STUDIES IN INTELLIGENCE [Vol 4 No 2, Spring 1960]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78-03921A000300300001-1
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
120
Document Creation Date: 
December 16, 2016
Document Release Date: 
December 13, 2004
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1960
Content Type: 
STUDY
File: 
AttachmentSize
PDF icon CIA-RDP78-03921A000300300001-1.pdf6.47 MB
Body: 
Approved For Release 2004/12/17 : CIA-RD1716E03t2fA000300300001-1 STUDIES In INTELLIGENCE `JOB NO. 2a- iz' BOX NO1 _3___------ FOLDER NO, 3_ ----- TOTAL "CCS HEREIN 25X1 APR, GATE $ loan GGC --/ g> V TYPE GEIG CAMP _J _ GPI GRIG CLASS PAGES XZ& NcV CLASS NEXT 6EV _L~'- AUTHL HA 114 JUST --- VOL. 4 NO. 2 SPRING 1960 CENTRAL INTELLIGENCE AGENCY OFFICE OF TRAINING 25X1 Approved For Release X2004/12/17 : CIA-RDP78-03921 A000390300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Next 2 Page(s) In Document Exempt Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 25C~ Approved For Release 20 CONTENTS CLASSIFIED ARTICLES Page The Intelligence Literature Award . . . . . . . . . faces 1 Unrecognized Potential in the Military Attaches Lyman B. Kirkpatrick 1 Personal recommendations for enhancing the value of an intelligence asset. CONFIDENTIAL Design for Jet-Age Reporting . . . . . William Earling 7 New look in speed and guidance for routine informa- tion reports from overseas. SECRET Notes on the CRITIC System . . . . William A. Tidwell 19 Informal progress report on the procedure for urgent intelligence flashes. SECRET Anti-Soviet Operations of Kwantung Army Intelligence, 1931-39 . . . . . . . . . . . Richard G. Brown 25 Critique of Japanese methods and results in Man- churia. OFFICIAL USE ONLY The U.S. Hunt for Axis Agent Radios George E. Sterling 35 Story of the FCC's Radio Intelligence Division dur- ing World War II. OFFICIAL USE ONLY 25)(1 Approved For Release 2004/12/17 : CIA-RDP78-03921A00030p300001-1 Approved For Relerase 2004/12/17 : CIA-RDP78-g3921A000300300001-1 UNCLASSIFIED ARTICLES Operation Portrex . . . . . . . . . Edwin L. Sibert Page Al Intelligence and unconventional warfare in a combat exercise. The Last Days of Ernst Kaltenbrunner Robert E. Matteson All Capture and trial of the chief of the Nazi RSHA. The Lohmann Affair . . . . . . . . James H. Belote A31 Clandestine German operations in the twenties. Communication to the Editors . . . . . . . . . . . A39 Intelligence in Recent Public Literature Espionage and Counterespionage . . . . . . . . A43 Resistance Movements . . . . . . . . . . . . . A48 Soviet Bloc Intelligence Services . . . . . . . . A55 Psychological As pects . . . . . . . . . . . . . A59 Approved For Relealse 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Next 1 Page(s) In Document Exempt Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17: CIA-RDP78-03921AO( 08 FID0AVAI A former G-2 officer gives some personal views on how to mul- tiply the value of a military in- telligence asset. UNRECOGNIZED POTENTIAL IN THE MILITARY ATTACHES Lyman B. Kirkpatrick The system of U.S. military attaches, a worldwide liaison service which today is accredited to 75 countries, including five behind the Iron Curtain, is one of the least well understood of the Government's intelligence arms. Probably because of this lack of understanding its great potentialities remain rela- tively untapped. The military attaches have produced and are producing large amounts of intelligence information, and certain at- tache reports have been of significant strategic value. The Army attache in Tel Aviv correctly interpreted the Israeli mobilization of October 1956 as a war measure and determined the direction of the attack against Egypt. His prompt re- port, a key item in the intelligence which enabled the Watch Committee to alert the President to the impending Suez War, could be counted by itself a sufficient justification for the at- tache system's entire budget for the year. Service reporting from behind the Iron Curtain has also been of incalculable value, and that from many other areas has provided informa- tion of importance. As the attache systems become recurrently the target of economy drives in the Department of Defense, however, the lack of knowledge in the proper places as to what the attaches produce for the intelligence community grows apparent. At- tache reports are not often singled out for distribution to high departmental policy levels. Most of them are incon- spicuous elements of the routine reporting which keeps each military service up to date on the corresponding services of other countries. They contribute to the "finished intelli- gence" of the encyclopaedic National Intelligence Surveys; but officers at the policy level are unlikely ever to look at an NIS 10I.4 IDENTI~I~ Approvedor a ease 04/12/17 :CIA-RDP78-03921A000300300001-1 MORI/HRP from pg.01-06 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 CONFIDENTIAL The Military Attaches until, when a crisis hits, they have an immediate need for data on the Lebanese army or the Indonesian navy, and even then they do not necessarily remain conscious of the fact that it was the attaches who supplied these data. Nor is it always obvious at the policy level that there is a significant contri- bution from the military attache system in nearly every Na- tional Intelligence Estimate. It seems clear that the social rather than intelligence as- pect of the military attaches' work is weighed too heavily at certain levels in the Pentagon. Hence the attaches are criti- cized as "cookie-pushers" assigned to duty on the cocktail cir- cuit. It is true that the nature of the job in many capitals requires considerable social activity. In Washington itself, the papers abound with accounts of parties for or attended by the service attaches of the various foreign embassies. It may also be true that the attache staffs occasionally include some too socially conscious or ambitious officers who devote themselves too assiduously to the kind of intelligence collec- tion that is done over a glass. But that sort of thing can happen in any organization; it is something that can be reme- died quite quickly and easily by command action. It is important that a new dignity be given to the attache system and a deserved respect accorded it. It is important that the still untapped reservoirs of information needed by the Government which are available to military attaches be recognized and exploited. There are new areas that need to be covered, and old ones that should be covered better. There are new horizons of opportunity, and new approaches that can be used to obtain intelligence of utmost value. Coverage and Cross Accreditation Today there are 761 U.S. staff personnel serving in the at- tache systems of the Army, Navy, and Air Force overseas. The Army has 429 (143 officers, 212 enlisted men, and 74 civilians), the Navy 161 (157 officers), the Air Force 171 (145 officers, 22 enlisted men, and 4 civilians). There are army at- taches accredited to 73 countries, air attaches to 69, and naval attaches to 58. Army attaches are actually stationed in 69 countries, air attaches in 53, and naval attaches in 45. 2Approved For Release 2004/12/17: CIA-RDP7g- W b0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Military Attaches CONFIDENTIAL It has been the policy to accredit one attache to more.than one country in order to economize in manpower, because the activities of some countries in some military fields are limited. For example, there are army attaches in Costa Rica, El Sal- vador, Honduras and Nicaragua; but Air Force interests in these four countries are handled by the air attache in Guate- mala, and naval matters in all five republics plus British Hon- duras are the responsibility of the naval attache in Mexico City. There are other variations in service practices around the Caribbean. A naval attache is stationed in the Dominican Republic, but the air attache accredited to Ciudad Trujillo is stationed in Venezuela, and the army attache comes over from Cuba. Haiti, on the other hand, has an army attache in Port au Prince but is covered by the air attache from Caracas and the naval attache from Havana. While there is certainly not enough work under present conditions in many of these places to keep separate attaches fully occupied, the system of cross accreditation does create some peculiarities. Thus in Havana, where the Air Force rep- resentative covers only Cuba, the Navy's covers Haiti in ad- dition, and the Army's the Dominican Republic. Our military expertise on the Dominican Republic is partitioned among Ciudad Trujillio, Havana, and Caracas; a regional conference would have to be called to get the consensus of our on-the- spot representatives about the over-all strength of the Trujillo regime. Sometimes the changing currents of international relations create some curious situations in this representation from outside, and changes have to be made in accreditation. At one point the United States had no service attaches in the Sudan, the representatives of all three services in Egypt being ac- credited also to Khartoum. With the Sudanese more than a little suspicious of Nasr's designs on their struggling young nation, this doubling raised obvious problems. Today there is an army attache in Khartoum-a most important assign- ment with a military junta running the Sudan-and air affairs there are covered by the air attache in Ethiopia. Cross accreditation is of course economical, and it can be satisfactory in certain instances. But we should be aware that in this era of rising nationalism the armed services of Approved For Release 004/12/17 :CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 CONFIDENTIAL The Military Attaches those countries not accorded resident attaches may consider themselves slighted and so feel more kindly-and coopera- tive-toward the major powers that do keep attaches in resi- dence. It would be wasteful, to be sure, to assign naval at- taches to the Sudan or Switzerland, but the most powerful and influential nation on earth should be able to afford at least one appropriate service attache in every country that has a military force, however embryonic. That there will be more than enough to keep such officers actively and profitably employed I hope the following paragraphs will demonstrate. New Horizons One need only look at the number of countries where the military are today in full control, hold a dominant position, or at least exercise considerable political influence, in order to see the ascending potential of the role of the service attache. Taking the world region by region and noting only the more important examples of this situation, we find in Europe Gen- eral de Gaulle master of France, General Franco running Spain, and Marshal Tito ruling Yugoslavia, all of them de- pendent in one degree or another on support from the army; in the Middle East Egypt's Nasr and Iraq's Kasem, army of- ficers brought to power by military coups; in Africa Haile Se- lassie of Ethiopia relying on the loyalty of his imperial body- guard and the Sudan run by a military junta; in Asia the governments of Laos, Pakistan, and Burma subject to the will of the military and Indonesia pivoting on the key position of the army; in Latin America the army not the dominant fac- tor in domestic politics only by exception from the rule. In such countries, and in countries where the military may in future emerge as a powerful political force, the officers of the military services become a prime intelligence source and target. The U.S. service attache has as his first obligation, of course, the development of contact with officers on the chief-of-staff level of the service to which he is accredited. But the circumstances of the coup in Iraq point up the need for getting to know also the ambitious and rising young of- ficers who through ability or good fortune may achieve promi- nence at some future time. The attaches could by this means insure, not an advance warning of all future coups, but that there would be fewer surprises. ~pproved For Release 2004/12/17 : CIA-RDP78 bPA'W6 0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Military Attaches CONFIDENTIAL It is acknowledged that in many countries a too obvious or aggressive cultivating of friendships with military personnel by U.S. attaches would be viewed with disfavor-and prob- ably recognized for the surreptitious probing that it was. Some ingenuity and long-range planning would be required here. Initially the attache might be able only to spot up- coming young officers who should be approached later, per- haps by others, particularly since in many countries those that carry a political thrust are kept in provincial garrisons away from the capital. Sometimes the embassy, using the country-team system, could have people outside the attache's immediate office make the initial contact, develop the neces- sary rapport, or maintain a relationship which had been es- tablished. But a main avenue of long-term approach to future wielders of power starts in the United States. Every year hundreds of foreign military officers attend U.S. service schools. Per- haps not all of these will reach chief-of-staff level, but the expectation that they will achieve senior rank is implicit in their selection for the expensive visit to the United States. Consider, for example, that Admiral Larrazabal, who headed the junta that governed Venezuela between the overthrow of the Perez Jimenez regime and the election of Betancourt, had attended the U.S. Naval War College at Newport. We have thus an ideal opportunity to establish personal relationships that could in the future keep us informed on affairs of critical intelligence interest. I am not talking about recruitment of these officers as agents; it is a matter of de- veloping the conviction in a foreign officer that his, your, his country's, and the United States' interests are all identical, or so very close that it would be to his country's advantage, or at least not to its detriment, for him to confide in you. First, there should be a thorough, methodical system at the school for developing biographical data on each individual officer-not just the usual personal history statement or bio- graphical sketch, but knowledge of the likes and dislikes of the man and what makes him tick. Did his father fight with the Khalifa against Kitchener at Omdurman? Does he drink heavily, have occasional sprees or amatory adventures? Is he ashamed he can't afford a better home, feel he can't enter- Approved i0orase 2b04/12/17 : CIA-RDP78-03921A000300300001-15 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 CONFIDENTIAL The Military Attaches tain Americans? What are his cultural interests-music, Goethe, chess? Has he been discriminated against because of his race? Where does he want to end his career-as chief of staff? as constitutionally elected president? as dictator? or as a professional officer who has served his country well? And how does he see the future development of his own coun- try? Which great powers does he think can best help it? Much of this information can be assembled by the faculty of the school in question. But intimate insight into a man's character, and especially the establishment of a rapport that would yield continuing intelligence dividends, would require that as often as feasible and practical the U.S. officer destined to be assigned to a country become a classmate of its poten- tially influential students at a U.S. service school. The iden- tity of interest among classmates creates a strong bond. If a foreign officer attends a U.S. school it can be assumed that his English is passable. But this should not lead to any relaxing of the attache's effort to acquire fluency in the lan- guage of the country to which he is assigned. The psycho- logical advantage of knowing the language is tremendous. An intelligence officer's objectives are much easier to reach if his foreign contact senses in him not a superficial, self-seeking interest but a true and deep understanding based upon knowl- edge of the country's language, history, and customs and an appreciation of its people. Such specialization, it is true, im- plies a relatively long assignment at the post in question. The full implications of this long-range approach for the personal career of a military attache may appear rather for- midable in terms of present-day concepts. A year or two spent learning language, area, and customs, a year or more at a service school to cultivate the friendship of a foreign officer, and at least a double tour of duty in one country-these may add up to a third or a half of the U.S. officer's entire active military career. But if we are serious about our intelligence effort, this is a way to give new significance and worth to the attache system, and the long-term benefits should certainly be high. 6Approved For Release 2004/12/17: CIA-RDP7F%'0Y,&Wlll'?~b0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET A radical proposal for control- ling the substance of routine in- formation reports from over- seas and getting them promptly to consumers. DESIGN FOR JET-AGE REPORTING William Earling Transmitting information from its variegated and far-flung collectors to users in the complex intelligence community is necessarily a tremendously complicated business. In our pres- ent situation the natural complexity is compounded by our having been content to handle nonpriority materials by means evolved with little change from communication systems of the archaic past in separate departments and agencies. In 1900 the few copies of dispatches from abroad required in Washington could be supplied by carbon copies typed in an em- bassy and forwarded by ship pouch. The only improvements we have introduced for routine reports since then are to use mats or stencils instead of carbon paper and to forward them by air instead of by sea. Given the vastly increased volume of reporting, this speed-up in means of transportation has not been able to prevent a net slow-down in the flow of information. Dispatches are still directed back to parent departments in Washington through many separate channels. There are departmental reviews, revisions, retypings, reproduction. Mail rooms and secretariats distribute them to other interested departments and agencies, which in turn route them by messenger to sub- ordinate components. At every stage they queue up in front of logs and registers. The average transmission time for routine reports has come to be measured in months, and some stray documents take more than a year to make their way through the maze. It is true that the community is not suffering critically from delay in receipt of priority information transmitted by radio and cable. Although much of our rapid communica- tions system is also archaic, radical improvements have been MORI/HRP from pg. 07-17 dE Approveorr Release 2004/12/17: CIA-RDP78-03921A000300300001-'1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET Design For Reporting made in some segments. Others are needed and possible, but this article will limit its concern to routine dispatches and information reports. For them we need a new, much faster system, though not necessarily so fast or so expensive as for cables. The model intelligence reporting system would connect all components of the community through one integrated com- munications network. This network would have the capac- ity to move all intelligence from reporter to consumer within, say, 24 hours. It would have standard, streamlined, auto- matic procedures for handling information at both ends of the line, with no room for backlogs, personal procrastination, or processing delay. This model is something we can aim at, but we must begin at some modest and practical beginning. Let us then examine the design of a not too expensive system to speed the sluggish flow of information reports from overseas perhaps not fifty- fold but ten. Most analysts would find it not bad to be sure of getting all routine information, down to the lowest priority, within a week of its dispatch. Triplicate Problem The time required for the many processing steps that inter- vene between reporter and consumer, a time exponentially increased with volume as each report waits its turn at each processing station, is central to our problem, but it is not the whole problem. If we concentrate on the mechanics of getting pieces of paper from point to point as fast as possible without considering their substantive purport we are ignoring one side of the coin. That the current volume of reporting is outgrow- ing our ability to handle and use it effectively is manifest not only in unacceptable delays but in consumer complaints that they receive too many reports they do not need while failing to receive information they do need. Collecting components retort that consumers fail to let them know through standard evaluation procedures which of their reports are useless and to keep them informed through the standard placing of re- quirements precisely what is needed. A lack of communica- tion between the two elements is evident. 8Approved For Release 2004/12/17 : CIA-RDP78-03921AV6M0300001-1 Approve For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Design For Reporting SECRET It is clear that better guidance would improve the quality and reduce the volume of reporting; and this smaller volume of better material could in turn be handled more speedily. Formal collection requirements alone cannot do the job: the hungry analyst writes his requirements loosely in order to be sure of getting everything that bears on his subject, and the avid reporter in the field will find some bearing on some requirement in almost everything. Nor is the present con- sumer evaluation procedure sufficient to the purpose : in all of FY 1958 CIA, for example, received only 25 spontaneous eval- uations of its CS reports, and of those rendered on particu- lar request most were too slow coming-from an average six months up to almost two years in instances-to be useful as a basis for corrective action. What is needed is some new sys- tem for rapid and frequent user criticism of individual reports in order to point up good material and weed out at the source any information below the level of significance for the intelli- gence community.' A third facet of our problem, bearing both on the delay of information and on the analyst's dissatisfaction with what does show up in his in-box, is the practice of successive dis- semination through organizational channels, through office or division and branch or section to the individual user. A central mechanized dissemination direct to individuals would save time, but Air Intelligence experiments with such an automatic system 2 indicate that a great deal of excess paper is pumped into the mill by a straight-faced, undiscriminating machine presented with imprecisely defined user require- ments. If we can find some way to pinpoint in machine lan- guage exactly what each individual analyst requires, we can give him more nearly what he wants and give it to him faster. 1For earlier treatments of this problem see William P. Bundy, "The Guiding of Intelligence Collection," Studies III 1, p. 37, and Lowell M. Dunleigh, "Spy at Your Service, Sir," Studies III 2, p. 81. a Described by Paul A. Borel, "On Processing Intelligence Informa- tion," Studies III 1, p. 32. For other aspects of mechanized Air In- telligence information handling see two articles in the series on "Developments in Air Targeting," Outten J. Clinard's "Data Han- dling Techniques," Studies III 2, p. 95, and Kenneth T. Johnson's "Progress and Future Prospects," Studies 111 3, p. 53. d Approve ForERelease 2004/12/17 : CIA-RDP78-03921A00030030000191 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET Design For Reporting The problem is then a three-fold one-to speed transmission and processing of reports, to improve by guidance the quality of reporting, and to make dissemination faster and more re= sponsive to precise individual wants. These needs are inter- related in something of a vicious circle: delayed and indis- criminate distribution of reports to users breeds delay in get- ting evaluations of them back to the originators; user disin- terest in outdated information extends to disinterest in com- menting on it; lack of evaluative comment means more in- discriminate reporting and dissemination; a greater volume of reports produces still more delay. If we can significantly cut the transmission and processing time and better tailor our dissemination, users will better recognize their own in- terest in feeding back substantive appreciations to the collec- tor; and the collector will be enabled by prompt user com- ment to stop wasting his precious manpower on marginal and submarginal operations and spurred to concentrate it on pro- ductive enterprises. Design for Speed The design here exhibited of a new system to cope with this triple problem was developed for experimentation on the CS reports of CIA. One of its central features is a roll of per- forated paper tape. In its most familiar form it is the tape produced by the perforator unit of a standard M-19 teletype machine, with its rows of up to five holes in different position combinations, each representing a letter or function punched on the keyboard of the machine. When this tape is fed into the M-19 transmitter-distributor each perforation produces an electrical impulse in a channel corresponding to its posi- tion, and these impulses are used to key a page printer, or if desired produce an identical tape, at the other end of a tele- phone line or radio circuit. A postwar development, the fiexowriter, has adapted the tape communicator principle to the electric typewriter with its richer keyboard and smaller print. An increase in the number of impulse channels and corresponding perforation positions on the tape permits enough additional combinations to carry both capital and lower-case letters and some char- acters and functions, such as semicolons and tabulation, that the teletype machine cannot perform. Experimentally we Approved For Release 2004/12/17 : CIA-RDP78-03921A 5996300001-1 ApprovedrFeir a sR , nV/17 : CIA-RDP78-03921A00030030QQQj can use either the M-19 or a modified flexowriter in our design, but the M-19 is a bit crude for finished reports and the ad- vantages of the flexowriter are largely vitiated by our need to stick to five channels in order to keep the tape compatible with other communications equipment. Both machines are too noisy. New tape-producing typewriters are being devel- oped which will suit us better than either of these. It is not that we are proposing electric transmission of all routine information reports, not yet at any rate. But we are borrowing many features from cable procedure, and our system will if necessary be immediately convertible, in whole or in part, to one using electric means. The prepared tape can be automatically scrambled into a quite meaningless pattern of perforations. Thus encrypted, it is secure for radio transmission or, in our design, for air- mailing by whatever means is fastest. In practice, this means will probably be the unaccompanied State Department pouch if arrangements are made to get it on the first available plane without waiting for other material to accumulate: the State pouch cannot be bumped by the air lines and is not held up in customs. The tape should take sometimes as little as one day to reach its consignee, rarely more than three. In the experimental procedure, then, a routine CS report is typed in the field, beginning with its operational cover sheet, on a tape-producing typewriter. The report will be in the form, a compromise between cable and dispatch format, in which the analyst will in a few days, we hope, find it on his desk; the first manual typing will be the only one in all but exceptional instances. Form headings and other repetitive material need not be so typed even here: a standard tape carrying them can simply be run through. Carbons or a mat in the printer will take care of local dissemination and record copies. Encrypted and pouched, the tape bypasses in effect all registries in the field and in Washington-a carbon by the usual accompanied pouch will satisfy their needs-and is de- livered with only a pause for automatic decryption to the CIA Cable Secretariat. The Secretariat operates day and night with its own courier service and whatever staff is necessary SECRET 11 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Aeoved For Release 2004/12/17: CIA-RDP78-03921A000300300001-1 Design For Reporting to get cables to their users within an hour or two of receipt. It has developed exceedingly effective procedures, and this bit of borrowing on our part from cable usage will be impor- tant both materially and psychologically. In the Secretariat the unscrambled tape is run through a printer, typing original and carbons of the operational cover sheet, mat and carbons of the report. Responsibility for releasing the report, however, still rests with the controlling area desk, and that for indicating its dis- semination belongs jointly to the desk and to CIA Central Reference. A Central Reference expert will be on duty in the Secretariat, and as soon as the mat is typed he will read it against user requirements and note on its face the proper recipients, as far as possible individual analysts. In the mean- time carbons of the report, along with the original and carbons of its cover sheet, have gone to the area desk. If it can be released without further ado, it goes back immediately, as- signed a number and showing the addressees prescribed by the desk, to be added to Central Reference's designations. If it requires consultation, comment, or correction, it is held up, possibly a day or so, for these. There will be check-up and inquiry about overdue releases. Back in the Secretariat, the report number, dissemination instructions, desk comments, and minor corrections can easily be added either on the mat or to the tape, and the tape can either type a new mat or be fed by teletype to the consumer. At some future date the whole community may be sufficiently linked in a secure teletype network that most of the distribution can be accomplished by feeding the cor- rected tape into it. Considering the usual need for a courier at the receiving end of the teletype line, however, courier service from the Secretariat direct to individuals like that in present use for cables might be at least as fast for many ad- dressees. When there are a large number of recipients at one location, as at the Pentagon, the tape and teletype might be used to print a mat at a central cable center there, say the Army Staff Communications Office, which could then make distribution to Army, ASA, Air Force, Joint Chiefs, and Secre- tary of Defense offices. 