STUDIES IN INTELLIGENCE [Vol. 12 No. 3, Summer 1968]
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78T03194A000300010003-9
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
114
Document Creation Date:
December 16, 2016
Document Release Date:
January 31, 2005
Sequence Number:
3
Case Number:
Publication Date:
January 1, 1968
Content Type:
IS
File:
Attachment | Size |
---|---|
![]() | 5.61 MB |
Body:
Approved For Relea e - 194A000300010003-9 25X1
STUDIES
~?
INTELLIGENCE
VOL. 12 NO. 3 SUMMER 1968
CENTRAL INTELLIGENCE AGENCY
OFFICE OF TRAINING
A~tCHNAL 2tECORT3
PLEASE RETURN TO
AGF1~oCf~did~le~b8 05/02/17 :CIA-R
DP~$?03194~A'~0010003-9
Approved For Release 2005/025ECkETA-RDP78T03194A000300010003-9
All opinions expressed in the Studies are those of the
authors. They- do not necessarily represent the ofFcial
mews of the Central Intelligence Agenry or any other
component of the intelligence community.
'This material contains information affecting the National Defense
of the United States within the meaning of the espionage laws Title
18, USC, Sects. 793 and 794, the transmission or revelation of which
to an unauthorized person ie prohibited by law.
GROUP 1
Excluded from automatic
downgrading and
declassification
Approved For Release 2005/021R~A-RDP78T03194A000300010003-9
Approved For Relea a 2005/02/17 :CIA-RDP78T03194A00 300010003-9 25X1
STUDIES IN INTELLIGENI~E
EDITORIAL POLICY
Articles for the Studies in Intelligence may
be written on any theoretical, doctrinal, oper-
ational, or historical aspect o f intelligence.
The final responsibility for accepting or
rejecting an article rests with the Editorial
Board.
The criterion for publication is whether or
not, in the opinion o f the Board, the article
makes a contribution to the literature o f ire
telligenee.
EDITOR
PHILIP K. EDWARDS
EDITORIAL BOARD
ABBOT E. SMITH, Chairman
DONALD F. CIIAMBERLAIN LAWRENCE R. HOUSTON
E. DREXEL GODF'REY, iR. WILLIAM N, MORELL
JOHN H. RICHARDSON
Additional members o f the Board are
drawn from other CIA components.
Approved For Release 2005/02/1 ~E~~RDP78T03194A000300010003-9
Approved For Relea 0300010003-9
CONTRIBUTIONS
Contributions to the Studies or communications to the etditors may
come from any member of the intelligence community or, upon in-
vitation, from persons outside. Manuscripts should be submitted
directl to the Editor, Studies in Intelligence, Room 212 Key Bldg.
and need not be coordinated or submitted through chan-
nels. They should be typed in duplicate, double-spaced, the original
on bond paper. Footnotes should be inserted in the body of the text
following the line in which the reference occurs. Artic.~es may be
classified through Secret.
DISTRIBUTION
For inclusion on the regular Studies distribution list call your office
dissemination center or the responsible Central Reference Service desk,
issues and on other questions call the Office of the
SECURITY PRECAUTIONS
Materials in the Studies are in general to be reserved to U.S. per-
sonnel. Articles specifically cleared for liaison use may be passed to
foreign nationals only when redone in different format. Tl~e existence
of this journal is to be treated as information privy i:o the U.S.
community.
All copies of each issue beginning Summer 1964 are numbered serially
and subject to recall.
25X1
Approved For Release 2005/02~~~A-RDP78T03194A000300010003-9
Approved For Release - 000300010003-9
"Foretesting" ABM Systems: Some Hazards .... Sayre Stevens,
Best stick to narrowing tlae range o f the possible. SECRE'T'
Page
1
Estimates and Influence ..................... Shexman Kent: 11
Credibility the overriding aim. CONFIDENTIAL
Reentxy Vehicle Analysis ................ Jerold H. Klaimon. 23
Slim clues to the characteristics o f Soviet ICBM warheads,
SECRET
In Search of Migratory Isotopes ............... Ned C. Horel. 35
An appeal to biota in the hunt for Chinese nuclear plants,
SECRET
Alexander Rado ............................ Louis Thomas, 41
A Soviet wartime spy still collecting intelligence. SECRET
Communication to the Editors ............................. 63
Historian's query about psychological testing. SECRET
Paris Okhrana; Final Phase ............ Rita T. Kronenbitter 65
The Tsar's countersubversion field agency from 1909 to
I9I7. CONFIDENTIAL
With Vandenberg as DCI: Part I .......... Arthur B. Darling; 79
Funds and some functions centralized in CIG. CON-
FIDENTIAL
Intelligence in Recent Public Literature. OFFICIAL USE
Cryptology .......................................... 99
Miscellaneous ........................................ 106
25X1
Approved For Release 2005/02/18ECI1;~~ RDP78T03194A000300010003-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010003-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010003-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010003-9
SECRET
an annual award of $500 is offered for the most significant contribu-
' Ana to the literature of intelligence submitted for publication in the
t-t=;dies. The prize may be divided if the two or more be:>t articles
c+,cnitted are judged to be of equal merit, or it may be withheld if
::~~ article is deemed sufficiently outstanding.
