STUDIES IN INTELLIGENCE [Vol. 16 No. 2, Spring 1972]

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78T03194A000300010013-8
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
121
Document Creation Date: 
December 16, 2016
Document Release Date: 
January 31, 2005
Sequence Number: 
13
Case Number: 
Publication Date: 
January 1, 1972
Content Type: 
IS
File: 
AttachmentSize
PDF icon CIA-RDP78T03194A000300010013-8.pdf5.91 MB
Body: 
Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SFCRFT 25X1 STUDIES INTELLIGENCE VOL. 16 NO. 2 SPRING 1972 CENTRAL INTELLIGENCE AGENCY ARCHIVAL RECORD N_? 1499 PLEASE RETURN A TO GENCY ARCHIVES, Approved For Releas 2005/02/17: CIA-RDP 8T03194A000300010013-8 Approved For Release 2005/02/1 kik$-RDP78T03194A000300010013-8 SECURITY PRECAUTIONS Materials in the Studies are in general to be reserved to US per- sonnel holding appropriate clearances. The existence of this journal is to be treated as information privy to the US official community. All copies of each issue beginning Summer 1964 are numbered serially and subject to recall. All opinions expressed in the Studies are those of the authors. They do not necessarily represent the official views of the Central Intelligence Agency or any other component of the intelligence community. This material contains information affecting the National Defense of the United States within the meaning of the espionage laws Title 18, USC, Secs. 793 and 794, the transmission or revelation of which to an unauthorized person is prohibited by law. WARNING NOTICE SENSITIVE INTELLIGENCE SOURCES AND METHODS INVOLVED SECRET Approved For Release 4A000300010013-8 25X1 25X1 25X1 25X1 Approved For Release 2005/02/1" RDP78T03194A000300010013-8 STUDIES IN INTELLIGENCE EDITORIAL POLICY Articles for the Studies in Intelligence may be written on any theoretical, doctrinal, oper- ational, or historical aspect of intelligence. The final responsibility for accepting or rejecting an article rests with the Editorial Board. The criterion for publication is whether or not, in the opinion of the Board, the article makes a contribution to the literature of in- telligence. RICHARD LEHMAN LAWRENCE R. HOUSTON BRUCE C. CLARE, JR. Additional members of the Board are drawn from other CIA components. Approved For Release EDITORIAL BOARD HUGH T. CUNNINGHAM, Chairman 25X1 25X1 25X1 25X1 Approved For Release 2005/02/1,~I P -RDP78T03194A000300010013-8 and need not be coordinated or submitted through chan- nels. They should be typed in duplicate, double-spaced, the original on bond paper. Footnotes should be inserted in the body of the text following the line in which the reference occurs. Articles may be classified through Secret. CONTRIBUTIONS Contributions to the Studies or communications to the editors may come from any member of the intelligence community or, upon in- vitation, from persons outside. Manuscripts should be submitted directly to the Editor, Studies in Intelligence, Room 7F38, Hq. DISTRIBUTION For inclusion on the regular Studies distribution list call your office dissemination center or the responsible Central Reference Service desk, Editor, For back issues and on other questions call the Office of the Approved For Release 25X1 25X1 Approved For Release 2005/02/ac--RDP78T03194A000300010013-8 CONTENTS Page Penkovskiy's Legacy and Strategic Research ...... Len Parkinson 1 The latest strategic information is not in all cases the most useful checkpoint. SECRET The Cuban Missile Crisis of 1962: Presenting the Photographic 19 Evidence Abroad ........................... Sherman Kent Inside story. SECRET Bayesian Analysis Bayes' Theorem for Intelligence Analysis ........ Jack Zlotnick 43 More on probability - I. UNCLASSIFIED The Sino-Soviet Border Dispute: A Comparison of the Con- 53 ventional and Bayesian Methods for Intelligence Warning. Charles E. Fisk More on probability - II. SECRET The Origins of National Intelligence Estimating .............. . 63 Ludwell Lee Montague In the beginning. CONFIDENTIAL Intelligence Implications of Disease ........................... 71 Warren F. Carey and Myles Maxfield Genesis of a project. SECRET Strategic Warning: The Problem of Timing ... Cynthia M. Grabo 79 On assessing timing. SECRET Intelligence Support to the US SALT Delegation .............. 93 Howard Stoertz, Jr. Letter from Helsinki. 'SECRET Notes and Comments ....................................... 107 Intelligence in Publication ................................... 113 Approved For Release 12005/02/17 : CIA-RDP78T03 25X1 MORI/HRP THIS PAGE 25X1 194A000300010013-8 Approved For Release 2005/02/'l-RDP78T03194A000300010013-8 THE STUDIES IN INTELLIGENCE AND SHERMAN KENT AWARDS An annual award of $500 is offered for the most significant contribu- tion to the literature of intelligence submitted for publication in the Studies. The prize may be divided if the two or more best articles submitted are judged to be of equal merit, or it may be withheld if no article is deemed sufficiently outstanding. An additional $500 is available for other prizes. Except as may be otherwise announced from year to year, articles on any subject within the range of the Studies' purview, as defined in its masthead, will be considered for the awards. They will be judged primarily on substantive originality and soundness, secondarily on literary qualities. Members of the Studies editorial board and staff are of course excluded from the competition. The editorial board will welcome readers' nominations for awards but reserves to itself exclusive competence in the decision. Approved For Release 25X1 25X1 Approved For Release 2005/02/17$ ECHlRDP78T03194A000300010013-8 CONTRIBUTORS TO THIS ISSUE Len Parkinson is a member of CIA's Office of Strategic Research. Sherman Kent is presently engaged in historical research. Jack Zlotnick was formerly with the Office of Current Intelligence and Charles E. Fisk is a member of CIA's Office of Economic Research. The late Ludwell Lee Montague was a retired member of the Board of National Estimates. The late Dr. Warren F. Carey was a member of CIA's Life Sciences Division, as is his colleague, Dr. Myles Maxfield. Cynthia M. Grabo is a member of the National Indications Center, and a contributor to Studies in Intelligence in the past. Howard Stoertz, Jr., former member of the Office of National Estimates, is now the director of CIA's Imagery Analysis Service, and was on the scene for the activity he describes. Approved For Release 2 L0510911Z - CIA-RDRZ810 , 25X1 25X1 Approved For Release 2005/02/17 : CIA-RDP78T03194A0003 Q 13-8 No Foreign Dissem The latest strategic information is not in all cases the most useful checkpoint. PENKOVSKIY'S LEGACY AND STRATEGIC RESEARCH Why do we in the Directorate of Intelligence continue to research the documentary material Colonel Penkovskiy photographed in the early Sixties with his Minox cameras? For one thing, we have concluded that most Soviet military practices and strategic theories are slow to change. We have, therefore, found it useful to identify as many of these practices and concepts as possible, because this helps us in analyzing genuinely new Soviet strategic doctrines, and in evaluating how the Soviets are reacting or might react to particular political and military events. Secondly, the development of some key weapons systems requires long lead-times. For many weapons in the Soviet Navy, as an example, the average is about ten years. Furthermore, additional time is required to work out the operational concepts for the use of some new weaponry. As a result, the discussions of some new systems in IRONBARK-the code name for the bulk of Colonel Penkovskiy's photographs-retained usefulness for strategic researchers through the late Sixties and early Seventies. A large number of hardware developments observed in the last several years of the last decade can be traced to discussions in the IRONBARK documents. A third reason for repeated immersion in the thousands of pages of IRONBARK, even though much of it is now ten years old, is realistic training for intelligence analysts. A survey conducted by the Office of National Estimates in 1970 concluded that several offices in the Central Intelligence Agency continue to value the collection, particularly as an aid in the training of new researchers. The ONE poll concluded that there is no better source from which to gain a basic insight into the way the Soviets think about military philosophy and doctrine. *Adapted by the author from his presentation before the February 1971 Mideareer Executive Development Course (Number 27). SECRET 1 Approved For Release 2005/02/17: CIA-RDP78T03194A000300WM@ p PAGES 1-17 Apgnly For Release 2005/02/17: CIA-RDP7pe ~ojj##q0p 10013-8 So, for all these reasons, it is rather evident why we still value the Penkovskiy material as a solid reference aid. How we use it is a more complex question to answer. I will address that question by examining five general research areas in which the I RONBARK proved to be a coup of the first magnitude. These five main areas, in which it is still quite useful as a checkpoint, are: first and foremost, military doctrine-in particular, the IRONBARK is critical background for our current research on Soviet perceptions of the nature of an East-West war in Europe; second, military organization--a research area which particularly involves the subjects of combat readiness, reinforcement, and mobilization in the Soviet (round Forces; third, hardware-our research on this currently centers on the characteristics of anti-ballistic missiles (ABMs) and surface-to-air missiles (SAMs), and anti-submarine and anti-carrier weapons, the need for which were outlined or hinted at in the IRONBARK; fourth, the Penkovskiy material is useful for research on bureaucratic behavior, an analytical field which involves a combination of our research on doctrine, organization, and hardware; fifth, and last, the IRONBARK remains useful in researching the rather exotic field of Soviet procedures for maintaining control of their nuclear weapons. In the popular literature this is called "fail-safe," but it really ought to be called "positive control," and toward the end of the article I will examine the question of who pushes the button. One: Doctrine Several months ago, a document on Soviet offensive operations in the European theater came across my desk. I was, at that time, responding to a request from the Pentagon to prepare a memorandum on the significance of one of the earliest IRONBARK documents, which also examined Soviet offensive operations in the European theater.' The two documents on my desk were not only dated a decade apart, but they advocated sharply different approaches on the proper manner to wage a European war. Thus, my analytical task became an effort to assess which one more closely reflected current accepted Soviet military thinking on this important matter. And here is a good example, I think, of the current value of understanding the totality of the Penkovskiy reports. By studying all the documents in the IRONBARK series, we and our counterparts I An article by Lieutenant-General V. Baskakov, Special Collection of Articles of the Journal Military Thought, 1960, First Issue. 2 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approves For Relle~aese 2005/02/17: CIA-RDP78T03194A0003~1QQ1,QQ13-8 in British Intelligence were able in the early and mid-Sixties to identify a number of patterns and signs of evolution in the doctrinal discussions. The identified patterns, in turn, have helped. us to evaluate the reports that we have received singly from other sources since Penkovskiy was apprehended in 1962. Some of the IRONBARK material which Penkovskiy passed to us in 1961 and 1962 revealed a sharp military debate concerning Soviet military concepts and organization needed for nuclear warfare. There was general agreement in the writings that the existing doctrine and organization were obsolete and inadequate for the era of modern nuclear weapons. But there was wide disagreement on what changes were necessary and how best to accomplish them. The central issue in the IRONBARK debate in the early Sixties was the force structure question of whether nuclear weapons should support massive conventional combat operations in Europe-or replace them. The IRONBARK document that the Pentagon wanted our comments on called for forces which could practically vaporize NATO countries-their national command centers, economic and strategic targets, and armed forces-by nuclear strikes carried out by the Strategic Rocket Forces. This strategy gave the Soviet Ground Forces the subordinate task of marching through the rubble. No "battle" was to take place, and there was little indication that a systematic conquest of NATO Europe was conceived, not any attempt to exploit its resources in the interests of the Soviet Union. (The cold calculation, presumably, was that ashes were not really worth occupying.) This theory, which we dubbed the "more rubble for the ruble" strategy of former party leader Khrushchev, was endorsed by only two other military writers in the IRONBARK collection? The Khrushchevian conclusion that nuclear weapons would replace massive conventional combat operations in Europe promptly provoked a sharp reaction from a wide variety of senior professional Soviet officers. These officers proceeded to lay out the main themes of their more orthodox, traditionalist line in subsequent issues of the IRONBARK material. The more orthodox writers argued that the indiscriminate use of nuclear weapons in the European Theater was wrong (one general rebutted that such saturation strikes do not "con- form with Marxist dialectics" 3), that nuclear-missile weapons should 2 Colonel-General A. I. Gastilovich and Lieutenant-General I. A. Tolkonyuk, Special Collection of Articles of the Journal Military Thought, 1960, First Issue. 3 General of the Army P. A. Kurochkin, Special Collection of Articles of the Journal Military Thought, 1960, Second Issue. SECRET 3 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Penkovskiy's Legacy be used only within the limits of expediency, and that the selection of enemy objectives to be destroyed in the tactical and operational zones is the prerogative of the troops of the Front, not the Strategic Rocket Forces .4 in the view of the orthodox camp,5 sufficient reason remained to draw up conventional plans to blitz to the Rhine and beyond. These plans were based firmly on the traditional judgment that a land battle would be fought in Europe which would require adequate ground and air forces. One traditionalist writer argued that "the dominant role in an operational-tactical plan will quite often belong to the Ground Forces. ..." 6 The weight of this orthodox counter-barrage was so heavy that the very radical, Khrushchev-like views practically disappeared from the IRON BARK debate. As a result, Khrushchev initially failed to sus- tain an imaginative airing of military arguments in favor of his de- fensive policy in the published material supplied by Penkovskiy. At this point, the singular nature of some of the IRONBARK, particularly the Special Collection of Articles of the Journal Military Thought, merits some explanation. The Soviets classified the documents top secret, but, most significantly, they were in fact unofficial. The unusual nature of the Special Collection arose from the fact that it was established, in early 1960, as an ad hoc forum for the airing of frank, controversial and far-ranging views of senior military officers. According to an editorial note, the articles expressed only the opinions of the authors. The articles selected for publication in the Special Collection were evidently regarded as too sensitive for publication in the secret Collections of Military Thought articles, or in the more widely circu- lated monthly Military Thought.? The circulation of the Special Collection was limited to army commanders and higher. The contribut- ing writers, for the most part, were drawn from the same small circle of military elites. Numbered among the contributors were the Minister of Defense, the deputy ministers of defense, military district com- a General of the Army V. V. Kurasov, Special Collection of Articles of the Journal Military Thought, 1960, Third Issue. In addition to Kurasov and Kurochkin, it included Marshal of Armored Troops 1'. A. Rotmistrov, Colonel-General N. 0. Pavolvskiy, General of the Army A. V. Gorbatov, Colonel-General A. Kh. Babadzhanyan, Colonel-General I. 1. Gusakovskiy, and Colonel-General G. I. Khetagurov. e Kurochkin, op. cit. Emphasis supplied. 7 This version was restricted to "Generals, Admirals, and all officers of the Soviet armed forces." Approved For Release 2005/02/17 : CIA-RDP78T03194A00SOE3d 010013-8 Approftdk6orldQelO05/02/17: CIA-RDP78T03194A000313-8 manders, senior staff officers, chiefs and officials of military director- ates, and military academy heads and theorists. Since the Special Collection constituted a forum principally for the exchange of unofficial or individually held viewpoints, the materials contained numerous recommendations for the planning and conduct of strategic and front operations in a future general war. And the articles varied in quality. Some were distinguished for the care and thoroughness exercised in their preparation. Other articles were dis- jointed, naive, incomplete, extreme. The very extreme nature of the views put forward in the IRON- BARK document on my desk (the one the Defense Department had requested more information on) was probably part of the reason for the failure of Khrushchev's attempt to gain many adherents for the foundations underlying the logic in his military philosophy. His premises were that, first, any direct confrontation in Europe over vital interests would quickly escalate into an all-out nuclear exchange that, second, would leave little room for a land battle and, therefore (to repeat), little need for a massive, multimillion man conventional force. The fireball philosophy of Khrushchev-and this appears to be the salient point-involved much more than military strategy.. It was closely tied to his long term program for domestic economic develop- ment. His program required increased resources for domestic invest- ment and consumer goods, which he hoped to obtain in large measure through economies in the military. At the expense of conventional capabilities, he advocated a military policy based on a minimal nu- clear deterrent. His strategic policy was in part dependent on decep- tive statements and Soviet secrecy, in the sense that it rested at that time largely on the US intelligence community's inflated assessment of the numbers of Soviet intercontinental ballistic missiles (ICBMs). In brief, Khrushchev's considerations on the nature of a future war were simple and cheap. The bulk of the professional Soviet military's arguments in the Special Collection, by comparison, was costly and complex. The outcome of the debate exposed in the IRONBARK was greatly influenced by two developments: the introduction of US satellite photography, which subsequently exposed Khrushchev's missile gap deception; and the failure of Khrushchev's last "cheap" attempt to employ the strategic threat for policy gain by trying to position medium range missiles in Cuba in 1962. The post-Khrushchev leaders apparently concluded that past deficiencies in strategic power were in part responsible for foreign policy fumbles, and that a policy SECRET 5 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 ApgttM For Release 2005/02/17: CIA-RDP7PT 1AJOg0A,10013-8 of minimal deterrence was too risky for the Soviet Union. In other words, the new leadership decided to purchase the security-in both the strategic and conventional forces-that Khrushchev tried to finesse. In this sober vein, the theoretical pitch of that new document (the one which I was contrasting with the ten-year-old IRONBARK article) reflected the orthodox consideration that in order to strengthen and make the Soviet deterrent more effective, the Soviet Union must make serious and costly efforts to prepare for all kinds of threats. This view was central to other post-Khrushchev classified articles which discussed offensive operations in the general vein of the more traditional advocates in the 1960-62 IRONBARK Special Collec- tion series. 8 Two: Organization The knowledge of the doctrinal debate in the IRONBARK turned out to be doubly important, because the various articles on the sub- ject also provided considerable new insight into the key subjects of combat readiness and mobilization. The IRONBARK evidence on combat readiness9 indicated that in peacetime Soviet authorities viewed most of their divisions as gen- s This lengthy footnote is composed for those readers who wonder what happened to the "orthodox" and "radical" strategists of the early Sixties. The quick answer is that their subsequent careers appear to have been largely unaffected by the points of view expressed in the debate. The longer answer, starting with the last known positions of the conservative writers, is as follows: P. A. Rotmistrov, a general inspector of the Group of General Inspectors of the Ministry of Defense; N. 0. Pavlovskiy, deceased, last held the post of Deputy Chief of the General Staff; V. V. Kurasov, inactive, last held the post of Member of the Joint Supreme Command for Warsaw Pact Forces in East Germany; A. V. Gorbatov, probably inactive, last held the post of Deputy Chief of the General Staff; A. Kh. Babadzhanyan, presently Deputy Commander in Chief of Ground Forces and Chief of the Armored Troops; I. 1. Gusakovskiy, probably inactive, last held the post of Chief of the Main Personnel Directorate of the Ministry of Defense; G. 1. Khetagurov, probably inactive, last held the post of Commander of the Baltic Military District; P. A. Kurochkin, may be inactive, his last post (terminated by 1970) was as Member of the Joint Supreme Command for Warsaw Pact Forces in East Germany. The last known positions of the "radicals" are as follows: A. I. (1astilovich, inactive, last held the post of Senior Professor at the Academy of The General Staff; I. A. Tolkonyuk, last identified in 1969 (but since replaced) as the First Deputy Commander of the Siberian Military District; V. Baskakov, presently a Colonel-General and the Deputy Chief of the Main Directorate for Military Training Institutions. N. Khrushchev, the last of the important radicals, "retired" in mid- October 1964 and died c;, 11 September 1971. 9In particular see Major-General Ya. Shchepennikov, Military Thought, 1961, Third Issue. Also see Major-General A. Klyukanov, Special Collection of Articles of the Journal Military Thought, 1961, First Issue. 6 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apprdaldvokipelee cR005/02/17: CIA-RDP78T03194A000 Q013-8 erally falling into three classes, based on level of strength and avail- ability for use. The first class consisted of units "in a full state of combat readiness" and available for immediate use. The second class of units were frequently termed "of increased combat readiness" re- quiring a "short mobilization period" and capable of being moved to the theater of operations "within hours" or up to "several days." The strength and availability of the third class were the least clearly defined in the documents. The third class units were described as either "at reduced strength" or "in cadre status," and their availability was expressed in days or (sometimes) weeks. Evidence over the last ten years supports this three-way break- down. The only refinement some of us would make would be the addition of a fourth class of division, one in skeleton form. Most of the IRONBARK writers who wrote on combat readiness were in agreement that at least three classes of divisions were ex- pected to participate in the hypothetical campaign to seize Western Europe. And most Soviet authorities in the early Sixties considered that the campaign would be finished in about two to three weeks. In the schemes of the General Staffers, the campaign was to end with the arrival of Soviet forces at the English Channel within 10 to 20 days. On the timetable issue, we have evidence that the Soviets' current planning for the blitzkrieg campaign against Western Europe is essentially as ambitious as it was at the time the IRONBARK documents were published, including both timing and composition of the Warsaw Pact forces to be involved. The capability to accomplish such a dazzling deployment depends in large part on the effectiveness of the mobilization system. In this connection, information on the Soviet system and its capabilities gen- erally echoes assertions in a 1961 IRONBARK article which main- tained that large units from the western part of the Soviet Union could complete their mobilization and reinforcement in about 10 to 12 days.'? For example, in the case of their performance during the 1968 Czechoslovak crisis, when the Soviets could set the pace them- selves, a partial mobilization and reinforcement was accomplished in about two and a half weeks. Three: Hardware A third research area where the IRONBAR,K remained valuable for many years was in the identification and analysis of some of the characteristics of several new weapon systems. 