STUDIES IN INTELLIGENCE [Vol. 4 No. 2, WINTER 1960]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78-03921A000300310001-0
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
123
Document Creation Date: 
December 16, 2016
Document Release Date: 
December 26, 2004
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1960
Content Type: 
STUDY
File: 
AttachmentSize
PDF icon CIA-RDP78-03921A000300310001-0.pdf6.31 MB
Body: 
CONFIDENTIA 40362A000300310001-0 STUDIES Vn INTELLIGENCE JOB NO. 15 :a32126 BOX N-0. ---:3 -------- FOLCER O. _31------ TOT:\L r'CCS HEREIN 8 APR DOC -/- REV DATE-_ ORIG camp _J1_--. Opt .LL TYPE CRIG CLASS PALS REV CLASS JUST -- NcA7 t Y AUTH: HR 16.2 VOL. 4 NO. 1 WINTER 1960 CENTRAL INTELLIGENCE AGENCY OFFICE OF TRAINING "GIGN Approved For Release Ca 41,( TIAL 25X1 25X1 25X~ ApPfo?er'FI~e' 20U3/U5: CIA-RDP78-03921AO00300310001-0 All opinions expressed in the Studies are those of the authors. They do not necessarily represent the official views of the Central Intelligence Agency, the Office of Training, or any other organizational component of the intelligence community. This material contains information affecting the National Defense of the United States within the meaning of the espionage laws, Title 18, USC, Sees. 793 and 794, the trans- mission or revelation of which to an unauthorized person is prohibited by law. Approved For Release 20057 - 03921 A000300310001-0 25X1 25X1 CONFIDENTIAL Approved For Release 200591705 :_CI, !ALO3OO3I 0001-0 STUDIES IN INTELLIGENCE EDITORIAL POLICY Articles for the Studies in Intelligence may be written on any theoretical, doc- trinal, operational, or historical aspect of intelligence. The final responsibility for accepting or rejecting an article rests with the Edito- rial Board. The criterion for publication is whether or not, in the opinion of the Board, the article makes a contribution to the litera- ture of intelligence. LYMAN B. KIRKPATRICK LAWRENCE R. HOUSTON Additional members of the Board represent other CIA components. 25 25 25 CI Approved For Release 2005/01/0"C C A 1A000300310001-0 CONFIDENTIAL ApproveaQ NfalaE,WlT"-RDP78-03921 A000300310001-0 25X1 CONTRIBUTIONS AND DISTRIBUTION Contributions to the Studies or communications to the editors may come from any member of the intelligence community or, upon invitation, from persons outside. Manuscripts should be submitted directly to the Editor, Studies in Intelligence, Room 2013 R & S Building I land need not be coordinated or submitted through channels. They should be typed in du- plicate, double-spaced, the original on bond paper. Footnotes should be inserted in the body of the text following the line in which the reference occurs. Articles may be classified through Secret. For inclusion on the regular Studies distribution list call your office dissemination center or the responsible OCR desk, For back issues and on other questions call the Office of the Editor, Approved For Releas t /S/S 4 25X1 25X1 CONFIDENTIAL Approved For Release 2005/kf VU NI '~- CONTENTS Wt300310001-0 CLASSIFIED ARTICLES The Assassination of Reinhard Heydrich . R. C. Jaggers Inside story of how the Hangman met his death at the hands of Czech intelligence. SECRET Page 1 The Interpreter as an Agent . . . . . Francis Agnor 21 Advantages and drawbacks of a timeworn mas- querade. SECRET The Identi-Kit . . . . . . . . . . Herman E. Kimsey 29 A conjuror's pack for remote-controlled identifica- tion. SECRET Credentials-Bona Fide or False? . . David V. Brigane 37 The unmasking of amateur and professional de- ceivers through scrutiny of their documentation. SECRET Hypnosis in Interrogation . . . . . Edward F. Deshere 51 Nature of the trance and applicability in and against interrogation. OFFICIAL USE ONLY Classified Listing of Articles in Volume III . . . . . . 65 CONFIDENTIAL 25X0 1 Approved For Release 2005/01/ - - 21 A000300310001-0 25X CONFIDENTIAL MORI/HRP THIS PAGE Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET UNCLASSIFIED ARTICLES Page From the CIA Cornerstone Ceremonies . . . . . . . 69 The Symptoms of Scientific Breakthrough 73 Characteristic patterns as guidelines for the fore- caster of scientific advance. Publicizing Soviet Scientific Research The intelligence community's hand in a Commerce Department service to the scientific public. Portuguese Timor: An Estimative Failure An assumption about enemy intent and its sad sequel. Intelligence in Recent Public Literature Military intelligence in World War II . . . . . . 97 In the American Revolution . . . . . . . . . . 101 The Soviet intelligence services . . . . . . . . . 109 Espionage and paramilitary tales . . . . . . . . 117 Evasions and escapes . . . . . . . . . . . . . 120 Miscellany . . . . . . . . . . . . . . . . . . 122 25X1 25X1 25X1 Approved For ReleaseSI68g 1/05: CIA-R P78-03921A000300310001-0 25X1 Approved For Release 2005/01/05 : Cl SECRET CONTRIBUTORS TO THIS ISSUE R. C. Jaggers does research into available records of World War II intelligence services. Francis Agnor is a linguist with experience as interpreter to East-West exchange delegations. Herman E. Kimsey directed the development of the identity kit described in his article. David V. Brigane is a CIA document analyst. Edward F. Deshere is an experimental hypnotist and CIA psy- chiatric consultant. s an analyst in CIA's Office of Scientific Intel- ligence. has been for thirteen years in charge of CIA's processing of foreign scientific and technical documents. is a Far East specialist in the Department Approved For Release 2005/01/0y~CTx MORI /H RP PARTS OF THIS PAGE Approved For Release 2005/01/05 : CIA-RDP78-03921A000300 SECRbO A tyrant's death at patriots' hands revealed as Operation Salmon of Czech Intelligence in exile. THE ASSASSINATION OF REINHARD HEYDRICH R. C. Jaggers On the twenty-ninth of May, 1942, Radio Prague announced that Reinhard Heydrich, Reichsprotektor of Bohemia and Mo- ravia, was dying; assassins had wounded him fatally. On the sixth of June he died. Though not yet forty at his death, the blond Heydrich had had a notable career. As a Free Corpsman in his teens he was schooled in street fighting and terrorism. Adulthood brought him a commission in the German navy, but he was cashiered for getting his fiancee pregnant and then refusing to marry her because a woman who gave herself lightly was beneath him. He then worked so devotedly for the Nazi Party that when Hitler came to power he put Heydrich in charge of the Dachau concentration camp. In 1934 he headed the Berlin Gestapo. On June 30 of that year, at the execution of Gregor Strasser, the bullet missed the vital nerve and Strasser lay bleeding from the neck. Heydrich's voice was heard from the corridor: "Not dead yet? Let the swine bleed to death." In 1936 Heydrich became chief of the SIPO, which included the criminal police, the security service, and the Gestapo. In 1938 he concocted the idea of the Einsatzgruppen, whose busi- ness it was to murder Jews. The results were brilliant. In two years these 3,000 men slaughtered at least a million per- sons. In November of that year he was involved in an event that in some inverted fashion presaged his own death. The son of a Jew whom he had deported from Germany assassinated Ernst von Rath in Paris. In reprisal Heydrich ordered a po- grom, and on the night of November ninth 20,000 Jews were arrested in Germany. In 1939 the merger of the SIPO with the SS Main Security Office made Heydrich the leader of the Reichssicherheits- hauptamt. In this capacity he ordered and supervised the SS~~o Approved-FRelease 2005/01/05 : CIA-RDP78-03921 A000300310001-0 MORI/HRP PAGES 1-191 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich "Polish attack" on Gleiwitz, an important detail in the stage setting for the invasion of Poland on September first. It was he who saw to it that twelve or thirteen "criminals" dressed in Polish uniforms would be given fatal injections and found dead on the "battlefield." It was probably he who chose the code name for these men-Canned Goods. At this time Bohemia and Moravia had already been raised from independent status to that of Reichsprotektorat, with Baron von Neurath, Germany's now senile former foreign min- ister, designated the Protector-of the Czechs from them- selves, presumably. But a greater honor was in store for them. On 3 September 1941 von Neurath was replaced by SS Ober- gruppenfuehrer Heydrich. The hero moved into the Hrad- cany Palace in Prague and the executions started, 300 in the first five weeks. His lament for Gregor Strasser became his elegy for all patriotic Czechs: "Aren't they dead yet? Let them bleed to death." He had come a long way in thirty-eight years. The son of a music teacher whose wife was named Sarah, Reinhard had gone on trial three times because of Party doubts about the purity of his Aryan origin. Now, as chief of the RSHA, which he continued to run from Czechoslovakia, he was Hangman to all occupied Europe. His power was such that he could force Admiral Canaris to come to Prague and at the end of May, 1942, sign away the independence of the Abwehr and accept subordination to the Sicherheitsdienst. It was his moment of sweetest triumph. A few weeks later he was dead, and Himmler pronounced the funeral oration calling him "that good and radiant man." So much for the story we all know, and on to questions left unanswered by it. Who were Heydrich's assassins? Who could successfully plan his death? Was the motive simply revenge for suffering? How was it accomplished? And the hardest question of all, was it a good thing? Here, for the first time, are the answers to all these but the last, and on that question stuff for pondering. Need Mothers an Invention When Heydrich took charge of Bohemia and Moravia, the Czechs learned what it means to live under a master of sup- pression. The war fronts were far away: it was the period of 2Approved For Release 2005/01/05 : CIA-RDP78-03921Atb 6 U0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET smashing German successes in the Balkans, Scandinavia, France, and the USSR. The Czechs heard little that Heydrich did not want them to hear. Their underground movement was systematically penetrated and all but destroyed. On Oc- tober third of 1941, for example, the capture of a single Czech radio operator by Heydrich's men led to the arrest of 73 agents working for Moscow. Underground radio contact with London was monitored. The Czechs were losing heart. In London the strength of the resistance in all occupied countries was periodically reviewed, and the countries were listed in the order of the assistance each gave the Allied cause. In 1941 Czechoslovakia was always ranked at the very end. Eduard Benes, its president-in-exile, was deeply embarrassed. He was also gravely concerned that the Allies, if his people failed to fight, might give short shrift to any Czech claims after the war. He told his intelligence chief, General Fran- tisek Moravec, to order an intensification of resistance activity. But it was difficult enough to get even a parachuted courier or coded radio message past the wary Heydrich. Nothing hap- pened in response. Then President Benes hit upon the idea of contriving to assassinate a prominent Nazi or Quisling inside the tight dun- geon of the Protectorate; such a bold stroke would refurbish the Czech people's prestige and advance the status of their government in London. The German retaliation would be brutal, of course, but its brutality might serve to inflame Czech patriotism. Who should be the target? General Moravec first nomi- nated the most prominent of the Czech collaborators, an ex- colonel whose fawning subservience to his Teutonic masters left the London Czechs nauseated and ashamed. The general also had a personal reason for his choice: the name of the Czech Quisling was Emanuel Moravec, a coincidence that had plagued the general for years. But Emanuel, called the Greasy, was not the right man for the purpose. He was not well known abroad, and Czech prestige would not be raised significantly by crushing a worm. The Germans, too, were likely to regard his death as no great loss; he was only a min- ister of education, easy to replace, and even the Nazis despised traitors. RDE 3 Approved Fbr-FEelease 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich Heydrich was totally different. His unique combination of brilliance and brutality had no peer even in the Third Reich. He had been personally responsible for the execution of hun- dreds of Czechs and the imprisonment of thousands. The shot that killed him would be heard in every capital of the world. There could be no other choice. General Moravec so recom- mended, President Benes agreed, and the planning of Opera- tion Salmon began in tense secrecy. Wanted: Men for Martyrdom The first problem was finding one or two men who could and would do the job. It must have seemed to General Mora- vec, at least at the outset, an almost impossible task. The many Czech politicians in London were preoccupied in the un- ending scramble for posts in the provisional government. There were quite a few Czech businessmen in England, but most of them were too busy making a fast koruna to be in- terested. There were brave and patriotic Czechs serving in fighter and bomber wings attached to the Royal Air Force, but the Air Ministry would never let them go. And so the choice narrowed to the single infantry brigade of about 2,500 men encamped near Cholmondly. This pool of prospects had its own disadvantages. An en- campment of 2,500 is like a town of that size: everyone knows everyone else and is full of curiosity about everything that anyone does. Here this inquisitiveness was also undissipated by outside contacts, the Czech soldiers speaking little or no English and having few interests beyond the limits of the camp. Each transfer, trip, or trifle thus became news, some- thing to discuss and analyze. For screening purposes the personnel files of the brigade contained only what each man had told about himself or, in rare instances, about others whom he had known earlier, at home. There was no way to check police files, run background or neighborhood checks, or otherwise obtain independent veri- fication of loyalties. Under such circumstances it is a tribute to General Ingr, Minister of Defense in the exiled government, to General Moravec, and to their subordinates that of 153 para- chutists flown from England and dropped into Czechoslovakia, only three proved turncoats. Approved For Release 2005/01/05 : CIA-RDP78-039213700310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET How many people would have to know? President Benes, General Ingr, General Moravec and his deputy, Lt. Col. Strag- mueller, and Major Frye, chief of operations. Of these, Presi- dent Benes and General Ingr needed to know only the purpose of the operation and the names of the men chosen to carry it out. Others, required for instruction, would necessarily know that certain men were entering Czechoslovakia to carry out a clandestine action, but not their precise intent. Four in- structors would be needed, experts respectively in parachute work, in the terrain of the area, in cover, documentation, clothing, and equipment, and in commando techniques. Several British officers, representatives of MI-6, would par- ticipate in this training. The crew of the plane carrying the men into Czechoslovakia would know where and when they were going, though not their identities or mission. And finally, a large number of men in the brigade personally ac- quainted with the candidates could be expected to make guesses of varying degrees of accuracy as the preparations for assassi- nation progressed. Because the number of persons who would be partly or fully informed was so unavoidably much too large, it was essential that the men finally chosen should be as discreet as they were brave. Of the 2,500 Czech soldiers in the brigade some 700, most of them volunteers, were already engaged in parachute training under British instruction. Two officers were assigned to the brigade, one to the parachutists and the other to the ground troops, ostensibly as aides but actually as spotters. These two officers knew only that they were to choose the best candidates for a dangerous assignment. Men recommended by the spotters were interviewed singly by Lt. Col. Stragmueller. Some were asked whether they would volunteer for special training. Almost all those asked agreed, and they were sent in groups of ten for vigorous physi- cal conditioning and thorough schooling in commando tac- tics-the use of a wide assortment of small arms, the manu- facture of home-made bombs, ju-jitsu, cover and concealment, and the rest. During this intensive drilling the ten-man teams were kept under close observation. It was essential to dis- cover not only the bravest and most capable but also-it hav- ing been decided that the assassination was a two-man job- 5 Approved ForMelease 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich those who worked best in pairs. Other considerations also came into play; men from Prague, for example, were auto- matically eliminated because of the danger of recognition after arrival. By now the choice had narrowed to eight men in half as many groups. General Moravec visited these four groups, along with all the others, on a regular schedule. On his orders the instructors drew the eight candidates aside one at a time and passed each a piece of juicy, concocted information with the warning not to mention it to anyone. Each tidbit was different. Soon two new rumors were circulating, and two men were eliminated. One of the remaining six was disquali- fied by marriage; another was suddenly incapacitated by illness. General Moravec interviewed the remaining four. Two of them, non-corns, met all tests and were also good friends. Their names were Jan Kubis and Josef Gabcik. Kubis was born in Southern Moravia in 1916. After some ten years of school- ing he had gone to work as an electrician. He had been in the Czech Army since 1936 and had fought in France in 1940. His excellent physical condition made his 160 pounds, at 5'9", look lean. Slow of movement, taciturn, and persevering, he was also intelligent and inventive. Gabcik was a year younger than Kubis. An orphan from the age of ten, he too had left school at sixteen. After work- ing as a mechanic for four years, he had entered the Czech Army in 1937. He had been given the Croix de Guerre in France in 1940. He was strong and stocky, an excellent soccer player, and like Kubis lean for all his 150 pounds on a 5'8" frame. His blue eyes were expressive, and his whole face unusually mobile. Talented and clever, good-natured, cheerful even under strenuous or exasperating circumstances, frank and cordial, he was an excellent counterpoise for the quieter, more introverted Kubis. Both men had gone through the arduous training without illness or complaint. Both spoke fluent German. Both were excellent shots. General Moravec spoke separately to each of them. He explained that the mission had the one purpose of assassinating Heydrich. He stressed to each of the young men the great likelihood that he would be caught and executed. 6 Approved For Release 2005/01/05: CIA-RDP78-039200310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET Escape from encircled Czechoslovakia after Heydrich had been killed would be practically impossible. And the survival of either, hiding inside the country until the war ended, was extremely unlikely. The probability was that both would be killed at the scene of action. Although neither man had relatives or friends in Prague, both had relatives in the countryside; and the general re- minded them of what had happened to the family of a Czech sent from London on a successful clandestine mission to Italy. Somehow the Gestapo had learned his identity and executed all of his relatives in Czechoslovakia, even first and second cousins. "Please understand," General Moravec told each of them, "that I am not testing you now. You have proved that you are brave and patriotic. I am telling you that acceptance of this mission is almost certainly acceptance of death-per- haps a very painful and degrading death-because I do not believe that the man who tries to kill Heydrich can succeed if the awful realization that he too will die comes too late, and unnerves him. I have another reason, too: if you make your choice with open eyes, I shall sleep a little better." First Gabcik and then Kubis agreed, thoughtfully but with- out hesitation or bravado. Both were quietly proud to have been chosen. The general then brought them together and explained that from that moment on they would be separated from all the rest, the final preparations would be made in strictest seclusion. If at any moment either man felt that he could not go through with the assassination, he was bound in duty and honor to say so immediately, without false shame. They glanced at each other. "No," said Gabcik. "We want to do it." Kubis just nodded. Dress Rehearsal and Curtain Up Some training was still needed. Kubis had to learn to ride a bicycle. Both had to know Prague as though they had spent years walking its streets and alleys. Both needed instruction in withstanding hostile interrogation. Both had to memorize all the details of separate cover stories which could be "con- fessed," after initial resistance, to the Gestapo. On the last day of training they were each given a lethal dose of cyanide and told how to conceal it on their persons. It was the last defense against torture. D CT Approved of ~lRd 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich "One more point," General Moravec told them. "Under no circumstances-and I mean none at all-is either of you to get in touch with the underground, directly or indirectly. You are absolutely on your own. The underground is infested with informants; Heydrich has done his usual masterful job. For this reason we have not sent out one word about you, even to the most trusted leaders there. If anyone approaches you and says that he comes from the underground, he is a provoca- teur. Treat him as such." The men nodded. "Don't forget," the general insisted. "And now, a review. Kubis, where does Heydrich have his office?" "Prague Palace." "Show me on the map." Kubis did so without hesitation. "Gabcik, where do you land?" "Here, sir," said Gabcik, pointing to another spot some 50 kilometers southeast of Prague, an area chosen because it was wooded, rolling, and offered good approaches to the city. "Kubis, what do you do first, after touching ground and re- moving parachutes?" "We destroy all traces of the descent, sir." "Do you proceed to the palace, Gabcik?" "No. It is too heavily guarded. All visitors are thoroughly checked." "His private residence?" "The same, sir." "Kubis, where do you go?" "Here, sir." Kubis' finger pointed to a spot half way be- tween Prague and the village of Brezary. "Gabcik, when does Heydrich pass this spot?" "Daily, sir, going into the city, and at night on his return. We shall observe the time." "Why have we chosen this particular spot on the road?" "Sir, there is a sharp curve. His car and the motorcycles must slow down to twenty kilometers." "How many motorcycles, Kubis?" "Probably two, sir. We'll find out." "Good. Now remember-don't rush it. Don't use pistols in any case. If there is any chance that you can't bring it off with the bomb or the machine gun on first try, wait and pick 8Approved For Release 2005/01/05 : CIA-RDP78-03921A?66960310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET a better spot for the next day. But don't delay too long. Now, a last dry run." The two men left. General Moravec waited for ten min- utes, summoned his car, and asked to be driven down a cer- tain country road at normal speed. He sat in the back, with binoculars, closely scanning all the foliage and other cover wherever the car slowed for a curve. Then he drove back and waited. Soon Gabcik and Kubis reappeared. "Well?" the general demanded. "Did you kill me?" "Yes, sir." "Are you sure?" "Yes, sir." "Good." The escape was planned with equal care. The men would make their way, mostly on foot, to Slovakia, where the Ger- man pressure was far less severe. Gabcik, who knew the mountains of Slovakia well, had chosen a safe area where none of his friends or relatives lived. For food they were on their own. Early April was all fog, wind, and rain. Normally Czech, Polish, and Canadian crews took turns flying paratroopers over Czechoslovakia, but General Ingr had made sure that a Czech team, Captain Anderle and his crew, would be rested and ready for a good day. The fifteenth, at last, dawned clear and still. General Moravec walked to the plane with his two chosen men. They stood at the bottom of the ramp. He looked at them, and they at him, in silence. No speeches, no cheek-kissing, no wet eyes. Gabcik and Kubis seemed as impas- sive as two farmers starting the day's work. They shook hands briefly. The general went into the plane and briefed its captain and crew. When he came out, he found Gabcik suddenly flustered. "Sir, may I speak to you for a moment in private?" So, the general thought sadly. Well, better for it to hap- pen now. We shall have to send him to the Isle of Man until the war ends. "Of course, Gabcik," he said, and moved some yards away. Gabcik followed, uncomfortable. He said, "Look, sir, I don't know how to tell you this, I'm ashamed. But I have to tell you. I've run up a bill at a restaurant, the Black Boar. I'm 9 Approved bILlease 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich afraid it's ten pounds, sir. Could you have it taken care of? I hate to ask, but I haven't got the money, and I don't want to leave this way." "All right," Moravec managed. "Anything else?" Gabcik was relieved. "No, sir," he said, "except don't worry. We'll pull it off, Kubis and I." They climbed in, then, and the plane started down the run- way. The general thought of all the courageous men he'd known. "No," he said out loud. "None of them were braver." He felt full of pride and pain. Death Rides in Spring Captain Anderle came back on schedule. He reported that the two men had teased his crew about having to go back to the strangeness of England instead of coming home. At the command they had jumped unhesitatingly. So the waiting started. Gabcik and Kubis had not taken a transmitter or any means to report back: if they were suc- cessful everybody would know it. None of the anxious witting talked about the operation. On the tenth day Captain An- derle was shot down and killed in an air battle at Malta. "I am not a superstitious man," General Moravec told himself. Two weeks, three weeks, four. It must have gone wrong. "If they failed," said General Ingr, "let us hope they failed completely, without getting anywhere near Heydrich." Six weeks, and May 29, Friday afternoon. Prague radio, in- dignant, reported that Reichsprotektor Reinhard Heydrich had been severely wounded by murderers in a criminal, dastardly attempt upon his life that very morning. They had thrown a bomb into the Protector's car. Two men had been seen leav- ing the spot on bicycles. The search for them was under way. They would be found. The news exploded in the international press. At home and abroad, Czechs stood a little straighter. Several "authentic inside stories" were printed. The favorite was that the Czech underground had struck. Scarcely less popular was the tale that the Abwehr had killed Heydrich because of the humiliat- ing agreement he had just forced Canaris to sign. At Cholmondly the brigade buzzed. The absent Gabcik and Kubis were talked about, of course; but they had been gone 1Approved For Release 2005/01/05: CIA-RDP78-039210669d'0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET for a long time. And so had many more paratroopers dis- patched on one mission or another. There was no reason to pick out these two over others who had never returned. Lieu- tenant Opalka, for example. He had been gone for five months now. And three men had left the camp just a week before Heydrich was killed. The battalion talked of little else. One sergeant, a little older than the others, was convinced that the man who took care of Heydrich was a non-com named Anton Kral. "Kral?" repeated one of the others. "Why Kral? He's been gone as long as Opalka." "I don't know," the sergeant answered. "It's just a feeling. Remember how tall and dark he was, and silent?" "And brave," said another. "He fought well in France." "Well," shrugged a third, "it could be anybody." Perhaps the sergeant knew more than the others about Anton Kral. Kral had been picked by General Moravec to be parachuted with Lieutenant Opalka into an area northeast of Prague. Their mission was to get in touch with the under- ground there to deliver instructions. Nothing had been heard from either of them since their departure, and they were pre- sumed lost. In Prague, Heydrich was dying. The three physicians sum- moned from Berlin-Gebhardt, Morell, and Brandt-tried hard, but could not save him. Himmler was there too, full of public sorrow, privately perhaps rejoicing. He had his funeral oration down pat before the sixth of June, when Heydrich died. And he seized the chance to direct personally the search for the assassins and the massive reprisals. First, martial law was proclaimed over all Bohemia and Mo- ravia. A rigid daily curfew at sundown was imposed. Throughout the land public announcements proclaimed that anyone who harbored the assassins or otherwise aided them in any way would be executed summarily and without trial. The illegal possession of arms and even approval of assassina- tion in principle were declared capital crimes. Himmler's chief executive in the subsequent action was the notorious Sudeten German, Deputy Reichsprotektor Karl Hermann Frank. The mass arrests and mass executions began. Czechs were killed without investigation, without trial, even without in- Approver ZSMelease 2005/01/05 : CIA-RDP78-03921A0003003100011-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich terrogation, usually on the basis of some vague or distorted denunciation. For twenty days the slaughter continued. But neither terror nor the special Gestapo details dispatched to Prague could bring the assassins to light. Then Himmler and Frank had a new idea. Quite arbitrarily they chose a small settlement near Kladno, fifteen miles from Prague. On 9 June Colonel Rostock marched a military detail into this village of the now memorable name, Lidice. Every male not unquestionably a child was slaughtered. Even the few who chanced to be absent were run down and killed- two hundred men and boys in all. The women were driven into concentration camps. The children were shipped off to Ger- many. Everything above ground, all structures, were razed, and the ground was ploughed. Lidice became a blank, a field of regular brown furrows. And still there was no trace of the killers of Heydrich. So they did the same thing to another hamlet, Lezaky, in south- western Bohemia. The killers were not found. On 24 June Frank officially announced that if the assassins were not turned over in 48 hours, the population of Prague would be decimated. He also used a carrot-1,000,000 marks for anyone giving