ANALYSIS in 1939, the British decided to assign a scientist to the Intelligence Branch of the Air Staff. Inasmuch as no scientist had previously worked for an intelli- gence service, this was a new and revolutionary idea. A tall, solemn physicist named R. V. Jones, then working at the Royal Aircraft Establishment, Farn- borough, was picked for the job. Jones's first job was to study "new German weapons" which were believed to be under development. The first of these was a blind bombing system which the Germans called Knickebein. Knickebein, as Jones soon determined, used a pair of radio beams which were about one mile wide at their point of intersection over the city of London. German bombers flew along one beam, and when their radio receivers indicated that they were at the intersection with the second beam, they released their bombs. At Jones's urging, Winston Churchill ordered up an RAF search aircraft on the night of 21 June 1940, and the aircraft found the Knickebein radio signals in the frequency range which Jones had predicted. With this knowledge, the British were able to build jammers whose effect was to bend the Knickebein beams so that German bombers for months to come scattered their bomb loads over the British countryside. Thus began the famous "battle of the beams" which lasted throughout much of World War II, with the Germans developing new radio navigation systems and the British developing equally effective counter- measures to them. Jones went on to solve a number of tough Scientific and Technical Intel- ligence problems during World War II and is generally known today as the "father of S&T Intelligence." The basic principles of S&T Intelligence analysis which Jones worked out during World War II and which have been previously discussed in Studie's in Intelligence* are just as useful today as they were in the beginning. Purpose of S&T Intelligence The primary purpose of S&T Intelligence since Jones's day has been to identify new enemy weapons and to describe their characteristics. Once you know the characteristics of an enemy weapon system, then his tactics and strategy for using the weapon system follow naturally. If, as a result of a heavy research, development, and testing effort, the Soviets manage to squeeze the accuracy of a particular ICBM down below .25 nautical miles CEP, then the primary target of all such ICBMs is almost surely going to be U.S. Minuteman missile silos. If the ICBM has no better than one-half nautical *Jones, Reginald V. "Scientific Intelligence," Studies VI/3; and "The Scientific Intelli- gencer," ibid, VI/4. MORI/HRP from pg. 39-48 S paved For Release 2005/04/21 : CIA-RDP78T03194A0004000100I3-7 Aooroved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 RET S&T Analysis mile accuracy, then it probably will be used against cities, industrial complexes, and other soft targets. As another example, the range of the Soviet BACKFIRE bomber is a critical factor in determining whether BACKFIRE is intended for use against ground targets in Western Europe and for naval use, or whether it is intended for strike missions against the Continental United States. Also, once you know the characteristics of an enemy weapon system, counter- measures against that system become much easier. For instance, we knew a great deal about the SA-2 surface-to-air missile system which was deployed extensively to defend North Vietnam. When the decision was made to launch mass raids against North Vietnam with B-52 aircraft, we were able to tailor our countermeasures against the SA-2 so well that on some raids the North Vietnamese SAM system was almost completely ineffective. On the other hand, we knew very little about the SA-6 SAM system which was deployed in Egypt prior to the Yom Kippur War. Largely as a result of this lack of knowledge, countermeasures against the SA-6 were not effective and the Israelis lost large numbers of their strike aircraft to Egyptian SAM systems. Cases of S&T Intelligence Jones found that all the S&T Intelligence problems which he encountered fell into three general cases. Unfortunately, since Jones's time, S&T analysts have had to contend with a fourth case. S&T CASE #1: WE DEVELOP WEAPON- THEY DEVELOP WEAPON This is the most common problem encountered by S&T intelligence officers. We develop an ICBM-the Soviets develop an ICBM. We put MIRVs on our ICBMs-they are putting MIRVs on their ICBMs. The Soviets developed an ABM system-we developed an ABM system. Both sides are now developing a laser kill weapon. And so forth. In this case the S&T Intelligence officer's job is not so difficult, because he can turn to his own country's experts on that particular weapon system. Use of your own experts has its own pitfalls, however, as we note later on. A classic example of some of the pitfalls is "The Case of the SS-6." * U.S. ICBM experts, insisting on applying U.S. design approaches to Soviet missile designs, managed to hold up an accurate intelligence assessment of the SS-6 for a number of years. S&T CASE #2: WE DEVELOP WEAPONS- THEY DON'T DEVELOP WEAPONS In this case the intelligence officer runs into a real problem: it is almost impossible to disprove anything in S&T intelligence. The fact that no intelligence information exists about a particular foreign development cannot be used to show *Wonus, M. C., Studies in Intelligence, XIII/1. proved For Release 2005/04/21 : CIA-RDP78T03194A0004000'K'RP SApRro edsFor Release 2005/04/21 : CIA-RDP78T03194A000400' t3-7 that the development itself doesn't exist. As an Air Force intelligence officer in the early 1960s, I read year after year the USAF estimates that said, "the USSR is probably developing a pulse doppler radar for its interceptor aircraft," and "the USSR is expected to deploy a computerized air defense system similar to the U.S. SAGE system." Years later, the Soviets have still done neither-so far as we can tell. But both estimates are just as difficult to disprove in 1974 as they were in 1964. And the BACKFIRE we mentioned earlier . . . how can anyone conclude that the Soviets do not intend to use it as a strategic bomber against the U.S., no matter how unsuited it may be for such a mission? S&T CASE #3: WE DON'T DEVELOP WEAPONS- THEY DEVELOP WEAPONS This is the most dangerous case. Here the S&T Intelligence officer has to overcome opposition