10 Major-General P. Stepshin, Collection of the Journal Military Thought, 1961, Sixth Issue. SECRET 7 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appg?CVTFor Release 2005/02/17: CIA-RDP7870 11091(1 10013-8 At the outset, however, it may be helpful to highlight the critical information provided by Penkovskiy on the fairly old medium-range and short-range ballistic missiles. This information helped us to evalu- ate readiness conditions. For example, it enabled us to inform the intel- ligence community that at least part of the medium range (MRBM) force was in an increased state of readiness during the Soviet invasion of Czechoslovakia in August 1968, when other sources indicated that crews working on the SS-4 were performing certain critical work re- vealed in the Penkovskiy material. Significantly, other intelligence sources helped us determine at an early stage of the Soviet buildup of forces along Czech borders that this deployment of forces was not directed against NATO. In other words, the increased state of readiness of some of the Soviet MRBM force was a precautionary move-part of a contingency plan against the rather remote contingency that the invasion of Czechoslovakia would spark a general European war. How has the IRONBARK helped us in our research on new stra- tegic defensive weapon systems-ABMs and SAMs? Two articles published in the IRONBARK series in early 1962 reflected Soviet consideration of low altitude intercept of ballistic missile reentry vehicles." Both articles rejected the concept of using atmospheric sorting as a means of identifying the reentry vehicle prior to its engagement and destruction. The engagement phase of the Soviet ABM system should take place in outer space, not in the atmosphere. The two articles in the IRONBARK recognized the need for sorting, but one discarded the atmospheric approach on the basis of the limited reaction time available after target identification (and in fact it is literally counted in seconds). The other IRONBARK article. warned of the risks to ground targets if ICBMs and intermediate range ballistic missiles (IRBMs) were allowed to penetrate to alti- tudes below 40 to 50 kilometers before attempting intercepts. When the first generation Soviet ABM system was deployed around Moscow, technical analysis of the system by CIA's Science and Technology Directorate was consistent with the IRONBARK exoatmospheric conclusion. Subsequent U.S. progress with endoatmospheric inter- ception (with the Sprint missile) alerted us to look for any possible evidence that the Soviets were reconsidering their earlier rejection of atmospheric intercepts. 11 Colonel-General I. Podgornyy and Colonels V. Savko and N. Maksimov, Special Collection of Articles of the Journal Military Thought, 1962, First Issue. 8 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Apprq> (V%gki qlt@?S4005/02/17: CIA-RDP78T03194A0003 kFP13-8 Another 1962 IRONBARK article 12 cited the chief of Soviet strategic air defense (PVO Strany) on the need for a long-range surface-to-air missile system. Such a system would permit a change in the Soviet organization of air (not missile) defense from defense of points to defense of zones. This, of course, alerted us to look for the development of a long-range SAM. When one appeared with characteristics which seemed to fulfill the zonal requirement, the IRONBARK statement formed part of the evidence used in assessing the role of this new SAM system. Several articles discussed the problems of air defense for the ground forces.13 These stressed a need for highly maneuverable weapons which existing Soviet strategic SAM systems (SA-1, SA-2, SA-3) could not provide. This alerted us to watch for development of mobile SAMs, which we first saw in 1964. The IRONBARK articles also indicated that the Soviets probably would not deploy large numbers of their SA-2 and SA-3 systems with tactical forces, and they have not. Another important field of weapons development discussed in the IRONBARK dealt with the Soviet Navy. However, IRONBARK was not clear regarding the role of Soviet ballistic missile submarines. Apparently the small force then in existence was targeted against naval bases and ports and not on cities or military targets farther inland. The best deduction is that the role and future of the ballistic missile submarine were under debate in 1960-62, but at the highest level and was too sensitive a topic to be within IRONBARK material. With the exception of this gap in the IRONBARK, the material helped us to understand at least two important missions of the Soviet Navy-the anti-carrier mission and the anti-Polaris mission. The IRONBARK admirals saw the US attack carrier as the greatest strategic threat at that time. New anti-carrier equipment was entering the Soviet fleets but major problems of its strategic and tactical employment remained to be solved. And the cruise missile, delivered by aircraft and submarines, clearly emerged in the Penkovskiy papers as the primary anti-carrier weapon. This knowledge helped US intelligence discern the purpose of the SS-N-3 and other missiles, a navy bomber, and two classes of cruise missile sub- 12 Lieutenant-Colonel Ye. Ryukin, Military Thought, 1961, Sixth Issue. 13 In particular, see Colonel-General S. Mironov, Special Collection of Articles of the Journal Military Thought, 1962, First Issue. SECRET 9 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 SECRET Penkovskiy's Legacy marines.14 All of these weapons were exercised in the annual Norwegian Sea exercises during the Sixties. These exercises have continued into this decade and have followed the strategic and tactical lines set out in one of the Military Thought articles.15 This article and other IRONBARK papers were our principal guide for interpreting these important exercises and establishing the estimate of the SS-N--3 missile as, primarily, an anti-ship weapon- not a weapon intended for strategic attacks on bases and other targets ashore. The IRONBARK admirals, exhorted to look ahead, foresaw that the Polaris submarine would replace US attack carriers well before 1971 as the primary strategic threat from the sea. One admiral 16 revealed that the Soviet Navy was assigned its anti-Polaris mission in 1957, and another 17 outlined a rather comprehensive anti-Polaris program. I n retrospect it is clear that many essentials of the plans in the IRONBARK were accepted. Due to the long lead-time required for development of many anti-submarine warfare (ASW) systems, some of these just recently showed up in operational versions. This is a case in which the hardware value of IRONBARK is particularly relevant to today's strategic researchers. The IRONBARK admirals, however, were divided on the proper direction for the submarine mission. One admiral18 advocated multipurpose submarines for anti-ship as well as anti-Polaris mission, while another 19 argued for several classes of specialized submarines with designs optimized for specific tasks. Consequently IRONBARK, while suggestive, is not a definitive aid in sorting out several new classes of attack submarines now under construction. There was general agreement, however, in the Penkovskiy papers on the value of nuclear propulsion for submarines and for the priority development of better sonar and torpedoes. 19 For example, the Kennel and Kipper missiles, the naval TU-16 bomber, and the K -class and .J-class cruise missile submarines. 75 Captain First Rank Ye. Mamayev, Collection of Articles of Military Thought (the SECRET version), 1962, Third Issue. 16 Admiral N. Kharlamov, Special Collection of Articles of the Journal Military Thought, 1962, First Issue. 17 Rear Admiral 0. Zhukovskiy, Special Collection of Articles of the Journal Military Thought, 1961, Fourth Issue. 1.8 Admiral V. Platonov, Special Collection of Articles of the Journal Military Thought, 1961, Second Issue. 19 Admiral Yu. Panteleyev, Special Collection of Articles of the Journal Military Thought, 1961, Third Issue. Appr)Aed For Release 2005/02/17 : CIA-RDP78T03194A000 MM013-8 Apprga&4(FQkj gltLaag 3OO5/02/17 : CIA-RDP78T03194A000 ( &013-8 The total impression given by IRONBARK was that, while anti- Polaris killer submarines held the greatest promise, aircraft and surface ships had crucial stalking roles to play. For example, one paragraph in a Special Collection essay 20 assisted in our early (1967) assessment of the Moskva helicopter cruiser as an anti-submarine war- fare ship. Other admirals advocated ASW cruisers and destroyers with strong air defense armament to protect them while hunting Polaris far at sea. We believe this concept is behind the appearance of surface-to-air missiles on the Moskva and on five other classes of ships whose NATO designations all begin with "K": the Kresta, Kashin, Kanin, Kotlin, and Krivak classes. The joint SAM-ASW concept may also be behind additional new classes of major combatants under construction. In the main, the ASW aircraft force, with its improved detection and weapons systems, developed along the lines laid out in IRON- BARK. In fact, the increasing emphasis to the ASW mission in naval aviation, like the use of the helicopters on the deck of the Moskva helicopter cruiser, was foreshadowed in the Military Thought articles. Another current research area in which we still use the IRONBARK involves a combination of the three subjects just discussed-doctrine, organization, and hardware. We call this research on bureaucratic behavior, and the Penkovskiy material is extra rich because several critical features relating to doctrine, organization, and hardware were all in sharp focus by 1960. In addition, a number of important decisions were begging for resolution, such as the proper role of armor in a nuclear war. Thirteen articles appearing in the IRONBARK's Special Collection constituted the main vehicle for an intramilitary assessment of the armor question 21 The authors of these articles ranged from technical 20 Rear Admiral N. Zvyagin, Special Collection of Articles of the Journal Military Thought, 1961, Second Issue. 21 See articles by Colonel-General A. Kh. Babadzhanyan, Colonel-General A. I. Gastilovich, Marshal of the Soviet Union R. Malinovskiy, Colonel-General P. Poluboyarov, Marshal of Armored Troops P. Rotmistrov, Major-General L. Sergeyev, Lieutenant-General A. Shevchenko, Lieutenant-General M. Shaposhnikov, Major- General G. Zavizion, Colonel V. Zemskov, General of the Army A. Zhadov, and Major-General C. Zimelev. For a good analysis of these articles, see the Rand study The Role of Armor: Case Study of a Soviet Bureaucratic Decision Pattern (Secret, April 1969, RM-5814-PR/ISA). SECRET 1 1 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 SECRET Penkovskiy's Legacy specialists who detailed fine points of tank design and troop organization, through senior branch-level officers who dealt with more comprehensive concepts, up to the Minister of Defense, who summarized the course and content of the professional military's discussions. The Minister of Defense (Marshal Malinovskiy at that time) also indicated the main directions he thought worth pursuing in the armor field. For a strategic intelligence researcher, these articles-which span practically the whole period embraced by the Penkovskiy material- are engrossing, because their contents testify to a vigorous exchange of views and an examination of alternative choices. One choice that the Soviets made resulted in the machine which they call the Infantry Combat Vehicle or ICV. The guidelines for the 1CV were set out in considerable detail in one of the articles on the tank debate.22 This advanced weapon was first seen in the Moscow parade in November 1967, and when analysts in the Intelligence Directorate began to study its characteristics, they were already on first base, thanks to the 1961 guidelines in this one IRONBARK article. The guidelines called for an amphibious, lightweight, low silhouette vehicle mounting a turreted cannon and an antitank guided missile. The guidelines added that the vehicle was to carry a squad of men and provide hatches at the rear of the vehicle for safe entry and exit under fire. The Infantry Combat Vehicle meets all these requirements. Interestingly, from a bureaucratic point of view, one choice that the Soviets apparently did not make was a super-sophisticated tank described in the IRONBARK by the top man in the Soviet military, Defense Minister Malinovskiy. The Special Collection materials on the role of armor, supplemented by Soviet open press writings and by our own esoteric communication analysis, enable the researcher to reconstruct, practically blow-by- blow, the institutional, bureaucratic realities in which some major Soviet decisions were actually made. Another subject in which research on bureaucratic behavior is currently making use of the Penkovskiy papers concerns the organiza- tion of the Strategic Rocket Forces. The SRF was established only a few months before Colonel Penkovskiy made his first contact with us. And the key fact about the SRF in the 1960 to 1961 period was that it was still in the process of formation: jurisdictional responsibil- ities were being defined and redefined, relationships with the General SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 ApproDeck6raaki l4ageo4005/02/17: CIA-RDP78TO3194A0003Q@E9*@V13-8 Staff were being determined, personnel acquired, and major director- ates being transferred to the SRF. On the subject of the SRF's organization, the researcher can set aside the IRONBARK volumes and make use of the colorful CHICKADEE series. CHICKADEE is the codename for the tape recordings Penkovskiy made and the reports he himself wrote. One of the particularly interesting series of CHICKADEE reports concerned a dispute between two important rocketry officials in the Soviet military, Marshals Varentsov and Moskalenko. Penkovskiy reported that beginning in early1961 there were rumors at responsible levels of the Soviet General Staff that the strategic missile command under Moskalenko (then Commander-in-Chief of the Strategic Rocket Forces) would be combined under a new command headed by Varentsov, a close associate of Penkovskiy. Varentsov, then respon- sible for tactical missiles, had openly referred to his rival, Moskalenko, as a "stupid old sheep." Agitation for the incorporation of Moskal- enko's strategic missiles under Varentsov's command apparently existed throughout 1961, but by January 1962 Penkovskiy reported that the final decision on this matter had been taken in Moskalenko's favor.23 But in the Intelligence Directorate, the reasons behind Moskalenko's success and Varentsov's disappointment in early 1962 remain another mystery of Moscow's byzantine-style politics.24 Politburo-level politics and policies, and particularly those dealing with research on the highest level military decision-making bodies in the Soviet Union, constitute another research target in which the Penkovskiy material retains value. Here the CHICKADEE series provides useful background on the rough-and-tumble way Khrushchev ran his Higher Military Council-the rough equivalent of our National Security Council. These reports also provide a useful contrast with the comparatively phlegmatic management style of the current party 23 Marshal Varentsov was reduced in rank following the discovery of Colonel Penkovskiy's activities. (Penkovskiy was a frequent visitor in the Varentsov home, and had full access to the Marshal's missile and artillery headquarters.) Varentsov never regained his former lofty rank of Marshal of Artillery. A final indication of his disgrace was the terse, unsigned notice of his death in Red Star on 4 March 1971. This is the sort of obituary usually given to relatively obscure veterans. 24 The mystery is "solved," if you are willing to accept the authenticity of Khru- shchev's story in his "memoirs." Krushchev, by CPSU (and Mafia) standards, would have owed a debt to Moskalenko. According to the "memoirs," Moskalenko (like a sheep) followed Khrushchev's extra-legal orders soon after Stalin's death by arresting a Kremlin goon of the period (Lavrenty Beria) in the Politburo inner sanctum. "I Could see that Comrade Moskalenko would do what was necessary for the Party cause." Khrushchev Remembers (1970, Little, Brown and Co., Inc.), page 338. SECRET 13 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 App Cp For Release 2005/02/17: CIA-RDP7$T09s A0Q300010013-8 en 31v4 o s egacy boss, Brezhnev. Penkovskiy's tape recording sessions also provided another chapter on the energetic style of the present Defense Min- ister, Grechko 25 In short, the IRONBARK and CHICKADEE material have been invaluable in our research on bureaucratic behavior. This material, in part, helped us modify the simplistic Cold War notion of the Soviet Union as a monolithic system directed by a unified central power. A fifth current research area concerns the sensitive subject of So- viet procedures for maintaining control over their strategic nuclear weaponry. Here it is important to emphasize that the IRONBARK and CHICKADEE provided a wealth of essential information, previously unknown and unavailable to us through other collection efforts, con- cerning Soviet strategic missiles. Through another IRONBARK series--the Top Secret Information Bulletin of the Missile Troops s''- we saw for the first time how the Soviet strategic missile units were organized and structured, what the functions of the various staffs in each unit were, how these units were linked through the chain of com- mand to the military high command in Moscow, and what the activi- ties of missile units were at the different levels of combat readiness. Through the CHICKADEE series, we received for the first time de- tailed technical data on the missiles themselves, on the yields of their warheads, on the method by which the missiles were oriented toward their targets, and on the types of priority targets to be attacked by strategic missiles, that is, military targets, industrial and administra- tive centers, and the like. But regarding all this data, there are analysts in the intelligence Directorate who now maintain that the Penkovskiy material and ancient history are beginning to have much in common. Indeed, the IRONBARK is aging, particularly in light of the stunning changes in the makeup of the Soviet strategic missile force since the last of the Penkovskiy papers were acquired in 1962. For example, the force of Penkovskiy's time was composed almost entirely of medium and inter- mediate range ballistic missiles. The Soviets in the past few years have begun to deactivate these missiles. Only a handful of intercontinental 25 An earlier chapter on Grechko's management style was derived from our telephone tap in the Fifties, when he was Commander-in-Chief of the Soviet Forces in East Germany. M In contrast to the Special Collection, the Bulletin was a technical journal which did not carry controversial or unofficial articles. 14 oved For Release 2005/02/17 : CIA-RDP78TO3194A0003000 0013-8 Appr Appro90,ekp*05/02/17 : CIA-RDP78T03194A0003f13-8 missiles were available when the IRONBARK documents were writ- ten, and these were located at vulnerable soft sites (i.e., above ground level). Since then, well over one thousand ICBMs have been deployed, principally in single, dispersed, hardened silos. Advanced systems for command and control of the force have, according to Soviet sources, been put into use in the same period to centralize control of all stra- tegic weapons. In addition, multiple warheads are now being intro- duced into the force, and production of Polaris-type submarines has been underway for more than five years. Nevertheless, some of the information in the Penkovskiy material continues to be pertinent to intelligence research being undertaken today in the Office of Strategic Research. And a prime example is in the area of research on Soviet measures for control of strategic offensive weapons. This research examines measures the Soviets have taken to achieve what is called "positive control"-preventing accidental or unauthor- ized use of nuclear weapons while maintaining a capability for quick, measured nuclear strikes. It also examines questions about Soviet awareness of the need for such control and the evolution and present status of the Soviet national command mechanism; who in the Soviet hierarchy gives the order to launch a nuclear attack? How is an order communicated to the launch sites? This research draws upon open Soviet sources. A wide variety of technical collection systems are also used. But the contribution from the Penkovskiy material remains conspicuous and significant. Unexpectedly, it is not always what the Penkovskiy documents say that is important for our detective work in this research area, but what they do not say. Until quite recently, there was evidently a prohibition against dis- cussing in the Soviet open press the dangers of unauthorized or acci- dental use of Soviet nuclear weapons. Significantly, the Penkovskiy papers did not discuss this issue, which indicated that the blackout extended even to classified military publications. The chief reasons for the blackout might have been Soviet super-sensitivity toward the subject-that is, security concerns may have outweighed other important considerations, including that of keeping foreign govern- ments informed about the adequacy of Soviet precautions. The IRONBARK editors may also have believed that the more one can learn about Soviet safety precautions, the more one can infer about Soviet preparedness and capabilities-and in the early Sixties, unlike the early Seventies, the Soviets had little of either preparedness or capabilities in the strategic-missile field. SECRET 15 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Aply?eMFor Release 2005/02/17: CIA-RDP7,T0k3194AQ0Q300010013-8 en ovs fy s egacy It is also possible to reinterpret and gain new clues from the Penkovskiy material on the basis of what we have subsequently learned about the Soviet command network from other sources. In this connection, some of the IRONBARK documents addressed the need to make greater use of computers and automation in the command and control process as well as in the actual firing of missiles. Although these particular documents did not describe the computer and auto- mation systems needed to do the job, they did reveal the types of command and control problems the Soviets were experiencing in 1960, 1961, and 1962, and the types of proposals they were considering to correct these problems. The documents indicated that the Soviets would seek, through improvements in communications technology, automation, and data processing, to reduce the reaction time of their strategic forces and increase the versatility and reliability of their strategic command and controls systems 27 Knowing these were the Soviet goals, we are placed in a better position to evaluate the present state of the Soviet strategic command and control network. The Utility of the Penkovskiy Reports In the Seventies Several intelligence researchers maintain that the evolution of Soviet strategic forces, combined with the inflow of technical and documentary evidence during the last few years, has converted the Penkovskiy papers into "just historical" documents, with no lasting relevance to the situation in the mid or late Seventies. Regarding documentary material, and aware of the "apples and oranges" situation, some believe that the Soviet statements at the Strategic Arms Limitations Talks (even though they are skewed by the multi- lateral arena in which they are voiced) have developed into a collec- tion of evidence on Soviet strategic thinking more valuable than major parts of the Penkovskiy collection (prepared for a far different audience and not reflecting in all cases the agreed upon, prevailing doctrine). Other contributors to Studies have highlighted the kinds of detailed information we have received over the last ten years and can expect from technical collection systems in the Seventies. So, with the premise and prognosis of my colleagues that the IRON BARK will continue to be buried by a flood of high quality technical and documentary strategic information, I will conclude with a few words on the tremendous analytical mileage which has accrued from the Penkovskiy contribution. 