THE INTELLIGENCE PROCESS A DIGEST FROM STRATEGIC INTELLIGENCE BY SHERMAN KENT

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78-04718A000600100003-3
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
27
Document Creation Date: 
December 9, 2016
Document Release Date: 
May 18, 2000
Sequence Number: 
3
Case Number: 
Publication Date: 
January 1, 1949
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP78-04718A000600100003-3.pdf1.97 MB
Body: 
Approved For Release 2000/08/28: CIA-RDP78-04718A00060010 INTELLIGENCE PROCESS A Digest from Strategic Intelligence by Sherman Kent To: TS S C Copyright 1949 PRINCETON UNIVERSITY PRESS Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Chapter 1 In the language of the trade, the word intelligence is used not merely to designate types of knowledge. It is also used as a synonym for the ac t t v i t y of an intelligence organization. I will discuss in this paper, intelligence as activity, or better, as process. My primary concern will be the large num- ber of methodological and other problems to which this process gives rise. But before discussing these problems, I shall briefly discuss the intelligence process itself. The knowledge, which I call strategic intelligence, serves two uses: it serves a protective or defensive use in that it forewarns us of what other powers may be hatching to damage our national interests; and it serves a positive or outgoing purpose in that it prepares the way for our own foreign policy or grand strategy. Here the important thing to grasp is that, no mat- ter what its diversity, this knowledge is produced by the process of research. Sometimes research is formal, highly technical, and weighty; some- times it is informal, untechnical, and speedily arrived at. Sometimes a re- search project requires thousands of man-days of work, sometimes it is done in one man-minute or less. This research process, in strategic intelligence, is initiated in two chief ways. When the policy people or planners of our government begin formulating something new in foreign policy they often come to intelligence and ask for background. (They should do this more than they do.) In their request for this or that block of knowledge, they stimulate the intelligence force to embark upon a piece of research and a course of specially directed observation or surveillance. There is, however, a second way in which this process is initiated. This is through the systematic and continuing surveil- lance activity of the intelligence staff itself. So important is this surveillance that it is often conceived of as separable from research. I do not think it should be. Surveillance, as I am using the word here, is the observation of what goes on abroad and the deliberate attempt to make sense of it. Thus, in foreign countries we carry on through a multitude of open- and-above-board personnel -- some civilian, some military -- whose duty is to keep eyes and ears alert and report what they learn. They are the for- eign service officers and attaches. Each of them has his field of special in- terest and competence, whether itbe political, military, commercial, or cul- tural, etc., and each is supposed to keep himself and his principals at home posted within this specialty. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Some foreign governments supplement the work of their overt officers with espionage activities; that is, they send out secret agents,- or undercover recruiters of secret agents, to discover and report on matters which would be difficult to discover overtly. If you would like a sample of how such ac- tivities are established and operate, read Richard Hirsch's "The Soviet Spies", or the "Report of the Royal (Canadian) Commission"...upon which it is large- ly based. Not all surve'.illance activities take place abroad; some very impor- tant ones take place at home. Queer as it may seem to observe a foreign country from a home observation post, there are several reasons for this paradox. First, there must be surveillance at home purely and simply for con- venience. For example, what the official French radio beams on the rest of the world is of considerable interest to us; we should like to know the content of its political news and commentary. But this can be done easier domesti- cally. Hence, tht extremely important surveillance organization known as the Foreign Broadcast Information Branch is established at home. Its moni- toring; stations pick tip the most significant programs; the home office tran- scribes them, translates (and sometimes abstracts them), reproduces them, and sends them around to officers of the governments. Departmental, i.e., Army, Navy and State intelligence organizations are, of course, the chief beneficiaries. Sharp newspaper foreign correspondents though they have no con- nection with intelligence work, are important observers of foreign affairs and important, though inadvertent, contributors to the surveillance activity. Wise is the government that does not intercept their dispatches at point of origin, but lets them land in the home cable rooms of our domestic papers, there to put the content to official use. Doing business this way means that: intelligence engaged in overt surveillance must have some small force at home which follows the best foreign news. There is a second reason for home surveillance. It is based upon the proposition that anything being hatched abroad to our detriment is conspira- torial;, i.e., it is hatched in secret; but there are several people or groups party to it. In the world of international relations these parties to the con- spiracy may be residents of half a dozen countries, and the story of what they are up to, must be pieced together from fragments supplied from the half- dozen different sources. For example, what Franco was considering at a given moment might be less available from Madrid than from Mexico City, Buenos Aires, Lisbon, Bayonne, and Rome. This is not to argue that Wash- ington is the only place where surveillance should take place, but it is to argue that given the complicated nature of the modern world, there must be a listening and observation post and clearing house in a central spot. However conducted --overtly or clandestinely, abroad or at home -- surveillance, as it goes about uncovering a policy or an action hurtful to our Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 national interest, stimulates our desire and need for knowledge. Thus it stim- ulates the production of defensive-protective knowledge and tells us what we must know about affairs abroad if we are to implement our own active outgoing policies. It is surveillance, then, which produces that wide range of phenom- ena without which strategic intelligence would have little content of current importance. In talking of surveillance there is always the danger of portraying something passive. Surveillance sounds like sitting back and awaiting the impression. But surveillance worthy of the name must be vigorous and ag- gressive; aggressive in that the observer covers as much ground as possible, seeking to expose himself to a miximum number of phenomena; and more im- portantly, it must be aggressive in that the observer does a maximum amount of following up his impressions of these phenomena. So long as I use the imprecise term "following up" I am on safe ground with the general reader and intelligence brotherhood. It implies checking the accuracy of sources, comparing divergent accounts, and gaining perspective by broadening the field of inquiry, finding new leads- -out of which emerges a proposition which seems the truest of all possible propositions. Now I would like to call this process of following-up by the more precise term of "re- search" and say that it must accompany the surveillance activity. Such re - search consists of a systematic endeavor to get firm meaning out of impres- sions. Lacking it, surveillance will produce spotty and superficial informa- tion. Research has greater importance than merely supplying the cutting edge to surveillance. It has a role entirely its own. In wartime, research produces the knowledge of enemy strategic capabilities, enemy specific vul- nerabilities; it produces knowledge of the political and economic strengths and weaknesses of the enemy; and knowledge of the physical plant which the enemy is using. On such knowledge our own offensive military plans are based. In peacetime, research produces that knowledge of foreign lands which you would wish if you had to decide whether to sponsor a European economic recovery program; and then defend it before Congress and your fellow coun- trymen. Research is the only process which we of the liberal tradition are willing to admit is capable of giving us the truth, or a close approximation to truth. We insist, and have insisted for generations, that truth is to be ap- proached, if not attained, through research guided by a systematic method. There is such a method in the social sciences, which largely constitute the subject matter of strategic intelligence and in which, for the purposes of this paper, I include the science of military strategy. The method is much like that of the physical sciences. It can be described, for instance, by paraphras- ing the discussion of physical sciences as set forth by President Conant of Harvard. One could say that the method of the social sciences involves the development of new concepts from observations and that these concepts in turn indicate and lead to new observations. But perhaps this is less useful Approved For Release 2000/08/28 CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 than to spell out seven steps or stages in the research process specifically designed to meet the requirements of strategic intelligence. They are: 1. The appearance of a problem requiring attention of-a strategic in- telligence staff. 