12 gECR~~ Approved For Release 2004/12/17 : CIA-RDP78-0392TiJQDD300300001-1 Approved F9r R Iea a 20 4/12/17 : CIA-RDP78-03921A0003003QPe%~T1 Design I-or epor mg Field preparation of the tape may have taken a day, trans- portation as much as three, Secretariat processing possibly another, desk release and distribution perhaps a couple more. When the user analyst gets his information it will probably be no more than a week old. He could get it faster only with a large-scale and costly introduction of new radio and cable circuits with advanced terminal equipment. Field offices and their controlling headquarters desks will find not only their reporting but also their considerably greater volume of opera- tional correspondence all moving at this speed. Design for Guidance and Coordination This speed alone will help feed back to the source an opinion on the usefulness of his information, but as we have shown, a new medium is needed for communication from user analysts to the originators of reports. We propose a new evaluation procedure, centered on a form bearing a deadline for return. It will call for a quick appraisal by the analyst of the value, credibility, and adequacy of each report in meeting his require- ments, with ideas on how it could have been made more useful. We should like eventually also to get here the analyst's com- ments on its subject-coding, information which should in time build up to yield greater precision in stating requirements, making dissemination, and retrieving documents from stor- age. Comments on subject-coding would not be possible under present procedures: information reports as now disseminated have not yet been coded. But in our system the Central Reference expert on duty in the Cable Secretariat who reads a report to determine its proper recipients could also assign it ISC and area codes. If the interposition of this step before dissemination seems an added complication when we are try- ing to get a report to its users as fast as possible, it would not really take extra time, and the pay-off in getting analysts to think in terms of the codes and in making Central Reference aware of analysts' criteria for coding should be enormous. The evaluation form will accompany reports sent to those analysts whose feedback is worth exploiting, the specialists concerned with the subject matter reported, those responsible for writing collection requirements on it, those whose work SECRET 13 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 m d For Release 2004/12/17 : CIA-RDP78-03921 A000300300001-1 S1E Design For Reporting will suffer if information is not adequately retrievable because of imprecise coding. It stands to reason that their coopera- tion will be quickly rewarded by receipt of fewer reports which are of no interest to them, by retrieval of filed mate- rials they need in research, and by the more direct and effec- tive contact with collectors made possible by their responses. The form will be designed for simple answers and multiple- choice checks both for the convenience of the analyst and to facilitate later processing. In past experience, more than half of the elaborate old evaluation forms are returned with check marks only, no substantive comments whatever. For the most part, therefore, punched-card processing of the new forms will eliminate carbon or reproduced copies and obviate manual sortings and distribution. One operator can punch six to eight hundred forms onto cards in a day. All derived products, except those including lengthy analyst comment. will be tailor-made machine tabulations. Feedback for Coders Every theoretical discussion of retrieval problems brings out the inevitable human limitations in the coding process.3 Central Reference document analysts are not omniscient uni- versal geniuses; in assigning the apparently pertinent codes they are bound to overlook or not to be aware of angles under which retrieval might in the future become necessary. This is the primary criticism leveled at the present library system by personnel using it. The Intelligence Subject Code, espe- cially with the refinement of its current revision, will be a splendid instrument, useful exactly to the point to which coders properly foresee the headings under which material may need to be recovered, but no further. The better and more widely known the ISC, the more it is directly used and contributed to by experts in their various fields, the better the retrieval system. If when its revision is complete we could provide a space on the evaluation form for analysts to suggest coding in other categories than those as- signed by Central Reference, analysts would become more fa- 'See for example George W. Wright, "Toward a Federal Intelligence Memory," Studies 11 3, p. 7, and Paul A. Borel, "On Processing Intel- ligence Information," Studies III 1, p. 25. 14 Approved For Release 2004/12/17 : CIA-RDP78-03921) ~~8?60300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Design For Reporting SECRET miliar with the coding systems, and any analyst who received a report could take care of his own interests by thus nomi- nating the appropriate codes. Mechanically, the additional entries could be referred to Central Reference coders in weekly tabulations. These could show report numbers, the additional codes proposed for each, and the names of the contributing analysts. They could be arranged by document or ISC number or in whatever order would be most conducive to integrating them into the system after any necessary discussion with the proponents. Once this feedback process had been under way for some time and analysts had become used to it, it is hoped they would develop such confidence in the ability of the library- particularly as mechanization provides increasingly reliable and rapid service-to retrieve what they need that they would be willing to dispense with the bulk of their own holdings of indexed documents. Without participation in the coding process we believe this confidence could not be established. Feedback for Disseminators If we are to achieve the speed and efficiency of mechanical dissemination from a central point direct to individual analysts, their individual requirements, as we have noted, will have to be stated with precision and kept up to date by a feedback system suitable for mechanization. Under such a system, dissemination can take place by ISC subject codes, and the assignment of codes to a report would automatically indicate its dissemination. But coded requirements as well as coded reports are a prerequisite for such a mechanized process. The analyst will be properly skeptical that his subtle needs can ever be fully stated in machine language, and certainly some unusual spot requirements will have to be handled out- side any mechanical system. But most requirements can be sufficiently codified to take care of the great routine bulk of dissemination. A codified statement of an analyst's require- ments may be derived in the first instance by tabulating his response over a period of some months to key questions on the evaluation form for all the reports he received, along with their assigned subject codes. Document analysts could trans- Approver VOWTelease 2004/12/17: CIA-RDP78-03921A0003003000011'f Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET Design For Reporting late this tabulation into a tentative Statement of Require- ments, to be refined in discussion with the analyst concerned. The resultant agreed Statement of Requirements would be used as the basis for current dissemination to him, and it could be kept up to date by the continuing feedback of his evaluations. This feedback system, properly used, will tend to give the analyst and his supervisor direct control over the volume of information delivered to his in-basket. The supervisor is an interested party because of his responsibility for an equitable distribution of workload to his subordinates, in practice a most difficult task. Most supervisors carry their own workloads and do not inspect their subordinates' in-baskets at regular intervals. Tabulations of the evaluation form by name could provide them every week or at any convenient interval with a list of the reports their subordinates took in and their re- actions to them. This tool might be a considerable aid to proper workload distribution. Feedback for Collectors Most of the questions on the form will be designed to guide the collector. Headquarters can use the answers, incorpo- rated into punched card systems covering operational data, sources, project numbers, and lists of requirements, to fur- nish the field, in tabulations by station or base and source cryptonym, the evaluations placed on all of their reports, matched up against requirements levied on the station. Head- quarters desks and staffs will be able, in their planning and control functions, to use not only these but other tabulations, for example listings by project and source of reports and their evaluations, lists by requirement numbers of evaluated reports responsive - to requirements, and a variety of statisti- cal. compilations. If evaluations run consistently high on a low-cost source, there will be little question about the renewal of his operation. Adverse reactions will provide an indication to the desk and staff that a situation needs to be looked into. User rejections will not be drowned in the stack of paper sur- faced once a year in the project renewal process, but will lead to an examination of all pertinent facts and the prompt clos- ing of marginal operations. Desk and staff personnel will be 16- proved For Release 2004/12/17 : CIA-RDP78-039210300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Design For Reporting SECRET freed from the routine bookkeeping chores now required to keep track of field reporting. From Prototype to Production Model This design for speed and guidance has undergone limited tests on the reporting of a major field station, and it has been found to produce at least the short-term benefits antic- ipated. It is still in the prototype stage, however, subject to modification in more extensive testing planned as equip- ment becomes available. It may be that new technological developments, for example photographic or magnetic tape en- cryption processes now being investigated, will make major changes desirable. In any case it will require adaptation to varying local needs in the field before it can be generally ap- plied to the reporting of even this Agency. There will be many obstacles to the integration of the re- porting of the whole community in a single system. They will have to be tackled slowly, and piecemeal. The easiest be- ginning will probably be on the receiving end, with the ex- tension of rapid dissemination and the application of some better evaluation system in those agencies, notably Air In- telligence, that employ the Intelligence Subject Code. Ef- forts are now under way to standardize the format of all com- munity reporting. For all its tentative and limited nature, our design does provide a basic concept and may embody some specific features that can lead to an ultimate integrated re- porting system. Approved'BCPRdlease 2004/12/17: CIA-RDP78-03921A000300300001 17 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET Significant advance and recal- citrant bugs in the procedure for urgent intelligence flashes. NOTES ON THE CRITIC SYSTEM William A. Tidwell "A true critick ought to . . . communicate to the world such things as are worth their observation." Joseph Addison's job description in 1712 could also be the motto for a special CRITIC set up by the intelligence com- munity in mid-1958, the reporting system responsive to a di- rective that critical intelligence be communicated from the field to the "highest authorities" in "speeds approaching ten minutes." CRITIC does communicate rapidly to this high executive world things that are worthy of their urgent at- tention, specifically indications of international crisis or im- pending military hostilities. If, in its present state of develop- ment and with the communications hardware now in use, there are relatively few occasions on which a CRITIC message actually moves from reporter to intelligence user in ten min- utes' time, the establishment of the system has nevertheless made radical changes in the flow of critical intelligence to Washington, and messages handled under it take only a frac- tion of the average time required for similar messages before its inauguration. Establishment and Performance The intelligence community has always been concerned with the rapid reporting of urgent items, but a systematic community-wide assault on the problem did not get under way until the autumn of 1957. At that time a study of the reporting related to the Turkish-Syrian crisis and certain selected indicators of Soviet military activity demonstrated that many critically important items were being handled in a routine manner and that they frequently required more than 24 hours to reach the White House. In terms of aver- ages, a message containing information such as is now han- dled in the CRITIC system would take nine hours and a half MORI/HRP from pg. 19-23 Ap p rovedSOPKe lease 2004/12/17 : CIA-RDP78-03921A0003003000011- Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET The CRITIC System to move from the field reporter to the intelligence user in Washington. The results of this study were given to the President's Board of Consultants on Foreign Intelligence Activities, which, with the concurrence of the IAC, recommended to the President that the problem be attacked with the utmost vigor by the intelligence community. This recommendation was approved by the President, and the community initiated ac- tion on two fronts, that of facilities and that of procedures. The first resulted in the promulgation of NSCID No. 7, desig- nating the Department of Defense as executive agent for creating and managing a world-wide communications system for the transmission of critical intelligence. The second led to the establishment of the CRITIC system of procedures for rapid reporting over this world-wide communications net. From the beginning it was obvious that the initial decision as to whether an item of information is of critical nature would have to be made by the field reporters. At the same time it was clear that field reporting personnel, not always apprised of all the related information available in Washing- ton, might err in their judgments. It was necessary, there- fore, while giving as much guidance as possible to the field, to reserve to intelligence headquarters in Washington the opportunity for final evaluation of CRITIC items before pass- ing them to the White House. Critical intelligence was therefore defined as "information indicating a situation or pertaining to a situation which af- fects the security or interests of the United States to such an extent that it may require the immediate attention of the President," and in DCID No. 1/8 specific categories of infor- mation considered to fall under this definition were listed. Field reporting personnel of all intelligence agencies were di- rected to prefix the indicator CRITIC to all messages con- taining information under these headings and to forward them under high precedence by the most rapid communica- tions means available. It was arranged that in Washington messages carrying this indicator would receive simultaneous electrical dissemination to all the main USIB agencies and to the Strategic and the Tactical Air Commands. The system was put into effect on 21 July 1958. 2A, fAW For Release 2004/12/17 : CIA-RDP78-039210300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The CRITIC System SECRET Like most new undertakings, the CRITIC system operated with a certain amount of creaking and groaning during the first few months, but its effect on the speed of reporting was immediately apparent. CRITIC messages already moved from field reporters to intelligence users in Washington in an average of about an hour and a half, as against the 91/2-hour average during the Turkish-Syrian crisis. The Critical Com- munications Committee, monitoring the system on behalf of the USIB, spent a great deal of time refining the interpreta- tion of various categories in the CRITIC list and unsnarling procedural problems as they were identified. By the end of the first year of operations the average transmission times had dropped to an hour or less, an accomplishment made possible by improvements in the hardware and operating pro- cedures of the supporting communications services along with better handling of the traffic in the intelligence agencies. Persistent Problems The progress achieved by the CRITIC system has thus been excellent, but a number of problems remain to be overcome before it can reach full efficiency. For one thing, it can func- tion perfectly only if the messages are kept short, but field reporting personnel have not all learned yet to be as concise as possible. It is still not unusual for a message to contain hundreds of groups, and one even reached the 3,000 mark. It is obvious that these messages cannot be put through in ten- minute service by present communications equipment, operat- ing at 60 or 100 words per minute. Long messages to de- scribe a complex situation could often be obviated by a series of short messages sent as the situation develops. Some headquarters personnel have been misled by the defi- nition of critical intelligence as matter for "the immediate at- tention of the President" into thinking that each CRITIC message should in itself be something of an earth-shaker. But there are a number of categories of CRITIC items, indi- cators of Soviet hostile intent, which become critical only as they form a critical pattern. The pattern, however, can be discerned only in Washington, by the combination of its sev- eral elements; and field reporters without access to the rest of the pattern must therefore give CRITIC handling to in- Approved br~elease 2004/12/17 : CIA-RDP78-03921A000300300001-1~ Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SECRET The CRITIC System dividual elements, items which may prove in Washington to be isolated events of relatively little significance. Some reporting personnel have not understood that the handling of CRITIC messages in Washington is organized on a community-wide basis, that the CRITIC designator is less a communications precedence indicator than an addressee group which automatically ensures immediate distribution by electrical means to all appropriate addressees in the Wash- ington area. Their consequent designation of multiple ad- dressees has increased handling and processing time and de- layed delivery to intended recipients. One reporter even ad- dressed a CRITIC message to the Chairman of the Joint Chiefs of Staff, causing General Twining to be awakened in the middle of the night and blocking delivery of the message to its proper recipients until he could authorize its release. Such shortcomings as these, however, are probably inevi- table when a large number of widely dispersed people are called upon to learn a new system of operation; experience and fur- ther training of both intelligence and communications per- sonnel should greatly improve performance in these respects. More recalcitrant is a problem arising from a communica- tions fact of life: in a number of highly important countries of the world, including those behind the Iron Curtain, the U.S. Government cannot maintain its own communications facilities and is dependent upon commercial facilities or the monopolies of the governments concerned, which of course do not recognize the comparative precedence assigned a mes- sage within the U.S. Government systems. Some of these governments might be willing on a reciprocal basis to grant us the right to operate our own communications, but the granting of such rights in the United States is contrary to U.S. policy. Communications from these forbidden areas are generally the responsibility of CIA and the Department of State. Both organizations are hard at work on the problem, and there is some hope that improvements can be effected. In the communications systems operated by the U.S. Gov- ernment, considerable additional improvements are planned or under way. We have good reason to believe that CRITIC messages handled by these facilities can achieve average 23pproved For Release 2004/12/17 : CIA-RDP78-03921$0l3b0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The CRITIC System SECRET speeds of 10 minutes or less within the very near future. Nu- merous test messages transmitted in substantially less than ten minutes prove that the goal of "speeds approaching ten minutes" is attainable under the right conditions. The CRITIC system will become a "true critick," however, only by virtue of alert and efficient support from a great number of intelligence and communications personnel in many agen- cies of the Government. Great strides have been made, but there is still work to do. R Approved Forr Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY A critical review of prewar Jap- anese military intelligence op- erations in Manchuria. ANTI-SOVIET OPERATIONS OF KWANTUNG ARMY INTELLIGENCE, 1931-391 Richard G. Brown Japanese military intelligence operations against the Soviet Union in the Far East became of prime importance after Japan took over Manchuria in 1932. Before that she had no great need for intelligence on the Soviet forces in the Far East, inasmuch as she had no common international bound- ary with the U.S.S.R. on the continent, the Chinese being in control of most of Manchuria. At the time of the Man- churian incident the Japanese nevertheless had potentially strong operational intelligence assets in numerous inhabit- ants of the Korean and Chinese border areas who were able to cross into Soviet territory with relative ease so long as So- viet security remained generally lax. In addition, there were numerous anti-Communist White Russians in northern Man- churia willing and able to engage in intelligence activities for the Japanese. The intelligence operations of the principal Japanese agency in Manchuria, the Kwantung Army, included propa- ganda, sabotage, counterintelligence, and what was to be- come a major collection effort on the Soviet army and the geography of the area. The means it employed included the dispatch of secret agents into Soviet territory, the intercep- tion of radio communications, the interrogation of Soviet de- serters and defectors, and the establishment of border ob- servation units. This article is based on historical data compiled, with the assistance of personnel of the Japanese Kwantung Army, by the Military His- tory Section of Headquarters, Army Forces Far East, and distributed by the Office of Military History, Department of the Army. The MORI/HRP principal source is Volume X of the Series Japanese Special Studies from pg. on Manchuria, issued in June 1955 under the title "Japanese Intel- ligence Planning Against the USSR." 25-34 OFFICIAL USE ONLY 25 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Kwantung Army Intelligence From the first the Kwantung Army and the Army General Staff in Tokyo were alert for indications of Soviet reaction to the Manchurian incident, and after Kwantung Army ele- ments moved into the Soviet sphere of influence the surveil- lance of Soviet actions in the Far East, particularly any mili- tary movements, was intensified. Yet Japanese military headquarters felt that the Soviet Union had no intention of intervening in the situation, and so devoted its attention not to immediate countermeasures but to consolidating the Japa- nese position in Manchuria and developing an extensive in- telligence network as Kwantung Army units advanced toward the Soviet border. This intelligence effort was intensified as Soviet border defenses improved: aerial photography during the summer of 1933 revealed extensive fortifications designed to check Japanese military operations against Soviet terri- tory. Agent Infiltration The principal field intelligence units under the Intelligence Section of the Kwantung Army staff were eight Army Special Services Agencies. Of these it was the unit in Harbin which played the major role in the Manchurian operations. The Harbin ASSA used White Russians for espionage missions, and these were the best of the agents available. The border area ASSA's occasionally used White Russians, but relied mainly on local Chinese and Koreans. These agents were in- filtrated into Soviet territory to carry out espionage. Occa- sional deserters from the Soviet army were also exploited for information. The Soviets commenced to bolster border security during 1935. They increased the number of border garrison units, ordered the evacuation of border area inhabitants, and insti- tuted constant patrolling. A Soviet counterespionage network in Manchurian territory, especially in the border area, regu- larly observed and reported on the movements of Japanese agents. The White Russians, while more reliable and compe- tent than other agents, being most of them ardent anti-Com- munists, were more easily detected. Many were shot in at- tempting to cross the border, and the majority did not re- turn, thanks to effective Soviet security. A deadlock in trans- border operations resulted. ArQL- For Release 2004/12/17: CIA-ROR~~ J2 J UO~OY300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kwantung Army Intelligence OFFICIAL USE ONLY The standstill in intelligence operations was quite embar- rassing to the Kwantung Army's headquarters Intelligence Section, which therefore came increasingly to take over the active direction of the intelligence services in Manchuria, par- ticularly of the ASSA units. Efforts were made to improve techniques of agent infiltration, to take more pains in forging credentials, to pay more attention to dress, baggage, and lan- guage, to give better training for missions and reporting. At- tention was also given to other means of intelligence collec- tion-communications, publications, and telescopic observa- tion. Communications Intercepts Soviet communications in the Far East relied mainly on wireless; the wire network had failed to keep pace with the mushrooming military and industrial expansion. A very con- siderable number of Soviet message circuits were thus vul- nerable to interception. In order to learn the techniques for breaking codes, the General Staff in Tokyo had sent several technical officers to Poland in 1933 and 1934: the Polish Army General Staff's cryptanalytic work was considered by the Jap- anese to be among the best in the world. When the first con- tingent of these officers returned from Poland in 1935, a small unit for studies on radio interception and the breaking of So- viet codes was formed and assigned to the Kwantung Army. Eventually this unit was expanded and became known as the Communication Intelligence Group, operating directly under the supervision of the Kwantung Army intelligence service. The interception and analysis of Soviet plain-text messages was not undertaken until 1936, when the Soviet Union began to construct the Baikal-Amur Magistral to supplement the Trans-Siberian Railroad. The BAM line was a matter of grave concern to the Japanese General Staff, but the Kwantung Army Intelligence Section had no means of observing the prog- ress of construction on it. The Operations Section there- fore took the initiative and asked the Japanese-controlled South Manchurian Railway Company to establish a branch of its Communications Research Department in Harbin. This branch was charged with intercepting plain-text wireless mes- sages concerning construction on the BAM line and with E ?7 20/12/17 : CIA-RDP78-03921A00030030000 1 Approve d For Release Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Kwantung Army Intelligence d a y y A az ? ~o >(9 r - . \yt E k- ` - m v 1 ( 0 ?1 r L , s t 4 1 ;~ 1 - !2 ti..y ~L( / C U p j c d} m (proved For Release 2004/12/17: CIA-R1Bff719j6900b&00001-1 Approved IA-RDP78-03 I3V3 Kwantuneg Army20 Inte 04/1llig/1e7nce OFF118 00P 08NJY analysis of the intercepted data with respect to selected sub- jects. Although this installation supplied data to the intel- ligence network through the very active Harbin ASSA, the fact that it was conceived and supervised by the Operations Section became an irritant in this Section's relations with the Intelligence Section. The success of the Railway Company's unit led the intelligence service to supplement its code inter- ceptions with clear text intercepts, which were thereafter forwarded on ticker tape to the Harbin ASSA for analysis by its Document Intelligence Division. Document Analysis The importance of available Soviet publications, primarily newspapers published in the Far East, had somewhat belatedly become apparent to the Japanese, and the few publication analysts originally assigned to the Harbin ASSA had been aug- mented and formed into the Document Intelligence Division. Its staff included a large number of White Russian intellec- tuals, as well as Japanese competent to interpret and analyze Soviet documents, publications and messages. Periodicals, handbills, newspapers, magazines, books, booklets, pamphlets, and even personal notebooks collected by the various intelli- gence agencies were sent to the Harbin ASSA for scrutiny. Later, when it became difficult to obtain documents, greater importance was attached to Soviet radio broadcasts, along with the intercepted clear-text wireless messages. But there were still documents obtained by agents, papers carried by the occasional defectors from Soviet territory, and in one instance a windfall of postal communications from a Soviet mail plane which made a forced landing in Manchuria in 1938. Border Observation In the early thirties the military units of the Kwantung Army manned posts for visual observation of Soviet terri- tory; each front-line unit had a few lookout posts equipped with 24-power battery telescopes. After the difficulties in intelligence collection became acute in 1934, the intelligence service undertook to improve and expand this system as an intelligence activity. The observation posts were organized as "Soviet Territory Observation Teams" who were to keep the Soviet side of the border under surveillance day and night, ri,& 