information leading to the death or capture of the wanted men. This worked, apparently. On 25 June Radio Prague reported that the culprits had been discovered in the basement of the St. Bartholomeus Orthodox Church on Reslova Street. Encirclement was under way and capture only a matter of hours. In London the listeners knew that Gabcik and Kubis were fighting back. The following day the radio said the fight was over; the assassins were dead. There were four of them, the announcer said flatly, one Gabcik, one Kubis, a certain Opalka, and a man known as Josef Valcik.l In England Opalka was known, of course. So was Valcik, a reliable member of the Prague underground. But what were they doing in the same cellar with Gabcik and Kubis, sharing their hopeless last stand? General Moravec, at least, felt cer- 'There are conflicting records of this name; the New York Times gives Walicikoff. A proved For Release 2005/01/05 : CIA-RDP78-03921A b BOD310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET tain that his men would not have violated his orders and made contact with the underground. And no word had gone to the underground about Gabcik and Kubis.2 Perhaps the two teams had met by chance at the church, driven to the same sanctuary because the priests were known to be patriotic and because all four were desperate. Even now the Nazis went on murdering. The paralytic SS General Kurt Daluege succeeded Heydrich: During the trial that preceded his execution in Prague in 1946, he admitted that 1,331 Czechs were executed, 201 of them women, in re- prisal. From another source it has been established that dur- ing this period 3,000 Jews were taken from the Terezin ghetto and exterminated. No one knows how many died in concen- tration camps. A sober estimate is that at least 5,000 Czechs were killed to avenge the death of one murderous Nazi. Among them were all the priests of St. Bartholomeus, not one of whom would say a word about their guests. Was It Worth This Price? In London the jubilation of the Czech leaders gave way to doubt as the murderings continued, and then to recrimina- tion. At first President Benes would have none of it. He lis- tened to Radio Prague as day after day, and several times a day, the numbers and names of the executed were methodi- cally announced. "Why don't they fight?" he asked his staff. "Why don't they die as partisans and men, in the forests and the mountains, taking as many Germans with them as they can? Look at the Poles, the Yugoslavs, the French. They 2In an unpublished manuscript, War Secrets in the Ether, Wilhelm F. Flicke asserts, "The attempt upon the life of Heydrich had been planned and directed over [the Czech underground to London] net- work. That was a big mistake on the part of the English and Czechs because it afforded the German radio defense a complete disclosure not only of the plot itself and those directly participating but also of all the connections within the Czech resistance move- ment." This statement is almost wholly wrong. It is true that Heydrich and his spies had penetrated the Czech underground thoroughly. But radio was not used for Operation Salmon, and the network inside Czechoslovakia had no hand in planning or directing Heydrich's assassination. The Germans had no advance warning. And it was not merely an "attempt"; Gabcik and Kubis did kill Heydrich. dPCRWT elease 2005/01/05 : CIA-RDP78-03921A0003003100011Q Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich don't line up at the scaffold, waiting patiently like sheep." He was unmoved by arguments about the terrain, the prox- imity of France to England, the density of the population in Bohemia and Moravia. "Why don't they fight?" he asked again. "It's their duty." Whatever the answer, it was plain by now that one of the hoped-for results, the stiffening of the Czech will to resist, had not been achieved. In Czech political circles the intensity of criticism mounted in direct ratio to the mounting toll of German reprisals at home. Although President Benes remained privately con- vinced that the execution of Heydrich had been both justified and necessary, he began to feel a need for modifying his views publicly. He reacted to the pressure, finally, by announcing that General Moravec had planned and supervised the assassi- nation; and the accusations of irresponsibility from the politi- cal group were turned on the intelligence chief. Those who had lost relatives and friends at home were especially bitter. As the war went on, General Moravec found that his mind would not stop mulling over the profound questions of right and wrong that attend all action but become sharpest, most nagging, when the action has terrible consequences for others. There was no doubt that the killing of Heydrich had served its intended prestige purpose. In this sense it had been a major success. For a time, at least, Czechoslovakia had jumped from last place to first in the esteem of all the anti- fascist world. Even the suffering of the people, even Lidice and Lezaky, served this cause. But the aim of awakening re- sistance had been a mirage. The people were not fighting, were not earning the acclaim. They would be remembered as martyrs, not heroes, even though there were heroes-Gabciks and Kubises and Opalkas-among them. Who had killed these 5,000 civilians? The Germans? Gen- eral Moravec himself? The civilians at home, inviting slaughter with their meekness? As the toll of war dead mounted into the millions, the 5,000 shrank to perspective and seemed almost insignificant; the war killed thousands every day, women and children as well as soldiers. Yet right and wrong are not a matter of quantity. The same questions would have come whispering in his ear at night, like old ghosts, IrA_ Approved For Release 2005/01/05 : CIA-RDP78-03921Ab310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET if only the brave assassins had died because of Reinhard.Heyd- rich's death. Modern war, total war, kills everyone indiscriminately; women and children drop as fast as soldiers. Millions, were dying to destroy the German instruments of war. And clearly Heydrich had been one of the most effective of those instru- ments. When Hitler escaped the twentieth-of-July bomb in 1944, the general wondered whether the German anti-fascists would have been able to strike even this unsuccessful blow if Heydrich had been alive to trap them before they could act. Was it wrong to have assassinated Heydrich and right to try to kill Hitler? No one who believed that fascism had to be destroyed felt anything but admiration for the Yugoslav parti- sans, the French Maquis, the brave Norwegians and Poles-for all the people who fought and killed Germans. The Czechs at home were not fighting, so the Czechs abroad had to do the job for them. It might have been wrong if the target had been the ,.one he first considered, Emanuel Moravec. This would have, had the taint of personal motives. But there was no such taint in the assassination of Heydrich, and it had the official and un- qualified approval of President Benes. Of course, the general thought wryly, I cannot proclaim this fact today. It is the duty of subordinates to step back when their plans succeed and come forward into the limelight if their plans fail. Finally, before the war ended, the self-questioning, the drill- ing inside, apparently hit bed rock. General Moravec found a firm position, he later explained, in the truth that no one ever gets something for nothing. If Czechoslovakia had re- jected the Chamberlain capitulation at Munich, a real under- ground would have been born of its thus-affirmed integrity. Men must die that countries live. If enough of them die at once, the country may be lucky enough to coast for a few generations. But coasting builds no muscles. The cost of the free ride is strength, and the cost of sapped strength' is freedom. So in the last analysis you have to kill a Heydrich not because he needs killing but because coasting along with his kind will kill you and everybody else. By the time the war was over, General Moravec felt sure that the assassination of Heydrich was not a sombre` page of Approves TRTelease 2005/01/05 : CIA-RDP78-03921A00030031000110 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich history. It was a page that he could turn back to with satis- faction, he and his countrymen and all the rest of us. Turn back to, read again, and know that it was right. Dregs of the Bitter Cup At last the war ended, and General Moravec went home to Prague. Everywhere in the city was a kind of gladness; it was over now, and all were thinking of the future. Every- where, it seemed, except at General Moravec's home, where the callers apparently could not forget the past. They asked why their fathers and mothers had been executed. They wanted to know if the former general still thought he'd done the right thing. His doubts returned. These people saw him not as the executioner of Heydrich but as the killer of their kin. This post-war period in Prague, he said later, was the most miserable of his life. The men who, now that the war was over, called themselves the leaders of the underground also came to ask questions and pronounce judgment. They said that the Heydrich operation was conceptually faulty. They said they should have been consulted in advance, they never would have permitted so blatant an error. The general asked them to give a detailed account of their underground activities and a signed estimate of their contribution to the war against fascism, and they went away. One day a different caller came. He said that the traitor who delivered Gabcik and Kubis to the Gestapo had been dis- covered and interrogated. He had confessed to a revolutionary tribunal, but he stubbornly refused to give details. His name was Alois Kral. Kral! So the general's careful choice of men had produced two heroes, and one villain to seal their fate. He put on his coat; he would visit the man in prison and talk to him. He recognized Kral as soon as he saw him; the four full years had not changed him. Tall, swarthy, taciturn, he squinted up at Moravec and said, "Greetings, brother." "Brother?" "I killed two Czechs. You killed five thousand. Which of us hangs?" So it went throughout the questioning. Kral kept most of his secret to himself, not to save his neck but because he 14pproved For Release 2005/01/05 : CIA-RDP78-039211 310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Assassination of Reinhard Heydrich SECRET knew he couldn't. Besides, the revolutionary tribunal was not predisposed to patient inquiry. It consisted of one profes- sional lawyer and four lay judges on the bench, a prosecutor, and a defense attorney appointed ex officio. All of them had been chosen by the Citizens' Committee, which in turn was dominated by the Communists. Each actor in the play had memorized his part, knowing that the function of the court was not to serve justice but to kill Kral. The hand-picked audi- ence was fanatical, a lynch mob. Neither actors nor specta- tors cared about the fate of Gabcik and Kubis; they were all preoccupied with the million marks Alois Kral had collected for his act of betrayal. While their closest relatives and friends were dying and they themselves were suffering, Kral had been living like a king. There was the unforgivable crime-not murder or treachery, but his comfort in the midst of their pain. In France Kral had fought well. In England he could not have been serving as a German stool-pigeon, because two op- erations he knew enough about to wreck had been successful. There was even evidence that he had not betrayed Lt. Opalka to the Gestapo, or any of his underground contacts. Why had he turned traitor at the end? General Moravec went to see him several times. The best he could get was a fuller record of events. Kral said that Gabcik threw the bomb, Kubis covering with the machine gun. Then the two rode their bicycles straight to the church, where they were given sanctuary. The pres- ence of Lt. Opalka and Valcik was accidental. The four hoped that the storm would subside, and when the intense search- ing was called off they could escape to Slovakia. Kral hinted that he found out about the fugitives from a prostitute; he was vague at this juncture. "But why did you tell the Nazis?" asked the general. "Maybe for the million marks," said Kral. "Or maybe I thought it was better that two men die than two thousand. What does it matter?" At the church, the Gestapo had shouted to come out, to surrender. The men answered with the machine gun, and later with their pistols. The cellar of the two-hundred-year- old church was a fortress not to be breached or taken by SECRET 17 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Assassination of Reinhard Heydrich storm. Finally the Germans flooded it. It was then that all four men, out of ammunition and near drowning, swallowed their cyanide. The Gestapo officers reported the great victory. Alois Kral was paid his million marks and lived in luxury for three years. The next morning General Moravec got up early. He wanted to have a last talk with Kral and get the rest of the story,'how Kral found out and why he informed. But before he could leave the house a member of the Citizens' Commit- tee, a leading Communist, came to see him. "Let's have a little chat," the visitor said, removing his coat. "I was just leaving." "It's no use," said the Communist, sitting down and lighting a cigarette. "We've given orders that you're not to be ad- mitted at the jail any more." "Why?" "Why do you want to talk to Kral? You have no status in this matter." "I want to find out the truth." "We know what you want. You want to keep your glamor- ous story of the Heydrich case alive. Don't try to pretend that you care about Gabcik and Kabis, or whatever their names were, or Kral either. You just want people to believe that your so-called government in London was a band of heroes and patriots. You're not getting away with it. Keep away from the jail, or we will let you in. There's still room." The general did not say anything. "And stop sniffing around trying to get records and names of other people to talk to." The visitor got up. "In fact, for- mer General Moravec, it would be a very fine idea for you to get out of here. I think we understand each other?" "I understand you," the general said. "Good day." He knew it was no use to go to the jail, but he did anyway. He was turned away so rudely that he was surprised to be admitted to the trial. It lasted about five minutes. Gabcik and Kubis were scarcely mentioned; Kral was tried and con- demned for collaboration with the Gestapo. It was a mario- nette show. But just at the end an impromptu line brought it momentarily to incongruous life. 1J pproved For Release 2005/01/05 : CIA-RDP78-03921AS000300310001-0 Approved or ARelease 005/0~1/5.:CIA-RDP78-03921A000300310001-0 he ssassina ion o einhar eydric SECRET "Why did you do it?" the chief justice recited. "For their rotten German marks?" "One million of them," Kral retorted. "How much are the Russians paying you?" They killed him, of course; General Moravec watched the execution. He could not help thinking that Kral was dying for the wrong reason-not for his crime, but for Communist ends. Maybe that's really what keeps bothering me about Heydrich's death, he reflected. Did we kill him and trigger 5,000 other deaths in a just cause, or out of political ambition? Is any human motive ever untainted? At least the two who did the killing, Gabcik and Kubis, came close to purity of motive. They had been healthy young men, not born martyrs in search of death. They had not killed for pride, greed, envy, anger, or ambition. They had killed like dedicated surgeons removing a cancerous mass. They must have felt deeply that the play had to unfold and that their business was not to choose the actors or criticize the choice of theater but only to play their ordained parts as best they could. Of all forms of courage, theirs was the highest because it is the most humble. As he walked away, General Moravec met the Communist functionary who had forbidden him to visit Kral. "Will you please tell me where Gabcik and Kubis are bur- ied?" he asked politely. "Nowhere," came the sardonic answer. "There are no graves. You foot-kissers of the British are not going to have that excuse to build a statue and hang wreaths. Czech heroes are Communists." General Moravec felt tired. There were more Heydrichs than a man could destroy. Fascist Heydrichs died and Com- munist Heydrichs took their places and there was no end to it, as long as people coast. Some day, perhaps, the wheel would turn and Czechs would grow strong again, and be free to remember the strength of Josef Gabcik and Jan Kubis. SECRET 19 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The assignment of an inter- preter with slightly ulterior mo- tives for selected international visits yields a net gain. THE INTERPRETER AS AN AGENT Francis Agnor The rather obvious time-honored practice of using inter- preters assigned to international exchange delegations as in- telligence agents (or, conversely, of getting intelligence per- sonnel assigned as interpreters) has both advantages and dis- advantages. If the interpreter makes the most of his intelli- gence mission, however, and observes some common-sense rules of behavior, there can be a net advantage both in the direct yield of information from such an assignment and in the improvement of an asset in the person of the interpreter. The advantage in immediate information is likely to be limited; the improvement of personal assets can be considerable. In discussing these advantages we shall assume that the interpreter can be given adequate intelligence training and briefing (or that the intelligence officer is competent as an interpreter, and not compromised). We shall ignore the tech- nical aspects of the interpreter's art and the occupational dis- eases, nervous indigestion and undernourishment, contracted in his attempts to gulp food while translating banquet con- versations. We shall examine his domestic and foreign as- signments separately: the advantages and disadvantages of assignment at home and abroad often coincide, but there are also important differences. Gains on Home Ground Let us look first at the domestic assignment, where the in- terpreter is on his own native soil, attached to a group of for- eign visitors or delegates. As the communications link be- tween the visitors and their strange surroundings, he pos- sesses a strong psychological advantage in his available option to confine himself strictly to the business portions of the trip, leaving the visitors to fend for themselves in their spare time. Even if they have their own interpreter along, there are a ApprovedSForRelease 2005/01/05 : CIA-RDP78-03921A0003003100 21 dRI/H RP PAGES 21-2 I Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Interpreter As Agent number of matters-shopping, local customs, the availability of services-in which it would be convenient for them to have his help. Recognizing their dependence on his cooperation for the smooth progress of their visit, they will usually do their best to establish, if not a cordial friendship, at least a good working relationship. A great deal depends on the interpreter him- self, of course, but normal friendly overtures on his part will usually be met at least half way by the visitors. Just by being relaxed and perhaps willing to do a small extra favor here and there, he can become accepted as an indispensable mem- ber of their family group. An excellent way to break down reserve and promote a free exchange of ideas is to invite the group to his home. (It does not pay for him to be so obliging that he becomes a valet, and it is advisable to establish this principle early in the game.) Continued friendly gestures are likely to result in time in the establishment of a genuine rapport, with its attendant benefits. If the interpreter is knowledgeable in the field of the official discussions which he is interpreting, he can clarify in private discussions with the visitors some of the ambiguous or contradictory statements made during the official talks. Without appearing too curious or asking too many questions of intelligence purport (he should be particularly circumspect at the outset of a trip, when his bona fides is subject to great- est suspicion), he will sometimes be able to get definitive state- ments in private which are lacking in the confusion and in- terruptions of official discussions. It is here that he may bring to bear his training or natural bent for elicitation, whether for official purposes or for his own education. At the same time the interpreter himself is the target of numerous questions which reveal both intelligence and per- sonal interests on the part of his charges. Their intelligence questions may indicate gaps in their own service's informa- tion, and their personal ones are more broadly useful in show- ing the preconceived picture of this country that the visitors have brought with them. Although they often realize that their questions betray a lack of sophistication, they are will- ing to sacrifice dignity to satisfy their burning curiosity. Hon- est, natural answers, despite the apparent rudeness of some 2i pproved For Release 2005/01/05: CIA-RDP78-03921AS&0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Interpreter As Agent SECRET of the questions ("How much do you make? How much are you in debt?"), strengthen the interpreter's position and may lead to even more revealing questions. If the visitors are from a controlled society the very opportunity to put certain kinds of questions is a luxury they cannot afford at home. And when one of them is alone with the interpreter he often shows eagerness to ask questions of a kind not brought up in group discussions. In all these discussions the interpreter is gaining knowledge which no academic training can give him. First, he is given a glimpse of his own country through the warped glass of for- eign misconceptions and propaganda. The image will not be fully that which hostile propagandists have sought to fix, but it will show where they have succeeded and where they have failed. Second, he learns how to get ideas across to these representatives of another culture, learns where he must ex- plain at length and where he can make a telling point in just a few words. Finally, as a sort of synthesis of his experience, he can arrive at some conclusions concerning the visitors' inner thought processes, often quite alien to his own. In addition to gaining these insights, the interpreter makes what may prove to be useful contacts in future assignments. How potentially useful depends on the spirit in which he parts company with the visitors, but anything short of outright hostility is likely to make them of some value. Drawbacks and Limitations The chief disadvantages of domestic assignment for the agent-interpreter lie in the shallowness of his cover. Visitors from Communist countries, in particular, start with a strong presumption that any interpreter is at least working hand in glove with local intelligence or security groups if he is not actually a member of one. The barrier thus imposed in the initial stages of a trip may break down as rapport is estab- lished, but there always remains a lurking suspicion that the interpreter is not what he seems, and the visitors are always on guard against the slightest hint of prying or propaganda. Furthermore, they collect a large file of biographic information on him in the course of their association, material which is certainly delivered to their own security forces. Matching 23 Approved 1o elease 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Interpreter As Agent this up with some earlier trace they may have of him may blow his organizational connections. Another limiting factor is that foreign delegations, particu- larly from Bloc countries, are drawn from the elite and so not typical of the peoples they represent. The impressions the interpreter receives concerning their beliefs and feelings may not be applicable to their countrymen at home. Though the delegation members may not be as orthodox abroad as on their home ground, where conformity is obligatory, they have a more compelling stake in the regime than the average citizen. The last disadvantage to be noted depends in large part on the capabilities and limitations of the interpreter himself. It lies in the difficulty of retaining facts and figures in one's head while performing the complicated task of translation. It is possible to store in one's mind only a limited number of figures before the whole delicate structure of memory dis- integrates into a jumble of confused statistics which are of no use to anyone. While it is permissible to take notes during long speeches where it is obviously impossible to remember everything said between pauses, this device is not appropriate for short conversations. If the interpreter is caught franti- cally scribbling notes immediately after a visitor has casually let drop the annual production of some electronic gadget, his usefulness to intelligence has largely evaporated. Further- more, he has pinpointed an area of intelligence interest. A dash to the toilet after some particularly significant slip on the part of a visitor can sometimes provide privacy for note taking, but too frequent use of this dodge excites embarrassing commiseration or, more often, suspicion. On the Opponent's Home Field The foreign assignment differs in many respects from the domestic. On the profit side, in addition to getting the same positive intelligence take as the domestic interpreter, the in- terpreter abroad can be an observer, reporting on things which have nothing to do with his linguistic job. If he has had proper training, such observations can be quite valuable. Further- more, he can acquire a feeling for the country and a sense of what intelligence activities can be undertaken and what cannot. He may, for example, attempt photography in areas on the borderline of legitimacy just to test reaction, or take 2pproved For Release 2005/01/05 : CIA-RDP78-03921M 0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Interpreter As Agent SECRET a stroll before going to bed in order to check surveillance patterns. If he is an area specialist, the trip provides an edu- cation which no amount of book learning could give. He con- firms certain of his preconceptions while discarding others, and he returns with a far more solid grasp on his specialty than he had previously. The confidence thus gained from first- hand experience is a very valuable asset if he is to be involved in operations against the country in the future. On the negative side we find all the disadvantages noted in the domestic assignment: the interpreter accompanying a dele- gation abroad is, if anything, under .sharper scrutiny as a prob- able agent, and should be prepared for a more or less clan- destine search of his baggage; his memory is still strained to hold on to useful data; his official foreign contacts are the most loyal stalwarts of the regime; his digestion deteriorates. In addition, he finds himself a prisoner of his cover profession. Whereas the foreign delegation's dependence on him during his domestic assignment led to enlightening discussions, his own party's need for his help, not only on official matters but on everything that requires communication during every wak- ing hour, now obliges him to spend all of his time with his own countrymen. He becomes a communications machine, unable to introduce any of his own ideas or queries into the conversations. Contacts are pretty well limited to those which the hosts have thoughtfully provided for about eighteen out of every twenty-four hours, and a delegation of six-foot Amer- icans accompanied by watchful hosts is not the sort of group which a dissident member of a closed society is likely to ap- proach in order to unload his true feelings about the regime. Finally, even the diffident admissions of ignorance implicit in questions put to the interpreter on his own home ground are lacking when he goes abroad. Particularly in Communist countries the officials he contacts need to show that they have not been contaminated by his ideology; each tries to out-party- line the rest, less as an effort (usually counter-productive) to influence the visiting delegation than as a demonstration of his own orthodoxy for the benefit of his comrades. This com- pulsion precludes any serious discussion about either the hosts' or the visitors' country. During such exhibitions of chest- beating the interpreter is put on his mettle to hold his temper Approved llease 2005/01/05 : CIA-RDP78-03921A000300310001 05 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Interpreter As Agent and restrain himself from active participation in the conversa- tion. Criteria and Other Considerations From the foregoing we may conclude that the principal in- telligence value of the domestic assignment lies in the psy- chological field-exploration of mental attitudes, blind spots, thought processes, strength and weakness of beliefs-whereas the value of the foreign assignment derives from first-hand experience in the country and from the collection of observ- able operational and positive intelligence. It is perhaps un- necessary to warn that the interpreter can not fulfill the classic agent roles of recruiting spy nets, agitating for revolu- tion, or personally stealing the master war plans. He will pay his way by less dramatic acts. Here are some of the factors that should be taken into con- sideration in recruiting an interpreter for an intelligence mission or utilizing an existing intelligence asset in inter- preter capacity. First, it must be borne in mind that almost any interpreter will be the target of intense scrutiny by the opposition, particularly in Bloc countries. The prevailing po- litical climate today, however, is such that the interpreter's official position as part of a delegation protects him from arbitrary arrest, except perhaps in Communist China. The rest of the Bloc is so committed to East-West exchanges that it would not jeopardize the program for one rather insignificant intelligence fish. Second, the interpreter should not be the only briefed mem- ber of the delegation going abroad. As we have shown, the interpreter has his hands full with his official duties and has little opportunity for taking notes. The official delegate, how- ever, has good opportunities and excellent cover for taking notes. In addition, being presumably an expert in the field of the discussions, he can recognize significant material better than the interpreter. Third, the size of the delegation is an extremely important factor affecting the usefulness of both domestic and foreign interpreter assignments. A delegation of more than six or seven people imposes such a burden on the interpreter that he has no time for an intelligence mission. He is kept con- 22pproved For Release 2005/01/05 : CIA-RDP78-03921ANN60310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Interpreter As Agent SECRET tinually busy rounding up strays, making travel reservations, getting people settled in hotels, and generally playing nurse- maid. The best possible delegation would consist of one very lazy man who neither demanded nor rejected the presence of the interpreter. Finally, the itinerary itself must be considered. On do- mestic assignments the most important thing is a relaxed schedule which will give the visitors enough spare time to ob- serve their surroundings and ask questions about non-official matters. On the foreign assignment perhaps the most im- portant consideration is the previous accessibility of the areas to be visited. If the area is completely off the beaten track or had previously been closed to foreigners, there is excellent reason to employ a trained observer as interpreter. Even the standard tourist trips, however, may provide useful in- formation if the interpreter is alert. This paper has been oriented primarily towards the inter- preter-agent question as it obtains in visits to or from the Soviet Bloc, but many of the same factors are valid for neu- tralist or uncommitted areas. With the steady increase in cultural and professional exchanges among most countries of the world, opportunities for placing interpreters have also ex- panded. The expansion is not only making more experience and training available but is affording better cover for in- terpreters with intelligence objectives. Perhaps more of them should be given such objectives, despite the drawbacks we have noted. 