2. Analysis of this problem to discover which facets' of it are of im- portance to the U. S. and which of several lines of approach are most likely to be useful to its governmental consumers. 3. Collection of data bearing upon the problem as formulated in stage 2. This involves a survey of data already at hand and -available in the librar- ies of documentary materials, and an endeavor to procure new data to fill in gaps. 5. Study of the evaluated data with the intent of finding some sort of inherent meaning. The discovery of such meaning can be called the moment of hypothesis. In reality there is rarely such a thing as one moment of hy- potheses nor can it be said categorically at what moment hypotheses appear. One would wish that they appeared here at respectable -stage 5, but in actual practice they begin appearing when the -first datum is collected, and may appear long after the -project is closed out. 6. More -collecting of data along the lines of the more promising hy- potheses, to confirm or deny them. - 7. Establishment of one or more hypotheses as truer than others and thus as the best present approximations of truth. This is the last stage and is often referred to as the presentation state. At each of these stages two problems arise. One is characteristic of all systematic research in the social sciences, the other derives from the peculiarities of intelligence's research activities. My principal concern in the next chapter will, be with these latter methodological problems. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Chapter 2 Before proceeding with an analysis of the problems in intelligence, I would like to clarify my use of the adjectives methodological and substantive. By "methodological" I mean a problem characteristic of the method of trying to establish a new approximation to truth. By "substantive" I mean a problem in the subject matter of strategic intelligence. As an example of a "sub- stantive problem" consider the strategic stature of the Chinese Communists; as an example of a "methodological problem" consider the means you would employ to get the basic data on the Chinese Communists' military establish- ment. 1. Stage One, the appearance of the substantive problem The substantive problem in strategic intelligence can emerge in three principal ways. a. It may emerge as a result of the reflections of a man employed to do nothing but anticipate problems. In actual fact, the intelligence business employs too few such men. Their job is to ask themselves the hard, the searching, and the significant question and keep passing it on to professional staff. An intelligence operation should be bedeviled by such questions, and a substantial part of its work program should be concerned with getting an- swers. A Pearl Harbor maybe ascribed in no small measure to the absence of that unpleasant and insistent person, who, conscious of the growing animus of Japan, would have kept asking when is the attack coming, where is it coming, and how is it coming? The methodological problem involved here is a slight one, on the sur- face. It consists of devising means by which the question-askers will be sure of formulating good substantive problems. The only answer lies in picking a man who knows the area in which he is supposed to ask questions, who has an inquiring mind, and then see that he has ready access to every scrap of incoming evidence, access to everyone who knows about it, and free- dom from other burdensome duties. b. The substantive problem may emerge when surveillance makes one aware of something unusual. For example, suppose the people watching Great Frusina (my hypothetical country) learn it is expanding its Christian mission program in the Belgian Congo and that it has named Brother Nepomuk as aide to the new director. If surveillance is sharp enough to recognize this shift in a minor Great Frusinan policy it has initiated a substantive prob- lem which may be very important when followed-up; or be of no importance at all. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 The methodological problem here is similar to that just touched upon; how can surveillance be sure of putting the finger on the three unusual and potential things per week out of the thousands it observes and-the millions that happen? The answer is again: procure wise men, wise in the subject, and pray that they w'.ill produce hypotheses of national importance. c. The last way in which the substantive problem may emerge is at the request of the consumer. For example, let us suppose that the policy people, who are the prime intelligence consumers, are facing a revision of the established China policy. They summon some of the control and profes- sional staff of intelligence to a meeting where the problem is put on the table. In this meeting aspects of the. China question will appear which the policy people have not considered before. Let us assume that they have to do with population. A prospective change in policy has caused a substantive problem to emerge. Here there is no methodological problem. Intelligence feels things have gone just as they should. True, the assignment is so large and general that serious difficulties are presented but since intelligence was at the meet- ing, it may assume further guidance from the consumers in shaping the sub- stantive problem to their needs. But what usually happens is that decision to revise policy is taken without intelligence. Weeks later, when the policy people are up against a deadline, they discover they need a new population estimate and that at once. They pose a. problem all right, but they pose it to the consternation of intelligence, which is asked to do a month's work over night? 2. Stage Two, the analysis of the substantive problem; The substantive problem has at last emerged in rough form. It must now receive some close and searching analysis. The aim is not merely to discard what is irrelevant or unimportant, but to shape the problem toward solution. For example, to return to Brother Nepomuk, the surveillance people have many courses of observation opened to them by their discovery of Great Frus:ina's new missionary zeal. They can begin watching the church-state relationship looking for new angles; they can start an observation of the Great Frusina-Belgium relationship; they can skip over Great Frusina, Belgium, and the Congo, and -start chasing after developments in the general field of missions to find new church policies therein. They are almost cer- tain to turn up interesting leads no matter what lines they pursue. But the question is, what particular line of observation is likely to prove most im- portant to the security of the United States? The research people back from the policy -on- China meeting are posed a somewhat similar problem. They were asked to come up with some popu- lation data; no more explicit than that. Obviously there are dozens of kinds of population data. But only one or two will have bearing on the task of the Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 policy people. What are these data, and in what detail should they be worked up? As the surveillance and the research people search for the most fruitful line of attack they will seek guidance. This guidance should come both from their own inner selves and from the policy, planning, or operating people whom they are endeavoring to serve. Let me take the problem of guidance as it appears to the surveillance man. He discovered that Great Frusina was enlarging its Christian mis- sions program in the Congo; he knows that the Congo has large uranium de - posits; he asks himself, is there a connection ? Then his foray into research reveals that Brother Nepomuk won a Nobel prize for work in geology. He now sees a connection and has uncovered the most frut t fu l l the of attack. He now has a hypothesis that Great Frusina is trying to get uranium from the Congo and that Brother Nepomuk is a Great Frusinan agent. At this point he must get outside guidance. What other lines of attack will the people whom he serves designate as fruitful; what do they propose to do if such and such a line confirms an ill-intentioned activity on Great Frusina's part? The sequence maybe exactly reversed with the research people work- ing on the population of China. They will promptly go back to policy and ask advice about lines of attack. They will also ask how the policy people see the task shaping up, and what their aim is in revising the old policy. If they get answers they can state the substantive problem and answer it in a way which will have practical utility to policy. Moreover, as research advances their study will get useful hypotheses which spring from familiarity with the subject matter, and which the policy people might never have got on their own. The methodological problem here is not that of inner guidance but guidance from the users of the knowledge. Here is one of the critical prob- lems of intelligence, i.e., the relationship between its producers and con- sumers. Intelligence often finds it impossible to get that guidance which it must have if its product is to be useful. One of the places where this lack of guidance produces its most disastrous results is right here at stage 2 of the intelligence process. Unless the intelligence organization knows what use its product is designed to serve, and what sorts of action are contemplated with what sorts or implements, the analysis and proper formulation of the substantive problem suffer. 3. Stage Three, the collection of data The collection of data is the most characteristic activity of intel- ligence. There can be no surveillance nor research without the collection of data. Accordingly, an intelligence organization cannot exist until it does a broad and systematic job of collecting. But in this very task lie metho- dological problems so tough that they are a perpetual source of inefficiency. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 a. One such problem is that which a member of the professional staff encounters when he embarks upon a piece of research. He has blocked out his substantive problem. His nextstep is to see what data bearing upon the subject exist in his own and other intelligence organizations. Let us assume that his own files a2re in good shape and that his outfit has a centralized library of properly indexed documents. The materials from his own sources, so to speak, indicate, as will also his horse sense, that there are other kindred materials in neighboring intelligence organizations. He must reach these, but there are real difficulties if (1) he must work through a third person in his own organization who has an exclusive mandate to -collect data, and (2) if the other organizations possess no central library of indexed documents. Unfor- tunately, many intelligence organizations raise these considerable barriers. b. Now, let us assume that the staff member discovers that even after canvassing every resource in his headquarters city there are -still a number of unanswered substantive questions which he must explore. He must com- municate with the field; he must try to explain to someone in a foreign capital what he wants. Now if the man on the other end of the wire was formerly a worker in the home office, has a feel for home-office functioning, and per- sonally knows the staff, he then will more readily understand what he is be- ing asked to do and will do it with efficient good grace. He will quickly grasp the instructions (which can be given in office shorthand) and will act pretty much as an overseas projection of the home staff. But if he has not served in the home office, and instead has gone to his foreign post improperly briefed on home problems then there may be difficulties. It is not easy to explain in a letter or cable precisely what is desired to someone who starts from scratch. Requisitions of this 'sort must be spelled out in detail and to achieve results they must communicate in their substance a sense of urgency and importance. Such a requisition is time- consuming. If it is no more than a blunt command it is likely to be handled in a perfunctory fashion. The problem increases when the recipient is a stranger to the sub- ject. The home office may wish to have a foreign official interviewed on a technical demographic matter or wish to have someone audit and report on a scientific congress. But the men in the field may have had the wrong kind of professional training or no professional training at all, and thus be totally incompetent to handle such a request. Or, most likely, the field staff is com- pletely engulfed in making good on a previous request which seems to them to be of highest importance. The foregoing problems of collection are not too formidable because simple good sense can probably beat them. But there are other problems not so easily disposed of and they are inherent in the surveillance phase of intel- ligence. The surveillance force is supposed to watch actual, fancied, or po- tential ill-wishers or enemies of the United States and report on their Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 activities. It is also supposed to procure information which, though possibly less dramatic, is none-the-less calculated to forward the success of our own policies. In both areas the surveillance force must work clandestinely, or it could not deliver on a small but extremely important part of this task. Thus a certain fraction of the knowledge which intelligence must produce is collected through highly developed secret techniques. Herein lies the major methodological problem of the collection stage of intelligence. It begins with the segregation of the clandestine force. This segre- gation is dictated by the need for secrecy. The minimum of people must know anything about the operation, and the greatest caution and dissimulation must attend its every move. But unless this clandestine force watches sharply it can become its own worst enemy. For if it allows security to cut it off from all guidance, it destroys its own reason for existence. Guidance, in the nature of things, should come from the ultimate consumer directly or indirectly, i.e., through the overt part of intelligence to which the consumer has gone for help. As this relationship is stopped down (as it may have to be for long periods); as it becomes formalized to the point where communication is by the written word only; as it loses the informality of man-to-man discussion, some of its most important tasks become practically impossible. Requisitions become soulless commands. The consumer may ask for something the organization is not set up to deliver, or he may ask for so wide a range of information that the resources of the organization would be fully deployed for months, or he may ask for something which the clandestine force knows is not worth the effort. With a high wall of impenetrable secrecy the consumer has great dif- ficulty in not abusing the organization, and the organization has equal dif- ficulty in shaping itself along lines of greatest utility for the consumer. It is constantly in danger of collecting the wrong and not collecting the right in- formation. Clandestine intelligence involves highly complicated techniques: the correct approach to a source, its "development," its protection once de- veloped, the security and reliability of its own communications, and so on. Isolated by the security barrier, the perfecting of these techniques sometimes becomes an end in itself. One can understand the technician's absorbed in- terest in the tricks of his trade, but it is hard to pardon him when he gets his means and ends confused. There are records where clandestine intelligence has exploited a difficult and less remunerative source while it has neglected an easy and more remunerative one. This kind of mis-collection would be less likely to occur if the operation were less free to steer a course behind the fog of its own security regulations. 4, State Four, the evaluation of data If the language of intelligence were more precise it might use the word "criticism" in place of the word "evaluation", and if "criticism of data" were permitted we might move forward with a little more certainty and speed. The word criticism means the comparison of something new and unestablished with something older and better established. The best critic, Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 in these terms, is the man who has the greatest number of established some- things in the right sort of mind, for he will be able by comparison to appraise the validity of the new somethings as they come in. Thus he rejects a report which puts Great Frusina's steel capacity at 45 million tons because he knows from other evidence of unquestionable reliability that her capacity is 36 million tons. In intelligence research the collected data bearing on the substantive problem must be criticized before they can become the stuff from which a hypothesis emerges. If incorrect data are not rejected the emergent hy- pothesis will be incorrect, and thus the final picture incorrect. The methodo- logical problem boils down to the expertise of the critic, the breadth of his understanding, and the freedom he is permitted in arriving at his appraisal of the data. Maybe, as in an earlier problem, this is as much a problem of administration as of methodology. But the point is, that intelligence which tries to run itself on an assembly-line basis and tries to substitute admin- istrative techniques for high-class professional personnel is all too likely to fall[ down on its all[-important criticism of the data. This is just another way of saying that intelligence is a pursuit which cannot get along without men of knowledge and wisdom. There is, however, a problem in the area of evaluation which can prop- erlybe called methodological. It arises because of the two ways in which the produce of the surveillance operation is distributed to the consumers. The first way of distribution is through the finished digest, report, or daily or weekly summary. The new stuff is put on the expert's desk; he criticizes it, judges its importance, mixes it with other data he received yesterday and the week before, gives it background and point, and sends it on-to the consumer. This activity may be called "reporting", but as can be seen it contains all of the elements of research. The second way in which the produce-of the surveillance operation is distributed is in a much less finished form. The collectors pass to a sort of middleman what -they have picked up. The middleman grades the data for re- liability of source and the accuracy and reliability of content. He may then distribute direct to-the consumer or to the research staff of his own organi- zation or to other intelligence organizations. There is reason for the ex- istence of this middleman, i.e., he is handling data which have been collected clandestinely and his organization must protect its sources. But the middle- man --regardless of his reason for existence --often does far more than ob- literate the sources's identity. He attempts to grade the reliability of the data. In doing so he is sometimes guided by some strange patterns of thought. The middleman, according to standard practice, is restricted to a very narrow language in making evaluations. He is permitted to grade the reliability of the source according to the letters A, B, C, D, and the content according to the numbers 1, 2, 3, 4. Thus A-1 would designate a report of unvarnished truth straight from the horse's mouth. Data from less dependable sources, and less accurate, might be B-2, C--4, etc. If the data happen to have Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 come from a document, a newspaper or press release, one school of evalu- ators designates their value with the single word "documentary". Middle- men have insisted on not amplifying their comments beyond this elementary code and have done their best to see that others who might well