29 Approve orlfefease'2Q04~12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Kwantung Army Intelligence recording in detail the movement of even a single soldier, horse, or vehicle. The posts were each manned by approxi- mately one squad. They used telescopes of various types, ranging up to one of 150 power obtained from the Navy for night use. The front-line Army commands were ordered to make use of any suitable points in their respective sectors for this purpose, and to train and supervise the personnel to make the observations. Nevertheless, up until 1938 these teams were often composed of inferior personnel and occa- sionally even lacked telescopes. Some of their more impor- tant reports were on the arrival and departure of ships in Vladivostok harbor, as observed from posts at Wangchaoshan and Tumentzu, and on the arrival and departure of aircraft at Voroshilov, as seen by posts at Suifenho and Tungning. Achievements and Failures By mid-1939 the Kwantung Army's intelligence agencies had scored considerable progress in improving their operations. In 1935 the communications intelligence Research Unit had succeeded in breaking the simple codes used by the Soviet border forces, and constant study brought later successes against Soviet army codes of three and four letters. Although these codes were not commonly used for important messages, the Research Unit was nevertheless able to learn the organi- zation and disposition of some border garrisons and the loca- tion and movements of some air units. It also did traffic analysis, compiling statistics on the origin and volume of So- viet radio messages. The interception and study of plain-text messages by the South Manchurian Railway's Communications Research De- partment yielded considerable information about the progress of construction on the BAM line. The Kwantung Army's Re- search Unit was also able to obtain from plain-text intercepts some valuable indications about particular military situations in Asiatic Russia. Analyzing this data, the Document Intel- ligence Branch of Kwantung Army intelligence was able to reach conclusions about the disposition of units, changes in units, their commanders, their numerical designations, the arrival of new personnel, and their places of origin, as indi- cated by messages of safe arrival sent home. Messages in the 3Approved For Release 2004/12/17: CIA- F F fA 9I4?A3W0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kwantung Army Intelligence OFFICIAL USE ONLY clear also supplied many fragmentary details about industrial and economic conditions in Asiatic Russia, and these often contributed to important findings. The piecemeal data compiled by the Harbin Document In- telligence Division was on many occasions helpful to higher echelons in making estimates of the enemy's strength and disposition. A compilation of file cards on approximately 4,000 Soviet officers in the Far East, for example, contributed significantly to ascertaining the order of battle for Soviet army forces in eastern Asia. An unusual operation under- taken by the Division was the examination of postal matter in the Soviet mail plane which made a forced landing in Man- churia in 1938. The mail had to be secretly opened, sorted, copied, and resealed while diplomatic negotiations for the return of the airplane and its crew were being carried on. The analysis of the material was completed within a month. The observation teams engaged in telescopic surveillance of Soviet territory produced some information but on the whole were not notably successful. They provided details on Soviet fortification improvements in parts of the border zone and on new military roads, barracks, and warehouses behind the fortifications, and they compiled statistical data on vehicle operations supporting the fortified zone. Efforts of the ASSA's to penetrate Soviet territory with spies were nearly all failures, but their interrogation of fugitives from Soviet territory often uncovered important information. A test of the Kwantung Army's intelligence services was afforded in 1939 by the development of the Nomonhan inci- dent, which began in May as a series of clashes between Soviet and Japanese forces guarding the border between Outer Mon- golia and Manchuria. By June it had become a major engage- ment of divisional magnitude and in August a failure for the Japanese. This operation disclosed several serious defects of organization and technique in Kwantung Army intelligence, in spite of its significant improvement since 1931. In gen- eral, it showed itself still not sufficiently modernized and sys- tematized to be effective. It also showed marked differences of system and procedure among its several components. Approved For ReFease 2004/12/17: CIA-RDP78-03921A000300300001-i Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Kwanfung Army Intelligence Deficiencies at Nomonhan The chief defects of the Kwantung Army's headquarters Intelligence Section arose from its having assumed over a period of years complete control of all the ASSA's. Its own functioning had consequently become extremely complex and its real aims were often lost from sight. Properly a policy planning staff, the Section had been transformed. into an op- erating agency, and the detail arising from its domination of the ASSA's constantly obstructed it. As the discharge of its normal responsibilities became careless under these stresses, the headquarters Operations Section lost confidence in it and tended to make its own estimates, arbitrary and independent, drawn from scanty information and often from untested sources. The Intelligence Section was unable to halt this trend, and it became more pronounced with the passage of time. This headquarters involvement with the ASSA's was aggra- vated by an organizational weakness in the coordination of these units which prevented them from being utilized sys- tematically. The ASSA's had failed to systematize liaison and cooperation among themselves. The Harbin ASSA, which had the greatest experience and capacity in Soviet intelligence and a staff more comprehensive and diversified than any of the others, was kept on an equal footing with the other seven, so that the benefit of its knowledge and expert guidance was not imparted to them. With all eight operating independ- ently under the direct control of the Intelligence Section, the administrative burden became too great during the Nomon- han incident. A serious procedural defect in the handling of information was illustrated by an incident which produced a minor crisis in relations between the Intelligence and Operations Sec- tions. The Harbin ASSA had obtained through a contact in the office of the Soviet consul general there a file purporting to be extracts from message traffic between Moscow and Khabarovsk. Initially this correspondence seemed authen- tic and important, but developments after the outbreak of the Nomonhan incident convinced the Intelligence Section that it was false and deceptive. The Operations Section, how- ever, which had obtained a copy of it from the Harbin ASSA, Wpproved For Release 2004/12/17: CIA- 81,6S9VfA0 0300001-1 Approved For Release 20p4//17 : CIA-RDP78-03g' ffl43 0(9Ajy Kwantung Army me Iigence assumed that it had been acquired by interception and deci- pherment, and reproduced it under highest security classifica- tion. The Intelligence Section failed to report the deceptive nature of this correspondence to the Operations Section, which therefore tended to be misled by it in some phases of the Nomonhan operations. It was not until the last stages of this engagement, as the Kwantung Army was concentrating its strength for an attack, that the communications intelligence Research Unit achieved some moderate success in learning the disposition of Soviet and Mongolian troops in the Far East; and even this limited accomplishment was made from the vantage point of Changchun-almost 500 miles from the scene of battle. The Kwantung Army's inadequacies in the communications intelligence field were strikingly apparent in its failure to have a signal detail in the front-line areas for the collection of battlefield information transmitted by wireless in either code or plain text, for the Soviet army often transmitted in clear text in situations demanding speed, and the increase in the number of coded communications for combat purposes would have facilitated the solution of the Soviet code. Com- munications facilities in the vastness of Outer Mongolia, the locale of this conflict, were so patently poor that a significant increase in radio traffic was to have been expected at the outbreak of hostilities. Japanese interception equipment was not developed sufficiently, however, nor were operators ade- quately trained to tap this source of intelligence. Another communications deficiency was the lack of a network for the exclusive use of the intelligence services; the secret missions that did get into Soviet territory were often therefore isolated. A committee of officers from Kwantung Army headquar- ters and the General Staff in Tokyo later reviewed the Kwan- tung Army's performance during the Nomonhan incident and found a number of weaknesses. Chief among these was the fact that the operations staff officer had insufficient con- fidence in the estimates of the enemy situation made by the intelligence staff officer, and as result was inclined to form his own estimates on an inadequate intelligence foundation, sometimes even basing his decisions exclusively on the peace- OFFICIAL USE ONLY 33 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 A roved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Kwantung Army Intelligence time situation. Another was the preoccupation of intelligence officers with peacetime intelligence problems to such an ex- tent that they failed to develop a war mobilization plan and thus were unable to exploit enemy activity during the No- monhan hostilities. A third was the fact that improvements in techniques were insufficiently taken advantage of, and that there was a great need for systematizing operations and pro- cedures. The committee recommended that major improve- ments be made in the peacetime operation of the intelligence services and in preparing them for wartime activity, so that intelligence estimates, as well as other intelligence products, would enjoy the full confidence of operations officers and be accorded full weight. 3Approved For Release 2004/12/17: CIA-F~P~ Q39Z'IAOD03II0300001-1 Approved For Release 2004/12/17: CIA-RDP78-03 fA 089R0M1+ How FCC's routine policing of the ether became in World War II a multi-purpose defense serv- ice and a far-flung counter- espionage operation. THE U.S. HUNT FOR AXIS AGENT RADIOS George E. Sterling I hope that this country, particularly its intelligence agen- cies, has become better organized to handle a national emer- gency than it was in 1941. When the war, after slowly creep- ing for two years from Europe toward U.S. shores, suddenly exploded upon us at Pearl Harbor, thousands of new kinds of things had to be undertaken in desperate haste and with at times disorderly improvisation. Many agencies were given emergency duties for no better reason than that they were using equipment approximating what was needed for the war- time work. That they by and large discharged these extraordi- nary responsibilities well, at the same time helping coopera- tively toward the gradual readjustment of temporarily as- signed functions, is something in which all those who partici- pated can take pride. The Federal Communications Commission, because it had a network of radio monitoring and direction-finding stations to police the domestic airwaves, was given its full share of duties not called for in its job description. It ran a rescue service for planes lost in the black-out or bad weather, locating them by their radio signals and furnishing them their bearings; more than 600 planes, many of which would other- wise have been really lost, were given FCC emergency fixes before Army Air Force personnel were trained, with our help, to take over the job. It monitored enemy commercial radio circuits and furnished the Board of Economic Warfare with hundreds of leads useful in the preclusive buying program. To meet requirements of the Eastern, Gulf, and Western de- fense commands, the Commission's legal responsibility for ap- prehending unlicensed radio stations was extended to sur- veillance of the coast by radio patrols for signs of surrepti- MORI/HRP OFFICIAL USE ONLY 35 from pg. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 35-54 roved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 MIICIAL USE ONLY Axis Agent Radios tious communication with enemy submarines. The network intercepted foreign weather traffic for our air forces. It mon- itored foreign radio broadcasts, setting up the organization which now has become the Foreign Broadcast Information Service, and published texts and analyses of broadcast news and propaganda for a variety of government consumers. It trained OSS personnel in radio methods and procedures and built equipment for their use. For a year and a quarter the FCC's Radio Intelligence Division, as the monitoring network was known, carried the full, load of military radio intelligence in Alaska, where the Army was not able to station a radio intelligence company until late in 1942 and got a monitoring station in operation only in the spring of 1943. It radio-patrolled the Alaskan coast by sea. It also participated at Army request in military in- telligence elsewhere, most notably in Hawaii and on the west coast. In San Francisco it set up an Intelligence Center where officers of the military services were on duty around the clock. It identified and tracked the radio-equipped bal- loons which the Japanese launched against our west coast. It discovered and established the location of a Nazi weather station on Greenland, which the Coast Guard was then able to destroy. It trained the military personnel who eventually took over most of these duties, prepared instructional book- lets and monitoring aids for them, and supervised their work until they became competent enough to operate without help. The RID even participated from afar in the guerrilla move- ments in the Philippines. This activity began when one of our monitors picked up a signal using the call, PK1JC, of an amateur in the Dutch East Indies, where no amateurs could operate. We fixed its origin in northern Luzon. PK1JC sent a message coded, we determined, with a prewar Signal Corps cipher disk, giving the name and serial number of an unsur- rendered American soldier trying to establish contact with MacArthur's headquarters. He requested acknowledgement by a signal from General Electric's powerful KGEI transmit- ter near San Francisco. The Signal Corps arranged for this acknowledgement and asked us to continue copying all his messages. Later, when the landing of transmitters by sub- marine created quite heavy traffic from the Philippine guer- 36 Approved For Release 2004/12/17: CIA-RD'78-039Z'fA0003D0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Axis Agent Radios OFFICIAL USE ONLY rillas, a primary monitoring station at San Leandro, Cali- fornia, was exclusively devoted, at Signal Corps request, to copying it and expediting it by private teletype circuit to Washington. Policing the Domestic Ether Although these spirited improvisations requested and sup- ported by the military services lay far outside the Commis- sion's proper charter, the Communications Act of 1934, they were undertaken eagerly when required and relinquished later gracefully but with reluctance by our radio men and women anxious to contribute to the war effort in any way they could. Our people had enough of their own proper work to do, for after Pearl Harbor the regular job of the Radio Intelligence Division took on a new and grimmer aspect. It was now not just a question of tracking down maladjusted transmitters, unshielded diathermy apparatus, or even the illegal communi- cations of pranksters, smugglers, and racetrack tipsters, but of sealing the country's leaky ether against loss of war secrets over the radio circuits of enemy agents. Hitherto, with commercial communications to foreign countries free of surveillance, spies in this country had had no need to risk secret transmitters; now these commercial facilities were closed or censored and the whole spectrum had to be patrolled for furtive whisperings in Morse cipher. The RID was under challenge to live up to its initials. The Division's equipment, personnel, and physical deploy- ment were adequate to the task. During the state of national emergency that preceded Pearl Harbor the FCC had been au- thorized to begin an expansion of its radio detection facili- ties, which were ultimately stabilized in twelve primary moni- toring stations, about sixty subordinate monitoring posts, and about ninety mobile units distributed through the United States, Puerto Rico, Hawaii, and Alaska. The fixed stations and many of the mobile units were linked by instantaneous communications. They were organized into three major net- works based on radio intelligence centers respectively in Washington, near San Francisco, and in Honolulu; but in fix- ing the location of a source of radio signals the three net- works were fused into one and directed from Washington. OFFICIAL USE ONLY 37 Approved or elease 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios Each primary station, in addition to its complex of rhombic and other antennae and its receiving and recording equip- ment, had at least one Adcock direction finder, a large rotat- ing antenna sensitive to the direction of shortwave signals bounced off the ionosphere; this device had been invented in England, but was refined and improved by RID engineers. At short range, say within a few miles, a simple loop antenna can pick up the ground-wave component of a signal and deter- mine its direction; our disguised mobile units included these in their equipment. And finally, for locating transmitters at really close quarters, we developed what we called a "snifter," a signal-strength meter that a man could carry in the palm of his hand while inspecting a building to determine which room a signal came from. In the routine day-and-night operation of a monitoring sta- tion, the patrolman of the ether would cruise his beat, passing up and down the frequencies of the usable radio spectrum, noting the landmarks of the regular fixed transmissions, recognizing the peculiar modulation of a known transmitter or the characteristic fist of a familiar operator, observing an irregularity in operating procedure and pausing long enough to verify the call letters, or finding a strange signal and re- cording the traffic for close examination, and then sometimes alerting the nation-wide net to obtain a fix on the location of its source. More than 800 such fixes would be made in an average month, requiring the taking of some 6,000 individual bearings. For although mathematically the intersection of two bearings provides a fix, the 1% error that must in prac- tice be allowed in the angle of a bearing, even when it is cor- rected for variations in propagation and site conditions, be- comes considerable at distances that may run to thousands of miles; and at least four bearings are needed for a reason- ably reliable long-range fix. Radio Spies in the United States With respect to Axis agents in the United States and its territories this close vigilance was almost purely prophylactic, and. effective in its prophylaxis: out of respect for it enemy agents, as far as we ourselves were able to discover, made only two attempts during the entire war to establish radio communications across our ethereal frontiers, and in both cases 38 Approved For Release 2004/12/17: CIA-R~P7$-II3YRAW90300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Axis Agent Radios OFFICIAL USE ONLY failed to get a single message through. The stories of these two, although they have been told from other viewpoints else- where,2 are worth summarizing here. The first took place in the spring of 1940, long before Pearl Harbor had roused us to hunt for radio spies here in earnest. Our routine monitoring turned up an unidentified transmit- ter carrying on coded traffic with a distant station which used the call AOR. We asked the Army and the Navy if it might be one of theirs. They had no knowledge of it; the Navy thought it might be a St. John, New Brunswick, station. But our direction finders showed it to be on Long Island, and its correspondent AOR near Hamburg, Germany. We reported to the FBI. The Bureau told us in confidence that it was indeed a Ger- man agent radio, but under their control. A German-Ameri- can, William Sebold, had revealed that he was recruited by the Nazis and instructed to set it up. The FBI built and now were manning the station for him, feeding Hamburg false or innocuous information and identifying its agent sources. The deception continued for more than a year under our joint surveillance, until at the end of June, 1941, 33 German agents to whom the traffic had furnished leads were arrested. At their trial that fall, when the defense tried to maintain that AOR was not a German station but an FBI entrapment device in the United States, RID engineer Albert McIntosh produced charts showing the fix on Hamburg. His public testimony must have been one factor in the German decision not to risk agent transmitters in the United States. They did try it once more, though, right after Pearl Har- bor, apparently on local initiative, impromptu. In the general alert which followed that shocking Sunday morning we had put several mobile monitoring units out cruising the Wash- ington streets. These were equipped not only with loop di- rection finders but with a device we called the watch-dog, an 1 Wilhelm Hoettl, one of the German foreign intelligence area chiefs, affirmed during his interrogation by 3rd Army in June 1945 that the Sicherheitsdienst had not been able to establish a single wireless connection either in the United States or in England. 2 Notably in Don Whitehead's The FBI Story. Approved Forl ReleaseE20O4r1Y2/17 : CIA-RDP78-03921A000300300001 1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios Ipproved For Release 2004/12/17: CIA-I AR*4 IA6 0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Axis Agent Radios OFFICIAL USE ONLY aperiodic receiver we had developed which would sound an alarm when it received a strong signal on any of a wide range of frequencies. (It was patented by two RID engineers and later used by OSS and the Navy.) In the wee hours of Tues- day, December 9, one of these watch-dogs was triggered by signals on a transatlantic frequency. At the same moment three thousand miles away our monitors in Portland, Oregon, heard them too-station UA briefly and vainly calling a dis- tant control center. Five other direction-finding stations were set to watch the frequency; and when a few hours later UA tried it again, they reported the bearings projected on the chart in Figure 1. This fix confirmed the uncertain supposi- tion of the watch-dog that the transmitter was in Wash- ington. Now three mobile units were given the scent, and they quickly narrowed down the location to the German Embassy, as shown in Figure 2. It was a problem to pin-point the transmitter without entering the Embassy because the an- tenna was stretched between two buildings, with equal signal strength at each end and apparently lead-in wires to both buildings. This problem was solved in a pre-dawn conference with the FBI, who arranged, in cooperation with the Potomac Electric Power Co., that we could go down into a manhole in the street and cut the power to each building separately in turn when UA began to call. In the end, however, because the State Department was afraid for our own diplomatic mis- sion still in Germany, we did not seize UA but simply set up two jammers to drown him out if he should try once more. He never did. This beginning was the end for Axis radio agents within our borders; any German agents picked up by the FBI there- after were found to have been using secret ink or some other communications than radio to get information out of the country. And we learned that some Japanese agents who re- quested their headquarters' permission to set up a transmitter here were turned down on the grounds that the FCC would nab them as soon as they got on the air. Outside our own states and territories it was a different story, one in which also the RID became intimately concerned. Approved ForlRefease-20D4/'12/17 : CIA-RDP78-03921A000300300001 11 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios The Portuguese Net One day in September 1941, monitors at the secondary RID post in Miami heard a station using irregular procedures and signing the call UU2, one not in conformity with those used on commercial and other authorized circuits. It was there- fore made a case for investigation. Bearings fixed its loca- tion near Lisbon, Portugal; and as it continued to call almost nightly without receiving a reply, RID units were instructed to be on the lookout for the answering station. After more than a month monitors at the secondary posts in Pittsburg and Albuquerque simultaneously picked up the answer from a station signing CNA; bearings were taken which located this transmitter in South Africa. A few days later another station using the UU2 procedure was intercepted, this time with the call BX7. It was also in Lisbon, and the characteristics of its signal showed that with- out question BX7 was the same station which had previously signed UU2, apparently the control stationof a network. After a week an answer with the call letters NPD was picked up by our Rhode Island monitoring post. This station proved to be in Portuguese West Africa. The messages exchanged between the Lisbon control UU2/ BX7 and the two out-stations in Africa were of course en- ciphered. RID did not maintain a cryptanalysis laboratory, decipherment being the responsibility of the FBI, of the Army's Signal Intelligence Service, and, on behalf of the Navy, of the Coast Guard; but in order to facilitate the identifica- tion of intercepted traffic we had interested a couple of our staff in cryptanalytic work. These men attained a consider- able skill and in some cases were able to furnish leads for the FBI decipherment. The Lisbon cipher was one of these cases. It was an up-and-down transposition whose key length varied from day to day. The texts of the messages showed this network to be one channel by which German agents in the neutral countries and colonies of Africa reported on the movements of ships, troops, and materiel and on political events. On March 26, 1942, for example, the South Africa station reported ship sail- 4Approved For Release 2004/12/17: CIA-R6Pf4'-?t}3MA6ffi0300001-1 Approved For Release 3004/12/17: CIA-RDP78-03 ' QIOAg3 06Ajy Axis Agenf Radios ings and the concentration of Allied troops which later took Madagascar. As translated from the Portuguese: TWENTYSIXTH. AMERICANS "NISHNAHA" AND "SOLONTU- SHAW" SAILED WITH ORE FOR NEW ORLEANS, ALSO ENGLISH "CITY OF N. CASTLE"; "ANGOLA" AND ENGLISH "ISIPIEGO" FROM DURBAN ARRIVED WITH PASSENGERS. TROOPS STILL CONCENTRATED; TRYING TO LEARN DETAILS. From Portuguese West Africa an agent with the code-name Armando sent similar information intermingled freely with operational reports. On December 4, 1941: ARMANDO REPORTS ENGLISH CONSUL RECEIVED LONG EN- CIPHERED TELEGRAM RELATIVE ENFORCING STRICT VIGI- LANCE AGAINST ESPIONAGE. OFFICIALS CLAIMED ENGLISH STILL COMMAND CAPE VERDE SUBMARINE CABLE. MANY MEN GO TO FREETOWN OWING APPROACH TEN CONVOY SHIPS, LARGE TROOPS, AMMUNITION AND TANKS. HOW- EVER INFORMER DOES NOT KNOW IF THEY REMAIN LAGOS OR FREETOWN AND BATHURST. On January 7, 1942: WEST INDIA ARRIVED BATHURST FOURTEEN WITH PILOTS AIRCRAFT MECHANICS DISASSEMBLED TANKS ANTIAIRCRAFT MACHINE GUNS MUNITIONS LARGE QUANTITY GASOLINE CAMPAIGN TENTS. NEXT MONTH WE WILL HAVE REGULAR CONNECTION DAKAR THROUGH INTELLIGENT NATIVE GOLD- SMITH AUTHORIZED TO ENTER COLONIAL SERVICE UNDER GOVERNOR TO HELP MY WORK. ARMANDO On February 5: CHIEF OF POLICE LIEUTENANT UNDERCOVER IMPRUDENTLY WORKS FOR ENGLISH. CONVENIENT TO OBTAIN HIS RE- TURN LISBON. HE CAN DAMAGE US. ARMANDO But the Germans were growing dissatisfied with Armando's work. The Lisbon station radioed him on February 11: SAID THERE IS TO BE DISEMBARKMENT ENGLISH AMERICAN TROOPS DAKAR NEXT FIFTEEN DAYS. WHY NO REPORTS MOST URGENT. On February 12: DISEMBARKATION TROOPS FREETOWN NOT DAKAR. I OR- DER YOU INVESTIGATE. NOT SATISFIED REPORTS WHICH I CALL FOR. HAVE RECEIVED BETTER REPORTS FROM OTHER PERSONS. OFFICIAL USE ONLY 43 Approved For a ease 2004/12/17 : CIA-RDP78-03921A000300300001-1 A roved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OVFICIAL USE ONLY Axis Agent Radios And most indiscreetly, on 27 March: SECURE EXPEDITIOUSLY RECENT REPORTS DAKAR FREE- TOWN RELIEVE CAROLINA OF HIS DUTIES. USE NEW INK. BEARER SHOULD DELIVER LETTERS PERSONALLY TO POR- TER HOTEL DUAS HACOES VICTORIA STREET FOR MR. MERCKEL. WE ARE EXPERIMENTING CONTINUATION OR- GANIZATION TWO MORE MONTHS. USE YOUR BEST REPORTS FOR MY VINDICATION. The organization did not in fact last much longer than two more months, but it was not the Germans who termi- nated it. Revelations like this one enabled Allied intelligence officers to clean out the Portuguese group in the summer of 1942. Nazi Agent Training and Procedures Having thus demonstrated its capability in the European theater, the RID was approached early in 1942 by its British counterpart, the Radio Security Service, with a request for the establishment of regular liaison and exchange of informa- tion. From then on to the end of the war we maintained a most harmonious and fruitful relationship which served to build up a pretty complete picture of the German diplomatic and espionage networks and their activities. The characteris- tics of individual transmitters and individual operators were recorded and catalogued so that they could be recognized when they were used on a different circuit. Nearly all the codes and ciphers were broken, and the great bulk of the clan- destine traffic could be promptly read. During the most criti- cal. period of the war in Europe the RID was monitoring 222 frequencies used in clandestine intra-European circuits. After the Lisbon net was closed down the Germans had five major networks, with control centers in Berlin, Hamburg, Bordeaux, Madrid, and Paris. The out-stations were located in