21 A "single centralized system of communication with wide-scale use of multichannel radio relay and wire links" was referred to in General Kurochkin's article, op. cit. 16 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 AppronM9fM1eq P05/02/17: CIA-RDP78T03194A0003Q O1$ 913-8 The ten-year-old IRONBARK information stands as one of the most valuable collections in the history of strategic intelligence. The IRONBARK documents covered a period when the Soviets were preparing for a major revision in the three key areas touched on in this Studies article-Soviet military doctrine, organization, and weaponry. The documents were composed at a time when the last major revolution was taking place regarding Soviet perceptions on the nature of a future war, and on the type of weapons and command and control procedures needed to wage that hypothetical conflict. This period represented a major watershed in the transformation of Soviet military thinking away from the Stalinist preference for massive conventional forces, to new patterns of thinking, calling for brand new forces equipped with highly sophisticated, modern weap- onry. Much of the revolutionary IRONBARK material grappled with concepts which the Soviets did not begin to implement until the mid or late Sixties. A lot of what has taken place in Soviet military doctrine in recent years has only been a footnote to the intense debates in the information provided by Colonel Penkovskiy.. Thus, while the ten year old material has less value than it did when it was ten months old, its continuing utility as a checkpoint for our current research is clear. In sum, it is probably going to require another revolution in Soviet military thinking to reverse the present situation, reduce the IRON- BARK itself to footnotes, and relegate the Colonel's legacy to "just historical" documents. SECRET 17 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17: CIA-RDP78T03194A0003Q 1 13-8 No Foreign Dissern Inside Story THE CUBAN MISSILE CRISIS OF 1962: PRESENTING THE PHOTOGRAPHIC EVIDENCE ABROAD It was 0737 in the morning of Sunday 14 October 1962 when Major Richard Heyser began the crossing of Cuba in his U-2. He flew almost due north-on a course some 60 miles to the west of Havana-and passed over the northerly beaches six minutes later. In that brief timespan he took 928 pictures, which covered a swath 75 miles wide. The resolution of his best shots was a matter of three feet. Once past the target, he headed for McCoy Air Force Base near Orlando, Florida. There the exposed film was transferred to special shipping containers, loaded into a courier aircraft, and flown with all deliberate speed to the Naval Photographic Interpretation Center at Suitland, Maryland. It was late in the day when the film arrived; from then on and through the night the Center developed the original negatives and began making duplicate positives--not the usual kind of photoprints on opaque paper, as we amateurs might think, but a special kind of print on clear acetate that the pro's could study over a light table. The first of these duplicates reached the National Photographic Interpretation Center (NPIC) just before 1000 on the morning of 15 October. By 1600 that afternoon the photointerpreters (PI's) were almost certain that they had identified large surface-to-surface missiles; in another hour or so they were sure enought for Arthur Lundahl, the Director of NPIC, to pass the word to CIA Head- quarters. Headquarters, in turn, reached McGeorge Bundy about 2100 that evening. It was his decision to give the President a night's rest and the PI's a night's more labor before putting the earth-shaking evidence before his chief. SECRET 0013 Approved For Release 2005/02/17 : CIA-RDP78TO3194A0003000-8 1 MORI/HRP PAGES 19-42 Approved For Release 2005/02/17 : CIA-RDP78TO31944A0003,QQQ10013-8 SECRET issue `rises The President and his principal advisors were informed the next morning.' This left the question of what to do-- a matter which was resolved after five days of debate and deliberation in favor of a "strict quarantine on all offensive military equipment under ship- ment to Cuba." Once the President reached this basic decision, he had a myriad of second-line but still important decisions to make. Just to touch on one-and incidentially the one that triggered the subject of this essay--consider that word "quarantine." The Presi- dent used it to avoid the more provocative word "blockade," but no matter what he called it, the other man was free to take grave offense. Neither would go down easily with the USSR. In fact it was possible that the quarantine and its enforcement would lead to that well-known series of actions and reactions so often cited in intelligence papers as the unintentioned stairway to general conflict. Though the odds favoring this progress of events were small, they were by no means negligible. Even if events stopped a long way short of the cataclysm, there was still room for a thundering crisis, the outcome of which would depend in significant measure upon the way in which our allies would respond-whether they would support us or back away. During the seven days between the President's learning of the Soviet's emplacement of medium- and intermediate-range ballistic missiles in Cuba and his speech announcing it, a few score principal officers of the Executive Branch worked endlessly and in unpenetrated secrecy. Except for the President, the members of the so-called Ex Comm (the ad hoc executive committee of the NSC), and the top echelon of the intelligence community, few indeed of our fellow countrymen knew what was going on and why, and practically no one in the governments of our allies. Until the President was ready to act, the Russians must not know that we knew their secret, and, when we were ready to act, our allies should know our chosen course before our adversaries. It was to this end that the Ex Comm drafted for the President's approval a time-table of consecutive actions which included the briefings of the chiefs of government of our princi- pal allies. L A good bit has been written on the subject of the missile crisis. The best full account is still Elie Abel, The Missile Crisis (Philadelphia and New York, 1966). Mr. Abel's material comes in very large part from oral testimony-taken while events were still fresh in mind-from most of the major American policy officers and a few of the British. Robert Kennedy's Thirteen Days (New York, 1969) is an important first- hand account. SECRET Appied For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApproMsfi ~rsease 2005/02/17: CIA-RDP78T03194A0003((~0013-8 At A hour of D day (a time which became 1900 EDST Monday 22 October) the President was to tell publicly what was wrong in Cuba and what the US government proposed to do about it. At about A minus 12, the British were to receive formal advance notice, about four hours later the French and the Germans, and later still the Canadians? Our ambassadors were to call upon the chiefs of government, deliver personal letters from the President and a copy of the speech to be delivered that night, and make whatever oral comment was appropriate. Each of them was also to have copies of the air photos and (for the presentations to the British, French, Germans, and Canadians) an intelligence officer from CIA. head- quarters to brief and answer questions as necessary. Of our ambassadors to the UK, France, the Federal Republic, and Canada, only Mr. Bruce was at his post in London. Mr. Dowling was not in Bonn; he was in Georgia on compassionate leave. Mr. Bohlen, our ambassador-designate to Paris, was on his way on a boat in mid-Atlantic,3 and Mr. Butterworth, the ambassador-designate to Ottawa, was not to assume his functions until after the New Year. In Mr. Dowling's case there was a remedy, a speedy termination of his leave; as for Mr. Bohlen and Mr. Butterworth, there was no remedy but that of finding worthy substitutes. For the group heading for Europe there was to be a presidential aircraft (Air Force One) which would transport Mr. Dowling, Mr. Acheson (the substitute for Mr. Bohlen), the documents, the pictures and their CIA security courier Edward Enck, and the three CIA men to do the intelligence briefing. Chester Cooper, who had had a tour of duty in London, was to be with Mr. Bruce; R. Jack Smith (who was AD/Cl at the time) was to go on to Bonn with Mr. Dowling; and I had the honor to be with Mr. Acheson. In place of the absent Mr. Butterworth, the President called from private life Mr. Livingston Merchant (who a few months earlier had resigned as our ambassador to Canada and left the Foreign Service). He and William Tidwell, his CIA intelligence briefer, made their separate ways to Ottawa. There is some evidence that first planning in the Ex Comm did not envisage that the intelligence briefing of the chiefs of government 2 The Turks and Italians were also to receive advance notice. 3 Between ambassadorial assignments Mr. Bohlen had been keeping Soviet matters under special scrutiny for the benefit of the President and Secretary of State. His appointment to Paris had come only shortly before the discovery of the missiles in Cuba. After this turn of events, President Kennedy was torn between keeping Bohlen at his side in Washington or releasing him to take up his duties in France. The result was some temporizing which led to Mr. Bohlen's late departure. SECRET 2 Approved For Release 2005/02/17 : CIA-RDP78T03194A0003000T0'013-8 Approved For Release 2005/02/17 : CIA-RDP78T0319/440Q000010013-8 SECRET Missile would take place simultaneously with the ambassadors' presenta- tions of the case. Rather the technical intelligence colloquy was to take place on a service-to-service basis soon after the principals had met. I mention this to indicate that the Ex Comm did consider the intelligence aspects of the multi-national maneuver and came to attach a high importance to it. Whether the Ex Comm worried about the credibility of photo- graphic evidence (it was the only solid evidence there was) I do not know, but I do know that a few very important officers of the Agency did. Accordingly, Cooper, Smith, Tidwell, and I were urged to pay particular attention to the way in which our audiences responded to the photographs and to record these reactions in our memos for the record. We were also urged to make these memos as full and detailed as other demands on our time would permit. Cooper and I did find the time to write up our experiences at length. Smith, who did not, spent some time last June (1971) giving me the benefit of his remembrance of the events almost nine years back. Tidwell wrote only a short memo, of which more later, since the magis- terial Memorandum of Conversation which Mr. Merchant filed with the Department of State covered the subject with depth and thorough- ness. In these communications there is much of interest to the intelli- gence calling. But let the memos speak for themselves. First from a shortened version of Chester Cooper's "Memorandum for the Record" of 29 October 1962: The Prime Minister On Monday, 22 October [1230 London time] I accompanied the Ambassador to the Admiralty to assist him in briefing Mr. Macmillan on the situation in Cuba. The letter from the Presi- dent had been sent to the Prime Minister's office earlier in the (lay. We delayed our session with the Prime Minister for half an hour, hoping to bring with us an advance draft of the President's message. The Prime Minister was alone except for his Private Secretary. It was evident that the Prime Minister had some advance gen- oral knowledge of the developing situation in Cuba (as indeed he should have since we had briefed various members of the British intelligence community several days before in Washington). However, Mr. Macmillan obviously had no idea of the extent or precise nature of Soviet offensive capabilities in Cuba. His first reaction, which he addressed more to himself than to the Ambassa- dor, was to the effect that the British people, who had been SECRET Appaed For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApprMt,+ l1f6i' eIease 2005/02/17: CIA-RDP78T03194A000 4013-8 living in the shadow of annihilation for the past many years, had somehow been able to live more or less normal lives and he felt that the Americans, now confronted with a similar situation would, after the initial shock, make a similar adjustment. "Life goes on somehow." The Prime Minister was obviously aware that this might be mis- interpreted, and went to considerable length to explain to the Ambassa- dor that this was more of a philosophical commentary on human nature than any indication on his part that he was not sympathetic with the US position or shocked at the news. After my recitation of the present Soviet offensive strength in Cuba, Mr. Macmillan said that, if the President were convinced that a meaningful offensive capability were present, "That was good enough for him." He did not spend more than a few seconds on the photographs. Although the Prime Minister did not develop this theme in my presence in detail, he did indicate that he felt that a blockade would be difficult to enforce and that the US would have problems in getting solid UN support. He also rumi- nated about whether it would not have been better to have con- fronted Khrushchev privately with our evidence and given him a private ultimatum. Lord Home then joined the Prime Minister and the Ambassador for a discussion of policy matters and I was excused. I was quickly followed by the Private Secretary who stressed the necessity for making our evidence as convincing as possible to the British public. . . . Members of the Shadow Cabinet Cooper also briefed Hugh Gaitskell and George Brown of the British Shadow Cabinet. He, Ambassador Bruce, and two embassy officers met with them on Tuesday evening. Cooper told the story and showed the photographs. Gaitskell, who up until that time had feared that the President was confusing the issue of the Soviet buildup by making it appear that surface-to-air missiles were offensive weapons, confessed his earlier apprehensions and acknowledged that they were ill-founded. He was visibly shaken by the evidence of the long-range missiles. He made much of the analogy between Cuba and Turkey and brushed aside most of the standard arguments about the differ- ence between the two. However, he seemed much impressed with the fact that the Cuban missiles were outside the BMEWS sys- SECRET 23 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr for Release 2005/02/17 : CIA-RDP78T03194 A~Q %1p013-8 tem. He felt that this did, in fact, represent a change in the status quo and in the "balance of terror" question. George Brown was concerned as to whether the United States had deployed more or fewer Jupiter missiles in Turkey than the Soviets were putting into Cuba and as to the Soviets' capability for early warning of the firing of these missiles. Cooper said he would try to get enlightenment for Brown on both matters. Brown's point, and one to which Gaitskell assented, was that if the United States did indeed have fewer missiles in Turkey than the Soviets would have in Cuba and if the Soviets did have an early warning capability, the argument about the equivalence of the Turkish and Cuban bases would be weakened. Gaitskell said that he had been with the Prime Minister just prior to our discussion and that the Prime Minister expressed annoyance about the lack of advance knowledge of US actions. I pointed out to Gaitskell in fairly strong terms that there were two aspects to the question of advanced knowledge: one was the developing situation in Cuba and the other was US intentions with respect to Cuba. In connection with the former, I told Gaitskell that we had occasion to discuss Cuba with several important people in the British intelligence community who happened to be in Washington during the week of 15 October, and that several of them had been given a formal briefing on Friday, 19 October. We could only assume that they notified their government of the developing situation in Cuba. With respect to US intentions, I noted that we had hoped to get an advanced copy of the President's statement to the Prime Minister 12 hours before the broadcast, but that this was not possible because the President himself had not decided on the precise language of his statement until fairly late in the day. . . . This was unfortunate, but in the nature of the circumstances, was all that could have been done. . - . The British Intelligence Community Ambassador Bruce and Cooper agreed that it would be wise to give the briefing to the British Joint Intelligence Committee, and Q got in touch with Sir Hugh Stephenson (the JIC Chairman), who set the time for 1000 Tuesday morning. There was no evident skepticism of the validity of our evidence, but it was clear that the Air Ministry was anxious to get the photo take for analysis by their own PI's (a team of Air 25X1 24 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Appr9 i c r lease 2005/02/17 : CIA-RDP78T03194A0003 P013-8 Ministry officers was provided an opportunity for closer examinination of the photos later in the afternoon). There was, naturally, considerable speculation as to Soviet motives. To the extent that there was any consensus in the JIC, it was very much along the line propounded by Sir Dick [White] the previous evening. ... [Namely: that the Soviet aim was to confront the President late in November with a fait accompli in Cuba, a vantage point from which Khrushchev could bargain for a definitive settlement of the Berlin question and the question of US foreign bases in general.] Because of the adverse or skeptical press reaction to US claims that the USSR had offensive missile bases in Cuba, the Ambassador and the Public Affairs Officer were anxious to have a press briefing as early as possible on Tuesday. At 5:00 p.m., Tuesday, a press conference was held for representatives of all the dailies, BBC, and ITV. The conference was chaired by Evans, the PAO, and. attended by Minister Jones and myself. After indicating the ground rule ("backgrounder," no attribution, etc.), Mr. Evans briefly described the situation in Cuba and indicated that I, a Department of Defense consultant, would show the photographs and explain some of the background of the build-up. I did this, guided by the instructions I had received from Washington. The questions which followed were friendly and I had the feeling after the conference was over (it lasted about an hour) that the press representatives were genu- inely convinced of the US case. I released the photographs, with- out the identification of their precise locations, to the press. (A fuller description of the circumstances of the release of the photographs is attached at Annex.) Later Tuesday evening both the BBC and ITV had major programs dealing with the Cuban crises. The BBC broadcast the Foreign Minister's speech [which indicated strong support for the US position and a condemnation of the Soviet Union] and documented his remarks by the use of the photographs which I had supplied to the BBC. SECRET 25 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Missile Crisis Annex-Release of Pictures to Press 4 The following consideration influenced my decision to release the photographs of the Soviet build-up to the British press: Immediately following my briefing of the Prime Minister, Philip De Zuluetta, the Prime Minister's Private Secretary, expressed serious concern about the reception any strong Govern- ment statement would have in the absence of incontrovertible proof of the missile build-up. 0n Tuesday morning (23 October) the British press was almost universally skeptical of the President's claim that the USSR had established offensive bases in Cuba. References were made to the forthcoming election and to the "failures" of past US intelligence efforts re Cuba. 0n Tuesday morning, also, there was some uncertainty as to whether, at the DOD press conference following the President's broadcast, the press was shown the pictures or whether it was given the pictures. After my briefing of key Embassy officers at noon on 'T'uesday, the PAO and the Minister urged the necessity of providing the British press with a clear and authoritative story on the build-up. I was asked to do this (the Ambassador subsequently expressed his own desire that this be done) and was also urged to show the pictures on a special BBC television program scheduled 4 Elie Abel (op. cit., p. 138) has the following comment on the release of the pictures to the British press. The last line is in conflict with Cooper's testimony, as well as the fact that the London TV of Tuesday night showed the photographs, and the London press of Wednesday morning was loaded with them. Sir David and Lady Ormsby Gore had received a pre-crisis invitation to join the Kennedys that evening [Tuesday 23 October] for a private dinner-dance. The dance, of course, had been canceled. But Mrs. Kennedy invited the Ormsby Gores to bring to dinner some Embassy guests who had arrived from New York too late to be forewarned of the cancellation. The British Ambassador found the President in no mood for social chatter. The two went off together for a talk about the day's events and what the morrow might bring. Sir David was worried about the skeptical British press reaction. Even the President's friend, Hugh Gaitskell, leader of the Labor Opposition, had talked of "so-called missiles" in Cuba. The Ambassador felt it was most important that the missile-site photographs be pub- lished, especially those that would most readily persuade laymen that the Soviet missiles were indeed installed. The President sent for the photographs and together the two re-examined them closely. Ormsby Gore's plea, reinforcing the direct appeal of Ambassador Bruce in London, helped the President decide to publish the pictures next day. Approved For Release 2005/02/17 : CIA-RDP78T03194A0003DQ01b013-8 Appro iegili00elease 2005/02/17: CIA-RDP78T03194A000 013-8 for Tuesday night. I refused to appear on television, agreed to participate (but not sponsor a press briefing) and requested Headquarters' permission to have the pictures shown on BBC. I received permission to have the pictures shown on television on the basis of the Ambassador's urgent request. The localities of the sites were to be removed and the press and the television audiences were to be told that these were typical sites but were not to be informed of the number of sites. After consultation with Embassy officials, I agreed that since the pictures were going to be shown on television (it subsequently developed that ITV as well as BBC was going to have a special Cuba program) we could release sanitized versions of the photographs to the press for publication Wed- nesday morning. I informed Headquarters at my first opportunity (which was after the Gaitskell briefing at 2100) of this release. Sometime after midnight I was in telephone communication with the White House (Forrestal) and explained briefly the circumstances of release. Air Force One which had left Cooper at Greenham Common Air Force Base in the United Kingdom and had left Mr. Acheson and me at Evreux, an air base in France used by the USAF-flew on to Cologne in the Federal Republic and disembarked Ambassador Dowling, Edward Enck the courier, and R. J. Smith. The time was well on towards Monday's dawn (22 October). The meeting with the Chancellor, who had been electioneering in Hanover all day, did not take place until 1900. Herr Adenauer received Dowling and Smith in the Chancellor's official residence. He had provided the interpreter. As Smith remembers it, Ambassador Dowling gave the Chancellor the personal letter from President Kennedy, and with the reason for the meeting clear, introduced Mr. Smith of the CIA who was to show the evidence for the President's concern. The Chancellor's first response was characteristic: it showed perhaps his amused annoyance at the Gehlen organization's habit of using pseudonyms even within the official family and certainly something more than a trace of his legendary suspicion of everything. "Are you sure your name is Smith? Perhaps you have two names," SECRET 27 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr g~e or Release 2005/02/17: CIA-RDP78TO3194A000300010013-8 Missile Crisis he said, just by way of getting things straight at the start .5 Unruffled, Smith said that his name was really Smith and began the briefing with the photographs, which were contained in an outsized carrying case. The Chancellor asked him if he slept in it, but Smith pushed on. They were seated at a low table, Smith and Herr Adenauer side by side, with Ambassador Dowling across. As the dramatically illustrated story unfolded, Adenauer was an attentive listener. Seemingly concerned to indicate his general familiarity with the sort of military intelligence being laid before him, he asked questions such as one regarding the state of readiness of the surface-to-surface missiles. (As it came through the interpreter, it was to the effect "were they warm or cold?") There was no question but that he was impressed with the evidence. Far from showing any incredulity, he indicated that he was not at all surprised to hear of these Soviet doings. His tone was one of "this is what one must expect of them." Nor did he leave any doubt in Ambassador Dowling's mind that he would support the President's adopted course of action. "You may assure your President that I will be useful" is the way Smith remembers his reassuring comment s Some three weeks after the dialogue in Bonn the Chancellor and key members of the German government made a state visit to Washington. As R. J. Smith recounts the incident, the White House decided that one of the features of the program for the Germans should be a briefing which would detail for Chancellor Adenauer precisely how the Russian missiles were removed from Cuba. Smith was asked to perform this chore, the venue for which was the Cabinet Room in full panoply. The German Chancellor sat on one side of the table, flanked with his defense and foreign min- isters; President Kennedy sat across from him, flanked by Secretaries Rusk and McNamara. Smith sat behind the Chancellor and, on signal from the President to begin the briefing, stood up and placed the first briefing board on the table before Chancellor Adenauer. As he did so, he said, "Chancellor Adenauer, I am Mr. Smith." Adenauer looked up, his ancient face impassive, and said, "Immer," which the translator rendered as "still." This cracked Smith up and the Chancellor chuckled, whereupon Smith felt obliged to explain the joke to the distinguished group. The President smiled frostily and urged Smith to continue. 6 High officers of our government thought that there would be no harm in reinforcing the Chancellor's decision to be "helpful." Knowing of his warm personal friendship with Mr. Acheson and his high respect for General de Gaulle, they asked Mr. Acheson to pass through Bonn on his way home and discuss the situation anew and tell of de Gaulle's reaction to the President's chosen course of action. This is worth a footnote if for no other reason than to set a woefully confused chronology straight. Washington sent a night action cable to Mr. Acheson Monday night 22 October; it reached his attention in the small hours of Tuesday (23 October). He went to Bonn during that very day, and with Mr. Dowling saw the Chancellor for two hours late in the after- noon. Needless to say, the mission was a great success. Neither the official memorandum of conversation, nor Mr. Acheson's memory of the interview as reported in C. L. Sulzberger, The Last of the Giants (New York, 1970), p. 931, mentions the photographic evidence. 28 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApprpNR# jFiRplease 2005/02/17 : CIA-RDP78T03194A000 013-8 Mr. Acheson and I with Mr. Dowling and Smith flew on from our UK stop to Evreux where we were met by Cecil Lyon, the charge in Paris, Ambassador to NATO Mr. Finletter, and Edward Ryan, I land an armed courier. It was then about 0130 local time. Mr. Acheson, with Messrs. Lyon and Finletter, proceeded directly to Lyon's residence. Ryan, the courier, and I went to the Embassy to put the materials in the vault. About noon (Monday 22 October) there was an assembly at Mr. Lyon's house of high-ranking officers from the Embassy, from our delegation to the North Atlantic Council, and from among our military men in France. I gave the intelligence briefing using the photographs. Meeting with President de Gaulle at the Elysee Palace At 4:40 Laughlin Campbell, and I again appeared at Mr. Lyon's residence where two modest auto- mobiles from the Elysee Palace awaited us. Mr. Acheson and Mr. Lyon, with a presidential escort officer, took one; Campbell and I (with the photographs) the other. We entered the Elysee through the regular entrance on the Rue du Faubourg St. Honore. Once within the first courtyard we followed a tortuous course from court to inner court to inner court and were finally brought up to an un- prepossessing doorway under guard.8 We proceeded down small 7 The memo was dictated on 28 and 29 October 1962 and typed up a couple of weeks later. 