from skeptics from his own country. Very often these skeptics are scientists who themselves tried a similar approach, failed, and then felt themselves obligated to discourage everyone else from trying the same thing. One of the most dramatic examples of Case #3 was the Soviet development of the antiship cruise missile. Segments of the U.S. intelligence community sounded a warning in the early 1960s that the Soviet antiship missiles represented a real threat to the U.S. surface fleet. The threat was not taken seriously, however, until the sinking of the Israeli destroyer Eilat by an early model Soviet cruise missile in the Six Day War of 1967. Unfortunately, many Defense Depart- ment officials then overreacted, and have since repeatedly labeled the U.S. surface navy "a bunch of sitting ducks." Analysts in the bacteriological warfare and chemical warfare business will become more and more familiar with Case #3 now that the U.S. has stopped all BW/CW weapons research. S&T CASE #4: WE DON'T DEVELOP WEAPONS- THEY DON'T DEVELOP WEAPONS R. V. Jones never had to contend with this case, since the British were involved in a war and had no resources to waste on academic problems. Case #4 is the most frustrating; it resembles Case #2, but since we haven't developed the weapons system in question, physical restraints can be ignored and any of the players can change any of the rules of the game at any time. Our first real encounter with Case #4 was the SAM upgrade problem, described by Sayre Stevens in "SAM Upgrade Blues." SAM upgrade-the possibility that the USSR could develop a limited ABM defense using the SA-2 (and later SA-5) SAM systems-made life exciting SApproved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 Agroved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 CRET S&T Analysis (and frustrating) for many CIA analysts and senior officials. Any time an analyst working on SAM upgrade seemed to be making progress toward a solution, some- one would find a new wrinkle in the problem which forced a fresh start. One lesson of SAM upgrade is that we can no longer produce only conventional in- telligence assessments. Intelligence analysts will continue to answer questions which read, "What is the capability of weapon system `X'?"; but more and more analysts will encounter questions which begin "What if ... ?" These are usually the Case #4 questions. Last summer, DDS&T intelligence analysts had to address the idea that the Soviets might be developing a space-based laser ABM system. This concept was proposed by a senior official of another government agency (interestingly, most Case #4 problems are proposed by people who are outside the intelligence community but have contact with it; seldom if ever are such cases proposed by intelligence officers). The idea was that the Soviets might be working on a program to put large high-powered ultraviolet lasers into synchronous altitude (25,000-mile-high) orbits. By focusing the laser energy on U.S. ICBM reentry vehicles during their midcourse phase of flight, the Soviets would then be able to destroy any number of the reentry vehicles. The fact that such a program would cost the Soviets more resources than the U.S. put into the Apollo Program seemed to daunt no one-least of all the advocates who insisted that we look for evidence of a Soviet program. After considerable expenditure of analyst time and effort, we concluded that the Soviets were not developing a space- based laser ABM system. Unfortunately, this was probably only the initial effort on this particular problem. It seems characteristic of Case #4 problems that they never go away; they simply go through cycles. Sources of S&T Intelligence Jones used the analogy of the human head to describe how S&T cases were handled. In his analogy the eyes represented photo intelligence and the ears represented signal intelligence. Both of these intelligence inputs were fed to the brain, which handled the job of collating the intelligence, analyzing what it meant, and making decisions. To complete the analogy, one might consider the mouth to represent the dissemination process. Despite Jones' comment about the eyes and ears, an S&T analyst normally uses six sources of information in his work. They are: Photo Intelligence Signal Intelligence Human Sources Foreign Literature Results of U.S. Work Basic Physical Laws Many intelligence analysts refer to the first two of these as "hard" intelli- gence and the second two as "soft" intelligence. This unfortunate terminology reflects a common bias that photo and signal intelligence information is more reliable than the other kinds. Actually, human and foreign literature sources have provided some of our most valuable insights into foreign scientific and A 3roved For Release 2005/04/21 : CIA-RDP78T03194A0004000199QZVr S Apo aye d For Release 2005/04/21 : CIA-RDP78T03194A00049 1%13-7 technical developments. Their evaluation, however, requires more judgment and analytical skill than do the photo and signal intelligence sources. The last two sources-U.S. work and basic physical laws-are not generally considered as sources of intelligence at all. But these sources tell you what has been done and what can be done. And they take as much analytical time as any of the other sources. In some cases, they may take more time; some analysts claim that it is easier to get information on Soviet than on U.S. R&D work. Intelligence analysis-the brain function in the Jones analogy-is the process of pulling together all the sources of information and drawing conclusions. It is a difficult process, probably no better understood than the functioning of the brain itself. There are a few guidelines, however, the most important of which Jones described as "the cardinal principle of scientific intelligence." The Cardinal Principle of Scientific Intelligence Back in the fourteenth century, a philosopher named William of Occam did a great deal of thinking about the best way to draw conclusions from the results of scientific experiments. His conclusion has been used as a guiding principle for scientific researchers in all the centuries since. It also serves as the single most important guiding principle for intelligence analysts. It goes under the name of Occam's Razor: Use the least number of hypotheses to explain your observations. Occam's