1- ApprovedFoRKelease 2005/01/05 : CIA-RDP78-03921A000300310000 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Anatomy of a scientific bag of tricks to conjure up the likeness of an unknown face. THE IDENTI-KIT Herman E. Kimsey One of the most difficult problems in human communica- tion is that of exactly duplicating in another mind the visual image one has in one's own. Language is not adequate to the job: the range of variant concepts corresponding to each de- scriptive word, not to mention their inevitable emotional and imaginative colorings, create inaccuracies, distortions, and downright false impressions. Man has therefore had to re- sort to comparing such an image or its elements with ac- cepted common physical standards, which reach their ultimate precision in the standard units of measurement. This proce- dure leaves no room for the vagaries of individual interpreta- tion. This communications problem has always been particularly acute between the describers of absent persons and those whose job it is to identify the subjects described-notably the police-and the identification world has therefore been using for more than a hundred years some system of com- paring individual characteristics with physical standards. The rather startling Identi-Kit herein presented, which provides a set of such standards, must then be considered the product of a development and evolution whose basic principles have been thoroughly proven. The Kit itself is no untested or con- troversial invention: it has withstood continuous testing and retesting for the past five years in both experimental and practical on-the-job applications. The Identification Process The basic premise of all identification systems is the ,,fact that nature never creates two identical individuals..., The problem is- to- record. the identifying charade istics and : then to catalog them objectively, in some system by which, they can be communicated from person to person and from place RREE 29 Approved S~FBr Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 MORI/HRP PAGES 25-315 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Identi-Kif to place. In identification by fingerprints and other similar means the recording is done by taking a physical impression of the characteristic features. Systems have been developed to catalog and communicate these with accuracy. But cir- cumstances do not always allow for the taking of these physical impressions. Identification by facial appearance gives us a wider range, requiring as it does mere visual contact with the subject, if only we have some method to crystallize out of the fluid mem- ory of the observer an objective image of the subject's ap- pearance and some way to code or tabulate its identifying characteristics. The Identi-Kit provides such a method of re- cording and cataloging. It has limits, however, short of posi- tive identification, limits inherent in human ability to observe and remember. If every natural mark and line in a human face could be visually compared with its antecedent image, complete and positive identification would be possible. Such positive identi- fication is not practical because the human eye and brain, even with minute observation of all the natural marks and lines on a person's face, could not retain the memory of their exact location well enough to recreate a perfect image of it. But given the impossibility of an infallible system of visual identification, we can nevertheless make a practical and utili- tarian approach to the identification problem through a proc- ess of elimination. In this process visual comparison can elim- inate great numbers of possible persons who fail to qualify for likeness to the subject sought, and so reduce the possi- bilities to a few individuals, and frequently to a single one. The elimination process can begin with the gross physical features of age, sex, race, height, weight, build, etc., and pro- ceed from there to the finer distinctions of facial appearance. The Kit It is in pinpointing these finer distinctions that we run into trouble when questioning a witness in order to build up an image of the absent person. And this is where the Identi-Kit cofnes in. The kit breaks a full-face image up into component parts-hair, brows, eyes, nose, lips, chin-line with ears, and age lines, plus beard, hat, and glasses, if any. It contains several dozen transparent slides picturing each of these com- 3 Approved For Release 2005/01/05 : CIA-RDP78-03921NMU0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The /denti-Kit SECRET ponents with different types of contours, 500 slides in all, with five notches on the side for different placements of each feature. Each slide is coded with a letter for the facial com- ponent illustrated and a figure for the particular configura- tion. The witness is given a catalog showing all these slides and asked to pick out the brows, nose, chin-line, etc., which most nearly suit the person he saw. The witness, not accustomed to recognizing a pair of eyes with the brows removed or a mouth with no face around it, will find the going difficult at first. No matter: he will soon be able to study the whole reconstructed face and make ad- justments. As he makes his tentative selection of components the slides are assembled on a make-up pad and the composite image displayed. Is the nose too fat? Pick a bonier one. Are the brows too prominent? Rearrange the pile of slides, putting the brows at the back and the eyes farther forward. Is the forehead too high? Slip the hair slide down by one or two from the normal third notch. Is the hair parted on the wrong side? Reverse the slide. The witness is at last satisfied; he recognizes this man. It is not a finished portrait, but a good line-drawing of the right type of person. Figure 1 shows what a close resemblance to a well-known face can be assembled with the kit. In the first 129 operational cases in which the kit was used (by four dif- ferent operators), the witness was able to produce a recogniz- able likeness of all but nine subjects. It took him anywhere from five minutes to several hours, averaging perhaps between thirty minutes and an hour. There is one further refinement illustrated in Figure 1: if there are moles or scars on the remembered face, a grid of numbered lines is placed over the composite image and the positions of the marks are noted in this frame of reference. The scar grid is shown in Figure 2. One of the advantages of the kit is the ease with which its coding permits a face to be recorded or transmitted to a dis- tant location through almost instantaneous assembly from another kit there. A face is contained, for example, in the code message A17 N21X1 C30 E79 L16 D55 H92X4R SV40 SH2O Approvec'Felease 2005/01/05 : CIA-RDP78-03921 A00030031000?3b Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Identi-Kit 6 ' C D E FIGURE 1 C E * C 0 50 06 17 H 0 3S C D E " H L" N / E c 0 ? J JO 06 O9 H O 3J Wpproved For Release 2005/01/05: CIA-RDP78-03921ib310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001- The Identi-Kit SECRE which means "Age lines slide 17, nose slide 21 two notches below normal, chin and ear slide 30, eye slide 79, lip slide 16, brow slide 55, hair slide 92 reversed and one notch above normal, mole under right eye at vertical 40 horizontal 20, no beard, glasses, or hat." The number of such facial combinations that can be formed from the Identi-Kit is too astronomical to be conveniently RE ' r 33 Approved o Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET The Identi-Kit S 5 FIGURE 2 written. These assemblages are rather like passport or other identity photographs in reproducing physical contours with- out reflecting "personality." Although they thus fall short of portrait-type likenesses, they are sufficient when compared feature by feature with known persons to weed out quickly all but one or a few that each could represent. We have been treating the kit as a police device, but its application in intelligence is obvious. One might almost say, in fact, that virtually every technique used in intelligence is 3Approved For Release 2005/01/05: CIA-RDP78-03921, DBb0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Identi-Kit SECRET some variation of a police technique, a relationship reflected in the identity in many small countries of the police with the intelligence service. The kit was actually a product of intelligence effort later released for police use, and it is being applied in an ever growing number of operational intelligence cases to the problem of identifying the "third man." The effectiveness of the kit, thoroughly tested by both in- telligence and the police, has produced startling results in areas where it has been properly applied. In fewer than one percent of police cases is it identification by fingerprints that leads to an arrest. In the several hundred Identi-Kit cases on record the kit has led to a whopping 35 percent of the arrests. Most of these identifications were accomplished by cross reference of the witness's reconstruction with "mug" files of known criminals which were classified in the Identi-Kit system. This process was possible in 100 of the first 129 cases, with an average file search time of 40 seconds. One must remember, however, that the Identi-Kit system is not intended to supplant any of the identification systems in present use. It is simply an additional tool in the inter- rogation kit, a special wrench that enables you to get at a formerly inaccessible spot and work there effectively. You still need your other tools, and you have to be a good me- chanic in the first place: the kit needs the control of a skilled interrogator, who can master this additional instrument with the help of a special one-week course of instruction. A child can make mechanical faces from the kit; but only ex- perience and training can develop the right images from the mind of a person who had no particular reason to remember them until the questioning began, or perhaps does not want to remember them at all. The potential uses and performance of the Identi-Kit sys- tem have barely been touched upon in this article. Exten- sive files must be developed and many operators trained be- fore the full benefit of the system will be apparent. But the intelligence officer will feel the power of a conjuror when he can take the codes from a face his agent has built up to the ? nearest telephone or communications center, notify a dis- tant file of his problem, and get back the required identifica- tion, complete with details, in a matter of minutes more than the communications lag. d F35 Approveor Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Glimpses into the meticulous work of those who examine identity papers for forgery or falsehoods. CREDENTIALS-BONA FIDE OR FALSE? David V. Brigane The use of false documents, traditional in espionage, has re- sponded like all else in the profession to the modern trend of expansion, organization, and technological advance. As intelligence activities have multiplied, the demand for docu- ments has grown, and increasing effort has gone into their procurement and manufacture. On the defensive side, the de- tection of false documents has undergone a parallel growth in importance. Those not familiar with false documentation would be amazed to see the elaborate techniques that go into the making of a high-grade reproduction and startled by the per- fection of the results achieved. German World War II re- productions of British pound notes were so accurate that a Swiss bank, asked by German agents to check them as pos- sible forgeries, had no reservations about declaring them au- thentic. The bank had not been remiss: it had made a care- ful examination and cabled London to verify the serial num- bers and dates. After an extended period of use it was no physical flaw but merely the unavoidable duplication of exist- ing serial numbers that ultimately gave them away. More recently a Western security service accepted a reproduction of its country's passport as genuine even after the question of forgery was raised. But false documentation is an uneven business. Require- ments on it are unpredictable, its raw materials often un- available, and the time interval between demand and delivery can be appallingly short. The perfection of high-grade re- productions is no less astonishing than the crudity of make- shifts sometimes used even by the intelligence services of ma- jor world powers. Documents prepared by the German secret services during World War II have been described as being in SECRET 37 Approved For Release 2005/01/05 : CIA-RDP78-03921A0003003' NITRP PAGES 37-49 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials many instances "beneath contempt" and "veritable death war- rants to their unhappy holders." 1 Japanese documentation specialists, examining German reproductions of the Russian basic identity document, noted that the cloth cover was too light, the printing ink too glossy, the multi-colored back- ground tint made by the Zammel printing press noticeably brighter than it should be, and the place-of-issue indicator identical in all copies. Soviet Agent Documentation The Russians themselves have not been above using some of the crudest devices known to the forger's trade. In reproduc- ing rubber stamps for the German military travel permit, they economized by making a separate stamp for the center emblem and combining it with various reproductions of the outer portion, which showed the place of issue. The composite cachets, of course, did not reflect the individual variations characteristic of the originals, did not have the emblem in proper alignment with its encircling legend, and even showed inking differences from the separate imprintings. But al- though the Soviet services have thus improvised under the pressure of operational needs, especially in wartime, gambling that their makeshifts will escape close scrutiny, they are nevertheless journeymen at the documentation trade, having long since passed their apprenticeship. The Soviet emphasis on clandestine and deep-cover activi- ties has historically made documentation of its agents a mat- ter of prime importance. As Don Levine's new book recalls,2 a false Canadian passport was successful in establishing an identity for Trotsky's killer, even though the NKV:D has mis- spelled the name as "Jacson." Richard Sorge used forged passports to conceal his travel to Moscow, and his radio op- erator, Max Klausen, traveled on three passports, Italian, Ca- nadian, and German.3 Documents were a major concern to Alexander Foote and other members of his net. Rudolf Abel used an altered American passport for entry into the United States and two birth certificates to create different identities 1 Alexander Foote, Handbook for Spies, p. 102. 2 The Mind of an Assassin, reviewed in this issue. See Willoughby's The Shanghai Conspiracy (New York: 1952). 3?Approved For Release 2005/01/05 : CIA-RDP78-03921 AT00310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Credentials SECRET after his arrival; his assistant, Hayhanen, built an elaborate identity structure on an original American birth certificate apparently confiscated from a U.S. citizen who had emigrated to Estonia:' Khokhlov,5 Wolwebber, and "Witczak" relied on documents to support false identities. But if documents were of critical importance in these famous cases which now hap- pen to be in the public eye, imagine the documentation re- quirements created by the countless throng of subordinate agents and couriers, the proletariat of Communist espionage hierarchies. To meet this continual demand, the Communists have al- ways devoted a major effort to document collection and forgery. Even in the early thirties they operated a documentation unit in Moscow, one in Berlin, and a third in the United States." Of these three the German Pass-Apparat was the most elaborate, with six workshops and agencies all over Europe. In Germany alone there were agents for document collection in each of 24 districts. Their sources were varied. Communist sympathizers sometimes offered their own per- sonal documents. A cleaning woman at Berlin police head- quarters stole blank passports for the Party from time to time. Two engravers at the Stempel-Kaiser plant provided duplicates of rubber stamps manufactured for the German government. Two Saarland police officers formed a partner- ship in passports, one supplying the blanks, the other the stamps. Once during these years a Communist raid on a Czech police office yielded 1500 Czech passports as a by- product, but the richest document hauls in the thirties came from the International Brigade in Spain. Later, during World War II, Max Habijanic, a Swiss police officer in Basel, was a reliable source of backstopped Swiss passports. Currently the Soviet intelligence services use documents of their own Bloc extensively to authenticate defector and refugee cover. They also maintain a systematic watch within the Bloc for foreign identity documents held by returned emigres. See W. W. Rocafort, "Colonel Abel's Assistant," Studies, III 4, p. 1. See his book, In the Name of Conscience, to be reviewed in the spring issue of the Studies. ? David J. Dallin, Soviet Espionage, p. 92. Approve 0WKelease 2005/01/05 : CIA-RDP78-03921A00030031000130 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials .As a corollary to these Communist activities, Western in- telligence services have given increasing attention to the coun- terintelligence aspects of documentation. Techniques of docu- ment analysis developed in scientific criminology have been combined with world-wide intelligence resources to serve the investigative needs of intelligence organizations. Docu- ment analysis has been found increasingly effective as an aid in the investigation and detection of enemy agents, in the surveillance and control of one's own agents and verification of their intelligence reports, in the screening of refugees and defectors, and in developing biographic information and es- tablishing the bona fides of individuals of intelligence interest. Enemy Agents Among the odds and ends of intelligence debris deposited during World War II by the tide of battle in Burma was a Japanese document bearing the title "CERTIFICATE OF RE- LIABILITY." It contained a detailed description of the bearer, followed by this text: "Please extend every assistance to Mr. Aung since he is employed by us as a spy." Although a spy's normal documentation does not resemble the forth- right Mr. Aung's in advertising his profession, it often holds hidden evidence against him. Document analysis can play a key role in uncovering enemy operations. The nature of this role can be illustrated in the case his- tory of a Soviet escapee, whose documents and statement, in accordance with standard practice, were subjected to analysis and evaluation. During examination of the documents for format, an abnormally small spacing between the abbrevia- tion "No." and the serial number of his basic identity docu- ment, the pasport, attracted attention. No pasport from the same place of issue being available for comparison, an analysis of the imprint was undertaken. It was determined that the serial number had been added after the document was printed and bound, contrary to all normal procedures for manufactur- ing the pas port. Then the signatures came under suspicion, two signatures by each of two officials, because both pairs showed undue similarity. Subjected to handwriting analysis, all four proved to be traced forgeries. Now the pasport was checked against the escapee's military reserve document, and an irregularity in the photographs be- Approved For Release 2005/01/05 : CIA-RDP78-03921 40310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Credentials SECRET came apparent. Normally the photos in the two documents would have been taken on different occasions and would show different poses, clothing, and lighting. It does sometimes hap- pen that prints for both documents are made from the same negative, but then the print used in the pasport is differenti- ated by a white corner. In this case it was found that the photo in the military reserve document had been copied from that in the pasport but enlarged and cropped to eliminate the white corner. Such rephotographing from another docu- ment, generally inconsistent with legitimate issuance, may be necessary when a forged document should show the person at an earlier age or when because of time, distance, or security considerations the subject is not available to the forger for photographing in person. In addition to these evidences of forgery, discrepancies were found between the information given in the documents and biographic data supplied by the escapee himself. In the use made of these discoveries this case was a typical one. While the results of document analysis did not prove conclusively that the man was a Soviet agent, they showed that his docu- ments had not been issued legitimately, disproved his general story, and opened up specific lines of interrogation and in- vestigation. As a tool in the investigation of enemy agents, document analysis can be used to great advantage not only in mak- ing an initial detection but in the handling of known agents, inducing them to talk and confirming or refuting their state- ments. The material evidence from documents has a strong psychological impact in corroborating or disproving an agent's story, and can be effective in destroying his self-confidence and eliciting confession. Agent Control and Other Applications Document analysis is not reserved for enemy agents; it can be equally valuable in determining the reliability of one's own agents and in assessing their reports and missions. A Far Eastern case will serve as illustration, one wherein an agent's report and the authenticity of a Chinese Communist docu- ment on which it was based were tested by analysis. ApprovedWRLlease 2005/01 /05 : CIA-RDP78-03921 A0003003100014d Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials As evidence of mission accomplished, the agent had also pre- sented, along with the questioned document, the forged travel permit supplied him for use in the target area, now bearing a Chinese Communist cachet stamped on, by his account, at a checkpoint in the area itself. There were no known authentic exemplars with which to compare either the questioned docu- ment or this precise checkpoint cachet, but the cachet was compared with others from the same general area. It ap- peared to follow the normal pattern; several of the examples on hand were similar in format. One of them, however, was especially similar, to the point of suspiciously close likeness. Photographic comparison proved that both cachets had been stamped with the same instrument, and the place names sep- arately imprinted. Legitimate use of the same stamp in two different localities was out of the question. Fraudulent use of an authentic stamp in Chinese Communist hands was also out; this agent had no such capability. The answer was obvious: both cachets were forgeries. Since the exemplar cachet had been obtained from another agent travel permit, all papers connected with the mission this one had been used for came under scrutiny. Among them was a document, allegedly procured in another target area, which bore a small cachet of receipt in a Chinese Communist office. Here again economy of effort betrayed the forger's hand. This cachet proved to be identical with a re- ceipt cachet on the questioned document in the current case, although the receiving offices could not have been the same. It was clear that neither of the reported missions had been carried out and that the documents allegedly acquired in the target areas were fabrications. In a similar but simpler case, an agent presented a letter which bore a postal cancellation as proof that he had been in a certain city. This time, however, many authentic ex- amples of postal cancellations from the city in question were available for comparison. Examination of the lettering, dat- ing, inks, and indicators conclusively proved that the cancel- lation was a forgery. Document analysis is useful in many other kinds of personal investigation-for establishing the bona fides of refugees, for surveying the activities of target personalities, for clearing Approved For Release 2005/01/05 : CIA-RDP78-039210310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Credentials SECRET prospective: recruits, etc. Sometimes it is not a question of establishing authenticity, but only of developing informational content. An itinerary analysis from a passport, for example, provides detailed information on a person's movements which may not be procurable from any other source. Culling in- formation of this type might appear to be a simple matter of reading the record, not involving analysis; yet it requires thorough familiarity with travel regulations and the custom- ary passport entries to get the maximum amount of in- formation. In one recent case where little proved biographic information was available on a person, his detailed record dat- ing back to 1931 was built up through documents. Spotting Forgeries False documents are brought to attention through observa- tion of some defect in them, through improper use, or through suspicion about the situation or activities of the bearer. Analysis can come only after the initial spotting, and rela- tively poor documentation can frequently escape detection if used in an ordinary way under circumstances which do not attract attention. Anyone who has experienced the harried formalities of an international port of entry must be aware that a passport flaw could well be passed. For where the vast majority of the documents are genuine and the circumstances of use normal, only an obvious flaw will give the document away. The obviousness of a flaw, however, is relative to the acuity of the checker. The human mind and senses make astonish- ingly fine distinctions, often unconsciously, in dealing with familiar things. And the results of analysis can be used to increase the checker's sensitivity and so play a part in the initial spotting. Checklists of irregularities indicative of forgery have long been a counterintelligence tool. During World War II Soviet intelligence prepared a list of indicators for reproductions made by the German Abwehr. One of the salient signs was the use of rustproof staples in the Abwehr reproduction of the Ukrainian basic identity document, a gleaming evidence of forgery. More recently such checklists have been useful in screening Hungarian refugees. In another part of the world, analysis of South Korean documents reproduced for Approve&FUNTelease 2005/01/05: CIA-RDP78-03921A0003003100011 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials North Korean agents has revealed characteristic flaws and even made it possible to differentiate among those forged by different North Korean intelligence units. Aside from characteristic individual flaws, patterns in the documentation of enemy agents can be detected by analysis and set up as spotting devices to be used in screening large groups of people. Some underlying pattern is likely to reflect the basic constants in operational needs and aims and the limitations of human imagination and material resources for support of operations. For one thing, there is a tendency to simplify false documents, since greater variety and complexity mean greater chance of error in detail. The resultant simpli- fication may lead to the establishment of more specific de- tectable patterns. Take for example the question of showing a military career. A fictitious military background is complex and would require elaborate training to maintain under in- terrogation. The simpler solution of giving no military back- ground has been noted in the documentation of numerous Soviet agents. Lack of military background may therefore be one element of pattern. The effort to conceal information of value to the opposi- tion may account for other elements of pattern. When the Communists use defector or refugee cover, the agents' docu- ments themselves are of considerable value to Western in- telligence. The Communists, operating under the assumption that these Bloc documents will be exploited by Western intel- ligence services, have introduced slight defects in them, pre- sumably in the hope that these will be reproduced in docu- ments for Western intelligence operations and thus serve to identify Western agents. One of these defects is the separate imprinting of the pas- port serial number noted in the case of the Soviet "escapee" we examined earlier. Other deception devices have been an added letter, asterisk, or period, differences in printing impres- sion, fabricated registration and deregistration cachets, and an additional dry seal not used in legitimate documents. One Communist service has shown a pattern of suppressing seri- alization information by not recording the number of a previ- ous document as "basis for issuance." proved For Release 2005/01/05 : CIA-RDP78-03921D310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Credentials SECRET But the Communist services risk being trapped in their own dialectic. This technique has been noted and turned anti- thetically to counterintelligence profit by the West: inten- tional irregularities are carefully watched for and when found incriminate the document holder. And their detection is fa- cilitated by their tendency to follow a general pattern. If, on the other hand, the Communists use the documenta- tion of a neutral or enemy country, the limitations on their resources for such documents may set a noticeable pattern. After the Communist raid on the Czech police office back in the thirties, the windfall of Czech passports was used freely until French police became aware of