8 In short, the French neglected nothing in assuring that Mr. Acheson-a recognizable man in almost any corner of the world-would not be recognized by a casual bystander. His meeting with the President had to be kept secret until "A" hour which would have been about midnight in Paris. Mr. Acheson's well-known powers as a raconteur were stimulated by the route we took; I kept getting playbacks from third parties which became harder and harder to recognize. The penultimate version occurs in C. L. Sulzberger's book, already cited, p. 930. He says he got it from Paul Nitze, who said he got it from Mr. Acheson, and it involved "Acheson [being] smuggled into de Gaulle's office by an underground tunnel from across the street." Apparently so high was the credibility of this unlikely story that ace newsman Sulzberger who had lived in Paris some twenty years and knew the environs of the Elysee as well as those of the White House swallowed that secret tunnel without even a footnote. If perchance the reader happens to be the studious sort who checks references, he may be disturbed to read Sulzberger's two sentences following the one about the tunnel. They go: "Acheson went in alone except for the Elysee interpreter. Not even Sherman (See footnote on following page.) 25X1 SECRET 29 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Missile Crisis corridors, up small corridors, up small stairways, through more corridors and stairways until we finally arrived at a large room adjoining the President's private office. My guess is that if this were not the Cabinet Room it served some such purpose. There was a very large oval table which would have seated perhaps 20 people. The four Americans and the escort officer were here joined by another Frenchman who turned out to be an emergency interpreter. After a few minutes' wait-which would have been a minute or so after---Mr. Lyon and Mr. Acheson were ushered into the General's office. Mr. Lyon has reported by cable on what took place. Campbell and I waited for perhaps 20 minutes; then the two of us were invited in. After I had completed the first draft of this memorandum, I saw Mr. Acheson, who told me the following about his discussion with de Gaulle. When he had conveyed his message he told the General that there was an intelligence officer waiting outside to brief him on the evidence. General de Gaulle's response was that he needed no such evidence; he was satisfied with Mr. Acheson's account; after all, President Kennedy obviously would not have sent a man of Mr. Acheson's eminence to give him misinformation. Mr. Acheson said he thought the General would be interested.9 The presidential presence was awesome. I was prepared for the height but not for the bulk. At the moment of shock he seemed to be about twice the size of normal men. His eyes too were somewhat unnerving, shielded as they were behind the thick lenses made necessary by the removal of cataracts. I can recall a feeling of (Footnote 8 continued) Kent was allowed." May I assert that this is another error (either Nitze's or Sulzberger's--certainly not Mr. Acheson's); that I did go in; and that the memo for the record which you are now reading is not a self-serving fabrication. The peak occurs in Kenneth Harris' write-up of an interview with Mr. Acheson (Life, 23 July 1971, p. 52). The operative passage runs thus: "'-',o he I General de Gaullei sent two small French cars, and we drove down into the garage basement of the palace and were led up through the basement past the wine closets. There were all sorts of steel doors with little eyelet holes in them, and people would look through and give a password. I had a very amusing CIA friend along with the photographs. halfway through this, he said: "D'Artagnan, is that saber loose in the scabbard?" And I said, "Aye, Porthos." And he said: "Be on the alert. The Cardinal's men may be waiting." Finally, we were brought up into the cabinet room, where an old friend of ours, whose name was Lebel, greeted us.... 9 Elie Abel (op. cit., p. 112) has a slightly different version whose primary source was almost certainly Mr. Acheson. It goes: "Then Acheson offered to show the photographs. De Gaulle swept them aside. 'A great government such as yours does not act without evidence.' " Appled For Release 2005/02/17: CIA-RDP78T03194A0001T0013-8 Appro ;FeoC ease 2005/02/17: CIA-RDP78T03194A00034P~*@913-8 despair that came with the realization that the evidence which we were about to present was wholly visual evidence. (As it turned out my fears were groundless.) As Campbell and I entered, he rose from his small desk-not much larger than our photographs-and gravely shook hands. He gave me the nod to begin. Campbell handed me the large photograph of the map of Cuba which I put before the General. Still standing, he bent over it as I began to talk about the defensive phase. I mentioned first the arrival of large numbers of Soviet personnel, quantitites of transportation, communications and electronic equipment. Next I came to the SAM's, pointing out the SAM symbol on the map. To my great comfort he at once identified the symbol and with his own finger pointed to a number of the others. I then showed him the photograph of a SAM site which he seemingly identified at once. I passed on the photograph of Santa Clara airfield, pointing out the MIG-21's. There was a reading glass which he picked up and put into the proper position, looked at the swept-wing aircraft, and indicated that this was a remarkable photograph. I quickly showed him the Komars and the surface- to-surface cruise missiles. The word "cruise" was the only technical term [which the interpreter] did not cope with instantly. He snapped a finger in annoyance and then realized that salvation lay on the graphic itself for this photograph had as an inset a diagram of the little winged missile. I then [took up] the offensive phase, showed him the II-28 crates being carried as deck cargo, showed him the San Julian airfield, pointed out the crates, the assembled IL-28 and the two uncrated fuselages. Again he picked up the reading glass and ex- amined the picture carefully. I then went to MR-1 [Medium Range Ballistic Missile site called number one] at San Cristobal and the MR site at Sagua la Grande. Next came the IR [Inter- mediate Range Ballistic Missile] site at Guanajay. Coming back to the map again I totted up the number of confirmed sites, the number of probables plus the possibles at Remedios. I then went over our estimates of degree of readiness and gave him a worst case estimate as of the moment of speaking and another worst case as of early 1963. I discussed briefly nuclear warheads, the fact that we could not positively identify any but noted the high degree of probability that they were in Cuba and the highly suspicious storage areas being readied. I called his attention to the storage site at Guanajay. I noted our estimate of the yield SECRET 31 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApnrLw .cLFor Release 2005/02/17: CIA-RDP78TO319 A0Q,03~0Q10013-8 issI a rlsis of these warheads as two to three megatons for the MR's and three to five for the IR's. I closed with a reminder that as of early 1963 our worst case estimate could augment present Soviet first strike capabilities with missiles by some 50%. Not once in the course of my briefing was there any hint of incredulity on the part of the General. If he was not perfectly satisfied that the pictures were scenes from Cuba and the weapons those which I asserted them to be, he gave me no inkling of doubt. Furthermore, if he had expressed doubts to Mr. Acheson and Mr. Lyon [after Campbell and I had left the room], I am sure they would have reported it... . During the day I Ireceived the USIB-approved brief- ing note to be read to the NAC. Mr. Acheson got a copy and had read it. Meanwhile we hopefully awaited the full text of the speech which the President would deliver at midnight local time. The NAC meeting was scheduled for 10 PM. By the time I had to leave the Embassy only Part 1 of 4 had been received. The Acting Chairman [of the North Atlantic Council] was Colonna of Italy. He introduced Mr. Acheson as needing no intro- duction to the group, noting that he was on a special mission for the President of the US... . Mr. Acheson began by briefly dis- cussing the nature of [his] mission, read some excerpts from the portion of the President's speech that he had at hand and then in- dicating that he wished to read a statement, introduced me as Assistant Director, CIA, who was there to answer questions when he finished reading his prepared text. He then read the text. There were a few questions on the estimated performance of the MR's and IR's, a general question about their state of readiness, and after the meeting an aide of the German permanent repre- sentative followed us to Mr. Finletter's office to ask the estimated yield of the warheads. . . . As per USIB instruction, I used no graphics whatever with one exception. I passed around an unclassified map. It showed what por- tions of North, Central, and South America the MR's and IR's could reach. Among the metropolitan areas of the US under the gun were New York, Philadelphia, the District of Columbia, Chicago, San Francisco, etc., and in this distinguished company, one found Oxford, Mississippi. It had been spotted on the map by a roguish CIA man to show Robert Kennedy, who had wondered out loud if Oxford (then 32 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appro ;FeoC,I ease 2005/02/17 : CIA-RDP78T03194A0003q@x1&913-8 much on Mr. Kennedy's mind as the place where bitter racial con- troversy had enveloped the state's university campus) was within range. I never recovered the map and have often wondered how some analyst of one of the NATO intelligence services explained how Ox- ford, Mississippi came to be listed among the great metropolises. From the council there were no questions about the sources of our information and no questions whatever to indicate any doubt that Mr. Acheson's story was not in fact a true story. The meeting ad- journed just in time for the members to hear the President's speech which began at midnight Paris time. Next day, Tuesday 23 October, under instructions from Head- quarters, Campbell and I made the trip to the SDECE (the French secret intelligence service) and briefed the Director, General Jacquier, and a few of his principal officers. Our experience was much like Cooper's with the British JIC. There was great interest and no hint of doubt with respect to the genuineness of the photographs. There were no questions even about the pictures of the IR site and the surface-to-surface cruise missiles, the identification of which re- quired a lot more faith than simple good eyesight. The Briefing of the French Press We returned to the Embassy by about 3:30 to find that USIB had authorized the briefing of the French Press, had supplied a briefing text and instructions with respect to the use of the graphics. John Mowinkle, the Public Affairs Officer, under instruction from the charge called the press conference for 10:30 the next morning, Wednes- day, 24 October. Mowinkle himself was not to do the briefing but was to entrust the job to an assistant who had a greater familiarity with military matters than Mowinkle himself. It was further decided, and this was entirely satisfactory with me, that I would make no appearance before the newspaper men but would confine my activities to reading the assistant in on the subject and making sure that the graphics were keyed into his spoken statement in fool-proof manner. It will be recalled that USIB's instructions re this briefing were as follows: the briefer was to follow a USIB-approved text which was at hand. The briefer was to refer to certain stipulated graphics. The number was perhaps no more than half of the total number . . . in the kit. All place names, locational data, and numbers were to be removed from the graphics. Members of the press could study the graphics but could not reproduce them. Graphics were not to be allowed outside the Embassy building. SECRET 33 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 AppSpp pff or Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Missile Crisis In the light of these instructions I personally selected the graphics as indicated, cut off the headings at the top of the prints, removed the little box in each photograph which contained the orientation map of Cuba with its designating arrow, the classifi- cation, and where indicated obliterated locational information and numbers. Two graphics had to be improvised. These were a map of the West- ern Hemisphere showing approximate ranges of the MR's and IR's (the map I had not recovered from the NAC) and a map of Cuba showing what Cuban air space was under protection of the SAM's. I went over the briefing notes carefully, patched up a needless ob- scurity in one paragraph and keyed the graphics to the text. With my breakfast arrived a copy of the International edition of the New York Herald Tribune. To my very considerable surprise, smack in the middle of the top half of the front page and three or four columns wide, was the photograph of the SAM site referred to in the briefing note. A few minutes later, upon arrival at the Embassy, I was informed that the whole kit of photographs had been released to the British press the night before, that they were appearing in the London papers this morning and indeed had appeared on two British TV programs last night. A few minutes later I was shown two Paris morning papers, one of which carried the SAM site above mentioned, the other, the picture of the SAM support area which I had not been authorized even to show to the French Press. I conferred with I as to the best procedure and we agreed that I should call Washington for permission to release repro- ductions of the graphics which were to be shown to the French Press at 10:30 this morning. There was some difficulty in getting through to Washington and it was not until about 9:50 AM local time that I reached the CIA Watch Office. Ten or fifteen minutes later they called back authorizing the release if statisfactory to the charge. Ile agreed to the release of four pictures. An Embassy pressman accordingly scotch-taped the four pictures in question (MR-1, 1R-1, the IL-28's at San Julian and the MIG's at Santa Clara) to the floor and photo- graphed them. Enlarged prints of these shots went to the French press. Briefing of Andre Fontaine of Le Monde Andre Fontaine, one of the important feature writers of Le Monde (France's leading afternoon paper) 34 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appro UgsFIRrf cease 2005/02/17 : CIA-RDP78T03194A00030Sp aR 13-8 had had time to hear and study the President's speech of mid- night, 22 October, and to write an unsympathetic front page column on US policy toward Cuba.10 His articles are usually signed; this one was not. The second paragraph banged into the credibility of the evidence. "One would like to be sure of the ac- curacy of the information" upon which the President has acted. "But unhappily, experience shows that the American intelli- gence services sometimes make mistakes." This set the tone. Later on he again obliquely challenged the evidence in the fourth paragraph which contains the sentence, "If the Russians have not really delivered and do not have the intention of deliver- ing... ." In short, M. Fontaine was from Missouri and had rather persuasively set forth his doubts about the evidence and his views-totally unsympathetic to the US-for the edification of France's best educated and probably most conservative read- ing elite. Mowinkle who knew Fontaine well was most anxious that I see [him] and go over the script and graphics with him. The [charge] agreed. I was presented to Fontaine under a pseudo as a Department of Defense civilian temporarily in Paris. Accordingly I gave him the word. I began by calling his attention to the fact that neither he nor I were expert enough in the PI's art to identify the terrain as Cuban or some of the weapons and sites as to what they really were. I told him that if he thought that I was about to embark upon a snow job with fabricated graphics I was prepared to call it off right there; that if he were willing to take on faith the fact this countryside was Cuban and the weapons in fact were what I said they were, we would proceed. Interestingly, he then said, "No. I am prepared to believe you because Castro himself in a speech of yesterday proclaimed that American aircraft had been violating Cuban air space. This is good enough evidence for me to believe that you have been overflying Cuba and photographing it from the air." With these formalities over, I ran through the exercise with the sanitized pictures. Almost the only question he asked was the altitude from which the pictures were taken. He presumed that this was secret. I indicated that it was indeed secret and let it go at that. I left Paris before Le Monde, dated 26 October, was printed. 10 This appeared in Le Monde of Tuesday afternoon 23 October. For reasons best known to the publisher, the paper is dated one day ahead, thus this issue of Le Monde is one bearing the date 24 October 1962. SECRET 35 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 SECRET Missile Crisis In this issue M. Fontaine grudgingly acknowledged that the mis- siles were in fact in Cuba, citing that both the British government and his colleagues of the British press believed the photographs and furthermore Castro himself had lent credence to the matter by de- nouncing American photo reconnaissance flights as violations of Cuban air space. Livingston Merchant, President Kennedy's special emissary to the Canadian government, William Tidwell, the Agency officer told off to do the intelligence briefing (with the photographs), along with our charge d'affaires, and F_ :J met at 1700 (22 October) with Prime Minister Diefenbaker and his Secre- taries for External Affairs and Defense, Messrs. Green and Harkness. Mr. Merchant described the situation in Cuba and handed the Prime Minister the text of the President's speech (to be delivered in two hours). Mr. Diefenbaker read it rapidly and passed it to these two cabinet colleagues. He then asked Mr. Merchant to summarize the main points, which Mr. Merchant did, and then he read the whole speech aloud. Apparently two matters bothered the Prime Minister. One was the use of two words "dishonest" and "dishonorable" which in the draft speech were applied to Gromyko's statements to the President when the two had met on 18 October; the other was the credibility of the evidence of the missiles in Cuba. He made an abbre- viated note to remind himself of the two points which read "I. Dis- honest and dishonorable/ withdrawal of/Ambassador" [and] "2. How to present proof of/threat to/UN or OAS." 11 'l.'he first of these he straightway took up and with repetitions and some vehemence. They were unnecessary and provocative words; they might result, for example, in the Soviet Union's withdrawal of its ambassador in the United States, he thought. He hoped that they would not be used. The second he seems not to have got around to. Most likely the reason was his viewing of the photographs which 1' Mr. Tidwell wrote a memo to the Curator, Historical Intelligence Collection which reads in part: 2. During the briefing session Mr. Diefenbaker made several notes as re- minders to himself. At the conclusion of the briefing he tore up the notes and threw them on the floor. In the course of my security check of the room after the briefing, I picked up the fragments of his notes. They are forwarded with this memorandum for retention in the Historical Intelligence Collection. The notes read as I have rendered them above. 25X1 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Appro'MidsF1eiRe1ease 2005/02/17: CIA-RDP78TO3194A0003CMW13-8 Tidwell presented.12 The three Canadians were clearly impressed and asked a range of questions which, far from indicating incredulity, were of the sort which showed a ready acceptance of the evidence. Indeed it seemed to the Americans that the photographs themselves may have had much to do with a lightening of the Prime Minister's mood, which at the beginning had been that of a worried and harassed man. At the end, he left Mr. Merchant with the impression that he would support the President and he complimented Tidwell on the quality of the intelligence briefing. Tidwell stayed behind to give the briefing to half a dozen of the next most important officers of the Canadian government involved in the foreign affairs of the country. Like similar groups in other friendly states, they believed what they saw and they were impressed. 12 It may be, as Mr. Tidwell himself suggests in the memo, that Mr. Diefenbaker's self-addressed query about "how to present proof of the threat to the UN or OAS" derived from his half-formulated thought to ask a group from among the eight unaligned members of the 18-nation disarmament committee to/make an on-site inspection and to furnish "a full and complete understanding of what is taking place in Cuba." This thought, which he quite fully developed only a few minutes later to the Canadian House of Commons, he had not even hinted to the Americans. They noted that he had not said that he would support the President in the chosen course, but they were very con- siderably surprised at his presentation to the Commons. It is perhaps noteworthy that his remarks to the Commons contained no mention of any special audience, UN, OAS, or other. Nor did his remarks to the Commons next day, when he did a little reconsidering: In connection with the suggestion I made last evening that a group of na- tions might be given the opportunity of making an on-site inspection in Cuba, lest there be any doubt about my meaning in that connection, I was not, of course, casting any doubts on the facts of the situation as outlined by the President of the United States in his television address. The govern- ment had been informed of and it believes that there is ample evidence weapons have been constructed in Cuba and exist in sufficient quantities to threaten the security of this hemisphere. The purpose I had in mind in suggesting a United Nations [his remarks of the previous day made no specific mention of the UN. The 18-nation disarma- ment committee did, however, have an association with the UN] on-site in- spection was to be ready to put in motion steps which could be taken in the United Nations general assembly in the event of a Soviet veto, or if the Soviet Union denies the existence in Cuba of offensive ballistic missile bases. (Canada, Parliament, House of Commons Debates, 22 and 23 October :1962, pp. 80&-6 and 821.) In the light of these utterances, it seems to me that Diefenbaker's note about convincing the UN and OAS more likely derived from a certain incredulous- ness which possessed him before a look at the photographs dissipated it. SECRET 37 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apps For Release 2005/02/17: CIA-RDP78TO31 RQP9ff}10013-8 The Credibility of Photographic Evidence As a source of information, overhead photography has always won high marks. From the nineteenth century, when daring men Look cameras aloft in balloons, to our day with its more so- phisticated approach, all who have worked at the intelligence calling or used its findings have recognized the extraordinary virtues of photographs taken from the air. The reception of the U-2's pictures of Cuba in 1962 was proof of more of the same. Any viewer of an air photo is likely to bring with him some asso- ciative apparatus. For example, he has seen airfields from above and he can tell the difference between a picture of an airfield and one of of a freight yard; he may even be able to tell a parked transport airplane from a puddle jumper. Some of the non-PI viewers of the Cuban pictures had had a fairly rich experience with, say, air photos of Soviet installations in East Germany and when they saw small air- craft known to be Soviet models on Santa Clara airfield in Cuba, they could tell the difference between the MIG-17's and the delta- wing MIG-21's. When they saw a bit of the Cuban landscape marked off in the design of a perfect six-pointed star, they instantly recognized the unmistakable signature of the Soviet SAM-the second-generation surface-to-air missile. All viewers, however, took on faith or on the say- so of the purveyors that the pictures were what they claimed to be: scenes from Cuba taken a few days past. When it came to photos of less obvious things than the aircraft and the SAM's all viewers but those indispensable middlemen, the photo- interpreters, had to take virtually everything on faith. In the big glossy prints of the surface-to-surface missile sites, the privileged but nonetheless amateur viewer could discern a number of man-made objects-some looked like long cylindrical tanks, some like oil trucks. lfe could also see bits of equipment parked in or about what "appeared to be no more than the clearing of a field for a farm or the basement of a house." 