Silent Warfare
Silent Warfare
Silent Warfare
Abram N. Shulsky
Foreword by
Roy Godson
Foreword ix
Preface xi
1 What Is Intelligence? 1
What Is Analysis? 37
The Intelligence Product 53
Intelligence Failure and Surprise 59
Vll
4 Working Behind the Scenes: Covert Action 73
Notes 181
Index 217
About the Author 223
FOREWORD
IX
secret intelligence agency and the democratic government and society that it
serves. Silent Warfare breaks new ground in intelligence studies by propos
ing a framework that focuses on the dual nature of intelligence— as both a
search for knowledge about political, military, and economic matters (with
similarities, therefore, to social science) and as an element of the struggle
among nations (with similarities to war). Shulsky brings together the knowl
edge and insights gained in the past decade as intelligence studies mush
roomed in the United States, Canada, and the United Kingdom. This book
codifies “ intelligence” for the professional and the serious student, while
also providing a realistic framework for those fascinated by fiction about
intelligence agencies and their operatives.
R oy G odson
General Editor
Intelligence & National Security Library
Washington, D.C.
PREFACE
This book has its origin in a course on intelligence that I taught in 1985 as
a visiting professor at the University of Chicago’s John M. Olin Center for
Inquiry into the Theory and Practice of Democracy. Returning to the aca
demic world forced me to impose some order on my thoughts concerning
intelligence, a subject with which I had become familiar in the public policy
world of Washington. I am grateful to the Olin Center’s director, Allan
Bloom, for this opportunity and for much, much else besides.
While working on this book, I enjoyed the hospitality of the National
Strategy Information Center, where I held the title of senior fellow, an
enviable position with maximum freedom and a minimum of responsibili
ties. I am grateful to the center’s president, Frank R. Barnett; to the director
of its Washington office, Roy Godson; and to Jeffrey Berman, factotum, for
their support.
Through this affiliation, 1 remained in close contact with the work of the
Consortium for the Study of Intelligence and the Intelligence Studies Section
of the International Studies Association. This book owes a great deal to the
participants in the colloquia and conventions of these two organizations, and
I hope that it repays its debt to them by providing an introduction to intel
ligence studies that they will find useful in their own teaching.
I am particularly grateful to the Lynde and Harry Bradley Foundation for
,ts generous and patient financial support and to its vice president for pro
grams, Hillel G. Fradkin, for his personal interest and sponsorship. I also
wish to thank the John M. Olin Foundation for its support of the project’s
initial stages.
xi
My work on this book was assisted by information and comments pro
vided by the following friends and fellow students of intelligence: Eliot A.
Cohen. Diane S. Dornan, Kenneth E. deGraffenreid, Sam Halperin, Carnes
R. Lord, and Kenneth G. Robertson. I wish to express my gratitude to them
and to Gary J. Schmitt, whose careful critique of the manuscript, to say
nothing of his friendship and encouragement, contributed greatly to the final
result. I am. of course, solely responsible for its errors and omissions.
A bram N. S hulsky
Washington, D.C.
INTRODUCTION
WRITING ABOUT SECRETS
A n oth er book about intelligence. So much has been published on this topic
in recent years that we have almost lost the sense that there is anything
paradoxical or even controversial about the public discussion of a subject
that has secrecy as an essential characteristic. Of course, in any democracy,
government business is the people’s business, and there is strong sympathy
for a policy of publicizing rather than concealing the government’s actions.
Nevertheless, it is also generally understood that safeguarding national
security in a dangerous world requires that many government actions be kept
secret from foreign adversaries. This, in turn, requires that the domestic
public be kept in the dark as well. Indeed, even democratic governments
(that of the United States included), to say nothing of undemocratic ones,
impose regulations requiring almost complete secrecy about most aspects of
intelligence operations and information. Therefore, those outside the gov
ernment who write about intelligence are sooner or later faced with the
questions of why are they writing about a secret subject and, perhaps more
important, how are they able to do so.
In reviewing the extensive literature on intelligence, you can see certain
ways in which the question of secrecy has been addressed, although this is
more often done implicitly rather than explicitly. According to one view,
intelligence has, or should, become less of a “ cloak-and-dagger” affair and
rnore like a branch of the social sciences. In fact, intelligence should be a
universal social science that seeks to understand, and ultimately to predict,
all sorts of political, economic, social, and military matters. As such, it need
n°t be an inherently secretive endeavor. While some secrecy may be nec
xiii
essary to protect the sources of important bits of confidential information, in
general, the most important facts— concerning the political, economic, so
cial, technological, and demographic trends that shape a country’s behavior
in the long run— will not be secret.1
According to this view, as intelligence becomes more mature— in the
sense of becoming more scientific and more concerned with underlying
trends and causes— it relies less on specific secrets and can become more
open. As a result, there should be no inherent difficulty in writing about it
publicly. In fact, the public discussion of intelligence may help it achieve its
proper goal of becoming more like a social science by demystifying intel
ligence and encouraging the flow of ideas between the intelligence and
academic communities.
Other, primarily American, publications on intelligence want to expose
alleged misdeeds of a country’s intelligence agencies and to bring about
some sort of change for the better in the way they operate. Typically, such
critiques regard the secrecy with which intelligence agencies operate either
as the source of the misdeeds or, at any rate, as a precondition for them.
In this view, the publication of books or articles about intelligence, which
destroys that secrecy, is an essential element of any reform program. What
ever damage may be done by publicizing legitimate secrets is regarded as
relatively small compared to the damage that could be caused by the intel
ligence agencies operating in continued secrecy. From this perspective,
there is nothing problematic about disclosing information concerning an
“ unreformed” intelligence agency. In fact, since secrecy is seen as a major
cause of, or crucial precondition for, wrongdoing, it is not clear whether
even a reformed intelligence agency would be entitled to secrecy.
One of the earliest and best-known books of this sort begins with the
assertion that “ there exists in [the United States] today a powerful and
dangerous secret cult— the cult of intelligence.” Publicity is an essential
weapon in the fight against “ this secret fraternity of the American political
aristocracy” :
The aim of this book is to provide the American people with the inside
information which they need— and to which they without question have
the right— to understand the significance of this issue and the importance
of dealing with it.2
Silent Warfare belongs to neither category. I believe that intelligence is
primarily about the discovery and protection of secrets and that it will
remain so in the future. I also believe that the discovery of other nations’
secrets and the protection of one’s own is, and will remain, so vital to
national security that the release of secret information that would impede
that work would not be justifiable, despite the catalogue of past misdeeds of
the U.S. Central Intelligence Agency (CIA) or allegations that might be
made concerning the intelligence agencies of other democratic states. Thus,
1 face the issue of secrecy and publicity in a more complex manner.
It is possible, by relying on public sources and “ leaks,” to write a book
containing a great deal of apparently classified (i.e., officially secret) infor
mation about U.S. intelligence agencies and activities.3 1 have not chosen to
do this. This is in part because I have had authorized access to classified
intelligence information in connection with my various positions with the
U.S. government (not, however, with any intelligence agency). In the
course of that employment I promised not to disclose such information.4
Any attempt to claim that classified information presented in this book was
derived solely from public nonofficial sources could be reasonably viewed
as a subterfuge. More important, I regard secrecy as essential to intelligence
operations and, in any case, do not see the importance of putting into the
public domain various esoteric details about the operations of U.S.— or
other— intelligence agencies, the vast majority of which appear not to raise
significant issues of public policy.
Rather, in this book, while steering clear of classified detail, I attempt to
discuss basic concepts in intelligence. My purpose is to enable the reader to
think about the general issues of intelligence policy in a way that does justice
to the subject’s complexities and ambiguities. Thus, my approach is funda
mentally theoretical; specific details that are publicly available are provided
to illustrate general points rather than to be comprehensive, either with
respect to the history of any aspect of intelligence or with respect to its
current condition.
While intelligence is becoming a recognized field of academic study at
least in the English-speaking world, the theoretical treatment of it remains
undeveloped.5 In this book, I attempt to contribute to that endeavor. At the
same time, I recognize that the book’s relatively heavy reliance on the
Anglo-American experience precludes it from reaching a truly general “ the
ory of intelligence.” This reliance is due in large part to the fact that most
of the publicly available information about intelligence, not surprisingly,
concerns the intelligence agencies of those countries that have the most open
political systems. Nevertheless, where possible, I refer to intelligence ac
tivities of other societies and try to consider the question of how intelligence
agencies vary depending on the nature of the regimes they serve.
This book does not provide readers with any secrets or “ inside informa
tion,” either spectacular or humdrum. I hope it provides a framework for
understanding intelligence as well as the many revelations that will, most
likely, be forthcoming in the future.
1
WHAT IS INTELLIGENCE?
In popular fiction, and to the public, intelligence has often been synony
mous with espionage and skulduggery, with the sexual blackmail of a Mata
Hari and the cloak-and-dagger exploits of a James Bond. While activities of
this sort have their place within the world of intelligence, the full concept is
much richer. Let’s begin by looking at the phenomena to which the term
“ intelligence” is applied; these phenomena include certain kinds of infor
m ationactivities, and organizations. 1
Intelligence refers to information relevant to a government’s formulating
and implementing policy to further its national security interests and to deal
with threats to those interests from actual or potential adversaries.2 In the
most obvious and often most important case, this information has to do with
military matters, such as an adversary’s plans for military action. Potential or
actual enemies typically do their best to keep this type of information secret.
Of course, other types of secret information may be equally important— for
example, information about another country’s diplomatic activities and in
tentions, as well as information about its intelligence activities.
In addition to information of this sort, many types of information about an
actual or potential adversary may be useful to know, even though the ad
versary may not attempt to keep them secret. These could include informa
tion about internal political affairs and societal developments as well as
economic and demographic statistics. How much material of this sort is
actually published depends on the nature of the political regime. In a dem
ocratic society, this type of material is almost always publicly available. A
totalitarian system, however, often strives to conceal any information about
1
might find helpful. Regardless of whether publicly available information is
to be considered ‘‘intelligence,” clearly there must be some process by
which it is systematically made available to government officials in a usable
form. An intelligence service often performs this function.
Finally, intelligence information typically includes not only the “ raw
data” collected by means of espionage or otherwise, but also the analyses
and assessments that may be based on it. It is this output, often referred to
as the intelligence “ product,” which is typically of direct value to policy
makers. To what extent this intelligence product should strive to present a
comprehensive evaluation of a situation, based on all available data, both
public and secret, may vary from one intelligence service to another.
As an activity, intelligence comprises the collection and analysis of in
telligence information— information relevant to the formulation and imple
mentation of government national security policy, it also includes activities
undertaken to counter the intelligence activities of adversaries, either by
denying them access to information or by deceiving them about the facts or
their significance.
Intelligence comprises a wide range of activities. For example, there are
various methods of collecting information, such as espionage, photography,
intercepting communications, and research using publicly available docu
ments and radio and television broadcasts. There also are different tech
niques for analyzing the information that has been collected: some of these
may be similar to the methods the social sciences use, while others, such as
the decryption of coded messages, are peculiar to the intelligence world.
Similarly, denying information to others involves various activities, some of
which are similar to law enforcement work, such as investigating suspected
foreign intelligence agents to learn whether they are in contact with gov
ernment officials. Others are more esoteric, such as using encryption to
protect communications. Finally, various means of deceiving adversaries
exist, such as “ double-agent” operations and deceptive radio signals.
Looking at this wide variety of intelligence activities, it seems difficult to
see any common thread running through them. They all, however, have to
do with obtaining or denying information. Therefore, intelligence as an
activity may be defined as that component of the struggle between adver
saries that deals primarily with information (as opposed to economic com
petition, diplomatic maneuvering or negotiations, or the threat or use of
military force, for example).
Finally, the term “ intelligence” also refers to the organizations that carry
out these activities. One of the most notable characteristics of such organi
zations is the secrecy with which their activities must be conducted. Many
rules concerning access to information, derive from this requirement. Since
intelligence agencies are organized to enhance their capacity for secrecy,
they also may be given, along with their information-obtaining or -denying
functions, the responsibility of undertaking secret activities to advance their
government’s foreign policy objectives more directly.
Such activity, which in the U.S. intelligence lexicon is referred to as
“ covert action,” may range from the mundane, such as covertly providing
critical assistance to a friendly foreign government, to the spectacular, such
as orchestrating the overthrow of a hostile one. Whether it should be as
signed to the same organizations that collect and analyze intelligence infor
mation has occasionally been a controversial question. Even if, for practical
reasons, intelligence organizations are given the responsibility for covert
action, the more fundamental question of whether covert action should be
considered a part of intelligence from a theoretical, as well as a practical,
viewpoint would remain.
Domestic Intelligence
An even more important area in which the nature of the regime affects the
scope of intelligence is what is called “ domestic intelligence.’’ Any gov
ernment must be concerned not only with purely external threats (such as
military invasion) but also with threats against its ability to govern, or its
very existence, that arise from individuals or groups within the nation’s
borders. Such threats could come from groups that seek to overthrow the
government by illegal means, that seek to use violence to change govern
ment policies, or that seek to exclude from the body politic members of a
given ethnic, racial, or religious group. How a government defines such
internal threats depends heavily on the type of government it is.
A regime in which a dynasty or a single political party has a monopoly of
power, for example, is likely to regard any domestic political dissent as a
security threat, and its intelligence service will focus a great deal of attention
on detecting and thwarting it. In the most extreme case, the government of
a totalitarian state may regard all nonmembers of the ruling party as actual
or potential enemies. By contrast, the notion of a “ loyal opposition,” as
found in parliamentary and other democratic systems, implies that the gov
ernment’s domestic political opponents do not pose a security threat and
hence are not a suitable concern of intelligence.
In addition, there may be many possible types of connections between
domestic groups and foreign powers. At one end of the foreign-domestic
spectrum would be the activities of an individual or domestic group that acts
on behalf, and at the direction, of a hostile foreign power. Then there could
be groups or individuals who share common objectives with that power and
cooperate in the pursuit of them. Finally, there also could be groups that are
seen as subversive of the nation’s constitutional order or disloyal to it but
without any ties to foreign governments.
11
intelligence service’s headquarters. The intelligence officer, or “ handler,”
maintains communication with the source, passes on the instructions coming
from the intelligence service’s headquarters, provides necessary resources
(such as copying or communications equipment), and, in general, seeks to
ensure the continuing flow of information.2
Tradecraft
The particular methods an intelligence officer uses to operate and commu
nicate with sources without being detected by the opposing intelligence
service are known collectively as “ tradecraft.” Part of the problem an
intelligence officer faces is to defeat the opposing side’s surveillance efforts
to be able to meet with sources or potential sources without giving away
their identity. An officer uses a wide variety of countersurveillance tricks to
determine whether he is under surveillance and to attempt to escape it.
For example, an officer may spend several hours traveling to a meeting
by a circuitous route, taking several different forms of transportation. If he
notices that the man who sat next to him on the westbound subway also
happens to be on his eastbound bus, he may reasonably conclude he is
being followed. The surveillance team may try to avoid discovery by us-
lng a relay system so the same individual is not tailing the officer all the
time. The game of surveillance and countersurveillance can be compli
cated almost indefinitely.
Tradecraft also includes techniques for communicating with a source
without having to meet with him at all. For example, an officer may unob
trusively hand off a package or piece of paper to a source as he passes by on
the street (a “ brush pass” ). If done correctly, the maneuver may be unob-
it are fewer. One cannot rely solely on reports from journalists, travelers,
diplomats, or attachés; in general, press coverage will be restricted, borders
will be closed, and travel within the target country will be restricted, even
for the country’s own nationals and nationals of neutral countries. At the
same time, the international law prohibition against overflying another coun
try without its consent no longer poses a political obstacle.
Even so, U.S. experience in trying to conduct human intelligence collec
tion activities against the Soviet Union during the troubled peace of the years
right after World War II was so unsatisfactory that attention again turned to
photoreconnaissance. This interest was reinforced after the beginning of the
Korean War in 1950, when the West feared that the North Korean invasion
of the South foretold a Soviet invasion of Western Europe. It was believed
that the Soviets could secretly prepare a massive invasion force that would
then be able to attack Western Europe with very little warning. In addition,
basic intelligence information about the size of Soviet military forces was
often lacking.
Various attempts were made to overcome this deficiency in knowledge
about the Soviet Union. One project, code-named Moby Dick, involved
launching balloons equipped with downward-pointing cameras in Western
Europe. The plan was that these balloons would then drift across the Soviet
Union on the prevailing westerly winds until they reached Japan or the
Pacific Ocean. At that point, their camera pods would be released in re
sponse to a radio signal and recovered. In reality, many of the balloons came
down over the Soviet Union, enabling the Soviets to assess the camera’s
technology. In any case, the random movement of the balloons over the vast
land mass of the Soviet Union probably meant that the photographs devel
oped from the film that was recovered yielded minimal intelligence.22
On July 21, 1955, at a Geneva “ Big Four” (the United States, the Soviet
Union, Britain, and France) Summit, President Eisenhower proposed an
“ Open Skies” plan for mutual aerial surveillance of the United States and
the USSR. According to this plan, the two countries would “ give to each
other a complete blueprint of [their] military establishments, . . . from one
end of [the] country to the other” and would “ provide within [the] countries
facilities for aerial photography to the other country.” Each country would
have the right to conduct aerial surveillance over the other’s territory as it
saw fit.23 The purpose of the plan was to inhibit any attempt at launching a
surprise attack, which Eisenhower judged would be impossible if the po
tential attacker was subject to unlimited aerial surveillance. This mechanism
was also seen as a precondition for various disarmament possibilities.
roved the development ui a new reconnaissance piane, tne u-Z, which
could fly above the reach of Soviet fighters and surface-to-air missiles
sA Ms). Furthermore, it could probably have been foreseen that photo-
' hjc reconnaissance from satellites would become feasible within the
next several years. Thus, Eisenhower’s plan was an attempt to obtain by
aareement an opportunity to conduct aerial surveillance that technological
advance was going to produce (at least for the United States) in any case.
Soviet leader Nikita Khrushchev, however, rejected the scheme, character
izing it as an attempt to legalize espionage. On June 21, 1956, Eisenhower
secretly approved the first U-2 flight over Soviet territory.24
During the next four years, the U-2 flights, both over Soviet territory and
along its periphery, yielded a rich intelligence return, providing the United
States routine coverage of important Soviet military test facilities and bases
for the first time. Although the Soviets lodged confidential diplomatic pro
tests against the overflights, they were at first unable to do anything about
them.
It was just a matter of time before the Soviets developed some means to
attack the U-2. When the first successful attack occurred, on May 1, 1960,
however, the Eisenhower administration was unprepared to deal with the
situation, the difficulty of which was increased by the Soviets’ capture of the
plane’s pilot, Francis Gary Powers, and retrieval of its cameras. After U.S.
spokesmen had put forward an untenable cover story (that the U-2 was
engaged in weather research and had accidentally strayed from its intended
route over Turkey), Eisenhower personally took responsibility for the over
flights of Soviet territory, which he then ended.
Even before the U-2 incident, however, the U.S. had begun work on a
satellite reconnaissance capability. In January 1958, an Air Force major
general publicly testified about the ongoing development of an advanced
reconnaissance system to be launched by the Atlas booster, as well as about
some other reconnaissance capability, with a recoverable capsule (for re
turning the film to earth), that he optimistically predicted could be launched
in the spring of 1959.25
Despite being openly predicted, the existence of this satellite photorecon
naissance capability was, during its early years, regarded as classified. Al
though it could be assumed that the Soviets would understand that some
Sllch reconnaissance capability existed, it was not thought expedient to call
Public attention to the fact. At the time, the Soviets, consistent with their
Ejection of the Open Skies plan, took the position that space-based recon
naissance constituted espionage just as much as did aerial reconnaissance
and was just as illegal. They maintained,
From the standpoint of the security of a state it makes absolutely no
difference from what altitude espionage over its territory is conduct
ed. . . . there is absolutely no ground for alleging that espionage at a high
altitude, with the aid of artificial Earth satellites, is quite lawful under the
existing rules of international law. Any attempt to use satellites for espi
onage is just as unlawful as attempts to use aircraft for similar purposes.26
Given this Soviet position, the U.S. government feared that public dis
cussion of its capabilities and actions in this area would rub salt in the Soviet
wounds and prompt them to make a political issue of it. Thus, after some
public discussion of space reconnaissance at the end of the Eisenhower
administration and seeing no reason to goad Khrushchev by openly asserting
the right of the United States to conduct such reconnaissance, the Kennedy
administration took “ steps . . . to turn the fledgling space reconnaissance
program from medium gray to deep black.” 27 This policy remained in effect
until 1978, when President Jimmy Carter, in a speech designed to assure the
American people of the verifiability of the almost-completed SALT II
Treaty, publicly confirmed that the United States possessed such a capabil
ity; its existence had been, by that time, an open secret for many years.
However good a photographic reconnaissance capability may be, it de
pends on sunlight and the absence of cloud cover. To get around these
limitations, other types of imagery, using radar or infrared waves (emitted
by hot objects), may be envisaged. For example, a radar can use the elec
tromagnetic waves it emits not only to detect metal objects, but also, under
some circumstances, to obtain a kind of image of the object analogous to an
ordinary photographic image; experts use this image to determine some of
the object’s characteristics. (This differs from the techniques involved in
signals intelligence, discussed below, in that it uses the reflection of the
electromagnetic waves it emits rather than those emitted by its target.)
Similarly, another part of the electromagnetic spectrum, the infrared fre
quencies, can be used to detect objects that are hotter than their back
grounds. For example, in the 1930s, the British developed both infrared
sensors and radar as means of detecting enemy aircraft. At that time, radar
was much more feasible, and the infrared sensors were not developed. In the
future, radar and infrared alternatives to conventional photography may be
expected to become more important.28
Signals Intelligence
Signals intelligence (or sigint) is the generic term given to the process of
deriving intelligence from the interception of electromagnetic (radio) waves,
•I referred to as signals. It may be subdivided according to the type
of dectromagnetic wave being intercepted:
. The interception of, and derivation of information from, foreign com-
* munications signals (radio messages) by other than the intended recip
ients is known as communications intelligence, or comint.
• The interception, processing, and analysis of foreign telemetry (radio
signals that relay information from sensors on board a test vehicle to the
test engineers concerning the vehicle’s flight and performance charac
teristics) are known as telemetry intelligence, or telint.
The interception, processing, and analysis of noncommunications elec
tromagnetic radiations coming from a piece of military equipment (such
as a radar) while it operates are known as electronic intelligence, or
elint.29
In principle, any electromagnetic wave, emitted either as a necessary part or
as a by-product of the functioning of a piece of electrical equipment, is
subject to interception by a receiver that is properly placed and sufficiently
sensitive.30
Open-source Collection
Publications and Broadcasts
No discussion of intelligence collection would be complete without refer
ence to the gathering of information from open sources, that is, newspapers,
books, radio, and television broadcasts and any other public source of
information. Even in the case of a society as secretive as the pre-glasnost
Soviet Union, a lot of valuable information could be gleaned from such
sources; with more open societies, even greater amounts of information are
openly available.