amplify were prohibited from so doing. They cling to this procedure on the ground that they are purveyors of a raw commodity and that it is their duty to distribute the commodity in the rawest state possible. If this argument has force the middlemen themselves at times do much to negate it by distributing the commodity in a state anything but raw. They edit it, abbreviate it, or otherwise obscure its import, frequently losing the point-of -observation or slant of the information: Was it a French Communist, Socialist, or Rightist source which told the number of machine guns on the headquarters of the Communist newspaper, L'Humant te; or told of new politi- cal instructions from the Vatican? When the information lands on the con- sumer's desk, it is no raw commodity but a semi-finished one. Evaluation of the source by the middleman may be a valid and valuable service. If the source is known to be a good one and if it must be protected at all costs, to label it as grade A is helpful. But it is helpful and valid only in so far as the middleman knows what he is talking about, or in so far as the validity of the source has bearing on the content. But middlemen if they lack independent line on the reliability of the source have been known to grade the source based on the apparent reliability of the content. This is neither helpful nor valid, particularly as the ultimate intelligence consumers often tend to use the data without further and systematic criticism. Accepting the evaluation at face, they are accordingly misled. Middlemen have at times been people who neither directed clandestine operations nor sat in a place where they were forced to view all incoming materials. By all incoming materials I mean those collected overtly from newspapers, government reports, transcriptions of foreign radio broadcasts, etc., as well as those collected clandestinely from other secret sources. Middlemen so placed were insulated from both the field experience of the operator and the desk experience of the research man who is constantly and aggressively working at a specialty. I can understand how a man living in Rome and spending all his time collecting information on Italian politics can develop a high critical sense. I can understand how a research man in Wash- ington who immerses himself in the data of his specialty and every moment of his professional life runs an obstacle race with his own and other people's hypotheses must have a high critical sense and ability. It is less easy to understand how a man who passively reviews a wide range of material wt th- out doing anythtng about i t except grade i t, can possibly have the necessary critical faculties. To illustrate further: During the war a document graded as A-3 was circulated which told of the American failure to take care of the inhabitants of the city of Oran, Algeria, in the winter of 1943. The source was given an A rating because it appeared to be someone familiar with Oran; the content Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 was graded as unreliable because the evaluator knew conditions there were not as bad as represented. One recipient of this document poked around until he identified the source as none other than an important French official and the document as the text of one of his off-the-record speeches. Now the official was unquestionably an A source; his knowledge stemmed from first- hand informants or even his own experience. But what he said about Oran under the Americans was of relatively little importance even if it had happened to be correct. The importance of this document was that the source -a man who was allegedly a friend and close ally-had voiced violent adverse criticism of Americans. Yet this, its real value, had been completely ob- scured by the encoded evaluation. To serve the more important use, the evaluation should have called attention to the authorship of the document. If the document had fallen into American hands through the work of a secret agent whose identity had to be protected, the evaluation would have required four or five sentences instead of one. But suppose that these sentences could not be written without compromising the agent, is this adequate reason for misleading the consumer through the A-3 evaluation? I would say not. I would say that the middlemen should think up some other method of handling the problem or get out of the business. The crowning peculiarity that is met at times in this sort of evalua- tion is that of removing the name of the newspaper from the reproduction of a newspaper clipping and substituting the word documentary. What purpose this can serve has always eluded me. Without the name of the newspaper the reci- pient is deprived of perhaps the most useful piece of information in making his own evaluation. For example, would you not like to know whether the New York Times or the Dat ly Worker was responsible for an estimate that Henry Wallace would poll ten million votes for President in 1948? Or would you settle for the attribution "documentary" ? 5. State Five, the moment of hypothesis What is desired in the way of hypotheses, whenever they may 9ccur, is a large numberof possible interpretations of -the data, a large number of in- ferences, or concepts, which are broadly based and productive of still other concepts. There are two things an intelligence organization must-have in order to generate more aril better hypotheses: (1) professional staff of highest competence and devotion to the task, and (2) access to all relevant data. There were many men who lived contemporaneously with Mahan and Mitchell, with Darwin and Freud, with Keynes and Pareto who could have made these men's discoveries, for to a very large extent the facts were there for anyone. But the great discoveries of the race are the result of rigorous, agile, and profound thinking. The many failed because they lacked the -brains capable of such thinking and the stamina to face up to an intellectual re- sponsibility. This all, points a moral for intelligence: worthwhile discoveries Approved For Release 2000/08/28 : CIA-RDP78-04718AO00600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 are not made by a lot of second-rate minds, no matter how they may be jux- taposed organizationally. Twenty men with a mental rating of 5 put together in one room will not produce the ideas of one man with a mental rating of 100, and you cannot add minds as if they were so many fractional parts of genius. But even if intelligence recruited its professional staff from among the nation's most gifted people it does not follow that there are no problems other than those which face any university researcher or journalist. Even gifted people would not produce the good hypotheses unless they had access to all the relevant data. This is by no means easy to arrange in intelligence. One of the things that gets in the way is again security. The worker in intelligence is dealing with state secrets upon which the safety or well-being of a nation may rest. On the theory that the secrecy of a secret is in inverse ratio to the number of people who know about it, a highly important secret cannot be too widely known. But a man cannot pro- duce the good hypothesis in any area if he does not know as much as there is to know. It is interesting to speculate on how far Lord Keynes would have got if libraries withheld large blocks of economic data on the ground that they were operational, or how far Dr. Freud might have progressed if mental clinics sealed their records against him on the ground that they were too confidential. Yet intelligence people are constantly confronted with this very argument which seeks to restrict the scope of knowledge on the grounds that an important secret is involved. Security here is bought at great cost in terms of results. Secrecy should be allowed to interfere only so far as ab- solutely necessary. I am skipping stage 6 (i.e., more collecting and more testing of hy- potheses) in the intelligence process because it contains few, if any, problems not covered in stages 2 and 3. The last stage, the one in which the established hypothesis is presented as a new and better approximation to truth, contains at least two important problems. The form which the finished product must take is one of unadorned brevity and clarity. To be sure, intelligence produces long reports - some may reach many hundred pages -- but there are few studies, reports, or monographs which do not also furnish a one or two-page summary. This limit forces the intelligence producers to be clear in their thought and con- cise in their presentation, and it enables the hurried consumer to digest while he runs. The result is by no means an unalloyed good. There is such a thing as a complicated idea; one that cannot be expounded in 250 words, or in two pie-charts, an assemblage of little men, little engines, and three-quarters of a little cotton bale. The consumer who insists that no idea is too com- plicated for the 300-word summary is doing himself no favor. He is re- quiring the impossible and paying heavily for it in two ways: he is kidding himself that he really knows the subject, and he is contributing to the de- moralization of his intelligence outfit. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 The intelligence people who spend weeks of back-breaking work on a substantive problem and come up with an answer whose meaning lies in its refinements are injured at the disortion that may occur in a glib summary. Next time they go at such a problem they will have less enthusiasm for ex- haustive work, will turn in a poorer study with a still poorer summary-tacked on the front. This is not a plea to the harassed man of action to read all the hundreds of pages which come his way, but, it is a plea for the middle ground. If he lets it be known he will read nothing longer than one double-spaced page, many of his most loyal and hardest workers will lose some of their fervor in serving him. A second problem of the presentation stage is that of footnote re- ferences. Intelligence consumers, unlike most serious and critical readers. have not demanded footnotes; in fact, they have often condemned-footnoting as mere evidence of .an academic mind. Thus in those intelligence organiz-a - tions where rules of styling are made by men who do not understand the methods of research there is opposition to the reference note. -Even in or- ganizations where the value of citing sources is fully understood, many sources must be concealed for the reason of security. Thus on both sides there are reasons for skimping on citations and citations are skimped. -I know of no formula for evil any surer than sloppy research unfoot- noted. Sloppy and footnoted is not good, but sloppy and unfootnoted multiplies the danger in a way the-layman can hardly imagine. The following example is in point. The military staffs of two countries, X and Y, had some pre-war con- versations about the airfields which Y had in one of its colonies. Y told X that it had some airfields built, some about to be built, -and a third group to be built when the land had been purchased. On the outbreak of war the con- tent of these conversations became an important item of intelligence, and one of Country X's intelligence outfits distributed a report which accurately named and located the fields, noted that some were ready, others not yet built, and others only planned. It cited its source and gave the dates of the conversations. So far so good. A few months later another intelligence outfit in another country, Z, got out a report on the colony. The report had a section on airfields. The information which it contained came from the earlier study, but it was changed: those airfields the land for which had not yet been bought were not so indicated, and the citation of source was omitted. We now have a report in which three categories of airfields have been reduced to two, i.e., those in operation and others soon to be completed. A little later a second intelligence outfit of Country Z took the -second report and entered the airfield data on cards. These cards were printed forms which had no appropriate box for noting that an airfield was in operation or merely in the process of construction. The cards carried no footnote re- ferences. All three categories of airfield thus dropped into one category. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Taking information from the cards you would have thought that the area had some fifty more airfields than it in fact possessed. It was about this time that a third intelligence outfit of Country Z came into being and inherited the card file. It developed a technique of presenting airfield data on maps with symbols to indicate length and type of runway. Now back in the original document no length was given for the runways of fields to be, but it was noted that the areas to be purchased for development were to be one mile square. This datum had been repeated in all the suc- ceeding reports. But when the map-makers landed upon it they found it inconvenient. They did not wish to do the unrealistic thing of depicting a square runway one mile by one mile, so they compromised. They reasoned that the runways would be of maximum length, hence must follow the diagonal, and hence be something over a mile, say 7,000 feet, in length. This point decided, they made their maps and assigned a symbol indicating a 7,000 to 8,000 foot runway to fields, some forty-eight of which were never completed. This sort of error is not entirely ascribable to a lack of footnote, but I would say that the lack: considerably enhanced the chance of error. Further- more, the lack of the footnote made correction more and more unlikely as the data went through the producer -consumer -producer -consumer chain. By the time the map was made a discovery of the error demanded hours of time from the most studious and professionally competent man who might have had the hours to spend. Even so the damage was irreparable, for his more correct and cautious appraisal of airfields in Y's colony could not possibly reach all the consumers of the erroneous reports, or convince all those whom it did reach that his was the truer picture. The methodological problems which I have discussed above appear to be the most vexing ones, but my catalogue is not exhaustive. There are other problems and there are other facets. Taken together they make the calling of intelligence a difficult one, and cause the results of the intelligence process often to fall below necessary standards of quality. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Chapter 3 PRODUCERS AND CONSUMERS OF INTELLIGENCE There is no phase of intelligence more important than the proper re - lationship between producers of intelligence and the people who use its prod- uct. Oddly enough, one would expect this relationship to establish itself automatically, but it does not do this. It only results from persistent and conscious effort, and is likely to disappear when effort is relaxed. Proper relationship between intelligence producers and consumers is one of utmost delicacy. Intelligence must be close enoughto policy, plans, and operations to have the greatest amount of guidance, and must not be so close that it loses its objectivity and integrity. To spell out this meaning is the task of the next pages. One of the main propositions of this paper may be summarized as follows: Unless the kind of knowledge herein discussed is complete, ac- curate, and timely, and unless it is applicable to a specific problem or one coming up, it is useless. In short, intelligence is knowledge solely for the practical matter of taking action, and this requires that the intelligence staff know a great deal about what is under discussion in other units of, say, the department charged with policy, plans, and' operations, and that it have all the guidance and cooperation from them which can be afforded. The need for guidance should be evident, for if the intelligence staff is sealed off from the action to be planned and carried out, the knowledge which it produces may not fill the bill. Let me be precise about my use of the word guidance. To be properly "guided" in a given task intelligence must know almost all about it. If you wanted to find out from a road contractor how big a job it was to build a particular piece of road, you should not go to him and ask: "How hard is it to make a road?" Before you could expect any meaningful answer you must stipulate what two points the road was to connect, what volume of traffic you wished to run over it, the axle loading of your heaviest vehicle, and so on. After you had made your specifications clear the contractor might still be unable to give you the final answer. He might give a rough estimate but re- fuse to commit himself until he had investigated the terrain to be traversed, the weather with which he would have to contend while putting in the road, the local. labor force, etc. When he had made these investigations-he might come up with a figure answering all preliminary specifications but which was pro- hibitively high in cost. At this point he must return to you to begin conver- sations on compromises. Will you accept two lanes instead of three of -four ? Will you accept a more circuitous route with fewer cuts, fills, and difficult grades? Will you accept a less expensive surface? As you talk these matters Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 over with him you find yourself, although you are not a professional road- builder, batting up suggestions on how he can avoid this or that technical difficulty, and he, though no professional transportation man, begins asking questions about your problems. If things go well, you fetch your technical people in to the discussion, and he does also. Before you are done, your two organizations are working together straight across the board and a com- munity of interest and understanding emerges that produces a workable plan and a smooth operation. Naturally and unconsciously the guidance which was mandatory for his (and your) success has been brought into being. Now this guidance is essential at all levels of strategic intelligence. Intelligence does not formulate objectives; does not draft policy; it is not the maker of plans; nor does it carry out operations. Intelligence, to use the dreadful cliche, performs a service function. Its job is to see that the doers are generally well-informed; to stand behind them withthe book opened at the right page, to call their attention to the stubborn fact they may be neglecting, and--at their request--to analyze alternative courses without indicat- ing choice. Intelligence cannot serve if it does not know the doers' minds; if it has not their confidence. It cannot serve unless it can have the kind of guidance any professional man must have from his client. The uninitiated will be surprised to hear that the element of guidance present in the full at the lowest operational levels becomes rarer and rarer as the job of intelligence mounts in augustness. Without proper guidance and the confidence which goes with it, the surveillance operation, while relatively certain to keep its eye on obvious foreign problem areas may well neglect the less obvious though significant ones. There will be a playing of hunches: "Watch Bolivia, they'll be screaming for information on it in a month", "Isn't it about time we began watching for unrest in Madagascar or Soviet activities in India"; "Say, how about the Spanish underground, how about West African nationalism?" There will be plain and fancy guess work on what is to be watched and what can be left to cool off. There will be differences of opinion as to what is and is not impor- tant; on where this, that, and the other matter belongs on the priority list. This striving to anticipate the trouble spot is not to be discouraged, but it certainly should be supplemented continuously by the very best advice that intelligence consumers can offer. Research in intelligence suffers even more than surveillance when improperly guided. In the first place the knowledge which it purveys may be inapplicable to the use it is to serve, incomplete, inaccurate, and late. It is not reasonable to expect otherwise, when through lack of guidance intel- ligence is asked to do in a week's or a day's time what may be simply beyond human competence. To be able to deliver would demand a research staff large enough to codify and keep up to date virtually the sum-total of universal knowledge. Even then it is doubtful if what was required would emerge unless intelligence had had some advance warning. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 In the second place, the want of-sharp and timely guidance is chief contributor to the worst sickness which can afflict intelligence -- that of irresponsibility. When intelligence knows little or nothing of what lies behind a request, it loses desire to participate in the thing to be accomplished; it loses the drive to make exactly the right contribution to. the. united effort. When this stage is reached, men cease to be either intelligent or sensitive; they begin behaving as dumb and unhappy automatons who worry, if at all, about the wrong thing. What they. hand on of knowledge is strictly non- additive; it must be worked over by someone else up the line, less well- informed, before it has value. It may even be out.of date or inadequate be- cause long ago they quit caring. . There are a number of reasons why intelligence producers and con- sumers have difficulty in achieving the proper relationship. Some of these are perhaps less typical of civilian departments than of the armed services. The services, of course, are organized on the well-known staff pattern. This is composed of six divisions responsible respectively for: personnel,tntel- ithence, organization and training, service-supply-procurement, plans and operations, and research and development. Now it is to be expected that loyalties, as they jell in this organizational structure, will jell first up and down the vertical administrative line of the division. Only secondarily, will loyalties spread horizontally to coordinate divisions under the commander. Thus there is reason inherent in staff structure why Intelligence might ex- perience difficulty in ;etting the proper guidance on plans, projected opera- tions, the strength of one's own forces, etc., from its coordinate staff as- sociates. Some critics of staff organization then go further and point to a doctrine buried deep Ln service formulae called "The Estimate of the Situ- ation." They assert that herein lies something which further adds, and in no small way, to an unsatisfactory relationship between intelligence producers and consumers. The estimate of the situation is what a military commander must make before he decides upon a course of action. In the preparation of this estimate each staff officer has a clearly defined role: personnel, operations, and logistics tell the commander precisely about his own force; intelligence tells him about the physical environment and the enemy force, etc. However, the degree to which intelligence is permitted knowledge of his commander's own forces and the courses of action which the commander may be mulling over are not spelled out in the formula. It has been argued, however, that the G-2 (intelligence officer) should approach his job of estimating the enemy with complete objectivity, and that if he has full knowledge of his own forces and how they may be employed, his thought may jump ahead to the showdown of strength. He will secs his side about to win or lose, and his elation or fear will effect his estimate of the enemy. If he sees his side the easy winner, the argument runs, he will tend to underrate the enemy; if 'the loser, to over= rate the enemy. The commander, having enough difficulties conquering his own subjective self, may not wish to complicate his task by having to screen out that of his intelligence officer. He may feel justified in keeping his whole intelligence arm in ignorance; or he might tell his G-2 everything but only on Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 the expressed condition that the information be withheld from all subordinate members of. the G-2. staff. It must be said, however, that no matter how good this reasoning may appear to the commander, it rarely seems good or compelling to his intel- ligence officer. The latter will always be miffed at the thought that his chief doubts his ability to overcome his subjective self, or that his chief holds him or his organization as a poor security risk. To top it all, he will be even more than miffed feeling that no matter how hard he works, he runs the risk of turning out a useless product. Those who argue that staff structure and the doctrine of the estimate- of-the-situation have within them the means of stultifying a free give and take between intelligence producers and consumers have a point. I would be more impressed if this doctrine were the only discernible cause and if civilian de- partments which have inherited no such doctrine did not also have their dif- ficulties in the producer-consumer relationship. There are other causes and the first of these arises as a psychological by-product of intelligence practice itself. This practice separates out the thing called intelligence from all other elements necessary to accomplish an end, and then bestows upon one group of men, to the formal exclusion of others, all contact with the various steps necessary to the intelligence process. Deep in their subconscious selves, then, the excluded may well harbor the feeling that someone has told them they are not-quite bright- -has said, in effect, "Now don't worry, your thinking is being done for you. We've arranged to give you an external brain. When- ever you want to know something, just ask Intelligence." If Intelligence were staffed with supermen and geniuses who promptly and invariably came up with a correct and useful answer, the sting might wear off; intelligence might come to be revered by its users as a superior brain. But so long as intelligence is not so staffed (what is?) the relation- ship between producers and consumers will continue a troubled one. Another cause for a not too happy relationship is again that of "se- curity" which I have discussed in other contexts heretofore. Policy makers and planners will, in the nature of things, deal with secrets of state. The disclosure of such secrets would amount to a national calamity. (What if one month before the Allied assault on Normandy or the American landing at Leyte, the enemy learned the exact time, place, and magnitude of the pro- jected attack?) Likewise, intelligence must have tts secrets. Apowerful intelligence organization can develop sources of information of value beyond price. They themselves can even become the points of departure and the guarantors of success for a policy, a plan, or an operation. The revelation of such sources or even a hint of their identity will cause their extinction. Their loss can be likened to the loss of an army or all the dollars involved in the Marshall Plan, or, upon occasions, the loss of the state itself. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 The stakes being what they are, security and its formal rules are an absolute essential and, as I have said before, the first rule of security is to have the secret known by as few people as possible, all of established discretion. What is the effect of this rule in the intelligence producer- consumer relationship ? When the rule is rigidly applied the consumers are entitled to a le- gitimate doubt as to the validity of the producers' findings. Suppose you, as a planner, were told something which was contrary to all previous know- ledge and belief and contrary to the laws of common sense? Would you accept it blindly and stake a policy or a plan upon it? What would be your emotions, your considered judgment, and your final decision if, after re- ceiving such information, you went back to the producer and got "Sorry, but I cannot say more than I put in the memorandum" ? Likewise, when -the consumers--the policy people and planners-- rigidly apply the rule, they give the intelligence producers good cause for non-compliance; or the production of useless knowledge. Suppose you were an intelligence producer and one of your consumers appeared with a re- quest for everything you could find out about Java. Suppose the request was phrased just this way. Suppose your entire staff were occupied on other high-priority jobs and that you. could not put any of them on this request without some justification. Suppose you told him this. It might be that he would feel he could not give you the justification without a breach of security. You are at cross-purposes. Possibly the consumer would drop the matter there. But then again he might carry his request up through two echelons and see to it that it came -back to you through two higher echelons of yours. You would be given your orders to get to work on Java. The chances are excellent that a request thus routed is one in which security is paramount. The consumer does not really want to know -all about Java; he wants to know merely about some tiny fraction of it. But he dares not stipulate the fraction for fear of revealing his intent. So he asks for all of it, hoping to get his information out of one paragraph or chapter of your encyclopedia. He has no guarantee that this paragraph or chapter is not the very one you consider unimportant and accordingly leave out. Nor have you any guarantee that if you write the paragraph or chapter you will write it in the way that will best, serve his interests. Now what I have said above is the extreme. When the issues are of highest importance both producers and consumers go