practically every European country, in Africa and the At- lantic, and in the western hemisphere. The operators of these out-stations were in general not skilled radiomen, we learned from captured spies, but agents who had been trained in radio and codes and ciphers along with other tradecraft-for ex- ample photography and microfilm, secret writing, explosives and demolition-at a school near Hamburg. Their radio 44 Approved For Release 2004/12/17: CIA-RDP7S=039Z'IAVV03D0300001-1 ApprovedAF xis prAg n?sl~adio 4/12/17: CIA-RDP78-03 WP 3 0C8~'~y training embraced the use of International Morse and the construction and operation of transmitters and receivers. Student operators were required to achieve the modest transmitting speed of twelve words a minute (as compared, for example, with our Merchant Marine requirement of 20-25 words a minute). Then they would make a five-minute sample transmission on a device which recorded graphically their speed, touch, and characteristic fist. On the basis of this graph they were assigned a permanent transmitting speed and given another week's training at this speed. Then a sec- ond graph was made as each operator graduated, this one to be filed as a specimen signature against which his later mes- sages would be verified as genuine and not the deception of enemy counterespionage. This procedure was apparently adopted after the Germans learned that the FBI had fooled them with the Sebold station on Long Island. The agents were furnished portable transmitters and re- ceivers, usually of the type built into a suitcase, complete with antenna wire, tools, and all the accessories necessary for going into immediate operation. They were given precise instruc- tions for constructing a directional antenna which would af- ford a maximum signal to their control center and a mini- mum to eavesdroppers. Then they were dispatched to their posts by neutral ship, by submarine, by parachute, or over clandestine land routes. The first sign of their safe arrival would be their call let- ters on the air; and this would signify their presence to us, too, for it is difficult to disguise an agent radio's call. At one time, when the control of one of the German nets passed from the Abwehr to the Gestapo, its transmitters adopted the call letters and frequencies of commercial stations in South America; but other characteristic procedures of clan- destine traffic still betrayed them, and this device was later abandoned. Not being able to disguise their calls, the agent networks made a practice of changing call letters, usually every day, in an effort to spoil continuity for their pursuers. But very few had a rota which remained nonrepetitive for a year, say, and we were able to work out in advance the call letters which many espionage transmitters would be using on any OFFICIAL USE ONLY 45 Approved or Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 pr(? V Uff F l a e 2004/12/17 : CIA-RDA 8-039 n~f 00300300001-1 particular future day; sometimes we even caught the out- stations making mistakes in their own system. Some worked with a list of 31 different calls which repeated itself every month. Some had two such lists, one for odd and one for even months. One system was worked out with such little forethought that a spy once had to call with the international distress signal, SOS. This was one of the systems that deter- mined call letters in connection with the cipher key for the day, a connection that sometimes led our part-time crypt- analysts into the decipherment of messages. One group, we learned from one of its indiscreet first mes- sages sent blind, based its calls and transposition cipher on the Albatross edition of Axel Munthe's The Story of San Michele, a book excluded by copyright arrangements from the British Empire and the United States, using a different page each day. The page to be used was determined by adding to a constant number assigned each agent the number of the month and that of the day in question. The last line on this page contained the calls to be used-the first three let- ters, reversed, for the control center and the last three, re- versed, for the out-station. An example of this procedure may be of interest. Shortly before midnight, eastern standard time, on March 12, 1942, one of our monitors at Laredo, Texas, copies the fol- lowing slow hand-keyed message on 11,220 kilocycles. VVVV EVI EVI EVI IWEOF WONUG IUVBJ DLVCP NABRS CARTM IELHX YEERX DEXUE VCCXP EXEEM OEUNM CMIRL XRTFO CXQYX EXISV NXMAH GRSML ZPEMS NQXXX ETNIX AAEXV UXURA FOEAH XUEUT AFXEH EHTEN NMFXA XNZOR ECSEI OAINE MRCFX SENSD PELXA HPRE We know from our analysis of previous messages that the call EVI is due to be used by an operator of the San Michele group whose assigned constant number is 56. Checking, we add the month and day-this would be March 13 by Green- wich Mean Time-and turn to page 72 of the novel. The last word on the page is "give," so EVI is right. The first word on the last line is "like"; the control center will sign KIL. The message sent in the early hours of March 13 was prob- ably enciphered on March 12, so we go back to page 71, shown here opposite, for the key. Here the first line reads, "I would 4Approved For Release 2004/12/17: CIA-RDPf8~~139~~FA~ 0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Axis Agent Radios OFFICIAL USE ONLY I would have known how to master his fear, and would have been the stronger of the two as I have been in later years more than once, when I have stayed a hand clutching a revolver in fear of life. When will the anti-vivisectionists realize that when they are asking for total prohibition of experiments on living animals they are asking for what it is impossible to grant them? Pasteur's vaccination against rabies has reduced the mortality in this terrible disease to a minimum and Behring's anti-diphtheric serum saves the lives of over a hundred thousand children every year. Are not these two facts alone sufficient to make these well-meaning lovers of animals understand that discoverers of new worlds like Pasteur, of new remedies against hitherto incurable diseases like Koch, Ehrlich and Behring must be left to pursue their researches unhampered by restrictions and undisturbed by interference from outsiders. Those to be left a free hand are besides so few that they can be counted on one's fingers. For the rest no doubt most severe restrictions should be insisted upon, perhaps even total prohibition. But I go further. One of the most weighty arguments against several of these ex- periments on living animals is that their practical value is much reduced, owing to the fundamental difference from a pathological and physiological point of view between the bodies of men and the bodies of animals. But why should these experiments be limited to the bodies of animals, why should they not be carried out on the living body of man as well? Why should not the born criminals, the chronic evil-doers, condemned to waste their remaining life in prison, useless and often dangerous to others and to them- selves, why should not these inveterate offenders against our laws be offered a reduction of their penal servitude if they were willing to submit under anaesthetics to certain experi- ments on their living bodies for the benefit of mankind? If the judge, before putting on the black cap, had in his power to offer the murderer the alternative between the gallows and penal servitude for so and so many years, I have little doubt there would be no lack of candidates. Why should not Doctor Woronoff, the practical value of his invention be have known how to master his fear" etc. We take the first nine letters and number them in sequence: IW O U L D H A V 1 2 3 4 5 6 7 8 9 Approved FoFr ReleaseE2004/12/17 : CIA-RDP78-03921 A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios Substituting these figures in the first four groups, with nulls for any missing letters, we get I W E O F W O N U G I U V B J D L V C P 1 2 x 3 x 2 3 x 4 x 1 4 9 x x 6 5 9 x x or "12 March, 2304 hours, 149 letters in 659th message fol- lowing." There are actually 154 letters following, but the first group of five is simply a special indicator identifying the agent. This is as far as the RID needed to go for its own purposes before turning the message over to the FBI. But the text could be worked out from the same page of the novel. Lay out a blank message in lines of twenty letters each, keep- ing the columns straight. 149 letters in rows of 20 make nine columns of eight letters each followed by eleven columns of seven each. Write across the top the first twenty initial let- ters of the lines on page 71, skipping indented lines. Number these in alphabetical sequence, and then go down the columns in the indicated order with the encrypted text. This arrange- ment gives the clear German text: i b m r a a t m a t s u 8 4 9 14 1 2 16 10 3 17 15 19 S P R U C H x S E C H S V E S T A x A N x S T E N x M A R Y x Q U E E N x E L F T E N x E I N S M E Z x M E Z x V 0 N D A M P E I R O x C A M P H O E H E x R E C I F E G IPM E L D E T x n e 11 5 N U I N x M A C A M E I x R u f f n p t 20 6 7 12 13 18 L L x V O N x x Q U E E A R Y x A M H T x U H R P F E R x C R O x A U F E C I F E x In English : TEXT SIXTY FROM VESTA TO STEIN. QUEEN MARY RE- PORTED OFF RECIFE BY STEAMSHIP CAMPEIRO ON ELEV- ENTH AT EIGHTEEN O'CLOCK MIDDLE EUROPEAN TIME. The Latin American Infestation The Queen Mary message, from an agent in Rio de Janeiro, came at a moment of climax in RID's most active and critical theater of counterespionage operations, Latin America. There were in March of 1942 six agent transmitters in Rio 4pproved For Release 2004/12/17 :CIA-RUP-0 9u'I~ OD0300300001-1 Approved For Release 2 04/12/17 : CIA-RDP78-03921A000300300001-1 Axis Agent Radios OFFICIAL USE ONLY alone, and three of them reported the Queen Mary's arrival on the twelfth. The espionage messages were full of news about her until after she sailed on March 20, but these were the last messages most of the agents sent. By the time she was again in mid-Atlantic on a safely altered course, the Bra- zilian authorities had arrested some 200 of the German spies. The story behind this roundup is first of all an RID story. Signs of the Nazi effort to create an espionage base in Latin America began to be apparent as early as the fall of 1940. On October 27 our primary station at Allegan, Michi- gan, picked up a strange maritime signal using the unregis- tered call BCNL. Other monitoring posts were alerted, and quite a number of similar calls were traced to ships in the Gulf of Mexico and Caribbean Sea. The FCC's Tampa office succeeded in identifying these vessels as small ones operated by a firm called Gough Bros. and controlled by a coastal sta- tion near Belize in British Honduras. The U.S. Caribbean Defense Command, after developing evidence that this fleet was being used to refuel German submarines and pass infor- mation, arrested a Canal Zone employee who was a member of the ring and was able to arrange a trap for nineteen others, including the ringleader, prominent British shipping execu- tive George Gough, in Belize. Meanwhile in Mexico a German spy was sending out intelli- gence reports in private code over Chapultepec Radio, the same transmitter used for clandestine communication with Berlin during the first world war.3 After Pearl Harbor, when the use of code on commercial facilities was prohibited in Mexico, this man, a properly registered amateur, resorted to his own clandestine radio, but made the mistake of communi- cating first with the FBI's deception station on Long Island. The concerted German drive to establish radio agent nets in this hemisphere, however, and our struggle against them, began in the spring of 1941. One of our monitors at Millis, Massachusetts, detected the faint signals of a station that was trying to hide its transmission in a transatlantic radio- telephone circuit operating on the same frequency. It was repeating the call letters REW, but the signal sounded quite like that of AOR, the FBI-operated Sebold transmitter's re- Approved or eTease 2Q04TT2/17 : CIA-RDP78-03921A00030030000141 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios spondent. Other monitoring stations, asked to help identify the suspicious and noise-shrouded signal, discovered that when REW paused to listen a station on a different frequency would start sending the call letters PYL. The two transmit- ters put on the same performance at the same hour the next day, and for several days; they were apparently trying with- out; success to communicate with each other. One of our monitors became so engrossed that he wanted to go on the air and help them out. Our fixes showed that R:EW was in- deed in Hamburg, and PYL in Valparaiso, Chile, an espionage station discovered before it could make contact with its base. For the present, however, there was nothing that could be done about agent radios outside U.S. jurisdiction except to listen in, and more and more of them began to appear, setting up in a half dozen of the Latin American republics. Chile and Brazil held the principal concentrations at this time. There were three main agent networks in Brazil, centered on transmitters that we designated LIR, CEL, and CIT, from the call signs they were using when first heard; the EVI of our decipherment example was LIR. Evidence of the damage they could do began to mount. The German control stations, for example, sent exhaustive lists of requirements for naval information, asked PYL in Chile if it could "place a suitable man for us among students going to the United States for air training," complimented agents as "exceptionally correct" in their reports on tech- nical details of English and American cruisers' equipment, and assigned agents to investigate "USA parade and air bases Colombia and Venezuela" and "air units Trinidad and Lesser Antilles and flights via those places to West Africa; airplane types, movement, dates." The agent radios sent back reports like these: 5 JULY. NINE BOEINGS FLEW WITH MIXED CREW ENGLISH AND AMERICANS. IN NEXT FEW WEEKS 20 MORE TO BE FLOWN ACROSS. DETAILS FOLLOW. 19 JULY. LM REPORTS 15 LOCKHEED HUDSONS FLEW ACROSS. ENGLISH REGISTRY AND CANADIAN-AUSTRALIAN CREW. BOEING CLIPPER LEFT NATAL ON SEVENTH ALLEG- EDLY FOR BOLANO WITH 19 LOCKHEED MECHANICS AND 11 CREW. 5AOpproved For Release 2004/12/17: CIA-F P '~39 AQW0300001-1 ApprovedAFor Releask 2004/12/17 : CIA-RDP78-03 uF1AHR2 85E0841 7 AUGUST. USA STEAMER URUGUAY ON LAST VOYAGE TO UNITED STATES LEFT RIO 25 JUNE. WAS CONVOYED BY BRITISH AUXILIARY CRUISER CARNARVON CASTLE TO TRIN- IDAD. TRIP TAKES 7 DAYS. CRUISER TRAVELED SOME- TIMES AHEAD SOMETIMES ASTERN OF SS URUGUAY. 8 OCTOBER. BMM REPORTS SEVERAL HUNDRED US AIR- CRAFT OF VARIOUS TYPES AND 8000 SPECIAL TROOPS AL- LEGEDLY LANDING CORPS BEING ASSEMBLED PORT OF SPAIN. In November PYL identified a network courier as "daughter of Clarke, secretary in USA embassy Quito since 1 November." And ten days after Pearl Harbor an agent offered details on the torpedo safety nets with which ships were being equipped and also. "absolutely safe men . . . who will send to bottom two or three large armed English ships ... without any sus- picion falling on us. If we are interested payment only after sinking, nothing in advance." The control station in Germany of course approved: "Proposal for destruction of ships very interesting." Reports on plane production also now began in earnest: 1 JANUARY. CURTISS COLUMBUS FACTORY WILL BEGIN MASS PRODUCTION SERIES SB2C SINGLE SEATER STUKA FOR NAVY. ARMAMENT ONE CANNON FIVE MACHINE GUNS, MO- TOR 1700 HP WRIGHT. BUILT FOR 2000 HP WRIGHT IN EX- PERIMENTAL STAGE. PRODUCTION SO3C BEGUN IN COLUM- BUS FACTORY AT BEGINNING DECEMBER. EMPLOYEES ALL CURTISS AIRCRAFT FACTORIES DECEMBER TOTAL 27000. PROPELLER PRODUCTION NOVEMBER 1042. Our Government finally took action. On January 15, 1942, the Rio conference of foreign ministers of the American re- publics recommended immediate measures to eliminate the clandestine stations. An Emergency Advisory Committee for Political Defense was established with headquarters in Uru- guay, and under its auspices we dispatched some of the best RID monitoring officers to the six countries where we knew agent radios to be operating (Brazil, Chile, Mexico, Cuba, Martinique, Paraguay). They had a two-fold mission-to lo- cate the hide-outs of known agent transmitters with mobile direction-finding equipment they took along, and to help the governments of these countries establish monitoring net- works which could keep them free of radio spies in the future. OFFICIAL USE ONLY 51 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios For this second purpose we sent men also to six other coun- tries (Haiti, Venezuela, Colombia, Ecuador, Peru, Uruguay). Forty men from eighteen Latin American republics were at the same time brought here for training at our school in Laurel, Maryland. The man we sent to Brazil was Robert D. Linx. He helped lay the groundwork for that arrest of 200-odd spies after the Queen Mary left her dock in March. This roundup appar- ently cleaned out the LIR and CIT organizations, the latter led by a man named Christiansen; they were never heard again. Some members of the CEL net escaped to the in- terior, but two series of arrests after they ventured twice at intervals to reactivate their transmitter put an end to them too. By mid-year Brazil was permanently cured of its agent radio infestation. Linx stayed on to direct the establish- ment of the monitoring service, and became known as "the father of Brazilian monitoring." Although our men in Latin America worked quietly by them- selves as much as possible, the German agents were not al- ways unaware of what was going on. We heard one of them telling his control that he knew at least six Yankee direction finders were beamed on him and he was going to cool off in the woods for a while. (He cooled off in a Central American jail.) In Chile, the PYL organization took the precaution of establishing a stand-by transmitter to assure continuity of communication if one should be seized. On March 9 PYL sent a message informing Hamburg that "Pedro," whom they had employed to operate the new transmitter, would be ready to get on the air the following day. On March 10, although RID had not yet received the decrypted text of this message, our monitors picked up Pedro's test transmission with the ? call GES and fixed his location in Antofagasta. The arrival of our man, John de Bardeleben, in Valparaiso on March 19 was the signal for the main PYL transmitter to go mobile. De Bardeleben spent weeks tracking its chang- ing locations in the area within a ten-mile radius of Valpa- raiso. It developed that every second week, however, a trans- mission would be made from the house at Avenida Alemana 5508, Cerro Alegre. This house belonged to one Guillermo Zeller, a radio technician and licensed amateur who was often 5I pproved For Release 2004/12/17: CIA-F 'P .!'O3 ~OW0300001-1 Approved AXIS or Rgeejs~a29o4/12/17: CIA-RDP78-03981AHVO R0?NL~ seen in the company of Hans Blume, manager of the Valpa- raiso branch of the German company Transradio. In April 1941, shortly before PYL was first heard trying to contact REW, Blume had bought from the radio supply store Casa Widow a complete set of transmitter parts and two Halli- crafter receivers. A tap was now placed on the Zeller tele- phone. The Chilean authorities were persuaded to raid the Zeller house on June 25. Their perfunctory search discovered no transmitter, but Zeller was indiscreet enough to telephone afterwards to one of his agent colleagues and report his nar- row escape : "Lucky they didn't search very good, especially in the basement." With some trouble and delay another search warrant was obtained, again to no avail; the officers didn't bother to open a box they noticed in the basement purporting to contain a sewing machine. PYL went off the air after this, and nothing could be done until after many weeks De Bardeleben found the transmitter in its sewing-ma- chine box stored in a grocery on Cerro Alegre. Finally, on October 23, most of the agents of the PYL organization were arrested; but the man who actually operated the main trans- mitter and operator Pedro at Antofagasta had disappeared. Neutralist Argentina, which did not participate in the Emergency Advisory Committee, posed a delicate diplomatic problem with respect to the elimination of clandestine enemy transmitters, and one of critical importance as the clean-up in Brazil and Chile made the Argentine the main base for espionage activity in this hemisphere. Not only agent radios but the powerful Argentine commercial transmitters were carrying quantities of compromising information to Italy, Ja- pan, and Germany, and we could only copy their transmis- sions, hundreds of messages daily. Many of these were at speeds too high for manual copy; we recorded them on tape and trained selected typists to put them into page form. A strong memorandum from the U.S. Government on January 4, 1943, enabled us to send two men to Argentina to try to do what we had done in Brazil and Chile, but our earlier suc- cesses were not repeated here. The agent operations had be- come much more sophisticated. While our men were taking bearings on a signal the transmission would be cut off at OFFICIAL USE ONLY 53 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 OFFICIAL USE ONLY Axis Agent Radios that location and picked up by another transmitter several miles away. And the cooperation of Argentine officials under the Castillo and Ramirez-Peron regimes was less than eager. They finally became so resentful of U.S. Government pres- sures that we had to withdraw our men. One spy who escaped in Chile, however, did not get as far as Argentina. Almost a year after the incomplete catch of the PYL ring in Chile, monitors at three different RID posts heard a new station with the call PQZ, and all three were sure they recognized the fist of operator Pedro of the GES sta- tion at Antofagasta. Bearings placed the transmitter at Santiago, Chile. De Bardeleben's successor in Chile, William Fellows, was notified, and he picked up the signal the next time it came on the air. Working alone, he had to move around and take bear- ings from different locations in order to get a fix; but after two more PQZ transmissions he had the house located. To my considerable personal satisfaction the operator Pedro, a graduate of the Hamburg spy school, who had the effron- tery to use my own initials as his clandestine call, was arrested and his equipment seized. With this postlude there ended, except for the Argentine hold-out, the story of radio spies in the Americas. SApproved For Release 2004/12/17: CIA- RDP~ Q39 'IA0D03II0300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Intelligence, deception, and un- orthodox stay-behind opera- tions in a combined and all but real-war combat exercise. OPERATION PORTREX Edwin L. Sibert There used to be some truth in the gibe that a war's first battles are fought with the weapons and techniques (includ- ing intelligence techniques) of the final engagements of the last previous war. Now, however, the practice of conducting large-scale and realistic maneuvers in time of peace, incor- porating new developments not only in weapons and tactics but also in intelligence, psychological, and paramilitary de- vices, provides assurance that the first battles of the next war will at least be fought with the methods of the last maneuvers. One such war game in which I participated during the mili- tary doldrums between World War II and the Korean War was a particularly stimulating illustration of how realistic an exercise can be made, of some practical limitations on realism, and of the extent to which deception and unconventional operations can be worked in. Operation Portrex wasn't so very big, as modern maneuvers go, but all elements of the armed forces-Army, Navy, Air Force, Marines-took part, and there were paratroopers, frog- men, undercover agents, and guerrillas. It was staged in the first quarter of 1950 on the island of Vieques, a twenty-mile stretch of land some ten miles east of Puerto Rico. It em- braced a period of more than two months devoted to prepara- tions for a three-day assault action. The problem of the exercise was the recapture of a hypo- thetical major Caribbean island which the enemy had occu- pied. U.S. forces were to make a combined airborne and am- phibious assault on its southern beaches, represented by those of Vieques, and clean out the ten-square-mile maneuver area on this island in the initial action. The cards were stacked against the enemy defenders, who had available in the beach area only a regimental combat team reinforced by a provi- Approved For Release 2004/12/17 : Al CIA-RDP78-03921A000300300001-1 MORI/HRP from pg. Al-A9 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Porfrex Y PORT LIGHTHOUSE MOSQUITO DETAIL FROM Isla de VIEQUES PUERTO RICO 0 1 2 Miles A2 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex sional armored reconnaissance unit, an engineer company, and a mixed battalion of anti-aircraft artillery, with light avia- tion and the support of a weak fighter wing. The invading task force consisted of the 3d Infantry Division reinforced by a battalion of the 82nd Airborne Division and a Marine Corps reconnaissance company. It had the support of a strong fighter wing based on Puerto Rico, air lift for the parachute battalion, adequate sea lift for the ground forces, and naval units for shore bombardment. I commanded the land forces of the enemy defense, Puerto Rican regulars. In mid-December 1949 I was permitted to take them to Vieques. First we had to construct a tent camp for ourselves and the numerous visitors expected, both VIP's and run-of-the-mine; but by New Year's we were able to turn our attention to defensive works-obstacles, strongpoints, camouflage, protection against shell fire and air bombard- ment, deception, counterespionage, and unorthodox measures. Defenses and Deception The beaches called Red and Blue on the accompanying map were the major ones, the only ones big enough to accommo- date a regimental combat team. But since an envelopment of our east flank was indicated by the geography of the ma- neuver area, we had to construct obstacles and defenses not only on these but also, less thoroughly, on the small and shallow Yellow and Green beaches. Materials and supplies might have been a problem. Vieques Island has a population of only about two thousand, mostly small farmers and poultry and cattle raisers, concentrated in a restricted central area. Its east and west ends are uninhabited training grounds. Its only town is Isabela Segunda, with one street, unpaved. Therefore all our ordinary supplies and all materials for de- fensive works had to come from the San Juan area in Puerto Rico by tug and barge. Fortunately we had a sizable salvage yard at Fort Buchanan, Puerto Rico, with a wide assortment of war sur- plus items such as steel landing mats, I-beams and other odds and ends of structural steel, old cable, etc. These, inter- spersed with felled cocoanut palm trunks and thoroughly laced with barbed wire, made formidable abatis-type obstacles. We also bulldozed out anti-tank ditches at strategic locations; A3 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex and we supplemented our limited allotment of barbed wire and screw-type steel posts for apron fences by stuffing in among them a lot of the heavy, thorny, tough brush that was prevalent in the area. I'm sure our post-maneuver popularity with the invading troops was of a low order. Back from the beaches we burrowed as no one had since World War I, and we found that in that tropical, rain- drenched country you had to drain a ditch or dugout before it could be used. In one of the necessary departures from com- plete realism, we were ordered to clear all the stumps, stakes, stones, etc., from a large flat area around the airstrip behind Red beach, an obvious tip-off that this would be the drop zone for the parachute troops. I saw to it that this work was done most conscientiously: my son commanded a company in the airborne infantry battalion attached to the 3rd Division. As we were building the defenses during January and Feb- ruary, the invaders were regularly taking air photographs on which to base their assault plans. In order to throw them off, we used not only camouflage but an elaborate system of dummy defenses ostensibly disposed against an expected main thrust of the invading forces north from Blue beach. These were strongpoints of ground scraped up by the bulldozers, protected by piled thorny brush, and equipped with inflated tanks and dummy guns, trucks, and communications equip- ment. The so-called Aggressor Cadre from Fort Riley fur- nished this dummy equipment and helped greatly in the de- ception work. Trying to find some way to misguide the leading assault waves of landing craft, we conceived the plan of camouflaging the principal small-scale landmark in the area, an old two- story Spanish lighthouse west of the beaches, and erecting a false facsimile about a mile away. I knew our engineer, Jim Goodwin, could do it, because he could make anything; but I was forethoughtful enough about my eventual retire- ment pension to ask the Naval District Commandant's advice in the matter. Seldom have I seen a man so shocked; his voice shook with emotion as he dwelt on the sacredness of aids to navigation. So we had to call that off. I finally got per- mission to use a smoke-screen, under the proviso that it be Mproved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex lifted ten minutes before the landing craft were to touch down. A particular tricky detail in our defenses was our use of the small island that the map shows about 600 yards off Blue beach, a low and rocky one accessible by rowboat but not by landing craft. We were careful that air photographs should show us ignoring its potential as a defensive strongpoint, but we dug at its north end and heavily camouflaged a deep shelter for .50-caliber machine guns sited to fire on the beach. They were to wait until the landing craft had touched down and then open fire on the invaders from the rear; in the noise and confusion of the landing it would be some time before their fire would be identified and located, not to say sup- pressed. CI, PP, and PM Preparations Our attention was by no means all on hardware. We took advantage of the Puerto Rican troops' capability in Spanish to have them use it exclusively whenever there was a possi- bility