^le lmP°rtance of open sources in the intelligence process is a matter
0 dispute and is ultimately tied to some basic questions about the nature
«intelligence. One view, expressed by Sherman Kent, is that the bulk of
'g -level foreign positive intelligence . . . must be through unromantic
° pen ancbabove-board observation and research.” 45 The more traditional
view, on the other hand, has held that while open sources may provide
important context and background, the key facts, such as an adversary’s
specific intentions, must be obtained primarily, if not solely, from nonpublic
sources by means of espionage or technical collection.
This question is discussed at length in chapter 7. At this point, the focus
will be on the various uses to which open-source information can be put. For
example, a standard task of military intelligence officers has been to prepare
vast compendia of information concerning countries in which future military
operations may have to be conducted. Such compendia should include all
information that might be useful to a military staff preparing such an oper
ation. Information concerning the country’s geography, its communications
and transportation networks, key military and economic facilities, and so
forth would all have to be included in sufficient detail to allow the planner
to make many decisions, such as determining how quickly troops and sup
plies could be moved from point A to point B.
Except in the case of the most secretive countries (such as the Soviet
Union, where it was admitted in 1988 that previously published maps had
been falsified as a security measure46), much of this information will be
available in open-source literature: road and railroad maps and timetables,
newspaper and magazine articles, government economic and statistical re
ports, and even old travel guides. Collecting and cataloging it are other
matters. Huge amounts of information are involved and the resources to
collect it for every relevant country are unlikely ever to be available. If, as
discussed in the next chapter, the U.S. military force that invaded Grenada
in 1983 was not supplied with adequate maps and other information about
the island, this was not due to any difficulty in collecting the information but
rather to the failure to allocate sufficient resources to what probably seemed
like a small, out-of-the-way island.
Similarly, a vast profusion of statistical sources publish economic data
throughout the world. Deciding what should be collected, however, requires
some sense of what intelligence requirements are likely to be. Economic
data may be needed to support the formulation of policies on international
trade or economic sanctions, to deal with the effects of shortages and inter
national cartels (such as the Organization of Petroleum Exporting Countries
[OPEC]), and so forth. Other kinds of economic data, such as might result
from the monitoring of cash flows, could shed light on the international drug
trade. Finally, economic data inay be needed to support political and mili
tary analyses; for example, predictions of Soviet behavior in the late 1980s
were dominated by questions of how the Soviet economic situation would
affect other areas of policy. Each of these intelligence requirements calls for
different sorts of economic data to be collected.
In addition to these obvious types of open-source materials, intelligence
analysts require the same sorts of information— speeches by prominent po
litical figures, texts of laws and resolutions, census and other demographic
data—-that would be required for any academic analysis of the political or
social conditions in a foreign country; indeed, the end product may be
similar as well.
Depending on the available resources, an intelligence agency may be able
to collect specialized data to a degree that would overwhelm an academic
researcher. For example, an important technique of kremlinology (the study
of Soviet leadership politics) involves tracing the careers of midlevel Soviet
officials to determine which midlevel officials are the protégés, or “ cli
ents,” of which Politburo members or other senior officials. Once these
patron-client relationships have been identified, an analyst can, by noting
the promotions and demotions of the clients, determine the relative stand
ings of their high-level patrons.
To do this, however, requires the collection and maintenance of an ex
tensive biographic data base. It would involve scanning all major Soviet
newspapers and news broadcasts (those originating from the capitals of the
various republics as well as those from Moscow, including inter alia the
governmental, party, trade union, and military organs); recording every
news item that indicates the promotion, demotion, or transfer of an official
or that links two officials; and computerizing the resulting data base to make
it useful for researchers. A scholar, or even an academic institute, might be
hard-pressed to undertake such a task.47
Diplomats and attachés are not the only foreigners who visit a country and
report their observations. For example, the 1987 treaty between United
States and the USSR on the elimination of intermediate-range and shorter-
range missiles (the INF Treaty) provides that each party send inspectors to
specified military facilities of the other party to ascertain whether the coun
try is complying with the treaty’s terms. The inspectors have greater access
to those facilities than attachés or other visitors would have. Obviously,
their reports will contain valuable information concerning their host’s mil
itary forces.
Similarly, businessmen, scientists, and other travelers learn information
about the countries they visit that, while not officially secret, is nevertheless
not available in the public media. Whether this information makes its way
to their country’s government depends, in a country whose citizens do not
need special permission to travel abroad, on the willingness of such travelers
to report it. The notoriety achieved by the U.S. Central Intelligence Agency
has probably meant that, since the 1970s, it has benefitted less from this sort
of voluntary cooperation. But the general increase in travel to and from the
Soviet Union has meant that the opportunities for such overt human collec
tion have grown tremendously.50
3
WHAT DOES IT ALL
MEAN?
INTELLIGENCE ANALYSIS AND
PRODUCTION
What Is Analysis?
Analysis refers to the process of transforming the bits and pieces of infor
mation that are collected in whatever fashion into something that is usable
by policymakers and military commanders. The result, or “ intelligence
product,” can take the form of short memorandums, elaborate formal re
ports, briefings, or any other means of presenting information. This section
indicates the breadth of analytic techniques. In describing these activities,
standard intelligence terminology is not always used; indeed, analysis does
not have any standard categories. Furthermore, the categories that do exist
are neither precise nor mutually exclusive. An attempt has been made to
arrange the techniques from the most technical, such as the decrypting of
coded messages, to the most speculative, such as the predicting of future
social and political trends. A subsequent section discusses the variety of
intelligence products and the functions they serve.
Technical Analysis
I use the term “ technical analysis” here to refer to analytic methods that
transform highly specialized data, totally or virtually incomprehensible to
everyone but the specialist, into data that other intelligence analysts can
Use‘ The examples discussed are cryptanalysis (which transforms seem-
tngly random strings of letters or numbers into the text of a message in a
novvn language), telemetry analysis (which transforms a radio signal into
group of time series describing the performance of a missile or other test
lc e '» and photo interpretation (which identifies and measures objects
In a Photograph).
37
Cryptanalysis
Cryptanalysis refers to the solving, or “ breaking,” of enemy codes and
ciphers, thereby enabling analysts to transform an intercepted encrypted
message into its original, meaningful form. In most cases, the interception
involves the reception of radio signals by someone other than their intended
recipient. However, the cryptanalytic problem is the same in the case of an
encrypted message carried by a captured courier, an encrypted letter opened
by postal censorship, or an encrypted telegram obtained by tapping a tele
graph cable.
In technical usage, the terms “ code” and “ cipher” refer to different
methods of encryption. In a code, a word or phrase (signifying a thing,
concept, or location) is replaced by the group of digits or letters (which may
or may not form an actual word) that is found opposite that word or phrase
in the codebook. Thus, the message “ attack on Saturday” would be en
crypted by finding the code group for “ attack” (say fg hj ) and that for
“ Saturday” (say adfk ), thus producing the encrypted message fghj adfk .
If a word is not found in the codebook, the sender can either reword the
message to use words and phrases in the codebook or spell out the missing
word using special code groups of individual letters or syllables.
In a cipher, on the other hand, each letter in the original message— called
the “ plaintext”— is replaced, following some formula or algorithm, by
another letter, thereby forming the “ ciphertext.” (In a transposition cipher,
the letters of the original message are retained, but they are transmitted in a
jumbled order, according to some scheme.) For example, a cipher might
consist of the rule that each letter be replaced by the letter following it in the
alphabet. In this extremely simple cipher, the message in the example used
above would be enciphered as buubdl po tbuvsebz .
A more complicated cipher (still much too simple to offer any security)
would replace the first letter of the message by the letter following it in
the alphabet, the second letter, by the letter two places down in the al
phabet, and so forth. (For the purposes of such a cipher, the alphabet
would be envisaged as written in a circle, with the letter A immediately
following the letter Z. Thus, the twenty-sixth letter of the message would
be unchanged, while the twenty-seventh, like the first, would be replaced
by its immediate successor, and so on.) The message would now read
BVWEHQ VV BKEGERPO.
These techniques can be combined in various ways. For example, a coded
message may then be enciphered in the same way a plaintext might be.
Thus, our example message encoded as before and then enciphered by the
first method discussed would yield the following “ superenciphered” text:
GH*K B E O L . lilt flu v am ag v , W i O U V sll u y iw v u w iv to vitv OWUI 11
o^erS__to recover the original message, an adversary must break both the
code and the cipher. Typically, the code would remain in effect for a long
time, while the cipher algorithm would change frequently. The reason is that
while the former is quite difficult to change (each change of code means new
codebooks must be distributed to each embassy, headquarters, or post that
might send or receive messages), it is a simpler matter to change the cipher.
Cryptanalysis refers to the solving or breaking of both codes and ciphers—
that is, to reconstructing the adversary’s codebook or figuring out the method
he is using to encipher messages— using primarily the encrypted messages
themselves. (Decryption, on the other hand, usually refers to the intended
recipient recovering the plaintext.) Cryptology refers to the more general
study of these things, both for cryptanalytic purposes and for devising more
secure codes and ciphers. Cryptography is sometimes used to refer specif
ically to the latter activity (the devising of codes and ciphers) but is some
times used synonymously with cryptology.
The typical raw material with which cryptanalysis begins is a collection
of encrypted messages. Cryptanalysis’s task is to discern whatever patterns
exist in the apparently meaningless jumble of letters or numbers and to relate
those patterns to the known patterns that exist in the language in which the
messages were presumably written. For example, in ordinary English text,
the letter £ appears more frequently than any other; therefore, in a group of
messages enciphered in the simple substitution cipher discussed above (in
which each letter of the plaintext is replaced by one immediately following
it in the alphabet), the letter F would probably be the most frequent.
Noticing this fact, the cryptanalyst would begin by assuming that F stands
tor E. He then might notice that U1F appears more frequently than any other
three-letter word and assume that it stands for THE. At this point, he might
well guess that each letter in the ciphertext stands for the letter immediately
preceding it in the alphabet and, trying it out, would discover that this was
indeed the case.
As may be seen by even this simple example, the amount of raw material
a cryptanalyst can obtain is an important factor in determining whether a
solution can be achieved. In a short message, E may not be particularly
requent: in our example ( “ attack on Saturday” ), it does not appear at all.
tak* ^°n®er messa2e >or series of messages, however, the laws of probability
e over, and it would be extremely unlikely for the frequencies of the
various letters (or small groups of letters) in the plaintext to differ much
r°m the Irequencies with which they appear in ordinary English text,
into C .^St0ry cryptology is a fascinating one, and it is impossible to go
0 tt in detail here.1 For our purposes, it will be sufficient to divide that
history into three periods, according to the technology that was available for
encrypting messages.
In the first period, running from antiquity to the 1930s, messages had to
be encrypted by hand. Various techniques were available including code
books and substitution and transposition ciphers. By the end of this period,
codebooks had grown to be cumbersome affairs, with thousands of entries.
However, since they tended to be used for long periods, cryptanalysts could
eventually reconstruct them. Similarly, cryptanalysts were helped by the
fact that the complexity of ciphers was limited because all the steps involved
in producing the ciphertext had to be performed by hand. Because the
possibility of an encryption or decryption mistake increases as a cipher
becomes more complex, it was not always practical to introduce more
difficult ciphers.
Of course, the easiest way to break a code is to steal, capture, or other
wise obtain a copy of the codebook, without letting the enemy know about
it. Since producing and distributing a new codebook to everyone who would
need it is not an easy matter, a code was likely to remain in use for a long
period of time, thus enhancing the usefulness of the captured book.
Before and during World War I, all the major European powers had
special offices for decrypting foreign diplomatic and military messages. At
the beginning of World War I, for example, the British managed to obtain
(from captured or sunken ships) copies of the major German naval code
books. Although the Germans took the precaution of further enciphering the
coded messages, the British decrypted them nevertheless.2
However, probably the most important British cryptanalytic success in
volved German diplomatic, rather than naval, codes. On January 17, 1917,
British cryptographers decoded a message, known to history as the Zim-
mermann telegram, in which the German foreign minister directed the Kai
ser’s ambassador to Mexico to propose a German-Mexican alliance against
the United States, in case the United States reacted to German initiation of
unrestricted submarine warfare (scheduled for February 1) by declaring war
on Germany. Subsequent publication in U.S. newspapers of the telegram,
which envisaged Mexico recovering Texas, New Mexico, and Arizona,
created a fire storm that did much to make President Woodrow Wilson’s
decision to go to war inevitable. The release of the telegram was handled so
skillfully that the Germans did not suspect that their code had been broken.'
The story of American cryptography during World War I and the follow
ing decade illustrates how, despite the immense intellectual challenge in
volved, it was still possible at that time for an individual, working by
himself or with a small group, to discover the basic principles of the art and
to solve codes and ciphers used to encrypt the most sensitive messages.
d Herbert Yardley relates how he was able, in several hours on his
ln tQ cryptanalyze a message to President Wilson from Colonel Edward
u ^ s e Wilson’s personal representative then on a diplomatic mission to
Germany.4 Yardley’s account of his leadership of the U.S. Army’s crypt-
analytic unit once the United States entered the war and of the State De-
' rtment’s Black Chamber after the war’s end indicates the extent to which
cryptography was, at that time, an art rather than a science and how it
depended on the insights and intuitions of individuals working essentially by
themselves.
However, in the case of cryptology, as in many other areas of military and
intelligence activities, World War I marked a crucial stage. According to a
historian of cryptography,
The First World War marks the great turning point in the history of
cryptology. Before, it was a small field; afterwards, it was big. Before, it
was a science in its youth; afterwards, it had matured. The direct cause of
this development was the enormous increase in radio communications.5
Fragility o f Cryptanalysis
Cryptanalysis is among the more fragile of intelligence methods, since a
country usually changes its cryptographic system if it realizes that an ad
versary can read its encrypted messages. Thus, it is not surprising that the
American and British cryptanalytic successes during World War II were
considered to be among the most vital secrets of the war, worthy of the most
careful security arrangements that could be devised. In the case of the
British success in mastering the German Enigma machine, the secret was
kept for about thirty years, despite the large number of people involved in
the operation.
The American case was far different. In what might be the worst security
breach of the war, the Chicago Tribune published, on June 7, 1942, an
• 1 on the U.S. victory at the Battle of Midway. Headlined “ Navy Had
Word of Jap Plan t0 Strike at Sea,” it cited materials derived from decoded
nese messages. In particular, it included the names of not only the
P nese carriers involved, but also the light cruisers that supported the
would-be occupation forces. Furthermore, it asserted that when the Japanese
fleet moved toward Midway, “ all American outposts were warned” and that
U S naval intelligence had been able to predict “ a feint at some American
base [Dutch Harbor, in the Aleutians], to be accompanied by a serious effort
to invade and occupy another base [Midway Island].” 11
A Japanese intelligence expert would probably conclude from the article
that the United States had been reading coded Japanese naval messages.
Although the matter was referred to a grand jury in Chicago, however, no
indictment was brought. It appears that the key U.S. officials ultimately
decided against prosecution on the grounds that a trial would only call
attention to the article and probably require a public confirmation of the fact
that the United States was reading coded Japanese naval messages. (Ironi
cally, on August 31, 1942, this very fact was mentioned by a congressman
in a floor speech castigating the Tribune's “ unthinking and wicked misuse
of the freedom of the press.” 12)
On August 14, 1942, the Japanese Navy introduced a new version of its
code (dubbed JN-25d by U.S. cryptanalysts). Although the appearance of a
new version of the code so soon after the previous version(JN-25c) had been
introduced (on June 1) was suspicious, postwar researchers have not dis
covered any compelling evidence that the change was motivated by the
article.13 Furthermore, the new version of the code “ retained the charac
teristic of the broad JN-25 formula,” thus allowing the United States to
regain access to the Japanese message traffic more easily than if the Japanese
had instituted an entirely new system.14 In general, the historians who have
written on the issue have believed that the existence or, in any case, the
S1gnificance of the Tribune leak escaped the notice of the Japanese altogether
and that the August code change was merely a routine one.
Nevertheless, it did take the United States about four months to become
as familiar with the JN-25d code as it had been with previous versions.
urthermore, the difficulties involved in developing a new cryptographic
system and distributing it to the fleet could easily explain why the Japanese
faction was limited to merely advancing the date of an already planned
C°de change. Recent research has uncovered a reference in Japanese diplo
matic traffic to a request to the Japanese Embassy in neutral Lisbon for
newspapers, particularly the antigovemment ‘Chicago Tribune,’ with as
any ^ack issues as possible.” 15 Although far from conclusive, this sug-
Sts ^at Japanese authorities were aware of the Tribune article on Midway
and at least concerned enough about its possioie sigiuucain^ w — w% ,
it for themselves.
A more clear-cut example of the fragility of cryptanalysis, involving
Britain this time, occurred in 1927. During the preceding years, the British
cryptanalytic bureau, the Government Code and Cypher School, had been
able to decipher messages between the Comintern headquarters, or the So
viet government in Moscow, and the various Soviet representatives in Lon
don (the Soviet Embassy as well as a trade delegation and a trade office of
Arcos, the All-Russian Cooperative Society). By this means, the British
government tracked the activities of the Soviet diplomats and trade repre
sentatives, activities that included espionage and involvement in trade union
affairs. In 1927, when the British broke off diplomatic relations with the
Soviet Union, these departures from diplomatic decorum were cited as the
reasons for the decision. However, the British ministers, when pressed in
Parliament to defend their action, were indiscreet in discussing the matter
and revealed publicly their ability to read encrypted Soviet messages. The
predictable result was that the Soviet Union introduced new ciphers, which
the British were unable to break.16
A similar case, in which a democratically elected government revealed
sensitive cryptanalytic capabilities in order to build support for its policies
and thereby lost access to encrypted messages, seems to have occurred in the
United States in 1986. Apparently to justify its eventual decision to bomb
government facilities in Tripoli, Libya,
President Reagan [the Washington Post reported] and his top advisers
made an extraordinary disclosure of sensitive intelligence information
. . . to demonstrate that United States has hard evidence that Libya . . .
was directly responsible for the bombing of a West Berlin nightclub. . . .
The specifics cited by the president . . . sources said, will make it clear
that the United States has the capability to intercept and decode Libya’s
sensitive diplomatic communications.17
Telemetry Analysis
photo Interpretation
Despite the sophistication of the equipment that can take pictures deep
within otherwise inaccessible territory, no substitute has been found for the
human eye when it comes to interpreting what those photographs show. This
is not so simple a task as might be thought: while it is often said that
photographs are a particularly persuasive form of intelligence (in the sense
that senior officials feel more confident about the intelligence they are get
ting when they can see for themselves), the average photograph is likely to
be unintelligible to the layman. It is only after the photo interpreter (PI)
points out and labels the interesting items that ordinary viewers can under
stand what they are seeing.24
A photograph’s quality is typically measured by what is called the
“ ground resolution distance.” While the precise meaning of this term is
quite technical, it may be thought of as the minimum-sized object (in terms
of its length and width) that is distinguishable from neighboring objects or
from the background. While many other factors must be taken into account
to determine how well a photograph can be interpreted, ground resolution
distance is “ nevertheless . . . a convenient measure, useful in making gross
comparisons and evaluations.” 25
The actual ground resolution distances U.S. photographic surveillance
satellites can obtain are classified, because this information would tell ad
versaries what details (of military equipment, facilities, and so forth) the
United States can, or cannot, see. Planners of any deception efforts also
would find this information useful, since it would tell them how closely a
decoy would have to resemble the real object for the two to be indistin
guishable to photographic surveillance.
However good the resol a, all sorts of important information cannot be
earned directly from a ph ^ograph. Pis must often work from what are
ed signatures,” that is, specific details that, on the basis of experience
^lc’ are associated with a certain piece of equipment, the carrying out
f o n - ain activity, the intention to take a certain step in the future, and so
For
example, the lengthening of an airfield runway would indicate the
experience, a Pi might know that a given runway lengin was correlated with
a given type of airplane and could project that aircraft was to be stationed at
that airfield. Similarly, in a lighter vein, it might be possible to distinguish
a military base for Cuban soldiers from one for Soviet troops by the presence
of a baseball diamond, as opposed to a soccer field.
One method of using signatures that the United States has relied on goes
by the fanciful name of “ crateology”— the correlation between military
equipment and the type and size of crate in which it is usually shipped. Once
it has been determined that, for example, MiG-21 s have been shipped in
crates of a certain size, crateology suggests that other boxes of the same size
whose contents have not been observed directly may be assumed to be
MiG-2 Is.26
The key to using such signatures is the fact that most organizations—
military ones in particular— tend to follow routines, to do things by the
book. Thus, when the Soviets decided to deploy intermediate-range ballistic
missiles (IRBMs) in Cuba, they first prepared the missile base defenses by
deploying SA-2 antiaircraft missiles around it in a standard trapezoidal
pattern. By observing this pattern, and identifying it as being the same as
that used at older 1RBM bases in the Soviet Union, analysts could have
predicted the future emplacement of IRBMs in Cuba.27
The use of signatures can be very productive. But if it becomes known
what signatures Pis are using, an adversary can use their dependence on
them as a means of deception. In the Cuban missile crisis discussed above,
it seems apparent that the Soviet Union did not realize that the trapezoidal
pattern of SA-2 emplacements was known to the United States as a signature
of an IRBM base; given the effort the Soviets invested in keeping the IRBM
deployment secret, their failure to alter the pattern in which SA-2s were
emplaced seems simply a mistake.28 The absence of the typical pattern
might have suggested to U.S. intelligence analysts that IRBMs would not be
deployed in Cuba.
new s years immediately before and during World War II, the pace at which
scientific and technological principles were incorporated into weaponry
increased substantially. A nation’s ability to compete militarily uuam t
dependent on its technological level, and its ability to manufacture weapon
systems embodying that technology, as on its overall productive capacity,
the size of its military forces, or any other measure of military strength. This
was particularly true of air warfare, which saw the development and intro
duction of air defense radar, sophisticated navigational systems for guiding
bomber aircraft to their targets, jet aircraft, ballistic and cruise missiles, and
finally, the atomic bomb. Understanding new weapon systems that the en
emy was developing thus became an important objective of each nation’s
intelligence agencies. In many cases, it was important to obtain fairly de
tailed information about the way the system worked in order to develop
methods of countering it.
This imposed a new task on intelligence systems: to predict the emergence
of new weapons and to understand them well enough to defend against and
to counter them.31 This required that the intelligence agencies have access
to specialized scientific and technical knowledge and that this capability be
integrated into the intelligence process.
Collection requirements for scientific and technical intelligence have to be
more precise than for other forms of intelligence; it is not obvious to some
one unfamiliar with the new technology what is to be looked for and where.
This in turn means that close coordination is needed between the analysts
and the collectors. To some extent, the process must be similar to the
scientific method in which hypotheses (formulated by the analyst) are tested,
albeit by directed observations rather than by experiments. For example,
R. V. Jones, the head of the British Air Ministry’s intelligence section
during World War II, recounts how his theory concerning the nature of the
first system of radio signals the Germans used as a navigational aid for
bombers (Knickbein) was confirmed when an aircraft— fitted out with spe
cial receivers and flying in an area designated by him— picked up the radio
signals he had predicted would be there.32
Analysis in the area of scientific and technical intelligence requires the
blending of intelligence and scientific or technical expertise. Although the
scientific principles themselves are, of course, universal in nature and known
to experts throughout the world, the way in which they are put to use in
technological developments can differ widely between countries. Thus, this
type of analysis requires enough familiarity with scientific and technical
developments to understand what an adversary is doing, combined with
enough imagination to realize that he might solve technical problems that the
analyst has not been able to solve or that he might reach a different, but
nonetheless valid, solution to them.