1?xcept as may be otherwise announced from year to year, articles
an any subject within the range of the Studies' purview, as defined in
its masthead, will be considered for the award. They will lie judged
pritnariiy on substantive originality and soundness, secondarily on
literary qualities. Members of the Studies editorial board and staff
are of course excluded from the competition.
Awards are normally announced in the first issue (Winter) of each
volume for articles published during the preceding calendar year. The
editorial board will welcome readers' nominations for awards, but re-
sen~es to itself exclusive competence in the decision.
Approved For Release 2005/02/~,~CI~~-RDP78T03194A000300010003-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A0003Q~~'~03-9
No Foreign~Dissem
Technical intelligence must be content
with delimiting the possibilities off or-
eign weapon development.
"FORETESTING" ABM SYSTEMS: SOME >EiAZA:RDS
Sayre Stevens
I am moved to respond with what I hope is a "reasoned" rejoinder
to Mr. Tauss' piece in your Winter issue describing his work in pos-
tulating aSoviet ABM system.' What he had done, essentially, was:
to devise a hypothetical antimissile system for exoatmosph~eric in-
tercept that would be consistent with the appearance of the Hen
House radar at Sary Shagan and the VHF signals that had been
associated with it; to have this system tested mathematically to
show that its performance would be adequate; to assume There-
fore that the Soviets were actually in an advanced stage of de-
veloping such a weapon system, though they might not "construct
it to operate in quite this manner"; and to urge that U.S. counter-
measures in general be initiated on the basis of such early hypothe-
sizing and without community coordination.
In order that my response be constructive and fair, I find it
necessary to provide a brief look at my conception of how the
game of technical intelligence analysis ought to be played when
its objective is the definition of advanced foreign weapon systems.
This will lay bare my peculiar biases.
When reading in alumni magazines about the exalted accomplish-
ments of my fraternity brothers, I am tempted to use the defensive
ploy of envisioning myself as today's version of Sherlock lE-Iolmes'
brother, Mycroft. Lacking both energy and ambition. but having the
tidiest brain with the greatest capacity for storing facts of any man
living, Mycroft Holmes became the most indispensable man in Eng-
land, apoint of omniscience dealing out true answers concerning
all government problems. He thus represents what an intelligence
analyst could wish to be: wise beyond compare, a storehouse of vital
information nowhere else available,. and able to pluck out from it any
truth upon demand.
MORI/HRP
from pg.
01-09
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010b03-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010003-9
SECRET "F~~retesting"
however appealing such a role may be to contemplate, it will of
course simply not wash. There are several reasons. One is that the
real business of technical intelligence analysis as it relates to advanced
weapon systems cannot be that of dealing out true ansv~~ers on the
basis of an omniscience gained through years of experience. This is
an important point to make because Mr. Tauss tended i:a attribute
value to the work he described on the basis of its having provided
an in some degree true answer. This attitude is embarra~~sing to the
technical analyst: however moot other aspects of the ~irticle may
lie, there can be little contention about the fact that its definition
of the ABM system in question was wrong. One of thE~ objectives
of this essay is to show that this awesome considerati~~n actually
need not be disabling at all.
No longer in this business can one make a bold enlighi:ened grasp
for the precise and only answer. In the analysis of foreign weapon
systems, protected by all the mechanisms of security the modern
state can erect, the problem has become one of cautiously (and above
all, elegantly) defining the bounds of what is technically possible.
By seizing on every bit of usable information made available, by
utilizing techniques of systems analysis, Mycroft's replacement must
with vigor and credibility bound. an ever-narrowing range of possible
capabilities for the weapon system under scrutiny.
In many regards this procedure is unsatisfactory; it is detested
icy some, scorned by others, and really understood by very few.
I personally am excited by its challenge and feel that it is an
absolutely necessary approach in coping with modern intelligence
problems. Its objectives and accomplishments have limits, however,
which it is critically important that we recognize and understand.