that the American enemy would intercept their com- munications. We elaborated their natural difference in ap- pearance from the U.S. forces by giving them a distinctive helmet and fatigue clothes dyed green, items provided by the Aggressor Cadre. We issued them identity folders, printed by the Aggressor Cadre, which served us as a counterespio- nage device and which the invaders later used as a basis for PW interrogations. For the benefit of the enemy we put up a lot of posters with warnings about non-existent dangerous snakes and insects, as well as some existing poisonous tropical plants like the man- zanillo. Our psywar effort may have been a bit on the light side though; the "1984" motif was strung through all our prop- aganda, and some wag even put a huge "Big Brother Is Watch- ing You" sign up in the latrine we erected for female VIP visitors, correspondents and the WAC and WAF brass. But the most important thing I did with respect to uncon- ventional measures was to persuade Waller Booth, a former OSS officer living in San Juan, to come on active duty for the exercises. It was he who organized and directed an under- cover net of counterespionage agents among the native resi- Approved For Release 2004/12/17 : CIA-RDP78-03921A00030030000Vi Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex dents of Vieques and who prepared a group of stay-behind guerrillas to operate within the invaders' beachhead. About half a mile inland between Red and Blue beaches lay a heavily wooded swamp perhaps a mile in diameter, where the ground stood generally under two or three feet of water. Booth picked this place as his homey hideout for a motley crew of about sixty stay-behinds carefully selected for a va- riety of virtues, some of them dubious. He built a wooden walkway about six inches under water into the center of the swamp, marking its location with cryptic blazings on the trees. Here he erected above water a shelter with crude sleeping and eating facilities, storage space for supplies, and a communica- tions center connected by hidden telephone lines to our main switchboard. The hideout was invulnerable to air photogra- phy and not a likely target for naval gunfire. Booth stocked it with rations, water, weapons, ammunition, and demolition material sufficient for the entire period of the maneuver. His men wore enemy uniforms. Booth's other enterprise, the counterespionage net, showed its effectiveness as D day approached. Our security vigilantes picked up two enemy agents in Isabela Segunda, CIC men in civilian clothes posing as commercial travelers from San Juan, before they had been able to get into the defense area or send out any message. No agent ever penetrated the ma- neuver area. On the two nights before D day at least a hundred enemy frogmen swarmed in to reconnoiter the beaches, but they failed to detect the machine gun nest we had hidden on the island off Blue beach. Our defenses looked from the air so formidable, however, that on D minus 1 we were ordered to detonate 100-lb. static charges of TNT among the obstacles to simulate the effects of naval bombardment. Jim Good- win had a long and eloquent discussion with the umpires about the number and position of these detonations, and in the end they did surprisingly little damage. The Action On D day, the attack made a fine show coming in. But it was stopped cold by our smoke-screen, borne on a steady trade wind blowing ideally from just north of east, until we were proved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex forced to lift it at the stipulated time. Then it was hard, slow work for the invaders to carve a foothold on the main beaches, and our machine gunners on the island off Blue beach wreaked great theoretical slaughter before their ammunition was ex- hausted. Shortly after the amphibious touch-down the airborne troops were dropped in the expected area. I'll never forget the awesome beauty of those thousand parachutes opening white against the clear blue tropical sky, accented by the bril- liant colors of the cargo chutes. But the airborne assault, which was supposed to link up rapidly with the other forces and proceed to wipe out the shattered defenders, was a failure. The twenty-mile-an-hour trade wind was rough on the jumpers; although there were no fatalities, some ninety men were hospitalized. The seaborne forces were so delayed by our obstacles that they couldn't come to the aid of the para- troopers, and we captured most of them. I was relieved to see my son walking around in the PW enclosure, and proud that he refused to accept a can of beer from me unless all the prisoners in the enclosure were similarly favored. We also took prisoner the Marine Corps reconnaissance company, which had been assigned the job of protecting the invaders' east flank where our defenses were weak. We offered the Marines no opposition until they got so far inland that they were out of touch with the main forces and had exhausted their fuel and ammunition. Their capture left the enemy flank wide open to anti-tank fire and counterattack from our anti-aircraft and reserve infantry battalion operating out- side the envelopment. Along about noon of D day, at the expense of many hun- dreds of theoretical casualties, the main invading forces had fought their way inland past the swamp hideout of Booth's guerrillas, who now began to trickle out and mingle in their American uniforms with the enemy on the beachhead, where all of course was confusion. For the next three days, operat- ing mostly at night, they performed all the functions of a real fifth column, with which the Army, Navy, Air Force, and Ma- rine invaders were completely unprepared to cope. Their most valuable contribution was a steady flow of intelligence A7 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Operation Portrex to our headquarters, but some of their paramilitary exploits were more spectacular. They put time-fused incendiary bombs in all manner of dumps along the beaches and on board beached LST's. They placed shaped charges against a cruiser lying off shore. They captured and used an enemy tank. They theoretically killed the enemy Corps and Division Commanders by simply knock- ing on their tent poles, handing each a musette bag "from Colonel so-and-so," saluting, and disappearing: the bags held simulated bombs timed for something like thirty seconds. They captured officers carrying communications instructions for directing field artillery and naval gun fire, data which by the end of the maneuver had almost got us, the defenders, ac- cepted into the invaders' naval gun radio net, and had actually enabled us to make the enemy field artillery fire in places of our own choosing.' In spite of his set-backs and losses, the invader succeeded, using a clever night operation which had been rehearsed at Fort Benning, in gaining a lodgment on VIP hill by about midnight after D day.2 Having intelligence of his strength That these small off-beat operations can sometimes yield dispro- portionate results was brought home to me again later, in Korea during the last Red push in the summer of 1953. In the Seoul- Inchon area a couple of light enemy aircraft were making a series of inconsequential night-time intrusions, flying low so they were almost impossible to intercept. Since they did little or no damage, however, they were shrugged off and left to the quadruple mounted .50-caliber machine guns posted throughout the area. At Inchon one of these gun posts, sandbagged on a knoll, guarded a great dump of oil in 55-gallon drums, fuel which would be needed by our forces in opposing the current large-scale enemy offensive. One night, as one of the light intruder planes, flying low in the usual pattern, came over toward this dump, enemy agents by sniping drove the gun crew momentarily from their post. The plane dumped a sackful of incendiary grenades into the acres of piled-up oil drums, and the fat was in the fire. Only the depot commander's precaution of having stacked the drums in well-separated small piles and his prompt action in containing the fire saved us from a critical fuel shortage at a critical time. A silly little operation, one that could probably never be repeated, had come close to having very em- barrassing results. E The battalion commander in this action was Lt. Col. Joe Stillwell, Jr., now a general officer. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved_Eor Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Opera ion or rex and fearing that morning would find us in a precarious posi- tion, I ordered at 0200 hours that an over-all withdrawal to our second position be completed before daylight. This was a large order, but it worked: dawn on D plus 1 found the en- emy coming out of his corner punching wildly in the air, that is deluging our now empty old positions with a heavy artillery barrage. That day and the next we made two successful sur- prise counterattacks, and when the problem was called off at 0900 on D plus 3 we were still an organized force with a small reserve at hand. Wally Booth stayed on in the service after the maneuvers, and in 1952 he was wounded while engaged in guerrilla ac- tivities on an island off the eastern coast of North Korea. I am told that one result from our efforts at Vieques was the establishment of an Army school to teach the kind of opera- tions Wally demonstrated there. If that is true, one of the buildings at the school should be called Booth Hall. A9 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Personal recollections of the capture and show trial of an in- telligence chief. THE LAST DAYS OF ERNST KALTENBRUNNER The list of the 22 once exalted Nazis on trial at Nuremberg was led by the notorious names Goering, Hess, Ribbentrop, and Keitel, in that order. The man who came fifth, after Robert Ley's suicide, was not well known to the public, either in Germany or abroad. The prosecution was distressed that documents bearing his signature were few and far between. His name had rarely appeared in public print. The official Reich photographer, Heinrich Hoffman, had been unable to find in his extensive collection a likeness of the man. The press kept running some other Nazi official's photo to repre- sent him and getting mixed up about what his position and duties had been. This obscurity was fitting and proper from the professional point of view, for Ernst Kaltenbrunner had headed the at last unified Reich intelligence and security services. Succeeding after Reinhard Heydrich's assassination in June 1942 1 to the chieftainship of the Reichssicherheitshauptamt, Kaltenbrunner inherited the RSHA's ascendancy over Ad- miral Canaris' Abwehr which Heydrich had achieved, and eventually, with the assistance of circumstance, he contrived to have the Abwehr completely abolished and its main rem- nants made the RSHA's Militaerisches Amt, to be directed along with its foreign intelligence Amt VI by Walter Schel- lenberg. Amt III, under Ohlendorf, was the internal Sicher- heitsdienst, and Mueller's Amt IV the Gestapo. But Kalten- brunner's main interest lay in foreign affairs: according to Schellenberg he aspired to get hold of the foreign ministry in place of Ribbentrop, whom he hated.2 He was a powerful man. Even Himmler, to whom he theo- retically reported, feared him: asked in April 1945 to receive some Swedish delegates from the Jewish World Congress, 1For the story behind Heydrich's death see Studies IV 1, p. I. 2 Folke Bernadotte, The Curtain Falls, p. 142. MORI/HRP from pg. A11-A29 All Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days Himmler said to Schellenberg, "How am I going to do that with Kaltenbrunner around? I should then be completely at his mercy." 3 (Schellenberg considered Kaltenbrunner, his im- mediate boss, to be one of his own "most active and dangerous enemies" and therefore worked closely with Himmler.) Kal- tenbrunner, not Himmler, was entrusted with the investiga- tion of the July 1944 attempt on Hitler. He often by-passed Himmler to report directly to Hitler, with whom he had had personal ties since childhood, and toward the end spent sev- eral hours with him daily.4 On the Scent of the Chief Werewolf After the Siegfried Line was breached and Nazi Germany be- gan to fall apart, it was said that the hard core of Party lead- ers and their Waffen SS would hole up in a National Redoubt which they had made ready in the Austrian Alps and from there descend to prey like werewolves on the Allied occupa- tion forces. This bad dream, of course, never came true, and later there was a good deal of scoffing at the "myth." But at the beginning of May in 1945 there was nothing mythical about either the Werewolves or the National Redoubt. As General Walter Bedell Smith said, "We had every reason to believe the Nazis intended to make their last stand among the crags." 5 All of our intelligence pointed to the Alpine area east and south of Salzburg as the final fortress for the Goet- terdaemmerung of the remaining Nazi fanatics. Reconnais- sance photographs showed that they were installing bunkers and ammunition and supply depots in this mountain region. Interrogations of military and political prisoners indicated that government officers, ranking Party leaders, and the SS troops were moving to the Redoubt, leaving it to the Wehr- macht to stem the allied advance. Under these circumstances the 80th Infantry Division, Third U.S. Army, was ordered back on May 3 from its meeting with the Russian troops at Steyr on the Enns river to a position 'Deposition of Walter Schellenberg, Document No. 2990-PS, November 18, 1945, Office of Chief U.S. Counsel, Nuremberg. ' Bernadotte, op. cit., pp. 133, 139; Walter Schellenberg, The Labyrinth, passim. "'Eisenhower's Six Great Decisions," Saturday Evening Post, July 13, 1.946, p. 26. A12 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 AuraIhkirchan _?j ))~~ hls-orl' l*? Rltham t-thr or fa rehha 9 - Y 2e ?]uNpt~ M+J TG rev{s~kiaU C~ ? ~'R ~&N H ~l ..? x tea. $ L--- \ 1 l9 rsr ut.T t e s 0} Ihiu 4 Brid{Uw imt ~`'4 ???Iil tY t T 61984 11a3U Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kalfenbrunner's Last Days about sixty kilometers north of the center of the National Redoubt area. I was in charge of the CIC team covering the area of the 80th Division's 319th Regiment. Interpreter Syd- ney Bruskin of New Haven, Connecticut, worked closely with me. On May 5 we arrested and interrogated the Party leader of the village of Vorchdorf. He revealed that two days earlier August Eigruber, Gauleiter of Upper Austria, had passed through Vorchdorf on his way to Gmunden on Traunsee, a fashionable resort about sixty kilometers east of Salzburg in the foothills of the mountain Redoubt. Gmunden was beyond our prescribed area, but a Gauleiter was too tempting a quarry; there were only four in Austria, 42 in all the Greater Reich. So we took up the pursuit. But in Gmunden the Aus- trian police told us that during the previous week not only Eigruber but also Kaltenbrunner and Reichsleiter Ley of the German Labor Front had passed through. Here was big game indeed. They had been headed for the heart of the Redoubt in the Salzkammergut, a mountain fastness dotted with salt mines and extending from Attersee through St. Wolfgang and Bad Ischl to Bad Aussee in the Steiermark. Proceeding the same day up the long Traunsee shore into the Redoubt area with a tank battalion, Sid and I were afforded the opportunity to examine a concrete manifestation of Kal- tenbrunner's work, the concentration camp at Ebensee. Part of the Mauthaeusen extermination system built up by Kal- tenbrunner when he had been the "Little Himmler" of Aus- tria, it seemed more horrible even than Dachau or Ohrdruf. Bodies that one would never have believed could exist alive were walking around, covered with sores and lice. The filth was indescribable. Adjacent to the crematorium were rooms piled high with shrunken nude bodies, lye thrown over them to combat the stench and vermin. The excess bodies that couldn't be handled at the crematorium were hauled by the wagonload to another part of the enclosure, where they were dumped into open pits filled with a chemical solution. Worse still was the hospital, where the dying and sick had been herded for experimentation before being carted off to. the crematorium. There were no beds in it; the inmates lay on shelves covered with dirty rags, groups of two or three hud- A13 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days died together like mice to keep warm. As we entered they put out their hands and begged for food. When we told them we had none, but that the American medics and military gov- ernment personnel would be along immediately, they broke down and sobbed, "We have waited for you four, five, six years. Now you come empty-handed." On the next day, May 6, we seemed about to close in on Kaltenbrunner, the man who shared with Himmler and SS General Poehl responsibility for the whole system of Nazi concentration camps. We had pushed sixteen kilometers into the Redoubt without encountering any sign of resistance and reached Bad Ischl, home of Franz Lehar and formerly the sum- mer residence of Emperor Franz Josef I. Here we were told "on reliable authority" that at that moment Kaltenbrunner and his wife were in Strobl, a town ten kilometers to the west. Our informant, who wore the uniform of a Wehrmacht lieutenant, was a local leader in the Austrian Freedom Move- ment which had sprung up in opposition to the Nazis. This Movement did in fact give invaluable aid to the CIC in track- ing down the Nazi leaders: about 80% of our arrests of SS, Gestapo, Sicherheitsdienst, and Party leaders in Austria were due directly to leads received from it. The lieutenant offered to drive me to Strobl with his in- terpreter, a German soldier, and to have a second car with other members of the Freedom Movement follow us. Sup- pressing my suspicions of this quick proposal I left Sid in Bad Ischl to organize an informant net and set out with the volun- teer escort. I was thankful for their Wehrmacht uniforms when we found the road clogged with remnants of General Sepp Dietrich's Sixth SS Panzer Army retreating before the Rus- sians. We were not bothered. The war was effectively at an end, anyway, and the main bulk of the SS, like the Wehr- macht, was glad to call a halt to the fighting; it was mostly fanatics and the underground that worried us now. In Strobl, the burgermeister admitted in a trembling voice that the Kaltenbrunner party had been staying at an estate on the outskirts of town. We drove to this estate, parked the two cars at the entrance to the grounds, and walked from there to the house. Several men in civilian clothes followed but did not stop us. At the, house we were greeted by a large M proved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days blond woman of about 38 years, who immediately acknowledged that she was Mrs. Ernst Kaltenbrunner. With her were her three young children but no husband. I informed her that she was under arrest for purposes of interrogation and, to impress the civilian bodyguard, mentioned the imminent ar- rival of American soldiers. We then escorted her down to the car, still followed by her silent bodyguard. At the car their leader finally spoke, in perfect English: he and his men had personally been instructed by General Kaltenbrunner to safeguard Mrs. Kaltenbrunner and the children; only yester- day, however, he had heard on the radio that General Eisen- hower had ordered all civilians to turn their weapons in to local burgermeisters, and he had told his men to comply; they therefore had no means to carry out their assigned mission. It was apparent that the will to resist was gone. Back in Bad Ischl, our informants helped us pin-point the center of the National Redoubt as being in the vicinity of the mountain town of Alt Aussee, thirty kilometers to the south and well up in the Totes Gebirge range. We took this in- formation, and Mrs. Kaltenbrunner, back to the 80th Division command post at Voecklabruck. Interrogated, Mrs. Kalten- brunner acknowledged that her husband had been with her at their Strobl estate as recently as May 3. He had presided over a meeting attended by the following important Nazi of- ficials: Neubacher, ambassador to Belgrade; General Glaise- Horstenau, minister to Croatia; Gauleiter Rainer of Salzburg; RSHA foreign intelligence area chiefs Wilhelm Waneck and Wilhelm Hoettl; SS Oberfuehrer Muehlmann; Otto Skorzeny, leader of the RSHA sabotage units. Kaltenbrunner, she said, knew the Alt Aussee area well from summer visits he had made when he was the "Little Himmler" of Austria. She de- scribed him as 43 years old, six feet four inches tall, weighing 220 pounds, having a powerful build and dark features, with deep scars on both sides of his face. A task force of tanks and infantry under Major Ralph Pearson was ordered to the Alt Aussee area, and I was in- structed to join them there. It was now V-E day. Sid Bruskin and I left Voecklabruck at four in the morning on May 9. As we drove up over the Poetschen pass, it was difficult to keep our minds on the mission, so beautiful was the scenery. The Approved For Release 2004/12/17 : CIA-RDP78-03921A00030030000I-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days road led up beside a rushing mountain stream that cascaded merrily down the rocks in steep descent, its spray sparkling in the early morning sun. Above and around us were snow- capped peaks, and the green alms on either side were brightly splashed with mountain flowers. We rested in Bad Aussee and then climbed the last four kilometers into Alt Aussee, a town of 4,000 at the end of a winding mountain road, the last village in the ascent up the Totes Gebirge. Nestled on the west shore of Alt Ausseersee, it looks across the deep, cold lake to the Trissiwand Peak on the east and over the Loser Alm on the north shore to the snowcapped summit of the Totes Gebirge range. Alt Aussee was for the Viennese what Lake Tahoe is for Cali- fornians. Three Gauleiters-Henlein, Jury, and Eigruber- had their summer homes there. Prince Chlodwig Hohenlohe- Schillingsfurst, the largest landowner in the Salzkammergut, was born and now lived there. Prince Hohenlohe, who had lived for a decade in New York with an American wife, made transparent attempts to ingratiate himself with us. He got us living quarters in the Hotel Eibl and offices in one of his villas down the street. He invited us to tea and apologized for his poor hospitality, saying that the Nazis made him live in his barn. (Later he was arrested for interrogation, after Kaltenbrunner told 12th Army Group interrogators that he had been Ribbentrop's observer in Spain and Portugal and had produced a mine of information regarding the United States and Latin America.?) We established an informant net from our "white list" of anti-Nazis and the most knowledgeable and trustworthy mem- bers of the Freedom Movement. This latter group was headed by Johann Brandauer, the assistant burgermeister. Rumors were rife that Kaltenbrunner, Ley, Eigruber, Kreisleiter Stich- not of Gmunden, and strong groups of SS troops and high SS officers were hiding out in the recesses of the Totes Gebirge. From May 9 to May 11 we worked sixteen or eighteen hours a day trying to get some clue to Kaltenbrunner's where- abouts. HQ 12th Army Group Intermediate Interrogation Report, June 28, 1945. kpiroved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days Our first important contact was with Albrecht Gaiswinkler, a British agent who had been parachuted into the area on April 20. A native of Bad Aussee, he had been drafted into the Wehrmacht, had deserted in France, turning a Nazi sup- ply train over to the French Maquis, and when the Third Army liberated Alsace had given himself up to the Americans. The Americans had turned him over to the British, to whom the Aussee area was allocated for future occupation. Gais- winkler had learned that Wilhelm Waneck, Chief of the RSHA Intelligence Section for Southeastern Europe-and one of Kaltenbrunner's May 3 conferees at Strobl-was now operat- ing a wireless transmitting station in the Kerry Villa located on a hill at the outskirts of Alt Aussee. Working with Waneck were his deputy, Wilhelm Hoettl, (another of the con- ferees), Werner Goettsch, who had earlier held Waneck's job and now was a sort of chief ideologist for the RSHA, and a number of other Nazi officials. Thanks to Gaiswinkler's effective groundwork, Sid and I were able to arrest this group, seal its headquarters at the Kerry Villa, and stop the operation of its transmitter. We did not know then that this was the central communications center for the National Redoubt and Kaltenbrunner's only connection with the outside world; its importance and the feverish activities of the Goettsch-Waneck group during the preceding month were revealed only later after detailed in- terrogation of the principals. For the moment our attention was all on locating Kaltenbrunner, and these people gave no leads on his whereabouts except the information that he had been at Alt Aussee on May 3. We located and arrested many lesser Nazis who had fled to Alt Aussee, seeking for the most part time to collect their thoughts and prepare their anti-Nazi alibis-Gunther Alten- burg, Minister Plenipotentiary to Greece; General Erich Alt of the Luftwaffe; Joseph Heider, who had been detailed by Eigruber to blow up the Alt Aussee salt mines wherein was stored a fabulous collection of looted art treasures for the projected Great Hitler Museum in Linz; Dr. Hjalmar Mae, head of the puppet state in Esthonia; Walter Riedel, construction chief for the V-2 weapons at Peenemuende; Ernst Szar- garus, Foreign Office secretary in Rome; Spiros Hadji Kyriakos, Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days Under Governor of the National Bank of occupied Greece; William Knothe, General Counsel of the Foreign Office; Dr. Carlos Wetzell, head of the pharmaceutical industry; and Dr. Bailent Homan, minister in the Hungarian puppet govern- ment. As we cast about during those three days for traces of Kaltenbrunner's movements, we sorted out the diverse social groups in Alt Aussee, each busy trying to establish its anti- Nazi premise. There was the artist's group, with movie actors Ernst von Klipstein and Lotte Koch, the Viennese theater star Unterkirchner, the aged composer Wolf-Ferrari, the sensa- tional pianist-composer-conductor Peter Kreuder, self-styled "Cole Porter of Germany," the composer and conductor Nico Dostal, the Austrian tenor and movie star Johannes Heesters, and many members of the Vienna symphony orchestra. More intriguing from the CIC viewpoint was the old German no- bility group of Countess Platen and Herbert von Hindenburg, nephew of the Field Marshal, because they had living with them one Jean Schils, a Dutch intelligence man who claimed to have been a member of the anti-Nazi underground, and a certain Norman Bailey-Stewart. Schils gave us several false leads on "V-3 weapons" supposed to be located nearby in a Russian-occupied area, and seemed in general bent on provok- ing incidents between the Russians and the Americans. One day Schils came into the office to volunteer informa- tion on the whereabouts of Gauleiter Eigruber and brought Bailey-Stewart along as his interpreter. It soon became ap- parent that Bailey-Stewart was deliberately misinterpreting everything Schils said, and he was acting very abnormally. About 35 and unusually good-looking, he showed his im- patience with the dullness of the business at hand. I ques- tioned him alone, and he turned out to be England's famous "Officer in the Tower" of the thirties, eager to tell the world the sequel to those early espionage activities-his work for the Nazis in the war just ending. In 1932, according to his account, returning as a second lieutenant from duty in India, he was disillusioned with Eng- land's imperial policy. He volunteered for the German secret service and was sent back to London to collect order-of-battle information. Discovered through the alertness of the Eng- A18 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days lish censors, he was tried amid much publicity and sentenced to five years in the Tower of London. When his family's in- fluence obtained his release in 1936 he went to Vienna, watched now not only by the English secret service but also by the Gestapo and Schuschnigg's and Skubl's Austrian police. He applied for Austrian citizenship. The English picked him up in 1938 and accused him of smuggling arms into Austria to help the then illegal Nazi Party. The charges were not proved, however, and with the Anschluss he became a Ger- man citizen. In the same year he was questioned by RSHA agents about his criticism of Nazi propaganda beamed to England, and his criticism was so good that he was flown to Berlin and given a job in the Rundfunk, where in 1939 he began what were to become later, under William Joyce, the Lord Haw Haw programs. But about this time he was re- ported to have made remarks detrimental to the Nazi State, and he became involved in personal antagonisms. Through a friend in the Foreign Ministry he was given a job in its wireless department. In March 1944 he was sent to Vienna. In December, having been called to service in the Volksturm, he gave a false address and departed for Alt Aussee. All this was very interesting, but it did not advance the Kaltenbrunner chase. We arrested Bailey-Stewart on behalf of the British and went back to our job. The most promising set of people in Alt Aussee for our purposes was the one com- prising Countess Gisela von Westarp, Iris Scheidler, and Dr. Rudolf Praxmarar. Gisela von Westarp was Kaltenbrunner's mistress. A pretty blonde of twenty-two with blue eyes, vivacious and extremely intelligent, she had been working at Himmler's Berlin head- quarters when Kaltenbrunner came from Vienna in early 1943 to take over the RSHA. On March 12, 1945, she bore him twins, Ursula and Wolfgang, in a cowshed in Alt Aussee. I still have a letter she wrote to her mother describing the event, declaring that she "almost deserved the Mother Cross," and pointing out that Mrs. Kaltenbrunner had taken twelve years to produce only three children. One of the twins' godfathers, Gisela told me proudly, was Hitler's per- sonal physician, Dr. Karl Brandt. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaftenbrunner's Last Days Iris Scheidler was the wife of Arthur Scheidler, formerly adjutant to Heydrich and now to Kaltenbrunner. She was thirty years old, an attractive society brunette, seemingly in- tent on having a good time. She and Gisela were good friends with many of those in the Hitler inner circle, especially Heinrich Hoffman, the Reich photographer who had intro- duced Eva Braun to Hitler, Eva Braun herself, Baldur von Schirach, Hitler Youth leader and later Gauleiter of Vienna, and Herman Fegelein, the SS General who acted as liaison officer between Hitler and Himmler. Dr. Rudolph Praxmarar had once been Iris' husband, and they still had great affection for each other. He had been a classmate and friend of Kaltenbrunner's at the University of Graz and then became a prominent physician in Vienna. Now he was the SS Chief of Hospitals and military commander of Alt Aussee. He was about 50 years old, with a genial person- ality and the reputation of being a great sportsman. But we received from Freedom Movement informants in the SS hospitals an accusation against him signed by members of his own staff. It read in part: Until two days prior to the entry of the American Task Force Into Alt Aussee, Praxmarar kept active association with the bloodhound Kaltenbrunner. He has not been afraid to shelter him in the hos- pital and provide him with medicines and food and weapons. Arms were loaded into a car at night to help Kaltenbrunner escape to the mountains. Praxmarar, prior to the arrival of the Ameri- cans, tried to force several of the patients into the Kampgruppe Kaltenbrunner for the purpose of staging a last stand in the moun- tains. He also tried to get one hundred men from Georg [Gais- winkler] for the same purpose. Under the pretext of angina pec- toris he took into the safety of his hospital the Kaltenbrunner Gestapo chief in Vienna, SS Brigadier General Huber. We found Huber still in the hospital and arrested him. Praxmarar we didn't arrest until several days later, when we had received further proof of his complicity with Kaltenbrun- ner. The Quarry Taken Finally, on the morning of May 11, we received our first solid piece of information on the location of Kaltenbrunner's hideout. Johann Brandauer reported that the Alt Aussee for- est ranger-a member of the Freedom Movement-had seen A20 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaftenbrunner's Last Days General Kaltenbrunner, Scheidler, and two SS guards five days before in a cabin called Wildensee Huette atop the Totes Gebirge. Though the tip was five days old, it had the merit of coming from a reliable source: Brandauer was one of our closest and most trustworthy collaborators. I therefore asked him to bring me immediately two reliable Austrians who knew the mountain trails to serve as guides. Brandauer. brought not two but four Austrian guides, all former Wehrmacht soldiers. They said it would take us five hours to reach the cabin. There would still be from twenty to thirty feet of snow on the ground, and no cover for us ex- cept drifts on the last four kilometers of the way up to the cabin. We would have to leave before midnight to arrive under cover of darkness and while the crust on the snow was still hard. ~ I would dress in Austrian costume-lederhosen, Alpine jacket and hat, and spiked shoes. I would approach the cabin alone; the Austrians were not willing to come closer than five hundred yards. I would go up unarmed so as not to draw fire or arouse suspicion. I would pose as a passer-by crossing the mountains on the way to Steyrling, in the next valley: there were many Wehrmacht deserters and fleeing Nazis whose safest and most expedient mode of travel was by foot over the mountains. If Kaltenbrunner was not there I would come out immediately. This was a sensible plan. That it was executed stumblingly was due to the fact that Major Pearson, the task force com- mander, insisted on sending a squad of his boys along. I was afraid their presence might bring on a pitched battle, leaving either a dead or an escaped Kaltenbrunner, and my argu- ments achieved at least the compromise agreement that I would have authority to use the infantry squad in any man- ner I saw fit. I ordered it to stay well to the rear and on the approach to the cabin keep under cover out of sight. After this matter had been arranged, on the afternoon of the eleventh, I sent for Gisela. She was extremely anxious to find out what information we had regarding Kaltenbrun- ner. I told her we had some leads and asked her to write a note to him urging him to accompany the bearer into safe custody with the Americans rather than let himself be taken, and probably killed, by the Russians. After a moment's Approved For Release 2004/12/17 : CIA-RDP78-03921A00030030000 21 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days thought she complied. Later that afternoon we were visited by several delegations from the Gisela-Iris group-first Hans Unterkirchner, the Viennese actor, then Lotte Koch and Ernst von Klipstein, then Praxmarar and Iris-all fishing for information. Iris was apparently most concerned about the safety of her husband Arthur Scheidler. Although she was going to have a baby in six weeks, she insisted that she be allowed to ac- company any patrol that might go off into the mountains after him, arguing that if she were in evidence there would be no shooting on the part of the Kaltenbrunner group. Thinking that she might indeed be useful in this way, I told her she could come; but then she backed down. Never quite sure what the maneuverings of these friends of Kaltenbrun- ner might mean, I sent Sid to the Gisela-Iris house to keep an eye on them for the next twelve hours. That night at 11:30 p.m. the patrol assembled in the CIC office for final briefing. The infantry boys, although they had volunteered for this mission, were a little dubious about the plan as outlined, and especially about being guided by former German soldiers. They wanted it made clear that if they made a single false step the guides would be dead ducks; after coming through the war alive they didn't want to get killed with peace and home in sight. As we started off at midnight the squad of soldiers loaded with their rifles, hand grenades, and ammunition seemed to make as much noise as a company of tanks rolling through the streets; it would be evident to the village people that a patrol was leaving. We walked past the See Hotel, where one of Praxmarar's SS hospitals was quartered, past Fischern- dorf, along the Alt Ausseersee shore, and then began to climb. There were unexpected obstacles: trees swept down by heavy snowslides lay across the path, and the foot bridge over the Stammern stream had been carried away in the spring floods. Up through the timber, up past the timber line we wound our way, snake-like over the hairpin trail. The infantry, weapon- laden and without spiked shoes, slowed us down, and it was soon clear that we could not keep to our schedule. Three of the soldiers, injured by falls, were dropped along the way. A ,roved For Release 2004/12/17: CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days At 5 a.m., as day began to touch the sky, we finally reached a snow-covered pass from which through glasses we could see the Wildensee Huette. It lay across a great expanse of ex- posed down-slope and then up a long bare ridge, just below the crest. We nevertheless decided to proceed directly, in full view, rather than take a circuitous route to gain cover from overhanging crags. It was getting late; everybody was thor- oughly tired from breaking through the crust calf-deep at every step; and the cabin appeared to be utterly deserted. Behind a ridge of snow some 300 yards from the cabin I left the four Austrian guides and what remained of the in- fantry squad and worked my way around to the blind west side of the cabin, taking advantage of any cover there was. As I was laughing at myself for being so cautious in approach- ing an evidently deserted cabin, I heard a bird-call signal off to the right. No, it was a bird, apparently as lonesome as I felt. The cabin, I could see, was a typical Alpine hut-two rooms, a wood shelter, a porch that faced down the slope in the direction we had come. The shutters were tight closed; no smoke was coming from the chimney; no fresh foottracks were visible in the snow. I walked onto the porch and knocked at the door. There was no response. I tried the door and found it locked. But then a sleepy groan came from the left-hand room. I knocked loudly on the window shutter. Someone got out of bed and walked across the room. The shutter opened, revealing a rough-looking man of about 35, not Kaltenbrunner. "Was suchen?" he asked. I said in very American-sounding Ger- man that I was cold and wanted to come in. But he clearly wasn't going to ask me in, so I came straight to the point and handed him Gisela's note to Kaltenbrunner. He read it carefully, but then said he didn't know these people, he was just a passer-by on his way down to Bad Ischl. At that moment he looked over my shoulder down the slope, and saw the four guides coming up with rifles slung over their shoulders; observing that nothing had happened to me, they had decided that there was no danger. He quickly crossed the room and took a revolver from his trousers hanging be- side the bed. I retreated to the protection of the cabin's west side, and he slammed the shutter shut. The guides, alarmed, A23 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days brought the eight infantry boys up in a half-circle around the front of the cabin. While this maneuver was being executed, the man in the cabin opened the door and came out on the porch, perhaps to negotiate, but when he saw the rein- forcements he quickly reentered, slamming and bolting the door behind him. With the men in position, we called out to the occupants to come out with their hands over their heads. For ten min- utes we kept repeating this call, with no results. Not wishing to start shooting, we went onto the porch and began to knock down the door. But immediately it opened and four men walked out with their hands over their heads. They had de- cided to come peacefully after all. Inside the cabin we found four Wehrmacht rifles, four re- volvers, a large quantity of ammunition, two machine pistols, and a machine gun, the latter hidden in the recess of the chimney. Also a case of empty champagne bottles, some French bonbons, some American tax-free cigarettes, and a large quantity of counterfeit American and British money. In the ash pit at the base of the chimney was a picture of Kaltenbrunner with his wife and children, a copy of his last radio message to Fegelein for Himmier and Hitler, his identi- fication card as Chief of the SIPO and SD, and his metal identification discs as number two man (Himmler was num- ber one) of the Gestapo and the Kriminalpolizei. I interrogated each of the four men. Two of them admitted they were SS guards, but claimed they had no connection with Kaltenbrunner. And Kaltenbrunner and Scheidler, although there was no mistaking at least the former, refused to admit their identities. They had false papers, Kaltenbrunner those of a doctor discharged from the Wehrmacht, and lie carried a medical kit and all the usual accessories. (Later he took pains to explain that these papers were not forged, but the authentic identification of deceased persons. This rather fine distinction was characteristic of his efforts to appear an Aus- trian gentleman and a good Catholic.) He stood rigidly at at- tention during the interrogation, trying to create a good in- itial impression by being earnest and cooperative. Scheidler was the antithesis. He made no attempt to hide his wrath. AApproved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approve~Ipfeoreeler 2~( /~~57 : CIA-RDP78-03921 A000300300001 -1 His eyes flashed furiously at me as we swung heavy packs onto the four men for our trip down to the village. At 11:30 in the morning we arrived back in Alt Aussee, where word had apparently circulated that a mountain patrol was returning: a crowd was gathered in the village street. As we passed Prince Hohenlohe, he remarked, "I see you have your man Kaltenbrunner," and at the same time Iris and Gisela broke from the throng and ran up and embraced their respective men. Kaltenbrunner and Scheidler now had to drop their masks. The Last Days In time, through the interrogation and testimony of Kal- tenbrunner and others,? it was possible to piece together the story of his recent efforts to salvage something from the Ger- man defeat. On April 18 Himmler had named him Commander in Chief of all forces in southern Europe. He had reorganized his intelligence services as a stay-behind underground net, dividing the command up between Otto Skorzeny, head of the sabotage units, and Wilhelm Waneck, whose radio station in the Kerry Villa kept in contact not only with Kaltenbrunner and other centers in the Redoubt and in Germany, but also with stay-behind agents in the southern European capitals. Waneck, however, with Werner Goettsch, Wilhelm Hoettl, and others, concluding as early as 1943 that the Nazis would lose the war, had been intriguing for a negotiated peace with the western allies and a common front against Russia. The plan was to set up an independent Austrian state in rebellion against the Nazi Reich and supported by the Anglo-Ameri- cans. Goettsch had valuable contacts among the Vienna So- cialists, and one idea had been to send Karl Doppler to the United States to broach the plan because he had the same masonic degrees as President Roosevelt. Kaltenbrunner was informed of this conspiracy and gave tacit assent, though he could not actively participate. Later other Socialists were brought in, including Karl Winkler, who had contacts with Notably Wilhelm Hoettl (Third Army Preliminary Interrogation Re- port No. 17, June 1945), Wilhelm Waneck (12th Army Group In- termediate Interrogation Report, June 21, 1945), and Werner Goettsch (USFET Final Interrogation Report No. 8, July 24, 1945). A25 Approved For Release 2004/12/17 CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CI --RDPb78 03e9?1Aa0003 yS00001-1 America and England through Draja Mihailovich, and Raffael Spann and Professor Heinrich, who had an excellent contact in England, their friend Major Christie at the Travellers Club, London. Attempts in 1944 to contact Major Christie by letter failed, however; and an opportunity provided by Mihailovich to get in touch with the American Legation in Belgrade was lost when Belgrade was occupied. Finally, in March 1945, according to the interrogation re- ports, Hoettl went to Switzerland with the Polish Count Potocki, with whose help and that of Prince Alois Auersperg, a former Abwehr officer implicated in the July 1944 attempt on Hitler's life, he was able to get into touch with Mr. Schultze-Gaevernitz, a member of the American Embassy, and through him with Allen Dulles." Through Auersperg and a Dr. Kurt Grimm, Austrian Freedom Movement representa- tive, Hoettl also had contact with a Mr. Leslie of an Allied Commission in Berne. The Americans, he was told, did not want a strong Russian influence in Austria, and they were particularly interested in Kaltenbrunner's attitude toward an independent Austrian state. With this information Hoettl, Waneck, and Goettsch were able to urge Kaltenbrunner to set up a rival Austrian govern- ment to the Russian-sponsored one in Vienna, which the west- ern allies refused in April to recognize. Kaltenbrunner held two meetings with members of this Free Austria group-Neu- bacher, Glaise-Horstenau, Muehlmann, Hayler, Pschikril, Hoettl, Goettsch, and Waneck-at which a provisional cabinet was discussed and it was decided that Kaltenbrunner, in ac- cordance with American wishes, should be an advisor. Hav- ing now full powers in southern Europe, Kaltenbrunner was in an excellent position to use his reorganized intelligence services as a bargaining counter with the Allies. On April 26, at Strobl, Hoettl reported to Kaltenbrunner, Glaise-Horstenau, Neubacher, Muehlmann, Waneck, and Goettsch on the results of a second visit to Switzerland. It was agreed at this time to try to arrange a meeting between Allen Dulles and Kaltenbrunner at Feldkirch, in Austria near 'This approach, if it was made, was carried out by the interme- diaries: Hoettl did not in fact meet with Allen Dulles, and probably not with Gaevernitz. A26 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approveeddffi nrbR lea a ?Og4,12I17 : CIA-RDP78-03921A000300300001-1 the Swiss border. During the next few days Kaltenbrunner met with Field Marshall Kesselring and Lieutenant General Winter at Koenigsee regarding the project. But the sands were running out; the war was coming to an unexpectedly rapid end. Kaltenbrunner could pursue the political way out no longer. Facing capture as the Russian and American troops closed in, he retired to Alt Aussee to bid Gisela farewell and from there with his two SS guards and his adjutant Scheidler made the ascent to the mountain hideout among the snowy crags of the Totes Gebirge. Interrogated now briefly by the 80th CIC at Alt Aussee before being sent on to Third Army and 12th Army Group, Kaltenbrunner said that he had intended to come down from his retreat after things had quieted down and, on the basis of the underground forces at his command, his Free Austria proj- ect, and his knowledge of Bolshevism, come to terms with the western allies: "If there is one man in Europe who knows Bolshevism, it is I." We allowed Gisela and Iris a last tearful. farewell before sending the two men on to higher headquar= ters. There was a plan afoot which never materialized to have Kaltenbrunner talk with General Eisenhower and then issue a statement calling on the underground to end all re- sistance. During subsequent interrogations Kaltenbrunner remained very cooperative, intent on establishing his alibi. At Third Army he said that with Hitler's consent he "began in 1945 to use the foreign intelligence service to counteract Ribben- trop's pernicious influence and to find a political way.. out." He wrote a letter to his wife, Lisl, clearly designed for Am..exi- can eyes: My own destiny lies in the hands of God. I am glad that I never separated from Him.... I cannot believe that I shall be held re- sponsible for the mistakes of our leaders, for in the short time of my activity I have striven hard for a reasonable attitude, both internal and external.... They ought to have paid more attention to my words.... We have no property worth mentioning. Pere haps the only resource for you will be my small stamp collection.... . Was it not my duty to open the door to socialism and freedom as we imagined and desired them? ... I have not given up hope that the truth will be found out and for a just legal decision. A27 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days But he never disclaimed his positive relationship with Hit- ler, one apparently bordering on adoration. His subordinate WilhelmHoettl said of him that he "was fascinated by Hitler, believed in him without reservation . . . . He believed he had a mission to serve Hitler with his entire RSHA . . He came to believe that Hitler was the man sent by God. This developed into a mania." In July Kaltenbrunner was sent to British Interrogation Center 020 outside of London. Here, at a time when the hor- rors of the concentration camps were being brought to light, he was seized on as the first prisoner that had played a sig- nificant and responsible part in the extermination program. He was given third-degree treatment, I learned later from an American intelligence officer working on the case. The result was that henceforth he not only did not cooperate but re- fused even to admit he had any responsibility at all in the Nazi system. He refused to admit that he knew men who had been his closest associates. He denied that he had ever been near a concentration camp. He refused to admit that he signed orders incarcerating persons in concentration camps. In short, he denied from this time on any connection with Nazi crimes or persons responsible for such crimes. He was flown to Nuremberg for the trial in handcuffs-the only one of the 21 major defendants treated in this manner. In November, two weeks before the scheduled opening of the trial, I was sent to Nuremberg to set up a security plan: the American military commanders were becoming anxious about "lone-wolf assassins," and Robert Ley had succeeded in committing suicide despite supposedly elaborate precautions. To test the Palace of Justice security system, another CIC man and I tried penetrating without proper credentials to the inner cell block which housed the 21 defendants. We suc- ceeded, as anybody might have done, in passing through the four interior guard posts without the required Red Pass. A fifth post guarded the individual cells. I asked to see Kalten- brunner and was readily admitted upon signing the registra- tion book. Kaltenbrunner looked gaunt and pale. He clearly showed the effects of what he had been through since I saw him on May 12. He gave no indication of wanting to remember A28 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Kaltenbrunner's Last Days me; it seemed as if he had mesmerized himself into a state of complete forgetfulness. Only when I mentioned the name Gisela he nodded and asked several questions about her and the twins. But that was all. On the opening day of the trial, to everyone's great disap- pointment, Kaltenbrunner was not in the prisoners' dock; he had been stricken with a cerebral hemorrhage the night be- fore. It was three weeks before he was well enough to make his plea, "I do not believe I have made myself guilty in the sense of the indictment." On December 10 I was present at the scene described in the press release of the International Military Tribunal's public relations office: Ernst Kaltenbrunner received a cool welcome from his co- defendants when he made his initial appearance at the trial Mon- day afternoon. Entering the prisoners' dock just before the after- noon session began, no welcoming hands were proffered to greet him. When he offered to shake hands with some of the defendants there was a noticeable reluctance on their part. Taking his seat in the dock between Wilhelm Keitel and Alfred Rosenberg, he tried to engage his neighbors in a conversation without much luck. ... When he was approached by his own defense council, Kalten- brunner held out his hand. His lawyer had, however, with studied casualness locked his hands behind his back. I walked down beside Kaltenbrunner during the intermis- sion that afternoon. He recognized me and motioned that he wanted to speak with me. That was not permitted. I had received that day through the mail a note from Gisela for him, a girlish love-note telling him that his heart must never grow cold, that she was thinking of him and would al- ways love him. I handed it to Kaufman, Kaltenbrunner's de- fense counsel. AP correspondent Daniel DeLuce, however, who was talking with Kaufman at the time, appropriated it and wrote a story on it. Kaltenbrunner presumably never found out that Gisela was keeping the home fires burning. Later that week Kaltenbrunner was stricken with a recur- rence of the cerebral hemorrhage, and could not return to the dock until January. But he survived through the entire trial, to be hanged on October 15, 1946, with eleven of his co-de- fendants. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Achievements, extravagances, and exposure of a clandestine German interbellum operation in military research and devel- opment. THE LOHMANN AFFAIR The Weimar Republic's attempts in the twenties to circum- vent the Versailles restrictions on its armed forces produced clandestine operations which in their financing, cover devices, and hazards of exposure present a close parallel with intelli- gence operations. One such series of undercover research and development projects, carried out by a Captain Walther Loh- mann of the German Naval Transportation Division, got out of hand and became a source of acute embarrassment to the Weimar Ministry of Defense. The affair was hushed up, and in more recent times has been virtually overlooked by historians. Sufficient material is now available, however, for a scrutiny of Lohmann's work, its oddities and blunders, and for an account of the way the German Cabinet successfully veiled its true nature after some of the clandestine activities had been ex- posed in the press.' Walter Lohmann, the son of a one-time director of the North German Lloyd shipping line, served inconspicuously as a non-combat logistics specialist during the European war of 1914-1918. He won recognition in navy circles afterward, how- The following materials were used in the preparation of this article: captured documents of the German naval staff, in custody of the Division of Naval History, U.S. Navy; the record of proceedings of the German Cabinet and documents of the German Foreign Min- istry, in custody of the U.S. Department of State at the National Archives; records of the Berlin Embassy of the Department of State, now available to the public at the National Archives; documents of the German Reichstag and the files of several German newspapers, including the Berliner Tageblatt, available at the Library of Con- gress. In addition the writer has consulted the published memoirs of former German Defense Minister Otto Gessler, Reichswehrpolitik in der Weimarer Zeit (Stuttgart, 1958). Precise documentary cita- tions are made in another version of this study being submitted to MORI/H RP the Journal of Modern History. from pg. A31 -A38 A31 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Lohmann Affair ever, for his work on a subcommission which negotiated the disposition of the German merchant fleet and for his direc- tion of shipments of emergency food supplies to Germany. He also managed the return from overseas of German war prisoners. In 1920, while on the first of two trips to Leningrad to negotiate with the Russians regarding the release of cap- tured German merchant ships, he met the comely German- born Frau Else Ektimov, destined later to play a role in his downfall. He subsequently arranged for the return of the lady to Germany and for her support. In October 1920 he assumed command of the Naval Trans- port Division of Navy headquarters in Berlin, a post concerned primarily with logistical matters. For this reason, and also because he enjoyed the complete trust of Admiral Paul Behnke, then commander in chief of the Navy, he was given full charge in early 1923 of the disbursement of the Navy's "black" funds reserved for clandestine purposes. Achievements Initially, these funds included large sums-amounting in dollars to at least 25 million-obtained from the sale of war- ships and submarines scrapped in 1919 and 1920 at the order of the Allied Powers. Later, some two and a half million were added as the Navy's share of the so-called "Ruhr funds," mon- ies voted by the Reichstag and used to strengthen the armed services above Treaty limit at the time of the French occupa- tion of the Ruhr. Subsequently, smaller sums totaling about two and a quarter million were obtained or diverted from other sources. Most of this money was transmitted to recipients through a Lohmann-supported bank, the Berliner Bank- verein, which acted as a middleman between the Naval Trans- port Division and the various projects funded. Only one inspector, a man of Lohmann's own choice, was assigned to audit the funds, and he had no authority to ques- tion the wisdom or validity of the captain's disbursements. His presence afforded a partial check against improper book- keeping and ordinary waste, but none to hinder Lohmann from supporting whatever projects he chose. Admiral Behnke and Minister of Defense Otto Gessler, trusting Lohmann to use the money for worthwhile undertakings, seem to have Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Lohmann Affair given him carte blanche, an opportunity which appealed to his Hanseatic spirit. Between 1923 and 1927 Lohmann financed nearly all of the clandestine and semi-clandestine projects of the Navy. Most of these were established with the initial concurrence of his superiors, and many required the closest cooperation with sev- eral divisions of the naval staff; but some were founded and supported solely on the captain's initiative without the knowledge of even the commander in chief of the Navy. This independent activity was protected by the necessity for strict secrecy in clandestine operations and by Lohmann's ex- tremely broad powers. The projects which dealt with aircraft and submarine de- sign and development were for the most part soundly con- ceived, well executed, and extremely important for the future development of the Navy and the Luftwaffe. With subsidies from Lohmann, three German shipyards operated a highly suc- cessful submarine design bureau in The Netherlands which maintained contact with Navy headquarters through a dummy firm known as Mentor Bilanz. The "Dutch" bureau, Ingenieurskantoor voor Scheepsbouw, designed a submarine which Lohmann and Captain Wilhelm Canaris (later to be- come the Abwehr chief of ambivalent loyalties) in 1926 ar- ranged to have built at Cadiz in Spain. The purpose was to train German technicians and to develop a prototype medium- size submarine, which among other features had torpedo tubes designed to eliminate the large bubble of air that nor- mally betrayed a submarine's position when a torpedo was fired. Lohmann's work in aircraft development was equally sig- nificant. The firms of Heinkel, Dornier, and Rohrbach en- joyed his subsidies, and in 1926 he purchased outright the Casper Aircraft Company to obtain facilities for the type-test- ing of "commercial" aircraft which closely resembled the fighter, bomber, and reconnaissance planes being built abroad by such firms as Boeing, Vickers, and Douglass. By 1927 Ger- many had several successful prototypes, and the Swiss sub- sidiary of Dornier was about to embark on the design and development of the "DO X" flying boat, a twelve-engine giant larger even than the famous Boeing Clippers of Pan-Ameri- A33 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Lohmann Affair can, to meet the requirement for a patrol seaplane capable of landing and refueling at sea. Only an unacceptably low serv- ice ceiling made it necessary to abandon this design. The training of airmen was at the same time not over- looked. Battle-experienced pilots of the Lohmann-financed Severa flying service based at Noordnay and Holtenau con- ducted tactical exercises with the fleet and trained a dozen young naval officers each year in the art of flying. Extravagances As Lohmann's