Military inieuig*'
. . intelligence deals with information about the military establishment
^ foreign country for planning one’s own military forces in peacetime or
° conducting military operations against it in time of war. The most
dementary military intelligence is what is known as the “ order of battle,”
ttie basic information about a nation’s military forces— amount of man-
Wer numbers and types of weapons, organizational structure, and similar
data (Characterizing this information as elementary does not, of course,
imply that it is easy to get or even that it is a simple matter to know which
types of auxiliary or reserve troops should be counted and which should
not ) Not strictly speaking part of the order of battle, but a necessary com
plement to it, would be information about the qualitative aspects of a foreign
military establishment: how good the training is, what the quality of the
leadership is, and so forth.
One step up from this fundamental level would be information about how
the forces could be expected to fight: what tactics they have adopted and
trained for, how they envisage the nature of a future war (what in Soviet
terminology is called “ military doctrine” ), and what their strategy would be
for fighting it. The raw data for this intelligence can come from open sources
(such as military publications), from attachés’ or diplomats’ overt contacts
with the adversary’s military, from observing (either directly or via techni
cal collection systems) deployments and exercises, or from human intelli
gence sources with direct access to military plans. As with scientific and
technical intelligence, this sort of analysis calls for blending the intelligence
perspective (with its concentration on all available bits and pieces of evi
dence about the adversary and what they tell about how he thinks) with that
ot the military specialist (with its understanding of weapon systems’ capa
bilities and the kinds of warfare that can be waged with them).
But above all, it requires the open-mindedness to be able to imagine that
the adversary has adopted different solutions to common military problems
and that his solutions may well be appropriate for his circumstances and
resouices or even superior to one’s own solutions. In summary,
Political Intelligence
Current Intelligence
Intelligence agencies have a variety of products designed to inform policy
makers of major new information that might affect policy. In this regard,
agencies serve a function similar to that of the news media.36 The range of
information that should be watched for and reported is as large as the entire
scope of the nation’s intelligence interest. Obviously, some priorities must
be established on the basis of what is, in Kent’s words, “ positively germane
to national problems which are up now and other problems which appear to
be coming . “ 37 While a formal system of priorities may exist, it must be
supplemented by the intelligence producers’ own judgments about what is
important to their consumers. This judgment, in turn, depends not only on
the intelligence analysts’ common sense but also on their being in close
contact with the policymakers.
In the United States, the best-known product of this type is the National
Intelligence Daily, or NID, a sort of classified newspaper containing a series
of short (several-paragraph-long) articles on the previous day’s events. Pre
pared by the CIA in coordination with the other major intelligence
agencies— the Defense Intelligence Agency (DIA), the National Security
Agency (NSA), and the State Department’s Bureau of Intelligence and
Research (INR)— it is sent to several hundred top national security officials
in the government.
A more sensitive daily report is the President's Daily Brief, which has a
much more restricted circulation. According to Cord Meyer, a former career
CIA official, writing in 1980,
• , d e s i g n e d to be read in ten or fifteen minutes by the President at the
Routine reports were to be made every two weeks, but any particularly
striking events were to be reported immediately.47
This type of formalized system, in which indictors are determined in
advance and can thus guide the collection process to some extent, exists only
with respect to the most important questions, such as the possibility of
hostile military action. The formal system also ensures that intelligence is
the policy-making process and is not ignored. In most other areas,
fed int0 SyStem is set up to guarantee that the available intelligence is
n° 3yht to bear when decisions are made.
broU*jl wjnp what was widely regarded as the CIA’s failure to provide
warning of the Iranian revolution of 1978-79, proposals were
3 d to establish a political I&W system to warn of political instability in
ma ' n countries. This would require establishing indicators comparable to
hose used to warn of military attack. This is a much more difficult propo
sition with politics than with military matters; it is unlikely that the current
state of the social sciences allows this to be done sufficiently to be of real
use Nevertheless, a more formal system would clarify the extent to which
intelligence is responsible for warning of potentially serious events, even
when the policy-making community is not focusing on that country or region
of the world.
Basic Intelligence
Another general type of intelligence product may be termed the “ basic
intelligence report.” Such a report tries to provide as full a picture of a given
situation as possible, drawing on publicly available data and relevant infor
mation from all intelligence sources ( “ all-source” intelligence). In the mil
itary arena, for example, such products might be an order of battle, the
description of a nation’s armed forces in terms of numbers and types of
combat units, and their manpower, equipment, organization, and subordi
nation of units to higher-level commands. Similarly, a basic intelligence
report on a nation's political system could include an account of all the
major political forces and personalities, their traditional views and interests,
the ways in which they have related to each other, and so forth.
Periodic Reports
Intelligence Estimates
The most ambitious type of intelligence product is that which not only
describes! he current situation but also attempts to predict how it will evolve.
particular, a national intelligence estimate (NIE) represents the most au
thoritative statement on a subject by the U.S. intelligence agencies, all of
which contribute to its drafting and review.
These estimates are supposed to take the broadest view of their subject
and to project the current situation into the future. In the United States, they
are produced by a special staff, with the support of analysts throughout the
intelligence agencies. The estimates are supposed to incorporate the views
of all the agencies in the intelligence community.43 A good deal of effort is
devoted to finding a consensus position, but, when this is not possible, a
dissenting view may be expressed in what is traditionally called a footnote,
even though the dissent is sometimes included in the text.
NIEs on some topics of major importance, such as Soviet strategic nuclear
offensive and defensive forces, are produced periodically; other topics are
covered in response to specific requirements, either self-generated (that is,
the idea for the estimate arose within the intelligence community itself) or
from elsewhere in the government, most often the National Security Council
(NSC). Shorter, more topical estimates, known as Special NIEs (or SNIEs),
may be produced in response to more urgent requirements.
In contrast to the U.S. practice, producing estimates in Israel during the
period before the 1973 Yom Kippur War was a monopoly of Military
Intelligence, a branch of the armed forces. Although other intelligence
services existed— the Central Institute for Intelligence and Security (Hamos-
sad), operating covertly in foreign countries; the Shin Beth, responsible for
counterintelligence and counterterrorism; and the Foreign Office research
department— only Military Intelligence had access to all intelligence infor
mation and was responsible for analyzing and distributing it. Furthermore,
the cabinet’s staff did not have any intelligence expertise, and there was no
mechanism by which the political leadership tasked Military Intelligence to
provide evaluations of specific subjects.44 This concentration of power was
criticized as contributing to the failure of Israeli intelligence to warn of the
Egyptian-Syrian attack on October 6 , 1973, which is discussed in the “ in
telligence failure” section of this chapter.
Received Opinion
The success of any intellectual endeavor (scientific discovery, for example,
as well as intelligence analysis) can be compromised by the force of re
ceived opinion, often referred to as “ conventional wisdom”— those opin
ions about a subject that are generally regarded, without sufficient
investigation, as true. While, in one sense, we obviously cannot do without
it (we could hardly afford the time or effort to reinvestigate and rethink all
our opinions every day), relying on received opinion poses the real danger
that we will either misunderstand or perhaps ignore evidence that suggests
the truth is otherwise.
However pernicious the effect of received opinion on an individual’s
thinking, its impact is probably heightened by the bureaucratic environment
m which an intelligence service carries out its analysis. While an individ
ual s thought can be influenced by particularly striking evidence that does
n°t fit the preconceived pattern, or even by a chance insight into another
mterpretation of the evidence, it is unlikely that many people will be affected
ln same way at the same time. Thus, individuals challenging the received
Nlew are likely to encounter the resistance of the much larger number who
remain comfortable with it.
individuals economize on time and effort by not rethinking all their
°Pinions all the time, the organization may be said to do the same. Given the
^2e anci complexity of the organizations involved and the consequent need
0 °btain the consent (or at least the acquiescence) of many people to the
judgments reached, fundamental réévaluation of the evidence with a view
toward rethinking all the basic assumptions is a very difficult and time-
consuming process.
Thus, if an analyst has to write a report, he is likely first to review what
was written the previous year and then merely update it as necessary. This
not only saves labor but also offers a degree of security. Because last year’s
report was approved, if the analyst limits himself to the changes indicated by
new evidence, the underlying reasoning does not have to be duplicated, and
the sources of potential controversy can be minimized.
Clearly this creates a tremendous opportunity for error in situations in
volving gradual change. Because intelligence evidence is almost always
spotty and incomplete, the accumulation of various bits and pieces of new
information may not force a change in the underlying analysis. This may be
true even though the preponderance of evidence at some point would suggest
to someone starting afresh that a different framework would make more
sense. In this manner, an older way of viewing the situation may survive
much longer than it should.55
M irror-Imaging
our experts either fail or do not try, [and] the Germans succeed. This is
the most interesting Intelligence case, but it is difficult to overcome the
prejudice that as we have not done something, it is impossible or foolish.
1 ^ b u t I lO V lC C b , CUIU l l i a j ' U ll> ltsiV /l ^ m u x v v * » u u v /» UAW»
*°n^rpence [i.e., intelligence analysts who are not as such experts in the
e t technology], which at least has the advantage of closer contact
releva 60
with the enemy.
s *s solution to the problem is for the intelligence analyst to be wary
f the technical expert's views while trying to make use of his expertise:
PI m an Intelligence point of view, it must always be borne in mind that
the advice comes from a British, and not from a German expert. If this
difference in background is not continually appreciated, serious misad-
iustments can be made. In the tactical field, Napoleon knew this danger
well: he called it, “ making pictures of the enemy“ . In the technical field
the same danger exists. . . .61
What Is Failure?
More frequently than the popular myth of an omniscient intelligence service
would lead us to expect, intelligence reports or estimates contain erroneous
statements, and important events occur without intelligence agencies having
predicted them. Determining whether such situations constitute intelligence
failures requires a standard against which it is reasonable to measure intel
ligence achievements.62 Often, it is assumed in discussions of this sort that
intelligence performance should be measured against an ideal of clairvoy
ance. Typically forgotten is that, for the most part, intelligence involves not
a metaphorical struggle with nature (as is the case with scientific research
that seeks to force nature to reveal its secrets) but a real struggle with a
human adversary.
For example, the victim’s failure to anticipate a surprise attack is the
reverse side of the coin of the attacker’s success at achieving surprise. In
mteliigence work, one opponent is most often trying to frustrate his adver-
Sary s attempts to understand the situation accurately. To do so, he will use
a whole array of intelligence techniques, including deception, as is dis-
Cussed in chapter 5 on counterintelligence.
Thus, we cannot compare progress in intelligence techniques to, for ex-
amPle, progress in chemistry. The consequence of progress in chemical
^ tarc*T and the dissemination of the knowledge and insight gained thereby,
an be that chemists throughout the world achieve better results in their
4 _____ — v/K\/ ui intelligence oinciais to achieve better
results in its work, this means, in general, that its adversaries’ intelligence
officials are not performing their own tasks as well as in the past and, in a
sense, have fallen down on the job. This is obviously true with respect to
questions of deliberate surprise.63
Taken to an extreme, speaking of intelligence failure is similar to speak
ing of “ chess failure,’’ defined as the failure to win chess games. Obvi
ously, to improve our chess-playing abilities, it makes sense to critique
styles of play, as well as individual moves, as thoroughly as we can. The
result should be better individual chess play and, if we share the insights we
have gained, by others as well. It cannot be, overall, an increase in the
number of games of chess won per number played. Of course, as citizens
we are not concerned with better intelligence in the abstract; we seek to
improve our own country’s intelligence capabilities and, in so doing, de
value those of our adversaries.
Institutional Solutions
Intellectual Solutions
Institutional solutions have the advantage that they can be implemented
top-down through managerial decisions and directives; they do not, how
ever, attack the heart of the problem of intelligence failure, the thought
process of the individual analyst. Improving thought processes, however, is
not a matter that administrative means can deal with directly. Indeed, when
we try to be specific about what would be involved, it is not even clear we
know what “ the improvement of thought processes” means, aside from a
general and not very useful admonition to be “ smarter.”
While it may not be possible to lay down rules that will inevitably guide
us to correctly analyze intelligence information, it is nevertheless useful to
try to identify intellectual errors or deficiencies that may be characteristic of
lilts
place,~ in- so doing, we can become aware u i w c a c I t l l U U l W I V O «**V*
quently try to correct them.
The previous discussion of the intellectual causes of intelligence failure
lists mirror-imaging as an important error that must be guarded against.
While any intelligence analyst is vulnerable to this error, cultural reasons
may make it a particular problem for the U.S. intelligence community.
Americans are more open to a belief in the basic similarity of people through
out the world, perhaps because of America’s experience in successfully
absorbing and assimilating immigrants from diverse cultural and religious
backgrounds. Thus, the U.S. intelligence analysts risk being more likely
than other analysts to understand and predict the actions of others on the
basis of what they would do under similar circumstances.
Thus, an emphasis on expertise in foreign societies and cultures is an
important corrective to this error.66 This expertise can be fostered by a study
of the language and history of the country, by an awareness of its religious
and cultural traditions, and so forth. A deliberate attempt must be made to
see the international situation from its leaders’ point of view, rather than our
own.
WORKING BEHIND THE
SCENES
COVERT ACTION
Covert action— especially in its more sensational forms, such as the over
throw of a government or the assassination of its leader— looms large in the
public’s view of what intelligence is; for professionals and students of
intelligence, however, it is something of a question whether covert action
should be considered a part of intelligence at all. This issue arises because
covert action involves taking action to implement a nation’s foreign policy,
while collection and analysis are limited to providing the information on
which that policy may be based.
73
involvement in it. An example would be a government’s secret financing of
a newspaper or radio station that supported government policies or was
hostile to its adversary’s. Finally, there may be cases in which a good deal
of information becomes public, but for diplomatic or other reasons, the
government involved still avoids officially acknowledging its connection
with it.
Covert action (euphemistically referred to as “ special activities’’ for
bureaucratic purposes) is currently defined by the U.S. government in the
most recent presidential Executive Order on U.S. Intelligence Activities
as follows:
doubtful legitimacy,
often became involved in intrigues far from ambiguous. The Venetian
secretary and the Milanese commisarias at Genoa in 1496, for example,
served as intermediaries between their governments and an adventurer
who offered to burn up two of [sic] three French ships either in the port
of Villefranche or at Nice. The two governments agreed to the proposal
and to splitting the cost of 400 ducats.3
Even today, there are cases that illustrate the artificial nature of the line
between diplomacy and covert action. For example, the unpublicized at
tempts in 1984-86 by State Department and National Security Council
personnel to persuade foreign leaders to contribute money to support the
Nicaraguan resistance come within the usual scope of diplomatic
exchanges.4 Had they been conducted by intelligence agency personnel,
however, they could just as easily have been regarded as covert action.
Another example, less well known, arose from the U.S. response to the
kidnapping of the Italian statesman Aldo Moro by the Red Brigades terrorist
group in 1978. The Italian government requested the services of a CIA
psychologist who had specialized experience in the counterterrorism area.
This was considered to be covert action under the Hughes-Ryan amendment
definition; delays in preparing the required paperwork led the Italians to turn
to State Department, which, unimpeded by covert action approval pro
cedures, provided a psychologist from its staff. For practical purposes, the
lne between diplomacy and covert action appears to be drawn in ambiguous
CciSes according to the departmental affiliation of the personnel involved
rat er than the activity’s nature.
ican S^°U^ n°ted that the term “ covert action” appears to be an Amer-
lnvention, not necessarily used in the lexicons of other intelligence
uvt 11 anu covert lecnniques ot influencing events and behavior in, and
the actions of, foreign countries.” 6 As such, it does not fall entirely within
the sphere of intelligence. Instead, it includes other foreign political activ
ities of both the Soviet government (for example, diplomacy and the use of
official media such as Radio Moscow) and the Communist party of the
Soviet Union (conducted, for example, through foreign Communist parties
or front groups such as the World Peace Council). The term focuses atten
tion on the goal sought— political influence— rather than on the secrecy or
openness of the means used.7
Regardless of the terminology used, it is important to keep in mind that
what is called covert action in the United States is only one tool of foreign
policy among many. Because of its unique features and flamboyant past, it
has attracted a great deal of attention, and it does pose some particular
problems in terms of its secrecy for a democratic government. Nevertheless,
the term may be unfortunate in that it emphasizes a characteristic of the
means used (their secrecy) while obscuring the fact that the ends sought arc,
or should be, those of foreign policy as a whole. Because of this focus on
the form rather than the substance of the activities involved, the debate in the
United States about covert action has emphasized questions of legality and
propriety at the expense of more fundamental questions concerning foreign
policy goals and strategy.
This chapter will treat covert action as an element of intelligence that is
also a foreign policy tool; in chapter 6, the specific issues connected with the
use of covert action by a democratic government will be addressed. Because
of the ambiguities created by the existence of two nonidentical, official U.S.
definitions of covert action, the discussion in the remainder of this chapter
deals with activities more inclusive than the covert action category in order
to clarify its limits. A more theoretical definition of covert action would not,
to be sure, be tied so closely to the vagaries of U.S. law and practice; such
a definition, however, remains to be achieved.
well* but such influence also can have important effects in the long run in
nondemocratic or even totalitarian countries.
Influencing political behavior, circumstances, or events in foreign coun
tries is the very stuff of foreign policy; diplomacy is as directed toward this
iioal as is covert action. The development and deployment of military forces
also may be carried out to influence foreign behavior; this is common in
peacetime but may occur during war as well. Thus, it is not surprising that
many of the covert action techniques discussed below can be, and are,
carried out in a noncovert manner as well. What is or is not considered
covert action, for U.S. government purposes, often depends less on the
nature of the case than on the peculiarities of the applicable legal and
administrative definitions of covert action.
Intelligence Support
Agents o f Influence
Although this technique would ordinarily involve agents who can more or
less directly influence governmental perceptions and policies, one could
image an agent whose main task was to affect a foreign country’s media. To
e jjte character ot nis newsletter s reauersmp.
e examples, involving the Soviet use of agents of influence in Japan,
U been recounted by Stanislav Levchenko, a KGB major who defected to
^ U n ite d States in 1979.15 They include the following: the use of a prom-
-he member of the Japanese Socialist Party (JSP) to prevent another party
^ernber whom the KGB considered to be a Chinese agent, from achieving
^leadership position; the use of a senior correspondent of the Tokyo news-
a c Yomiuri to promote the publication of an article to obtain the release
of a Soviet military intelligence (GRU) agent who had been arrested in a
double-agent operation; and the use of a young American stringer for the
Associated Press to surface a letter purportedly from the wife of a Soviet air
force pilot who defected from Siberia to Japan in his MiG-25 that implored
him to return to the Soviet Union.16
Unattributed Propaganda
One of the more direct ways of attempting to influence a society is by
disseminating opinions, information, or misinformation through the avail
able media, that is, by propaganda (as it is pejoratively called). For exam
ple, nations with active foreign policies usually have radio stations (such as
the Voice of America, Radio Moscow, and so forth) that openly express
their views on international questions, much as newspaper editorials express
the views of the newspaper’s editor or publisher.
At times, however, a government may wish not to be officially associated
with the material contained in its propaganda. In these cases, it may put
certain opinions or facts into circulation in a manner that does not make their
origin apparent. This may be accomplished either by planting them in news
media it does not own or control or by means of media that appear to the
public to be independent but that are in fact controlled by the government.
There are two major reasons a government might resort to such unattrib-
uted (or “ black” ) propaganda.17 First, the target audience may be more
disposed to believe the propaganda if its origin is disguised and the ulterior
motive ot the propagandist is not evident. For example, anti-Soviet infor
mation is more likely to be believed if it appears to come from an indepen-
ent source than if it comes from the U.S. government. For that reason, as
RadUSSe^ tIie U.S. government established Radio Free Europe and
a_ to Liberty as apparently private organizations.
cia te d ° ‘ *°F ^^*omatlc reasons> a government may not wish to be asso-
aud' Wlt^ certain opinions it nevertheless wishes to propagate to a given
,ence. For example, during the Iranian hostage crisis of 1979-81, the
mg me iiusiage-utKing ai me u . in., wime us mac*. rauio station, the
National Voice of Iran, implicitly approved it and sought to inflame anti
American opinion in Iran.18
In addition to “ black” propaganda media, whose origin is meant to be
concealed, one may also speak of “ gray” propaganda, whose origin
while not totally or effectively concealed, is nevertheless not publicly ac’
knowledged. For example, the U.S. government established Radio Free
Europe and Radio Liberty in 1949 and 1951, respectively, to broadcast to
the peoples of Eastern Europe and the Soviet Union. Unlike Voice of
America, these stations were not to convey official American views but
were designed to provide the target populations with information about
their own countries that was not available in their own government-
controlled media, as well as with information about the West. They were
set up as private U.S. organizations; to support this cover, they even made
public appeals for contributions.
in fact, the stations were run by the CIA. According to Ray Cline, “ The
CIA organized this effort . . . because it was thought the broadcasts would
be more effective if their connection with the U.S. Government would be
concealed.” 19 But while the U.S. government connection was unacknowl
edged, it was clear that the radios were an American operation. Following
the public confirmation by Senator Clifford Case that they had enjoyed
covert CIA funding, Congress decided in 1973 to support the radio opera
tions openly via the Board for International Broadcasting, which was es
tablished as an independent federal agency.20
A similar Soviet “ gray” propaganda technique is the use of Novosti Press
Agency. Unlike TASS (whose full name literally means the “ Telegraph
Agency of the Soviet Union” ), Novosti is said to be a nongovernmental
institution. This is seen as allowing it somewhat greater latitude in dissem
inating views with which the Soviet government does not want to be asso
ciated, although it is unlikely that its “ unofficial” status is taken very
seriously by anyone outside the Soviet Union.21
Another method of conducting propaganda in an unattributed fashion
involves planting stories in independent news media or arranging for books
to be written and published by authors and publishing houses that have no
visible connections with the government or its intelligence agencies. For
example, during a covert action campaign directed against Communist in
fluence in Western Europe, the CIA used unattributed propaganda, includ
ing secret subventions for publishing books and planting newspaper articles
via agents of influence working for wire services or newspapers.
One of the most famous CIA activities of this sort was the publication m
“ secret speech" attacking Stalin s •cun 01 persuuamy. 11K, aF^ vll nuo
also published in the New York Times, which received a copy from the
pepartment of State but which was presumably aware that the speech had
been originally obtained in a clandestine manner.22 Another example is the
c jA’s support for the writing and publication of The Penkovskiy Papers, an
account, based on the actual case materials, of the CIA's premier spy in the
Soviet Union in the late 1950s and early 1960s.23
A related technique is the use of front groups as a propaganda medium.
These groups, while ostensibly broadly based, are in fact under the control
o f a government and can be relied on to take positions consonant with that
Forgeries
Another technique for putting material into circulation without taking any
responsibility for it is the preparation and circulation of forged documents.
In recent years, many forgeries purporting to be official U.S. documents
have come to light.24 While in most cases it is difficult to prove their origin,
the indicators point to the Soviet Union.