Razor works this way: Suppose that we discover that the Soviet embassy in Washington has received a copy of a classified briefing which was presented recently in the Headquarters Auditorium. I might then announce to you: "The Soviets must have a bug in the igloo-go find it." After you have finished tearing the igloo apart, you come back and report that no bug is to be found there. My reply is: "Do you really expect the Soviets to put the bugs out where you can find them so easily? Call in the sweepersl" So after a very thorough electronic sweep of the wrecked igloo, you come back with a negative report. But I'm ready. "Ah-ha," I say. "It's just as I suspected-the Soviets have developed an unsweepable bug!" As you see, we could carry this game on for quite some time-unless you use Occam's Razor and say, "Nol There must be a simpler explanation for our observations." Now this story may sound a bit farfetched, but it describes the sort of thing that goes on in the intelligence community every day. We recently went through an exercise of this sort with an acquaintance of mine on the Intelligence Com- munity (IC) Staff which ended up with his conclusion that every Soviet satellite had some sort of a clandestine mission. And the only reason we hadn't found out about all these clandestine missions was that we hadn't looked hard enoughl Some S&T Intelligence Maxims In addition to the cardinal principle, there are a number of rules of thumb which most intelligence analysts learn sooner or later through hard knocks or experience. The first of these is: Suspect all crusaders. SE&Oloved For Release 2005/04/21 : CIA-RDP78T03194A000400010( 3-7 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET S&T Analysis An intelligence officer should never have an ax to grind. The day an analyst says to himself, "I'm going to prove . . .," he's left the path of reason. Of course you have to present proof for any conclusions you draw from analysis. This is quite a different thing than setting out to prove something before you know the facts. The objective of any intelligence analysis effort is the truth-not the proof of some preconceived notion. There probably exists no better illustration of this point than the story of the "SS-8 controversy" which David Brandwein described in the Summer 1969 issue of Studies in Intelligence (XIII13). In 1961, the Soviets began testing a new missile system, the SS-8. Air Force intelligence analysts concluded very quickly that since the Soviets had a large ICBM (the SS-6) and a small ICBM (the SS-7), the SS-8 would be an even larger ICBM than the SS-6. CIA analysts disagreed. By the beginning of 1962, the intelligence community analysts were divided into two camps-a "large SS-8" group and a "small SS-8" group-and the struggle had all the marks of a full-blown crusade. Neither side would concede that its analysis was less than flawless. Each side searched for evidence to "prove" its case. By the middle of 1962, an objective analysis of the SS-8 was no longer possible within the intelligence community. The impasse was not broken until an independent and reasonably impartial committee was formed to assess the problem. The con- troversy did not end completely until 1964, when the SS-8 was photographed in the Moscow parade and turned out to be a small missile. Unfortunately, much time and money had already been wasted because a few people were more concerned with "proving" their case than in finding the truth. The mark of a true crusader generally is an inability to admit that he might be wrong. The intelligence community seems to have more of its share of crusaders than most government or industrial groups; unfortunately, many of the crusaders are in the S&T Intelligence field-the last place a professional scientist would expect them to be. Professional scientists instinctively distrust crusaders. Crusading is incompatible with the scientific method, which tries only to establish the facts-never to prove something. One of the great scientists of all time, Louis Pasteur, put it concisely: "The greatest derangement of the mind is to believe in some- thing because one wishes it to be so ..." A second rule of thumb in S&T Intelligence is: Experts can be wrong. Of necessity, the intelligence community has to use experts as consultants. It is often argued that the experts are the best people to do the analysis, but an expert can develop a closed mind in his own field of expertise more readily than the non-expert. Experts are particularly dangerous in S&T Case #3. When Jones concluded his successful analysis of the Knickebein signal, his proposal to send a search aircraft up after the signal was strongly opposed by Britain's leading expert in radio wave propagation-who contended that the Germans couldn't be using such a signal because it would have to bend around the earth's surface to be received over London. Fortunately, Churchill didn't learn of the expert's opinion until after the search aircraft had obtained the Knickebein signal. A big problem with experts is that they impress people unnecessarily because they are labeled "expert." The expert's opinion may be given more weight than Apl-oved For Release 2005/04/21 : CIA-RDP78T03194A000400010 S T Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 S&T Analysis SECRET it deserves. Perhaps the mentality of official Washington-which spurns pearls offered by a research assistant for the dross from a research director-has some- thing to do with the problem. Any intelligence analyst foolish enough to propose a major analysis effort on "Possible Soviet Development of a Space-based ABM Laser Weapons System" would have been laughed at. Unfortunately, the idea was proposed by an expert who happened to be influential, and no one laughed (out loud, at least). We did the project. Experts tend to be most obstinate when they are in the wrong. A few years ago, CIA analysts were trying to assess a particular Soviet ABM radar. Some experts who were consulted came to the conclusion, based on incomplete informa- tion, that it was actually two radars-that a large flat structure located next to the main radar antenna was the antenna for the secondary radar. After we had done some additional analysis and had taken a close look at Soviet antenna technology, it became apparent to most intelligence community