13 More than this even the witness who could tell one MIG from another could not possibly tell. Of course, the PI could and did. To begin with, what he looked at were better pictures. He had the duplicate positives printed on clear acetate that carried what the camera lens had seen, minimally de- graded by the processing. More, he could arrange these prints in stereoscopic pairs on a light table and study them in three dimensions through a multi-power stereoscopic viewer. When he found something whose exact dimensions he had to know, he could turn to sensitive and 38 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApproMWIFdr-1 islease 2005/02/17 : CIA-RDP78T03194A0003MDRDD13-8 complicated measuring devices and get the answer in feet and frac- tions of feet. Much more important than all of these was his experience. At a glance he would know that some of the objects resembling common- place things of everyday life just could not be what they seemed. Such objects would never occur in these numbers and in this particular constellation of physical surroundings. They had to be something else. He might remember a similar puzzle in other photographs of another time and place and the way it had been cracked. He might recall the process by which he had reduced several competing hypotheses to two and how the final solution had come, not with more photography, but with a wholly different sort of information. With this, he had made a confident estimate that the object in question was a large surface-to- surface missile with its carrier. If such an experience had not been his, perhaps one of his colleagues had a recollection that would help. And if not, he could begin from scratch, summoning from the vitals of a computer the vast wealth of its electronic memory. If in the course of the history of his organization's work it had met cognate puzzles, everything about them could be speedily put on the table. With the deployment of the critical tools, the PI's moved from hy- pothesis to tentative estimate, and, as they became more confident that what they thought they might be seeing was indeed an all-but- dead certainty, they were ready to take their judgment to their chief, Arthur Lundahl. When they convinced him and he convinced him- self, and when he could answer President Kennedy's question "Are you sure that these are offensive missile sites?" with "Mr. President, I am as sure of this as a photointerpreter can be sure of anything . . .," and when the President, reminded of the accuracy of past interpreta- tions, accepted this one, that was it. By their actions Mr. Macmillan and General de Gaulle underscored this fact. As Cooper noted, Macmillan "did not spend more than a few seconds on the photographs;" and except as Mr. Acheson urged him to have a look, General de Gaulle would not have given the photo- graphs even the "few seconds." Their credibility was not at issue: what was was that of Ambassador Bruce and Mr. Acheson and es- pecially that of the man who had sent them, President Kennedy himself. Obviously this elite audience did not think that the President was playing games with them. From what we know of the reaction of civil officials a notch or two below the chiefs of government, they were much the same as those of their masters. For much the same reasons Ormsby Gore (the British Ambassador in Washington), Lord Home, and Sir Burke Trend, SECRET 39 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 AppgpgRgTFor Release 2005/02/17: CIA-RDP78T03194j 3 9,10013-8 Gaitskell, and Brown, and others in London, and Messrs. Green and Harkness in Ottawa accepted the photographs at face. We know nothing of the reactions of the officials in Paris and Bonn to whom de Gaulle and Adenauer confided. With highly placed foreign intelligence professionals the case was much the same. They brought to the pictures a certain amount of critical expertise (but still well below that of a card-carrying PI), and practically to a man they were both amazed and convinced. Sir Kenneth Strong, long Britain's first intelligence officer, General Jacquier, Director of the French SDECE, Mr. McCardle, the Chair- man of the Canadian Joint Intelligence Committee--none of them queried the validity of what they looked at. As Cooper notes in his memo, intelligence officers of the British Air Ministry apparently wanted copies of the photos for their own PI's to examine. But, Cooper assures us, there was nothing necessarily angular about their request. How different the response of those who spoke for others. Mr. Zuluetta, the private secretary of Mr. Macmillan, according to Cooper's testimony, was worried about how a statement of the British government in support of the American decision would go down "without incontrovertible proof of the missile build-up." Next morning the skeptical tone of the British press showed him to have been on the right track. After the release of the first batch of pictures to Brit- ish newsmen, an important British intelligence officer besought American officials in London to release more pictures and more infor- mation about the first ones. He said he was confronted by a great skepticism on the part of the press which was muttering about possible forgeries and expressing doubt that the terrain was in fact Cuba. He felt that the US government should release precise information about the location of the missiles and show a photo of a missile even if it were under canvas. All of this to make the case credible. The Public Affairs officer in our embassy in Paris was worried about the French press and had very much in mind those snide sen- tences that Andre Fontaine had written in Le Monde. Mr. Diefen- baker seemed to have been concerned about how proof of the missiles could be demonstrated to the "world." 14 How much beseeching the press did in its own behalf and how much in behalf of the "world," is another story. The press usually beseeches 14 The operative sentence in Mr. Diefenbaker's remarks of 22 October was: "As to the presence of these offensive weapons, the only sure way that the world can secure the facts would be through an independent inspection." (Canada, Parliament, House of Commons Debates, p. 806.) 40 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approy4iFepeftlease 2005/02/17: CIA-RDP78T03194A0003q?a1n913-8 most eloquently when it senses good front-page copy, and there could be no doubt about the news appeal of this story. The difference between what public relations men asked in behalf of the press and what the press asked in behalf of its readership- the difference between this and what it got, let alone what it gave- is of course well-nigh incalculable. In the first place, the very best prints of the most important installations in Cuba (those which chron- icled the presence of the long-range surface-to-surface missiles) con- veyed next to nothing in themselves. If you were to use a powerful reading glass you might be sure that you perceived some things com- mon to your range of normal experience (the context might offer some passing difficulty, but only if you thought about it), but you would have no valid appreciation of their size, let alone their ominous func- tion. Who, for example among the uninitiated, could have identified a thing resembling a big tent as the air-conditioned structure necessary for the complicated check-out of the missiles? Such being the case, what do you think of the chances of the British subject who first got his information from his television set, a repor- ductive process which had robbed the original glossy prints of at least half their definition? Where do you rate the chances of the still less fortunate Frenchman? He was introduced to the Soviet secrets in Cuba via some half-tones in his morning paper. If you had made a half-tone from the original negative, the loss of definition would probably be as severe as that via TV. Still the Frenchman had no such luck. His was the opportunity to look at half-tones made from enlargements of 35 mm shots of the glossy prints. The amateur photog- rapher who took the shots probably used a good camera with proper lens and film, but he took them in the natural light that filtered through an embassy window, and he did not use a tripod. In these circumstances the man who saw the pictures in next morning's Figaro, even if he were the country's leading photointerpreter, might have had trouble telling whether the camera had been pointed down at Cuba from a high-flying aircraft or pointed up a soundly-positioned proctoscope. No one can ever know how many of the people whose acquaintance with the Cuban pictures was limited to television and press reproduc- tions felt that they were being had. The one thing we do know is that if there were any such people, there were not enough of them to cause the slightest political ripple. All over the world the great majority of people who knew and cared about such things must have looked at the appallingly deficient copies of the original pictures and concluded that their chiefs of government had acted on the basis of incontrovert- SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Missile Crisis ible evidence. Those who disagreed with the course of action which the US had adopted, did so because of the risks which it involved, not because they did not believe the story that the pictures told. Of the millions of people of many nations who saw the pictures that fourth week of October, only a handful, and these were P1's, knew exactly what it was that they were looking at. It was their testimony which convinced the high officers of their government, and from there on out the credibility of the photo evidence was established. What happened in October of 1962 had happened many times before and has happened many times since. To paraphrase once again a famous remark-never have so many taken so much on the say-so of so few. App4 ied For Release 2005/02/17: CIA-RDP78T03194A0003U J 0013-8 Approved For Release 2005/02/17: CIA-RDP78T03194Q4MAtQ013-8 More on probability-I BAYES' THEOREM FOR INTELLIGENCE ANALYSIS* Jack Zlotnick The intelligence interest in probability theory stems from the probabilistic character of customary intelligence judgment. Intel- ligence analysis must usually be undertaken on the basis of incomplete evidence. Intelligence conclusions are therefore char- acteristically hedged by such words and phrases as "very likely," "possibly," "may," "better than even chance," and other qualifiers. This manner of allowing for more than one possibility leaves intel- ligence open to the charge of acting the oracle whose prophecies seek to cover all contingencies. The apt reply to this charge is that intelligence would do poor service by overstating its knowledge. The very best that intelligence can do is to make the most of the evidence without making more of the evidence than it deserves. The best recourse is often to address the probabilities. The professional focus on probabilities has led to some in-house research on possible intelligence applications of Bayes' Theorem. At the time of my participation in this research, I was an analyst in the Central Intelligence Agency, which sponsored the scholarship but took no position of its own on the issues under study. My personal views on these issues, as elaborated in the following pages, have no official character. The Bayesian Approach Bayes' Theorem in its odds-likelihood form served participants in our test program as their diagnostic rule for appraising new evidence. The odds-likelihood formulation of Bayes' Theorem is the equation R is the revised estimate of the odds favoring one hypothesis over another-the estimate of the odds after consideration of the latest item of evidence. P is the prior estimate of the odds-the odds before consideration of the latest item of evidence. There is no escaping some starting estimate of P. However, after the starting estimate was in *Paper presented at the Conference on The Diagnostic Process, Ann Arbor, Michigan, 18 June 1970. UNCLASSIFIED 43 Approved For Release 2005/02/17 : CIA-RDP78TO3194A0003Wa1RO1 -> PAGES 43-52 AppWedAFSgrF~Vlease 2005/02/17: CIA-RDP78TO3194AQQL300010013-8 ayes eorem hand, the participating analysts offered no judgments about P. It was a value carried forward in machine memory from previous analy- sis. R, the result of the mathematical processing, was what went back into machine memory to become the value of P used in consideration of the next item of evidence. The participating analysts offered judg- ments only about L, the likelihood ratio. The likelihood ratio was the analyst's evaluation of the diagnosticity of an item of evidence. Evidence is diagnostic when the chances of its appearing are different if one hypothesis is true than if another hypothesis is true. Suppose intelligence is asked to estimate the comparative merits of two hypotheses-one of imminent war, the other of no imminent war. The estimate is to be expressed in terms of the odds favoring or disfavoring the war hypothesis. The latest evidence is deployment of foreign troops to a border area. Is the deployment deemed to be say two times more likely if the war hypothesis is true than if the no-war hypothesis is true? Then the evidence is certainly diagnostic. The value of L, a judgment of the analyst communicated to the machine processor, would in this case be the fraction 2/1. Three principal features of Bayesian method distinguish it from con- ventional intelligence analysis. The first is that the intelligence analyst is required to quantify judgments which he does not ordinarily express in numerical terms. This requirement to quantify probabilistic judgment is the feature that perhaps draws most of the critical fire against the Bayesian approach in intelligence analysis. A debating point of the critics is that analysts are bound to disagree in their opin- ions of the exact figure that should represent the diagnostic value of an item of evidence. The Bayesian rebuttal is that disagreement among analysts is just as much a characteristic of traditional method and is no less serious for being implicit rather than explicit in the analysis. The critic returns to the debate by observing that the typical analyst, being a verbal and not a mathematical man, finds it inordinately difficult to express his degree of belief to the precision implied by a numerical value. The partisan of Bayes, for his part, takes the posi- tion that people have been quantifying probabilistic judgments since the beginning of time-whenever they offered or accepted betting odds on the outcome of any doubtful issue. The second distinguishing feature of Bayesian method is that the analyst does not take the available evidence as given and draw there- from his conclusions about the relative merits of opposing hypotheses. Ile rather postulates, by turns, the truth of each hypothesis, address- ing himself only to the likelihood that each item of evidence would 44 UNCLASSIFIED Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr f % se 2005/02/17: CIA-RDP78T0319*kq R1' 13-8 appear, first under the assumption that one hypothesis is true and then under the assumption that another hypothesis is true. The analyst is under no ego-supporting need to hold to positions previously taken on the merits of the respective hypotheses; he does not feel called upon to reinforce his self-esteem by reaffirmation of opinions previously put on the record. The third distinctive feature of Bayesian method is that the analyst makes his judgments about the bits and pieces of evidence. Be :does not sum up the evidence as he would have to do if he had to judge its meaning for final conclusions. The mathematics does the summing up, telling the analyst in effect: "If these are your readings of the individual items of evidence, then this is the conclusion that follows." The research findings of some Bayesian psychologists seem to show that people are generally better at appraising a single item of evidence than at drawing inferences from the body of evidence considered in the aggregate. If these are valid findings, then the Bayesian approach calls for the intelligence analyst to do what he can do best and to leave all the rest to the incorruptible logic of a dispassionate mathematics. The Bayesian approach was not studied with any idea of its replac- ing other approaches in intelligence analysis. The responsibility of intelligence is to depict, as best it can, the current and prospective state of international affairs. The intelligence estimate is a closely- reasoned analysis of such important matters of interest as the top political leadership of a foreign country, evolving popular attitudes in that country, changing force structures in its military establish- ment, its levels of scientific achievement, and the hard choices it is making in allocation of resources to the guns and butter sectors of the economy. The intelligence estimate is sketched in all the lights and shadows of descriptive, narrative, and interpretive commentary. This task is not reducible to terse statement of the odds favoring one particular hypothesis over another. There are, however, areas of intelligence analysis where Bayes' Theorem might well complement other approaches. One crucially important area is that of strategic warning-the analysis directed to uncovering any pattern of activity by a foreign power suggestive of a major and imminent threat to US security interests. The patterns of events leading to Pearl Harbor in 1941 and to the Communist invasion of South Korea in 1950 are cases in point. Strategic warning analysis focuses primarily on just the problem that Bayes' Theorem addresses- the odds favoring one hypothesis (say imminent attack) over another hypothesis (no imminent attack). UNCLASSIFIED 45 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 App1WeLASSrFIE~ease 2005/02/17: CIA-RDP78T03'~94AQ0300010013-8 ayes eorem One way to test the usefulness of Bayes' Theorem for intelligence analysis is to replay intelligence history. This means going back to international crises of years past. It means assembly of the evidence which was available before the outcomes of the crises were known. It means reading the old intelligence estimates and other studies in order to find out how the analysts of the day interpreted the evidence. It means assignment of L values--likelihood ratios-that honestly reflect these analyst evaluations of the evidence at the time and not our present hindsight knowledge. Another way to test Bayes' Theorem is on current inflows of evidence. The advantage of this kind of testing is that hindsight knowledge does not intrude; Bayes' Theorem is pitted fairly and squarely against the conventional modes of analysis. Offsetting this advantage for honest research, however, is a disabling disadvantage. The disadvantage derives from the very nature of the hypotheses at interest in strategic warning. The alternative hypotheses are commonly of two types. One stipulates continuation of the status quo. The other stipulates sudden change from the status quo. Usually the situation today is pretty much what it is going to be a week from today. The status quo hypothesis, in other words, usually turns out to be the true one in strategic warning analysis. But the main test of strategic warning effectiveness is the capability to give forewarning of the sudden changes that occasionally do occur in the status quo. The intelligence interest in Bayes' Theorem is primarily in how well the Bayesian approach to strategic warning would meet this main test of performance in situations of general surprise, without chronic resort to cry-wolf false alarms. Unfortunately, intelligence research cannot be speeded up by focus on the particular current issues which will turn into occasions of intelligence surprise. If intelligence could pick out in advance the issues on which it was going to be surprised, it would by definition never be surprised, and it would have no interest in the possible contributions of Bayes' Theorem to improved analysis. The outlook, then, is that many tests of Bayes' Theorem on current inflows of evidence will be needed to get the few interesting occasions that show Bayesian performance in circumstances of general intelli- gence surprise. And just a few interesting examples are not enough to make the case for or against the Bayesian approach, which may do better than conventional method sometimes and not as well other times. A large enough sample of interesting examples is needed to justify confident findings of comparative performance on the average. 46 UNCLASSIFIED Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approg*fof f&L se 2005/02/17 : CIA-RDP78T0319WepA@g 3 13-8 The results of the testing so far have been interesting enough to make a good case for further testing of Bayes' Theorem in intelligence analysis. Among the interesting results has been an uncovering of problem areas that flank the path of intelligence analysis and that are not very easily outflanked. The Life-Span of Evidence One such problem area has been called nonstationarity. In situa- tions of nonstationarity, that is, when hypotheses are being effectively altered by the passage of time, evidence will have a limited life-span. An intelligence hypothesis about current Soviet policy is not exactly the same hypothesis on January 15 that it is on February 15. The date has changed, so the hypothesis is to a degree different; and evidence back in January which had a certain bearing on the hypoth- esis of what was then current Soviet policy does not have the same bearing on the hypothesis of what; is current Soviet policy a month later. Consider, for example, some evidence which was available to intelli- gence and to the public at large in the summer of 1962, before photo- graphic confirmation was received of missiles in Cuba that, could reach targets deep in the United States. Soviet leaders gave public assurances during this period that the expanding military aid to Cuba was for defensive purposes only. Now an analyst's appraisal of this kind of assurance will depend partly on how honorable or dishonorable he believes Communists to be. But whatever his views about the honor of Communists, he would certainly not consider any government's assurances to constitute a commitment for all eternity. Governments do make new decisions and reconsider old ones. This amounts to saying that the diagnostic value of evidence bearing on hypotheses about current government policy tends to erode over time. A mathematical logic for strategic warning analysis has to be attentive to this erosion. Perhaps the analyst can specify the expected rate of erosion when he first encounters an item of evidence. If he cannot or prefers not to, the Bayesian approach does not quite attain the mechanistic ideal that would require of the analyst only his one-time attention to each item of incoming evidence. The analyst instead finds himself looking back from time to time at his whole body of past evidence, to consider whether its diagnostic value, as recorded in machine memory, is still valid and not out-dated. Causal Evidence Another problem area spotlighted in the testing is the occasional reversal in cause and effect relationship between hypotheses and data. UNCLASSIFIED 47 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 UNCLASSIFIED Bayes' Theorem The disease generates the symptoms of the disease, and so the physician can infer the disease from the symptoms. Similarly in his surveillance of the Soviet scene, the intelligence analyst in Washington can infer from Soviet actions a good deal about Soviet policy. But the analyst also has his eye cocked for relevant data other than Soviet actions, data which have less a derivative than a causal relationship to Soviet policy. I draw again on the Cuban missile crisis of 1962 for my historical example. On several occasions that year, President Kennedy publicly warned that the United States would take a grave view of strategic missile emplacements in Cuba. How would a Bayesian analyst evaluate President Kennedy's warnings for their relevance to opposing hypoth- eses about Soviet missile shipments to Cuba? If the analyst were a mechanical, uncritical Bayesian, he would say to himself: "President Kennedy is more likely to issue these statements if the hypothesis of imminent Soviet missile shipments to Cuba is true than if the hypoth- esis of no such missile shipments to Cuba is true. My L in the Bayesian equation H PL is greater than 1/1, and so my mathematics works out to an increase in the odds favoring the missile hypothesis." Well, the analyst in this case is surely not reasoning as President Kennedy reasoned. The President no doubt felt that the clear com- munication of American concern would either have no effect on Moscow or, hopefully, would dissuade the Soviet leadership from ship- ping strategic missiles to Cuba. He thought, in other words, that his statements would tend to reduce, not increase, the odds favoring the missile hypothesis. The complication for the Bayesian analyst is the causal character of President Kennedy's statements. Soviet actions are direct deriva- tives of Soviet policy. President Kennedy's statements were not. They were important primarily for the chance that they would affect, not reflect, Soviet policy. It can be shown that, in principle, Bayes' Theorem is as applicable to causal evidence as to derivative evidence. In practice, Bayes' Theorem often offers slippery ground to the analyst appraising causal evidence. In practice, the analyst does better by putting a little sand in his tracks. He gets better mental traction in this case by making a direct judgment about the impact of the causal evidence on the com- parative merits of his hypotheses. He says to himself: "If the odds were even-money in favor of the missile hypothesis before receipt of the causal evidence, what would the odds be now after receipt of this evidence?" When the prior odds are even-money (that is, 1/1), the revised odds equate to the likelihood ratio, according to the Bayesian App`~gved For Release 2005/02/17: CIA-RDP78TO3184A0 0030~0D10013-8 ApprqsMochReeleease 2005/02/17 : CIA-RDP78T03194MUA ffiAPB13-8 equation R = PL. So, by making a