the pattern of Czech pass- port holders unacquainted with their native language. For all these potential aids to document checkers, it must be admitted that the counterintelligence function of provid- ing them data for the identification of forgeries has in gen- eral not been well developed. This is evidenced by the, fact that the average official whose duties include checking per- sonal documents is surprisingly uninformed even about the characteristic features of domestic documentation. The sys- tematic Japanese do go so far as to provide police with pocket- sized booklets listing the blocks of numbers assigned to prov- inces for Japanese Alien Registration Certificates and describ- ing some elementary characteristics of forgeries; but these rudimentary aids did not prevent the Tokyo Metropolitan Po- lice from being taken in by a Tokyo-issued Alien Registration Certificate carried by a self-acknowledged North Korean agent. Only the agent's insistence that he brought the document from Korea led the police to request an analysis by Printing Bureau experts, which proved the document a forgery. Another Far Eastern country, less methodical, is also per- haps more typical in its lack of attention to the counterin- telligence aspects of documentation. It gives its police of- ficers little or no assistance in detecting forgeries of the basic identity document of its capital city, although an excellent device is at hand. Genuine documents in use in the city have come from thirty or more different printing plates made up from time to time when additional stocks have been needed and the old plates were no longer available. No attempt ap- pears to have been made to turn this diversity to benefit by Approved Welease 2005/01/05 : CIA-RDP78-03921 A000300310001 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials maintaining accurate records of the districts and dates of is- sue of the different printings. At the same time, Communist reproductions of the document have seemingly undergone only the most elementary analysis by the security forces, and documentation, as might therefore be expected, has played a very minor role in the spotting of infiltrators. In the long-continued struggle against Communist infiltra- tion and subversion, this counterintelligence function de- serves much greater attention. Analytic Procedures Analysis of documents is essentially a matter of comparison. But it is not simply comparing an item with an authentic ex- ample in order to detect discrepancies. Take two examples of a given signature: they will not be identical unless one or both have been forged. So the process of analysis is one of double comparison. First the two signatures are compared and points of similarity and difference noted. Then these dif- ferences are compared at least mentally with standards of ac- ceptable variation which the handwriting expert has es- tablished through previous examination of large numbers of handwriting specimens and through study of principles based on similar experience by others. The most laborious part of the job, the establishment of norms, has therefore been ac- complished before the two signatures have ever been seen. And norms could not have been established without large numbers of handwriting specimens available. Essentially the same process is applied in all stages of docu- ment analysis, and invariably one of the greatest difficulties is to build up a volume of material extensive enough to de- termine norms. Standards of judgment are needed on all the innumerable details relating to format, alterations, aging, and applicability and use of the document under varying condi- tions. One of the first things to be established is whether a docu- ment's format is the normal one, as determined from originals, photos, regulations covering issuance and use, and informa- tion reports of many types. All characteristics of the docu- ment must be considered-printing, dry seals, cachets, serial numbers, signatures and handwriting, style of entries, termi- nology, photos, inks, paper, binding, etc. Some of these ele- 4~_ pproved For Release 2005/01/05 : CIA-RDP78-039211 SS b0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Credentials SECRET ments must be subjected also to technical analysis, a special- ized field requiring separate treatment.? Interestingly enough, format analysis can be applied very successfully to Soviet agent documents issued by the Russians themselves. It is sometimes assumed that when an ' intelli- gence service requires the documents of its own country for its operations, it will make use of the genuine article, docu- mentation invulnerable to counterintelligence analysis. This is by no means true. Even if an agent document is issued. by the normal issuing office, it will frequently show peculiarities arising from the operational needs of the case. Most notably there is the problem of the date of issue: the agent cannot be equipped with birth certificate, school diploma, military regis- tration document, occupational papers, and basic identity document all issued with a current date. But the blank docu- ments appropriate to the required date may long since have been replaced by new forms, and the normal issuing official, not being a documentation specialist, will probably 'back-date the document as required without departing from current is- suance procedures. The resultant discrepancies can be re- vealed by format analysis. A Seaman's Passport carried several years ago by a Commu- nist agent is a case in point. The document itself was genuine, duly issued by the appropriate Harbor Master, but it had been back-dated one year to meet operational requirements. Its serial number therefore corresponded to those of issuances a year later than the date shown, in other words to the actual rather than ostensible date of issue. It also bore a cachet which did not come into use until several months after its purported date and omitted the fingerprint which had been included up to and for approximately eight months after that date. In addition, the document lacked the two dry seals normally placed over the photo. The logical explanation of this rregu- larity appears to be that it was received from the Harbor Mas- ter's office with serial number, issuance cachets, and signa- tures, but otherwise blank. The seal could not have been in- cluded with the issuance cachets since it had to be stamped See Wilson K. Harrison's Suspect Documents=Their Scientific Ex- amination, reviewed in Studies, III 2. Approvect5Sffielease 2005/01 /05 : CIA-RDP78-03921 A000300310001'0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 SECRET Credentials on the still absent photo. For reasons of security or con- venience, the intelligence office did not see fit to have the com- pleted document stamped later by the issuing authority. These various flaws in format could be detected because of the, .availability of document intelligence reports and a large number of photocopied Seaman's Passports from which norms could be established. These made it possible to determine the approximate dates on which the new cachet was introduced and the use of fingerprints discontinued, and through the se- rial number sequence shown in the photocopies to pinpoint the exact date on which the questioned document was actually issued. In addition to flaws in format, the Seaman's Passport con- tained certain biographic inconsistencies. It recorded a change of position from radio operator to apprentice, a retro- gression violating the normal occupational pattern; and it indicated that the seaman had made no voyage for a full year after the document was issued. An even more damaging fact turned up in the photocopies of Seaman's Passports on hand: the bearer had held a second such Passport concurrently with the questioned document, apparently for a different mission. . The difficulty of establishing norms and distinguishing fur- tive violations of them is compounded, however, by human un- predictability, which can easily disrupt the best established of- ficial procedures. Irregularities do not per se prove fraud. A document held by a Hungarian refugee is a good example. It aroused immediate suspicion because the code number ap- pearing in the dry seal impressed on the photo did not cor- respond to the number in the cachet of the issuing office. This irregularity, however, was the legitimate result of an unusual chain of events. Involved in a bicycle accident in Budapest, the bearer had had to present her basic identity document for police check. The Budapest police had observed that the dry seal was missing-something she herself had never noticed-and checked with the issuing office in another town. When the authenticity of the document was confirmed, the woman was allowed as a matter of convenience to have the dry seal entered in Budapest, where she was then staying, although the Budapest office number on the dry seal would not correspond, as in principle it should, with the number in the issuance cachet. Wpproved For Release 2005/01/05: CIA-RDP78-0392140310001-0 Approved For Release 2005/01/05: CIA-RDP78-03921A000300312K Credentials In another refugee case, analysis disclosed entries in civilian documents inconsistent with the refugee's reported military record. Further interrogation of the subject satisfactorily explained these inconsistencies, drawing his exasperated com- ment that if there had been anything wrong with his docu- ments, he wouldn't have presented them. This comment of a sensible man caught in the toils of a suspicious bureaucracy seems logical, but its logic is not shared by those who have something to conceal. The risk of having no proof seems greater to them than the risk of defective proof. They are generally not aware of the amount of information their docu- ments will yield, and are prone to suppose that officials un- familiar with them will fail to detect flaws. One such hopeful deceiver was a Hungarian refugee whose documents were used to check his political background, es- pecially with regard to whether he had served in the State Security Authority, the AVH. The man denied that he had, maintaining that he had been employed in the civil police only; but his documents told a different story. His Military Re- serve Document recorded his police service in the space pro- vided for military experience, and only service in the AVH, not in the civil police, is counted as military service. Further- more, the Military Reserve Document was not issued until the termination of his police service, which therefore must have been considered the equivalent of military duty. This is one of the many cases in which documents that are themselves genuine serve on analysis to betray the bearer's falsifications. Document analysis is a valuable tool in counterintelligence, but it is one tool only, to be used in combination with other investigative techniques. And since documents do not exist in a vacuum, intelligence data on many apparently unrelated subjects may enter into document evaluation. On one occa- sion, Navy reports on coastal Chinese weather corroborated the travel route shown on a Chinese Communist document, confirming other evidence of its authenticity. Furthermore, the dependence for analytic effectiveness on intelligence re- sources, document information and exemplars requiring con- stant collection effort, make this activity an integral part of intelligence processes, one that cannot be carried on in isola- tion from the whole. SECRET 49 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY A priori considerations preju- dicing successful interrogation by trance induction suggest a possible variant technique. HYPNOSIS IN INTERROGATION Edward F. Deshere The control over a person's behavior ostensibly achieved in hypnosis obviously nominates it for use in the difficult proc- ess of interrogation. It is therefore surprising that nobody, as the induction of "Mesmeric trance" has moved from halls of magic into clinics and laboratories, seems to have used it in this way. A search of the professional literature shows at least that no one has chosen to discuss such a use in print, and a fairly extensive inquiry among hypnosis experts from a variety of countries has not turned up anyone who admits to familiarity with applications of the process to interrogation. There is therefore no experimental evidence that can be cited, but it should be possible to reach tentative conclusions about its effectiveness in this field on the basis of theoretical con- siderations. The Nature of Hypnosis Experimental analysis has gradually given us a better un- derstanding of hypnosis since the days of Mesmer 6 and his fol- lowers, who held that it results from the flow of a force called animal magnetism from hypnotist to subject. Nevertheless, although no present-day investigator shares the lingering lay opinion that hypnosis is in some way an overpowering of a weak mind by a superior intellect, there are still many di- vergent theories propounded to account for the accumulating clinical observations. Some of these have significantly dif- ferent implications with respect to the susceptibility of a hypnotized person to purposeful influence. The view that hypnosis is a state of artifically induced sleep has been widely held since Braid 7 invented the term in mid- nineteenth-century. Currently Pavlov 20 takes a similar posi- tion in maintaining that cortical inhibition, sleep, and hyp- FOR OFFICIAL USE ONLY 51 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 MORI/HRP PAGES 51-64 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY Hypnosis nosis are essentially identical. This view is now held through- out those parts of the world where Pavlovian theory is ac- cepted as creed, but to the American investigator the experi- mental evidence against it appears overwhelming. Bass,3 for example, has shown that the patellar-kneecap-reflex, which disappears in sleep, is not diminished in hypnosis. Wells 27 and others have demonstrated that all hypnotic phenomena can be elicited in a state bearing no resemblance to sleep, a per- formance which suggests the hypothesis that sleep-like as- pects of hypnosis are not intrinsic to the hypnotic state but result from the hypnotist's suggestion that his subject go to sleep. Barker and Burgwin 2 have shown that the electroen- cephalographic changes characteristic of sleep do not occur in hypnosis except when true sleep is hypnotically induced. The findings of two Russian papers 16 which dispute this conclu- sion, affirming that the EEG rhythm characteristic of hyp- nosis resembles that of drowsiness and light sleep, have not been verified by replicating their experiments. The concepts of suggestion and suggestibility as applied to hypnosis, introduced about 1880 by the Nancy school of hyp- nosis investigators, have been developed and refined in modern times. In a major monograph Hull 10 concluded that hypnosis is primarily a state of heightened suggestibility and has the characteristics of habit in that it becomes increasingly easy for a subject to enter the state of hypnosis after he has once done it. Welch'26 in an ingenious application of the condition- ing theory, pointed out that trance induction begins with sug- gestions which are almost certain to take effect and proceeds to more difficult ones. While the concept of suggestion does provide a bridge between the hypnotic and the normal waking state, it does not explain the peculiarity of the hypnotic proc- ess or the causes of the state of trance. Several more recent approaches, which might be called motivational theories of hypnosis, hold that achievement of trance is related to the subject's desire to enter such a state. Experimentalists and clinicians who take the motivational view-including the present writer, whose conclusions on the subject of this paper are undoubtedly colored by it-believe that it accounts best for the major portion of the clinical data. Trance is commonly induced in situations where the proved For Release 2005/01/05: A'639MOQV L10001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Hypnosis FOR OFFICIAL USE ONLY subject is motivated a priori to cooperate with the hypnotist, usually to obtain relief from suffering, to contribute to a sci- entific study, or (as in a stage performance) to become a center of attraction. Almost all information currently avail- able about hypnosis has been derived from such situations, and this fact must be kept in mind when one attempts to ap- ply the data theoretically to situations different from these. Hypnosis of Interrogees The question of the utility of hypnosis in the interrogation of persons unwilling to divulge the information sought in- volves three issues: First, can hypnosis be induced under con- ditions of interrogation? If so, can the subject be compelled to reveal information? And finally, if information can be so obtained, how reliable will it be? The initial problem is then to induce trance either against the subject's wishes or without his being aware of it. The Subject Unaware. Hypnosis has reportedly been ef- fected without the subject's awareness in three situa- tions-in sleep, in patients undergoing psychiatric consulta- tion, and spontaneously in persons observing another subject being hypnotized. The older literature is replete with references to somnam- bulistic hypnosis induced by giving suggestions to sleeping subjects in a low but insistent voice. No case records are cited to support these statements, however; and they appear, like many others in hypnosis literature, to have been carried over from one textbook to another without critical evaluation. In a recent study Theodore X. Barber found considerable similar- ity between subjects' compliance with suggestions given dur- ing sleep and their reactions to ordinary hypnotic techniques. Since Barber had asked them for permission to enter their rooms at night and talk to them in their sleep, however, it is reasonable to assume that most if not all of them perceived that trance induction was his purpose. They cannot therefore be regarded as truly naive sleeping subjects. Casual experi- mentation by the present writer has failed to demonstrate the feasibility of hypnotizing naive sleepers. The sample con- sisted of only four subjects, three of whom awakened to ask belligerently what was going on. The fourth just continued to sleep. ~~S~ Qy 53 Approved FQPR9Fe~ 1OQ57v19"5: CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY Hypnosis It is frequently possible for a therapist to perform hypnosis with the patient unaware. Advising the patient to relax, sug- gesting that he would be more comfortable with his eyes closed, and so on, the practitioner may induce a deep level of trance in a relatively brief time without ever using the term hypnosis. Even though the subject has not explicitly con- sented to be hypnotized, however, his relationship to the hyp- notist, here a man of reputation and prestige, is one of trust and confidence, of justifiably anticipated help. Observers of hypnotic demonstrations may spontaneously enter trance. One of my own psychotherapy patients has re- ported that she went into a trance while watching me demon- strate hypnotic phenomena on television. This spontaneous hypnosis occurred despite the fact that the patient was in the company of friends and it was therefore a source of embar- rassment to her. But here again we are dealing with a sub- ject in sympathy with the purposes of the hypnotist and one who feels himself to be in a safe situation. It has been noted clinically that persons with negative attitudes about hypnosis are not susceptible to spontaneous trance. The Subject Antagonistic. In experiments conducted by Wells,29 Brenman,8 and Watkins,25 subjects making an effort to resist trance induction were unable to fight it off. Space does not permit a full review of these experiments here, but in all three the subject had had previous trance experiences with the hypnotist, which, we may assume, initiated a positive relationship between subject and hypnotist. The subject was instructed to resist hypnosis, but in the context of partici- pating in an experiment to test this issue. It seems possible that his response was one of compliance with a supposed im- plicit desire on the part of the experimenter that he collabo- rate in demonstrating that trance can be induced in the face of resistance. The demand characteristics of the situa- tion-those influencing the subject to partake of the experi- menter's purposes-may have been such that his prescribed attitude of overt resistance was unable to prevail over the more fundamental attitude of cooperation in an experiment to show that trance can be brought on against a subject's will. Orne 1I has shown that the demand characteristics of an experimental situation may greatly influence a subject's hyp- 5Approved For Release 2005/01/05 FLDFA-RN309A$ 60310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Hypnosis FOR OFFICIAL USE. ONLY notic behavior. It is clear that at some level any cooperative subject wishes an experiment to "work out," wishes to help fulfill the experimenter's expectations. If he grasps the pur- pose of the experiment or the bias of the experimenter, he is disposed toward producing behavior which will confirm the ex- perimenter's hypothesis. This is particularly true in a hyp- notic relationship. We are led to the conclusion that the many apparent cases of hypnosis without the subject's awareness or consent all seem to have depended upon a positive relationship between subject and hypnotist. The most favorable situation is one in which the subject expects to derive benefit from his associa- tion with the hypnotist and trusts in the hypnotist and his ability to help. This would not be the situation in an interro- gation wherein the hypnotist is seeking to extract informa- tion which the subject wants to withhold. The possibility of using hypnosis would therefore seem to depend on success in the slow process of nurturing a positive relationship with the interrogee or in perpetrating some kind of trickery. Obedience in Trance Assuming that an interrogator has circumvented these problems and hypnotized a subject who wants to withhold in- formation, to what extent might the subject retain control of his secrets even in deep trance? This is an area where wide disagreements prevail among authorities and where ex- perimental evidence is highly contradictory. Young,30 for ex- ample, reports that subjects resist specific hypnotic sugges- tions if they have decided in advance to do so, while Wells 28 re- ports that none of his subjects were able to resist a prear- ranged unacceptable command or indeed any other. Most work on this problem has focused on the more specific question of whether a person can be induced under hypnosis to commit some antisocial or self-destructive act. Supporting the negative view is the classic experiment by Janet,"l who asked a deeply hypnotized female to commit several murders before a distinguished group of judges and magistrates, stab- bing some victims with rubber daggers and poisoning others with sugar tablets. She did all this without hesitation. As the company dispersed, however, she was left in the charge of some young assistants, who took a notion to end the experi- F R CFIFICIAII USE ONLY 55 Approved ror a ease 0 5/01/05: CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY Hypnosis ments on a lighter note. When they told her that she was now alone and would undress she promptly awakened. The murders were play-acted, the undressing would have been real; and the subject had no difficulty discerning the difference. Wells,29 on the other hand, caused a subject to commit the post-hypnotic theft of a dollar bill from the hypnotist's coat. The subject was unaware of his action and denied vehemently that he had stolen the money. Wells argues that other fail- ures to compel such acts do not disprove the possibility of do- ing it, whereas even one success demonstrates that it can be done. Schneck and Watkins, also, cite evidence that behavior ordinarily constituting a crime can be produced by hypnosis. Schneck 22 inadvertently caused a soldier to desert his duty in order to carry out a suggestion for post-hypnotic action. Watkins 24 induced a soldier to strike a superior officer by sug- gesting that the officer was a Japanese soldier, and he ob- tained from a hypnotized WAC some information classified "secret" which she had previously told him she would not re- veal. Although these demonstrations appear convincing, there are deficiencies in their experimental conditions. Since both Schneck and Watkins were Army officers, the offenses com- mitted could not possibly result in any serious damage. At some level, the subjects must have been aware of this. This same reasoning applies in experiments requiring a subject to hurl acid at a research assistant or pick up a poisonous snake: the participants are protected by invisible glass, a harmless snake is substituted for the poisonous one, and so forth. The situations are clearly experimental and the hypnotist who re- quests the homicidal or self-destructive behavior is known to the subject as a reputable man. From real life there are a fair number of cases on record dating before 1900, particularly among the German-speaking peoples, claiming hypnotically induced criminal behavior, mostly sex offenses. It is hard to evaluate these cases sci- entifically at this late date; frequently it was relatives of the subject, rather than the offender himself, that charged hyp- notic influence. Within recent years, however, three docu- mented cases in which hypnosis is said to have played a role in criminal behavior have been reported-by Kroener,13 5hpproved For Release 2005/01/05 :F(9A-1 AQ=d3 I QbM0310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Hypnosis FOR OFFICIAL USE ONLY Mayer,14 and Reiter.21 These three cases have a common ele- ment: in each a dissatisfied person found gratification through the individual who later became his seducing hypnotist. It will be sufficient to examine one of them. In the case reported by Kroener a young and sensitive un- married male schoolteacher came under the hypnotic influ- ence of a neighbor. Beginning with neighborly hospitality, the neighbor built up the relationship to the point where he was able by hypnotic suggestion to get the schoolteacher to give or lend him small sums of money and goods. As a test of his power he then implanted the post-hypnotic suggestion that the schoolteacher would shoot himself in the left hand. The schoolteacher actually did shoot himself in the left elbow, sub- jectively perceiving the event as an accident. Finally the hyp- notist caused his victim to confess to crimes that he himself had committed. Throughout the entire affair, lasting five years, the schoolteacher had no recollection of the hypnotic sessions. He was convicted on the basis of his post-hypnotic confession, but through a chance remark began to suspect the nature of his relationship with his neighbor. After many appeals, he was recommended for examination to Kroener, who eventually uncovered the true course of events by re- hypnotizing him and causing him to remember the hypnotic experiences with his neighbor. It is evident that a case like this offers little encouragement to the interrogator hoping to extract secrets by hypnosis. When the relationship between two individuals is marked by intense feelings and a strong tendency in one to comply with whatever requests are made of him by the other, it is in fact hardly necessary to invoke hypnosis to explain the resultant behavior. In the interrogation setting this emotional relation- ship of subject to hypnotist is not likely to exist. Accuracy and Veracity Supposing, however, that an interrogee has been hypnotized and induced to divulge information : how correct is this in- formation likely to be? Accuracy in Recall. A great deal has been written, espe- cially in the press, about the perfect memory and unfailing ac- curacy of recall people display in hypnosis. Statements have Approved PPFQ~~AQ'''005~1017II5 : CIA-RDP78-03921A00030031 0001 07 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY Hypnosis frequently been made about their ability to recall anything that has happened to them even while infants, and according to some even prior to birth.12 Hypnotic age-regression is a mechanism frequently used for this purpose. The subject is "taken back" to, say, the age of six. He begins to act, talk, and to some extent think in the manner of a six-year-old. He hal- lucinates the appropriate environment and gives details about people sitting next to him in school, his teacher's name, the color of the walls, and so on. His actions are exceedingly con- vincing, and it has frequently been assumed that an actual regression in many psychologic and physiologic age compo- nents to the suggested year takes place. There is little evidence for the genuineness of hypnotic age- regression, even though there have been a number of studies, mostly based on single cases. Young 31 demonstrated that per- formance on intelligence tests was not appropriate to the sug- gested age. Unhypnotized control subjects were more suc- cessful than subjects under deep hypnosis in simulating their age. Using the Rorschach test and drawings in a study of hypnotic age-regression in ten subjects, Orne 17 demonstrated that while some regressive changes appeared, non-regressive elements were also present, and changes toward regression showed no consistency from subject to subject. The drawings did not resemble the work of six-year-olds, being characterized by Karen Machover as "sophisticated oversimplification." Drawings actually done at the age of six by one subject were available for comparison, and there was not even a superficial resemblance. Subjects often gave with great conviction the name of the wrong teacher, one they had had at a later age. Studies by True and Stephenson,23 and McCranie, Crasilneck, and Teter 15 failed to find in electroencephalograms taken dur- ing hypnotic age-regression any change in the direction of a childhood EEG. Similarly they report no increased heart rate, as characteristic of infants, or other changes in electro- cardiograph tracings. Hypnotic Veracity. Considerably less data is available on the veracity of information furnished in trance. I have been able to find in the professional literature only one author-Beigel 4, 5-who deals with prevarication under hyp- nosis. He writes in a personal communication that people 5~pproved For Release 2005/01/05 :F0111-1M 43VMQbQM0310001-0 Approve For Release 2005/01/05: CIA-RDP76*3&f fflJkQ30"1 QdY0 ypnosis may lie, refuse to answer, or wake up when asked direct ques- tions on sensitive matters. Our own clinical work has amply convinced us that hypnotized subjects are capable of lying when they have reason to do so. It is therefore possible that information obtained from an interrogee by hypnosis would be either deliberate prevarica- tion or an unintentional confusion of fantasy and reality. The correctness of any information so obtained would thus have to be established by independent criteria. Prophylactic Hypnosis Three suggestions have been made by Estabrooks 