All of these techniques serve the same general purpose: to influence a
target audience’s perceptions so it will take desired actions. The material
used to do this— the arguments advanced by an agent of influence; the
content of the propaganda, attributed or unattributed; or the text of the
forgery— must be plausible to those whom one is attempting to influence. In
general, therefore, one would expect the false material to be mixed in with
some truths to enhance its plausibility. The resulting amalgam, which has
toe effect of misleading the target audience in some important respect, is
°ften referred to as “ disinformation” (from the Russian word dezinformat-
which is used to refer to the active measures technique of misleading an
audience to induce it to act in one’s own interest).25
course, it is possible that a totally true message (or one that was
a levec* t0 be so by those propagating it) could have the desired effect on
(in r^et autoence. The most effective part of the Khrushchev secret speech
Eur 6 SCnSe rectocing communism’s prestige in Western and Eastern
°Pe ) consisted of the revelations concerning Stalin’s crimes and the
VAAV/M^il VIIV tVAi HUI) UUUlVlUlV« ^ i l l l l l U l IJ 9 U1V L /llllÜ ll VS1 HjÇ
autften-
tic Zimmermann telegram, discussed in the previous chapter, was
a mas-
terstroke of unattributed propaganda.
afl^' t supPortec* Afghan regime and support for the contra resistance in
S,0V1raeua) exemplify this type of covert action.
№Ca ^rtjCUlar form of this sort of activity that has received a great deal of
^ ? n is patron-state support for international terrorism. The support
attCernments provide to terrorist groups can vary greatly in magnitude and
f ° v rtance At the low end of the spectrum, a patron state might provide
imP . facilities or a haven where terrorists would be safe from arrest while
tr -nCTtheir attacks or to which they could flee afterwards. At the higher
end this support could include money, weapons, genuine or forged pass
es or use of the diplomatic pouch to send weapons or explosives into the
target country. The amount of control the patron state exercises over the
terrorist group’s activities can also vary; in some cases, it may be fairly
detailed, while in others almost nonexistent, as long as the general nature of
the activities is consistent with the patron’s interests.
Paramilitary
At the borderline of real covert action are cases in which a government uses
irregular (or volunteer) forces in a military conflict, either alone or in alli
ance with similar groups or indigenous forces. Because a relatively large-
scale effort of this sort can hardly remain secret for long, we might argue
that this type of activity should be excluded from the category of covert
action. On the other hand, since intelligence services are likely to be tasked
to carry it out, it is usually grouped with more covert types of action. In any
case, since the activity would not be publicly acknowledged by the govern
ment carrying it out, it remains covert action in that sense, regardless of how
transparent the pretense of noninvolvement becomes.
Plausible Denial
Closely related to this is the doctrine, long considered axiomatic, that
even if a nation’s involvement in covert action becomes known, the chief
of state should be able to deny that he authorized or even knew of the
action. He should be able to assert, with some plausibility, that it was
carried out by subordinates who acted without his knowledge or authority-
In the post-World War II period, this doctrine came to public attention
most forcefully when President Eisenhower disregarded it and publicly ad
mitted that he had authorized overflights of the Soviet Union by the U-
reconnaissance plane. Eisenhower’s action came in May 1960, after a U-
plane, whose high-flying altitude had previously made it invulnerable to air
was brought down by a Soviet surface-to-air missile while on a
nnaissance flight across that country. (Although not covert action, this
re- t involving an apparent violation of international law, raised the
^ m /issu e of plausible deniability.)
S In his memoirs, Soviet First Secretary Nikita Khrushchev claims that it
Eisenhower’s admission of responsibility, rather than the flight itself,
'hat caused him to scuttle the Paris “ Big Four” summit meeting scheduled
for later that spring.41 Eisenhower, however, felt that he could not deny
knowledge without suggesting that he did not effectively control U.S. mil
itary forces, especially given the large infrastructure necessary to support the
flights. While it is possible to disavow the actions of a small group of secret
agents, who can be portrayed as renegades acting without or contrary to
orders, it is another matter to disavow an operation that obviously required
the cooperation of many people at various air bases around the world.
An example of plausible denial in recent years arose from the case of the
French intelligence agents who blew up the Rainbow Warrior. The French
government maintained that official involvement in the affair went no higher
than Defense Minister Charles Hemu, who was responsible for the DGSE
(Direction Générale de la Sécurité Extérieure, the French foreign intelli
gence service subordinate to the Ministry of Defense) and who resigned
three months after the attack. President François Mitterrand escaped essen
tially unscathed.42
In the United States, the doctrine of plausible denial was in effect abol
ished by Congress in connection with its investigations into intelligence
matters in the mid-1970s. At the end of 1974, following revelations about
a covert action program in Chile, the U.S. Congress passed the Hughes-
Ryan Amendment, which prohibited CIA covert actions
unless and until the President finds that each such operation is important
to the national security of the United States and reports, in a timely
fashion, . . . to the appropriate committees of the Congress, including
[the Senate Foreign Relations Committee and the House Foreign Affairs
Committee].43
99
m e t^iassincauou ut iiu u r iiia iiu u
Levels of Classification
A classification system categorizes information according to its sensitivity
which is to say, the amount of damage its revelation to a hostile foreign
power could cause and, hence, the importance of protecting it. In the United
States, the first such system for protecting national security documents was
promulgated by the War Department in 1912; it and the Navy Department
set up their own classification systems during World Wars I and II.3 pres_
ident Harry Truman established the first governmentwide system of classi
fying information in 1951.4 The system is currently governed by an
executive order President Reagan promulgated, setting out the definitions
rules, and procedures for operating the system.5
The U.S. classification system attempts to classify information according
to the degree of harm to the national security its unauthorized release to an
adversary would cause. The more sensitive the information, the more care
fully it is to be protected and the fewer the people who arc “ cleared” for it
(authorized to have access to it). Under the current system, the basic levels
of classification are confidential, secret, and top secret, which are defined in
terms of the damage to national security their unauthorized disclosure rea
sonably could be expected to cause:
Overclassification
It has been a recurring complaint that the U.S. government classifies too
much information and at too high a level. This criticism has been made not
only by congressional committees and nongovernmental critics of the mte
ligence agencies or a given administration, but by insiders as well, r
example, a 1985 DoD commission on security practices noted that
is warranted, current poney specifics mai me Mguci vi a
^^ument is responsible for the classification assigned but frequently, out
^oC orance or expedience, little scrutiny is given such determinations.
0 \ i r l v , while challenges to improper classifications are permitted, few
take the time to raise questionable classifications with the originator.12
U nderclassification ?
Security
Security measures are steps taken to obstruct a hostile intelligence service’s
ability to collect intelligence. Such measures are designed to prevent a
hostile intelligence service from either gaining access or exploiting any
access it may have to personnel, documents, communications, or operations
t0 gain important information; they constitute the wall surrounding classified
form ation. The more traditional aspects of security— which deal with
Protection against the adversary’s human intelligence collection efforts—
are discussed in this section; those that deal w'ith his technical collection
Capabilities are discussed later under the heading “ multidisciplinary
counterintelligence. ”
Personnel Security
pe
before ?e .secur^y involves procedures for screening potential employees
Inng them for a job that gives them access to information a hostile
pioyees commue 10 meet me summitu?> tut iu autu mi^miauon \
screening procedure’s primary function is to judge the potential employee’
willingness and ability to keep classified information secret. The key ele
ments of this judgment involve the potential employee’s character and
loyalty.18 Judgments about character must consider both the individuals’
mental stability and whether, for any reason, they would be vulnerable to
blackmail by a hostile intelligence service.
In the United States, the screening investigation determines whether an
individual is granted a security clearance, that is, authorized access to clas
sified information. The investigation relies on information supplied on a
security questionnaire by the individual, supplemented and verified by a
national agency check (interrogation of the data banks of various law en
forcement and other government agencies), and depending on the sensitivity
of the information to which access is to be granted, interviews with friends
and acquaintances, present and former neighbors, work- and schoolmates,
and so forth. In the case of particularly sensitive information, a periodic
reinvestigation is required to maintain access.
Background investigations of this sort are probably not very effective in
assuring the loyalty and character of personnel to be granted access to
classified information. Various legal prohibitions, discussed in the next
chapter, prevent the FBI or other government agencies from collecting and
maintaining membership lists of what used to be called subversive organi
zations such as the Communist party of the United States, even if the
organization openly advocates the violent overthrow of the U.S.
government.19 A member of such an organization, who was prudent about
discussing his membership with acquaintances and who did not disclose the
membership on the security clearance forms, could reasonably hope to
remain undetected.
In addition, societal changes in the United States have made it consider
ably harder to get candid responses from acquaintances, colleagues, neigh
bors, and others. First of all, there is a typically American resentment at
government snooping, which means that respondents are disinclined to pass
on negative information. In addition, the increased geographic mobility of
U.S. society implies that past acquaintances and neighbors are harder to
locate and may have only a superficial knowledge of the candidate. The
changed political climate means that respondents are less likely to take
questions of loyalty and subversion seriously. The same is true with respect
to questions about character and life-style. For example, the vast increase m
narcotics usage among the middle class (and, in particular, its young) during
the 1970s makes it harder to distinguish the cases in which past drug usage
11IV in Wincn 11
from tl*>se there is the question of whether informants can be assured that
•can d id remarks will remain confidential. Under the Privacy Act of
tlieIf individuals have extensive rights to access government files about
197 selves; while an exemption exists that allows an investigative agency to
ttien» Id the name of an informant who requests anonymity, this may not be
wlt. . , reassuring to potential informants who would be quite embarrassed,
en worse, if their identities were revealed.
orfirst such a potential informant may worry about the possibility that his
lame or some identifying fact (such as a phone number) will be released
A d v e r t e n t l y . Second, he may be concerned that, even though his identity
. not explicitly revealed, the subject of the investigation will be able to
deduce it from the substance of the information the government file con
tains. (In other words, the release of a seemingly insignificant detail, which,
however, only the informant knew, could give away his identity. Since the
officer reviewing the file before its release would not likely be aware that this
detail provided a solid clue to the identity of the informant, he might well
release it, unaware of the damage he was causing.) Finally, as a Department
of Justice official told the Senate Judiciary Committee in 1978, “ In theory,
the [Privacy and Freedom of Information] acts provide an adequate basis for
protecting our sources, but whether they in fact do so is largely irrelevant as
long as our sources think they do not.“ 20
One method of augmenting the background investigation as a protection
against unsuitable personnel is the use of the polygraph machine, commonly
known as the lie detector. This technique has been used primarily by U.S.
intelligence agencies. Neither other Western intelligence services nor non-
Western ones place as much faith in it. Within the United States, the CIA
places the greatest emphasis on the polygraph. The agency requires that any
candidate for employment take a polygraph test, and that all personnel be
subject to periodic retesting as a condition of continued employment. How-
ever, extension of polygraph use to the rest of the U.S. government has been
strongly resisted, most notably by former Secretary of State George Shultz.
On the other hand, following the arrest for espionage of Geoffrey Prime, an
employee of the British Government Communications Headquarters
HQ, the British communications intelligence agency), U.S. officials
tolf^ ^ at l^C P°*y2raPh adopted by GCHQ as well. (Prime is believed
y ave compromised various comint capabilities that involved close U.K.-
les cooperation.) The implicit threat was that the United States might be
s willing to cooperate on communications intelligence matters if this were
n°l done.
While use of the polygraph appears to have a strong deterrent effect, and
in many cases induces the revelation of information that was otherwise
concealed, its overall accuracy remains controversial.21 Aside from the
question of the frequency with which innocent subjects fail the test and are
unfairly rejected for employment or forced to resign as a result, foreign
intelligence services apparently have developed methods for beating i t 22
Physical Security
Physical security refers to the steps taken to prevent foreign intelligence
agents from gaining physical access to classified information. It deals with
such matters as the strength of safes in which classified information is kept
and alarm systems to detect any unauthorized intrusion into the areas in
which officials deal with classified information. For the most part, the re
quirements of physical security are not arcane and differ only in degree, if
at all, from those a commercial establishment might take to prevent thefts of
merchandise or equipment.
One major difference, however, is that physical security seeks to safe
guard not only the material objects, such as documents, that contain infor
mation but also the information itself. This requires much stricter controls
on access to the relevant areas, since an intruder can quickly and unobtru
sively implant a bugging device that would give a hostile intelligence service
access to what was being said within the classified work area. Therefore, d
is important to control what is taken into the area as well as what is removed.
Similarly, it is important to have some means of “ sweeping” an area to
detect any bugging devices so they can be removed. This in turn leads to the
development of less-detectable systems for monitoring conversations. The
high level of technical sophistication to which this spiral can lead has come
ublic attention, most recently, with the problems concerning the new
t0 the United States is constructing to serve as the chancery (office
holding) for its Moscow embassy.
bUTlie building is constructed with precast concrete columns and beams the
viets manufactured without any U.S. surveillance. The Soviets took ad
vantage of this to design a bugging system that could use the entire structure
as an antenna for picking up signals and relaying them. The system appears
to be quite sophisticated, and the United States has had difficulty under
standing how it was intended to work. As former Defense Secretary James
Schlesinger testified in 1987,
In past years, the Soviets were sufficiently behind us that we were able to
detect penetrations, and neutralize them. . . . We now face a rising curve
of Soviet technology, with no gap between what the Soviets can do and
what we can do; indeed, in some areas they have been ahead of us. . . .
Counterespionage
The security measures discussed above are passive, since they do not go
after the hostile intelligence threat directly but seek to deny it access to
information. More active measures that try to understand how a hostile
intelligence service works to frustrate or disrupt its activities and ultimately
to turn those activities to one’s own advantage are usually referred to as
4Counterespionage. ’’
Surveillance Operations
An obvious way to learn about the activities of a hostile intelligence service
ls to mount surveillance operations (keep under constant observation)
against its officers wherever they operate. Such surveillance tries to deter-
minc where the officers go and with whom they communicate or are in
c°ntact; these contacts can then be used as leads for further investigation,
hile simple in concept, this is in practice a complex task. The officer’s
ec**aft, which was discussed earlier in connection with human intelli-
N0 ^ CO**ect*on’ ls devoted primarily to frustrating this sort of operation.
0n,y will the officer be trained in evading surveillance, but techniques
as brush passes and dead drops may be used to conceal the identity of
lance is observed, it may prompt the officer to cancel any planned meetin
to avoid endangering his contact. Thus, it is important to hide the surveil
lance. To do this is difficult and requires a great deal of manpower, since an
officer trained in countersurveillance techniques will notice if the same
person is trailing him for any length of time.
Because this sort of surveillance is cumbersome and expensive, it js
important to target it on actual intelligence officers. One place to look, of
course, is at the kinds of official cover positions available to the hostile
intelligence service: diplomats, consular officials, trade representatives
journalists (for government-owned media), and employees of international
organizations such as the U .N ., when the employees are selected by their
own governments. The problem is to determine which individuals holding
these sorts of positions are really intelligence officers and which are what
they appear to be.
This problem can be attacked in several ways. In general, the more
knowledge an agent has about the operation of, for example, a given foreign
embassy, the more likely he can tell which officials seem engaged in actual
diplomatic or consular activity. If an official does not seem to be engaged in
such activity, he may be involved in intelligence wrork instead.
Similarly, it may be possible, by observing patterns of rotation and re
placement of personnel, to determine who is replacing whom; if X has been
identified as an intelligence officer, X’s replacement is likely to be one as
well. Also, the same techniques used to collect intelligence in general may
be targeted on the hostile intelligence service and its presence in the agent’s
own country. The more an agent learns about that service and the way it
operates, the more effectively surveillance can be targeted. Finally, using
double agents, as discussed later in this chapter, may enable him to deter
mine the identities of hostile intelligence officers.
Intelligence Collection
The most direct way to achieve counterespionage’s goals is to collect intel
ligence directly from the hostile service, either by human or technical means.
(To distinguish this type of intelligence collection from the methods peculiar
to counterintelligence, it may be referred to as “ positive” foreign intelli
gence.) Thus, the recruitment of a KGB official who was involved in all
espionage operations against the United States could solve the major U.S.
counterintelligence problem immediately. In this respect, counterintelli
gence would not differ much from intelligence collection in general; its
^governm ental leadership, arraeu 1U1L&dj V/l Vmvi ----
pefectors
As with other types of humint collection targeted on a closed society like the
Soviet Union, recruiting and running an agent within the KGB or GRU
(military intelligence) is extremely difficult. Thus, the United States and
other Western countries have relied heavily on defectors from Soviet intel
ligence services for counterespionage information. The most prominent re
cent example was Vitaliy Yurchenko, the deputy chief of the KGB
department responsible for espionage against the United States and Canada.
After defecting in the summer of 1985, he provided information about
Soviet espionage successes against the United States. For example, although
he did not know their real names, the personal and operational details he
provided led to the arrest of Ronald Pelton, a former employee of the
National Security Agency, and the surveillance of Edward Lee Howard, a
former CIA employee.25
Double-Agent Operations
The other major method of conducting counterespionage is through double
agents. They are agents who, while pretending to spy for a hostile service,
are actually under the control of the country on which they are supposed to
be spying. Such agents may have originally been real spies who, upon being
detected, were 4‘turned,” or converted, into agents of the country on which
they were spying. Or they may be agents who pretended to volunteer to spy
tor the hostile intelligence service but who in fact remained loyal to their
country ( “ dangles” ). In between would be those who, having been ap
proached by a hostile intelligence service, report the recruitment attempt to
their own country’s authorities and are encouraged by them to play along.
These three double-agent operations all serve the same counterintelli
gence purposes. At the simplest level, they allow the counterintelligence
organization to penetrate the adversary’s cover mechanisms and identify
°fficers of the hostile intelligence service engaged in running agents. As a
rej>ult surveillance can be concentrated on the actual intelligence officers,
ho/ C ,*ess atten*i°n need be paid to the other officials who, although they
have the same cover status, really are diplomats, trade officials, and so on.
- — ~ .V. UVM kW U, »V W W J « » V *■* ’ * * * '" "
On August 12, 1987, the Washington Post reported that a defector from the
Cuban foreign intelligence service, the DGI, had told CIA debriefers that
•‘an undetermined number of Cuban government officials, once believed by
the United States to be secretly working for the CIA, were feeding the
agency misleading or useless information prepared by the Cuban
DGI. • • -” 31 Following this revelation. Cuban media published detailed
accounts of the operations of many of these double agents, including pho
tographs of them engaged in supposedly clandestine activities. That their
activities were known to the Cubans in such great detail tends to confirm
they were double agents for part, if not all, of the time they were purportedly
spying on Cuba. According to Cuban sources, some of the agents, appar
ently aware that the United States now knew their true allegiance, sent
farewell messages to their U.S. handlers.
Without a careful analysis of the information provided by these double
agents, it cannot be determined whether Cuba was attempting systematically
to mislead the United States to take steps contrary to its interests. Even
without such an ambitious plan, the operation would have paid its way from
the Cuban point of view by absorbing large amounts of CIA time and effort
that otherwise might have obtained useful information; by revealing CIA
operational methods, thereby helping to counter its real agents, if any; and
y feeding U.S. intelligence analysis random pieces of information and
misinformation that confused it and prevented it from forming any coherent
Picture of events in Cuba.
Multidisciplinary Counterintelligence
(MDCI)
What Is MDCI?
Just
Ver as t^e hostile intelligence threat posed by a technically up-to-date ad-
™ Is not limited to human intelligence collection, so active counterin-
lemgence cannoi oe umiiea to counterespionage. is.amci, u must taice int0
account the full range of the adversary’s technical intelligence collecti0n
capabilities, including overhead photographic reconnaissance and coirtrnu
nications and signals intelligence.
Thus, the first task of MDCI is to assess the effectiveness of the adver
sary’s technical intelligence collection capabilities. This knowledge, in turn
indicates where one’s own information, communications, or activities are
vulnerable and how best to protect them. The actual measures that can be
taken may be labeled “ security” or “ technical countermeasures” and vary
from technology to technology. The multidisciplinary perspective, however
is important because it encourages one to look at the problem from the
adversary’s point of view.
Communications Security
Just as the interception of messages, both those in written and, more re
cently, electronic form, is a major method of collecting intelligence, so
protecting the contents of messages has long been a major counterintelli
gence task. In the twentieth century, this has focused on protecting elec
tronic telecommunications transmitted either by wire or radio.
Messages transmitted by wire can be safeguarded by preventing the line
from being tapped (reading the message either by drawing a small amount
of current from the line or by sensing the fluctuations of the magnetic field
around the line caused by the current flowing through it). Radio signals, on
the other hand, cannot be protected; any receiver within range can pick them
up. Some signals, such as microwave transmissions (which are used to carry
long-distance telephone calls, among other things), are highly directional
(not dispersed in all directions but concentrated in a beam pointed at the
intended receiver), but even they can be intercepted if a receiver is properly
placed in line-of-sight contact with the emitter.
The contents of radio messages have been protected primarily through
encryption. Written messages can be encrypted in the ordinary fashion
before transmission. For voice messages, “ secure phones,” or “ scram
blers,” are used; they distort the voice signals in a complex manner. Anyone
intercepting such a signal receives a meaningless jumble of sounds analo
gous to the jumble of letters of a ciphertext. Restoring the original voice
message is comparably difficult.
Very secure scrambling devices are expensive. Few are available within
the U.S. government and the defense industry, and they are used only to
discuss classified information. Outside the government, they arc practica >
nonexistent. Thus, most long-distance telephone communication, vvhic
I l'-'* '
able to interception.
In the mid-1980s, in the United States, this situation came to the public’s
attention because of the controversy surrounding the location of the new
Soviet Embassy in Washington. Built in the Mount Alto neighborhood
several hundred feet above downtown Washington, the Soviet buildings
look out over the downtown and northern Virginia areas, including the
White House, State Department, Pentagon, and most other government
buildings. From this and other official Soviet buildings in the United States
(consulates and trade representatives in New York, Washington, and San
Francisco; the U.N. mission in New York; and residential and recreational
facilities in New York City, on Long Island, New York, and on Maryland’s
Eastern Shore), Soviet intelligence can intercept large volumes of long
distance telephone calls.
In addition to government officials using ordinary nonsecure phones,
targets probably include high-technology corporations, commodity traders
dealing in products the Soviets buy or sell in large amounts (grain, oil, and
gold), and financial institutions. The Soviets also may target individuals
with access to classified information to try to learn compromising personal
details that can be used to blackmail them.
Various countermeasures have been suggested to reduce this vulnerabil
ity. For example, one could redesign the microwave network to eliminate
those links passing near the Soviet intercept facilities and replace them with
underground cables. Alternatively, one could encrypt all signals transmitted
by microwave by scrambling the signal when it first goes on the air and
decrypting it when it has finished the microwave portion of its journey. Both
solutions have some technical weaknesses and would be expensive to im
plement. In the future, the situation may be eased by the widespread use of
fiber-optic transmission, which is being adopted by communications com
panies for economic reasons. Fiber-optic cables are virtually untappable
and, because of their great capacity (ability to transmit many signals simul
taneously), tend to be cheaper than conventional copper cables or terrestrial
microwave.
Emanations Security
piece ot electrical equipment radiates electromagnetic waves; by inter-
lng these w av« it u- nnrriKia the characteristics of
waves, called “ em-
someone could reconstruct the text of a document being typed on
can be guarded against, for example, by shielding the electrical equipment
to reduce the intensity of the emanations, making them harder to intercept
What Is Deception?