direct judgment of revised odds following a stipulation of even-money prior odds, the analyst obtains an effective likelihood ratio to give the computer. This is an approach which respects the mathematics of Bayes but does violence to the spirit of Bayes. One of the attractive features about Bayesian method in its pristine purity is that the analyst need address himself to the merits of the hypotheses only at the very beginning of his analysis. In principle, he does not thereafter reaffirm his first opinion, admit to a change in opinion, or criticize anybody else's opinion on the subject. He is supposed to make a judgment, instead, of quite another sort, a judgment about the evidence which postulates the truth of each hypothesis in turn, a judgment which does not in- volve him again in debate about the merits of each hypothesis. His encounters with causal evidence, however, often do not allow him to keep quite this detachment from the hypotheses. He finds himself addressing R, not L. Catch-All Hypotheses Another problem area encountered in our research has been examined in Bayesian literature as the nonindependence issue. Non- independence enters into analysis as a complicating feature when the likelihood ratio-the L value of an item of evidence-is affected by the previous pattern of evidence. Nonindependence is an arcane subject to analysts who are new to probability mathematics, mainly perhaps because items of evidence which are independent if one hypothesis is assumed true can be nonindependent if another hypothesis is taken as true. Analysis is easier when items of evidence are independent (or to put it more properly, conditionally independent)-that is to say, when the like- lihoods of their being received do depend on which hypothesis is assumed true but when these conditional likelihoods hold regardless of the previous pattern of evidence. Intelligence analysts have their way of reaching for conditional independence, whether or not they have ever heard of the nonindependence issue. They reach for a new hypoth- esis to do service for some hypothesis that no longer seems suitable as originally worded. Such an unsuitable hypothesis could be the one postulating continu- ation of the status quo in the strategic warning problem. This catch-all hypothesis can be divided into two or more subhypotheses (and it can be divided different ways into different sets of subhypotheses). For an illustrative example, take any case in history of a big power UNCLASSIFIED 49 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194AQaQ300010013-8 UNCLASSIFIED ayes eorem threatening its much smaller neighbor and finally invading the little country when threats alone did not avail. Suppose the invasion is preceded by reports that the big power is moving its troops toward the border. Considered later in time from the vantage point of hindsight, the troop movements certainly would seem to be strong evidence, which ought to have tipped the odds sub- stantially in favor of the invasion hypothesis. But the analyst of the day would probably find himself reflecting on at least two relevant subhypotheses of the no-invasion hypothesis. Subhypothesis A might be that the big power will not invade the little country but will apply very strong pressures-psychological, political, and other-just short of military invasion. Subhypothesis B might be that the big power will neither invade nor apply other extremes of pressure against the little country. Now the analyst using Bayes' Theorem introduces an initial opinion about the hypotheses when he begins his analysis. He must similarly introduce an opinion about the subhypotheses if he comes to make them explicit elements in his analysis. By the time he receives the re- ports of troop movements, the previous evidence will have inclined him to the opinion that subhypothesis A-strong pressures against the little country-is the only reasonable interpretation of the no- invasion hypothesis. The events leading up to the troop movements (the grim warnings, the shrill propaganda, the military alerts) will constitute such virtual contradiction of subhypothesis B---no extremes of pressure-as to give it a near-zero probability. If this is the analyst's view, then the troop movements toward the border must seem almost as likely under the no-invasion hypothesis as under the invasion hypothesis. His L is just about 1/1. His Bayesian approach has done virtually nothing to change his current odds. This undiagnostic character of incoming evidence near the climax of international crises may seem novel to novices; it is familiar enough to experienced intelligence analysts. The more experienced they are, the more rueful they are likely to be in their recollections of evidence that was ambiguous to contemporaneous vision but became telling in retrospective inquiries. False Evidence Perhaps the most difficult problem area is the suspect character of some evidence. The intelligence analyst gets his information in accounts from sources of varying reliability. He does not know for sure which accounts to believe and which to disbelieve. So he has to appraise his evidence, not only for its bearing on the hypotheses, but UNCLASSIFIED Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Bayes' Theorem UNCLASSIFIED also for its probability of being accurate. The estimated probability of accuracy will enter into the analysis and will affect final results. Unfortunately, an analyst's opinion about a report's probable ac- curacy or inaccuracy will be influenced by his current opinion about the hypotheses. Does he find it hard to give credence to reports from Cuban refugees who claim to have seen objects resembling medium- range missiles near Havana? If he is skeptical, it may well be because he finds it hard to give credence to the hypothesis that the USSR will do anything so foolish as to ship such missiles to Cuba. So once again, we have a case of information not doing the work which critics later, in all the wisdom of hindsight, will say it should have done. My exposition of these problem areas is not meant to imply that they muddle only the Bayesian approach; they plague. with fine impartiality all types of intelligence analysis-traditional method as well as Bayesian method, verbal logic as well as mathematical logic. Traditional method also must cope with the eroding diagnostic value of past evidence as it recedes into history. Traditional method also finds it harder to draw probabilistic conclusions about the state of the world from causal evidence than from derivative evidence. Traditional method also sometimes explains away evidence that can be explained away by a favored subhypothesis of a catch-all hypoth- esis. Traditional method also has to contend with the implausibility of evidence that is not in character with the climate of prevailing opinion. My purpose in expanding on the problem areas is to show that much of the difficulty in intelligence analysis is not the difficulty to which the Bayesian approach is addressed. The Bayesian approach seeks to insulate analysis from frailties of logic in aggregating the evidence. The working world of intelligence, however, is concerned not only about possible inconsistency in everyday thinking between the conclusion drawn from the body of evidence considered as a whole and the conclusion that should logically follow from judgments about the evidence considered item by item. Intelligence views with concern also the possibilities of mistaken judgments about individual items of evidence. The intelligence pragmatist is wistful about evidence which almost speaks for itself, evidence to which most people will attribute much the same probability values because the values can be documented by, say, actuarial statistics or other such extrinsic authority. The pragmatist feels that an increase in the amount of this kind of evidence would do more to help men reach sound conclu- UNCLASSIFIED Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010LL D13-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 UNCLASSIFIED Bayes' Theorem sions than could any formal logic-Bayesian or other-for reasoning from uncertain propositions about the evidence. Conceding this point, the Bayesian responds that intelligence must still do the best it can with what it has. In a world of fallible judgments about evidence, the Bayesian approach is not a path to perfection; it can be at best only a path to improvement. The promise of the research on Bayesian method is a mathematical logic to which intelli- gence can have recourse for substantiating or contradicting the verbal- izations of the traditional analysis. When the different approaches lead to discrepant conclusions, intelligence should perhaps undertake to rethink, recalculate, and if possible reconcile. The research interest at this time should be to find out whether such a Bayesian cross-check on other reasoning would significantly improve the quality of analysis. AppMved For Release 2005/02/17: CIA-RDP78T031-9450003DOM0013-8 Approved For Release 2005/02/17: CIA-RDP78T03194A0003gp 913-8 More on probability-II. THE SINO-SOVIET BORDER DISPUTE: A COMPARISON OF THE CONVENTIONAL AND BAYESIAN METHODS FOR INTELLIGENCE WARNING Problems of "indications analysis" or "intelligence warning" are essentially questions of how to assign probabilities to hypotheses of interest. For example, a problem of indications analysis occurred in August 1969 when two hypotheses arose; namely, the conjecture (Hi) that within the next month the USSR would attempt to destroy China's nascent nuclear capabilities, and the alternative hypothesis (H2) that such an attack would not occur. A method of indications analysis is a rule for eliciting probability judgments from intelligence analysts, and alternative methods for this purpose have been studied within the Agency since 1967.1 The usual and most direct method is simply that of asking analysts to make either verbal or numerical probability judgments about hypotheses of inter- est. As an alternative to the conventional approach, the so-called Bayesian method does not require analysts to assign probabilities to the main hypotheses of interest; instead, analysts are asked to specify values for certain "conditional" probabilities, from which one can infer judgments about the main hypotheses. It has been argued 2 that the Bayesian method is better than the conventional approach to problems of intelligence warning. This article will illustrate the two alternatives, and will then explain the results of an experiment that was designed to test the assertion of the Bayesian method's superiority. ' Two examples of these studies are A Mathematical Model for Intelligence Warning (Intelligence Report No. 1396/67, November 1967), and Bayes' Theorem in the Korean War (Intelligence Report No. 0605/68, July 1968). For references to various studies done outside the Agency, see A Bibliography of Research on Behavioral Decision Processes by Ward Edwards (University of Michigan, Human Performance Center, Memorandum Report No. 7, January 1969). 2 A detailed exposition of this argument is offered by Ward Edwards et al. in "Proba- bilistic Information Processing Systems: Design and Evaluation," IEEE Transactions on Systems Science and Cybernetics (Vo. SSC.4, No. 3) September 1968. Further exposi- tions have been put forth by Jack Zlotnick in "A Theorem for Prediction," Studies in Intelligence (Vol. 11, No. 4) Fall 1967. SECRET 53 Approved For Release 2005/02/17: CIA-RDP78T03194A0003%VR9 PAGES 53-62 F% r' ApKpLip For Release 2005/02/17: CIA-RDP78TO3194A0O JQ $%10013-8 The Conventional Method of Intelligence Warning The conventional approach to intelligence warning begins when a set of hypotheses first comes under active scrutiny. For example, during August 1969 several intelligence officers warned that the USSR would probably launch a major attack against China within the next month. This warning spawned various hypotheses, two of which were (H1) that the USSR would begin the offensive during September 1969, and (H2) that there would be no attack. For a large class of hypotheses, the problem of indications analysis remains essentially the same: certain Agency officials must first elicit from qualified analysts judgments about the hypotheses, and then must synthesize these judgments into a warning. The officials obviously cannot pore over every bit of evidence observed by each analyst, so analysts must focus and summarize their views. Generally, then, the first step in the conventional method involves the gathering of either verbal or numerical probability estimates. On 30 August 1969, for example, each of six senior analysts from six Agency offices was asked to estimate the probability of the war hypothesis Hi. Their estimates--i.e., values for P(Hi)-appear in Table 1. As time passes, further estimates are elicited, and previous warnings are either amplified or damped on the basis of the new esti- mates. Clearly, then, a key question is how an official ought to elicit probabilities from analysts. The conventional approach suggests that an official should simply ask analysts to state the probabilities when- ever the official wants to reconsider his warning. As part of an experiment that was designed to compare the con- ventional method with an alternative system (the Bayesian) for elicit- The Probability of Hi lualyst on 30 August 1969* A .20 13 .85 C .40 I) .25 p; .35 F .20 *The symbol Hi denotes the hypothesis that (luring September 1969, the USSR would launch a nuclear attack against China. 54 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr Jbpr Release 2005/02/17: CIA-RDP78T03194A000 B?D013-8 ing probabilities, each of the six analysts mentioned above was asked on 5 September 1969 to re-estimate the probability that a Sino-Soviet war would erupt before 29 September. On 12 September the analysts were asked again, and so forth for each week in September. As a result of this process of questioning, each analyst produced an "intuitive" probability track such as the one shown in Figure 1. Each point on the illustrated track denotes the best probability judgment that Analyst D could offer after reading the all-source intelligence avail- able to him. On the basis of a considerable amount of research involving simu- lated questions of intelligence warning, however, Edwards,3 Zlotnick,4 and other proponents 5 of the Bayesian method for eliciting probabil- ities would argue that the sequence of estimates shown in Figure 1 was not the best sequence that Analyst D could have specified. They claim that an official who had asked "the right questions" could have obtained from Analyst D-and from each of the other analysts-a better sequence of probabilities. This alternative method of question- ing will be explained in the following section. Analyst D's track of intuitive probability estimates 3 Ibid. 4 Ibid. 5 See the bibliography cited in Footnote 1. Time SECRET 55 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 10013-8 Appr~~egE for Release 2005/02/17 : CIA-RDP78T03194A00033et 000 ods The Bayesian Method of Intelligence Warning There is no unique "Bayesian method": dozens of systems, each slightly different from its predecessors, have been proposed and tested on simulated problems of intelligence warning. Most of these systems, however, involve substantially similar steps. The steps taken in the Sino-Soviet Experiment to obtain from each of the six analysts a Bayesian track that could be compared with the analyst's intuitive track are as follows: (a) On 30 August 1969 each of the six analysts was asked to estimate a value for P(H1), which at that time denoted the probability that the war hypothesis Hl was true. This first step duplicated the first step in the conventional method discussed above, so each analyst's estimate for P(H1) appeared as in Table 1. (b) In contrast to the conventional method, on 5 September the Bayesian approach did not require the analysts to re-estimate P(H1 ). Instead, each analyst was asked to list the major events whose occur- rence during the previous week had influenced his opinion about the war hypothesis. For example, during the week Analyst D might have observed that no men in the Soviet reserve army had been called for active duty. This event of "no calls" could have been denoted by E1. And, since Analyst D might have believed that a call-up during the previous week would precede the event of a Soviet attack in September, the event El might have lowered his intuitive probability judgment concerning the chance of war. Similarly, E2 might have denoted the event of no increases in Soviet propaganda against the Chinese, and so forth for other events that an analyst might have thought relevant to the war hypothesis Hi. (c) A majority of the analysts listed virtually the same set of relevant events, although some analysts' views had been influenced by events that other analysts had not listed. From the separate lists, a master event list was compiled, such that the events E1, Es, .. . on the master list exhibited two properties; namely, (i) each event pro- posed by each analyst was reflected in the master list; and (ii) each master event was, roughly speaking, independent of each other master eve nt.6 6 The notion of independence can be illustrated as follows: suppose that Analyst D has listed the event of "a high-level diplomatic probe by the USSR to ascertain prob- able US reactions to a Sino-Soviet war," while Analyst E has listed "a war-related con- tact between US and Soviet officials." These two events clearly refer to the same thing, so the master list would contain only one event referring to a diplomatic probe. In some cases, however, the two properties of inclusiveness and independence were diffi- cult to achieve in compiling the master list. 56 SE~R~ Approved For Release 2005/02/17: CIA-RDP78T03194A00O3YO0i0013-8 Appryy J j r Release 2005/02/17: CIA-RDP78T03194A000% 013-8 (d) When the master list had been compiled on 5 September 1969, some of the analysts asserted that certain events suggested by other analysts had not actually occurred. Such differences over raw intelli- gence were recorded as each analyst estimated a probability of occurrence for each of the events E1, E2,. - . on the master list. (e) In addition to specifying probabilities of occurrence, each analyst estimated various conditional probabilities on 5 September. For example, with respect to the event no reserve calls during El of the previous week, Analyst D was asked to specify a value for P(E1IH1), which denotes the probability that E1 would have occurred, given the assumption that the war hypothesis (Hi) was true. More- over, Analyst D was asked to estimate P(E11112), the probability of E1 on the assumption that the no-war hypothesis (H2) was true. For each of the other events on the master list Analyst D specified a similar set of conditional probabilities, as did each of the other analysts. (f) A modified version of Bayes' Theorem was then used on 5 September 1969 to calculate for each analyst a "revised" probability of war.7 This probabilty was called an analyst's Bayesian estimate, and was plotted on the same graph as his intuitive probability.. Thus for Analyst D in particular, on 5 September 1969 the two probability tracks shown in Figure 2 had been obtained-one track by the con- ventional method, and one by the Bayesian approach. (g) On 12 September 1969 the Bayesian procedure outlined above was repeated, with the exception that the "prior" probabilities used in the revision process were the Bayesian probabilities of war that had been obtained on 5 September 1969. Thus after two weeks, a typical analyst's probability tracks appeared as in Figure 3. (h) After the Bayesian procedure had been repeated at weekly intervals during September, the Bayesian tracks derived from con- ditional probabilities specified by Analysts A, B, and D appeared as in Figure 4. The Bayesian and intuitive tracks compiled for Analysts C, E, and F resembled the tracks shown for A and D, in the sense that for five of the six analysts, the Bayesian track always fell below the intuitive track. A Criterion for Comparing Probability Estimates A criterion for comparing methods of probability elicitation can be illustrated with reference to Figure 3. In retrospect, we know that the 7 This method of calculating revised probabilities is sometimes called a "roll-back" procedure. See Applied Statistical Decision Theory by II. Raiffa and R. Schlaifer (Harvard Business School, Division of Research, 1961). SECRET 57 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Methods Analyst D's intuitive probability of war r Analyst D's Bayesian probability of war 8130 9/5 9/12 9/19 9/26 Figure 2 ApproBved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apprr%OO?9r Release 2005/02/17: CIA-RDP78T03194A000n9'g013-8 Probabilities of War Analyst D's Intuitive Probability Track ., _. .10 D's Bayesian ~~-- Tra.dc t------- 8/30 i Analyst B's Intuitive Probability Track - t 9/12 I t. 9j26 Time Analyst A's Intuitive Probability Track J -1- 9/26 Analyst B's Bayesian Track I Analyst A's Bayesian Track 9/12 Figure 4 SECRET 59 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Methods hypothesis Ht was false: Russia did not attack China. Thus if an analyst's "probability tracks" had actually appeared as in Figure 3, then on 12 September 1969 an official would have acted more wisely on the basis of the Bayesian sequence of estimates. In other words, if one had been forced to gamble according to either the Bayesian or the intuitive tracks shown in Figure 3, one would in retrospect have preferred the Bayesian sequence. Of course, if Russia had attacked China, and if a typical analyst's probability tracks had appeared as in Figure 3, then one would have preferred to have acted according to the analyst's intuitive track. But according to the advocates of Bayesian analysis, such a preference for an intuitive track will seldom occur: if Russia had attacked, then- according to the Bayesian proponents-prior to the attack the Bayesian track for a typical analyst would have been above his in- tuitive track, such that in retrospect the Bayesian method would again have been preferred. As is evident in Figure 4, Analyst B proved to be an exception to this assertion: his Bayesian track always fell above his sequence of intuitive estimates. This criterion of "retrospective superiority" has served as the basis for dozens of experiments 8 in which researchers have compared the Bayesian method with alternative techniques for eliciting probabilities, and in most cases the Bayesian approach has triumphed. But there is no firmly established analytical justification for the method. Bayes' Theorem is a mathematical truism, but there are no axioms from which one can infer that repeated applications of the theorem to conditional probabilities specified by analysts will yield superior intelligence warnings. Thus, in the fall of 1969, it was of considerable interest to review the Bayesian method's effectiveness in the context of the actual intelligence problem posed by the chance of a Sino-Soviet war. The Sino-Soviet Experiment As explained above, the six analysts met at weekly intervals during September 1969 in order to re-estimate the probability of the war hypothesis Hl, and to specify the conditional probability estimates that were processed according to the Bayesian method. In October 1969 (when the war hypothesis H1 was known to have been false) the probability tracks derived from the two methods were compared as in Figure 4. The primary result was that for five of the six analysts, the Bayesian track had always been below the intuitive sequence of probabilities. Thus in retrospect, an official would have preferred to AppIo ed For Release 2005/02/17 : CIA-RDP78T03194A000 1013-8 Appr9NM r Release 2005/02/17: CIA-RDP78TO3194A000ZZ@ 013-8 have acted according to the Bayesian estimates, rather than accord- ing to the analysts' best intuitive judgments concerning the war hypothesis. An Evaluation of the Bayesian Method Several results of general interest emerged from the Sino-Soviet experiment. First of all, when the experiment began the analysts differed widely in their views concerning the chance of a war; but the reasons for their differences were murky at best. A typical argument between two analysts would arise when one would accuse the other of having ignored certain crucial facts in esti- mating the likelihood of war. The accused would then respond that he had indeed considered all relevant information, and that his estimate was based on facts that other analysts had overlooked. Such arguments were difficult to evaluate, since there was no record of who had considered what, or of how each analyst's probability estimate had evolved over time. Once the Sino-Soviet experiment had begun, however, one could easily determine the relative importance that an analyst had assigned to any given event. For example, it was evident from Analyst B's conditional probability estimates that he had considered the event of Kosygin's visit in September 1969 to Peking as being irrelevant to the war hypothesis. In contrast, Analyst E had regarded the meeting as a profound indicator that war would not occur. The issue of whether Analyst B exercised good judgment in this respect remains an open question; but at least his assessment of the Peking trip had been re- corded and could be evaluated. Thus the Bayesian approach provided a kind of accounting system for intelligence analysis. If such a system were implemented for other questions of indications analysis, a significant class of disagreements among analysts might be resolved. And to the extent that such dis- agreements would persist, an official who must synthesize warnings on the basis of analysts' estimates could discern and evaluate causes for the disagreements. A second contribution of the accounting system was the fact that after the system's inception, the analysts definitely did consider the same relevant events. In particular, Analyst E wrote the following review of the experiment. In the case of Office E, interchanges with other offices are usually on an unsystematic ad hoc basis. The Bayesian experiment afforded an opportunity to bring these interchanges into focus on a systematic basis. Its particular merit lies in the manner in which participants are led to identify the factors SECRET 61 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr for Release 2005/02/17: CIA-RDP78TO3194A0003e0hoa 0013-8 influencing their estimates and to present these for critical review by others approaching the question from varying angles. I would emphasize the value of focus, though perhaps no less valuable is the exposure of participants to lines of analysis-as one analyst noted-of which they are dimly if at all aware. Similarly, Analyst C wrote: The meeting was a useful forum for the interplay of ideas and the exchange of information which might otherwise not occur. Interchanges would take place in the absence of such a meeting; but they would be limited because of their bilateral nature (in most cases). In summary, an improved system of accounting for analytical judg- ments is needed. Although it cannot be said categorically that the Bayesian method excels as a forecasting device, the Sino-Soviet experi- ment indicates that it might provide a means for such accounting. 