to all permissible lengths to help each other forward the success of the common task. But this very leaning over backwards merely confirms the basic problem which security throws in the way of a perfect relationship. Furthermore, when the substantive issue is of some lower order of importance no one,may lean over backwards and something akin to an impasse can easily develop. - 20 - Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 I am not playing down in these paragraphs the importance of security regulations and their observance. I am concerned with the point that se- curity is like armor. You can pile on armor until the man inside is absolutely safe and absolutely useless. Both producers and consumers of intelligence in safeguarding their secrets can so insulate themselves that they are unable to serve their reasons for being. This problem is critical and it deserves the continuing study of a high-powered board. It cannot be met by the earnest, informal but sporadic efforts current today. Nor do I believe it would vanish with the passage of an official secrets act. Such an act would help enor- mously, but it would not be the all-powerful panacea its proponents would have it. A final reason for misunderstandings between intelligence producers and consumers is the understandable reluctance of consumers to embark upon a hazardous task on the basis of someone else's say-so. After all, if anyone is going to be hurt it probably will not be the producers. I will war- rant that the Light Brigade's G-2 was high on the list of survivors in the charge at Balaclava. The casualties, in both the literal and figurative senses, will be to the intelligence users first, and to the producers late down the line. Hence it is easy for the users to adopt the attitude expressed in the rhetorical question: "Why should intelligence worry about doing a perfect job, after all it's not their neck?" From this there can emerge a disrespect, perhaps even a derogation, for the opinionof those who do riot carry the weight of operational responsibility. Let intelligence make any mistake from which a penalty follows and relations are likely to worsen. One last word: intelligence is bound to make mistakes. Some of the questions it must answer demand a divine omniscience; others demand more painstaking work than can be accomplished in the time allotment; still others canbe had only with the most elaborate of undercover preparations which have never been made., But let intelligence make a mistake or come up with an in- adequate answer and all too often the reaction of the consumers is on the bitter side: "I wouldn't ask those geniuses to tell me how many pints there were in a quart." When intelligence errs there seems to be less tolerance than for the error of other specialists. For example, when a dentist pulls out the wrong tooth (as the best dentists have done) or a lawyer loses a case, the client's reaction -is not that he, himself could have done a better job, and that hence forth he will do his own dental'and legal work. Yet in intelligence, pardonably wrong diagnosis and understandably inadequate presentation very often arouse just such reaction. For good reason or bad, an intelligence fail- ure seems to rankle out of proportion to its importance, and to justify the con- sumer in doing his own intelligence henceforth. Thus there are a number of reasons why the relationship between pro- ducers and users may at times be extraordinarily difficult. The result is that the all-important element of guidance is lost. Once this occurs, intelligence must remain innocent of the consumers' requirements, and the consumers in- nocent of intelligence's capacity to contribute to their problems. In wartime the closer to the fighting front and the smaller the operating unit, the better Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A0006001000.03-3 the relationship and the keener the guidance; the more remote and the larger the unit, the worse the guidance. There are few situations even comparable to the fighting front, and where they exist they lack that element of common phy- sical peril which makes all men of one side friends and brothers. Thus in peacetime, top-level intelligence must function in the very worst area of wartime relations without the leaven of what you might call front-line tol- erance. The relationship is likely to remain poor. This danger of intelligence being too far from the users appears to be a lesser danger than that of being too close. But what of this other danger? The Problem of Objecttutty and Integrity The danger of being too close to the consumers is not to be readily dismissed. In a moment of intense exasperation intelligence producers and consumers might agree to knock down the administrative barriers and move intelligence piecemeal into the policy, plans, or operations section, or to break up intelligence into its regional and functional units and disperse them among appropriate parts of the operating organization. If this were donet in- telligence would likely acquire all the guidance it could wish, perhaps even more -than it could legitimately stomach. There will be great and obvious advantages; there will also be costs, some of them prohibitive. Intelligence is likely to be diverted from its essential task. I mean this in. its most crude sense: the intelligence personnel who are profession- ally studious yet possessed of some of the talents of the doer are going to find themselves asked to share a-non-intelligence burden of office. Personnel raids of this sort are very familiar to intelligence people; practically every- one not in intelligence has a way of fancying the best intelligence staff as a pool of unencumbered and -elite manpower ready to be tapped at will. Fight- ing off such raids is a well-known necessity. Once the intelligence man has crossed into operations he will have much difficulty arranging his return. He will soon find himself engulfed in the day-to-day business of the new job. Soon the intelligence staff is whittled -down to its least valuable members and has thus lost its identity and its functional integrity. This very thing has happened enough times to be worthy of serious -consideration. Intelligence, it brought too close to its consumers, is likely to be di- verted in-a less crude sense, but scarcely a less, damaging one. For instance, the detailed problems of an operating office can be many and compelling. A great many of them require the production of "spot intelligence." The tend- ency will be to divert :intelligence personnel to this kind of work. This is not to argue the work's unimportance, but it is to argue that too much diversion of this kind makes poor use of an intelligence staff and deprives it of those long stretches of uninterrupted time required to carry out important long- range projects. Finally, if intelligence is brought into and dispersed among appropri- ate planning or operations sections, the substantive integrity of intelligence can be seriously injured. Under these conditions the components (regional Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 or functional) of the former intelligence organization become relatively free agents responsible solely to the planning or operations chief. They are then under no compulsion to coordinate their views with other intelligence groups with cognate interests. It thus becomes increasingly difficult to be sure that all resources are brought to bear on the problem. Indeed, it is highly prob- able that it will be dealt with solely by those expert in but a single sector of the subject. This, and the want of substantive give and take which it implies, is not the only disadvantage. In addition there are the contrasting standards of performance as a price of dispersal. An intelligence outfit, which is administratively separated from its consumers and unified within itself, is able to strive for a uniformly excellent product. The best work will inevitably become the scale against which other work is measured. Destroy that cen- tralization and unity and you destroy the best and most natural method of competition and the good deriving from it. To all the foregoing, there may be administrative remedies. They will not be wholly effective, but they maybe able to meet the worst objections. There is, however, one high-order disadvantage in bringing the producers and consumers too close together which will elude the most ingenious ad- ministrative devices. Almost any group of men confronted with getting something planned or done will sooner or later hit upon what they consider the single most desirable course of action. Usually they will try to reach this solution as quickly as possible. It is not unlikely, therefore, that they may have arrived at this solution in ignorance of many relevant and important facts; with their prejudices and cliches of thought discriminating in favor of the facts which they do use. This kind of off -the-cuff solutiontends to harden: Their "view" is thus and so; their "position" therefore, thus and so; their "line"in sup- port of the "view" and "position" thus and so. Now add the. ingredients of time and opposition and you have something which may be termed "policy." Now it's rather easy for an intelligence staff itself to fall into this error; to have its own difficulties with that view, position, slant, and line which tends to harden into policy. In spite of the fact that professional schol- ars, i.e., intelligence officers are supposed to have acquired a technique in guarding against theirown intellectual frailties; they are by no means always successful. Intelligence is full of battles between the pro-Mihailovitch and pro-Tito factions, between the champions and opponents of aid to China, be- tween defenders and detractors of the Jewish nation home in Palestine. The fact that there have been such differences of opinion among supposedly objective and impartial students who have had access to substantially