Deception is the attempt to mislead an adversary’s intelligence analysis
concerning the political, military, or economic situation he faces and to
induce him, on the basis of those errors, to act in a way that advances one s
own interests rather than his. It is considered a form of counterintelligence
because it attempts to thwart a major purpose of the adversary’s intelligence
operations; in addition, it often involves counterintelligence methods, sue
as double-agent operations.
' ful deception implies me orner siue s lnieingence ianure. m e re-
SÜCCe of course, need not be true; a side may make important mistakes in
verse’ Agence analysis even without any deception by the other side. Nev-
ilS 1 1 ss it is often possible, in cases of intelligence failure, to identify
eftl effort at deception by the other side. To what extent that effort is
s0rn^nsible for the failure is a more complicated question.
^Deception can be attempted in wartime or in time of peace, although one
would expect deception to be much more common in wartime. Deception
rin^es from tactical to strategic. Any battle that begins with a feint in one
seemr while the main weight of the attack falls on another, exemplifies
tactical deception. Examples of strategic deception are less common but
often very important, such as the Allies’ World War II deception operation
that misled the Germans about the location of the Normandy D-Day
landings.
Peacetime deception operations are not common, tend to be less well
known, and are sometimes hard to identify as such. Among the more spec
tacular was one known as the “ Trust,” a Soviet organization that pretended
to be hostile to the new Communist regime but which was in fact established
and run from 1921 to 1927 by the forerunner of the current Soviet KGB, the
Cheka.32 Using this fake opposition group, the Soviets made contact with
anti-Communist émigré organizations and Western intelligence services,
thereby channeling and neutralizing any hostile activities they might under
take; induced potential opponents within the Soviet Union to make contact
with it, thereby allowing the Cheka to learn their identities; and dissemi
nated abroad false information about the internal state of the Soviet Union.33
During the 1950s and early 1960s, the Soviet Union engaged in deception
operations to convince the United States that the USSR possessed larger of
fensive strategic nuclear forces than it in fact did. At a ceremonial flyover in
July 1955, for example, the Soviets “ displayed” twenty-eight Bison (Mya-4)
bombers— probably more than they had in their entire inventory— by having
the first group of planes circle around out of view of the spectators (including
the U.S. air attaché) and return for a second pass.34 Similarly, in the late
1950s, Soviet leaders, drawing on the prestige derived from the initial suc-
cesses ot their space program, made a series of exaggerated claims concerning
e Soviet ICBM program.35 In this way, the Soviets contributed to the
°mber gap and missile gap fears in the United States (that held that the So-
'jlets were about to surpass the United States in these measures of strategic
Yy ear caPability). The Soviet deception appeared aimed at inducing the
Be^r t0 ma^e P°Iitical concessions— such as concerning the status of
ln —that it would otherwise be insufficiently motivated to make.36
* - * •■'“Vo
adversary to react to it. In wartime, for example, one might wish to launch
a surprise attack on the enemy, in which case the deception would be
devoted to convincing him that no attack is on the way. Sometimes, as in the
case of the Normandy D-Day landings, the enemy fully expects to be at
tacked, and it is unlikely one could convince him otherwise. In such a case
the deception is to convince him that the attack is coming at a time, in a
place, and/or in a manner other than what the actual plans call for.
In time of peace, on the other hand, it is less obvious what goal the
deception should pursue. One might wish to convince an adversary that one
is stronger than one really is to induce him to make political concessions that
he would not otherwise feel compelled to make. Alternatively, one might
wish to conceal one’s actual military strength to lull one’s adversary into
complacency and not provoke him into increasing his own military forces.
If one’s forces are limited by an arms control treaty, one could have the goal
of concealing a treaty violation, thereby leading the other party to continue
to limit his own forces.
Feedback
Counterdeception
Experience shows that defeating every attempt an adversary might make at
deception is very difficult. Even as they were running Double-Cross, the
British were being similarly tricked by the Germans with respect to their
intelligence and guerrilla-type operations in the Netherlands. Starting in the
late summer of 1941, with the arrest of a Dutch intelligence agent working
for MI6 (the British foreign intelligence agency), the Germans managed to
catch all subsequent British agents sent to the Netherlands by the Special
Operations Executive (SOE, whose mission included sabotage and support
for anti-German resistance groups).
Having broken the cipher system used by these agents, the Germans
continued to send messages to Britain that purported to come from the
agents, who had in fact been arrested. Some arrested agents cooperated in
preparing and transmitting the messages; in other cases, German radio op
erators impersonated them. Among other things, these messages made the
arrangements for additional airdrops of agents and supplies, which were in
turn captured immediately. The operation, which the Germans called Nord-
pol (North Pole) and Englandspiel (the match against England), continued
until two of the captured agents escaped from the camp in which they were
being held. At this point, concluding that the game would be given away in
any case, the German military counterintelligence officer in charge of the
operation chose to end it with a plaintext message to London on, appropri
ately enough, April 1 (1944).39
One incident from this operation shows how strong the psychological
resistance is to the idea that one is being deceived. When British agents in
Holland enciphered their messages for transmission back to London, they
Were supposed to include a security check— a specified deviation (which
w°uld appear as a simple, random error) from the cipher system that would
reate to those receiving the message that they really were who they were
supposed to be and that they were operating freely and not under German
oinpulsion. An agent might be instructed to make a “ mistake” in the
in C ^ctter ° f each outgoing message. If the Germans obtained the cipher-
s>stem but did not understand the principle of the security check, any
o- — j ---- -- ------- imtw *v r»uuiu nui humain the
required error.
In this particular incident, the Germans used their own radio operator to
transmit messages in the cipher system they obtained from a captured British
agent. Since a radio operator can often be identified by the manner in which
he hammers out the dots and dashes of Morse code (his “ handwriting” ) the
first message explained that a new operator had been recruited in Holland
because the original agent had sprained his wrist. This message contained no
security check at all and should have been recognized as bogus by SOE
headquarters in London; this was, after all, the very situation for which the
security checks had been devised. Instead, the staff officer in London
disturbed by the failure to follow proper procedure and seemingly oblivious
of the reason the procedure had been instituted, replied with an order to
“ instruct [the new radio operator] in the use of his security check.” 40
In any case, understanding deception is the first step toward figuring out
how to avoid being deceived; by understanding the factors that facilitate
deception, one can at least be alert to the possibility of deception and
recognize some warning signs. One is particularly vulnerable to deception
when one is dependent on a small number of channels of information and
when the adversary is aware, at least in general terms, of the nature of these
channels and their mode of operation.
For example, a heavy dependence on photographic reconnaissance satel
lites, whose identities and orbits most likely will become known to those
whom they are photographing, may make one vulnerable to being deceived.
The adversary, knowing when his facilities can be photographed, may make
sure certain things are not seen: the items may be moved into garages or
sheds or covered with camouflage or tarpaulins whenever a photographic
reconnaissance satellite passes overhead. Similarly, the adversary knows
when to display dummy equipment to increase the chance of its being
noticed and mistaken for the real thing.
The situation is obviously worse (from the point of the potential deception
victim) if the adversary can find out ahead of time not only which sites can
be photographed but which will be photographed. Similarly, it is also worse
if the adversary knows the satellite’s precise capabilities. If he knows the
satellite’s ground resolution distance (roughly speaking, the smallest object
the satellite can detect), for instance, he knows how similar to the real thing
the fake pieces of equipment have to be to appear identical to the satellite.
For this reason, it was an important intelligence coup for the Soviets to
obtain the manual for the U.S. KH-11 photographic reconnaissance satellite.
They bought it for a mere $3,000 from William Kampiles, after he resigne
his position as a junior CIA officer in November 1977.41 It is also for this
t h a t S & t £ l l U C p i i u i u a VW H IC H i i i i g i n m u ic a ic tiic wx u u a u u ic
reason
,ellite detects) are classified.
Sa'n ce one understands the risk of being deceived that comes from heavy
on a single known channel, one decides what to do about it. The
rcl corrective is to maximize what might be called “ unexpected
E lection ’’__taking photographs at times and places the adversary does not
C ticipate. Given the predictability of orbits, this is hard to do in the case of
Stellite reconnaissance; along the borders or coasts of the adversary’s ter-
litory where aerial photography is possible, this is easier to achieve.
Nevertheless, certain steps are possible even with respect to satellites.
Although the adversary may be able to determine (by studying its orbit, for
example) which satellites conduct photographic reconnaissance, it takes him
some time to do this and to warn his military facilities accordingly. During
the satellite’s first few hours of flight, it is likely that the pictures it takes are
unexpected. Hence, it makes sense to consider carefully which facilities
should be photographed on a satellite’s first few orbits. Similarly, thought
could be given to ways to prolong the period of unexpected collection,
perhaps by varying the launch and orbit characteristics of the satellites, so
that it takes the adversary more time to determine their function.42 Finally,
if it were feasible to have several photographic satellites in orbit at the same
time (including, if possible, dummies the adversary could not easily distin
guish from operating satellites), the adversary might find it impossible to
protect sensitive military equipment and operations against all of them with
out impeding his activities to an unacceptable degree.
Conversely, many proponents of signals intelligence (and, in particular,
communications intelligence) argue that they prefer it to other types of
intelligence collection because several factors ensure the reliability of the
information it collects. Comint may be collected in vast quantities, which
implies that the true signals are more likely to get through. By the same token,
it would take a larger effort to deceive comint by means of a fake radio
network (which would still require the use of real resources and personnel
10 create the signals) than that involved in displaying dummies or turning an
agent and running him as a double.43
Even more important is the fact that the adversary will ordinarily be
unable to tell which of his many communications channels others may be
reading; he may well transmit fake messages that are never intercepted,
1e some of the real ones are. However, even this is not foolproof: via
q ° naSe or some technical means an adversary may learn on which fre-
co CleS ° r cornmunicahons lines others are eavesdropping. If so, these
^ unication channels might be used in a deception effort.
im plicated situation of this sort, which illustrates the difficulty of
- - 4 ----- A11C united
States and Britain dug a tunnel from the American into the Soviet гопе
Berlin to tap a set of telephone and telegraph cables that linked the Sov‘°
Air Force headquarters at Karlshorst with the city. The tunnel was b n*
jointly by MI6 and the CIA. Unfortunately, George Blake, a senior Ml6
officer in Berlin, was a Soviet spy. (He was finally tracked down arrect^
and convicted in 1961.)
Blake presumably told the Soviets about the tunnel as soon as he learned
about it. Even if he were not directly involved in the tunnel project, the
operation was so large and complicated that it is hard to believe that any alert
British or American intelligence officer in Berlin would not have quickly
picked up some idea of what was being done. Thus, one can assume the
Soviets learned promptly of the tunnel’s existence and purpose.
However, the Soviet telegraphic communications being transmitted on the
tapped lines were encrypted. According to John Ranelagh, whose history of
the CIA seems to have benefited from a considerable amount of information
from its former officers, the real secret of the affair was the existence of a
technique that enabled the CIA to recover the clear text of the encrypted
messages.44 This technique was not shared with the British; hence Blake
should not have been able to betray it. Thus, even knowing of the tap, the
Soviets might have continued to use the telegraph line for sensitive messages
in the belief that their encryption rendered them secure.
On the other hand, the British shared in the intelligence collected from the
Berlin tunnel operation. According to Ranelagh, “ The British were to carry
out the analysis of half the material” produced by the intercept.45 If so, then
it should have become evident that the United States had some method of
decrypting the intercepted messages; if Blake were aware of this, the Soviets
would have learned that the tunnel posed a real threat to them.
The tunnel operation ended April 21, 1956, about a year after the first
message w'as intercepted, when it was ostensibly discovered by Soviets in
the course of repairing one of the tapped cables that had been damaged by
heavy rainfall. At the time, the CIA, not knowing of the existence of a
Soviet spy in the MI6 Berlin office, regarded the Soviet discovery as acci
dental. In retrospect, of course, one would have to consider the possibility
that the Soviets contrived to make the discovery appear so to protect Blake.
The interesting question is to what extent the “ take” from the operation
should be regarded as potentially deceptive. On the one hand, it seems like }
that the Soviets, via Blake, would have learned about the operation quickly«
that they let it go on so long suggests that they were using it to deceive
United States and Britain. On the other hand, one would have to look at t
actual information the operation produced; if it were very valuable then
t>eC° e iagj1 claims that the first indications that the Soviets had an agent in
in Berlin were acquired by the tunnel operation46). The intelligence
would have to be studied as a function of time to determine if the
ta*ce hprame aware of the operation before their ostensibly accidental
Sovi et s O , 4 7
discovery of it and, if so, when.
G any case, even without knowing that the adversary is listening to a
rticuiar communications link, a deception operation could create an entire
0f radio transmitters whose sole purpose is to send messages the adver
sary might intercept; if the net is big enough, the adversary is bound to
tumble across it. This would be an expensive and elaborate measure, and
it is perhaps feasible only in wartime. In wartime, however, it is clearly
ossible: before the D-Day landings, the United States and Britain created
such a radio net to help deceive the Germans into believing that there existed
a large First U.S. Army Group, based in southeastern England, that was
poised to conduct the invasion against the Calais area. In fact, the Army
Group contained very few real soldiers; most of its divisions and other
components existed only on paper and in the radio chatter among the station
operators of the false network.
This was a key part of the D-Day deception operation; it not only sup
ported the prelanding deception, but it also helped prevent the Germans
from moving reserves into Normandy in the crucial days following the
landings there. It allowed the Germans to interpret the Normandy action as
a diversion, a means of distracting their attention from the invasion that was
to come. According to a study of deception in World War II,
The networks which were set up to carry the fake radio traffic were
extensive and complicated. At the peak there were 22 fake formations
li e., the supposed headquarters of the army group and its constituent
armies and divisions]. . . .
fhere is little doubt that the simulated radio traffic, most of which was
carried on within a very short distance of the enemy and was therefore
easy to monitor, was— after the contribution of the double agents— the
most important factor in the overall deception.48
i he same factors help one determine the risk of being deceived by humint
cction capabilities. In particular, if one’s human intelligence collection
capabilities depend heavily on defectors, it increases one’s vulnerability to
the111^ ^ece*vec*- First, unlike the case in which one has an agent in place,
e adversary knows the defector’s identity. He can determine, more or less,
a form ation he had access to. Although he cannot prevent the defector
deception plan he develops. In this respect, information that comes frorri ^
defector is similar to “ expected collection.”
Second, the adversary can relatively easily plant a defector with fa]s
(deceptive) information designed to mislead one. If one relies heavily 0C
defectors, the adversary may provide several of them, whose reports al
though false, will nevertheless support each other. Suspicions that the Soviet
Union may have done just that to the United States, starting in the earl
1960s, led to some of the most severe internal conflicts in the history of the
CIA between those who took this possibility seriously and those who found
it overblown. The latter group finally triumphed when the CIA’s counter
intelligence chief, James Angleton, the major proponent of the former view
was fired by DCI William Colby in December 1974.49
Counterintelligence Analysis
As the discussion of double agents and deception indicates, protecting the
integrity of one’s own intelligence operations can become very complicated,
involving much more than catching the occasional spy. In fact, cases may
be linked to each other in various ways; the overall task of guarding one’s
own intelligence apparatus against penetration and deception requires a
special office dedicated to counterintelligence analysis to serve as an insti
tutional memory and to analyze these connections.
The best way to determine whether one’s own intelligence apparatus has
been penetrated is to acquire a high-level source in the hostile service (either
an agent in place or a defector). Even in this best case, however, it would
be a rare stroke of luck if the source could identify by name the spies in
one’s ranks. This would be the case only if the source were directly involved
in handling them or were a very high-ranking officer of the hostile service.
In the much more likely scenario, one’s source will be able to provide only
clues to the spies’ identities. Analytic work will be necessary to make those
clues yield results.
For example, one may discover that the adversary has had access to
several classified documents on a subject. Assuming they all came from the
same agent, one could review the distribution lists for the compromised
documents and note which officials had access to all of them. Alternatively,
the source may know that the spy held a meeting with his handler in a certain
foreign city on a specific date. Reviewing travel records would indicate
which officials with access to relevant information were in that city them
In addition, other clues may be available that suggest penetrations o
some sort. Thus, if one’s operation fails (an agent is discovered or
teeing—
was aware of the operation before it took place, it is necessary to investigate
how he may have learned of it. There will no doubt be many avenues
(individuals with access to the information as well as security vulnerabilities
or lapses) by which the information could have reached the adversary If
there is a series of such failures, however, it may be possible to narrow the
options; for example, maybe only one particular individual had authorized
access to all of them. In any event, such a series should alert an intelligence
service to the possibility that its adversary has effective human or technical
intelligence collection capabilities that must be discovered and neutralized.
U
GUARDING THE
GUARDIANS
THE MANAGEMENT OF
INTELLIGENCE
131
CC IT din i n K / i l l ^ C I l C L üU U IC C 5 f IIJU U IU U J, ci ii vj u c u v m v /o u v /m m c DLlKI*
and restricted to the smallest possible number of officials within the goyC
emment. This secrecy hinders the management and control mechanisms th
are common elsewhere in the government.
In principle, of course, control of government activities is organized in
hierarchical fashion, so that every official is ultimately responsible, throu h
a chain of command, to the head of the government. Thus, the minimum
condition for control is that each superior have the right to know all the
information to which his subordinates have access. In general, this condition
is probably met, although the notion of plausible denial raises some impor
tant questions in this regard.
Having theoretical access to information about an activity is not, however
the same as knowing enough to control it effectively. In other areas of gov
ernmental activity, the direct top-down control exercised by superiors is sup
plemented by other mechanisms, both formal and informal: examinations by
auditors or inspectors general, challenges and complaints by competing parts
of the bureaucracy, investigations by law enforcement agencies, legislative
oversight, press coverage, and complaints or other feedback from the public.
Applying these mechanisms to intelligence activities would require
spreading knowledge about them beyond the narrowest possible circle of
officials whose need to know derives from their actual involvement in them.
How far the knowledge is spread depends on the mechanisms, since one
may involve informing only a few additional executive branch officials;
another, members of the legislature and their staffs; and a third, the public
at large. In each case, a balance must be struck between the danger of
widening the circle of those with access to the information and the benefit
derived from the increased capability of the intelligence agencies’ political
superiors to control their work.
Plausible Denial
Because these control mechanisms all involve more dissemination of infor
mation, one could say, in general, that a tension exists between secrecy and
effective control. With intelligence activities, however, achieving effective
control may be complicated by the doctrine of plausible denial, which
suggests that even fundamental top-down control by superiors may be placed
in doubt. According to this doctrine, intelligence activities that might cause
embarrassment (because they violate international law or for some other
reason) should be planned and executed in a way that allows the head o
government plausibly to deny that he had anything to do with them or even
^ ^ c o v e r t action, although it is also applicable to otner intelligence auiv-
° uch as espionage or aerial photographic reconnaissance violating the
itics •
ggt’s airspace.
This doctrine of plausible denial can complicate the control of intelligence
• 'ties to which it is applied. To be effective, it requires not only that
aC ledae of the activity be restricted to the smallest possible number of
Officials but also that there be no formal procedure by which it is approved
° d no paperwork in which the approval is recorded. The activity itself
a Id be conducted with a minimal amount of record keeping, and any tiles
created in the course of carrying it out would probably be destroyed once the
activity is completed. Obviously, this creates the conditions for misunder
standings and uncertainty as to whether a specific action was authorized. In
particular, without a written record (or paper trail), it could easily prove
impossible to determine whether an activity had been approved by the head
of government or other senior nonintelligence officials.
All this does not mean that intelligence agencies in general, or any one in
particular, is, in the phrase attributed to Senator Church, a “ rogue ele
phant.“ It suggests, however, that, other things being equal, an intelligence
agency may more easily “jump the rails” than other governmental organi
zations. Against this inference, on the other hand, one should note that
intelligence agencies investigate the character of a potential employee more
carefully than other government offices and that the opportunity for illicit
personal enrichment in an intelligence agency is less than in many other
government offices that deal with economic statistics or regulation or that
conduct business on behalf of the government by, for example, awarding
contracts or leasing government lands for private exploitation.
Although Senator Church, chairman of the Senate committee formed in
1975 to investigate the intelligence agencies, used the term “ rogue ele
phant ’ early in the investigation to describe the CIA, that characterization
was generally abandoned by the time the investigation was completed. In the
^lew Loch Johnson, a Church Committee staffer sympathetic to Senator
Urch, the chairman’s use of the term “ derived from a sense that the
evidence needed to be dramatized to have an effect upon the public,” and
,e ^na* report of the committee “ carefully steered clear of the ‘rogue
elePhant’ theory.” 1
sinai ma^0r actions the committee criticized, the attempts to assas-
ate Fidel Castro raised the most important questions about the agency
vol ra^s> According to the committee’s report on the CIA’s in-
Vement in assassination plots,
........... .............. — ^Uiu Con
elude that Presidents Eisenhower, Kennedy, or Johnson, their close ad
visors, or the Special Group [the interagency group that reviewed cov
action proposals] authorized the assassination of Castro.2
The criminal standard inhibits the penetration of support groups since they
typically present themselves to the public as political or charitable groups.
One group may describe itself as being engaged in political propaganda in
favor of various causes, which just happen to be the same as those espoused
by the terrorist group. Similarly, another will characterize its activity as the
charitable support of the wives and children of alleged terrorists who have
been imprisoned or killed. A third group may claim to limit its activities to
providing lawyers and funds for the accused terrorists’ legal defense.
Without getting an informer into the support group, it may not be possible
to establish the exact nature of the group’s additional (and not so innocent)
efforts on behalf of the terrorist group. But the use of this or other intrusive
techniques is permitted only if evidence is already available that the group
is involved in violent, criminal activities.46 In this respect, the criminal
standard is something of a catch-22: one cannot know about the support
group’s additional activities because one may not look, and one may not
look as long as one does not know.
A second way of overcoming the difficulty of conducting surveillance
against terrorist groups relies on the fact that terrorist groups are typically
offshoots of politically extremist, nationalist, or separatist groups; they are
usually composed of members of such groups who become frustrated with
the failure of less violent means to accomplish the groups’ goals. By having
informers in the groups from which terrorist groups are likely to form, one
would know about a terrorist group as soon as it formed. Having agents in
the original group would increase the possibility that a penetration agent
could be placed in the terrorist group from its beginning. A criminal stan
dard, on the other hand, makes it impossible to maintain the initial surveil
lance that could provide the first indication of a new terrorist group.
A particular circumstance that comes under the rubric of counterterrorism
involves the responsibility of the U.S. Secret Service to protect the presi
dent, other senior government officials, and foreign dignitaries. As with
counterterrorism in general, the goal here is to prevent the criminal act from
taking place, rather than to react to it by punishing the perpetrator to deter
Ure attacks. The Secret Service’s responsibility requires advance intelli-
£ nce on assassination attempts against its protectees. A criminal standard
investigating groups that might engage in assassination may mean the
Cret Service does not receive warnings about assassination attempts until
er the group has engaged in illegal violence, which might be too late.
Ill 1 ^ 0 Z., H I C 1 IC ilM iiy U C JJdl llU U ii u i u t m i it^ p u iio iu iv iv i u iv o w tici
There are other similar examples of the use of the FBI against political
opponents in Congress, the media, or elsewhere.