62 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17: CIA-RDP78TO31900OO DOOM 13-8 THE ORIGINS OF NATIONAL INTELLIGENCE ESTIMATING Ludwell I,ee Montague* Most of what I have to say on this subject is a matter of personal recollection. I was "present at the creation," though without power to control the event. My story begins in October 1940, when I was ordered to active duty in the Military Intelligence Division of the War Department General Staff. At that time, now thirty years ago, there was no common con- ception of any kind of an intelligence estimate, much less of a national intelligence estimate. In our language, the word "intelligence" originally meant communi- cated information: that is, information reported from elsewhere, as distinguished from information known by personal observation. You will find the word used in that sense by Shakespeare. That was still the prevailing sense of the word in 1940. Indeed, public comment shows that, even today, most laymen regard us only as gatherers of informa- tion. The Press, which is itself a primitive intelligence organization, shows almost no comprehension of the function of estimating the meaning of the information gathered, apart from the expression of personal opinion by individual columnists whose "authority" varies with their personal prestige. In this primitive sense, the entire Department of State was, in 1940, an intelligence organization. It had its own network of reporters who sent it information from abroad-but the evaluation of that informa- tion occurred only intuitively in the minds of the desk men who read it. The Department had no conception of intelligence research, much less of any organized process of estimating. The Navy was one degree more sophisticated. It had an Office of Naval Intelligence, the function of which was to compile NIS-type information of Naval interest. Just the facts, man! Navy doctrine strongly held that it was not a function of Intelligence to estimate the meaning of the facts. Only the Admiral could do that-which may go some way to explain Pearl Harbor. *This article is the text of an address delivered by the late Dr. Montague, a retired member of the Board of National Estimates, at the first meeting of the Intelligence Forum, 11 May 1971. CONFIDENTIAL 63a Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300VN P PAGES 63-70 App VI6 f tease 2005/02/17: CIA-RDP78TO3194AWRAg IN40013-8 Only the Army conceived it to be a function of Intelligence to esti- mate the capabilities and intentions of foreign powers. That was Army doctrine, but the Military Intelligence Division did little to practice that art. Like ONI, it spent the year before Pearl Harbor producing "strategic handbooks," a primitive, single-service, NIS. During that year "Wild Bill" Donovan burst upon the scene as the President's Coordinator of Information. He was a man of many pregnant ideas. Just one of them was that the President should be better informed than the State, War, and Navy Departments, acting separately, could possibly inform him. Donovan assembled a group of eminent scholars, men knowledgeable of foreign affairs and practiced in the techniques of research and analysis in a way that regular Army, Navy, and Foreign Service officers could not be. Donovan's Research and Analysis Branch would assemble all of the information in the possession of the Government, not only in the State, War, and Navy Departments, but also in the Library of Congress and other places, and would prepare for the President a fully informed and thoughtful analysis of any situation of interest to him. Let me observe at this point that the analyses actually produced by this R&A Branch were not estimates. They were academic studies, descriptive rather than estimative, more like an NIS than NIE. Donovan had no idea of coordinating these studies with anyone. He was responsible only to the President. One can readily imagine how professional Army, Navy, and Foreign Service officers reacted to the idea that a lot of johnny-come-lately professors would be telling the President what to think about political and strategic matters. Gen. Raymond Lee, who had recently served as military attache in London, proposed to head off Donovan's intrusion into the mysteries of military intelligence by the creation of a Joint (Army and Navy) Intelligence Committee, in imitation of the British JIC. Significantly, the task of defining the functions of this US JIC was assigned, not to the Chiefs of Intelligence, but to the Chiefs of Army and Navy Plans. There arose at once a doctrinal controversy between the Army and the Navy. The Army wished the JIC to "collate, analyze, and interpret information with its implications, and to esti- mate hostile capabilities and probable intentions." The Navy wished it to present such factual evidence as might be available, but to make no "estimate or other form of prediction." Inasmuch as the Army desired to have a joint committee, for which the Navy's agreement was indispensable, the Navy's view prevailed. Thus the first US inter- departmental intelligence organization came into existence expressly forbidden to make estimates! 64 CONFIDENTIAL Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApproLys?,MRsfelease 2005/02/17: CIA-RDP78T031 Q 1 013-8 I dwell upon this episode because it has contemporary relevance. Now, thirty years later, we hear again that in certain high quarters the idea prevails that the function of Intelligence is to produce evi- dence, not estimates. Conclusions as to the meaning of the evidence will be drawn by the interested policymakers to suit their policy predilections. There was, of course, a scuffle between the Army and the Navy for control of this new joint committee. Before the war, normal promotion was faster in the Navy than in the Army. The Army was shocked to learn that the senior Naval officer assigned to the joint committee, a youngish commander, actually outranked the older lieutenant colonel assigned by the Army. And that commander's mission was to see to it that the joint committee did nothing except by direction, particu- larly that it did no estimating. But the Army, in the midst of a massive mobilization, had developed a faster system than the Navy's for making spot promotions. The Army made the lieutenant colonel a colonel before the Navy could make the commander a captain. And the first thing that the new colonel did, on taking over from the commander, was to order the immediate preparation of the first US joint intelligence estimate, in flagrant violation of the JIC's charter! The subject of that first US interdepartmental intelligence estimate was the strategic consequences if the Japanese were permitted to seize control of the Netherlands East Indies. (Singapore and Bataan were then under attack, but had not yet fallen.) The answer was obvious: that would be a Bad Thing. The policy implication was also clear: it should be prevented. Since that policy implication suited the Navy, it did not protest the illegality of making that estimate. At this point, Mr. Winston Churchill came to town with two pur- poses in mind. The first was to commit the United States to give the war with Germany priority over the war with Japan, not an easy proposition in the face of the US reaction to Pearl Harbor and Bataan: The second was to establish the Combined Chiefs of Staff in order to insure for Britain a more or less equal voice in the conduct of both wars. The Combined Chiefs of Staff organization included a Combined Intelligence Committee modelled after the British JIC in London. Since the Foreign Office and the Ministry of Economic Warfare were important members of the British JIC, the US JIC, the US side of the CIC, had to be enlarged to include representatives of the State Department, the Board of Economic Warfare, and. the Office of Strategic Services. Since the sole function of the CIC was to produce combined "appreciations" as a basis for combined war planning, it CONFIDENTIAL 65 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 App EpCYN &N ftease 2005/02/17 : CIA-RDP78T03194A000300010013-8 Estimating automatically became the primary function of the US JIC to produce US joint intelligence estimates. Thus it was the Prime Minister of Great Britain who created the wartime US JIC and put it into the estimating business. At that time, and for many years thereafter, the British JIC held the highest reputation in Intelligence. Let me therefore say a word about British joint intelligence estimates. They were joint only in the sense that all of the members of the JIC subscribed to them. It would never have occurred to a British Army officer to question the political judgment of the Foreign Office, nor would it have occurred to a Foreign Office representative to question the Army's order of battle. Consequently British JIC estimates were nothing more than a set of departmental estimates fastened together. The situation was somewhat different in the US JIC. The State Department was incapable of making any contribution, but felt free to criticize the political contributions of OSS. The Foreign Economic Administration (formerly BEW) generally deferred to OSS in economic matters. The Air Force and the Navy generally stuck to their technical specialties, although the Navy was ever ready to defend the interests of Admiral Nimitz against any supposed Army favor toward General MacArthur. But the Army and OSS both claimed a universal competence: they would argue with anybody about any- thing, and chiefly with each other. The Army had no hesitation about contradicting an OSS political or economic estimate. OSS delighted to expose deficiencies in the Army's order of battle. In these circumstances, the Joint Intelligence Staff, the full-time working staff of the JIC, performed a real service in working out an agreed joint text from conflicting contributions, particularly those of the Army and OSS. These were not split-the-difference com- promises. Despite their different departmental origins, the members of the JIS were a band of brothers who lived and worked together; they could reach agreement amongst themselves on the basis of reasoned consideration of the evidence. The estimates that they prepared were truly joint estimates. The trick then was, of course, to obtain the concurrence of the members of the JIC, who were surrounded by advisers who had never participated in joint consideration of the subject. But the members of the JIS were the personal representatives of the members of the JIC for this purpose. They had equal access to them, and could generally persuade them to adopt the joint view. The defect of the JIC system was that the Committee was composed of six sovereign powers. No one represented the national Approved For Release 2005/02/17: CIA-RDP78T0350503UQQ 10013-8 ApproyWcp nUelease 2005/02/17 : CIA-RDP78T0319 9 111(8413-8 interest, as distinguished from departmental interests. No one held a power of decision in case of disagreement. Since there was no acceptable way of registering a divergent view, unanimous agreement was required. In the case of a real controversy, that could be obtained only if someone backed down, or, as happened more often, if someone could devise an ambiguous formulation acceptable to both sides in the controversy. Thus, joint estimates tended to become vague or meaningless precisely at points of critical importance. The members of the JIS agreed that a headless joint committee was the worst way of producing national intelligence estimates. During the autumn of 1944 they developed their idea of a more effective interdepartmental intelligence system. Since every depart- ment would require its own intelligence organization to meet its specialized departmental needs, there would have to be an inter- departmental committee to bring together the heads of those departmental organizations to deal with common (that is, national) problems. But that committee should have an independent chairman, appointed by the President and responsible only to him. And, in the case of estimates, that chairman, having heard all of the evidence and argument bearing on a disputed issue, should have the power to decide what the text of the estimate would say, subject only to the notation of the dissenting opinion of any chief of a departmental intelligence agency. That idea, developed by the men who then had the most personal experience in the coordination of interdepartmental intelligence estimates, is the key to the present system for producing national intelligence estimates. In the autumn of 1944 others were thinking of a postwar intelligence system. The Department of State had a plan. It was premised upon the exclusive responsibility and authority of the Secretary of State for the conduct of foreign relations, subject only to the direction of the President. It assumed that the military intelligence services would be interested only in technical military matters. It contemplated the creation of an "American (i.e., National) Intelligence Service" within the Department of State. This Service would maintain "close liaison" with the military intelligence services and would obtain through liaison whatever military inputs it required for its own estimates. The military, however, would have no voice in those estimates. Produced under the exclusive authority of the Secretary of State, they would provide the intelligence foundation for national policy. CONFIDENTIAL 67 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000a 0010013-8 CONFIDENTIAL g Somehow, a working copy of this State Department plan came into the possession of General Donovan, the Director of Strategic Services. He moved to forestall State by proposing to the President the creation of a "Central Intelligence Service" in the Executive Office of the President. His point was that departmental intelligence estimates were by their nature self-serving. The President should have in his service an intelligence organization wholly free of the influence of departmental policy advocacy and special pleading. It would make full use of departmental intelligence resources, but would produce its own independent intelligence estimates, as the basis for national policy and strategy. Let me stress that neither the State Department Plan nor the Donovan Plan contemplated any interdepartmental coordination of these "national policy intelligence" estimates. The military intelligence services would contribute "factual" data to them, but would have no voice in their estimative judgments. They would be produced under the sole authority of the Secretary of State, in the first case, or of the Director of the Central Intelligence Service in the second. The Donovan Plan was referred to the JIC for comment and the fat was in the fire. After a month of fierce contention, the JIS worked out a compromise plan, JIC 239/5, 1 January 1945. In that paper the JIC recommended the establishment of a Central Intel- ligence Agency which, among other things, would produce national intelligence estimates. With regard to such estimates, however, the Director of Central Intelligence was required to consult with a board composed of the heads of the departmental intelligence agencies and to report their individual concurrence or dissent. In short, this was the scheme developed by the members of the JIS during the autumn of 1944, to which reference was made above. After a year of vicissitudes that I shall not take time to relate, President Truman adopted the plan set forth in JIC 239/5. In January 1.946 he established the Central Intelligence Group which, in Sep- tember 1947, became the Central Intelligence Agency. It is true to say that without William Donovan's initiative, in 1941 and again in 1944, there would have been no Central Intelligence Agency. All honor to him for that. But it is a mistake to suppose, as is commonly done, that CIA was based on the Donovan Plan of 1944. General Donovan himself knew better than that. Instead, CIA is based on JIC 239/5, which General Donovan stubbornly opposed. The Central Intelligence Group set out to produce national intel- ligence estimates in accordance with the concept embodied in JIC 239/5. It was frustrated in that intention by the departmental agencies. 68 CONFIDENTIAL Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApproftMdrain?,elease 2005/02/17: CIA-RDP78TO3194 BMMTIIM13-8 For reasons that -I shall not take time to explain, they refused to con- tribute to CIG estimates, or even to meet with CIG to discuss them. The result was that CIG, later CIA, produced estimates based solely or primarily upon its own research and sent them to the heads of the departmental agencies for concurrence or dissent on a take it or leave it basis. The IAC (the predecessor of USIB) never met to consider an estimate. That certainly was not what had been intended. In 1949 the Dulles Committee blamed CIA for it. This matter was not straightened out until General Walter Bedell Smith became DCI, in October 1950. Through positive leadership, he then developed a cooperative relationship with the IAC. He estab- lished also the Office of National Estimates with the sole mission of producing national intelligence estimates in the manner that had been intended in JIC 239/5-that is, on the basis of departmental contribu- tions, independent evaluation of those contributions, working level consultation with the contributors, and final consideration by the IAC (USIB). In this context, the specialized research offices of CIA should be regarded as contributors on the same basis as the departmental agencies. ONE, working solely for the DCI as the Chairman of USIB, has no more commitment to them than to, say, DIA. They are repre- sented in USIB by the DDCI. This system has now worked well for 20 years, which proves that it is soundly conceived. Let me close by pointing out its particular virtues from the point of view of the user of the NIE. First, it assures him that all of the intelligence resources of the Government have been brought to bear on the problem, and that every intelligence authority in the Government has been consulted. Nevertheless, the power of decision with regard to the content of an estimate resides in one man, the DCI. This is, or should be, a pro- tection against the evasions and obfuscations that characterize joint estimates. It should work to clarify any real differences that may exist among well informed men. Third, any dissenter is forced to dissent within the context of a generally agreed discussion-not in an ex parte paper circulated separately. Finally, the user has consequent assurance that all of the intelli- gence considerations bearing on his problem are contained in this one paper, under one cover. CONFIDENTIAL 69 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Aqw 8 s f -Tl lease 2005/02/17: CIA-RDP78T03194P&gW%10013-8 After 20 years, these virtues may seem commonplace-but some- times I sense that they are not fully understood and appreciated nowa- days. To appreciate them fully, one has to know what it was like 30, or even 20, years ago. I have endeavored to give you some feeling for the difference between the present system and what went before. It is written that those who disregard past experience are con- demned to repeat it. 70 CONFIDENTIAL Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17: CIA-RDP78TO3194A000 U13-8 No Foreign Dissem INTELLIGENCE IMPLICATIONS OF DISEASE Warren F. Carey and Myles Maxfield Outbreaks of meningitis in China are not unusual, but the winter of 1966-1967 was something else again It began innocently enough with a few reports of school closings in Canton. News of this routine precaution turned out to be the signal for one of the worst series of epidemics to hit China in many years, and the beginning of Project IMPACT. The concept of this project-forecasting disease problems and epidemics, and the assessment of their effects on military and civilian activities-had hardly scratched the surface of implementation in the CIA's Office of Scientific Intelligence (OSI); but the opportunity was present in December 1966. China was in turmoil as millions of its people were participating in the Great Cultural Revolution. The demonstrations, riots, large dislocations of the population and general chaos attendant on this revolution were, epidemiologically speaking, some of the best ingredients for a successful epidemic. On the other hand, this mass upheaval had no precedent, there was no up-to-date quantifiable disease information of any sort on China and the status of China's public health conditions and medical capabilities were uncertain to say the least. In the early stages of the project there was even uncertainty over the actual cause for the school closings in China.. Two disease names, meningitis and Japanese B encephalitis, were being cited in reports describing the same outbreak in Canton (some reports combined both diseases into one-"Japanese B meningitis"). The confusion of reporting terminology was soon clarified. Distinct but similar Chinese words were being used to describe the disease; but which disease was it? Encephalitis is a viral disease, transmitted by mosquitoes, and is usually associated with seasonal periodicity of occurrence in warm weather. With the advent of colder weather the mosquitoes die and the disease subsides. By contrast, meningitis is a bacterial disease, having in temperate climates its greatest prevalence during cooler weather; although large outbreaks have occurred in hot, dry climates. The disease is mainly one of children and young adults and is more common where living conditions are crowded, as in barracks and institutions. The key to the correct diagnosis was a SECRET 71 Approved For Release 2005/02/17: CIA-RDP78T03194A00030 (l ?A p PAGES 71-78 Appg2t$1.IFor Release 2005/02/17: CIA-RDP78T03194A00~300010013-8 tsease report that cited the specific use of antibiotic nosedrops to treat encephalitis. The disease was thus remotely diagnosed as meningitis because antibiotics are not effective against viral encephalitis. Identification of the etiology of this outbreak was crucial to our forecasting--meningitis had the greater potential for spreading rapidly from person to person by discharges from the nose and throat of infected persons. A significant point too was that the general pattern of behavior of meningitis epidemics tends markedly to repeat itself over a two to three year cycle. Thus it appeared that China was going to have an extended disease crisis. The first intelligence assessment was made in an OSI publication in January: "It is becoming increasingly evident that Communist China is being confronted with a serious disease control problem. Factors suggest a breakdown of public health measures under the impact of mass movement of people, and perhaps the beginning of a series of new disease problems." Subsequent reports on the magnitude of the epidemic exceeded the prediction: travellers arriving in Hong Kong reported meningitis raging throughout Kwangtung Province, Radio Canton repeatedly advised people to guard against exposure to the disease-but it was too late. By mid-January, the epidemic in Canton was out of control, as supplies of sulfadiazine used in the prevention as well as the treatment of the disease became depleted. Red Guards took over the hospital facilities to care for their personnel only and some additional 900,000 visitors in Canton with the Cultural Exchange Program were exposed to meningitis. As the epidemic gained momentum, the entire public health infrastructure began to collapse. A pattern of spread began to develop primarily to the north of Kwangtung Province. It became possible to predict a chronological sequence from one province to the next by tracing the movements of Red Guard units. In mid-January the epidemic was reported in Fu- ch'ing, Fukien Province (bordering Kwangtung Province on the northeast) and a Red Guard unit from Chi-mei diverted its march at this time to avoid Fu-ch'ing. At Ching-kang Shan, over 60,000 Red Guard each day were visiting the cradle of the Chinese Communist Revolution. Following an outbreak of the disease, the area was placed under quarantine. So it went---little being done to restrict mass move- ments until an outbreak occurred. In almost perfect order, meningitis infected one province after another all the way to the northeast Soviet border, and, as it struck, the movement and activities of Red Guards were hampered. 