analysts that the flat structure was an antenna feed structure, not a radar. The experts dis- missed this interpretation, and CIA analysts were obliged to search for a signal from the secondary radar. Finally, the Soviets built an operational version of the ABM radar we had been observing. In the operational version of the radar, the flat structure was replaced by a strange-looking flat apparition which no one in his right mind could call a radar antenna. While conceding that the new flat structure was clearly a feed system for the ABM radar antenna, the experts never did admit that their original estimate of the secondary radar had been wrong. They merely avoided all discussions on the subject. Even today, I occasionally ask one of the analysts who were involved in the project if he has found the secondary radar signal yet. Fortunately, our ABM analysts all have a good sense of humor. When the expert's opinion differs from all the other available sources of intelligence, you have to question the expert's opinion just as you would question any other intelligence source, for reasons which the expert seldom can appreciate. Treat the expert just as you would any other intelligence source; don't worship him. The same could be said for the contractors, who are just another form of expert. Which brings us to our next maxim: Never trust a contractor. This is a bit strong; perhaps I should say "Don't rely unreservedly on a con- tractor." There are good contractors and bad ones. Note that I didn't say never use a contractor-I said don't trust him. We do and should use contractors in S&T Intelligence analysis to perform jobs which would take too much analyst time, but we tend to depend too much on the contractors. I once asked a good friend of mine, an ABM analyst, about the technical capabilities of a particular ABM radar he was studying. His reply was "I'll have to check with my contractor first." Giving him the benefit of the doubt, I assume that his remark was tongue- in-cheek. But it points to a dangerous trend in CIA as well as much of the rest of the intelligence community. Remember, a contractor is in the business for the money, much as a pro- fessional spy is in the business for the money. Any case officer can tell you how to treat a professional spy. You use them when you have to, but you never trust them. The same is true for contractors. SEXPRoved For Release 2005/04/21 : CIA-RDP78T03194A0004000100tt-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET S&T Analysis We once awarded an electronics analysis contract to Company "Z" on the West Coast. Shortly thereafter, the company "Z" project officer visited Head- quarters to receive his instructions on how to proceed. After a few formalities and a cup of coffee, we sat down to discuss the contract details. His first question was unforgettable-and typical of many contractors. He said: "OK-What is it that you want us to prove?" We should have cancelled the contract on the spot. Because the contractor wants to earn the money you're paying him, he feels obligated to come up with something-whether there's something there or not. A contractor also knows what every good newspaper man knows: Bad news sells. So the contractor is particularly vulnerable to the Anak syndrome (a vulnerability which contractors share with new intelligence analysts who are trying to make a name for themselves). The Anak syndrome goes back to the time when the Israelites found it necessary to spy out the land of Caanan. The spies came back with a completed intelligence analysis which they reported in Numbers 13:32-33: "... And they brought up an evil report of the land which they had searched unto the children of Israel, saying, The land, through which we have gone to search it, is a land which eateth up the inhabitants thereof; and all the people that we saw in it are the men of a great stature. And there we saw the giants, the sons of Anak, which come of the giants: and we were in our own sight as grasshoppers, and so were we in their sight." The results of this report were disastrous for the Israelites: 40 more years of wandering in the wilderness.* Based on previous experience with contractors, I will always be convinced that the next day Moses received a letter something like this one: Israelite Research Projects Agency Kadesh 3 Wilderness of Paran Commanding General Palestine Liberation Army Kadesh 7 Wilderness of Paran Unto Moses, Shalom: 1. Recent intelligence reports indicate that Canaanite Army field units have deployed GIANTs. This unprecedented advance in human engineering on the part of a potential enemy puts our forces at a severe tactical disadvantage. IRPA war gaming analyses indicates that PLA units encountering GIANT-equipped Canaanite units one-on-one would incur 76.8% casualties while inflicting only 16.4% casualties on opposing forces. *For another view of Moses as policy maker and intelligence officer, see "Decision Trees," Studies in Intelligence, XVIII/4. Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010~E1C3 T A provyed For Release 2005/04/21 : CIA-RDP78T03194A00040%1113-7 S& i Analysis 2. IRPA believes that the magnitude of this challenge to Israelite survival requires a full-scale R&D effort to counter the Canaanite threat. Accordingly, we are pleased to submit our proposal entitled, "The Feasibility of Developing GIANTs from Israelite Racial Stock." 3. IRPA is well qualified to conduct this R&D effort. Our related experience includes two prior assessments: "The Biological Impact of Locust Swarms on Egyptian Wheat" (Secret/ Israelite Use Only) and "A Tactical Mobility Problem: New Approaches to Crossing the Red Sea" (TS/IUO). 