In many other cases, investigations were directed against activist political
groups targeted under vague labels, such as
In these cases, while there might have been some nexus between the
organization being investigated and potential violence or links to foreign
intelligence services, clearly the investigations were indeed overbroad in
forms of the individuals and groups involved, the extraneous information
collected about them, and the time unpromising investigations were allowed
t0 continue. The extraneous information that was collected was not only
retained in investigatory files, but freely disseminated within the govem-
^ Us’ *nf°rmation about legitimate political activities was made avail-
a o for the administration’s partisan political use.50
rom the history' the Church Committee compiled, it seems clear that
excesses were facilitated by the absence of clear standards for domestic
intelligence investigations. Thus, it is easy to see how a criminal standard
would be an attractive, clear-cut option. If that limitation is too narrow, then
one must search for a broader one that still would protect against the sorts
of abuses that have occurred.
This task cannot be accomplished quickly. To approach it in a responsible
manner, one would have to start by considering what domestic political or
other activities a democratic government legitimately needs to know about
to protect against threats to the country. In the United States, the legislation
executive orders, and guidelines dealing with domestic intelligence have
been cast in terms of the conditions that must be met before various inves
tigative techniques may be employed. There is, on the other hand, no formal
statement of what the purpose of domestic intelligence is, or of what type of
information it is supposed to provide. Such a statement would have to be
elaborated before one could develop guidelines that focus on the goal (what
information is necessary) rather than on the means (which investigative
technique may be used).
By contrast, Canadian law defines the threats with which the domestic
intelligence agency, the Canadian Security Intelligence Service (CSIS),
should be concerned. The CSIS is authorized to collect information regard
ing activities “ that may on reasonable grounds be suspected of constituting
threats to the security of Canada.” These are defined as:
159
enemy whenever they move and their achievements surpass those of
ordinary men is foreknowledge.
Research is the only process which we of the liberal tradition are willing
to admit is capable of giving us the truth, or a closer approximation to
truth, than we now enjoy. . . . we insist, and have insisted for genera
tions, that truth is to be approached, if not attained, through research
guided by a systematic method. In the social sciences which very largely
constitute the subject matter of strategic intelligence, there is such a
method. It is much like the method of physical sciences. It is not the same
method but it is a method none the less.9
In other cases, the bit of information most important for a nation to have
cannot be considered a secret because, when the information is most needed,
it does not even yet exist. Sherman Kent gives as an example of this the
intelligence problem the Soviet Union faced when it sought to determine
whether the United States would resist the 1950 North Korean invasion of
the South. Had Soviet agents been looking in U.S. files for documents
containing the U.S. decision whether to fight, they could not have found
any, since the decision was made by President Truman only after the inva
sion began: “ Thus, if knowledge of the other man’s intentions is to be
divined through the reading of his intimate papers and one’s own policy is
to be set on the basis of what one discovers, here is a case where policy was
on the rocks almost by definition.” 14 Instead, Kent argues that such infor
mation can only be had through research and analysis:
I have urged that if you have knowledge of Great Frusina’s [Kent’s
hypothetical great power] strategic stature [Kent’s term for the totality of
a nation’s capabilities— military, political and economic— to act on the
international scene], knowledge of her specific vulnerabilities, and how
she may view these, and knowledge of the stature and vulnerabilities of
other states party to the situation, you are in a fair way to be able to
predict her probable courses o f action.
To strengthen the reliability of your prediction you should possess two
additional packages of knowledge. First, you should know about the
courses of action which Great Frusina has followed in the past. •
Second: you should know, as closely as such things may be known, how
Great Frusinans are estimating their own stature in the situation.
There can be no doubt that such information, and the thought processes
that lead to it, is a vital part of strategic thinking in general and high-level
foreign policy-making in particular. No policies can be adopted or imple
mented without some view of the potential actions of other countries. Nev
ertheless, it is not clear why it should be considered “ intelligence” and why
it should be located in the intelligence agencies. This issue, which involves
important questions concerning the relationship between intelligence and the
policymakers it serves, has already been discussed in the previous chapter.
For present purposes, it is sufficient to observe two connected conse
quences of this view of intelligence, which emphasizes the centrality of
analysis. The first consequence is that a good deal of the thinking that goes
into policy analysis can be, and ought to be, carried out within the intelli
gence agencies themselves. In intelligence agencies this work can then be
done according to some kind of scientific method. In other words, the social
sciences can, or should be able to, provide methods of approaching these
problems that deserve some of the respect and authority routinely granted to
science. As a result, in this view, a superior wisdom may be attributed to
intelligence results, even when these conclusions reflect not covertly ob
tained and jealously guarded hard data, but speculation based on facts gen
erally available to the policy community. In this view, it becomes possible
to use intelligence to “ grade,” or judge the correctness of, policy.
A second consequence is that intelligence analysis can be divorced from
the policy process and, indeed, be apolitical in nature. Intelligence is less a
specific aid to policy-making than it is a kind of living encyclopedia or
reference service whose information should be made available not only to
the policymakers’ political opponents in the legislature, but also to the
domestic public and the world at large.16 For example, Colby foresees an
era of free trade in intelligence, in which nations recognize the
mutual benefit from the free flow and exchange of information, in the
fashion that the SALT agreements recognize that both sides can benefit
from pledges against concealment and interference with the other’s na
tional technical means of verification.17
However fantastic this may sound, it illustrates the power of the view that
mtelligence is, at bottom, an endeavor similar to social science, if not
efluivalent to it.
important as they are, these extensions, as I have called them, are external
to the heart of the matter: intelligence work remains the simple, natural
endeavor to get the sort of knowledge upon which a successful course of
action can be rested. And strategic intelligence, we might call the knowl
edge upon which our nation’s foreign relations, in war and peace, must
rest. 18
For the "traditional” view, on the other hand, the fact that an adversary is
trying to keep vital information secret is the very essence of the matter; if an
adversary were not trying to hide his intentions, there would be no need for
complicated analyses of the situation in the first place.
These different stances toward the importance of secrecy reflect basic
differences with respect to what intelligence is. If, according to the “ tradi
tional” view, intelligence is part of the real struggle with human adversar
ies, we might say that in the new view intelligence, like science in general,
is a process of discovering truths about the world (or nature) that can be only
metaphorically called a struggle. In other words, while there are secrets of
nature, they are not pieces of information being jealously guarded from our
view; they are simply truths we have not yet discovered. The paradigmatic
intelligence problem is not so much ferreting out the adversary’s secret
intention (as the Korean War example shows, the adversary himself may not
know how he will react to future events) as it is of predicting his behavior
through social science methodology. This is particularly true the more the
emphasis in intelligence analysis shifts to research on long-term trends,
often societal and economic in nature. With respect to future social or
economic conditions, no real secret can be obtained, because the adversary
himself is uncertain what will happen.
The same tendency to say counterintelligence occupies a marginal place
ln intelligence also affects the importance accorded to deception and coun
terdeception. By categorizing intelligence as social science endeavor, the
new view ignores the possibility of deception. Nature, while it may hide its
secrets from scientific investigators, does not actively try to deceive them.
171
ployment of military forces in peacetime. It is the knowledge, according to
Kent, on which national security policy may be based.
Its very title (Strategic Intelligence fo r American World Policy) makes
clear that Kent’s book is a discussion of U.S. intelligence rather than intel
ligence generally. Accordingly, his definition of intelligence is couched in
terms of the information the U.S. government requires. Nevertheless, there
does not seem to be anything about the definition or about the book as a
whole that would limit the applicability of the propositions to the United
States alone. The basic principles are all general, and, indeed, in consider
ing what one wishes to know about a foreign country, Kent does not look at
America’s potential adversaries, but rather invents the country of “ Great
Frusina’’ to serve as the generic intelligence target. In this discussion, I
therefore take Kent’s statements as applying to intelligence generally.
As Kent implies (by his use of the qualifiers “ high-level,” “ foreign,”
and “ positive” ), his description is too narrow to define intelligence alto
gether. One would have to take account, somehow, of what he calls
“ operational/tactical intelligence,” “ domestic intelligence,” and “ counter
intelligence.” But the most important point to note is that Kent’s description
of “ high-level foreign positive intelligence,” as given above, implies that
these other kinds of intelligence are not necessary for “ our welfare and
security.”
It seems fair to assume that Kent’s definition is focused only on peacetime
intelligence requirements. In time of war, intelligence would have to support
not only strategic military decisions, but also the operations of military
forces in the field. Thus, the operational/tactical level of intelligence ought
to be included in any overall discussion of intelligence, and it is hard to
believe that Kent would disagree.
The situation may be different with respect to the other two limitations.
First, limiting intelligence to foreign subjects seems arbitrary, at least in
theory. Threats to the country and its ideals may be domestic as well as
foreign, or they may involve domestic groups with foreign ties. As we have
seen, defining the scope of domestic intelligence is a very difficult task.
Although we typically speak of national security, a nation acts in these
matters through its government, which generally regards the survival of its
form of government as a vital interest. Note that, in the definition above,
Kent refers to “ the defense of [the United States] and its ideals. ” This
recognizes that American democracy could be threatened by something that
did not threaten the country in a physical sense. Be this as it may, domestic
intelligence, in the sense of the information necessary for the regime to
protect itself against violent or revolutionary change, also seems to be a
necessary part of intelligence. Of course, what the proper subjects of that
information are, and how much of it is required, depends heavily on the
nature of the government (the regime).
In addition, the defense of the country may depend on thwarting an
adversary’s intelligence activities, as well as his military operations; coun
terintelligence as well as positive intelligence must be regarded as necessary
for the “ defense of [the] country.” As compared with the previous example
(operational or tactical intelligence), it is less clear that Kent would agree to
these additions.
In any case, the scope of intelligence must be broadened to include these
areas as well. If intelligence is to provide the knowledge needed to conduct
national security policy, it must include the knowledge to support the actual
use of military forces to pursue national goals and the knowledge that
enables one to frustrate other countries’ intelligence activities. Thus, Kent’s
definition of intelligence must be significantly broadened if it is truly to be
“ the knowledge indispensable to [a country’s] welfare and security.”
At the same time, however, that we have to broaden Kent’s definition to
include knowledge relevant to conducting national security policy, in other
respects, the definition is already too broad. A great deal of information (for
example, technical knowledge in physics or engineering) may be needed to
make informed decisions on some military development questions, but such
information would not ordinarily be considered intelligence. Similarly, a
general understanding of meteorological phenomena is necessary to plan
military actions, but again this type of knowledge would not be considered
intelligence.3 In other words, even when some branch of natural science
makes a major contribution to a nation’s pursuit of its security interests, it
does not automatically become a part of intelligence.
The situation is less clear when it comes to the social sciences. The
subject matter of an intelligence analysis (for example, the political situation
° f a foreign country and how it is likely to evolve) may be similar to the
work done in the social sciences. Even so, the two kinds of analysis exhibit
important differences that suggest that different approaches may be neces
sary even if the substantive content is similar.
To be useful, an intelligence analysis ought, in discussing the determi
nants of the political situation in a foreign country, to emphasize those
factors that can be manipulated or changed; the consumer of the analysis is,
after all, typically interested in affecting that political situation and not just
knowing about it. An academic analysis, on the other hand, will be most
lnterested in discovering the most fundamental causes of a given situation,
even if, or especially if, they are immune to change. To the extent that social
science can predict the future course of events (which is, according to Kent
why it is useful for intelligence), it must regard the future as already
determined.4
Thus, the relationship between intelligence and social science is complex
The nature of this relationship can be better addressed in the context of
another major difference between intelligence and science— the close con
nection between intelligence and secrecy, on the one hand, and science and
the free exchange of ideas, on the other.
From the point of view of the traditional understanding of intelligence (to
say nothing of the popular understanding), what seems to be most glaringly
missing from the definition of intelligence as a kind of knowledge is the
element of secrecy. For Kent, indeed, a concern with secrets is not an
inherent part of intelligence; while noting that one’s adversary may attempt
to deny one access to the information one requires, he regards this as an
incidental problem, akin to the organizational problems that derive from the
large size of a modern state’s intelligence establishment:
When the findings of the intelligence arm are regularly ignored by the
consumer, and this because of consumer intuition, he should recognize
that he is turning his back on the two instruments by which western man
has, since Aristotle, steadily enlarged his horizon of knowledge— the
instruments of reason and scientific method.9
Thus, whatever insight into the political situation a statesman may possess
is treated as intuition, as opposed to the “ reason and scientific method” of
the “ intelligence arm.”
If intelligence could reliably make the predictions implied in Kent’s dis
cussion, the policymakers would indeed be foolish to ignore them, and their
jobs would be made much easier. Kent’s optimism on this point reflects the
general optimism of the social sciences in the 1940s and 1950s. This opti
mism held that adopting a scientific method (such as quantitative methods)
and a scientific outlook (such as behaviorism) would enable the social
sciences to understand social and political phenomena in much the same way
(and ultimately with the same success) as physics understands the atom. In
particular, this understanding would be precise enough to support the pre
dictive capability Kent attributes to intelligence.
In general, these prospects for the social sciences have not been realized
in recent decades, and they have little chance of realization. The predictive
abilities of intelligence are likely to remain much less than Kent envisaged.
This raises a much more difficult question about the proper relationship
between intelligence and policy.
Everyone would agree that intelligence is subordinate to policy, in the
sense that intelligence activities are directed toward serving the policymaker
(although, as already noted, this subordination would be trivial if the pre
dictive capability of social science-based intelligence could be perfected).
The range of this service can be quite broad. At one extreme, intelligence is
sometimes used as a reference service, a source of answers to very specific
questions.10 At the other, it prepares extensive analyses, complete with
predictions, of major issues. In either case, however, it supports policy
makers who must make the actual decision.
The belief in the availability (if not in the present, then in the near future)
of a social science method that would be as rigorous and fruitful as the
scientific method is with respect to the physical world naturally suggests that
those who arc expert in it deserve to be heeded regarding subjects with
which the method deals. Thus, policy should not only accept the facts
provided by intelligence (if relevant facts are available, it would be madness
to ignore them), but its assessments as well.
Unfortunately, such a social science method does not exist. In that case,
intelligence assessments that attempt to make predictions (especially con
tingent predictions) do not differ from the conclusions that policymakers
might draw about the same situations. Other factors would determine the
relative status to be granted the two estimates.
The intelligence analyst probably has a greater background in the area and
almost certainly can devote greater resources (such as time and access to
data) to the effort. The policymaker is likely to know more about his gov
ernment’s own policies in the area and other countries’ diplomatic reactions
to them, is more likely to focus on the possible actions to influence the
situation, and is, in any case, responsible for the outcome. The most com
prehensive and policy-relevant assessment of the situation is likely to result
from a joint effort between the two groups.
1. Sherman Kent, a former intelligence officer, is the best-known and most im
portant representative of this school of thought. The argument was first expressed
in his book. S tra te g ic In te llig e n c e f o r A m e ric a n W o rld P o lic y (Princeton, N.J.:
Princeton University Press, 1949; reprint, 1966) and is discussed in detail in chapter
7.
2. Victor Marchetti and John D. Marks, T h e C IA a n d th e C u lt o f In te llig e n c e
(New York: Alfred A. Knopf, 1974), pp. 4, 12.
3. Jeffrey Richelson, T h e U .S . In te llig e n c e C o m m u n ity (Cambridge, Mass.: Ball
inger, 1985) is a good example of this genre. In the footnotes, “ private informa
tion“ is occasionally cited as a source; one should probably assume this refers to
leaked information, that is, unauthorized disclosures of information by government
officials.
4. It should be noted for the record that, prior to its publication, this book was
submitted to the Central Intelligence Agency and the Select Committee on Intelli
gence of the U.S. Senate for security review. In agreeing that S ile n t W a rfa re does
not contain classified information, those organizations are not, of course, endorsing
its contents in any way.
5. Kenneth G. Robertson has noted that intelligence studies in the United King
dom tend to be more historical in nature than in the United States. See his “ Editorial
Gomment: An Agenda for Intelligence Research,“ D e fe n se A n a ly sis 3, no. 2 (June
1987):95-101. This is due in part to the much stricter control the British govern
ment exercises over information concerning intelligence in the present and the
181
recent past. In the United States the focus has tended to be more on current public
policy issues involving intelligence. Many issues of this sort were publicly debated
at the time of the mid-1970s congressional investigations of intelligence.
7. W h a t I s In te llig e n c e ?
1 . This categorization lists the most commonly used collection methods but is not
meant to be complete. For instance, intelligence information can also be collected
by stealing documents or codes from an adversary’s embassy. Such theft may be
considered humint, but it differs greatly from espionage as described in the text.
2. The term “ agent” is ambiguous: it usually refers to the source, although it
sometimes, as in the lexicon of the U.S. FBI, refers to the intelligence officer
instead.
3. For the sake of simplicity, the discussion in the text is phrased in terms of
intelligence officers tasked with spying on the country to which they are posted.
This is not necessarily the case: officers may be posted to Fredonia to recruit
Ruritanians (such as foreign service, intelligence, or military officers) who are also
stationed there. In this case, the officers may be declared (their intelligence con
nection revealed) to the Fredonian authorities; the purpose of their cover would be
to avoid arousing Ruritanian suspicions. Also, intelligence officers may work in
their own country to recruit foreign diplomats stationed there.
4. Despite the risks of having Soviet nationals working in the U.S. Embassy in
Moscow, reportedly as, among other things, telephone receptionists and operators,
the State Department for many years resisted efforts by other parts of the U.S.
government to force it to end this practice. Eventually, a decision was reached to
reduce dependence on foreign nationals almost to zero. Before it was implemented,
the situation was resolved when, in response to the expulsion of a large number of
Soviet “ diplomats” from Washington in October 1986, the Soviets withdrew the
Soviet work force from the embassy. Presumably they believed that their nationals
would soon be expelled in any case; withdrawing them suddenly disrupted the
embassy’s functioning and let the Soviets respond to the American step without
escalating the conflict and inviting a further response.
5. Given that this claim was made by opponents of a proposed law, since enacted,
to prohibit the disclosure of the identities of intelligence officers, one must take it
with a grain of salt. Nevertheless, there seems to be a good deal of truth behind it.
Clearly certain practices, such as the extensive use of the (otherwise rare) Foreign
Service Reserve (FSR) status for intelligence officers, did help identify them.
6. Cover may also be provided by a business established, owned, and run by an
mtelligcncc service; such an organization is known as a proprietary. A proprietary
other than the collection of intelligence and hence can be useful for covert action
purposes.
7. This account is based on John Barron, K G B T o d a y: T h e H id d e n H a n d (New
York: Reader’s Digest Press, 1983; New York: Berkley Publishing Group, 1985),
pp. 247-314.
8. Frank Gibney, comp., T h e P e n k o v sk iy P a p e rs (New York: Doubleday & Com
pany, 1965; New York: Ballantine Books, 1982), pp. 57, 87-88.
9. Burgess and Maclean both served at the Foreign Office, while Philby joined the
British Secret Service (MI6) and rose to be head of its counterintelligence section
and its Washington-based liaison officer with the CIA and FBI. See Andrew Boyle,
T h e F o u rth M a n (New York: Dial Press, 1979) for an exhaustive account of the
Soviet spy ring that had its roots in 1930s’ Cambridge.
10. See U.S. Senate, Select Committee on Intelligence, M e e tin g th e E sp io n a g e
C h a llen g e : A R e v ie w o f U n ite d S ta te s C o u n te rin te llig e n c e a n d S e c u rity P ro g ra m s,
99th Cong., 2d sess., 1986, S. Rept. 99-522, pp. 13-15, for a survey of the major
cases of espionage against the United States that came to light in 1981-86.
11. See David Wise, T h e S p y W h o G o t A w a y (New York: Random House, 1988)
for a detailed account of the Howard case.
12. This account is based on Thierry Wolton, L e K G B en F ra n c e (Paris: Bernard
Grasset, 1986), pp. 71-73.
13. Allan Dulles, T h e C ra ft o f In te llig e n c e (New York: Harper & Row, 1963;
Boulder, Colo.: Westview, 1985), p. 216.
14. Christopher Andrew, H e r M a je s ty 's S e c re t S e rv ic e : T h e M a k in g o f th e B ritish
(New York: Viking, 1986), p. 488.
In te llig e n c e C o m m u n ity
15. U .S . N e w s & W o rld R e p o rt, March 19, 1954, p. 62, as cited in Harry Howe
Ransom, C e n tra l In te llig e n c e a n d N a tio n a l S e c u rity (Cambridge, Mass.: Harvard
University Press, 1959), p. 23.
16. The story is told in David C. Martin, W ild e rn ess o f M irro rs (New York: Harper
& Row, 1980). As the title suggests, Martin’s view is that the conflicting stories can
never be resolved, and he recommends abandoning the effort to determine which
defectors were genuine and which were k‘plants.”
17. Even earlier, balloons were used as aerial observation posts by the first French
Republic in 1794 and by the Union Army in the American Civil War. In neither case
was great success achieved; both armies later disbanded their fledgling “ airforces.
See William E. Burrows, D e e p B la c k : S p a c e E sp io n a g e a n d N a tio n a l Security
(New York: Random House, 1987; New York: Berkley Publishing Group, 1 9 8 8 ),
pp. 26-28.
19. William Mitchell, M e m o irs o f W o rld W a r I: “ F ro m S ta rt to F in ish o f O u r
Q rea test W a r" (New York: Random House, 1960), p. 59, as cited in Russell F.
Weigley, T h e A m e ric a n W a y o f W a r (Bloomington, Ind.: Indiana University Press,
1977), p. 224.
20. Andrew, H e r M a je s ty 's S e c re t S e rv ic e , p. 136. At the same time (1915), the
appearance of the German Fokker monoplane fighter meant that aerial reconnais
sance could be a dangerous business.
21. For a masterful discussion of British scientific intelligence in World War II by
one of its greatest practitioners, see R. V. Jones, T he W iza rd W ar: B ritish S cien tific
In tellig en ce, 1 9 3 9 -1 9 4 5 (New York: Coward, McCann & Geoghcgan, 1978). The
book was first published in Great Britain as M o st S e c re t W a r (London: Hamish
Hamilton, 1978).
22. John Prados, T h e S o v ie t E s tim a te . U .S . In te llig e n c e A n a ly sis a n d R u ssia n
M ilita ry S tre n g th (New York: Dial Press, 1982), pp. 29-30.
23. Stephen E. Ambrose, E ise n h o w e r: T he P resid en t, vol. 2 of E ise n h o w e r (New
York: Simon & Schuster, 1984), pp. 264-65.
24. Ibid., p. 228.
25. Testimony of Major General B. L. Schriever, In q u iry into S a te llite a n d M issile
Hearings before the Preparedness Investigating Subcommittee of the
P ro g ra m s,
Committee on Armed Services, U.S. Senate, 85th Cong., 2d sess., January 6-22,
1958, part 2, pp. 1633-35, as cited in Amrom Katz, “ Technical Collection in the
1980s,” in In te llig e n c e R e q u ire m e n ts f o r th e 1 9 8 0 's: C la n d e stin e C o lle c tio n , ed.
Roy Godson (Washington, D.C.: National Strategy Information Center, 1982), p.
116.
26. G. Zhukov, “ Space Espionage Plans and International Law,” In te rn a tio n a l
(Moscow) (October 1960), as reprinted in U.S. Senate, Committee on
A ffa irs
Aeronautical and Space Sciences, L e g a l P ro b le m s o f S p a c e E xp lo ra tio n , 87th
Gong., 1st sess., 1961, S. Doc. 26, p. 1100.