9 for what might be called defensive uses of hypnosis. He proposed that it might be used to make personnel hypnosis-proof on capture by the enemy, to induce in them amnesia for sensitive ma- terial in the event of capture, or to help them resist stress, particularly pain, in captivity. As we have seen, there is little or no evidence that trance can be induced against a person's wishes. Proofing personnel against hypnosis attempts which they could successfully re- sist without this conditioning would seem a practice of doubt- ful utility. The hypnosis undertaken in order to suggest that they resist trance induction upon capture might in fact pos- sibly precondition them to susceptibility. It might be better simply to warn them of the techniques of trance induction and inform them that they can prevent it. Providing by hypnotic suggestion for amnesia upon capture is an intriguing idea, but here again we encounter technical problems. It is well known that the effectiveness and perma- nence of hypnotic suggestion is directly related to the con- crete definition of a specific task. General suggestions such as blanket amnesia have unpredictable effects even on very good subjects. Moreover, even if it would work to suggest that a soldier remember only his name, rank, and serial number, there is the serious question whether this might deprive him of information vital to him during captivity. It would arti- ficially induce a state of severe psychopathology, which if adaptive to his situation in some respects might be extremely disturbing in others. The impoverishment of his knowledge and his loss of ego-control would give his interrogator a very FOR OFFICIAL USE ONLY 59 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 6145/01/05 :CIA-RDP78-03921A0030Q310001-0 *pXFIIEWR?s Hypnosis effective means of controlling him, possibly leading to a quasi- therapeutic relationship in which the captive would turn to the interrogator for "treatment" to relieve his distress. This method has other serious drawbacks: offensive action, such as attempts to escape or schemes for cooperation among prisoners to obstruct interrogation, would be severely handi- capped. It could be far safer to rely on the soldier's own ego- control to decide what information ought not to be re- vealed to an enemy than to make this decision for him in ad- vance by hypnotic means. Conditioning individuals not to feel stress, particularly pain, would seem to hold promise of protecting them as captives sub- ject to interrogation. Laboratory experiments have demon- strated that although subjects under hypnotic analgesia con- tinue to respond physiologically much as they do in the wak- ing state, they do not report experiencing pain. It appears that hypnosis works best in situations of high anxiety and probably has its major effect on the anxiety component of pain. Such a procedure might be undertaken in particular in- stances, but probably is not feasible as general practice. Only a relatively small number of individuals will enter a suffi- ciently deep somnambulistic state to produce profound anal- gesia. Furthermore, though major surgery has been per- formed under hypnosis proper, I am unaware that major surgi- cal procedure has ever been undertaken during post-hypnot- ically induced analgesia. In some individuals, I am sure, this would be possible, but clinicians working with hypnosis gen- erally believe that the hypnotic state itself is more effective than post-hypnotic inductions. If this should be tried, what type of suggestion should the subject be given? The post-hypnotic suppression of all pain might be dangerous to the individual, since pain serves as a physiological warning signal; and it is doubtful that such a blanket suggestion would be effective anyway. It would be better to focus the suggestion on inability to feel pain at the hands of captors. Even this suggestion, however, would rap- idly break down if the captured subject felt any pain at all, as is likely in all but a very few instances. The soldier who had been taught to rely on hypnosis as an analgesic and 60 FOR OFFICIAL U~S,~ 6 Approved For Release 2005/01/05: CIA-RDP78-039 A 00300310001-0 Approved For Release 2005/01/05: CIA-RDP7F$R36J' QIOAg3 106AI f Hypnosis found it ineffective in certain situations might be considerably worse off than if he had not trusted this device in the first place. Pseudo-Hypnosis as Interrogation Aid People do undergo physical and mental suffering to with- hold information from an interrogator. Without attempting to discuss the psychodynamics of capture and interroga- tion-which obviously will vary widely from captive to cap- tive-we would hazard the suggestion that at the core. of their resistance is the sense of extreme guilt which would be ac- tivated by collaboration with the enemy while still in control of one's faculties. The alleviation of this sense of guilt, there- fore, might be extremely useful to the interrogator. Both the hypnotic and the hypnoidal states induced by certain drugs are popularly viewed as ones in which a person is no longer master of his fate. This fact suggests the possibility that the hypnotic situation, rather than hypnosis itself, could be .used to relieve a person of any sense of guilt for his behavior, giv- ing him the notion that he is helpless to prevent his manipula- tion by the interrogator. A captive's anxiety could be heightened, for example, by rumors that the interrogator possesses semi-magical tech- niques of extracting information. A group of collaborating captives could verify that interrogees lose all control over their actions, and so on. After such preliminary condition- ing, a "trance" could be induced with drugs in a setting de- scribed by Orne 19 as the "magic room," where a number of devices would be used to convince the subject that he is 're- sponding to suggestions. For instance, a concealed diathermy machine could warm up his hand just as he receives the sug- gestion that his hand is growing warmer. Or it' might ` be suggested to him that when he wakes up a cigarette will taste bitter, it having been arranged that any cigarettes available to him would indeed have a slight but noticeably bitter taste. With ingenuity a large variety of suggestions can be made to come true by means unknown to the subject. Occasionally these manipulations would probably elicit some form of trance phenomenon, but the crucial thing would be the situation, not the incidental hypnotic state. The individual could le- FOR OFFICIAL USE ONLY 61 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 h r VFFICI L a Q5/01/05: CIA-RDP78-03921 O0p03o00310001-0 gitimately renounce responsibility for divulging information, much as if he had done it in delirium. The correctness of information so obtained, however, would be no surer than that of information obtained from hypnosis itself. Further, the interrogator would have to act in his relationship with the captive as though he were confident that it was all correct, except as he could detect falsehoods with certainty. Any doubt he betrayed would increase the sub- ject's feeling of control and so decrease the effectiveness of the hypnotic situation. Cross-examination, upon which much of his success in deriving accurate information ordinarily de- pends, would be denied him. Once the prisoner loses his feel- ing of responsibility for his behavior, he also is relieved of re- sponsibility for giving accurate and pertinent information. An effective defense against this hypnotic situation, as against hypnosis, could be provided by raising the level of sophistication of those who might be exposed to it. Even one or two lectures warning them of possible devices to trick them into believing themselves hypnotized could show them that people cannot be hypnotized against their will and cannot be compelled even under hypnosis to tell the truth or to follow suggestions really contrary to their beliefs. Findings In summary, it appears extremely doubtful that trance can be induced in resistant subjects. It may be possible to hyp- notize a person without his being aware of it, but this would require a positive relationship between hypnotist and subject not likely to be found in the interrogation setting. Disre- garding these difficulties, it is doubtful that proscribed be- havior can be induced against the subject's wishes, though we must admit that crucial experiments to resolve this question have not yet been performed. The evidence also indicates that information obtained during hypnosis need not be accurate and. may in fact contain untruths, despite hypnotic sugges- tions to the contrary. Hypnosis as a prophylaxis against interrogation, whether to prevent hypnosis by captors, to condition against stress and pain, or to create amnesia for sensitive information, would function as an artificial repressive mechanism with the seri- 62 FOR OFFICIAL U EE Approved For Release 2005/01/05 : CIA-RDP78-0392 AONaBy0310001-0 ApproveclFor Release 2005/01/05: CIA-RDP7P&b0 IGQKC V5t08NCQ ypnosis ous disadvantage of diminishing the captive's mastery of the situation. Finally, the hypnotic situation, rather than hyp- nosis itself, seems likely to be a more effective instrument in interrogation. BIBLIOGRAPHY 1. Barber, T. X. Hypnosis as perceptual-cognitive restructuring: III. From somnambulism to autohypnosis. J. Psychol., 1957, 44, 299- 304. 2. Barker, W., and Burgwin, S. Brain wave patterns accompanying changes in sleep and wakefulness during hypnosis. Psychosom. Med., 1948, 10, 317-326. 3. Bass, M. J. Differentiation of hypnotic trance from normal sleep. Exper. Psychol., 1931, 14, 382-399. 4. Beigel, H. C. Prevarication under hypnosis. J. clin. exp. Hypnosis, 1933, 1, 32-40. 5. Beigel, H. C. The problem of prevarication in marriage counseling. Marriage and Family Living, 1953, 15, 332-337. 6. Boring, E. G. A history of experimental psychology. New York: Appleton-Century-Crofts, Inc., 1950. 7. Braid, J. Neurohypnology. London: George Redway, 1899. 8. Brenman, M. Experiments in the hypnotic production of anti- social and self-injurious behavior. Psychiatry, 1942, 5, 49-61. 9. Estabrooks, G. H. Hypnotism. New York: E. P. Dutton & Co., Inc., 1943. 10. Hull, C. Hypnosis and suggestibility. New York: Appleton-Cen- tury-Crofts, 1933. 11. Janet, P. Psychological healing; a historical and clinical study. London: George Allen & Unwin, 1925. 12. Kline, M. V. A scientific report on "the search for Bridey Murphy." New York: Julian Press, 1956. 13. Kroener, J. Hypnotism and crime. Trans. J. Cohen. Wiltshire, Hollywood, 1957. 14. Mayer, L. Das verbrechen in hypnose. Munchen: J. F. Lehman, 1937. 15. McCranie, E. J., Crasilneck, H. B., and Teter, H. R. The EEG in hypnotic age regression. Psychiat. Quart., 1955, 29, 85-88. 16. Nevsky, M. P. Bioelectrical activity of the brain in hypnotic sleep. Neuropatologia: psikhiatriia, 1954, 54, 26-32. ? 17. Orne, M. T. The mechanisms of hypnotic age regression: an ex- perimental study. J. abnorm. soc. Psychol., 1951, 46, 213-225. 18. Orne, M. T. The nature of hypnosis: artifact and essence. J. abnorm. soc. Psychol., 1959, 58, 277-299. 19. Orne, M. T. Hypnotically induced hallucinations. A. A. A. S. sym- posium on hallucinations, December, 1958, in press. 20. Pavlov, I. P. The identity of inhibition with sleep and hypnosis. Science Monthly, 1923, 17, 603-608. FOR OFFICIAL USE ONLY 63 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 FOR OFFICIAL USE ONLY Hypnosis 21. Reiter, P. J. Antisocial or criminal acts and hypnosis: a case study. Springfield, Ill.: Charles C. Thomas, 1958. 22. Schneck, J. M. A military offense induced by hypnosis. J. Nerv ment. Dis., 1947, 106, 186-189. 23. True, R. M., and Stephenson, C. W. Controlled experiments corre- lating electroencephalogram, pulse, and plantar reflexes with hypnotic age regression and induced emotional states. Person- ality, 1951, 1, 252-263. 24. Watkins, J. G. Antisocial compulsions induced under hypnotic trance. J. abnorm. soc. Psychol., 1947, 42, 256-259. 25. Watkins, J. G. A case of hypnotic trance induced in a resistant subject in spite of active opposition. Brit. J. Med. Hypnotism, 1941, 2, 26-31. 26. Welch, L. A behavioristic explanation of the mechanism of sug- gestion and hypnosis. J. abnorm. soc. Psychol., 1947, 42, 359-364. 27. Wells, W. R. Experiments in "waking hypnosis" for instructional purposes. J. abnorm. soc. Psychol., 1923, 18, 239-404. 28. Wells, W. R. Ability to resist artificially induced dissociation. J. abnorm. Psychol., 1940, 35, 261-272. 29. Wells, W. R. Experiments in the hypnotic production of crime. J. Psychol., I941, 11, 63-102. 30. Young, P. C. Is rapport an essential characteristic of hypnosis? J. abnorm. soc. Psychol., 1927, 22, 130-139. 31. Young, P. C. Hypnotic regression-fact or artifact? J. abnorm. soc. Psychol., 1940, 35, 273-278. 64 Approved For Release 2005/01/05 : CIA-RD PT> -0332TA000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Next 2 Page(s) In Document Exempt Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 America's fundamental aspiration is the preservation of peace. To this end we seek to develop policies and arrange- ments to make the peace both permanent and just. This can be done only on the basis of required information. . In war nothing is more important to a commander than the facts concerning the strength, dispositions and intention of h.isopponent,.and the proper. interpretation of those facts. In. peacetime the necessary facts are of a. different nature. They deal with conditions, resources, requirements and atti- tudes prevailing in the world. They are essential. to the de- velopment of policy to further our long term national security and. best interests. To provide informationof this kind is the task of the organization of which you are a part. No task could be more important. Upon the quality of your work depends in large measure the success of our effort to further the nation's position in the international scene. By its very' nature the work of this agency demands of its members the highest order of dedication, ability, trustworthi- ness and selflessness-to say nothing of the, finest type of courage, whenever needed. Success cannot be advertised; failure cannot be explained. In the work of intelligence, he- roes are undecorated and unsung, often even among their own fraternity, Their inspiration is rooted in patriotism-their reward .can be little.except the conviction that they .are per- forming a unique and. indispensable service for their country, and the knowledge that America needs and appreciates their efforts. Y assure you this is indeed. true. The reputation of your organization for quality and excel- lence, under the leadership of your Director, Mr. Allen Dulles, is a proud one. ;Because, ; I deeply believe these things, I deem, it a great privilege . toparticipgte.in this ceremony of corner-stone lay- ing for,the national headquarters of the Cen fraZ Intelligence Agency. On.this spot will rise a beautiful and useful, structure. ay,it,.ktong endure,; to serve the cause M of peaCe. -DWIGHT D:, EISENHOWER Approved For Release 2005/01/05 : CIA-RDP78-03921A00030031000+-` MORI/HRP PAGES 69-71 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The laying of this cornerstone marks an important stage in the growth of the Central Intelligence Agency. We will soon have a home of our own, in these inspiring surroundings high above the Potomac. The Agency was established 12 years ago by the same Act of Congress which created the National Security Council and the Department of Defense. Thus the Central Intelligence Agency was recognized as one of the important elements in our national security structure. World War II and its aftermath and the international com- munist threat had already brought home to us that our vital interests were at stake in places as distant as Korea and Laos, in Africa and the Islands of the Pacific, as well as in this Hemisphere and in Europe. Since then, our country's ever expanding responsibilities have increased the need for better information from the four corners of the earth and for sound analysis of that informa- tion. The law creating the Agency was voted by a Congress in which there was a Republican majority. It was sponsored and signed by a Democratic President. For the past crucial years it has had the unfailing support of a Republican President and a Democratic Congress. Facts have no politics. Our charter, in the carefully drafted provisions of the Na- tional Security Act, has undergone no change. It provides that, under the direction of the President and of the National Security Council, the Agency shall correlate and evaluate in- telligence relating to the national security, and perform such additional services of common concern in this field as the Na- tional Security Council may direct. Wisely this legislation provides that we should have no do- mestic internal security functions. Yet the scope of the juris- diction granted is ample. Our work is broad and comprehen- sive enough to enlist the interest and to inspire the devotion of those who choose, and are chosen, to enter upon it. Laws can create agencies of government; they cannot make them function. Only the high purpose and dedication of all serving them can weld them into effective instruments for our national security. approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 In this work of intelligence we must not forget that human beings are largely the creatures of their beliefs. As individuals we tend instinctively, and sometimes wistfully, to become at- tached to causes, to theories, to solutions. If they be sound and enduring, based on the deep moral strivings of man and the highest conception of our national interests, let us cling to them. But in the field of our rela- tions with our fellowmen abroad, let us assure ourselves, through accurate intelligence, that our attachments to poli- cies are soundly based. It is the particular duty of this Agency to help. perform this function in a world where change is the rule rather than the exception. This task must be carried out fearlessly, with- out warping to meet our prejudices or our predilections or even the tenets of existing policy. As we build a new edifice in which to house, to concentrate and coordinate our work, we must rededicate ourselves to this high purpose. The guiding motto to be inscribed on the face of this build- ing will be the words taken from the Gospel according to S . John: "Ye shall know the truth, and the truth shall make you free." The President of the United States has graciously consented to lay the cornerstone. -ALLEN W. DULLES Approved For Release 2005/01/05 : CIA-RDP78-03921A00030031000?b Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The editors particularly invite readers to offer suitable manuscripts based on their own work or experiences. These need not be ambitious pieces, but may for example simply describe some not well known methodology, suggest or tell of procedural innova- tions, discuss successes or frustrations in getting efficient working relationships along some production line, show the complexity of an administrative process peculiar to intelligence, or supply some bit of intelli- gence history that should be recorded. The views of intelligence officers about the problems they live with are likely to be more useful than the constructions of those who theorize about them. Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Manifest characteristics of cli- max in scientific research which may betray areas of future breakthrough. THE SYMPTOMS OF SCIENTIFIC BREAKTHROUGH Scientific intelligence has the responsibility for guarding this country from scientific or technological surprise, and to that end tries within practical limits to maintain constant surveillance over all foreign research and development. The evaluation of what is actually being done or published in a scientific field is certainly the best basis for detecting the imminence of a breakthrough there. But it is clearly impos- sible to keep all the many facets of modern scientific research under constant surveillance, and intelligence analysts must in practice confine their work to the major fields of obvious importance. A significant advance in some obscure field of basic science may thus go unrecognized until its application brings it to the forefront of world attention. There may be a way, however, to mount a less exhaustive watch which would have some chance of uncovering research of potential breakthrough caliber even in obscure fields. If we can identify a group of common factors-general attributes of the research, of the scientists involved, of the environ- ment-which characteristically tend to be associated with sci- entific breakthrough, we could set these up as tentative criteria for areas in which breakthrough may be impending. Research seeking to identify such common factors was done at Teachers College, Columbia University, in 1957-58 by six Ph.D. candidates in the physical and natural sciences. This article summarizes the results of their study.' Methodology The researchers selected for study certain breakthroughs in four fields-biology, medicine, chemistry, and phys- Entitled A Study of Patterns Which Have Characterized Certain Major Scientific Breakthroughs of the Twentieth Century, by Lau- rence J. Grassman, O.S.B., Eugene V. Petrik, John H. Rosengren, Mrs. Esther B. Sparberg, Herbert H. Stewart, and the author. Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310U I/HRP PAGES 73-8 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough ics-which came to fruition during the twentieth century and have had a marked effect upon western culture. From lists of major scientific discoveries, some assembled from reference works and some submitted by members of a panel of 15 ex- pert consultants, they made their final selection with an eye both to the apparent importance of the discoveries and to the availability of detailed information on them. The four break- throughs selected were the following: relativity and the quantum theory; atomic energy; chemotherapy; and plant auxins. The first of these comprised three major theoretical ad- vances, Max Planck's quantum theory in 1900 and Einstein's special and general theories of relativity in 1905 and 1915. The others were all characterized by successful experimenta- tion. The atomic energy breakthrough was viewed as the re- sult of the concentrated experimental work done by some 30 scientists between 1939, when Hahn and Strassman identified barium among the products of neutron-bombarded uranium, and 1942, when Enrico Fermi and others working under Ar- thur Compton constructed the first chain-reacting pile. Chemotherapy began with Ehrlich's discovery of salvarsan in 1910, and 14 scientists figure prominently in its development up through Waksman's production of streptomycin in 1944. The discovery of the first plant auxin-growth hormone-was the work of one young botanist, Frits Went, in 1926. Alto- gether, 50 contributions by 47 different scientists can be dis- tinguished in these four breakthroughs. The case histories of these contributions were reconstructed by studying the scientific papers reporting them, by examin- ing published accounts, at first or second hand, of the cir- cumstances surrounding them, by assembling biographical and autobiographical material, and in some cases by corre- sponding with the responsible scientists or their associates. A description of the approach, techniques, and equipment used in the course of a breakthrough development was supple- mented by analyzing the scientific climate at the time, the stream of scientific ideas which converged at the breakthrough point, the public environment outside the scientific world, the nature and vigor of support for the scientist in his re- search, and the personal characteristics and circumstances 4proved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 ? CIA-RP78-0921A000300310001-0 The Symptoms Of Scientific Brea through of the scientist. The fifty cases were then compared and their common features identified and assembled into a pattern which might have predictive value for use in intelligence.: The results, not startling to anyone well acquainted with scientific activity, do constitute a methodical confirmation and logical presentation of the characteristics. of scientific ad- vance, which may serve to dispel some popular misapprehen- sions about scientists and their work. Since the case histories were all taken from the Western world, some of their features will not be applicable to other societies, notably the Soviet. But refinement in dry-run and live application, with. adjust- ments where necessary to Communist conditions, might make them a first step toward a predictive methodology. They can be grouped for summary in categories-the general state of affairs in science, the state of the particular scientific art, the sociological environment, the attributes of the scientist, and the immediate circumstances of the breakthrough. The State of Scientific Affairs The contributions to breakthrough were not made in isola- tion from other progress, past and contemporary, in re- lated-sometimes not obviously related-fields. The quantum and relativity theories of the first two decades of this cen- tury, with their widespread effects in all scientific fields, were in particular one of the preconditions for the nuclear physics breakthrough. Planck and Einstein, in turn, traced their own ideas which flowered in these theories back through many sci- entists of the eighteenth and nineteenth centuries to their foundation on Newtonian mechanics and optics. Fleming owed his penicillin and Waksman his streptomycin to Ehrlich, Koch, Pasteur, and ultimately Galen. - Went found his auxin with the help of Darwin, Loeb, Fitting, and others. The in- terrelations among sciences and the cumulative nature of sci- entific advance thus illustrated create one necessary condi- tion for breakthrough-the free communication, of scientific information. Secrecy failed to retard the military applica- tion of atomic energy only because the basic discoveries had already been made in open collaboration by scientists, of. many nations. New facts turned up by a scientist in one corner:; of the world were subjected to scrutiny and verification 4n,:an- 75 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough other, led to new questions asked of the universe in a third, and stimulated new answers in a fourth. A related circumstance notable particularly in the many contributions to the achievement of nuclear energy release and to the development of chemotherapy was the part played by a corps of inconspicuous scientists and technicians con- scientiously gathering and patiently checking data in a series of unspectacular advances toward the goal. The scientists who became famous all acknowledged their indebtedness to the many who toiled in obscurity to make possible the eventual giant stride. Another condition favoring break- through, therefore, especially in experimental fields, is the presence of a great army of scientific workers doing lesser jobs. We shall discuss later the attributes of the breakthrough scientist, but one of them seems universal and important enough to include as a third element in the general state of scientific activity: the scientists studied were clearly all men driven strongly toward some goal, usually characterized by the urge to reduce complexity to a unitary understanding of the environment. The third general condition favoring break- through is then the presence of inspired men devoting their lives to a compelling scientific purpose. The State of the Art The breakthroughs were all made when the stage, so to speak, was set for them, and in fact it is something of a truism to say that a necessary condition for breakthrough is that the state of the art be such as to provide some important un- answered questions and a theoretical foundation, mathe- matical tools, equipment, and techniques to answer them. Viewed thus, the breakthroughs seem but the next logical step in a series of lesser advances-the relativity theory, in answer to Michelson-Morley's fruitless attempt to detect an ether drag on light, going one step beyond Lorenz and Poin- care, whose steps in turn led back to Maxwell and Faraday, the fathers of field theory; the nuclear breakthrough reached in logical progression from the first exploration of the new worlds of radioactivity and the cathode ray tube, backed by the quantum theory and Einstein's mass-energy equation; the antibiotics developed by systematic experimentation; the auxins found by application of newly developed techniques to 7Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved for Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 he Symptoms Of Scientific Breakthrough the old problem of phototropism, once teleological explana- tions no longer satisfied the scientist. This logical quality in scientific advance has led some schools of thought to say that a ready state of the art is not only a necessary but a sufficient condition for breakthrough, that an advance is inevitable when the time is ripe for it; and these people quote Einstein to the effect that the special theory of relativity would have been born about the time it was even if he himself had not. Einstein, however, thought that the same statement would not be true about the 1915 general theory of relativity; and the study of these selected cases does not support the logical inevitability hypothesis. It would have been more logical to arrive at the quantum theory through an extension of Helmholtz' work than through Planck's thermodynamics. The mathematical tools which converted the special to the general theory of relativity had been there, unused, before. The potential of penicillin lay unrecognized for a dozen years. There is no logical reason why the plant auxin could not have been isolated by Loeb or Fitting, ten or twenty years before Went found it. The state of the art made the breakthroughs possible and likely, but did not bring them about. The Sociological Environment Scientific activity thrives or sickens according to the kind of society in which it lives, and a generally thriving science is of course a condition favoring breakthrough. The influence of society is felt in science through education, facility of com- munication, financial support, and moral support or stimulus. These factors are examined with reference to the cases under study and, more broadly, to their influence on twentieth-cen- tury science as a whole. Education. The nineteenth-century extension of education to the middle classes, broadening the personnel base of scien- tific activity, is reflected in the fact that almost all the 47 sci- entists here studied came from the middle classes. The con- tinued democratization which has now opened the universities to all classes must be counted a principal factor in the geo- metric progression of scientific advance in this century. Communication. Easy communication among scientists we established above as a condition favoring breakthrough. The Approved For Release 2005/01/05 :CIA-RDP78-03921A00030031000??0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough proliferation of media for