the same material, is evidence of someone's surrender to his irrational self. If intelligence separately administered and thus under the best of conditions finds itself guilty of hasty and unsound "policy", it is likely to find itself doing more of this sort of thing when it is under the administrative Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 control of its consumers in plans or operations. I do not see how, in human nature, it can be otherwise. Nor under these conditions do I -see how intel- ligence can escape, every so often, from swinging behind the upolicy" of the operating unit and prostituting itself in the production of what the Nazis used to call kam.p fende Wissenchaft . (roughly, knowledge to further aims of state policy.) I cannot escape the belief that where intelligence is under the ad- ministrative control of consumers, it will find itself right in the middle of policy, and that upon occasions it will be the unabashed apologist for a given policy rather than its impartial and objective analyst. As Walter Lippmann sagely remarks, "The only institutional safeguard (for impartial and ob- jective analysis) is to separate as absolutely as it is possible to do so the staff which executes from the staff which investigates. The two should be parallel but quite distinct bodies of men, recruited differently, paid if pos- sible from separate funds, responsible to different heads, intrinsically un- interested in each other's personal-success." (quoted from Public Opinion, The Macmillan Co., New York, 1922 with the kind permission of the pub- lisher. Chapter XXVI, Section 2). For these reasons, when intelligence is too close to operations what is unquestionably gained in ~utdance may well be lost in tnte~rtty and ob- jectivity. The absorption of intelligence producers by the consumers may prove to be too heroic a cure for both disease and patient. The only way out of the dilemma seems to lie in the very compromise that is usually attempted: guarantee intelligence its administrative and sub- stantive integrity by keeping it separate from its consumers; keep trying every known device to make the users and the producers familiar with each others organization. Intelligence must not be the apologist for policy, as I have said, but this does not mean that intelligence has no role in policy formulation. Intel- ligence's role is definite and simple and might be described in two stages: (1) the exhaustive examination of the situation for which a policy is required, and (2) the objective and impartial exploration of all the alternative solutions which the policy problem offers. It goes without saying that intelligence can skew its findings, so that one alternative will appear many times more attractive than the others. It is not heartening to reflect that just this has been done, though it would be hard to prove that each such crime was one which intelligence embarked upon entirely on its own responsiblity. For instance, during the war British intelligence could prove at the drop of. a hat that there was such a thing as a soft underbelly and that compared to it all other portals to fortress Europa were as granite. Merely because intelligence is capable of getting off the - 24 - Approved For Release 2000/08/28 : CIA-RDP78-0471.8A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 beam is not sufficient reason to exclude it entirely from policy considerations or to condemn it as unprincipled. As long as its complement of professional personnel is of high intellectual and moral caliber, the risks which the policy- making users run in accepting its analysis of alternatives are far less than those they would run if intelligence is excluded from councils. The Problem of Intellt~ence (the Product) and its Acceptance What intelligence desires above all else is that its findings prove use- ful in making decisions. There is, however, no universal law which obliges policy, plans, and operations to accept and use these findings. If intelligence is guilty of poor method or errors in judgment, there is nothing to coerce its consumers into acting upon its advice. This fact has its benefits and its evils. The benefits are almost too obvious to mention: for example, no one would advocate taking a course of action which evidence, not considered by intel- ligence, indicated to be suicidal. Just because an intelligence aberration happens to indicate the law of gravity is inoperative in Lent does not constitute sufficient reason to jump off a high roof on Good Friday. But in this very laudable liberty to discount intelligence lies a source of danger. Where is one to start and stop discounting intelligence ? In one of the books for children written by James Willard Shultz there is a story of some Indian tribes readying themselves for the warpath. The combined chiefs met to discuss the operation and instructed headquarters G-2 (a medicine man named White Antelope) to give an estimate of enemy capabilities. In a couple of days' time White Antelope, having gone through the necessary professional gyrations, came back to the combined chiefs. It seems that the gods had favored his ceremonial by granting him a vision in which he saw a lone raven seated on the carcass of a dead deer. As the raven feasted he did not notice a magpie who slipped into a tree overhead and, took some observations, nor did not notice that the magpie gave the signal for the concentration of his deployed force. When the magpies' build-up in strength was sufficient, they dropped down upon the raven and attacked. The raven put up a game fight, but as things moved from bad to worse decided to re- treat to prepared positions. If White Antelope were an irresponsible G-2 he might have left it at that, but being responsible and feeling that he should make his contribution to the common cause, he hazarded an interpretation. To him the raven was the allied force and the magpies were the enemy-- the facts would justify such an interpretation--and plainly the enemy's cap- abilities were more than adequate. The allies were in for a licking. But Bull Head who was supreme commander spoke up and said in effect, "What you tell us is not much more than that the expeditionary force will be in danger. This we already know. As to the raven and the magpies, it is my belief that we are the magpies, and the enemy, the raven, We start tomorrow." The G-2's estimate had not been accepted. It is important to notice that White Antelope had done his best accord- ing to a method which was standard operating procedure. Bull Head himself would have admitted as much. Bull Head did not override his G-2 because of Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3 a reasoned distrust of -his data or a rational doubt of his objectivity; he over- rode him on the basis of -a hunch and probably a wishful one -at that. Now I -do not wish to reject all -hunches and intuitions as uniformly perilous, for there are hunches based upon knowledge and understanding which are the stuff of highest truth. What I do seek to reject is intuition based upon nothing and which takes off from the wish. The intelligence com- sumer who has been close to the problem of the producer, who knows it inside out, may have an insight denied the producer. His near view of the broad aspects of the problem and his remoteness from the fogging detail and drudgery of surveillance or research may be the very thing which per-- mits him to arrive at a more accurate -synthesis of truth than; that afforded the producer. But let the consumer beware. If he overrides the conclusions of his intelligence arm, and makes a correct estimate, let him deeply ponder why this came about. Let him not get the notion that he need only consult his stars to outdo his G-2. If he gets that notion, he will destroy his intelligence organization- -its members will not -seek truth if a mere soothsayer may negate their conclusions. Adolf Hitler was such a consumer. There is every reason to think that his intelligence at both surveillance and research levels was technically adequate, and that his general staff was technically competent. There is every reason to believe that he got accurate knowledge from his intelligence and good advice from the staff which based its judgments upon this know- ledge. But Hitler had his hunches and the first few of them were brilliant. Because of luck, or because of n profound and perhaps subconscious knowledge of what was at issue, he called the turn correctly and in opposition to his more formal advice. But the trouble was that he apparently did not try to analyze the why of his successful intuition. He went on as if it were a natural, personal, and infallible source of truth. When he ordered -a cut-back in German war production in the fall. of 1941 he began to reap the penalties for his own errors, i.e., overestimating the Luftwaffe's capabilities and under- estimating the capabilities of the Soviet Union. Thus, he not only took some direct and positive steps, but he also took indirect and equally hurtful steps to lose the war. He succeeded in damaging severely the continuing utility of his staff and intelligence service. Where intelligence producers realize that there is no sense in for- warding knowledge which does not correspond to the consumer's precon- ceptions, there ceases to be intelligence. The consumer is out on his own with no more guide than the tea leaf and the crystal ball. He may _do well with them, but for the long haul I would place my money elsewhere. Without discarding intuition as a false friend, I would urge the consumer to use it with full knowledge of its frailties. When the findings of the intelligence arm are regularly ignored because of intuition, the consumer should recognize that he is turning his back on the instruments by which western man has, since Aristotle, steadily enlarged his horizons--those of reason and scientific method. Approved For Release 2000/08/28 : CIA-RDP78-04718A000600100003-3