A number of factors have made it necessary to resort to this
bounds-defining type of analysis. Principal among these causes is the
extremely conservative policy-in the sense of "covering all bets"-
followed in our own military planning. This planning--as to our
targets of attack, projected forces, deployment of ne~,v weapons
systems, and development of even more advanced one:>-must, of
course, be responsive to the enemy threat; and one of the purposes of
intelligence is to define that threat. But in order to provide every
assurance for the national security, it is natural to insulate the
military planning decisions against errors in the definition of the
Approved For Release 2005/02/17 :CIA-RDP78T03194A006~~8~~0003-9
ApproN~eo a ?estRe~~ase 2005/02/17 :CIA-RDP78T03194A0003g~(~'~~(~.03-9
9
threat. Protection is sought by giving credence, for planning purposes,
to the maximum possible offensive or defensive capability a foreign
weapon system could have. This cautious policy effectively dimin-
ishes the contribution to planning made by intelligence on foreign
weapon systems. It has also led to some of the greatest imlbroglios
imaginable when two sets of enterprising system designers undertake
to conjure up the maximum threat from a state of ignorance about
what is actually happening.
A second operative factor is, indeed, this lack of information about
advanced weapons being developed or newly deployed in those areas
of greatest concern to us. No direct access to the real ansvvers we
seek exists. Most of the reliable information available is either
technical in nature or significant only in terms of technical analysis.
The simplest and most critical answers-e.g., what specific targets
a foreign weapon system is designed against, in what circumstances
it will be used, what its measured effectiveness is-are consequently
far removed from the information immediately available a.nd can
be reached only at the end of a long deductive chain whiich will
almost certainly lack several links of significance for the answer.
Most importantly, even if one has managed to finger the truth,
there is no good way to know for sure that one has done sa. And the
truth has no unique value unless it is recognized as such by those who
must act on it.
Thee piecemeal analytical trench-warfare we must substitui:e for a
lightning thrust at such answers is also generated by the very nature
of the information available: intercepted radar signals, snatches of
telemetry, uncertain photography, or perhaps a representative electron
tube acquired for analysis. Several fine articles have been published
in the Studies on the ingenious uses of these types of information.
I can rather imagine, however, that people engaged in more direct
efforts to get answers to the central questions might be scornful of
such scratching around on the edges. From this point of view it is
a miserable way to do the job-expensive, slow, esoteric, and an-
alytically hazardous; it is, however, the only approach that appears to
be passible in the absence of direct access to needed information.
In some cases the answers provided by technical analysis are, in
fact, precisely the ones sought. Such a situation arises when the
questions are asked on behalf of the development of countermeasures
aimed at degrading the performance of an enemy system by ~,vorking
on its very detailed technological susceptibilities. Countermeasures
Approved"for Release 2005/02/17 :CIA-RDP78T03194A0003000100~03-9
Approved For Release 2005/02/17 :CIA-RDP78T03194A000300010003-9
SECRET "F~retesfing"
development constitutes a unique type of problem, however, and is
not really a part of what is being discussed here. It has had an impact
on the full range of technical intelligence analysis, sharpening both
collection and analvtical techniques and giving an inherent value
to derived technological facts they might not otherwise have; but
it must come somewhat later in the game than the initial grappling
with the characteristics of a new enemy system, since it presupposes an
understanding of the operational concepts the system embodies and a
knowledge of all the elements it embraces.
Side Effects
The use of technical intelligence analysis to set limits rather than
give precise answers has had some important effects which should
he noted:
As pointed out above, the demand for early description of a
rcr~wly developed weapon system has been replaced by a willing-
rce~ss to accept and use a methodical, credible delimitation of
the possible capabilities of the system.
Judgments as to the intended use of the system are. apt to be
,Wade on the basis of these capabilities so delimited. When
the range of possible capabilities extends over several missions,
there is sure to be hell to pay: different people are more
concerned about (and consequently will want to emphasize )
different threats.
Credibility is vital. This is particularly true when the results
.zrc contentious, as they generally seem to be. In order to
delimit meaningfully the capabilities of a system, it is necessary
virtually to prove by the laws of physics (or other appropriate
discipline) that something must be or cannot be the case.
1t is an unfortunate fact that some of these laws, particularly
those relating to weapon effects, are themselves ~~ontentious.
An>clytical elegance and rigor are the natural response to the
complexities of the problem and the need for a demonstrable
cx~nsonance with respectable science and technology. Technical
r?ompetence must be continually demonstrated; any slip will
r