scientific communication in today's society provides for this intercourse as never before. On the other hand, national antagonisms and especially wars tend to bind it with requirements for secrecy. Support. The universities furnished not only the person- nel base but also the facilities and financial support in most of the cases studied, as in scientific activity generally during this period. The funds came in large measure from govern- ment, but the use of academic institutions as disbursing agents left them free from specific controls. The current trend toward industry-supported research was illustrated in some measure in dye and drug firm help toward the development of chemotherapeutic agents. Support from industry here, like the support from government in the nuclear break- through, was predicated on the development of applications rather than aimed at basic research. An adequate level of support for basic research appears to be independent of gen- eral prosperity or depression; the poverty of the thirties seems not to have retarded the mounting flood of scientific discov- eries. Perhaps the surplus of resources available to science in prosperity tends to be squandered in hectic technological development. Moral Stimulus. Basic science appears indifferent also to popular acclaim or disapproval. Whether idolized as the hero of technocracy in the twenties, hooted down as the creator of depression in the thirties, or tolerated as an impractical wizard in the forties, the scientist stuck to his laboratory, stimulated by his own goals. An obstacle in public doubt and suspicion was noted only in the early history of the work on chemotherapy. The stimulus of national aims is generally not strongly felt by the notoriously unnationalistic scientist, but great causes may spur him on: the refugee scientists who contributed to the nuclear breakthrough were moved not only by their scientific purposes but by bitterness toward Naziism and apprehension of a German. breakthrough in atomic energy. That social needs may provide a stimulus was evident in the development of chemotherapy and in the work on plant growth substances. And finally the great stimulator of so- ciety, war, galvanizes science too, mostly toward technological applications but with repercussions on basic research, as seen 3proved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthhrougnh in the course of nuclear energy development. The cold war, with its less urgent demand for immediate applications, is bet- ter than hot war in this respect as in others. In summary, we can say that sociological conditions favor- ing breakthrough include the following: universal education; absence of political inhibitions on scientific intercourse; ade- quate funds administered by an agency, such as the universi- ties, interested in knowledge for its own sake; compelling so- cial needs, especially for medicine and biology; the stimulus of international competition without a division of knowledge into national compartments. Attributes of the Scientists The 47 scientists studied included three women, two in medi- cine and one in atomic energy. Eighteen were born before 1900, the other 29 between 1900 and 1920. They were of many nationalities. Statistical studies of available data on them yield the following results. Family Background. The chances are at least 2 to 1 and probably as high as 4 to 1 that at least one of the break- through scientist's parents was well educated. There is an equal probability that the family was in moderate to com- fortable financial circumstances or better. The chances may be as high as 4 to 1 that the scientist was reared in a religious atmosphere. Incomplete data make it 11 to 2 that he was either the youngest or the oldest of the children but 18 to 1 against his being an only child. The boys born to the sci- entists' parents outnumber the girls 3 to 2. The chances are rather high against the family's having another scientist, but perhaps 4 to 1 in favor of its having others engaged in some profession. Choice of Vocation. The great majority of the scientists became interested in science early in life. Many.engaged in scientific hobbies and showed exceptional ability in childhood. Although many received encouragement in the choice of this vocation from their family, friends, relatives, associates, and some from their teachers, the greatest single motivating fac- tor was their own interest. In choosing their fields of re- search, their own recognition of the need for development of some field, the presentation of an opportunity, and the guid- 79 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough ance of teachers seem to have been factors of equal impor- tance. Education. No significant pattern was found at the ele- mentary school level, but the chances are 3 to 1 that the scientist's undergraduate school was a large one, the same that it was state-supported, and 2.5 to 1 that it was both. More than half of them left their undergraduate school to enter a large graduate institution. All 47 attended some grad- uate institution; the chances are 9 to 1 that it was a large one, better than 3 to 1 that it was state-supported, and al- most 2 to 1 that it was both. Most of them had a Ph.D. or the equivalent at the time of their major contribution. A few were actively engaged in their doctorate research. At least half had continued their research studies past the doc- tor's degree. Private Life. The scientists' marital status conformed to the normal pattern for the population. Their economic sta- tus followed the normal pattern for college graduates: most of them were at least moderately well off. No significant pat- tern was found either in their religious or in their political affiliations. Most of them were reported to be in good health. Some were active in athletic sports. Age at Time of Contribution. This study confirmed other evidence 2 that advances are made with the greatest frequency by scientists between 30 and 39 years old. There is a sharp decline from these to the next most prolific age group, 20 to 29 years old, which is then followed closely by those 40 to 49 years old. Eighty-six percent of the contributions were made before the scientists reached their fiftieth birthday. Professional Standing at Time of Contribution. The data from these 50 cases yield a zero probability that a major sci- entific advance should be made by anyone except a scientist actively engaged in research. The probability is also almost nil that a major advance should have been made by a scien- tist whose talent was not recognized at least by his immedi- ate colleagues or the person directing the research. The prob- ability is extremely high that the scientist who made a major 2 See Harvey Christian Lehman, Age of Achievement (published for the American Philosophical Society by the Princeton University Press, 1953). 80 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough discovery had already published the results of previous re- search. The chances are better than 2 to 1 that he was in fact an acknowledged authority in his field. The large ma- jority of the breakthroughs were made while the scientists were engaged in their regular research in their usual places of employment. Almost all of them were connected with aca- demic institutions; only about 10 percent were connected in any way with industrial organizations, and only 2 percent were working solely in industry. Composite Type. The study thus gives a composite portrait of the typical breakthrough scientist as a person who early in life became interested in science and in adolescence had a scientific hobby. He came from an educated, middle-income family, where he led a normal childhood life, probably getting more than average encouragement in his choice of science as a career. He attended the usual elementary and secondary schools but showed a decided preference for the larger gradu- ate institutions, and more than likely he continued his studies after receiving the doctorate. He became a professor or fel- low actively engaged in research at an academic institution. He published a number of scientific articles, and by the time he made his major discovery he was well known, although still probably only about 35 years old. He was fortunate in hav- ing chosen a field ripe for major advances, and fortunate also in his choice of associates. He seems to have led a normal and reasonably happy life, having the intellectual rewards of achievement in his chosen field and not much worry over financial matters. Circumstances of the Breakthrough In an effort to arrive at a corresponding picture of the typical breakthrough situation, the data from the 50 con- tributions were analyzed and tabulated under two heads: First, nature and origin of the contribution, whether theo- retical or experimental, whether arising out of diffused ad- vance along a broad front or from a concentrated push on a narrow front, whether lying in the scientist's own field or not. Second, organization and support of the research work, whether done by an individual, working alone or with assist- ants, or a team, by whom paid for, whether hindered by lack of funds, whether controlled by the sponsor, whether helped Approved For Release 2005/01/05 : CIA-RDP78-03921A00030031000 - Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough or hindered by location, space, or equipment, and whether helped or opposed by other scientists. Nature and Origin. Six of the contributions were classi- fied as pure theory, and the remainder divided about equally between pure experiment and experiment plus theory. The pure theories advanced science along a broad front, most of the others on a narrow front. One, the penicillin spore on Fleming's bacterial culture, could be classified as an accident under propitious scientific circumstances. All the other ex- periments which led to contributions were planned, many of them to clarify the unexpected result of a previous experi- ment. None of the contributions lay outside the scientist's major field of interest or a closely related one. Organization and Support. Team projects outranked in- dividual research, with or without assistants, by a ratio of 3 to 1. About 76 percent of the scientists got all or part of their financial support from academic institutions and private foundations. About 14 percent got some government funds, but only about 2 percent were entirely supported by the gov- ernment. Industry helped finance about 8 percent, but en- tirely supported only about 2 percent. Probably fewer than 10 percent of the scientists had what might be called gen- erous budgets, but about 80 percent were receiving adequate financial support. Another 8 to 10 percent produced their contributions under very meager financial circumstances. Little or no control was exercised over the funds made avail- able. Physical conditions for the research were in general ade- quate. The favorable location of many of the laboratories may have been an important factor. New techniques were a factor in 50 percent of the contributions, new materials in 16 percent, and new or improved equipment, in conjunction with new techniques or materials, in 10 percent. About 85 percent of the scientists, all those on whom this informa- tion could be obtained, had the benefit of some kind of en- couragement from other scientists. About 15 percent, before World War I, were hindered by some form of professional op- position. Scientific discoveries of the rank under discussion are never ignored by other scientists. 82 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved or SRelease 2005/01/05 : CIA-RDP78-03921 A000300310001-0 he ympfoms O Scientific Breakthrough Patterns for Prediction In assembling these common elements into patterns which intelligence might use as criteria for indicating the break- through potential of any particular piece of current research, we should recognize that no one can predict a specific break- through in the sense of anticipating its essential features.. Such a predictor would create the breakthrough itself. We only hope to define the conditions that make some kind of breakthrough likely in a given area, much as hurricane pre- diction, although it cannot foresee a particular hurricane arising at a precise point in space and time, can at least set a twenty-four hour watch on any area where certain defined conditions have been found. When the patterns which have been associated with past scientific breakthroughs are found. to characterize any field of current scientific research, that area should bear watching. General State of Science. As we have seen, a major ad- vance, irrespective of field, is most likely to be made when there is free and untrammeled interchange of the accumu- lated knowledge of all the sciences, and when the leaders of science, each dedicated to his particular goals, are supported by a large corps of ordinary scientific workers and technicians. The State of the Art. If the experimental research in some field appears to have reached a plateau whereon old data are being refined and more precise measurements made but no new evidence generated which cannot be explained satisfac- torily by current theories, where the tools of the trade are being fully used and are giving satisfactory results, and where the scientists believe they know all the answers or at least what to do to get the answers, no major advance is likely to be in the offing. But when scientists in a field are developing new experimental evidence that does not fit the old factual patterns and cannot be explained satisfactorily by present theories, and realize that they are dealing with new evidence, not "experimental error," then the science will begin to ad- vance to the extent that techniques, instruments, and the materials required become available (sometimes from the de- veloping state of another science), and a major advance is likely as the next logical step in a series of lesser advances. Characteristics of Current Research. No major advance will be made in an area of science where little or no basic re- Approved For Release 2005/01/05 : CIA-RDP78-03921A00030031000v=0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough search is being done, and there is bound to be some correla- tion between likelihood of breakthrough and quantity of cur- rent research. Intelligence analysts can get some idea of the amount of research being conducted in a given field by merely counting the number of scientific papers produced. The fear that many research papers may be unpublished seems not to be well founded: the results of basic research seem always to get published in some journal or other, since military se- crecy, beginning to operate only after the breakthrough is al- most accomplished, cannot even then dam all the flow. And peripheral areas not readily recognized as pertinent often hold the key to breakthrough. Sheer quantity, of course, is no assurance of impending breakthrough. The features common to the advances we have studied show that research most conducive to scientific break- through will be conducted by a group of scientists working as a team in their major field of competency, with capable technical support, to advance scientific knowledge along a nar- row front. It will have adequate financial support free from control, and moral support from other scientists. It is likely to consist of experiments designed to clarify the unexpected result of previous experiments, and to feature the use of new techniques, new materials, improved equipment, or all three. The Scientists. The most common and outstanding char- acteristic of breakthrough scientists, we have seen, is youth combined with experience in the field in question. The scientist 30 to 39 years old will have had 10 to 20 years of research experience. The one who makes a great discovery, most common at this age, will almost invariably have worked in it for some years during and after his study for the doc- torate. He will have published articles concerning his past or present research. He is likely to be attached to an academic institution or non-profit foundation, a recognized authority in his specialty. He almost invariably has attended large, well-known academic institutions, at least for his doctorate work. As breakthrough scientists have not appeared suddenly from total obscurity, so they have not come, either, from the lower economic strata of society nor been freaks or even infant prodigies. They have come from homes of moderate ftproved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 The Symptoms Of Scientific Breakthrough to comfortable financial circumstances, with one or perhaps both parents well educated. They grew up without peculiari- ties except an early interest in science. They lead the normal family lives of well educated, upper-middle-class society. Sociological Factors. Scientific advance is most likely when society is in sympathy with scientists and their effort and does not create artificial restraints or barriers to their inter- communication or try to make them the mere providers of comforts. The favorable economic situation is one in which adequate funds can be made available for basic research- not necessarily times of greatest prosperity, which may be too busy developing previous discoveries to feel the need for further basic work. Politically also, the need for basic re- search must be recognized, whatever the circumstances that bring it to attention. Some nations foster scientific re- search in time of war (the United States) and some do not (Nazi Germany). Some governments favor research in time of depression and forget about it in time of prosperity. One country (the USSR) incorporates it into its national phi- losophy, and another (the United States) fosters it to keep ahead of the other. Finally, scientific advance is most likely when education is widespread and scientific education broad, not a mere training of technicians for the development of applications. Check-List of Criteria The five most critical of the conditions described above might be listed in abbreviated form as a kind of prospector's wand to be tested by intelligence analysts for its value in locating a subsurface breakthrough in any current field: 1. New experimental evidence that cannot be satisfactorily explained by present theories is being discovered at a rapid rate. 2. New techniques, new materials, and new or improved equipment are being brought to bear on an old problem. 3. A group of scientists is assembled to make concentrated attack on the problem. 4. This group is composed of relatively young men well qualified in this specific field. 5. The group has adequate technical and financial support and professional encouragement. 85 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 A unit of the Department of Commerce now serves the scien- tific public with an intelligence community product. PUBLICIZING SOVIET SCIENTIFIC RESEARCH Shortly after Sputnik I jarred the nation on 4 October 1957, people began looking for someone to blame; they rapidly settled upon the Government and charged it with a total neglect of Soviet scientific information, spreading the tall tale that Soviet scientific periodicals were gathering dust on the shelves of the Library of Congress. If the nation's shock could indeed be laid to some fault of the Government, that was the wrong charge, as previous articles in the Studies have shown.' Some half million pages of translations, con- densations, and abstracts from Bloc-mostly Soviet-scientific literature had been issued by the intelligence community since the beginning of 1949. The Government's fault, if there was one, with respect to this literature, aside from its general disposition to encourage public disrespect for propagandistic Soviet emanations, was the lack of vigorous measures to acquaint the U.S. scientific public with the published results of Soviet research. The in- telligence community, however, for all that its responsibilities lie in the opposite direction from publicity, had for its own selfish reasons begun efforts to repair this omission even be- fore the epochal earth satellite was launched. In 1958, thanks to the cooperation of the Department of Commerce and the Sputnik's lubrication of Congressional purse strings, these efforts reached full fruition. Intelligence Doffs the Veil The history of the community's treatment of information from Soviet scientific literature is one of progressive relaxa- tion of restrictions, ending almost in an active peddling to the public. Up through 1949 this material was stamped Restricted 1 George A. Pughe, "The Dust That Isn't There," II 2, p. 71; J. J. Bag- nall, "The Exploitation of Russian Scientific Literature for Intelli- gence Purposes," II 3, p. 45. 87 Approved For Release 2005/01/05: CIA-RDP78-03921A000300311'AQMtNRP PAGES 87-90 Approved For Release 2(/~01/05 : CIA7RD'78-U ,92AA0003h00310001-0 u icizing ovie c:en i is esearc when it was pure dead-pan translation, Secret when it was tailored to meet intelligence requirements. It was not just from force of habit that such stamps were applied: the So- viet security laws of 1948 throttled the flow of Soviet scien- tific periodicals to the United States until it reached an all- time low of 69 titles in the winter of 1949-1950, :fewer than forty of them of intelligence value, while a full hundred un- classified Soviet periodicals were unobtainable outside the USSR. In 1950, however, this trickle began the steady increase which has brought it to its present flood tide, and the in- telligence community now recognized the periodical litera- ture as its major and indeed only encyclopedic source of in- formation on Soviet scientific organization, activities, and per- sonnel. The need for classification faded with the softening of Soviet security practices, and it began to be more and more de- sirable for community purposes to issue this information in unclassified reports. The reasons an unrestricted availabil- ity is desirable lie in the difficulties of scientific intelligence production: the range of subjects that must be covered is all out of proportion to the number of scientific hands available in the community. A tremendous number of pin-point specialists in numerous divergent disciplines are required to evaluate the foreign data. Scientific intelligence, in fact, seems to be best served when all U.S. scientists are well informed about re- search conducted abroad, notably in the USSR, in parallel with their own specializations. The reports were therefore declassified in 1950, and in 1953 came the first diffident move to make them publicly available: they were anonymously deposited in the Library of Congress, the Department of Agriculture Library, the Crerar Library in Chicago, and some others. This was a step in the right direction, but the producers of scientific intelligence, whether in Air Force, Army, Navy, AEC or CIA, still had difficulty getting the translated data to all the many scientists and con- tractors assisting them. Two or three years later the Na- tional Science Foundation, acting for the U.S. scientific com- munity, began to help : in cooperation with several learned institutions it sponsored translations to be sold by subscrip- tionat a modest fee. The National Institutes of Health began a parallel program for medical translations, and together the 88 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Publicizing Soviet Scientific Research two now offer more than 50 Soviet scientific periodicals trans- lated from cover to cover. The intelligence community ad- vised and assisted in setting up both these programs. The OTS Solution In the search for a more comprehensive solution a meeting of the various processors and users of Soviet scientific data was held under National Science Foundation auspices on 3 October 1957, one day before Sputnik I. The Department of Commerce, which has the legal responsibility for disseminat- ing technical information to the public but had no appropria- tion to handle the massive quantities of Soviet scientific lit- erature, was invited to send a representative. It was unan- imously agreed at this meeting that the intelligence commu- nity should make the material available, unclassified, to Com- merce's Office of Technical Services, and that the Department should request from the Congress the funds to publish and disseminate it. In due course, with help from the Sputnik, OTS got the money, and since 1958 U.S. scientists have at a nominal cost had access through this channel to large volumes of data translated from Bloc sources. The OTS intake, in its second year now, is a huge and growing one. The intelligence community's product has grown seven-fold from its low in 1948 to nearly 150,000 pages of abstracts and translations in 1959. To this flow contribute eight principal intelligence components-Air Force's Air In- formation Division in the Library of Congress and its Air Tech- nical Intelligence Center, Army's ACSI, Corps of Engineers, Signal Corps, and Ordnance Corps, the Atomic Energy Com- mission, and CIA's Foreign Documents Division. Yet an- other 50,000 pages are supplied from outside the community by the translation programs of the NSF, the NIH, the Joint Publications Research Service, the Consultant's Bureau, Per- gamon Press, and others. For controlling and researching this total of some 200,000 pages of translated Bloc studies arriving annually, OTS sells a semi-monthly listing of "Technical Translations" done in and out of government and the semi-monthly "Scientific In- formation Report" produced by CIA, which presents the high- lights of research published in nearly a thousand Sino-Soviet Bloc periodicals. Complete tables of contents of Bloc periodicals Approved For Release 2005/01/05 : CIA-RDP78-03921A00030031000f-% Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Publicizing Soviet Scientific Research are contained in the "Monthly Index of Russian Accessions" and "Monthly Index of East European Accessions" available at the Library of Congress and in the "Current List of Medi- cal Literature," at the National Library of Medicine. Finally, CIA still produces the venerable "Consolidated Translation Survey," now in its eleventh year. Not generally available to the public, to be sure, it is nevertheless unclassified and may be sent to individual scientists when government needs are thereby served. The intelligence community, which has neither the func- tion nor the funds to publish reports for the general public, has thus in its own interest done the next best thing- helped arrange and supported appropriations for others to disseminate the information, making available all its unclassi- fied production on a regular basis for public use. K ,proved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 A historical object-lesson on the consequences of letting ill- considered intelligence assump- tions determine a course of action. PORTUGUESE TIMOR: AN ESTIMATIVE FAILURE The preparation of U.S. intelligence estimates has become an organized and methodical process. In response to a change in the international situation or in accordance with a more or less regular schedule, an estimate is laid on by the USIB. Terms of reference are circulated to members of the intelli- gence community, agency contributions are made, and a com- posite draft is produced by an estimates staff. After considera- tion and revision by representatives of the agencies, a final draft is presented to the USIB for concurrence in the National Intelligence Estimate of a given situation, provided to guide American military and political policy. Under special condi- tions this process is shortened, but not essentially changed. A similar process goes on in the governments of a number of Western countries, and we can probably assume that equivalent joint intelligence exercises are undertaken by the Soviet Party and Government. This unhurried and systematic mobilization of available in- telligence resources to bear on a given problem is a relatively recent phenomenon, one which can be said to have begun during World War II. Before that time intelligence estimat- ing in most countries was a pretty haphazard affair. Strategic intelligence as a function distinct from policy-making was usually regarded as superfluous to the extent that it was re- garded at all. Accordingly, until well into World War II, in- telligence estimates appear to have played only a very modest role in the making of political and military decisions. Of the many examples that could probably be drawn from the earlier years of World War II to show the disastrous consequences that followed from operational plans based on inadequate intelligence consideration, one of the most poig- nant, it seems to me, was the Dutch-led occupation of Portu- guese Timor, the isolated overseas territory of neutral Portu- 91 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300M8"KI1 P PAGES 91-96 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Portuguese Timor gal. This rather sparsely inhabited eastern half of Timor, the easternmost large island in the Lesser Sundas, lies almost 2,000 miles southeast of Singapore but only about 500 miles from the north coast of Australia. Its proximity to Australia gave the otherwise remote and unimportant territory a dis- proportionate strategic value which, in the fall of 1941 and early 1942, brought it an unwelcome prominence not known before, or since. The "Estimate" . The nature and extent of Japanese interest in Portuguese Timor in 1941 are not fully known. At that time, however, Japanese interest in the East Indies was primarily attracted to Sumatra, Borneo, and Java, where major sources of strategic raw materials were to be found; and the fact that Japanese operational plans in Southeast Asia prepared in 1941 did not originally envisage a landing in Australia removed what would have been the principal attraction for them in the Portuguese territory. Dutch archives for this period are not open to the public, and we are therefore thrown back on official histories to shed some light on this recondite corner of the history of World War II strategic planning. A Dutch official history of the period, Nederlands-Indie Contra Japan, states that Japanese interest in an air service with Portuguese Timor aroused great concern among the Allies. Timor, indeed, formed a very important link in the defense chain which linked Malaya, the Netherlands Indies, and Australia. A Japanese air base in Timor could form a very dangerous starting point for further actions against Dutch and Australian territory. The Dutch history goes on to note that Dili, the capital of Portuguese Timor, "which lent itself so well to the establish- ment of a base for amphibious aircraft, was only weakly held by the Portuguese, largely with native troops." The Portuguese "garrison," in fact, consisted of a company of indigenous scouts-cazadores-and a platoon of "Frontier Police" appar- ently assigned to immigration duties along the Dutch terri- tory border. 'Historical Section, General Staff of the Royal Netherlands Army (Bandung, 1950) Vol. II, pp. 230-232. 