4. We propose to undertake this effort on a cost-plus-fixed-fee basis for a fee of 2,000,000 shekels. The contract effort is expected to be com- pleted in 40 years. Signed, Ammiel the Son of Gemalli of the Tribe of Dan Director of Research Attachments: Proposal Our final maxim is an obvious one: Look at the whole picture. Or, to put it another way, never ignore sources of intelligence. This rule may be obvious, but it's one of the most difficult things for an S&T analyst to do. The chief problem is one of available intelligence information. NSA, CIA, and Naval Intelligence Command, to name three groups, have many information compartments. An S&T Intelligence analyst on almost any topic will find that the information he needs is scattered across several of these compartments. And sooner or later, in trying to get the information which he needs out of these compartments, he has to face up to the paradox of S&T Intelligence: The more important the subject, the more difficult it is to obtain access to the available intelligence. This paradox results not from security regulations, but from human nature. Very few intelligence collectors or analysts are willing to reveal (to other analysts, at least) the most interesting and exciting bits of information which they possess. This is due to a fear-often justified-that the analyst to whom you reveal the information will take it, use it for his own purposes, and get the credit for your work. Almost all intelligence services over the years have paid a heavy price for this over-compartmentation and professional jealousy. Soon after the British began jamming the Knickebein system, Goering became aware that the British knew in advance when his bomber raids were coming. He put together a team of counterintelligence officers to locate the source of the leak. Goering gave them access to all available information except the Knickebein project, which he considered too sensitive to release to them. Of course, Knickebein was the tipoff of the German air raids, so Goering's counterintelligence effort was a failure before it started. As another example, Pearl Harbor resulted in part from too much compartmentation; the people at the top didn't have the whole picture. A~~p~sM;ed For Release 2005/04/21 : CIA-RDP78T03194A000400010013 47 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 SECRET S&T Analysis Even when the information is available to analysts, we don't always use it intelligently. The bias on "soft" vs. "hard" intelligence mentioned previously is one example. We seem to be training many telemetry analysts, ELINT analysts, photo analysts ... people who rely primarily on one source of informa- tion, and use the others as background. Such people are S&T Intelligence specialists. They are not S&T Intelligence analysts. An S&T Intelligence analyst has to have a sense of perspective. He must have an instinctive feel for what the foreign R&D groups are like-their biases, preferred approaches, weaknesses and strengths-and the resources that act as constraints on their developments. You can't get perspective from a single intelligence source. You can't get perspective in three months, or even six months, of intensive work in one S&T subject. It takes years of work, with all the available intelligence information, to gain the perspective and the insights that a first-line S&T Intelligence analyst must possess. Postscript This article has addressed some aspects of S&T Intelligence analysis as it has developed since Jones's day. Its stress has been on weapons intelligence, or the application of science and technology for military purposes. In recent years, as the focus of international competition has shifted somewhat from the military to the economic instrument of national power, a new purpose or objective for S&T Intelligence has begun to evolve: to assess the technical capability of our economic competitors (France, Japan, etc.) in the high technology areas of international trade. The S&T Intelligence community is still groping for a role in this rapidly expanding area of civil technology assessment. It is a job which is foreign to much of our past experience. It would be a very familiar role, however, to the industrial espionage group at General Motors which must keep tabs on the latest developments at Ford and Chrysler. Many of the rules discussed above will apply; some will not. The development of ground rules will be an interesting and exciting task in this new field of S&T Intelligence. Approved For Release 2005/04/21 : CIA-RDP78T03194A00040000@AJ7 Approved For Release 2005/04/21 : CIA-RDP78T03194A00040W-7 INTELLIGENCE IN RECENT PUBLIC LITERATURE A HISTORY OF THE CHINESE SECRET SERVICE. By Richard Deacon. [Donald McCormick] (Frederick Muller, London, 1974. 523 pp. with index) * A large part of A History of the Chinese Secret Service is concerned with Chinese history not easily related to espionage; the remainder of the book reveals the results of the author's efforts to investigate the "modern Chinese Secret Service," that is, the intelligence services and operations of the People's Re- public of China (PRC). To accomplish this and "to get at the facts," the author states that he created his own "mini-intelligence organization" with the opera- tional code name of "Jackdaw," composed of "no fewer than 23 . . . spies and researchers;" he adds that "no one member of the team knew any of the others, so there was no opportunity for collusion." The book jacket's blurb adds that "Operation Jackdaw" was "composed both of operatives in the field and ham radio operators who successfully intercepted and interpreted Chinese Secret Service radio messages." All this conjures up an image of a vast espionage network. Unfortunately, however, the author rarely cites sources of information, and, when identified, they are invariably of a secondary sort and usually items garnered from overt publications. He has been repeatedly interviewed by MI-5 about his so-called sources, apparently without success, and has been aptly described as a "scissors and paste" writer. His penchant for hyperbole and even fabrication tends to negate whatever pretensions for authenticity the book may otherwise have had. It is also to be noted that so-called "secret service" activities described by the author range from Chinese historical incidents of purely political or military nature to allegedly current and sophisticated clandestine operations including intelligence collection and political action. Moreover, Chinese govern- ment organs, activities, and personalities with basically no connection with intelligence operations are frequently characterized by the author as "secret service." For example, Pan Ch'ao, who takes his place in history as being re- sponsible for bringing most areas of Central Asia under Chinese control during the latter part of the first century through political ingenuity and military daring, is considered by the author "the first man to establish an external espionage system for the