list of projects grew-including also such things as the secret construction of motor torpedo boats and subsidies to various small-boat shipyards and yachtsmen's as- sociations-his ambition increased proportionately. By about 1926 he seems to have become convinced that he could per- fect a massive structure of clandestine projects financed by profitable commercial ventures bolstering the rapidly dwin- dling "black" funds. He then stepped into another world, the world of commerce and business, where his successes were lamentably few. He had become the victim of Masslosigkeit- gross intemperance. Two projects which attempted to combine money-making with what might today be termed "defense-related research" bordered on the fantastic. One company was founded to ex- ploit an experimental method of raising sunken ships by sur- rounding them with ice, and another sought to extract motor fuel from potatoes. These accomplished nothing, and both aroused much public ridicule when they were later exposed. Another device, a coal-pulverizing machine, came to grief in the course of experiments and the Lohmann-financed com- pany which sponsored it went bankrupt. But it was the Berliner Bacon Company which came to be described by German Socialists as the most oderiferous of Loh- mann's schemes. This project was initiated primarily as a money-maker in the spring of 1926. Lohmann proposed to wrest from the Danes the lucrative British bacon market by offering a German product cured by a new process especially for the Englishman's palate. He had incidentally in mind that the fast refrigerator ships he hoped to acquire for the bacon trade would be useful in wartime as troop transports. A$proved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Lohmann Affair His ambitions, however, exceeded his ability to analyze the British market potential, and by mid-1927 his company was bankrupt. Lohmann's downfall stemmed from his relations with the Phoebus Film Company, in 1927 the third largest producer of motion pictures in Germany. Beginning in 1924 Lohmann granted subsidies to this firm on condition that it produce films of a "national" character designed to stimulate the "fatherland consciousness" of the German people. He also hoped to use its overseas offices to establish an intelligence network in former enemy countries where Germany was not allowed a naval attache. The captain probably had personal reasons for supporting Phoebus as well. Prior to his association with the company he had become a close personal friend of one of the direc- tors, and afterward a member of a hunting club organized by him. Through this man Lohmann secured for his friend Frau Ektimov a position with Phoebus at a salary of 1,000 marks a month, enough to enable her to support her aged mother and young son in comfort. Frau Ektimov, employed for "repre- sentation," did no work, and she had apartments in a house purchased by Lohmann. Lohmann's personal relations with her are nevertheless officially said to have been above re- proach, motivated solely by a desire to help her; and honi soit qui mal y pense. He also seems not to have appropriated any of the "black" funds for his own use. Between 1924 and 1927 Lohmann provided Phoebus, a com- pany capitalized at approximately $1,000,000, with a total of over $2,500,000. He informed his superiors of only one of five separate grants, a government-guaranteed loan from the Giro- central Bank in Berlin in March 1926. In order to obtain their signatures on this guarantee, Lohmann resorted to a strategem, informing them that the Lignose Company, a pro- ducer of raw film, had also guaranteed the loan and that in the event of default it would stand the loss instead of the gov- ernment. He neglected to add that he had in effect bribed one of Lignose's officials with a $2,500 "negotiating fee," and that he had given this man a written assurance that Lignose would not have to pay. In the early half of 1927 he arranged two more government-guaranteed loans which he kept secret from Approved For Release 2004/12/17: CIA-RDP78-03921A000300300043T Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The Lohmann Affair his superiors by affixing his own signature in the name of the Reich. Despite this massive aid, Phoebus continued to lose money. In 1927 it was in such serious financial difficulties that it failed to convene its regular annual stockholders' meeting or issue a financial report. By August disaster was impending for both Lohmann and Phoebus. The company was falling be- hind in payments on its loans, and penalties were mounting rapidly. None of Lohmann's various money-making projects had paid off, and the "black" funds were near exhaustion. Exposure Kurd Wenkel, one of the financial writers of the Berliner Tageblatt, a liberal daily of high quality, had been following the declining fortunes of the German film industry with close attention. He was well aware of the financial condition of Phoebus, and by mid-July had begun to suspect that Phoebus enjoyed official support. At about this time he became ac- quainted with a former director of the company, Isenburg, who had resigned in disgust in 1926 and knew of Lohmann's dealings with Phoebus, of the several government-guaranteed loans, and of Lohmann's relations with Frau Ektimov. Evi- dently for reasons of spite he told all this to Wenkel, who took care to check the story independently and then in articles on 8 and 9 August created a sensation by exposing the shameful scandal. Wenkel, however, was apparently not aware of Lohmann's real clandestine mission. For him the Phoebus relationship constituted an attempt by the Navy to strengthen right-wing elements in Germany. His articles briefly mentioned some of Lohmann's other activities, including subsidies to a boatbuild- ing yard, but only as attempts to help industries that had some war potential. One of his disclosures, however, had it been pursued, could have exposed most of Lohmann's work- his connections with the Berliner Bankverein. Lohmann had bought a controlling interest in the Bank- verein in March 1925 in order to use it as a covert financing agency for his projects. But the private bankers who re- mained shareholders were greatly displeased at the deprecia- tion of its stock caused by failures such as that of the Ber- liner Bacon Company, and their discontent made them seri- roved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 ApprovedrFeor Releas 7~ttair 2/17: CIA-RDP78-03921AO00300300001-1 ous security risks. If any of them emulated the vindictive Isenburg and talked to the press, there was grave danger that the Lohmann affair might become not only a scandal but a revelation of serious German violations of the Versailles Treaty. Antidotes The German Cabinet and Chancellor Marx were therefore anxious to smooth the affair over as rapidly as possible. Loh- mann was suspended from office, an official Cabinet inquiry was begun, and a retired official of the Prussian State judiciary was placed in charge of Lohmann's office for the purposes of investigation and audit. Publicity was curtailed and Wenkel silenced by pressure on the Berliner Tageblatt. Two radical journals continued to carry articles through late August, Sep- tember, and October, but neither had good enough contacts in navy or industrial circles to make further damaging dis- closures. Chancellor Marx consulted directly with various im- portant party leaders to insure silence in political quarters. In November the Cabinet began a series of meetings on the affair. As prophylactic action against future extravagant in- discretions by one individual or one component of the govern- ment, it decided to establish a "Supervisory Commission for the Secret Tasks of the Armed Forces" composed of the heads of the Army and Navy, the Reich Finance Minister, and the President of the General Accounting Office (Rechnungshof) to supervise and approve all clandestine projects of the serv- ices. Within the Navy a special "B" budget for funds diverted from publicly budgeted items was placed in the charge of a regular budget officer who had no authority to initiate or con- trol projects. Although illegal operations were ultimately on a considerably larger scale than during the Lohmann era, rising from $1,700,000 in 1928 to $5,250,000 in 1933, there was no further abuse of the powers conferred by secrecy. Lohmann, much in disfavor, was nevertheless punished only by forced retirement on a reduced pension. There seem to have been two reasons for this clemency-first, that extensive investigations showed he had not appropriated official funds for himself; and second, that an elaborate court-martial would have brought on the very thing the government wanted most to avoid, publicity which might disclose violations of the Ver- A37 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RQP L 039221A0QQ33Q0300001-1 The ohmann air sailles Treaty. Lohmann was a broken man, however, and he died only three years later of a heart attack. His widow had so little money that she was unable to pay the necessary inheritance taxes. Of Frau Ektimov's fate there is no word. Before the Reichstag and the world public the Cabinet was able to obscure the fact that violations of the Versailles Treaty had occurred. The matter had to be brought to the Reich- stag for approval of a special appropriation to pay off the gov- ernment-guaranteed loans to Phoebus; but the Cabinet an- nounced in advance the resignation of both Defense Minister Gessler and Navy commander Zenker, who, as Lohmann's su- periors, had to accept responsibility for the scandal. In the Reichstag discussions the question of why Lohmann had en- gaged in such unusual activities was never fairly asked. Vio- lation of the Treaty was charged only once, by the young and fanatical Communist deputy, Ernst Schneller, who declared correctly that Lohmann had been involved in submarine pro- duction in Spain. He ruined the effectiveness of an otherwise good case, however, by continuing with wild allegations that Germany's former enemies were assisting her in this work preparatory to a combined capitalist assault on that bastion of socialism, the U.S.S.R. This was such hackneyed tripe that the responsible German press did not bother to print his charges. The French news agency Havas carried them, but only in routine fashion and without comment. Abroad, the fact that Lohmann's work violated the Versail- les Treaty was completely missed by the press. Furthermore, the reports of the American Embassy in Berlin were brief and incurious regarding Lohmann's motives. British and French diplomatic reporting is not available, but an examination of the German Foreign Office records fails to disclose even a memorandum of conversation on the subject between these embassies and the Wilhelmstrasse. The conclusion seems in- escapable that either the vaunted British and French intelli- gence services were caught napping, or, as seems more likely, the policy-makers in Paris and London chose to ignore the af- fair. To them the apparent collapse of the German Navy's efforts to circumvent the Treaty was perhaps a matter for quiet amusement rather than for alarm or indignation. A38 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 COMMUNICATION TO THE EDITORS Dear Sirs: I have come across copies of correspondence which may be of interest in documenting Mr. Nabbie's article on "The Alamo Scouts" that appeared in the Studies Vol. III No. 4. Spanning a two-month interval from a fortnight before the Luzon land- ings to a fortnight after the retaking of Manila, they illus- trate the evolution of official policy toward the Filipino guer- rillas. The first statement of policy from MacArthur's head- quarters was made in response to a Sixth Army request: 20 December 1944 Headquarters Sixth Army Office of the Commanding General APO 442 Subject: Official Recognition of Guerrillas To : Commander-In-Chief, South West Pacific Area, APO 500 1. Request that a directive be published clarifying the policy to be followed in extending official recognition to guerrilla units. 2. It is understood that to date no guerrilla forces on Luzon have been officially recognized by this theater. 3. Guerrilla groups on Mindanao, Leyte and Panay have been extended such recognition with consequent emolument in rank and pay. It is believed that unless some similar recognition is extended to a group or groups on Luzon, it may cause resentment and handi- cap the unification of the guerrilla forces there. For the Commanding General: G. H. DECKER Brigadier General, G. S. C. Chief of Staff 1st Ind. General Headquarters, South West Pacific Area, APO 500, 27 December 1944 To: Commanding General, Sixth U.S. Army, APO 442 1. The formal recognition of guerrilla units operating in Luzon present a very different problem than that prevailing on major islands to the South. Such action in the South resulted from an entirely different military situation than has existed under enemy occupation in Luzon. The vast areas, never under the physical occupation and control of the enemy in Mindanao, Panay and Negros, for example, permitted the organization and arming of MORI/HRP A39 Approved For Release 2004/12/17: CIA-RDP78-090 M90300300001-1 A39-A41 Approved For Release 2004/12/17: CIA-RDP78-Q/.392AA0QQ300300001-1 o e rraditors regularized military forces and their commitment to guerrilla war- fare, military intelligence and other interior activity under the direction of this Headquarters. 2. This was not possible in Luzon due to the widespread garrison- ing of the area by vastly greater enemy occupying forces. As a consequence the resistance movement in Luzon has been confined to the classic type of underground operations in which an entire population, with little exception, has participated with patriotic fervor. These operations have extended into every center of enemy activity and have resulted in providing information in most precise and detailed form on enemy dispositions throughout the island. 3. It is anticipated that this great patriotic movement among the people of Luzon will reach its maximum strength and utility after the battle for Luzon has been joined and it is the desire of the Commander-in-Chief that it be utilized to maximum advantage. 4. The service, past and future, of unsurrendered, escaped or released members of USAFFE [United States Army Forces, Far East], will certainly ultimately be recognized on the merits of each case, as will the service of civilian patriotic secret societies, groups and individuals, but it is desired that for the purpose of the campaign the movement insofar as practicable be treated and directed as a spontaneous patriotic effort on the part of the whole people. By Command of General MacArthur: B. F. FITCH Brigadier General, U.S. Army Adjutant General This position, although it was presumably the best that could be taken at the time, was not a very practical one. "A spontaneous patriotic effort on the part of the whole people" did not differentiate between Filipinos who trafficked with the Japanese and the guerrillas who had taken up arms, made sacrifices, and were living in the hills away from their fami- lies. It also gave no basis for defining the status of individual guerrilla leaders, where claims to authority were rife and as- sumed rank was the order of the day. (I personally met and was badgered by 20-year-old full colonels.) The unsurrendered Americans in the area (Volckmann,l O'Day, Barnett, Black- burn,2 Calvert, and Murphy in north Luzon; Lapham, Anderson McKenzie and Ramsey in the central part; Barros in the south- 1 See Russell W. Volckmann, We Remained (New York, 1954). 'See Philip Harkins, Blackburn's Headhunters (New York, 1955). A40 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 To The Edifors ern Bicol section) did do much to consolidate individual guer- rilla units and define in some sort their areas of jurisdiction. The subsequent regularizing of the guerrilla units as com- ponents of the Philippine Army which Mr. Nabbie describes from the Alamo Scout viewpoint was based on the following cable of 17 February 1945 from the Commanding General, Ad- vance detachment, USAFFE, to the Commanding General, Sixth Army: It is desired as rapidly as practicable to induct into the Philippine Army those guerrilla elements who have been or are being employed or whom you believe it is desirable to employ in support of our com- bat operations on Luzon. They may be inducted into service as groups or individually as you deem expedient. The mechanical process of such incorporation into service will be accomplished by you or your subordinate commander as you may direct, furnishing rosters and necessary data to the USAFFE Headquarters to perfect the official records. Officers and men not already in the Philippine Army by virtue of previous enlistment, induction or appointment will acquire the status of members of the Philippine Army as of the date of entry upon duty with pay according to Philippine Army scale commencing as of that date and without prejudice to prior service or claims. You are authorized to equip and supply these units as best you may. The screening of guerrilla claims through personal inspec- tion of the units by Alamo Scout officers behind the Japanese lines was probably effective in eliminating most of the John- nie-come-lately's and others whose recognition was not war- ranted. Henry G. Fishburn A41 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 The editors welcome the contribution of book reviews on subjects within the contributor's field of compe- tence. Reviews, like manuscripts, should be typed in double space, and they should be headed with the bibliographical data in standard Studies format. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 INTELLIGENCE IN RECENT PUBLIC LITERATURE ESPIONAGE AND COUNTERESPIONAGE THE PANTHER'S FEAST. By Robert Asprey. (New York: Putnam. 1959. Pp. 317. $5.00. Also London: Jonathan Cape. 1959.) Robert Asprey's fictionalized life of Colonel Alfred Redl, Austrian counterintelligence genius and Russian agent within the Imperial General Staff before the first world war, makes little contribution to a professional understanding of this famous espionage case long cited, without detailed or adequate study, as a classic instance of the recruitment of a homo- sexual under threat of exposure. Yet if the jacket of the book (not an unbiased source) can be believed, Asprey has studied the files that survived Austrian efforts to suppress the Redl case as well as the inadequate and sensational literature that has grown up around it. He claims to have talked to sur- vivors, including Redl's paramour Stefan, who were familiar with details. The end result should have been worthy of all this work. Possibly it was. Asprey's first draft, a serious biography of Redl, was rewritten in its present form at the behest of his publishing agent, and the original manuscript destroyed. The result is neither sound biography nor good fiction, and it is essentially dishonest : it misleads the reader by combining fact and fantasy without discrimination. This deception is heightened by the inclusion of occasional footnote references to authorities (without citing specific pages) and a truly im- posing bibliography. Unsuspecting readers may well accept as verified fact such sequences as Redl's meeting with the Italian military attache in Vienna, completely fictional although Redl may indeed have sold information to both Italy and France. The "interpretive" invention of live dialogue protects the casual reader from boredom at the expense of the student who needs to get at the truth. Since the book market, to be sure, consists of many casual readers and relatively few stu- dents, writers and publishers who conspire to inflict "inter- pretive" biography on the public are not commercially at MORI/HRP fault. from pg. A43-A46 A43 Approved For Release 2004/12/17 : CIA -RDP78-03921 A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Espionage In common with earlier writers on the case, Asprey trips over the hard fact that Redl, himself a Russian agent, con- tinued to uncover and neutralize other Russian agents in Austria-Hungary. Asprey solves this problem through an im- aginary face-to-face bargaining session between Redl and Batyushin, the Russian officer who is thought to have han- dled him. At this invented meeting Redl and Batyushin are shown arranging to sacrifice Russian agents in Austria as part of the payment to Redl. Asprey here follows without acknowledging his source a theory first developed by Tristan Busch in his Secret Service Unmasked,' but goes beyond Busch to suggest that more than one meeting was held. Only the German edition of Busch's work is listed in Asprey's bibliogra- phy. Busch, who claims a career in Austrian intelligence be- fore and during the first world war, cites no authority for this doubtful story. The true reason for this seeming inconsistency in Redl's ac- tions was probably more prosaic: what better cover could he have than an active career as a catcher of Russian spies? Ar- rangements to sacrifice occasional Russian agents, if they were in fact made, could have been set up through whatever normal channels Redl had for passing messages and photo- graphs to the Russians. (We know virtually nothing of these.) The Russian case officer, whatever his personal feel- ings, undoubtedly reconciled himself to the loss of a few minor agents if he could keep the big one securely hooked. Until evidence becomes available-and we know nothing of the Russian side of this case-the face-to-face meeting of Redl and Batyushin must be regarded as a myth. Indeed, until Rus- sian files are opened, we can only speculate about Redl's moti- vation, the operational techniques he employed, and his true relationship to his Russian case officer. At this late date, two great wars and half a troubled cen- tury later, why should overburdened American intelligence officers interest themselves in the uncertain career of a dimly remembered Austrian officer who was trapped into espionage by his homosexuality and a passion for luxurious living? What can the tragic story of Alfred Redl mean to us? 'Tristan Busch (pen name for Arthur Schuetz), Secret Service Un- masked (London: Hutchinson -& Co., Ltd.), pages 35-36. A44 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Espionage We should remember, first of all, that the case of Alfred Redl forms part of the intelligence tradition of our Soviet ad- versary. The recruitment and direction of Redl shows a skill and daring that modern intelligence officers in their igno- rance rarely grant to the services of Imperial Russia. The Soviets inherited no mean tradition in intelligence, and it is our business to know this background thoroughly. If this means a study of history-anathema among many American intelligence ofcers-we must make the best of it. How can we know the character of the enemy if we do not know his background and tradition? It is a common American practice, one that shows through all our history, to judge events and activities primarily as suc- cesses or failures. This narrow pragmatic view is applied to our intelligence operations in an abnormal degree. If it suc- ceeded, fine; if it failed, try something else. Almost no one bothers to ask why it succeeded or failed. The result is con- siderable groping in the murk. When the English indulge in this same practice we laugh and say they "muddle through." Success and failure, however, are really not so simple. In every successful operation there are elements of failure, in each failure some success. If the Redl case can teach us any- thing, it teaches us the danger of brushing failures under the rug. No evidence now available indicates that Austrian counterintelligence ever tried to explore the ramifications of the case. Its criminal failure to interrogate Redl thoroughly before he was allowed to kill himself shows how eager it was to bury the case along with Redl and forget it. No vested in- terest should ever stand in the way of the investigation of op- erational failures. The story of Colonel Redl is a magnificent case history in the seizure and manipulation of one human personality by another. Human motivation and the manipulation of per- sonality to achieve desired ends is our eternal study. It is precisely here that Asprey fails us. When his book is finished we know something of Redl's glittering facade, but little of the man himself. Asprey was simply not up to this task. The career of Redl, in truth, is the subject for a great novelist. Any perceptive reader of Darkness at Noon is helped to fuller comprehension of the great Soviet purge trials, though Koest- A45 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Espionage ler's book is frankly fiction. It is a pity that no novelist of Koestler's stature has been attracted to Alfred Redl. Redl's career illustrates for us once again the supreme irony of espionage: it is the unsuccessful agent who gains lasting fame. Nathan Hale and John Andre, both notoriously un- successful, are the two best remembered operatives of our own Revolutionary age. Alfred Redl has given his name to the classic case in which Colonel Batyushin, his supposed case of- ficer, the truly successful man, is hardly remembered. Indeed, Colonel Batyushin was so successful that we cannot be cer- tain he ever existed! COMPETITIVE INTELLIGENCE: Information, Espionage, and Decision Making. Research report prepared by nine stu- dents at the Harvard Graduate School of Business Adminis- tration under the direction of Georges F. Doriot, Professor of Industrial Management. (Watertown, Mass.: C. I. As- sociates. 1959. Pp. 78. $10.) For all its arresting title and respectable sponsorship this brochure contributes little information not generally known about commercial espionage, and it treats its interesting sub- ject in a gauche and superficial manner. The authors assume at the outset that the field of business intelligence systems is largely unexplored, and they appear to accept businessmen's own comments on their use of espionage at face value and without serious challenge. The report, which tends to present espionage as a phe- nomenon peculiar to the postwar period of business in the United States, is based on interviews with business executives and responses to questionnaires sent U.S. industrial firms. The corporate responses suggest that all competitive intelli- gence systems were begot by the threat of penetration by other commercial espionage organizations, and that self-de- fense, being best served by a good offense, eventually required the introduction of the demobilized OSS officer or FBI agent as a professional commercial spy. The brochure concludes with a recommended program of action which embraces the preparation of requirements, the MORI/HRP exploitation of collection opportunities, collation and evalua- from pg. A A46-A47 _6 For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Espionage tion, the dissemination of finished intelligence, and its use in the decision-making process. The report contains no informa- tion of significance to the professional intelligence officer. A47 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 THE GERMAN RESISTANCE: Carl Goerdeler's Struggle Against Tyranny. By Gerhard Ritter. (London: George Allen and Unwin Ltd. 1958. Pp. 330. 35/-.) Translated and abridged by R. T. Clark from the German Carl Goerdeler and die Wiederstandsbewegung (Stuttgart: Deutsche Ver- lags-Anstalt, 1954). Published also in France as EEchec au Dictateur (Paris: Librarie Plon, 1956). The intelligence officer who picks up this book expecting to learn how Carl Goerdeler, the heroic Lord Mayor of Leipzig, organized resistance against Hitler and the Nazis is doomed to disappointment. Professor Ritter, himself one of those ar- rested and imprisoned as holding anti-Nazi views, has devoted his work primarily to the political philosophies of the anti- Nazi elements, Goerdeler and other individuals and groups, including those in the Wehrmacht. While the book contains some pickings for the intelligence officer, the picking is not made the easier by Ritter's exhaustively discursive treatment. The author does trace the origins of the opposition and re- sistance, describing in some detail the extensive travels Goerdeler undertook in trying to secure support from abroad as well as at home for the struggle against Hitler. He gives considerable space to the opposition in the Wehrmacht, which he shows to have been at its strongest under Beck's leadership before the occupation of Czechoslovakia and then to have waned in the face of Hitler's successful conquests, re- viving only when it became apparent that Germany could not win the war. The Communists, according to Ritter, were un- skillfully led and ineffective in their underground activity; their one large-scale venture, the Rote Kapelle espionage net, was not a resistance organization but one to serve the Soviet enemy. The Social Democrats went into exile. "It was in fact," Ritter writes, "only the churches which created a gen- uine popular movement against National Socialism." An im- portant part was played by the Catholic labor movement. Hans Oster, Admiral Canaris' deputy in the Abwehr, was the soul of the military opposition. Protected in his activity MORI/HRP from pg. A48-A49 A48 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance by Canaris and the successive chiefs of the General Staff, Beck and Halder, he was able to keep the opposition alive from 1933 until 1943, when his removal left Goerdeler with only 01- bricht, Chief of Staff of the Army of the Interior, as military organizer. Graf Schenck Claus von Stauffenberg, the man whose bomb came closest to eliminating Hitler, is acknowl- edged to have been the one to act while the rest of the mili- tary only plotted; but Stauffenberg obviously does not stand high with Professor Ritter, who shows his sympathy with the belief of Goerdeler and many of the military that assassina- tion was not the way to handle the evil Fuehrer. The book gives peripheral treatment to the Kreisau circle or "Counts' Group" of Helmuth von Moltke and Peter Yorck von Wartenburg, describing principally its plans for a future Germany and comparing them with Goerdeler's. It also has only a few sentences on the contacts between Peter Kleist of Ribbentrop's staff and a Russian, identified only as Klauss, who conveyed purported Russian proposals for a separate peace.' Ritter throws doubt on the authenticity of these offers, but shows that they influenced some of the resistance groups to consider approaches to Stalin in 1944. From the historical point of view, the reader of this book can but be left with the net impression that the German op- position-with the exception, to be sure, of a few high-prin- cipled men-found that it was able to tolerate Hitler as long as he was winning, and that by the time he was losing it was too late for them to act effectively. SHAI: The Exploits of Hagana Intelligence. By Ephraim Dekel. (New York: Thomas Yoseloff. 