92 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Portuguese Timor The Dutch history continues: These troops were not in a secure enough position to undertake with their own small strength to oppose a Japanese attack. The Netherlands Indies Government was thereby faced with a difficult decision. On the one hand was the danger of a Japanese occupa- tion of Portuguese Timor, on the other hand occupation of this territory by us meant aggression against the territory of a friendly power. Since it could be foreseen practically with certainty that Japan would not hesitate to aim at Timor-Dili as a point of sup- port, it was decided in November, 1941, to occupy the place with Dutch and Australian troops and thereafter to offer the Portu- guese Government protection for that territory. This November decision was apparently contingent upon an actual outbreak of war in the Pacific. The Dutch history does not make clear whether any more detailed intelligence estimate was formulated on this point. Given the relatively primitive development of intelligence es- timating at the time, it seems unlikely that the question was considered at any great length. Faced with an imminent Japanese assault in great force on the Netherlands Indies- which seemed virtually inevitable following the failure of the Dutch-Japanese trade talks in June 1941-the Dutch appear to have assumed that the Japanese would opt simultaneously for all the strategic alternatives open to them and attack across the board, from Sumatra to Timor. Yet in the economic and trade negotiations of 1940 and 1941 the Japanese had shown little interest in Timor, emphasizing rather their desire to obtain additional supplies of the raw ma- terials produced in Sumatra, Borneo, and Java. The few signs of Japanese interest in Portuguese Timor cited by the Dutch history hardly constitute convincing evidence of Japanese in- tent to occupy the territory. Nor do other available sources provide such evidence in recording Japanese economic inter- ests there. A semi-official Portuguese source, Timor Portu- gues,2 states that Japanese firms began to invest capital in Portuguese Timor in 1934 and that in 1938 a Japanese Con- sulate was opened in Dili. There is no indication that these Japanese interests were more than purely commercial. Por- tuguese Timor was and is a producer of modest consequence 'By Capt. Helo Felgas, Agencia Geral do Ultramar (Lisbon, 1956) pp. 287-288. Approved For Release 2005/01/05 : CIA-RDP78-03921A0003003100019-9 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Portuguese Timor of high-quality Arabica coffee. After the opening of the Japa- nese Consulate in Dili an Australian Consulate was also es- tablished there. Even the efforts made by the Japanese to obtain landing rights in Dili need not have been considered particularly omi- nous, for an air route from Japan to Australia via the Palaus and Portuguese Timor is fairly direct, avoiding the long detour to the west through Hong Kong, Singapore, and Batavia. Moreover, an airline operating from Japan to Australia via Singapore and Batavia would have faced heavy competition from the British-owned Imperial Airways, particularly on the Singapore-Australia segment. The Dutch estimate of Japanese intentions towards Portuguese Timor, therefore, appears to have been both hurried and poorly done. The extent of Aus- tralian participation in this estimate and the consequent de- cision to occupy the neutral territory is not known, but Aus- tralian agreement to the action must have been obtained. The Action If the estimate was poorly done, the operational response was even worse. After the outbreak of hostilities on Decem- ber 8, the Royal Netherlands Indies Army prepared to occupy Portuguese Timor. The action was carried out on December 17 by a combined force of about 600 Dutch-led Indonesian troops and some 300 Australians. The combined force was equipped with four 75-millimeter field guns, six sections of machine gunners and three squads of light mortars, in addi- tion to the usual small arms with which infantry companies were then equipped. The force had no tanks, no anti-tank guns, no provision for air or sea support. This action was undertaken at a time when the forces avail- able for the defense of the far more important islands of Java, Sumatra, and Borneo were already much too slender to op- pose the avalanche of Japanese troops pouring into Southeast Asia. The size and weight of the forces already poised to attack the Philippines, Malaya, and the Netherlands Indies were reasonably well known to the Dutch and the other Allied countries, and against this background the absurdity of the unsupported and ill-equipped 1,000-man expedition to occupy Portuguese Timor stands out clearly. GA. Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved Fir JpAsq 9 5/01/05: CIA-RDP78-03921A000300310001-0 The Portuguese response to the Dutch-Australian invasion was non-violent, but the Portuguese Prime Minister, Dr. Sala- zar, immediately protested to the British government. He ap- parently sought British assurances that the Allied invasion forces would be withdrawn upon arrival of Portuguese East African troops to be dispatched from Lourenco Marques in Mozambique to reinforce the Timor garrison. The Aftermath Whatever the arrangements between the Portuguese and the Allied nations, the presence of an Allied force in Portu- guese Timor inevitably drew the attentions of the Japanese. As their invasion forces moved deep into the Netherlands In- dies in late 1941 and early 1942, they undertook preparations for the assault on Timor. On February 20, 1942, simultane- ously with a landing near Kupang, capital of Dutch Timor, Japanese troops of the 228th Infantry Regiment, supported by destroyers, went ashore near Dili and met only light resist- ance. The Dutch troops withdrew towards Dutch Timor, where they were eventually forced to surrender, and the Aus- tralians retreated to the center of the island. From there they carried out guerrilla operations throughout 1942, but in February 1943, after suffering heavy casualties, they were withdrawn to Australia by submarine. From a faulty intelligence estimate to an ill-considered op- erational plan, the Allied occupation of Portuguese Timor pre- sents a sorry spectacle. Much the worst of it is the fact that this performance probably brought on the Japanese invasion of the territory. It cannot be said with certainty that the Japanese would otherwise not have taken action, but it should be noted that they respected the neutrality of another Por- tuguese territory in the Far East, Macau, which remained wholly in Portuguese hands throughout the war. Although a British consul was resident in that territory during the war years, no Allied troops were ever stationed there. Given its relatively few attractions, it seems reasonably plausible that the Japanese would have left Portuguese Timor alone also, if the Allied nations had not been the first to occupy it. For the balance of the war a fairly large Japanese occupa- tion force remained in Portuguese Timor. This force, in turn, presented an attractive target to Allied bombers, based less 95 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05: CIA-RDPpL9F93P&j499 0310001-0 than 500 miles away in Darwin, Australia: Dili was virtually flattened by Allied bombardments. Late in 1942 the Governor of the territory, Sr. Manuel Ferreira de Carvalho, ordered Por- tuguese citizens (as distinguished from the indigenous "pro- tected persons") in Timor to concentrate in an area west of Dili, on the north coast. There, he felt, he could provide them some measure of defense against the depredations of the oc- cupation force and the indigenous bandit gangs encouraged by the Japanese. While this move gave them some protec- tion, their supplies of food, medicine, and clothing steadily dwindled in quantity and quality throughout the :rest of the war, and eventually 50 of them, out of a total of some 300 in the territory, died. Several thousand indigenous inhabitants died from causes directly or indirectly connected with the Japanese occupation. Although the certificates of death issued for these people (if, indeed, any certificates were made) may have given ma- laria, beri-beri, or complications of dysentery as the imme- diate cause of death, the real cause they might have cited was "Bad intelligence estimate." 96 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 INTELLIGENCE IN RECENT PUBLIC LITERATURE MILITARY INTELLIGENCE IN WORLD WAR II THE LONGEST DAY. By Cornelius Ryan. (New York: Si- mon and Schuster. 1959. Pp. 350. $3.95.) D Day. By David Howarth. (New York: McGraw-Hill. 1959. Pp. 251. $4.95.) INVASION: 1944. By John Froyn Turner. (New York: G. P. Putnam's Sons. 1959. Pp. 248. $3.95.) The fifteenth anniversary of the greatest triphibious as- sault in history was marked by the publication of these three books devoted exclusively to the events of that sixth day of June, 1944. By far the best written, most concerned with in- telligence aspects of the action, and most skillfully put to- gether is Ryan's The Longest Day. Like Howarth, Ryan bases his story largely on the personal accounts of participants, but by concentrating on fewer individuals and developing some new material he has produced a better narrative. The Longest Day tells how the senior German commanders were scheduled, ironically, to attend a Kreigsspiel at Rennes on 6 June to war-game the theoretical invasion of Normandy. It devotes a chapter to the two-part signal broadcast by the BBC to notify the French underground that the invasion had begun-how Admiral Canaris had learned of the code phrases in advance and correctly interpreted their meaning, how Lt. Col. Hellmuth Meyer, intelligence officer of the German Fif- teenth Army, picked them up when broadcast, and how the Fifteenth Army was thus put on the alert while the Seventh Army, which held Normandy, was not. It shows how, after the action had begun, the German High Command was split on its evaluation, some believing it a feint to draw the defend- ers away from the Pas de Calais, the real objective of the main assault. Howarth's D Day describes in greater detail the individual battles fought at the sites of air drops and on the beaches, supplying fewer personal anecdotes than Ryan's book. Al- 97 Approved For Release 2005/01/05: CIA-RDP78-03921A0003003 1M1PIRP PAGES 97-98 Approved For Release 2005/01/05 : C'A-e 921 q q0310001-0 cent7jjO though Howarth pays less attention to intelligence, he gives several pages to a description of British beach reconnaissance: in the preceding months men had been secretly landed on some 30 French beaches to determine the precise characteristics of the landing areas. Turner's Invasion: 1944, "The First Full Story of D-Day in Normandy," is much more detailed than the other two, but far less interesting. Turner concentrates on logistic aspects of the operation, devotes the first half of his book to planning and preparations, and has little to say about intelligence. BATTLE: The Story of the Bulge. By John Toland. (New York: Random House. 1959. Pp. 400. $5.00.) This is a superbly organized and excitingly written book about the battle in the Ardennes, from 15 December 1944 to 23 January 1945, in which three German armies smashed through a lightly held Corps sector of the United States First Army and were ultimately thrown back by the First and Third U.S. Armies plus a British Corps. Mr. Toland indicates that he travelled a hundred thousand miles and talked to more than a thousand participants in order to write this hour-by- hour account of the engagement. He has done a magnificent job in making a cohesive picture of the multitude of clashes (between units ranging in size from patrols to armored divi- sions) that collectively were the Battle of the Bulge-a strug- gle in which there was seldom a defined front and where knowl- edge of the enemy's location was certain only upon contact with him. The author gives short shrift to the controversial question of whether the initial success of the Germans in the Ardennes was the result of a major breakdown in the Allied intelligence effort. At the beginning of his story he notes that on the night of 15 December "no Allied commander seriously feared a major German attack." A woman who came through the lines of the 28th Division did report having seen a mass of German tanks behind the Siegfried Line, and she was sent to Corps and then to Army to tell her story. Col. Dickson at First Army predicted there would be an all-out German of- fensive, and in the Ardennes; but his associates said he was a notorious pessimist, and overworked. The 12th U.S. Army 98 MORI/HRP PAGES 98-99 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Mi itary Group said attrition was sapping the German strength. Mont- gomery was of the opinion that the Germans "cannot stage major offensive operations," and the SHAEF G-2 said the Germans were all but finished. After describing the 38-day battle that caused 75,000 cas- ualties, Mr. Toland concludes: Much has been written of the failure of American G-2 officers to foresee the battle. The rather primitive, naive American intel- ligence system, based largely on procedures used by the Pinkertons in the Civil War, was not at fault; the sophisticated British system was just as blind. The blame should not even fall on Hodges, Bradley and Eisenhower, nor on the architects of strategy, Roose- velt and Churchill. The entire Allied world must share the blame. On the night of December 15, 1944, it breathed the air of com- placency, optimism and self delusion. Although Mr. Toland's graphic description of one of the decisive battles of movement in modern warfare is fascinat- ing reading, particularly for those who fought in the Bulge, its intelligence interest is limited to this brief treatment of the estimative failure and a presentation of some challeng- ing situations for the combat intelligence officer. THE CLOCK WITH FOUR HANDS. By James Leasor. (New York: Reynal & Company. 1959. Pp. 314. $5.00.) Pub- lished in England under the title, "War At The Top." With some interpolations by Mr. Leasor, this book is in ef- fect the diary of Sir Leslie Hollis, who was in an exceptionally advantageous position to observe the making of high British policy before and during World War II: as one of the secre- tariat of the British Joint Chiefs of Staff he attended some 6,000 meetings of that body. Unfortunately, the book does not live up to the potential of that experience, either in depth or in balance. It is rather a collection of anecdotes, some amusing but all highly opinionated, tied together by the thread of history. If Sir Leslie's diary contained more of what could be expected of it than appears here, or if he still had access to the Joint Chiefs' minutes, he would have done bet- ter to publish his own memoirs. There are, however, some interesting tidbits here for the professional intelligence officer, telling for example how the British Government in the thirties refused to listen to intel- 99 Approved For Release 2005/01/05 : CIA-RDP78-03921A0003003100, I/HRP PAGES 99-1 0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Military ligence reports on the growing strength of Germany, and how its surprise at the Japanese attack on Pearl Harbor equaled that in the United States. British intelligence correctly pre- dicted the German attack on Greece. On the other hand, it so exaggerated German industrial production (which actually was less than British) that it seriously inhibited the planning for the second front. A useful chapter devoted to topographical intelligence and the organization of the Inter-Service Topographic Department describes the way it had to scrounge for information. There was scarcely enough to brief the R.A.F. for a raid on the Dort- mund-Ems Canal. When the army had to be evacuated from Dunkirk so little data was available about the beaches that travel agencies were asked for brochures, and then destroyers were sent for an on-the-spot look. The BBC broadcast an appeal for photographs taken by tourists, expecting to get eight or ten thousand, and were inundated by nine million. "Know Thine Enemy." By Captain J. V. Heimark. (U.S. Na- val Institute Proceedings, Vol. 85, No. 8, August 1959. Pp. 65-71.) Shows how good intelligence-primarily reconnaissance- on the part of the U.S. forces at Midway and ignorance of the enemy's whereabouts at Pearl Harbor, in the Coral Sea, and in the Philippine Sea had a decisive influence on the outcome of these naval actions. 100 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 TURNCOATS, TRAITORS AND HEROES. By John Bakeless. (Philadelphia: J. B. Lippincott. 1959. Pp. 406. $6.50.) In the past twenty years, since the publication of Morton Pennypacker's General Washington's Spies on Long Island and in New York 1 and Carl Van Doren's Secret History of the American Revolution,2 more and more facts and documents concerning British and American intelligence in the Ameri- can Revolution have come to light. Colonel Bakeless' mis- leadingly titled book is the first attempt to synthesize this new material with the old in a comprehensive intelligence his- tory of the Revolutionary War. The generally conceded fact that American intelligence on a large and organized scale dates only from World War II should not be allowed to obscure the wealth of espionage ac- tivity which the Revolution developed from casual and amateur- ish beginnings until it reached a point of considerable sophisti- cation, with backed-up cover, secret writing, couriers, cut- outs, double agents, and deception operations. It is evident that George Washington himself was a masterful intelligence officer. He gave close personal attention both to the opera- tional details of espionage and to the reports of his agents, whom he sometimes called "my intelligencers." He had a preference for spies "who live with the other side; whose local circumstances, without subjecting them to suspicions, give them an opportunity of making observations"; he noted that it was "necessary to be circumspect with double spies." Washington had competent intelligence staff officers, but he himself planned many operations and made his own evalu- ation of the product. Colonel Elias Boudinot recalls how, after reporting some newly arrived intelligence, he repeated his own interpretation of it three times to the apparently uncomprehending General Washington, who then gave it a diametrically opposite evaluation. When the General proved ' Brooklyn: Long Island Historical Society, 1939. 2 Garden City: Garden City Publishing Co., Inc., 1941. Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-8 MORI/HRP PAGES 101-1 8 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution to have been correct, "I then said," wrote Colonel Boudinot in admiration, "that I never would again set up my judgment against his." Washington initiated many intelligence deception opera- tions, planting false strength figures and other information which he often compiled himself, advising his agents what could be safely passed along. The hero of the cherry tree legend could tell some whoppers. He made a practice of plant- ing the same false story in several widely separated places, thus providing the enemy with "independent confirmations." One such plant was so successful that when a British intelli- gence officer laid the facts before General Howe, the British commander treated him "with contempt & Severity" for such bad reporting. General Washington's view of intelligence as a matter to be kept "as secret as possible. For upon Secrecy, Success de- pends in most Enterprises of the Kind . . ." is illustrated in the realistic American use of cover. Agents sent into the Brit- ish lines as Tories and deserters were officially listed as such, rewards were sometimes offered for their capture alive, and their families often suffered public opprobrium. In 1781, after five years of being hoodwinked, the British ordered no further protection for deserters; but then it was too late. Turncoats, Traitors and Heroes attempts with indifferent success to tell its history chronologically, beginning in the fall of 1774 with Paul Revere and his friends in the Boston area, "the first American intelligence net," real amateurs. A little later, the Americans in Georgia are shown perpetrating a deception: they intercepted a letter from the Royal Gov- ernor there to the British commanders in Boston and substi- tuted forged documents of contrary purport before sending it on. At Lexington and Concord, American intelligence was not bad; the British was probably better. And even the French introduced a couple of agents into the Boston area to see how the American cause was progressing. By 1776, when the American Army had suffered many re- verses, intelligence was improving; and an espionage-deception operation now brought a victory. John Honeyman, sent by 1 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution Washington into Trenton as a butcher and horse trader,3 dar- ingly brought back critical intelligence on the defenses of Trenton. Then, "escaping" from Washington's headquarters, he returned to Trenton and assured the Hessians that no ac- tion was to be expected from the Americans. It was with this intelligence preparation that Washington crossed the Del- aware on Christmas night to the victory at Trenton. General Washington's most important intelligence net was probably, that of the "Culpers" in British-occupied New York City and Long Island. From the City the merchant Robert Townsend (Culper, Jr.) sent reports by courier (usually Aus- tin Roe) to Samuel Woodhull (Culper, Sr.) on Long Island. There they were transferred to Caleb Brewster, whose whale boats took them across Long Island Sound to Fairfield, Con- necticut, to one of Washington's finest intelligence officers, Major Benjamin Tallmadge, a Yale classmate and friend of Nathan Hale. These reports, Colonel Bakeless indicates, were handled also by Alexander Hamilton, on Washington's staff. The book gives nothing further on Hamilton's intelligence activities, the extent of which has yet to be revealed. They may in fact have been negligible; but some historians say he served as an intelligence staff officer, and this reviewer has seen one docu- ment which reports the dispatching of spies, "Agreeable to Colo: Hamilton's request." The identity of the Culpers was a well-kept secret for a century and a half, until Pennypacker established it. Culper, Jr., continued to masquerade in New York as a Tory merchant until the war's end. The British knew that intelligence was leaking from New York, that many of the reports were written in secret ink, and that Caleb Brewster's whale boats ferried them across the Sound, but were unable to catch Brewster or discover the sources. Colonel Bakeless adds comparatively little to what Penny- packer wrote about the Culper net, and he contributes noth- ing material to the history of Hercules Mulligan,4 the Arnold- Andre affair, or the case of Nathan Hale. But he does help See "A Spy for Washington," in American Heritage, Vol. VIII, No. 5, August 1957, pp. 58-64. O'Brien, Hercules Mulligan: Conftdential Correspondent of General Washington. New York: P. J. Kenedy & Sons, 1937. 103 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution unravel the threads of another American intelligence net, that established from New Jersey by Joshua Mersereau to operate behind the lines in Staten Island, showing among other things that there was a third Mersereau in addition to the two previously known. Joshua Mersereau is cited in General Washington's account books as paid "for Exp. & re- wards of himself & others (whom he was obliged to employ) to open & carry on a Correspondence with persons within the Enemy Lines by the way of Staten Island." But money was sometimes short and agents complained. One wrote to Mersereau from Staten Island: . as soon as you fulfil that Request of mine, a regular Corre- spondence shall take place & unless you indulge me in that, I could not resume my Pen on a Subject of this Nature with any degree of Propriety; for give me Leave to remark that altho my Breast throbs with the purest & most fervent Love to my country, that can inspire to Noble actions, & banishes from my Soul every lucrative Passion; Yet a laudable Ambition requires that I Should Secure the Approba- tion of my Country; e'er I enter on So dangerous an Undertaking ... Before I bid you farewel, I must beg it as a particulor favour that you will be careful of my Letters, as you value the Safety of your Friend .. . Colonel Bakeless also relates in detail for the first time the role of an intelligence agent at the Battle of Saratoga. It will be recalled that the first battle for Saratoga was fought with inconclusive results in mid-September 1777. Then on October 7 the British attacked at Bemis Heights, were re- pulsed, and withdrew to the plain at Saratoga, where they surrendered ten days later. There has now come to light an affidavit made in 1852 by one Daniel Bryan, recounting the role played by his father, Alexander, in the battle of Saratoga. Alexander Bryan is said to have been asked by the American commander, General Gates, to go into General Burgoyne's lines and get information "as to the heft of the artillery" and the strength and contemplated movements of the enemy. In- side the British lines, he "purchased a piece of cloth for a trowsers when he went stumbling about to find a tailor and that thus he soon learned the strength of the artillery and the number of the Army . . ." as well as the plan to take Bemis Heights the next day. With this intelligence, General Gates was able to fortify himself on Bemis Heights and then counterattack and defeat the British. 10Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 oDP78-03921A000300310001-0 Approved Forecent Release 2 merican 005101/08: ev%R There seems little reason to doubt this story, and if it is reasonably correct Bryan's venture was a one-shot espionage job which may have changed the course of history. Saratoga is generally considered one of the decisive battles in world history: had the British won, the colonies would have been split in two at the Hudson River, and the American victory was an important factor in the French decision to enter the war. It is nevertheless difficult to go along with Colonel Bakeless' nomination of Bryan as "the most successful spy in history" and "the man who really won the American Revolution." The author, in this reviewer's opinion, also errs in dating Bryan's espionage in September before the first inconclusive battle of Saratoga. The internal evidence seems to place it before the second battle, fought on October 7. And Benson J. Lossing, in his Pictorial Field-Book of the Revolution,5 describes how a sergeant arrived at the headquarters of the American com- mander, General Gates, just before the British attack of Octo- ber 7, "with intelligence of the movement of the British army." This sergeant may have been Alexander Bryan. Turncoats, Traitors and Heroes also treats the activities of British intelligence in America during the Revolution. There were many (including Benjamin Franklin's son William, Royal Governor of New Jersey) whose loyalty to the British Crown was not shaken by rebel activities, and many loyalists were fruitful sources of intelligence. Even before the Revolution broke out, the British had established a high-level penetration of patriot activities in Boston. Their agent was Dr. Benjamin Church, Jr., a member of the Massachusetts Provincial Con- gress, privy to the patriots' innermost councils, and ultimately General Washington's Director General of Hospitals, whose long successful operations show up the early lack of American counterintelligence. But finally an indiscreet ciphered letter from him fell into patriotic hands; his courier-mistress, "an infamous hussy" but "subtle, shrewd jade," was interrogated by Washington himself and forced to reveal her principal's name; and the cipher was broken by Washington's specialists. Historians of the period have noted before that Dr. Church must have begun to feel shaky, for he had found out that an American spy deep in Cabinet levels in London, whose name New York: Harper Brothers, 1851. Vol. I, p. 60. 105 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution has never come to light, was learning the identities of British agents in America. In November 1774, Paul Revere had been advised that there was a leak somewhere high in the patriot group. Still suspicion was not fixed on Church, even when it was observed in 1775 that he was spending beyond his ap- parent means and keeping a mistress. When he showed Re- vere his blood-stained stocking the day after the battle of Lexington, Revere was fully convinced of his loyalty; he didn't stop to think that the Doctor had had twenty-four hours to change to clean stockings. American security had not come of age, and the full extent of Church's treason was not known until General Gage's papers became available in the Clements Library at the University of Michigan in 1930. Much of Colo- nel Bakeless' account had already been told in Allen French's General Gage's Informers.f General Gage had numerous agents working out of Boston, and his intelligence for Lexington and Concord was good. "There is one evil that I dread," wrote General Washington of the British, "and that is, their spies." And again of the Brit- ish commander in New York: "General Howe has every Species of Intelligence he can wish for . . . " One of Howe's best agents was James Moody, who doubled as a guerrilla raider in New Jersey and published a book about himself afterwards.? Women were not overlooked as agents by either side in the Revolution. One of the must successful was Ann Bates, who worked for the British under peddler cover. (This was also the cover occasionally used by the American spy Enoch Crosby," the prototype of James Fenimore Cooper's Harvey Birch in The Spy). Colonel Bakeless' superlatives for Ann- "the most successful female spy in history"-are attributable to the fact that she remained anonymous until his own re- searches identified her as "the Woman" in British General Sir Henry Clinton's intelligence files. Ann Arbor: University of Michigan Press, 1932. 7Lieut. James Moody's Narrative of his Exertions and Sufferings in the Cause of Government, Since the Year 1776. London: 1782. 'Barnum, The Spy Unmasked; or, Memoirs of Enoch Crosby, alias Harvey Birch. .. . New York: J. & J. Harper, 1828. 