Chinese empire." The apparent basis for this state- ment is that, according to the author, "altogether he [Pan Ch'ao] spent the best part of 30 years in Central Asia, having won the allegiance of something like 50 tiny tribal kingdoms." Then there is the case of Lin Tse-hsu, Special Anti-Opium Commissioner to Canton in 1839. His activities to put an end to the foreign opium traffic with China are referred to by the author as "the first occasion in the nineteenth century when China's Secret Service was forced into action against a foreign power." Lin's attempts to familiarize himself with all facets of the opium trade before acting on behalf of his emperor to put an end to it apparently makes Lin, in the author's opinion, a "secret service" operator. Here, therefore, the *Also published in the United States as "The Chinese Secret Service," by Taplinger Publishing Company, New York, 1974. ~Ep ied For Release 2005/04/21 : CIA-RDP78TO3194A00040001001497 MORI/HRP from pg. 49-54 Agea d For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Books acquisition of information for the better understanding of a political or economic situation is equated with "secret service" or clandestine activity. Even the organ- ization of "The Society of the Righteous and Harmonious Fists," usually re- ferred to as "The Boxers," is considered by the author a "Secret Service, which would enable them [the Boxers) to drive out the foreign devils" from China. Concerning present-day PRC "Secret Service" activities, the author has in- cluded innumerable reports, in most cases completely unauthenticated, from published material as well as allegedly from members of his "Jackdaw" intel- ligence net. As any one involved in the collection of information on the PRC Intelligence Service (PRCIS) will attest, the author truthfully states that "it has been most difficult to gather any information" on the personnel of "the Investigation Bureau, the most secret of all organizations in the modern Chinese Secret Service." Here the author undoubtedly is referring to what CIA calls the Investigation Department of the Chinese Communist Party (ID/CCP). The book does contain some valid items of information, considered "Secret" by CIA and including the identification of the ID/CCP as well as some of its activities and responsibilities. Unfortunately, neither Chinese ideographs nor romanizations for such organs as the ID/CCP are given, and discrepancies in the romanized nomenclature often occur, with different titles used for the same organ in different parts of the book, and with no apparent effort to reconcile the differences nor even to indicate they exist. For example, on Page 314, reference is correctly made to the "Investigation Department of the Party," but on the same page, farther on, mention is made of the "Investigation Depart- ment of the State Council" (the latter actually a government rather than a Party organ) where obviously the ID/CCP is intended. Then, on Page 465, "The Ministry of Investigation" is described as "the key organization of the Chinese Secret Service" and the "highest of all the intelligence organizations," again with no indication from the author that this organ is obviously identical with the previously mentioned "Investigation Bureau," "Investigation Depart- ment of the Party," and "Investigation Department of the State Council." Several other items of information in A History of the Chinese Secret Service have, basically, the ring of what CIA considers to be the truth concerning the PRCIS, although the author, in his own inimitable way, apparently cannot refrain from overstatement. Included in this category of valid statements are items such as: "The Chinese Intelligence Service deliberately maintains a low- key activity in Europe;" "Chou (Tsou) Ta-p'eng, who was a key figure in the Investigation Department, appears to have disappeared since the Cultural Rev- olution;" and "The Ministry for Public Security . . . still controls internal security, sends spies to Taiwan ... as well as having officials in every Embassy abroad." The inconsistencies in A History of the Chinese Secret Service, concerning inter alia the nomenclature of PRC intelligence organs, could probably have been avoided if the author had attempted to analyze, collate, and edit reports obtained allegedly "from all parts of the world." Unfortunately, he seems to lack the proclivity for careful examination of the information gobbled tip by his "voracious bird" jackdaw. as characterized apparently by one member of his "intelligence net." The author seems, moreover, to have a propensity for *proved For Release 2005/04/21 : CIA-RDP78T03194A0004000g@@k@T7 B roved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 E embellishment of information to the extent that in some cases it becomes "more and more like a fictional fantasy"-the author's own description of an extrava- gant tale of derring-do and espionage allegedly involving Hsu Tsu-tsai, a Chinese scientist who died as a result of an unsuccessful attempt to defect from the PRC while attending an international scientific conference in the Nether- lands in July 1966. The author's imaginative concoction of the events leading to Hsu's un- successful defection effort and his death makes James Bond's often incredible adventures seem like prosaic experiences and, indeed, is "fictional fantasy" and not just "like a fictional fantasy." The book's version of the Hsu case makes him the principal actor in a bizarre melodrama allegedly involving CIA efforts, through a Chinese intermediary, to offer Hsu "a million dollars for deserting and handing a `parcel' to the U.S. Embassy in The Hague," the "parcel" con- taining a capsule of "poison gas." This melodrama reaches its climax when Hsu, according to the author, "pleaded" with his CIA contact: "Take me to your Embassy. I am going to ask for political asylum." Unfortunately, however, just as Hsu allegedly was handing over the parcel as well as some micro-film demanded by the CIA man, "The door of No. 17 opened up and four Chinese ran into the street. . . . The Chinese shouted to the driver of a car that had just come around the corner: `Look-someone is trying to escape. Stop him!' The driver immediately drove straight at Hhu, knocking him down and pushing his body on to the pavement." "The two Chinese who went