1959. Pp. 369. $5.00.) The SHAI was the intelligence arm of Hagana, the Zionist paramilitary organization which flourished underground in Palestine from the inauguration of the British Mandate Au- thority in 1921 to its termination shortly before the outbreak of the Arab-Jewish war in 1948. This account of its activities, like most popular treatments of intelligence subjects, leaves for the professional reader much to be desired. Although the 1 See Kleist's Zwischen Hitler and Stalin: 1939-45 (Bonn: Athenaeum- Verlag, MORI/HRP 1950). from pg. A49 A49-A51 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance author was an officer of the SHAI, and in spite of documentary garnishment with reproductions of official British CID reports and orders, the book fails to give any real insight into the or- ganization, resources, and methods that lay behind the epi- sodic series of exploits it narrates. Much of this failing is apparently due to continuing secu- rity restrictions : the present Israeli intelligence service is the immediate lineal successor to the SHAI. Names of individuals and organizations are disguised or omitted; the reader learns only in a most general way in what headquarters these ex- ploits were conceived and by what means successfully exe- cuted; the Jewish Agency nets in Europe and America, which furnished such active and important support for the under- ground, are never mentioned. But the stories also bear the imprint of the author's ex- clusively Zionist perspective. His tone is strongly anti-Brit- ish, less immoderately anti-Arab. He credits only the two or three British officers who showed their sympathy for the Jewish cause by turning informer. He projects sequences on SHAI operations in arms smuggling, protecting arms factories and caches, and introducing illegal immigrants in which the British Army, the Mandate Police, the CID, and MI-5 are re- peatedly penetrated, outwitted, deceived, and circumvented until it is made to appear that the British either were imbe- ciles or just didn't care. The Jews of Palestine during the Mandate period were an intelligent, homogeneous minority (several hundred thousand in a population of approximately a million and a quarter) with a passionate ideological motivation which can be com- pared only to that of the early Christians. The British, con- fronted with an extremely hostile Arab majority, were forced to rely inordinately on Jewish officials in their civil adminis- tration and in the police. The Jews, however, whether they were trusted officials of the Mandate government or police officers or just plain citizens, held their first loyalty to their own people. They would always give advance warning of im- pending British actions they learned about and would co-op- erate in deception and diversion to protect the underground activity. This situation, together with the low internal co- hesion of the Mandate Authority and its doubtful morale, A50 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance made it an easy penetration target for the small, secre- tive, and beleaguered SHAI. It was almost impossible, on the other hand, for the British to penetrate even small segments of the Jewish underground because of its tight loyalties and its rigorous internal security measures-compartmentation, the screening and testing of new members, physical protection for group assets, security of meetings, speedy communications, discipline and control of outside contacts, the threat of death to Jewish traitors and informers in or outside the organization, and lavish use of bribes and emoluments among Arabs and Gentiles. The hard-core action group was solidly backed by the general Jew- ish population, which looked to the SHAI and the Hagana for security. All this the author takes for granted in displaying the successes of the underground. In spite of these weaknesses, SHAI does have specialized value as background for an understanding of the present Is- raeli intelligence service. It is also important reading for any- one who may be confronted with the problem of what can be done with-and what should not be attempted against-a small, fanatical, and absolutely loyal group of people bound together by ideology, religion, blood, and history, who know no other cause but their own. GRIVAS: Portrait of a Terrorist. By Dudley Barker. (Lon- don: Cresset. 1959. Pp. 202. 21/-.) GRIVAS AND THE STORY OF EOKA. By W. Byford-Jones. (London: Robert Hale. 1959. Pp. 192. 21/-.) In the eyes of most Britishers George Grivas, dedicated leader of the EOKA underground organization which held the island of Cyprus in turmoil for four. years, terrorizing its whole population of half a million, is a frustrated and ruth- less murderer. These two British authors, not surprisingly, share this view; but as factual accounts of the underground campaign, its aims, objectives, and methods, their books are most informative. Written soon after the demobilization of EOKA, the two tell essentially the same story in more or less the same way. Mr. Barker is more thorough in describing the intricacies of organization, techniques, and operations of the movement, whereas Mr. Byford-Jones' personal contacts MORI/HRP from pg. A51-A54 A51 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance with several key figures in the Cyprus campaign, including Grivas himself, add the authenticity andinterest of first-hand experience. It is ironic that the outcome of the successful terrorist campaign, prospective independence, was not its goal: Grivas had devoted his whole effort to the union of Cyprus with Greece. Cypriot-born professional soldier of the Royal Hel- lenic Army and a guerrilla leader during the war, having lost out in extreme right-wing postwar Greek politics and been relegated to inactivity, he turned to drawing up a plan for a private army to operate in the Cyprus mountains for the enosis cause. In this he was encouraged and sponsored by Archbishop Makarios III and the Cyprus Church. The Greek Church has for centuries kept nationalism alive in areas where Greeks are subject to foreign rule, and Cyprus had been a major target of its efforts. It is made clear in these books that Grivas' aim was pri- marily to influence world opinion, to inflame a propaganda battle. Neither he and Makarios nor the Greek government imagined that the British could be driven from Cyprus by force, but they calculated that an armed Cypriot insurrec- tion would convince world opinion that Cyprus was oppressed. That situation created, the Greek government could then ex- ploit it in the United Nations. For five years Grivas studied hard and carefully the organi- zation and techniques of the Communist guerrilla forces in Greece. He was especially impressed by their practice of work- ing through youth organizations and their ruthless pressure on the civil population. His plan for Cyprus was prepared in great detail. It was organized in three stages-first, sabotage plus rioting and insurrection by school children; second, as- sault and murder of pro-British Greek Cypriots; third, attacks on British soldiers and civilians. These steps were designed to inflame the youth, frighten ordinary Cypriots into express- ing fervor for the cause, transform into national heroes any young EOKA gunmen that were caught, and lastly, provoke disciplinary and repressive measures by the British. How Grivas kept the terrorist campaign going four years, eluding the 25,000-man British security forces, is thoroughly and chronologically described by both authors. With very A52 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Rele se 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance little real guerrilla fighting, the program was one of sabotage, ambush, assassination, and execution, mostly carried out by a small number of youths. Radio Athens poured out inflamma- tory propaganda, and the Church used spiritual sanctions to turn the faint-hearted into active supporters. Both writers acknowledge that British ineptitude contrib- uted to Grivas' success and the ease with which he evaded capture. The troops, especially in the early stages, were gul- lible and easily diverted. Cooperation between the troops and the police was lacking. Not until Field Marshal Sir John Harding took personal command were the anti-terrorist op- erations effective; and then Harding's vigorous measures brought precisely the reactions that best suited Grivas' pur- pose. Although they badly crippled the EOKA they made it easy for the resistance to present itself to world opinion as a national effort to attain freedom from an oppressor. When Grivas' strategy succeeded and the U.N. General As- sembly heard in February 1957 the Greek plea for Cypriot self-determination, Grivas seized upon the chance to reconsti- tute his decimated organization, offering to suspend violence as soon as the Archbishop was freed from exile. The British, in the face of the U.N. resolution, had no choice but to accept the truce. During the quiet which followed, Grivas recruited new EOKA leaders, formed new terrorist groups, continued smuggling arms, and taught his followers how to make home- made weapons. At about this time Harding was replaced by Sir Hugh Foot as Governor of Cyprus. Foot was more competent in the propaganda field. He moved freely about the island, mingling with the Cypriots. He found the situation dangerous in two ways; conflict had arisen between EOKA and the left wing, and tension was mounting between the Greek and Turkish Cypriots. A Turkish resistance movement appeared and began intercom- munal fighting to insure that Cyprus would not go wholly to Greece. Violence was no longer logically controlled. Murders and ambushes occurred without political objectives. In a last wave of assassination and terrorism in the autumn of 1958, EOKA attempted to regain the center of the stage through a harassing program of killing British soldiers. A53 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Resistance When at the end of 1958 the Greek, Turkish, and British foreign ministers reached agreement on the creation of an independent Cyprus, Archbishop Makarios, whom Grivas re- vered, assumed full responsibility, and Grivas reluctantly abandoned enosis. He left Cyprus for a briefly sustained hero's welcome in Greece, and he sits now in Athens, where Byford-Jones saw him as "the Lieutenant-General of the Royal Hellenic Army he had always wanted to be, bemedalled as any officer in the country, honored and yet feared. The picture I carried away with me when I left Greece was of a prematurely old, almost broken Grivas, a disappointment, a shock to anyone who had seen only the heroic photographs of him on his arrival. He was a man lost, spiritually alone. What is to become of him? Is the cycle to take a full turn? Is he again going to turn to politics as he did after his last illegal guerrilla adventure?" A54 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 SOVIET BLOC INTELLIGENCE SERVICES IN THE NAME OF CONSCIENCE. By Nikolai Khokhlov. (New York: David McKay. 1959. Pp. 365. $4.50.) Trans- lated from the Russian Pravo na Sovest (Frankfurt: Possev Verlag, 1957.) In this skillful translation, Khokhlov's moving personal memoirs-recounting his eager wartime enlistment into the NKVD, his training for a stay-behind operation in Moscow, his frustrations in deep-cover assignments, his partisan ac- tivities, his gradual postwar disaffection, his resolve to use an assassination assignment as a means of escape, and the tragic disappointments of his reception in the West-are changed only by the elimination of a few unessential passages and the addition of a postscript describing what he believes to have been a Soviet attempt in 1957 to poison him with radioactive thallium. A convincing and informative book for the lay reader, it slights details which would make it more valuable for the student of Soviet intelligence. In describing Soviet intelligence, Khokhlov concentrates on personalities rather than structure. The reader cannot reconstruct with any assurance the organization of Directo- rate I (foreign intelligence) or the Partisan Directorate and its successors, in which Khokhlov was employed. During most of his intelligence career he was, to be sure, in staff agent status and presumably not very familiar with organiza- tional details, but his long service enabled him to acquire some knowledge of his own component. This information is passed on to the reader in no organized form: data on organization is given only incidentally as required by the story. Personali- ties do make a story, however, and Khokhlov is best in de- scribing such men as General Pavel Anatolyevich Sudoplatov, chief of the Partisan Directorate and its sucessor unit until 1953, and General Leonid Alexandrovich Eitingon, his deputy. Their subordinate officials are equally well portrayed. Recon- structed conversations, of which there are many in this book, must always be regarded with suspicion; but Khokhlov uses them well to acquaint the reader with the Soviet intelligence bureaucrat, both male and female. MORI/HRP A55 from pg. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 A55-A57 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Soviet Bloc The story gives some data on agent training, unfortunately without much detail. It may be revealing that in late 1941, with the Germans in front of Moscow, time was taken to teach the stay-behind agents table manners; and that Khokh- lov could be expected after three weeks' training, without knowledge of the language or country, to pass as a Pole in Rumania, where there were many Poles at the time. Khokh- lov apparently experienced the hurry-up-and-wait phenomenon well known to soldiers and members of intelligence services: he cooled his heels for long periods of time in several coun- tries, beginning with Rumania. The time spent abroad doing nothing was not all lost, of course. Khokhlov seems to have had the misfortune to ap- pear on the scene at just the time when Soviet intelligence recognized its lack of Soviet citizen agents who could pass as foreigners abroad, a lack with which the great purges of the late thirties probably had something to do. Undoubtedly we are seeing through Khokhlov's eyes the beginning of the shift in policy toward the use of Soviet citizens in illegal capacities abroad. Although some wartime successes with foreigners had been achieved-witness the Rote Drei in Switzerland- Soviet intelligence bureaucrats were probably conscious of the failures that had occurred and wanted to take advantage of the greater control that would result from the employment of Soviet citizens in deep-cover assignments. Khokhlov's mis- sion to assassinate the NTS leader Okolovich is the only one thoroughly described, from planning to dispatch of the agents. Although many operational details are omitted even here, the reader gets an insight into Soviet planning, briefing, and training procedures. If Khokhlov's story is true, he-almost uniquely among de- fectors-left the Soviet service for ideological, ethical, and pa- triotic reasons, in order to work with the NTS emigre organi- zation for a better Soviet regime. His version, of course, can- not be fully checked; but it is notable also that while in the United States he would never accept anymonetary compensa- tion for his services. He made it a point to sign a receipt for any cash advanced him, and he always repaid the advances, being apparently reluctant to become indebted to the U.S. Government in any way. The least plausible aspect of his ac- count, his misjudgment of the operational potential of the A56 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Soviet Bloc NTS, which he was counting on to rescue his wife and child from Moscow, seems to have had some real basis in Soviet in- telligence files. If the Russian edition of Khokhlov's book is clandestinely circulating in the USSR, as he claims, his unfavorable de- scription of American intelligence officers, their boorish con- duct, rapacity, lack of depth and operational skill, and their inability to help him in any way, will not encourage defections to American intelligence. A poor impression of the State De- partment is conveyed, too: a daring plan to save Khokhlov's wife-by having our Moscow Embassy arrange that Ameri- can correspondents go interview her at her apartment while Khokhlov's press conference was under way in Bonn-was re- jected by the Embassy, apparently too late to stop the rather theatrically staged conference. Khokhlov's inability to achieve his objective of saving his wife and child is not surprising. His anger at the Americans may be considered a reflection of his bitterness at his own failure to comprehend the situa- tion in the West. THE BRAIN-WASHING MACHINE. By Lajos Ruff. (London: Robert Hale. 1959. Pp. 176. 16/-.) A STUDY IN INFAMY: The Operations of the Hungarian Secret police. By George Mikes. (London: Andre Deutsch. 1959. Pp. 175. 15/-.) The Brain-Washing Machine is the tale of a Hungarian refugee who had spent three years in the hands of the secret police. He emerged from this experience with a new theory of the Communist show trial and the abject confessions which are essential to it. These confessions are made possible, he asserts, by a "magic room" so designed as to drive its inhab- itant into a state of schizophrenia. Ruff says he spent six weeks in such a room. He describes in detail the lights which constantly revolved and threw ka- leidoscopic patterns on the walls, the furniture so constructed the as to Make sleep or even comfort out of thhe fi u s t and the constant showing of surrealistic pornog ap injections of scopalamine and TO Om, regularly administered ed to escape from the magic r caline. Ruff himself manag to trial. But he concludes that such a roo and did not come Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 MORI/HRP from pg. A57-A58 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Soviet Bloc must be the answer to the conundrum of the Communist con- fession, from the trials of Zinoviev and Kamenev to those of Rajk and Mindszenty. The difficulty with Ruff's hypothesis is that his magic room explains altogether too much. It is not necessary to com- bine drugs, rotating lights, the showing of films, etc., to create illusory surroundings. Any one of these devices could usually accomplish the desired result. In some cases, in fact, schizo- phrenic reactions can be induced by simply reducing the level of sound in the prisoner's cell from a normal 75 to, say, 5 decibels. And if the AVH did not need such an elaborate magic room to induce schizophrenic reactions, we may doubt that such a room in fact existed. The AVH, moreover, or anyone charged with staging a show trial, would not find the production of artifical schizophrenia in a prisoner a very prof- itable technique. A schizophrenic prisoner is a prisoner out of control. His actions, whether before a court or elsewhere, would be unpredictable. It thus seems likely that the magic room, far from serving to explain the Communist confession, is only the consequence of the experimental administration of mescaline to prisoner Ruff by the physicians of the AVH. Mescaline is the drug used by the Peruvian Indians to induce religious ecstacy, and Ruff's magic room has all the earmarks of a mescaline dream. This view of Ruff's room is all the more persuasive since so much else in his book is both senational and difficult to docu- ment, as for instance his suggestion that a homosexual re- lationship existed between Matyas Rakosi and Janos Kadar. Mikes' book is also disappointing. It is a summary of sev- eral issues of the State Security Review, house organ of the Hungarian secret police, together with a brief and not very perceptive history of the AVH itself. The Review was classi- fied top secret and circulated among ranking AVH officers in only 210 copies. The issues which came into Mikes' posses- sion discuss the recruitment of informers, particularly among intellectuals, the problems faced by principal agents, the es- tablishment of safehouses, and the techniques of infiltration, surveillance, and censorship. But there is very little in all this which is not generally known in the intelligence commu- nity, and even to the reading public. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 PSYCHOLOGICAL ASPECTS THE WEAPON ON THE WALL: Rethinking Psychological War- fare. By Murray Dyer. (Baltimore: Johns Hopkins Press. 1959. Pp. 269. $6.00.) Spurred on by an avid interest and manifold experience in the communication of ideas in peace and war, Murray Dyer has written a thought-provoking review of our methods and policies in using the propaganda and psychological weapon. Taking a broader and more elevated view of psychological war- fare than the black-art connotations of this term evoke, he prefers to speak of "political communication" and include in it the whole gamut of actions, policies, and attitudes, as well as words, which are used to influence the political behavior of others. Most of his book is nevertheless concerned with what we normally call propaganda. Even without benefit of Mr. Dyer's broadened definition, the intelligence specialist can count the psychological warrior his most demanding customer. Planners and operators in the political, economic, or military field have intelligence require- ments of a more or less well-defined scope and normally in sufficiently long term to give time for careful collation and evaluation. Psywar needs, on the other hand, cover the water- front, and "crash" requirements are the rule: the psywar business is much like that of the newsman and public rela- tions officer. Weapon on the Wall puts these needs into three teeming categories-knowledge of the psychological, political and economic climate; information on which the operator can select his targets and the time and means to attack them; and finally facts and estimates upon which to evaluate the impact of operations. The author observes, however, that "political communica- tion, as yet, cannot specify with precision the kinds of intelli- gence it needs and wants," and he calls for extensive research on psywar doctrine, techniques, planning, and evaluation. As an ex-psywarrior and intelligence officer, this reviewer sub- mits that the inability to specify intelligence needs stems pre- cisely from lack of doctrinal clarity among the political A59 from pg. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 A59-A60 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Psychological municators as to their role. Operators who differ on what their mission is will naturally differ as to the intelligence they need. This is what makes trouble for the intelligence supplier, adding confusion to what is at best a large and har- assing order. Given consistent requirements, the flow of in- telligence is likely to be troublesome chiefly in its abundance: requirements in the psywar field seem to fascinate collectors. During the war an Army G-2 who had been on,psywar duty with the SHAEF was distressed to find that his conscientious spelling out of psywar requirements in the EEI for his POW interrogators produced the unhappy result that many of them spent more effort on this material than on order of battle. Mr. Dyer's book, intended primarily for the makers and ex- ecutors of high psychological policy, will give the intelligence officer a useful perspective on the needs of this customer of his as it outlines the dimensions of the customer's policy problem. THE EXECUTIVE OVERSEAS. Administrative Attitudes and Relationships in a Foreign Culture. By John Fayerweather. (Syracuse: Syracuse University Press. 1959. Pp. 195. $4.00.) Although restricted to the special problems of business ex- ecutives overseas and pertaining especially to the Mexican scene, this study makes a contribution to the embryonic but growing social science field devoted to the effectiveness of all kinds of American efforts abroad, a field particularly relevant to intelligence activities. The author, Associate Professor of International Business at Columbia University, interviewed 45 U.S. and six Mexican businessmen and conducted observa- tions on the relationships among six U.S. and ten Mexican executives working with each other over a period of four months. He analyzes the resultant data, augmented by com- parable observations from European, Indian, and other socie- ties, in a framework of behavioral and social science concepts. Concentrating upon the achievement of understanding of the foreign national as the key to effectiveness in a foreign so- ciety, he makes his major contribution in presenting a meth- odology for working toward this goal. Professor Fayerweather distinguishes five main problem areas-working relationships between men in a business or- MORI/HRP from pg. A60-A62 A60 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Psychological ganization; individual attitudes towards innovation, analysis and action; basic motivations derived from the individual's ob- jectives in life; difficulties in teaching foreign nationals Ameri- can ways; and special problems arising from foreign nationals' attitudes toward Americans and the United States. He rec- ognizes that all members of a national group are not identical in behavior, each being conditioned by his own unique com- bination of inner personal qualities and environmental con- ditions, but identifies different generic national approaches to business relationships. The American way, he says, produces a group-oriented personality disposed toward cooperation, con- fidence, fellow-feeling, mutual trust, and other qualities ad- vantageous in the operation of a business organization. Other cultures produce an individualistic personality characterized by distrust, hostility, local loyalties, sense of separation, and authoritarianism, generally detrimental to organizational welfare. The U.S. executive, however much he deplores the foreign deficiencies, is exhorted to handle them with enlightenment based on an understanding of their causes and the peculiari- ties of their manifestation in the particular society in ques- tion. The pattern of action suggested as applicable especially in Mexico is one of accommodation of American ways to those of the local scene, including more reliance on indirect com- munication in place of straight-to-the-point frankness, the adoption of local virtues-to become for example simpdtico, "making life pleasant with understanding," and sencillo, "fitting into the local society in an unaffected way"-and an emphasis on personal relationships in business dealings. This book is welcomed as a serious attempt to sensitize the American executive to many of the problems of interpersonal relations abroad. Looked at from the standpoint of the con- cepts and methods of the behavioral sciences, however, its shortcomings are evident. Its theoretical approach is one of rough and ready selection from currently popular concepts eneTa% Shallow application of them. It points out and a cultural interaction without of t the value premises that -ling behind manifestatio vale ce eta for study the sllr a t to g ewoTks attem'A fTam Cora DuBois, MangaTet any real roupbehavioT~ted b9 individualu h and as th?Se presen p,61 systems Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Recent Books: Psychological Mead, and others are needed. Its definition of culture as "sets of customs" is essentially superficial, showing the lack of any comprehensive view of the structure and function of society and culture such as is given in the works of W. Lloyd Warner. Professor Fayerweather uncritically assumes that Ameri- can business methods are correct and good ways which should be imposed on backward societies. The assumption may be justified, but it would have less flavor of the "white man's burden" if works of specialists on cultural evolution, such as those of Robert Redfield on the urbanization of folk cultures, were taken into account. The modus operandi suggested for the U.S. executive, on the other hand, is presented too much as a surrender to local tradition rather than as a strategy of realistic maneuvering. The author's failure to make a scholarly approach through the materials of the social and behavioral sciences now available on his subject has resulted in a conglomeration of case-study data mixed with haphazard conceptual approaches and cultural analyses apt to be more confusing than enlightening to the serious student. The Executive Overseas is not, then, a definitive study of overseas effectiveness even in the business field. But it is a readable and highly interesting introduction to some of the problems of working abroad, and it at least attempts to sug- gest a frame of mind conducive to their solution. In this sense it performs a valuable task in helping to open a critically im- portant subject for investigation. It provides much thought- provoking material for more penetrating studies which, we hope, will follow. Approved For Release 2004/12/17 : CIA-RDP78-03921A000300300001-1 Approved For Release ~ Articles and book reviews on the following pages are un- classified and may for convenience be detached from the clas- sified body of the Studies if their origin therein is protected. The authors of articles are identified in the table of contents preceding page 1. The editors gratefully acknowledge the assistance of Mr. Walter Pforzheimer, Curator of the CIA Historical Intelli- gence Collection, in scanning current public literature for in- telligence materials, and of the many intelligence officers who prepared book reviews for this issue of the Studies. Most noteworthy in this respect are the following: Asprey's The Panther's Feast ........... Competitive Intelligence ............... Dekel's SHAI ......................... Books on Grivas and the EOKA .............. Roger G. Seely Books on the Hungarian AVH ...... Dyer's Weapon on the Wall....... . Fayerweather's Executive Overseas. . 25X1 25X1 25XI 25X1 Approved For Release 2004/12/17 : CIA-RDP78-03921 A000300300001-1 Approved For Release 2004/12/17 : CIA-RDP78-03921A00030030~ pproved For Release 2004/12/17 : CIA-RDP78-)3921A000300300001-1