27. Burrows, D e e p B la c k , p. 107.
28. Katz, “ Technical Collection,” p. 102.
29. The detection and analysis of electromagnetic radiations emanating from ra
dioactive sources or nuclear detonations (n u c in t) are not considered a part of elint.
See, for example, the definition of electronics intelligence in U.S. Joint Chiefs of
Staff, D ic tio n a ry o f M ilita ry a n d A s s o c ia te d T erm s, JCS Publication 1 (Washing
ton, D.C.: Joint Chiefs of Staff, 1986), p. 126.
20. Thus, electromagnetic waves given off by electric typewriters, word proces
sors, or computers can be intercepted and analyzed; in this manner, the texts or data
prepared on these machines might be recovered. To avoid this danger, the United
States has established a set of standards called “ Tempest.” These standards require
that machines of this sort be used to process secret information only if they are
surrounded by shielding that reduces the emanations and impedes any attempt to
intercept them.
31. The practice of intercepting messages predates the use of radio as a means of
communication: couriers were captured and letters opened long before radio ex
isted. In addition, telegraph cables may be tapped if physical access to them is
available. Before and during World War I, the British gained a special advantage
from the fact that their companies owned and operated the major international cable
lines.
32. Precisely because radio messages might be intercepted, important messages are
likely to be sent in encrypted form. Thus comint and cryptanalysis, the breaking of
codes and ciphers, are intimately related, although cryptanalysis is probably more
reasonably seen as a branch of intelligence analysis than of intelligence collection.
33. For a full discussion of British naval comint during World War I, see Patrick
Beesley, R o o m 4 0 : B ritish N a v a l In te llig e n c e 1 9 1 4 -1 8 (New York: Harcourt Brace
Jovanovich, 1982).
34. An account of this operation may be found in CIA Clandestine Services His
torical Paper, “ The Berlin Tunnel Operation,” June 1968. (This paper was released
by the CIA to me in sanitized form in accordance with the Freedom of Information
Act.) The possibility that the Soviets knew about the Berlin operation and used it to
pass misleading information is discussed in the section on deception in chapter 5.
35. In his memoir, Herbert O. Yardley, the head of the Black Chamber, is un
characteristically coy on the subject of how he obtained the encrypted cables. He
does note, however, that the censorship imposed during World War I had been lifted
and that “ supervision of messages [had been] restored to the private cable compa
nies.” T h e A m e ric a n B la c k C h a m b e r (Indianapolis: The Bobbs-Merrill Co., 1931;
reprint, New York: Ballantine Books, 1981), pp. 156-57.
36. Jones, T h e W iza rd W a r, p. 198.
37. For a fictional account of intelligence collection through sonar, see Tom Clan
cy, T h e H u n t f o r R e d O c to b e r (Annapolis, Md.: Naval Institute Press, 1984).
Nonfictional accounts are somewhat harder to come by in the open literature.
38. Minor but unpredictable changes in orbit can be accomplished by firing small
rockets on the satellite; the number and magnitude of such maneuvers is limited by
the fuel capacity of the satellite, which is typically small.
39. ABM Treaty, art. XII, para. 1; Interim Agreement on the Limitation of Stra
tegic Offensive Arms (SALT I), art. V, para. 1; and SALT II, art. XV, para. 1-
40. Since the provision recognizes the right to do only those things allowed by
international law, one might wonder why it is included at all. The answer appears
to be that the Soviets wished to make sure that the United States could not claim,
in order to provide itself with “ assurance of [Soviet] compliance,” a right to
conduct inspections on Soviet territory. In fact, the provision, as written, does not
confer a rig h t to do anything: rather, it imposes a d u ty to use NTM in accordance
with international law. The next paragraph, which likewise appears in all three
agreements, prohibits interference with NTM when they are “ operating in accor
dance with [international law].”
41. See, for example, A.S. Piradov, ed.. In te rn a tio n a l S p a c e L a w , Boris Belitsky
trans. (Moscow: Progress Publishers, 1976), pp. 192, 218. This work notes the
fear, which it considers well grounded, that “ the use of satellites for the study of
natural resources in other countries might become a form of legalized economic
espionage . . .” (p. 216). The same views are expressed more recently in Gennady
Zhukov and Yuri Kolosov, In te rn a tio n a l S p a c e L a w , Boris Belitsky trans. (New
York: Praeger, 1984), pp. 133, 143.
42. Piradov, In te rn a tio n a l S p a c e L a w , p. 136.
47. One might wonder why such an operation should be conducted by an intelli
gence agency at all, given its total reliance on open-source materials and on meth
odologies developed in the academic world that are familiar to the Soviets.
Obviously, it need not be, but whether placing it in a nonclassified research center
would be a good idea depends on a balance of several factors. On the one hand, it
might be easier to attract personnel to such an open center, and its product would
be more easily shared with the academic community. On the other hand, special,
potentially cumbersome procedures would be needed to integrate this open-source
material with secret information or to use this information to support secret intel
ligence activities. For example, a request for information needed to recruit a Soviet
official to do espionage would have to be camouflaged to conceal the reason for the
request.
48. Donald E. Queller, T h e O ffice o f A m b a ssa d o r in th e M id d le A g e s (Princeton
N.J.: Princeton University Press, 1967), p. 90.
49. What is described in the text is the ordinary activity of a military attaché, which
is essentially overt, although there may be cases where he attempts to travel in or
near restricted areas to observe objects the host country would prefer he did not. At
the same time, however, the position of military attaché (like any diplomatic po
sition) could be used by an intelligence officer as cover.
50. For a discussion of the possibilities opened up by the relaxation in Soviet travel
regulations, see R. Keeler and E. Miriam Steiner, “ Collection,” in In tellig en c e
R e q u ire m e n ts f o r th e 1 9 9 0 's : C o lle c tio n . A n a ly sis, C o u n te rin te llig e n c e a n d C o v ert
A ctio n , Roy Godson ed. (Lexington, Mass.: D.C. Heath & Co., Lexington Books,
1989), pp. 42-57.
19. See Ronald Lewin, U ltra G o e s to W ar (London: Hutchinson & Co., 1978; New
York: McGraw Hill Book Co., 1987), pp. 99-103, for an account of Ultra intel
ligence with respect to the raid.
20. For a rough analogy, one might imagine being confronted with a set of graphs,
lacking both labels and scales for the x and y axes, and being told only the general
nature of the phenomenon of which the graphs describe various aspects. One would
then be asked to figure out what each graph means and to describe the phenomenon
in detail.
21. The Second Common Understanding to article XV, paragraph 3, of the SALT
II Treaty states:
Each Party is free to use various methods of transmitting tclemetric information during
testing, including its encryption, except that, in accordance with the provisions of para
graph 3 or article XV of the Treaty, neither Party shall engage in deliberate denial of
telemctric information, such as through the use of telemetry encryption, whenever such
denial impedes verification of compliance with the provisions of the Treaty.
22. Some have argued that U.S. insistence on including an antiencryption clause in
the SALT II Treaty backfired by alerting the Soviets to the fact that the United States
was successfully intercepting and using Soviet missile telemetry. On the other hand.
Senator Gordon J. Humphrey, basing his discussion on news reports, has suggested
that Soviet espionage success against a U.S. sigint-collecting satellite ‘‘may have
contributed to the Soviet decision to encrypt telemetry . . . ” (“ Analysis and Com
pliance Enforcement,” in V erifica tio n a n d S A L T : T h e C h a lle n g e o f S tra te g ic D e
cep tio n , ed. William C. Potter [Boulder, Colo.: Westview Press, 1980], p. 112.
43. According to the most recent Executive Order on United States Intelligence
Activities (EO 12333, December 4, 1981), the intelligence community is defined as
the CIA, the National Security Agency, the Defense Intelligence Agency, “ offices
within the Department of Defense for the collection of specialized national foreign
intelligence through reconnaissance programs,” the State Department’s 1NR, and
the intelligence elements of the armed services, the FBI, and the Departments of the
Treasury and of Energy. Para. 3.4(f). The text of the executive order appears as
Appendix II in In te llig e n c e R e q u ire m e n ts f o r th e 1 9 8 0 ’s: E le m e n ts o f In te llig e n c e ,
rev. ed., ed. Roy Godson (Washington, D.C.: National Strategy Information Cen
ter, 1983), pp. 117-37.
44. Avi Shlaim, “ Failures in National Estimates: The Case of the Yom Kippur
War,” W o rld P o litics 28, no. 3 (April 1976):368-69.
45. Alexander Orlov, H a n d b o o k o f In te llig e n c e a n d G u errilla W a rfa re (Ann Ar
bor: University of Michigan Press, 1965), p. 10.
46. Barton Whaley, C o d e w o rd B a rb a ro ssa (Cambridge: MIT Press, 1973);
Shlaim, “ Failures in National Intelligence Estimates,” pp. 348-80; Michael I.
Handel, P erc e p tio n , D e c e p tio n a n d S u rp rise : T h e C a se o f th e Y om K ip p u r W ar
(Jerusalem: Leonard Davis Institute of International Relations, Jerusalem Paper No.
19, 1976); Roberta Wohlstetter, P e a rl H a rb o r: W a rn in g a n d D e c isio n (Stanford,
Calif.: Stanford University Press, 1962); Edwin T. Layton, ilA n d I W as T here:
P e a rl H a r b o r a n d M id w a y — B re a k in g th e S e c re ts (New York: William Morrow and
Company, Inc., 1985); Gordon W. Prange et al., A t D a w n W e S le p t: T he U n to ld
S to ry o f P e a rl H a rb o r (New York: McGraw-Hill Book Co., 1981); Harvey de
Weerd, “ Strategic Surprise in the Korean War,” O rb is 6, no. 3 (Fall 1962):435-
52.
47. See Cohen, “ Analysis,” in In te llig e n c e R e q u ire m e n ts f o r th e 1990s, pp. 84-
87, for a discussion of the latter event. Cohen argues that although the political
leadership in Washington may have been surprised by the Chinese attack, General
Mac Arthur, the U.S. and U.N. commander, was well aware of the massive infil
tration of Chinese troops into Korea; the disaster was caused not so much by
surprise as by the use of inappropriate tactics against the Chinese Army. This will
be discussed in note 52 to this chapter.
48. Lew in, U ltra G o e s to W a r , pp. 317-18.
49. Stansfield Turner, S e c re c y a n d D e m o c ra c y : T h e C IA in T ra n sitio n (Boston:
Houghton Mifflin, 1985; New York: Harper & Row, 1986), p. 113. Turner received
the note on November 11, 1978.
50. A report by the staff of the U.S. Senate Intelligence Committee contends that
“ the question of oil price levels was analyzed in the context of a narrow supply-
and-demand framework, which tended to overlook both political influences and
such economic factors as elasticities of supply and demand.” It also claims that
“ political aspects of relationships among OPEC nations and the internal dynamics
of the Saudi Government. . . were not consistently integrated into the community’s
economic analysis” (Select Committee on Intelligence, Subcommittee on Collec
tion, Production, and Quality, U .S . In te llig e n c e A n a ly sis a n d th e O il Issu e , 1 9 7 3 -
1974: S ta ff R e p o rt, 95th Cong., 1st sess., 1977, Committee Print, pp. 4, 5). This
suggests that the intelligence analysts involved practiced economic analysis that was
too theoretical and hence apolitical.
51. There were elements of tactical surprise, for example, with respect to using
artificial harbors to supply the Allied forces until major harbors such as Cher
bourg could be captured. See Handel, “ Technological Surprise in War,” pp. 14-
15, for a discussion of the problem these artificial harbors posed for German
intelligence.
52. See Cohen, “ Analysis,” in In te llig e n c e R e q u ire m e n ts f o r th e 1 9 9 0 s, pp. 84-
87. General Mac Arthur’s command believed that U.S. supremacy in the air could
be used as effectively against the Chinese People’s Liberation Army (PLA) as it had
been against the North Korean People’s Army (NKPA). Ultimately, this mistaken
judgment reflected a failure to assess the significance of the differences between the
heavily mechanized and hence road-bound NKPA (formed on the Soviet model)
and the unmechanized and nonroad-bound PLA, whose more dispersed infantry
hordes presented less lucrative targets for aerial attack.
53. Lewin, U ltra G o e s to W a r, pp. 347-51.
54. Albert Wohlstetter, “ Is There a Strategic Anns Race?” F o reig n P o lic y , no. 15
(Summer 1974):3-20, and “ Rivals, But No Race,” F o re ig n P o lic y , no. 16 (Fall
1974):48-81.
55. This is similar to the question of “ paradigm shift” discussed in the philosophy
of science—the way in which one organizing framework, such as Newtonian phys
ics, gives way to another, for example, relativity. However, two important differ
ences, both of which suggest that paradigm shift can occur more easily with respect
to scientific theory than to intelligence analysis, should be noted: (1) the pioneers
of the new framework do not need the tolerance, let alone the agreement, of the
upholders of the old framework to publish their views, and (2) it is possible to
conceive and carry out experiments specifically designed to decide between the two
frameworks. Even so, it has been claimed that shifts are due not so much to the
conversion of existing scientists to the new framework as to its adoption by new
entrants into the discipline.
56. This is sometimes referred to by the psychological term “ projection,” which
means, more technically, the psychological mechanism by which one attributes to
others the feelings or characteristics (such as hostility or dishonesty) that one
dislikes about oneself and wishes to disown. While this mechanism may be a
psychological basis of mirror-imaging in some cases, the two concepts, which
operate at different levels, are not identical; for example, projection could not be the
cause of mistakenly attributing to an adversary a characteristic (such as peacefulness
or satisfaction with the status quo) that one possesses and with which one is com
fortable.
57. The failure of Israeli intelligence in this case is discussed in Shlaim, “ Failures
in National Intelligence Estimates.” A key cause of the failure was the continued
adherence by Israeli intelligence, in the face of accumulating evidence of a possible
attack, to the “ conception,” or the view, that Egypt would not attack until it was
able to stage deep air strikes to destroy the Israeli Air Force and that Syria would
not attack without Egypt. The first and crucial part of the conception reflects, on the
military level, the same mirror-imaging that existed on the political level—the belief
that Egypt would not start a war it did not stand a good chance of winning.
58. A l-H a m is h m a r , September 14, 1975, as cited in Shlaim, “ Failures in National
Intelligence Estimates,” p. 362.
59. This passage was deleted from the final version of the NIE but survived as a
dissenting footnote expressing the separate views of the director of the INR of the
D e p a rtm e n t o f S ta te ( U .S . S e n a te , C h u rch C o m m itte e , F in a l R e p o rt, B o o k I: F o r
eig n a n d M ilita r y In te llig e n c e , 94th Cong., 2d sess., 1976, S. Rept. 94-755, p. 78).
4. W o rkin g B e h in d th e S c e n e s: C o v e rt A ctio n
13. Churchill relates the story of this attempt in his history of World War II. He
tried to get around Stalin’s suspicions by sending a “ short and cryptic” message
that did not warn of the German attack but merely discussed some German troop
movements that pointed in that direction; he hoped that such a message “ would
arrest [Stalin’s] attention and make him ponder,” thereby leading him to draw the
desired conclusion on his own. Unfortunately, the implementation of Churchill’s
tactic was somewhat botched by the British ambassador in Moscow (T h e G ra n d
A llia n c e , vol. 3 of T h e S e c o n d W o rld W a r [Boston: Houghton Mifflin Company,
1951], pp. 357-61).
14. Ladislav Bittman, T h e K G B a n d S o v ie t D isin fo rm a tio n : A n In sid e r s V iew
(McLean, Va.: Pcrgamon-Brassey’s, 1985), pp. 112-13.
15. Sec John Barron, K G B T o d a y: T h e H id d e n H a n d (New York: Reader’s Digest
Press, 1983; New York: Berkley Publishing Group, 1985), pp. 32-159, for
Levchenko’s account, as told to Barron, of his intelligence career and eventual
defection.
16. Ibid., pp. 76-81,85-90, and 93-94. The article, by suggesting that the double
agent operation was an American provocation, was aimed at reducing public sup
port for a tough stand by the Japanese government against Soviet diplomatic
pressure; the GRU agent was in fact released. The purpose of the letter—to create
public pressure on the Japanese government to accede to the Soviet demand that the
pilot be returned—was not achieved.
17. Total concealment may not be possible, depending on the case. Thus, a foreign
intelligence service can determine the location from which a “ black” radio station
is broadcasting by using direction-finding equipment. This information, however,
will not typically be available to the average listener.
18. The National Voice of Iran (NVOI) and its inflammatory anti-American rhet
oric are discussed in a CIA study, “ Soviet Covert Action and Propaganda,” pre
sented to the Oversight Subcommittee, Permanent Select Committee on
Intelligence, House of Representatives, February 6, 1980, by the deputy director for
operations, Central Intelligence Agency. The study is reproduced in U.S. House of
Representatives, Permanent Select Committee on Intelligence, Subcommittee on
Oversight, S o v ie t C o v e r t A c tio n (T h e F o rg e ry O ffe n siv e ): H ea rin g s, 96th Cong., 2d
sess., 1980. The discussion of the NVOI appears on pages 78-79.
19. Ray S. Cline, T h e C IA : R e a lity vs. M y th , rev. ed. (Washington, D.C.: Acrop
olis Books, 1982), p. 151.
21. Novosti is not an acknowledged voice of the Soviet government or the Soviet
Communist party; instead, it is supposed to be an organ of public opinion as
represented by such associations as the Union of Journalists and the Union of
Writers (Shultz and Godson, D e zin fo rm a tsia , p. 28).
22. The version provided to foreign media included thirty-four paragraphs on So
viet foreign policy that were absent from the N e w Y o rk T im e s version. In 1977, the
T im es claimed that these paragraphs had been forged by the CIA (John M. Crews-
don, “ The CIA’s 3-Decade Effort to Mold the World’s Views,” N e w Y ork T im e s ,
December 25, 1977, p. Al).
Crewsdon reported that the CIA had obtained “ an expurgated version” of
Khrushchev’s original speech, a version that had been “ prepared for delivery to the
nations of Eastern Europe, from which some 34 paragraphs of material concerning
future Soviet foreign policy had been deleted” ; the extra thirty-four paragraphs
made available to foreign media were written by CIA counterintelligence experts in
Khrushchev’s style and presumably designed to cause confusion in the Soviet bloc
countries. Crewsdon does not explain why the additional paragraphs were omitted
from the domestic version—the one plausible explanation, that the CIA withheld the
forged material from the T im e s to reduce the possibility that U.S. public opinion
would be misled, would have been at odds with the article’s general tenor.
John Ranelagh concludes, from the fact that the Soviets never disputed their
authenticity, that the additional paragraphs were genuine (T h e A g e n c y : T h e R ise a n d
D e c lin e o f th e C IA [New York: Simon & Schuster, 1986], p. 287n). According to
him, the CIA received two copies of the text, a complete version (presumably from
a source in the Soviet Union) as well as the expurgated (Eastern European) version.
However, he does not explain why the CIA gave only the expurgated version to the
T im es. He would, it seems, have to argue that domestic publication would have
placed the Soviet source in greater jeopardy than foreign publication.
23. U.S. Senate, Select Committee to Study Governmental Operations with Re
spect to Intelligence Activities (“ Church Committee” ), F in a l R e p o r t, B o o k I:
F o reig n a n d M ilita ry In te llig e n c e , 94th Cong., 2d. sess., 1976, S. Rept. 94-755, p.
194.
24. See House Permanent Select Committee on Intelligence, S o v ie t C o v e rt A ctio n
(T h e F o rg ery O ffe n siv e ), for a discussion of this phenomenon in the 1960s and
1970s. Soviet use of this technique has continued into the 1980s; for recent exam
ples, see U.S. Department of State, S o v ie t In flu e n c e A c tiv itie s : A R e p o rt on A c tiv e
M e a su re s a n d P ro p a g a n d a , 1 9 8 6 -8 7 , August 1987, pp. 29-32 and 79-80. A
question relating to a possible U.S. use of this technique has arisen with respect to
the CIA’s dissemination of Khrushchev’s “ secret speech” on Stalin. See note 22 to
this chapter.
25. See Shultz and Godson, D e zin fo rm a tsia , pp. 194-95.
26. The additional paragraphs—the authenticity of which has been disputed—dealt
only with foreign policy issues. See note 22 to this chapter.
27. Cline, T h e C IA , pp. 123-24.
28. NSC directive 10/2 (June 1948), as cited in ibid., p. 126.
29. Church Committee, F in a l R e p o r t , B o o k I, p. 145.
30. Cline, T h e C IA , pp. 150-51.
31. Church Committee, S ta ff R e p o r t: C o v e rt A ctio n in C h ile: 1 9 6 3 -1 9 7 3 , 94th
Cong., 1st sess., 1975, Committee Print, pp. 29, 45.
32. Ibid., p. 49. Emphasis in original.
33. Gregory F. Treverton, C o v e rt A c tio n : T h e L im its o f In te rv e n tio n in th e P o stw a r
W o rld (New York: Basic Books, 1987), p. 142.
14. Atomic Energy Act of 1954 Sec. 11y [42 U.S.C. 2014y].
15. Sec. 148 [42 U.S.C. 2168].
16. Adm. B. R. Inman, “ National Security and Technical Information,” paper
presented to the annual meeting of the American Association for the Advancement
of Science, January 1982, mimeo (Washington, D.C.: The American Association
for the Advancement of Science, 1982).
17. The general export controls are contained in the International Trade in Arms
Regulations 22 CFR chapter I, subchapter M, part 125. These regulations explicitly
address the issue of the export of unclassified technical data; in general, an export
license is required except when the data are in the public domain, that is, readily
accessible to the public.
18. In the United States, at least theoretically, lack of loyalty to the government
disqualified a person from any federal civil service position; however, this criterion
has been in effect dropped with respect to jobs that do not require access to classified
information. See Guenter Lewy, “ The Federal Loyalty-Security Program,” in I n
te llig e n ce R e q u ire m e n ts f o r th e 1 9 8 0 ’s: D o m e stic In te llig e n c e , ed. Roy Godson
(Lexington, Mass.: Lexington Books, 1986), p. 147 and passim, for a discussion of
this development. The loyalty requirement is contained in President Truman’s Ex
ecutive Order 10450, Security Requirements for Government Employment, April
27, 1953.
19. Provided that no violent, criminal action had been taken based on this belief.
Even then, it would not be permissible to compile a complete membership list of the
organization unless it could be shown that the membership at large was involved in
the organization’s violent activities. These issues are discussed further in the next
chapter.
20. U.S. Senate, Subcommittee on Criminal Laws and Procedures, Committee on
the Judiciary, H e a rin g s on th e E ro sio n o f L a w E n fo rc e m e n t In te llig e n c e a n d Its
Im p a c t o n the P u b lic S e c u r ity , part 8, 95th Cong., 2d sess., 1978, as cited in
Guenter Lewy, “ The Federal Loyalty-Security Program,” p. 152.
21. In 1983, the Office of Technology Assessment (OTA) of the U.S. Congress
produced a study generally critical of the claims made on behalf of the polygraph.