with Hsu to the hospital alleged that he had fallen out of a window of the house" where he was staying. Later, "Hsu was kidnaped from the X-ray Department" of the Red Cross Hospital. This figment of the author's contrasts with what appears to be the simple truth concerning the Hsu incident as related by Liao Ho-shu, who was second secretary at the Chinese Embassy at The Hague at the time of the Hsu defec- tion attempt and who, in 1969, when charge, defected to the U.S. According to Liao, Hsu "tried to defect by tying sheets together to let himself down from the window of the bedroom. The sheets parted at the point where they were tied together, plunging him to his eventual death three stories below. He was discovered by another Chinese Communist lying on the sidewalk and taken to the hospital by the Chinese Communist who found him. . . . A group was then sent to the hospital to remove Hsu to the mission where he died." It is to be stressed that-the author's spine-tingling tale notwithstanding- there had been no CIA involvement with Hsu prior to the International Welders Conference in the Netherlands in July 1966. At that conference, American scientists collaborating with CIA had only casual conversations with Hsu, and reported no indications that he would soon be attempting to defect. Perhaps an even more flagrant fabrication than the Hsu fiction is the author's treatment of the Liao Ho-shu defection. He describes Liao as "one of . . . the most important Chinese spy chiefs in Western Europe," a "Chinese Philby ... engaged in selling secrets to the West and working on behalf of the Americans while actually still operating inside Chinese intelligence," and "with- out doubt the single major defector from the Chinese Intelligence Service to the West in the past quarter of a century." All this must be considered utter SECRET 5 Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET Books nonsense by anyone familiar with the Liao case, for in actuality Liao was a paranoiac, frustrated, and relatively unimportant member of the PRC diplo- matic mission at The Hague, who became charge in July 1966 after his prede- cessors had become political casualties of the Cultural Revolution. A thorough investigation and debriefing of Liao by CIA after his defection in January 1969 revealed that he had little knowledge of PRC intelligence organizations and activities. Liao returned to the PRC of his own. volition in 1972. In like manner, the book's chapter entitled "The Opium War in Reverse" is a greatly exaggerated, misleading, and inaccurate account of PRC participation in narcotics smuggling operations allegedly controlled by the Chinese "Secret Service." It is replete with unsupported statements such as: "Only in the hands of the Chinese Communists has it been used almost solely as a subversive weapon and for financing, by an opium war in reverse, a great many of their espionage operations." Available information would tend to belie these extrava- gant contentions. The author's treatment of the New China News Agency (NC NA) and its activities also reflects his disposition for hyperbole, which permeates the book. The fact that NCNA has served as cover for intelligence operators in all parts of the world gives him the opportunity to overstate its importance as a "secret service" organ and to equate all NCNA activities with intelligence operations. Succumbing once again to his penchant for generalization, the author stresses the "reliability of NCNA correspondents as agents," pointing out that "not a single one of them has been known to defect." Obviously, his "Jackdaw" operators did not get the word to him that an NCNA employee in Cairo had defected from the PRC in December 1959 and another in Katmandu in November 1970. In addition to apparently deliberate attempts at embellishment and fabrica- tion, the book contains a plethora of what can charitably be described as unin- tentional blunders. Included in this category are the description of Liao Cheng- chih as a former Ambassador to Burma, and statements that France recognized the PRC in 1967 (rather than in 1964) and that "up to the end of 1972 there was only one representative of the NCNA in Paris." Along these lines, it is to be noted that since the late 1950s there have been normally at least two NCNA representatives in Paris at the same time, even before the recognition of the PRC by France in 1964. Then there is the author's dogmatic and unqualified assertion that "ever since the rift with China, the USSR has drastically scaled down its intelligence effort in the colony [Hong Kong], having switched its attention to other areas." This, however, is followed immediately by references to a "top man of Soviet intelligence in Hong Kong," who "was known to live aboard a ship for his own protection" as well as to "KGB agents" who "only pay brief visits to Hong Kong by ship from Nahodka . . . and then meet their contacts aboard ship, which they rarely if ever leave." Thus, unwittingly, the author himself points up the inaccuracy of the implication that the KGB has voluntarily curtailed its intelli- gence activities against the PRC in Hong Kong. All indications are that the [long Kong authorities have prevented the USSR from establishing either an official or unofficial presence, which would facilitate KGB activity in Hong Apgioved For Release 2005/04/21 : CIA-RDP78T03194A000400010O GRET BookS Approved For Release 2005/04/21 : CIA-RDP78T03194A00040 SECRET -7 Kong, because of the obvious sensitivity of the PRC to such developments, and that the USSR is anxious to exploit areas such as Hong Kong, on the southern periphery of the PRC, for the acquisition of information on China. There are few places in the book where the author appears to let his imagination take freer rein than in his discussion of Sino-American relations and the effects of alleged Soviet "disinformation" operations on this relation- ship. "... so blinded were both the CIA and U.S. State Department to the true facts of life vis-a-vis China in the early sixties," writes the author, "that the KGB's disinformation activities helped enormously to shape the U.S.A. policies towards China." The United States apparently should also be very grateful to the Chinese who, according to the author, "gave the Americans a real break-through in supplying details