106 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution Much of the intelligence work for General Clinton was di- rected by Major John Andre, whose ability in this field seems to have been high until he took to the road himself and was hanged for his pains. Clinton's spies were quite effective, but two of them turned out to be captains in the American Army, working for the British on Washington's orders. Even at this late date they were hard to detect; Colonel Bakeless wrote to a friend who had seen an early draft of his book: I have had to do a great deal of re-writing since I saw you-part of it because one of Sir Henry Clinton's prize agents turned out to have been working for Washington with the rank of Captain, all the while. If my face is red (and it is!) think of Sir Henry's. Colonel Bakeless is well qualified in the subject of his book. He had military experience in both World Wars, much of it in intelligence work; he is a good scholar and writer; he spent four years of intensive research on this work, and his exami- nation of primary sources appears to have been fairly exhaus- tive. It is too bad that he did not have access to the exten- sive files which the late General William J. Donovan had amassed in the hope of writing on intelligence in the American Revolution. Yet the most evident weaknesses of Turncoats, Traitors and Heroes stem not from scarcity of sources but from the wealth of insufficiently integrated material. "It was . . . a surprise to find," Colonel Bakeless writes in his preface, "how embarrassingly abundant the supposedly lost documents really were . . . it became necessary to reduce the scope of the work five times." The author sensibly eliminated the story of British and American espionage overseas, another volume in itself. (The British intelligence penetration of Benjamin Franklin's mission in Paris was very thorough; 9 and no one has satisfactorily done the story, for example, of James Aitken -John the Painter-the only American to commit an act of sabotage in Great Britain during the Revolution, who was tried and hanged in 1777 for setting fire to naval stores and ? See Bemis, "British Secret Service and the French-American Alli- ance," in The American Historical Review, Vol. XXIX, No. 3, April 1924, pp. 474-495. 107 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: American Revolution the Rope House in Portsmouth Navy Yard).10 He also has limited his coverage of well-known figures like Nathan Hale and of the Andre-Arnold affair, on which a good book already exists. 11 Even so, the book is often choppy and uneven; at times it becomes almost a mere catalog, as the author crams in names and incidents in indigestible profusion. It wavers uncertainly between the chronology of the War and the sequence of action in different espionage operations; perhaps it might have been more easily organized around General Washington's headquar- ters, as a focal point from which most of the remaining ma- terial would drop into place. Nevertheless it is an important book, the first to deal comprehensively with the material now available on its subject; and future treatments of this ma- terial should be the better for it. 10 [AITKEN]. The Trial (At Large) of James Hill.... London: G. Kearsley and Martha Gurney, [1777]. 1Flexner, The Traitor and the Spy. New York: Harcourt, Brace and Company, 1953. 108 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 THE SECRET WORLD. By Peter Deriabin and Frank Gibney. (Garden City, N.Y.: Doubleday. 1959. Pp. 334. $4.50.) Here is another book about Soviet intelligence, about the men who make it tick, and about those who-for one reason or another-get tired of the ticking and defect to the West. Its world is really not so secret any more, thanks to books like this which publicize its objectives and techniques, remind- ing any readers who need it that the KGB is still very much with us, whatever we may think of Mr. K's real intentions. Lay readers having no special knowledge of Soviet opera- tions, if they have not been habitual devotees of cloak-and- dagger stories, may derive a good bit of new information from this book. Certainly they will be impressed, even if they real- ize that no intelligence service falls in the Sunday school cate- gory, with the repulsiveness of the Soviet system of internal intelligence; and the achievement of this effect was appar- ently the main aim of the authors. The book describes Deriabin's early life in the Altai region of southwest Siberia, traces his teen-age career in various So- viet youth oganizations, crowned by appointment to a politi- cal post with the Army, shows him in action in the Battle of Stalingrad and, after the war, working for State Security in Siberia. In a chapter entitled "The Shape of Terror" there is factual material which the professional reader will recog- nize as authentic on the internal structure of the KGB and the scope of its activities. Deriabin's transfer to Moscow occasions some good passages describing life in the Soviet capital from the vantage point of a security officer. A list of numerous security installations in Moscow is also conveniently supplied, and something is told about Soviet interrogation techniques. Soviet foreign intelli- gence is portrayed as the "cleanest" part of the security or- ganization, being staffed by "some of the most intelligent, technically accomplished and sophisticated members of Soviet society." 109 H Approved For Release 2005/01/05 : CIA-RDP78-03921AO0030031ftnfLJ PAGES 109- 12 ,~ I Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Soviet Services A chapter on the "Hidden War in Germany" tells of the Linse kidnapping and the Otto John case, and one entitled "Cold Storage Agents and Satellites" devotes quite a bit of space to Allen Dulles. Deriabin is said to have noted, in a pamphlet on American intelligence he edited, that "in 1944, Dulles already foresaw the breakdown of the anti-Hitler coali- tion and . . . began to make plans for intelligence activity against the Soviet State." Another old Soviet pamphlet is said to treat the CIA, the CIC, Naval and Air Force Intelligence, and even the FBI as components of a single organization. There are a number of chapters on the misdeeds of the So- viet upper crust-"Moscow Executive Suite," "The New Class," "Soviet Immorality," and the struggle of the Stalin succes- sion. Khrushchev is pictured as no great improvement over Stalin, it being suggested that Malenkov might have made a more reliable co-existence partner. A chapter on "Vienna" has much authentic quadripartite flavor, and one entitled "Agents and Escape" tells about Austrian operations involving emigres and would-be returnees. Deriabin himself escaped in 1954. The book has four appendices, one illustrating the develop- ment of a Soviet surveillance case, one on provocation tech- niques, one a lengthy and tedious discussion of "some pitfalls of Socialist 'legality,'" and a fourth giving the organizational diagrams of the several elements of the State Security or- ganization. For the professional reader the shortcomings of The Secret World are obvious-the sensationalism of its "terrifying re- port," its deceptive cloak of authorship, its exaggerations and misstatements of fact. It isn't a book by Deriabin and Gibney or even one by Deriabin "as told to" Gibney. For all Mr. Gib- ney's protestations to the contrary, it is a book by Frank Gibney about Deriabin and several other things, including what Mr. Gibney thinks of the Soviet Union-which evidently isn't much. Here are some examples of his purposeful extravagances. On Soviet morality: [On] the high level of the "New Class" Soviet society . . . debauch- ery is organized and beyond criticism.... A clinical study of Soviet social life might easily dwarf The Lost Weekend and make the Kinsey Report look like a Parents Magazine anthology. Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Rele se 2005/0 /05,: CIA-RDP78-03921A000300310001-0 Recent Boots: Soviet Services Describing Stalin's exits from the Kremlin: The only warning ... would be the amber lights blinking ... and the sudden screaming cavalcade with Colonel Kirilin of the Guard shrieking obscenities and frequently spitting in the faces of passers-by. On the right of the Soviet voter to cross out names of candi- dates he doesn't like : Compared to the Soviet voter, even a Negro voter in Mississippi could be said to enjoy a thoroughly democratic franchise. Of the Ukraine: ... this huge and sensitive Russian subsidiary. On housewifely Mrs. K.: It is doubtful if Mrs. Khrushchev has seen the working end of a kitchen for a good many years. The author's sense of mission also leads him into oversimpli- fications and some substantial errors in fact: At the beginning of the Revolution and for some years thereafter the reins of leadership were held by intellectuals of bourgeois or even noble background, like Lenin and Trotsky. Trotsky a Russian nobleman! Admiral Canaris' Abwehr ... was strongly anti-Hitler until it was absorbed by the Gestapo after Canaris' arrest and execution. One of [Deriabin's] teachers ... had managed to keep a large library from the old days.... So it was that The Last of the Mohicans, Tom Sawyer, and Huckleberry Finn became a part of one young Russian's education, although he scarcely included them on his Komsomol reading lists. The exceptional Russian student would be the one not acquainted with these books. The decision to "de-sanctify" Stalin was probably taken late in 1955 by Khrushchev, who was aware of the void left by the great dictator. Just as people in the early Stalin period had grumbled that "things wouldn't be like this if Lenin were alive," a tendency had grown to look wistfully back to the Stalin era whenever the regime showed shortcomings. A nostalgic concept, the good old days of Stalin. 111 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Soviet Services Mr. Gibney's views on foreign policy and estimate of the Soviet Union can be illustrated by two final quotations from his work: [During] the Time of Troubles, from 1953 to 1956 . . . had the USSR been faced with an aggressive American diplomatic policy on the international scene, the Party leaders might have been in real trouble. American tourists can come back from Moscow with stories of a society straining at its old controls. Cultural exchanges can multi- ply. The Soviet people can inch a few more steps forward toward a better and freer life. But in the last analysis, all efforts to pro- duce a real thaw in the USSR will fail as long as State Security maintains its position as the ultimate executive arm of the regime. History will have to tell us whether even Soviet-style intelli- gence can so decisively govern a nation's course. THE MIND OF AN ASSASSIN (The Man Who Killed Trotsky). By Isaac Don Levine. (New York: Farrar, Straus and Cudahy. 1959. Pp. 232. $4.50.) THE GREAT PRINCE DIED. By Bernard Wolfe. (New York: Scribner. 1959. Pp. 398. $4.50.) Whether assassination is the same thing as murder de- pends, as the saying goes, on where you are sitting and what cards you hold. For those who hold Communist Party cards, the assassinations which have been carried out all over the civilized world by the "organs of State Security" have merely executed the sentences of competent judicial organs without benefit of the legal nicety of extradition. But even the Com- munist who sees them in this light must admit that there have been some spectacular remote-controlled executions in the history of Soviet jurisprudence. The execution of the death sentence passed by the Soviet organs on Ignace Reiss, the Soviet senior spy in Western Eu- rope who broke in revulsion over the Moscow show trials of the late thirties, brought an exaggerated bit of Chicago to a quiet Swiss country road. Reiss' body was literally cut to pieces by heavy machine-gun fire. The case of General Walter Krivitsky, Soviet espionage boss in Western Europe who fled to safety in the United States after breaking at about the same time as Reiss, is a classic illustration of the homely proverb 112 Approved pp~~ For Release 2005/01/05 : CIA-RDP78-03921A0003003' ORNARP PAGES 112-116 Approved For F Iease20Q51011/05.: CIA-RDP78-03921A000300310001-0 Recent oo s: ovie ervices of the State Security apparatchiks that anyone can commit a murder, but it takes a real artist to arrange a good suicide. Krivitsky was found dead in a Washington hotel room, a sui- cide note by his side, shortly after he had told a friend never to believe any evidence of suicide on his part, because he would never kill himself. Lev Davidovich Trotskiy is probably the only man in history to die by ice axe in execution of a death sentence passed by a court. The tradition of this form of retribution against traitors to the movement is so strong that the widow of Richard Krebs (better known, since the publication of his book Out of the Night, as Jan Valtin) told a friend in 1958 that she was not at all certain Krebs had died the natural death officially pro- nounced by Maryland doctors at New Year's 1951. Clara Krebs was born and raised on the Eastern Shore and never had anything to do with Communism, but almost lost her mind in the year her late husband's friends, including some ex-Communists and some professional anti-Communists, spent looking for clues and speculating about an assassination in his case. Those who would like to believe that assassinations of this sort belong to the age of Stalinism should note that the de- nunciation of Stalin crimes (or "errors") has been confined to those committed against good comrades, not against trai- tors. And they might usefully contemplate the mysterious death of Stefan Bandera, the legendary anti-Soviet Ukrainian partisan leader. Bandera was poisoned in Munich, Germany, in October 1959, in this age of peaceful coexistence. The murder of Lev Davidovich Trotskiy, popularly known as Leon Trotsky, was not a case of "whodunit," but of "whobeit." The mystery was not who committed the murder, but who the murderer really is. The best published study of the Trot- sky assassination has been that by Leandro A. Sanchez Sala- zar, the Mexican police official who conducted the investiga- tion.' Latterly the impending release of the killer, whose twenty-year sentence will have been served on 20 August 1960, is apparently at least partly responsible for the appearance of these recent books by Isaac Don Levine and Bernard Wolfe. 1 Murder in Mexico (London: Seeker and Warburg. 1950). 113 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Soviet Services Don Levine is a vigorous anti-Communist and a man who makes his living by producing and ghosting books that will sell well, not necessarily ones characterized by objective and metic- ulous scholarship. Richard Krebs, after trying in vain to sell Out of the Night to a number of publishers in the United States, finally gave the manuscript and all American rights to Levine for a pittance. Later Krebs complained of a num- ber of inaccuracies and errors in fact which stemmed from Levine, and it was not until shortly before Krebs' death that a personal reconciliation of the two men was effected. On the other hand, Levine has been responsible for the pub- lication of a number of highly interesting memoires by Com- munist defectors (among them Walter Krivitsky's In Stalin's Secret Service 2) and for bringing some of these defectors together for the intellectual and moral stimulation of ex- changing ideas. Krebs has spoken with enthusiasm of a fascinating night he spent at Levine's home talking without let-up through the night and into the morning with Walter Krivitsky after Levine had helped them overcome their mutual mistrust. The Mind of an Assassin does not live up to whatever mis- givings one may have about the author. It is a good story, well researched and interestingly told. The factual errors (insistence, for example, that Vittorio Vidali's real name is Carlos Contreras) are neither so frequent nor so glaring as to disturb the knowledgeable reader greatly. Levine makes too much at this late date of the mystery of the killer's iden- tity, which has not really been a mystery for the past five years or so, but he does perform a useful job in pulling to- gether some of the scattered material on the subject which has appeared over the years, and he makes an interesting new contribution in the final chapter, "The Mother Speaks." This last chapter is a communication which Levine says he received unsolicited from Enrique Castro Delgado after the manuscript for the book had gone to the printer. Castro was a hero of the Spanish Communist movement, lived in Moscow after the Spanish Civil War, broke with Communism in 1944, and after a number of very precarious months managed to escape from the USSR. While in Moscow, Castro heard from 114 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Soviet Services the lips of the assassin's mother, an old-time Spanish Commu- nist and Soviet agent, part of the story of the assassination. He says in his letter to Levine that he had never told it to anyone before. It is evident from the title of the book that it deals more with the assassin than with Trotsky. Two of the chapters, "Prisoner against Psychologist" and "Portrait of an Assassin," deal with the years-long analysis of the murderer by Mexican doctors and psychologists. Here one is tempted to borrow a pun from a famous music commentator and critic: Levine played Freud, Freud lost. These chapters are boring and ap- pear to a non-professional somewhat far-fetched (e.g., the killer idolized his mother, hated his father, was able to kill Trotsky as a father-symbol). Not so, however, the story of the murderer, the role played by his mother and many others (such as Louis Budenz and Sylvia Ageloff), the State Security masterminding of the execution by Soviet General Leonid Eitingon, and related stories like that of the death of Trotsky's son Leon Sedov in Paris and of the Soviet penetration agents in the Trotsky movement, Jack Soble and Mark Zborovsky. From former close associates of Trotsky we know that dur- ing the whole period of his exile in Turkey, France, Norway, and Mexico the father of the Red Army was a hunted man. After his son died mysteriously in Paris in February 1938, Trotsky seemed to wait more resignedly for his own end. His widow Natalia is quoted by Levine as having written, "Both ... knew that the verdict of the Moscow court was not platonic and that it would be carried out in one way or another." The way it was carried out is well told in Levine's book, although the titular mind of the assassin has eluded him. Bernard Wolfe, for reasons best known to himself, has chosen to tell parts of the story of Trotsky's Mexican exile in fictional form. This permits him, it is true, to deviate from the facts when he does not know them (as in places he obvi- ously doesn't) or when the truth is neither stranger than fiction nor as interesting. Because its hero Victor Rostov is a so thinly disguised Trotsky, The Great Prince Died is both tantalizing and frustrating for a reader familiar with the story of the Mexican exile. 115 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Soviet Services Wolfe, who as a young man did spend some time at Trot- sky's exile headquarters in Mexico, has developed the hypoth- esis that Trotsky's later years were plagued by a gnawing sense of guilt regarding his role in suppressing the Kronstadt uprising. Wolfe suggests that Trotsky was struggling with an increasingly strong awareness of his own betrayal of a revo- lution. It is interesting as a hypothesis, but others who were closer to Trotsky in this period have seen no traces of this struggle of conscience. If The Great Prince Died could be read as straight fiction, it would not be a bad book. The story is well told, the writing tight and professional. There is plenty of suspense to hold the reader's attention. For this reviewer, however, it has not been possible to achieve the necessary detachment from his knowledge of true events to read it as straight fiction, and such a conflict within the reader spoils the whole book. The only part which could be read under these circumstances with- out; any trace of annoyance is the section entitled "Author's Notes," pp. 383-398. This is not enough to compensate for the frustrations of the rest of the work. 116 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 ESPIONAGE AND PARAMILITARY TALES LES DESSOUS DE L'ESPIONNAGE: 1939-1959. By Robert Boucard. (Paris: Editions Descamps. 1958. Pp. 249. 750 frs.) M. Boucard, who has published several books on intelligence subjects and services, dedicates this one to the memory of Rene Dubois, formerly Attorney General of Switzerland, who took his own life in 1957 after the clandestine contacts of high Swiss officials with an attache in the French Embassy were publicly exposed. The promise in its title of the inside story of espionage for the past twenty years, however, is poorly to indifferently fulfilled. Although it presents vi- gnettes from many interesting cases, both details and material substantiating its purported revelations are sadly lacking. In summarizing the story of the famous German agent Cicero, for example, the author says that the Turkish secret service arranged his employment by the British Embassy in Ankara and helped him in his project with the ambassador's secret papers. It would be good to know whether there is some evidence other than presumptive indications in his op- erations that Cicero worked for the Turkish service. Else- where, as when he offers "the truth about the Gleiwitz affair," wherein the Nazis had prisoners in Polish uniforms attack a German transmitting station to give pretext for the invasion of Poland, Boucard's exposes are sometimes quite old hat. One of the most tantalizing stories in Les Dessous is that of a Japanese general, military attache in Ankara, Sofia, Madrid, and Stockholm, whom Boucard calls Yamato Ominata. The American authorities, it is said, discovered in the Sicherheits- dienst archives a message, No. 392-B-M from Stockholm to Berlin, in which Ominata, under the cryptonym "Eierkopf," proposed to "Senior" (Himmler's nom de guerre) the sale of Brazilian, Portuguese, Turkish, Vatican, and Yugoslav codes for 28,000 Swedish crowns or 20,000 U.S. dollars. Boucard says that Ominata was also in Tcontact hese bits tof information strongly British service, and O 117 Approved For Release 2005/01/05: CIA-RDP78-03921A000300Q{@Zp PAGES 117-118 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Espionage suggest that Yamato Ominata is none other than Major Gen- eral Makoto Onodera, Japanese military attache in Stockholm with responsibility for espionage in the Scandinavian coun- tries from February 1941 to the end of the war. A Swedish newspaper article which appeared on 11 January 1953 when Onodera was on a business trip to Sweden mentioned that he had been known to the Germans as "Eierkopf" and had made a large amount of money selling foreign codes to the Germans. A PERSON FROM ENGLAND (and Other Travellers to Turke- stan). By Fitzroy MacLean. (New York: Harper. 1959. Pp. 314. $5.00.) Bokhara, Samarkand, Khiva and Merv are here brought back in a series of true episodes which make good bed-time reading for romantics, lay historians, and connoisseurs of bold and curious men. A rabbi's son who astounded the Emir of Bokhara by arriving from England to demand single-handed the release of two of his countrymen, a gifted Hungarian linguist disguised as a dervish from Turkey, a New York re- porter who caught up with the Russian forces in time to enter Khiva with General Kauffmann, and a British correspondent elected Khan of Merv as human symbol of the British Crown to stay the Russians-these were four who lived to describe their adventures in forbidden territory during the Great Game be- tween England and Russia in Central Asia. The story of the fifth, a British colonel for whom Bolshevist Tashkent became too dangerous in the fall of 1918, is of par- ticular interest to collectors of intelligence tales. After wear- ing thin an astonishing variety of disguises he enrolled as an Albanian lepidopterist in the Bolshevik intelligence service and was sent to spy on briefly independent Bokhara, where fifteen previous agents had vanished without a trace. He managed to obtain asylum there until he could escape with other refugees in a hazardous desert trek to the Persian border, where the Bolsheviks claimed to have killed him in a skirmish at. the river crossing. He reported to the British command at Meshed in January 1920. 118 Approved For Release 2005/01/05: CIA-RDP78-03921A000300310KO1 l/HRP PAGE 118 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Espionage THEY CAME IN THE NIGHT. By Brede Klefos. (Greenlawn, New York: Harian Publications. 1959. Pp. 207. $3.75.) This is the personal account of a young Norwegian cadet's contribution to his country's liberation from the Nazis. It includes what he could observe in Norway of the growth of resistance from spontaneous impudences to an organized and security-minded movement, his confession to a naive venture in military espionage in Stockholm, and details on his com- mando training in Scotland. Intelligence officers may find these items useful; more likely they will want to use them as an excuse to read an honest and unglamorized story of exalted human enterprise in the service of a cause, followed by inevi- table disillusionment when the cause is won. 119 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 MORI/HRP PAGE 119 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 EVASIONS AND ESCAPES BE NOT FEARFUL. By John Furman. (London: Anthony Blond, Ltd. 1959. Pp. 224. 18/-.) This account of a British army officer's escapes and pro- longed evasion in Italy during World War II, in some respects a story much the same as many previously published, is unique in its pertinence to organizational aspects of large-scale eva- sion activities and for the light it throws on wartime intrigues in and around the Vatican. Mr. Furman was one of the many Allied prisoners of war who escaped from camps in Italy during the brief period of confusion in 1943 between the Italian surrender and the con- solidation of German authority in northern Italy. Aided by sympathetic Italians, thousands of these men remained at large behind German lines, moving southward in the hope of reaching Allied-controlled territory. Opportunities for cross- ing the front were limited, however, and caution, inertia, and official directives encouraged the escapees to remain where they were until the front overran them: '"It will only be a matter of days or at most a few weeks," they said. But as the weeks rolled into months and food became scarce, evaders found it increasingly difficult to keep alive and in hiding. To meet the exigencies of this situation, a Roman Catholic priest, Mgr. O'Flaherty, organized from the Vatican a supply and billeting service in which the Italian-speaking Furman became a key Rome coordinator. At the peak of its activity this group provided aid to some 3,000 evading ex-POW's within a forty-mile radius of Rome, among other things dispensing subsistence money at a rate that reached some 4,000 lire per man per month. The records of the organization remained within the safety of the Vatican along with its director, an arrangement that raised and still raises some thorny ques- tions of law, ethics, and policy. Eventually captured by the Gestapo, Furman escaped from a train conveying him to Ger- many and made his way back to Rome, where he resumed work for the O'Flaherty organization. He continued with this op- eration until Allied forces entered the city. 120 MORI/HRP PAGES 120-121 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 Recent Books: Escape Successful clandestine activities require luck; and Furman and his cohorts had a full, almost too full, share. Neverthe- less, the author's two breaks from POW captivity, both of them conceived, planned, and carried to completion in a mat- ter of hours, are classics of quick thinking and good timing. And it was not a matter of luck that he achieved fluency in Italian in a relatively short time by taking advantage of his residence in Italian households. Be Not Fearful fills gaps in the open-source history of eva- sion during World War II. Its not having been published until fifteen or sixteen years after the events it describes is probably due in part to the delicacy of its revelations about the war- time use of the Vatican. PIMPERNEL IN PRAGUE. By Donald Campbell-Shaw. (Lon- don: Odhams Press. 1959. Pp. 192. 18/-.) Leisurely account, generous with relevant and irrelevant detail, of how the author arranged privately for the 1950 es- cape of his wife's relatives from Czechoslovakia, hoodwinking not only the Communists but also a number of would-be help- ers, including officers of the American CIC. Of mild interest in illustrating the border-crossing activity of that time. Some of its solemn dissertations on peripheral matters-the evolution and functions of the several Soviet and U.S. intelli- gence services, for example-are amusing in their ingenuous- ness. 121 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 MORI/HRP PAGE 121 Approved For Release 2005/01/05 : CIA-RDP78-03921A000300310001-0 DIPLOMAT. By Charles W. Thayer. (New York: Harper and Brothers. 1959. Pp. 229. $4.50.) This casual compendium on the workings of diplomacy in- cludes a quick look at intelligence as certain others see it. Chapters XII, XIV, and XV combine elements of a short his- tory of intelligence-the Black Chamber, OSS, CIA, taken from standard sources-with the anecdotes and comments of a dip- lomat extraordinary. The author has reservations about in- telligence in the hands of socio-anthropologists, with their new scientific methods. He sees the research and analysis experts in their isolated tower in State Department "chiefly engaged in gathering materials for high-level public speeches and re- analyzing foreign newspapers long since scrutinized in foreign capitals by our embassy staffs." He asks how the new "scien- tific" expert can "take into consideration and evaluate a subtle smile he never saw or a handshake he never felt." On the new concept of national estimates he quotes Churchill's con- tempt of "collective wisdom" and concludes that "any attempt to synthesize the products of several minds must end by re- flecting the product of none." But he concedes that specialists in intelligence are useful in support of the Diplomat, the only true intelligence officer. As the general practitioner in intelligence, the Diplomat has a requirement for specialists to bring the mass of information under encyclopaedic control by substituting numbers for men- tal capacity. Above all, he needs specialists in intelligence to safeguard his communications. lApproved For Release 2005/01/05: CIA-RDP78-03921A000300310000A@)Rl/HRP PAGE 122 Approved For Release 2005/01/05 0i \-I F AWOTloIf001-0 son" I Articles and book reviews on the following pages are un- classified and may for convenience be detached from the clas- sified body of the Studies if their origin therein is protected. The authors of articles are identified in the table of contents preceding page 1. The editors gratefully acknowledge the assistance of Mr. Walter Pforzheimer, Curator of the CIA Historical Intelli- gence Collection, in scanning current public literature for in- telligence materials, and of the many intelligence officers who prepared book reviews for this issue of the Studies. Most noteworthy in this respect are the following: Military Intelligence in World War II . . Lyman Kirkpatrick In the American Revolution............ Walter Pforzheimer Deriabin's The Secret World ............... Books by Levine and Wolfe on Trotsky ...... Boucard's Les Dessous de l'Espionnage ....... Furman's Be Not Fearful .................. Approved For Release 2005/ I06 Niffn310001-0 25X1 25X1 25X1 Approved For ReCON lease 05/01/ Approved For Release 21 5 : CIA-RDP7 -03921 A000300310001-0 25X1 25X1 CONFIDENTIAL