S cien tific V a lid ity o f P o ly g ra p h T estin g : A R ese a rc h R e v ie w a n d E v a lu a tio n —
T e c h n ic a l M e m o ra n d u m , OTA-TM-H-15 (Washington, D.C.: Government Printing
Office, 1983). The following year, the Defense Department, whose National Se
curity Agency makes widespread use of the polygraph, published a rebuttal. U.S.
Department of Defense, T he A c c u ra c y a n d U tility o f P o ly g ra p h T estin g (Washing
ton, D.C.: Government Printing Office, 1984).
22. See the discussion, later in this chapter, of the Cuban double-cross operation
run against the United States. Presumably, at least some of these double agents,
whom the CIA accepted as genuine, had been subjected to polygraph tests.
23. See U.S. Senate, Select Committee on Intelligence, M e e tin g th e E sp io n a g e
C h a llen g e : A R e v ie w o f U n ite d S ta te s C o u n te rin te llig e n c e a n d S e c u rity P ro g ra m s ,
99th Cong., 2d sess., 1986, S. Rept. 99-522, pp. 12-15, for a summary of the
major cases between 1980 and 1986.
24. Testimony of James Schlesingcr before the Senate Budget Committee, as cited
in “ For the Record,” W a sh in g to n P o st, July 1, 1987, p. A18.
25. Howard evaded FBI surveillance and turned up several months later in Mos
cow. Yurchenko redefected to the Soviet Union, which suggests that his original
defection might have been bogus and that he might have been dispatched by the
Soviets to mislead U.S. intelligence or for some other reason. If so, giving up
Pelton and Howard—no longer employed by the United States, they were presum
ably of no further use to the Soviets in any case—was intended to bolster Yur
chenko’s authenticity or bona fides. See David Wise, T he S p y W ho G o t A w a y (New
York: Random House, 1988), pp. 17-21 and passim.
26. A particularly dramatic case (not, however, involving a double agent) is the
famous Japanese bomb-plot message of September 1941. In this message, the
Japanese consulate in Honolulu was instructed to provide the precise berths of the
U.S. Navy ships at Pearl Harbor. The United States decoded the message but did
not figure out why Japan wanted such detailed information. See Gordon W. Prange,
A t D a w n W e S le p t: T h e U n to ld S to ry o f P e a rl H a rb o r (New York: McGraw-Hill,
1981), pp. 248-52.
27. John C. Masterman, T he D o u b le -C ro ss S y ste m in th e W a r o f 1 9 3 9 to 1945
(New Haven: Yale University Press, 1972), p. 3 (emphasis in the original). This
work, by the man who managed the system, is the source of the account in the text;
further citations are from pp. 30-31, 38^40, 41, 49, and 58.
28. The original agent had worked for the German Abwehr (military intelligence)
in the late 1930s; the British, aware of his existence, allowed him to continue
operating in part because he had also had some dealings with British MI6 that would
have complicated any attempt to prosecute him.
29. Masterman, T h e D o u b le -C ro ss S ystem .
30. Ibid.
31. Michael Wines and Ronald J. Ostrow, “ Cuban Defector Claims Double Agents
Duped U.S.,” W a sh in g to n P o st, August 12, 1987, p. A8.
32. Formally, the All-Russian Extraordinary Commission to Combat Counterrev
olution and Sabotage; “ Cheka” is an acronym based on the second and third words
of the formal name.
33. For a discussion of the Trust, see John J. Dziak, C h e k isty : A H isto r y o f the
KGB (Lexington, Mass.: D.C. Heath and Co., Lexington Books, 1988), pp. 47-50.
34. John Prados, T h e S o v ie t E stim a te : U .S . In te llig e n c e A n a ly sis a n d R u ssia n
M ilita ry S tre n g th (New York: Dial Press, 1982), pp. 42-43.
35. See Arnold L. Horelick and Myron Rush, S tra te g ic P o w e r a n d S o v ie t F o reig n
(Chicago: University of Chicago Press, 1966), pp. 42-116, for a full dis
P o lic y
cussion of these exaggerated claims and the purposes they served.
36. See Horelick and Rush, S tra te g ic P o w e r , pp. 117-40.
37. Prange, A t D a w n W e S le p t, pp. 338, 353.
38. One would also want to know how the adversary processes the information. If,
for instance, because of the time pressure of combat, he will not have the oppor
tunity to analyze the photographs fully before having to take action, it may be
possible to fool him with an inferior imitation. By the time detailed analysis reveals
to him that the object was a dummy, he has already acted on the basis of his
mistaken first impression. This is another reason successful deception operations are
more to be expected in wartime than in peacetime.
39. See M. R. D. Foot, S O E , A n O u tlin e o f th e S p e c ia l O p e ra tio n s E xe cu tive ,
1 9 4 0 -4 6 , rev. ed. (n.p.: University Publications of America, 1986), pp. 130-34.
For a more complete account, see the memoir of the German counterintelligence
officer who ran the operation, H. J. Giskes, L o n d o n C a llin g N o rth P o le (London:
William Kimber and Co., 1953). It does not appear that the Germans used this
channel to deceive the British on matters other than the operations of their supposed
SOE agents in the Netherlands.
40. This incident is recounted in H. M. G. Lauwers, “ Epilogue,” in Giskes,
L o n d o n C a llin g N o rth P o le , p. 194. Lauwers, a Dutch SOE agent captured by the
Germans, tried unsuccessfully to alert London to the deception operation by trans
mitting messages without the proper security checks. Unfortunately, headquarters
ignored their absence and treated the messages as genuine.
41. Stansficld Turner, S e c re c y a n d D em o c ra c y : T he C IA in T ra n sitio n (Boston:
Houghton Mifflin, 1985; Harper & Row, 1986), p. 65.
42. As with everything else, a trade-off is involved here. Varying the orbit means
that some satellites follow one that is less than optimal in its coverage; what is
required is a balance between the ordinary measures of cost effectiveness and the
more subtle (and less measurable) requirement to counter the adversary’s conceal
ment and deception operations.
43. David Kahn, an expert on cryptology, makes these points in “ Discussion,” in
ed. Roy Godson
In te llig e n c e R e q u ire m e n ts f o r th e 1 9 8 0 ’s: C la n d e stin e C o llec tio n ,
(Washington, D.C.: National Strategy Information Center, 1982), p. 119.
44. The CIA had noticed that one type of U.S. electric cipher machine transmitted
an electrical signal representing the plaintext character (the machine’s input) along
with the enciphered character (its intended output); this electrical signal, although
faint compared to the enciphered character, could be picked up from the transmis
sion wire far away from the cipher machine. It turned out that Soviet cipher ma
chines suffered from the same defect, enabling the United States to recover the
plaintext messages along with their encrypted versions (John Ranelagh, T h e A g e n c y :
T h e R ise a n d D e c lin e o f th e C IA [New York: Simon & Schuster, 1986], p. 140).
6. G u a rd in g th e G u a rd ia n s: T h e M a n a g e m e n t o f In te llig e n c e
49. U.S. Senate, Select Committee to Study Governmental Operations with Re
spect to Intelligence Activities (“ Church Committee” ), F in a l R ep o rt, B o o k II:
In te llig e n c e A c tiv itie s a n d th e R ig h ts o f A m e ric a n s, 94th Cong., 2d sess., 1976, S.
Rept. 94-755, p. 166.
50. See ibid., pp. 225-40, for cases in which purely political information was
collected and disseminated to administration political operatives.
51. C a n a d ia n S e c u rity In te llig e n c e A c t. Assented to June 28, 1984, Ottawa: Acts
of the Parliament of Canada, 2d session, 32d Parliament, 32-33, Elizabeth II,
1983-84, sects. 2, 12, as cited in Atkey, “ Security Intelligence Review Commit
tee,” pp. 10-12.
7 T w o V iew s o f In te llig e n c e
8. T o w a rd a T h eo ry o f In te llig e n c e
217
Classification of information ( c o n t . ) correlation with skill at chess, 189 n9
National Security Act (1947), 100, 168 history of, 39-42, 169
overclassification, 102-3
Patent Secrecy Act (1952), 105
public accountability for actions, 103-4 Deception operations, 2, 8, 82, 118-23.
technological information, 104-5 S e e a l s o Propaganda
Cline, Ray, 86-87 blocking intelligence-gathering chan
Colby, William, 160-63, 165, 167-68, nels, 121
174, 178 false signals, 120-22
Collection of intelligence information feedback, 121-22
activities, 7-8, 11, 92, 125 disinformation, 81-82, 85
counterespionage, 8, 109-15, 121 and intelligence failures, 119-29
covert action, 7, 73 and self-deception, 122-23
denying certain information to adver true signals, 120-22
saries, 8, 182 n2 Domestic intelligence, 4, 148, 172
implementation of policy, 8 and constitutional law, 148-52, 209
motivations to commit espionage, 16- n26
17, 108 criminal standard. 149-58
nation’s foreign policy, 73, 171 and counterterrorism, 154-56
and nature of target, 18 and personal security, 152-53
“positive” foreign intelligence, 110— support groups, 153-56
11 Foreign Agent Registration Act
Counterdeception, 123-28 (FARA), 150-51, 210 n34, 210 n35
German use of against British in Neth Foreign Intelligence Surveillance Act
erlands, 123-24 (1978), 148-49
U.S.-U.K. tunnel operation (Berlin), Levi guidelines, 149-51, 153, 156,
126-27, 206-7 n47 210-11 n37, 211 n39, 211-12 n46
Counterespionage, 109-15 and national security cases, 148,
Counterintelligence, 7-9, 99-129, 166, 150, 209 n28
173, 202 nl, 202 n2 violation of privacy, 151-52
Coup d’état. S e e Covert action Double agents (of U.S.S.R.)
Covert action, 3, 8, 73-97 Blake, George, 126
coup d’état, 60. 73, 76, 87, 88 Burgess, Guy, 17, 184 n9
Foreign Assistance Act (1961), 197 and defectors, 20
n2, 198 n9 Hermann, Rudolf, 15
forgery, 85, 89, 91 Howard, Edward Lee, 17, 111, 204
Hughes-Ryan Amendment, 74, 93, 197 n25
n2, 200-1 n38 MacLean, Donald, 17, 184 n9
information and disinformation, 81-83, Pclton, Ronald, 111, 204 n25
85 Penkovskiy, Oleg, 16. 85, 214 n21
and plausible denial, 92-94, 132-34 Philby, Harold (“Kim”), 17, 184 n9
propaganda, 8, 83-85, 91 Prime, Geoffrey, 107
“special political action,” 74, 197 n5 Double-agent operations. 2, 18, 111-15,
Cryptanalysis, 25-27, 37, 38-42. S e e 120, 198 n16
a l s o Double-Cross System; Ger Yurchenko, Vitaliy, 111, 204 n25
many; Japan; United Kingdom Double-Cross System (U.K.), 18, 113-
British skills in WWII, 25, 43-45, 15, 119, 120, 122-23, 127. S e e a l s o
114, 122 Cryptanalysis; United Kingdom
fragility of, 42-45
history of, 39-42
mistakes in using cipher, 189 nlO Eisenhower, Dwight David, 22-23, 92-
U.S. breaking Libyan codes. 44, 102 93
Cryptology/cryptography and Allen Dulles. 18
Elliff, John, 153 11-20, 166. S e e a ls o Intelligence
Encryption, 2, 38. S e e a l s o Germany; officers
Japan; United Kingdom compared to technit, 30-33
cipher, 38, 40, 116 “dead drop.“ 20, 109
codebook, 38, 40 and deception, 127-28
C r y p t o lo g i a , 188-89 n8 defectors, 20. 83, 111, 127-28
data encryption standard. 188-89 n8 nonofficial cover officials (NOCs), 12-
fiber-optic transmission, 32, 117 14
microwave transmission, 116-17 official cover, 12-13, 110
scrambling devices, 116 personality reports, 15, 35
in World War 11, 41-43 proprietary cover, 183-4 n6
and Zimmerman telegram (1917), 40 quality control. 17-18
“source,” 11-12
Soviet use of against U.S. and U.K.,
Fairbanks, Charles, 140-41 16-17
FBI (Federal Bureau of Investigation), surveillance, 109-10
5-6, 149-50, 156-57 “tradccraft,” 19-20
Ford, Gerald, 89-90
France
DGSE (Direction Générale de la Secu Influence actions of foreign governments,
rité Extérieure), 93 77-80, 82
and German Enigma coding machine, Inman, Admiral Bobby Ray, 105
32 Intelligence
and R a i n b o w W a r r io r incident, 89, 90, consumers, 165, 173, 176
93 definition of, 1, 171
Secret Service (SDECE), 17 and economics, 6-7, 53
Soviet, 192 n34, 203 nl 1
development and deployment, 172
Gates, Robert M., 135, 143, 144-45 and law enforcement, 4-6
Gazit, Shlomo, 154-55 informers, use of, 5, 33
Germany (West), 15, 80, 81 military, 51-52
Abwehr, 114 political, 52
counterdeception, 123-24 recruited source of, 15-17, 183 n3
Enigma coding machine, 32, 41,42, relationship between intelligence and
45 the policymakers, 165, 176
intelligence failures in world wars, 18, terrorism, 5, 19, 33, 150, 154-56
25, 45, 59, 61, 113-15, 119-20, walk-in source of, 15-17
122, 127 Intelligence activities, 1, 74, 126, 168.
and Soviet targeting, 15, 86 S e e a l s o Cryptanalysis; Cryptology/
technical developments, 21, 27, 50 cryptography; Encryption
U.S.-U.K. tunnel (Berlin), 26, 127 collection and analysis of information,
Zimmerman telegram (1917), 40 2. 28-29, 177
Grenada, 34, 49 counterintelligence analysis, 2, 82,
GRU (U.S.S.R. Committee for Military 128-29, 166
Intelligence) decryption of coded messages, 2, 32,
double agent in, 83, 111 38, 39
use of moles, 15-17 electromechanical cipher machines, 32,
41,42, 45. 206 n44, 214 n24
espionage, 2. 80, 176
Haig, Alexander, 143 indications and warnings (I&W), 55-
Halperin, Morton. 146 57
Helms. Richard, 65 interception of communications, 2,
Human intelligence collection (humint), 24-27, 116-17
Intelligence activities ( c o n t.) “national technical means” of verifica
radio traffic, 27, 41, 74, 116-17, 127 tion, 29-30, 187 n40
Knickbein system. 50, 192 n32 Outer Space Treaty, 29
research and analysis, 2, 164 restrictions on overflying another coun
struggle between adversaries, 2, 161, try without consent, 22, 29
175, 177 Iran, 81, 83, 84, 90, 93
Intelligence failures seizure of U.S. Embassy in Tehran, 90
causes of failure, 62-67, 191-92 n30, Soviet intentions toward, 140^41
195 n57 U.S. “listening posts” in, 46
improper security checks, 206 n40 “Iron Curtain,” 18
mirror-imaging, 64-67, 71, 195 n56 Israel, 58, 59, 64-65, 154, 175, 195 n57
and deception operations, 119-29
solutions to intelligence failure, 67-71
types of failure, 59-61 Japan, 83, 169
Intelligence information attack on Pearl Harbor, 59, 63, 121
analysis and assessment of, 1, 2, 161, cryptanalysis, 42-43
178 “Purple” coding machine, 41
centrality of, 165, 169
free flow and exchange, 165
verification, 165 Kennedy, John, 24, 134
Intelligence officers, 11-12, HO. 183 n2 Kent, Sherman, 54, 162, 164, 181 nl
Foreign Service Reserve (FSR) sta S t r a t e g i c I n t e l l ig e n c e f o r A m e r i c a n
tus for, 183 n5 W o r ld P o li c y , 172, 191 n29, 215 nl
handler, 12 KGB (U.S.S.R. Committee for State Se
illegal officers, 14 curity), 111. S e e a l s o Double agents
“legal” officers, 14 (U.S.S.R.)
“mailbox,” 12 acquisition of Western technology, 6,
“mole,” use of, 15 16
“station,” 13 Cheka, 119
Intelligence organizations, 1. S e e a ls o and Iran, 81, 82
CIA; FBI; KGB and moles, 15
British, 95, 113, 123, 126 NKVD, 59
characteristics of, 2-3 Khrushchev, Nikita, 24, 85, 93
clandestine collection capabilities of, Korean War (1950), 22, 59. 61
182 n6 Krcmlinology, 35
French, 17, 93
rivalries between, 183-84 n8
undercover agents, use of, 3, 15 Levchenko, Stanislav, 83
variations among, 58-59 Levi, Edward, 149-50, 153, 156. See
Intelligence “product,” 2, 37, 49, 53-71 a l s o Domestic intelligence
N a t i o n a l I n t e l l ig e n c e D a i l y (NID), 54 Libya, 44, 92, 102
national intelligence estimate (NIE),
58, 140
P r e s i d e n t 's D a i l y B r i e f , 54-55 Management of intelligence
special national intelligence estimate authorization issues, 134-35
(SNIE), 58, 141 democracy and secrecy, 144-48
International law. S e e a l s o SALT expertise and policy, 136-44
ABM Treaty, 29 funding. 134-35, 144
and diplomatic immunity, 12 history of, 134-35
Intermediate Range Nuclear Forces and independence of intelligence, 136.
(INF) Treaty, 36 140. 141-44
International Trade in Arms Regula paper trail, 133, 135
tions, 203 nl7 plausible denial doctrine, 132-34
and policymakers, 134-35, 137-45 “Open Skies” plan, Soviet rejection
secrecy and control, 131-34 of, 22-23, 213 nl6
and intelligence, 174 Photo interpretation (PI), 21-24, 37 4 7 _
Masterman, John, 113 48, 124-25, 205 n38
McDonald, Admiral Wesley, 49 ground resolution distance, 47, 124
“Météorologie intelligence,” 215 n3 190 n25
Meyer, Cord, 54-55 and “Open Skies” plan, 22
Mirror-imaging. S e e Intelligence failures Propaganda, 83-85, 91
Multidisciplinary counterintelligence
(MDCI), 115-18
communications security, 116-17 Radio Free Europe, 83, 93
emanations security, 117-18 Radio Liberty, 83, 93
Radio Moscow, 76, 93
Ranelaugh, John. 126
National security, and the type of govern Reagan, Ronald, 44, 46, 89-90. 94
ment, 3-4 Iran-Contra affair, 93
National Security Agency (NSA), 54.
S e e a l s o Classification of informa
tion SALT (Strategic Arms Limitations Talks)
National Security Council (NSC). 75 MI, 24, 29-30, 46. 57
National Security Decision Directive. 77, antiencryption clause in, 190 n22
197-98 n7 and national technical means (NTM),
National technical means (NTM). S e e 29-30
SALT Second Common Understanding to,
Nicaragua, 75, 89, 94. 145, 147 190 n21
Nixon, Richard, 65 violation of, 93
Noriega, Manuel, 90 Security, 99, 105-9, 120. S e e a l s o Coun
terintelligence
personnel security, 105-8
Office of Strategic Services (OSS), 161 polygraphs, 107-8, 204 n21, 204
OPEC (Organization of Petroleum Ex n22
porting Countries), 34 Privacy Act (1974), 107
Open sources physical security, 108-9
collecting and cataloging information Shultz, George, 107
from. 34, 48-49, 175 Signals intelligence (sigint), 24-27, 213
data banks, 48-49 n8, 214 n25
diplomatic and attache reporting, 35- communications intelligence (comint),
36 25-27, 125
and intelligence agencies. 187-88 n47 compromise of, 107
predictions from, 34, 57-58, 192 n34 and cryptanalysis, 25-27. 186 n32
publications and broadcasts, 7, 33-35, electronic intelligence (elint), 25, 27
166 nucint, 185 n29
Organization of East Caribbean States, 49 telemetry intelligence (telint), 25, 27,
37, 45-46
“Tempest,” 185-86 n30
“Paradigm shift,” 195 n55 Silberman. Laurence, 157
Pathd, Pierre-Charles, 80, 82 Soviet Union. S e e U.S.S.R.
Photographic/imagery intelligence (phot- Surveillance, 19-20, 109-10, 210 n31
int or imint), 21-24, 47-48. 205 “brush pass,” 19-20, 109
n38 Foreign Intelligence Surveillance Act
aerial photorcconnaissance, 22-24, (1978), 148
28-29, 118, 120-21, 124-25, 133, Freedom of Information Act, 210 n32
190 n24 satellite, 28-29. 47-48, 206 n42
Technical intelligence collection (tech- use of double-agents against U.S.S.R.,
int), 20-36, 107, 121, 165, 169, 111, 204 n25
214 nl9. S e e a l s o Photographic/ U.S. Congress, 78
imagery intelligence; Signals intelli Boland Amendments, 145
gence House of Representatives Permanent
compared to humint, 30-33 Select Committee on Intelligence,
and deception operations, 121, 178 135, 136, 141, 144-45
emission control (emcon), 121 Hughes-Ryan Amendment, 74, 93, 197
fiber-optic/laser-beam communications, n2, 200-1 n38
32, 117 “leaks,” 146, 209 n2l, 209 n23
satellite reconnaissance, 23-24, 28-29, National Intelligence Reorganization
118, 120-21, 124-25 and Reform Act (1978), 211 n39
sensors, 28 Senate Select Committee on Intelli
“signature,” 33, 47-48 gence, 144. 181 n4, 194 n50
Terrorism, 5, 75, 89 U.S. Department of State, 75, 85
Truman. Harry (S), 100, 164 biographic materials published by, 13
Turner, Admiral Stansfield, 30-31, 60, Black Chamber, 27, 41, 169, 186 n35,
90 214-15 n25
Tzu, Sun, 159-60, 168-69 Bureau of Intelligence and Research
(INR), 54, 68
U.S.S.R., 35, 56, 86. S e e a ls o KGB;
U-2 reconnaissance plane, 23-24, 92, GRU
166 in Afghanistan, 89, 91, 94
United Kingdom, 8, 16, 107, 134. S e e agents of influence, types of, 80
a ls o Cryptanalysis; Double-Cross and “black” propaganda, 83-84
System disinformation, 81-82, 85
British Government Communications embassy of, in Washington, D.C., 117
Headquarters (GCHQ), 107 glasnost, 31, 33, 53, 203 n9
communications intelligence break and “gray” propaganda, 84
throughs, 25, 27, 40, 50 Khrushchev, Nikita, secret speech of,
and D-Day landings, 18, 59. 61, 114. 85, 93. 199 n22
119, 122-23, 127 missiles in Cuba, 48, 191 n27, 191
and development of infrared and radar, n28
24 and use of front groups, 85
Government Code and Cypher School,
44
MI5, 113 Vance, Cyrus, 60
MI6, 95, 123
and not invented here syndrome. 66-
67 Wilson, Woodrow, 40. 41, 144
Special Operations Executive (SOE), World Peace Council, 76, 85
123 World War II. S e e a l s o Cryptanalysis;
use of aerial photography, 21 Encryption; Germany; Japan; United
United States Kingdom
Defense Intelligence Agency (DIA), British cryptanalysis skills, 25, 43-45,
54, 68. 191 n27 114, 122
Department of Defense (DoD), 101-2 C h ic a g o T r ib u n e article on Japanese
embassy in Moscow, 90, 183 n4 codes, 42-43
intelligence community. 193 n43 Double-Cross System, 18, 113-15,
Iran-Contra affair, 93-94 119, 120, 122-23, 127
Secret Service, 155-56
support for Nicaraguan resistance. 75,
89 Yardley, Herbert, 40
ABOUT THE AUTHOR