of the Soviet espionage setup in Hong Kong which eventually led to the collapse of that network. From that moment the Chinese were able to start secret talks with the United States and these paved the way for the visit of President Nixon to Peking and the beginning of some measure of agreement between the two countries." And "China's intelligence links" have been strengthened "with the U.S.A., with whom there is now a modest exchange of information on an unofficial level." Here the author undoubtedly magnifies the Sino-American Liaison Offices' contacts into a budding Sino-American intelligence relationship. And in rehashing the allegation* that Henry Kissinger "as `Bor' had been an agent of O.D,R.A., a section of Soviet intelligence con- trolled from Poland," the author adds a new, completely unsubstantiated wrinkle: "with their usual painstaking efforts the Chinese checked and double- checked and finally obtained ... the full details of the KGB smear on Kissinger. All this was passed on to the Americans." There is no doubt that even Deacon would agree, along with the Chinese, that this story is "more like a fictional fantasy" than the truth. Stressing the possible mutuality of interest between the PRC and Israel vis-a-vis the USSR, the author states that "in Khartoum, the Chinese Intelligence Service is credited with having established some unusual links with both the French Intelligence in neighboring territories, both North and South, and with Israel." Immediately, however, he adds that "attempts to unravel the truth of these machinations have, it must be confessed, failed." These "machinations" are, indeed, tantalizing, but of course, like other sensational revelations in the book, are completely uncorroborated. The author's handling of the apparent suicide of Paul Yu, scientist and inventor, who had owned and operated an electronics laboratory in Passaic, N.J., until the company went into bankruptcy in 1968, is an excellent example of his reporting technique. It is to be noted that all the pertinent information in what the author calls "the strange case of Dr. Paul Yu," who apparently committed suicide aboard a TWA flight from Taiwan to Honolulu, could have been and probably was obtained by the author from a UPI dispatch, from Honolulu, dated 4 April 1973, to which the author does refer and which was the basis for other newspaper reports in Hong Kong, including those in the Chinese language *An allegation published in March 1974 by Frank A. Capell, Editor of The Herald of Freedom, an anti-Semitic, anti-Communist newsletter issued in Zarephath, N.J. Capell attributed the charge to a defector from the Polish Intelligence Service. S^Wgved For Release 2005/04/21 : CIA-RDP78T03194A0004000100#3-7 Approved For Release 2005/04/21 : CIA-RDP78T03194A000400010013-7 SECRET Books press. The author has, however, enlarged on the basic information and offers several interpretations, all probably his own but referred to as "various reports circulating." Presenting all possible conjectures or "theories" as to the reasons for Yu's suicide, these "reports" include the U.S. Government's fear that "Yu, who had reputedly developed a missile device, would pass his secrets to a foreign power, which poses the question whether Yu committed suicide or whether he was murdered by U.S. agents." The author concludes that "there was no ap- parent reason for Yu's suicide; the report of his death remains strangely untrue." Indeed it does, and mainly because of the author's melodramatic and hyperbolic treatment of this "strange case." The Richard Deacon case is itself a strange case. The book jacket of A History of the Chinese Secret Service reveals that "Richard Deacon is well known as a historical writer, not only for his histories of the British and Russian secret services, but also for Madoc and the Discovery of America, John Dee, and The Private Life of Mr. Gladstone," and that "under his real name [he] has written a number of books, including a well-received reinvestigation of Jack the Ripper, and has recently retired from his position as Sunday Times Foreign Manager." The 1974 edition of The Dictionary of International Biography indi- cates further that "George Donald King McCormick, British author and journalist had published 21 books under the name of Donald McCormick, including Murder by Perfection, 1970, One Man's Wars, 1972, and How to Buy an Island, 1973, as well as five books under the name of Richard Deacon, including A History of the Russian Secret Service, 1973." It is to be noted that, in 1974, The Master Book of Escapes and The Master Book of Spies were both published with Donald McCormick as author. The Writers' Dictionary, 1974-76, published 1973 by St. Martin's Press, New York, notes: "McCormick, (George) Donald (King). Also writes as Richard Deacon. Biographer, historian and writer on topography, and true life crime." An intriguing question concerns Mr. McCormick's criterion for determining the use of his real name or the pseudonym of Richard Deacon. An examination of the titles and subjects of his works would lead one to conclude that the pseudonym is used for the historical publications and the real name for those on non-historical matters. The two Masters books, published under the Mc- Cormick name, however, would seem by the nature of the subject matter to fall into the category of historical as well as "secret service" works and, therefore, could be expected to have been attributed to the authorship of Richard Deacon. Yet apparently in Mr. McCormick's estimation they qualify to bear his real name because, although historical in nature, they are concerned with real as well as fictitious spies and "escapists." If this analysis is correct, then it is baffling that the "secret service" books have been published under the author's pseudonym of Richard Deacon rather than his real name of Donald McCormick. Even a cursory reading of the author's books on the Russian and British Secret Services places them easily in the same category as A History of the Chinese Secret Service, which this reviewer has attempted to indicate, in no uncertain terms, is an inappropriate mixture of fact and fiction. Stanley Bergman A51proved For Release 2005/04/21 : CIA-RDP78T03194A000400019 Approved For Rel Approved For Release 2005/04/21 : CIA-RDP78TO3194A000400010013-7