72 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Apprgy,,for Release 2005/02/17: CIA-RDP78T03194A0003&E&9Le013-8 At this point, OSI analysts knew the identity of the disease and where it was going. The question now was how to quantitatively estimate the impact on the Chinese population? The only reports received were general descriptions such as "many sick and dying"; "many dead"; "no drugs"; "hospitals overcrowded"; "quarantines"; and "the most serious thing that has happened since the liberation." An attempt was made to model the epidemic on paper based on an analysis of outbreaks that have occurred in Western countries. In such disease outbreaks a very high percentage of people are known to carry the infection and about one-half to one percent of these will become ill with the disease. Given the estimated Chinese population in the infected provinces and also the ones in the path of the epidemic, a range of about 2.5 to 5.0 million cases was arrived at. It was an impressive range but descriptive accounts of the epidemic still appeared to be in excess of calculations. The medical situation was presented to analysts in the Office of Economic Research (OER) who were able to complement the analysis. Projected population figures showed that there were 130 million children in the 0-4 age group and in the 0-24 age group about 500 million. Well over half of China's population consisted of young people----the very ones most "at risk" in a meningitis epidemic. It became apparent that in addition to the actual epidemic problems, considerable alarm and panic was being generated which could impede control of the disease. Real and imagined symptoms would initiate frantic appeals for medical assistance and drugs, thereby disrupting internal distribution systems. OER analysts also indicated that in addition to producing sulfadiazine, China imports small amounts of this drug to meet the normal requirements. Overall, there existed a close balance between supply and demand. The amounts needed for treatment based on the calculated incidence rate was small in compari- son to that needed to provide broad prophylactic protection to a large segment of the population. State Department officials were advised of these new developments. It was clear that an excellent opportunity was present to help "reduce tensions" between the U.S. and Chinese Governments by rescinding the U.S. ban on exports of drugs and other medical supplies. A formal offer to assist China in controlling the epidemic was made by the State Department. China did not respond to this gesture. Nevertheless, by February, shortages of sulfadiazine began to occur, with reports of many Chinese resorting to ineffective traditional medicines and urgent calls for sulfadiazine being placed on higher echelons by local health units. Soon thereafter China solicited SECRET 73 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apgp~kgTFor Release 2005/02/17: CIA-RDP78TO3194A00g300010013-8 isease Western European and Asian pharmaceutical companies to make available substantial quantities of sulfadiazine. An accounting of the total amounts imported to China was attempted but much of the information was related to negotiations on purchase prices. At least several hundred metric tons were known to have been shipped between February and April to supplement China's internal produc- tion. Calculations based on chemoprophylactic dosage requirements (0.5 grams for children, 1.0 grams for adults each 12 hours for four doses) indicated that enough had been imported to protect about 100 million persons. Chinese authorities broadcasted many appeals for "masses" of doctors and nurses to act in halting the contagious disease that was erupting and flowing from place to place. They then attributed the epedemic to medical workers who had not followed Chairman Mao's orders for the care of the country's 700 million persons. In retrospect, the "barefoot doctors" program to provide medical services and disease reporting in rural areas was a logical outgrowth of this massive epidemic. Whether the ensuing decline of the disease was due to the extensive use of sulfadiazine or to the normal decline of the epidemic cycle was never ascertained. It was followed by other predicted disease outbreaks (i.e., hepatitis, measles), and a recurrence of a much less severe meningitis epidemic in the winter of 1967-1968. Ns a postscript, China's failure to prevent and control the spread of diseases was viewed by the USSR as a fundamental weakness of the Chinese health services and the Soviet Ministry of Health abruptly rescinded the 1960 Sino-Soviet agreement on mutual abolition of vaccination requirements for travellers between these countries. Project IMPACT went global in the summer of 1968 when a new strain of influenza rolled out of China and within a short period of time affected one out of every four persons in the world. The strain was not an unusually lethal one but it was only by chance that it was not. Again, various Agency sources provided the first indication of the beginning of this worldwide pandemic when the disease moved from China via travellers to Hong Kong in late June. An estimated 500,000 cases resulted in Hong Kong alone including 30 percent of the personnel at the American Embassy. At this time a unique oppor- tunity was available to review statistical data on influenza (a pro- gram to computerize disease information to derive trends, cycles and predictions had already been initiated under a CIA Project called BLACKFLAG); the current epidemic in Hong Kong was causing the highest incidence since the first Asian Type A2 epidemic of 1957. While the epidemic appeared to be progressing in a new way, initial 74 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approggg J r Release 2005/02/17 : CIA-RDP78T03194A0003YgeJ"13-8 curiosity subsided when a laboratory report from Hong Kong identi- fied the strain as the common Type A2 variety. Soon, however, separate reports from laboratories in Japan, U.S., and England identified antigenic (genetic) changes in specimens iso- lated in Hong Kong. Investigators at the Japanese National Institute of Health identified the Hong Kong influenza virus as a new Asian Type A3. In the U.S., isolates of the disease showed a magnitude of antigenic dissimilarity which had not been observed previously with Type A2 specimens. The World Health Influenza Center in London also noted an antigenic shift from previous A2 strains. Summarized findings noted: "the emergence of a new strain occurs every 10-15 years and together with rapid transportation, and in the absence of specific vaccines, leads us to believe that the disease may cause exten- sive outbreaks throughout the world in the coming months." Medical members of the Scientific Intelligence Committee were informed of these developments. The Defense Intelligence Agency member, in turn, alerted representatives of the Army Surgeon General's Office and following their conference with scientists at the Communicable Disease Center, an overall emergency plan was approved. Orders were issued to produce as rapidly as possible, large quantities of vaccine to protect military, public health and Government personnel, and civilians in high risk categories. The World Health Organization in August officially designated the new virus strain as Hong Kong/ A2/68. The race began in many countries to manufacture vaccine before the disease struck. Data was available on earlier flu epidemics from which could be derived a projected pattern of an eastward move- ment across Europe enabling a forecast of this spread. The disease would be in the Soviet Union about February, 1969, some two to three months after it reached Europe. Thus, the Soviets had an esti- mated seven month lead time, and reports on their progress in manu- facturing and distributing Hong Kong flu vaccine were anticipated. Instead, the Soviets continued to vaccinate the urban population (about 75 percent) with the standard A2 vaccine which was shown even in August, to have very little protective value against Hong Kong flu (this decision later was reported to be based on their inability to make the new vaccine in less than a year and their gamble that A2 vaccine would help). By late January, the flu was present in many Soviet cities and incidence rates began to increase sharply. Central Asian areas also were facing their worst winter in 90 years as record snow fall and cold temperatures helped to disrupt medical assistance plans. A massive educational campaign on TV and local news media SECRET 75 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Disease was initiated in Soviet cities on how to avoid the disease. "Flu sta- tions" were set up on corners to dispense cold remedies, but in the absence of specific prophylaxis, this effort was largely academic. Workers were given an extra day of sick leave in addition to the usual five days granted for flu cases. About 25 percent of the Moscow population was stricken (about 30 percent in Leningrad) and it was assumed that comparable figures occurred in most other population centers known to have been infected. The disease produced an ever widening ripple of effects on military and civilian activities (i.e., dis- ruption of military training and industrial production schedules, which were clostly in terms of sick relief payments, medical assistance, etc.). As the effects were felt in the Soviet Union they called the dis- ease "Mao's flu." The direct and indirect cost of the epidemic was calculated to be several billion rubles. Soviet health officials were criticized for their inept handling of the epidemic which caused considerable harm to the economy and to the health of the people. It caused five to six times as much illness as the total of all other infections. In response, health officials in the USSR recommended that they be freed from "petty supervision by dozens of incompetent authorities." The Soviet Medical Gazette in an excellent review of the controversy noted that in the absence of more specific preventive measures, scientists, doctors, and particularly the Soviet population, are still indebted to the practical health workers. Influenza also reached Southeast Asia and project IMPACT was applied to forecast, and quantify the effects upon Viet Cong and North Vietnamese Army (VC/NVA) forces. A chronology of the times and locations of outbreaks was made from reports over the 1968-1970 period including any quantifiable figures on the rates of sickness and the frequency of VC/NVA requests for drugs and other medical sup- plies. There evolved a pattern which showed that the occurrence of influenza was a function of traffic density and personnel moving south from North Vietnam and coincided with the dry season when the bulk of all military supplies moved down the Ho Chi Minh Trail. Incapacitation rates ranged from about 40 to 70 percent and there was very good evidence that except for the isolation and quarantine of patients, no capability existed to specifically protect their military personnel by mass vaccinations. In December 1970, reports of out- breaks among VC/NVA forces in North Vietnam Laos border area began to be noted with increased frequency-the stage was set for the beginning of the 1971 influenza epidemic there. Staff personnel of the Special Assistant/ Vietnam Affairs (SA/VA) were consulted, and together with their data on traffic routes, troop Applov ed For Release 2005/02/17: CIA-RDP78T03194A00&3II& 0013-8 ApproDgddser Release 2005/02/17 : CIA-RDP78TO3194A00039WROD13-8 concentration, and locations of waystations (Binh Trams), made it possible to construct a model of the direction of the influenza epidemic. Tchepone was a key junction on the Communist roadnet which ex- tends into Southern Laos-if Tchepone became infected, the disease would move from Binh Tram to Binh Tram north and south in Laos and back to North Vietnam (see Figure 2). In late December there were indications that the NVA 4th and 16th AAA Battalions at Tche- pone had become infected. It was estimated that in the primary in- fected area of Quang Binh Province the epidemic peak would occur about 30 January 1971 and in the secondary infected area south of Tchepone the peak would be about mid-February 1971. An overall 50 percent infection rate was calculated for VC/NVA personnel in those areas and it was estimated that one-half of those infected would be incapable of performing normal duties for about a week. A warning was sent to indigenous intelligence teams operating in Laos and Cambodia to take special precautions during these peak influenza periods. Inasmuch as vaccination was not practical, an anti- flu drug, amantadine HCL, which had been shown to help prevent the disease was recommended for these teams. During February 1971, South Vietnamese army units entered Laos and conducted extensive operations near Tchepone and other areas in and near the primary infectious zone. Unfortunately, these operations took place just after the predicted time for the peak incidence. Combat effectiveness of committed VC/NVA forces probably was affected to a lesser degree by the declining incidence rate of influenza during February. This aspect was, however, difficult to quantitate. The Future Keeping ahead of meningitis and influenza required an extended all-out effort to assess, in each case, the disease with its special condi- tions so that the epidemic consequences could be projected. Analysts in what appeared to be completely unrelated fields of interest, all had significant bits of data to support and extend the forecasts. Disease intelligence can provide an initiating and vital role in the more familiar political, military and economic categories of intelligence. Project IMPACT clearly indicated that nothing is more interna- tional than diseases which recognize no political boundaries and few natural ones. Human diseases move freely across national frontiers and spread as conditions permit from one area to another. Even in the case of diseases of plants and animals, there is little doubt today that pathogenic organisms themselves are either already globally dis- tributed or can rapidly become so. The appearance of something new SECRET 77 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 AppSp fTFor Release 2005/02/17: CIA-RDP78T03194A00 , %q 0013-8 like Hong Kong influenza or the recent and costly spread of Vene- zuelan equine encephalomyelitis into the U.S. from Mexico can have demonstrable intelligence implications. Such disease events un- doubtedly will occur in the future, and they will be much nastier to all facets of human activity. Disease impact predictions require the retrieval and analysis of im- mense amounts of unclassified and classified data. This must be done in a very short time period if it is to be responsive to the current world disease situation. The techniques learned in working out the basic approaches on a few selected situations has led the Office of Scientific intelligence to initiate an extensive effort to develop com- puter assisted working tools to retrieve the desired data quickly and to calculate statistical summaries and the probability of an epidemic spread. Mathematical models also are being designed for a multitude of epidemic diseases to give a rapid up-date and display capability. Project IMPACT depends upon such systems, but its best asset is still the cooperation of analysts in varied disciplines who help in the predictive processes. 78 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A0003Qge 913-8 No Foreign Dissern On assessing timing STRATEGIC WARNING: THE PROBLEM OF TIMING' Cynthia M. Grabo A widely held concept about warning is that, as the hour of the enemy attack draws near, there will be more and better evidence that enemy action is both probable and imminent. From this, the idea follows naturally that intelligence will be better able to provide warning in the short term and will, in the few hours or at most days prior to the attack, issue its most definitive and positive warning judg- ments. Moreover-since there is presumed to be accumulating evi- dence that the enemy is engaged in his last-minute preparations for the attack-this concept holds that intelligence will likely be able to estimate the approximate if not the exact time of the attack. There- fore, if we can judge at all that the attack is probable, we can also tell when it is coming. This concept of warning-as a judgment of imminence of attack- has strongly influenced US thinking on the subject for years.. As of this writing, the official definition of strategic warning in the JCS Dictionary is, "A notification that enemy-initiated hostilities may be imminent." More explicitly, the US national warning estimate of 1966 concluded: "Intelligence is not likely to give warning of probable Soviet intent to attack until a few hours before the attack, if at all. Warning of increased Soviet readiness, implying a possible intent to attack, might be given somewhat earlier." However logical these suppositions may appear in theory, they are not supported either by the history of warfare nor the experience of warning analysts, and in recent years more realistic assessments of this problem have begun to appear in warning papers and estimates. For the fact is that warning judgments are not necessarily more accurate or positive in the short term and that assessing the timing of attack is often the most elusive, difficult and uncertain problem which we have to face. It is simply not true that the last few days or hours 1 This article is adapted from a chapter of A Handbook of Warning Intelligence which the author is preparing for the training of intelligence personnel in analytical problems of strategic warning. SECRET 79 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300( I1RP PAGES 79-92 App ggTFor Release 2005/02/17 : CIA-RDP78TO3194A00G3000110013-8 ing prior to the initiation of hostilities are likely to bring more and more specific indications of impending attack which will permit a better or more confident judgment that attack is likely or imminent. In many eases experience shows that the reverse will be true, and that there will be fewer indications that the attack is coming and even an apparent lull in enemy preparations. This can be quite deceptive, even for those who know from experience not to relax their vigilance in such circumstances. Those who do not understand this principle are likely to be totally surprised by the timing--or even the oc- currence-of the enemy action. They will probably feel aggrieved that their collection has failed them and they will tend to believe that the remedy for the intelligence "failure" is to speed up the col- lection and reporting process, not appreciating that the earlier collec- tion and analysis were more important and that a judgment of proba- bility of attack could have been reached much earlier and should not have been dependent on highly uncertain and last-minute collection breakthroughs. Principal Factors in the Timing of Attacks and the Attainment of Surprise Nearly all nations, except in unfavorable or unusual circumstances, have shown themselves able to achieve tactical surprise in warfare. [hstory is replete with instances in which the adversary was caught unawares by the timing, strength or location of the attack-even when the attack itself had been expected or considered a likelihood. I+:ven democracies, with their notoriously lax security in comparison with closed societies, have often had striking success in concealing the details (including the timing) of their operations. To cite the most con- spicuous example, the greatest military operation in history achieved tactical surprise even though it was fully expected by an enemy who potentially had hours of tactical warning that the massive invasion force was approaching. It was the Normandy invasion, in which de- ception played a major role in misleading the Germans. It is not only by deception, however, that tactical surprise is so often achieved and that last-minute preparations for the attack can be concealed. A more important and more usual reason is that the indications of attack which are most obvious.and discernible to us are the major deployments of forces and large-scale logistic prepara- tions which are often begun weeks or even months before the attack itself. Once these are completed, or nearly so, the enemy will have attained a capability for attack more or less at the time of his choosing, and the additional preparations which must be accomplished shortly 80 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approed For Release 2005/02/17: CIA-RDP78T03194A0003flOJ jLW13-8 arning prior to the attack are much less likely to be discernible to us or may be ambiguous in nature. Staff conferences, inspections, the issuance of basic loads of ammunition and other supplies, and the final orders for the attack all are measures which require little overt activity and are not likely to be detected in time except by extraordinarily fine collection and rapid reporting-such as a well-placed agent in the enemy's headquarters with access to some rapid means of communica- tions, or the fortuitous arrival of a knowledgeable defector. Even the final deployments of major ground force units to jumpoff positions for the assault may be successfully concealed by the measures which most nations take to insure tactical surprise--including rigid com- munications security and night movements. Thus, unlike the major deployments of troops and equipment which almost never can be en- tirely concealed, the short-term preparations have a good chance of being concealed, and quite often are. And, even if detected, there will often be minimal time in which to alert or redeploy forces for the now imminent attack, still less to issue warning judgments at the national level. Such tactical warning usually is an operational problem for the commander. Ten minutes or even three hours warning does not allow much time for the political leadership to come to new de- cisions and implement them. Another facet of the problem of assessing the timing of attack is the difficulty of determining when the enemy's preparations are in fact completed, and when he himself will judge that his military forces are ready. It will often be particularly difficult to make this judgment with regard to logistic preparations. In fact, I can recall no instance in my experience in which it could be clearly determined that the logistic preparations for attack were complete, particularly since heavy supply movements usually continue uninterrupted even after the attack is launched. There has often been a tendency for intelli- gence to believe that all military preparations are completed earlier than in fact is the case-the discrepancy usually being attributable to the fact that the major and most obvious troop deployments had apparently been completed. Thus, even when intelligence has come to the right judgment on enemy intentions, it has sometimes been too early in its assessment of the possible timing of the attack. In addition, the enemy command for various reasons may not go through with an attack as soon as the forces are fully prepared, or may change the date of the attack even after it has been set. A recent study has compiled some data concerning the frequency with which D-Days are not met, and the effects of this on the adversary's judg- ments. Of 162 cases analyzed where D-Days applied, almost half Approved RFor Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Warning (about 44 per cent) were delayed, about five per cent went ahead of schedule, and only slightly more than half (about 51 per cent) remained on schedule. The most common reasons for delay were weather and administrative problems, presumably in completing or synchronizing all preparations. Some attacks have had to be postponed repeatedly. For example, the Germans' Verdun offensive of 21 February 1916 was postponed no less than nine times by unfavorable weather? Such changes in plans have sometimes had notable effects on the opponent's assessments, particularly when he has gone through one or more alerts of impending attack which failed to materialize. Whaley notes that the finding that procrastination can help to generate surprise is explainable by the "cry-wolf" syndrome-whereby the false alert, and particularly a series of them, breeds skepticism or downright disbelief of the authentic warning when it is in fact re- ceived. "Moreover, the trend is that the greater the number of false alerts, the greater the chance of their being associated with sur- prise.. . . [The] Aesopian moral seemingly holds . . ., the false alarms serving mainly to undermine the credibility of the source and dull the effect of subsequent warnings. . . . It is ironic that . . . some of the 1)-Day warnings were quite authentic, the enemy having merely un- expectedly deferred the operation. The consequence was, of course, that several superb intelligence sources including Colonel Oster, Sorge and Rossler received undeserved black marks on the eve of their sub- sequent definitive alerts." 3 Of all aspects of operational planning, the easiest to change and most flexible is probably timing. Once troops are in position to go, orders to attack usually need be issued no more than a few hours ahead, and the postponement of even major operations rarely presents great difficulties to the commander. Attacks have been postponed- or advanced-simply because there was reason to believe that the enemy had learned of the scheduled date. Obviously, among the simplest of deception ruses is the planting of false information concern- ing the date of operations with the enemy's intelligence services. In addition to general preparedness, tactical factors and surprise, operations may be delayed for doctrinal reasons or to induce enemy forces to extend their lines of communication or to walk into entrap- ments in which they can be surrounded and annihilated. The delayed counteroffensive, designed to suck enemy forces into untenable ad- vanced positions, is a tactic which the Communists have employed 2 Barton Whaley, Stratagem: Deception and Surprise in War (Cambridge, Mass., MIT Center for International Studies, April 1969), pp. 177-78, and A--69. I I bid, pp. 187-188. AppWved For Release 2005/02/17: CIA-RDP78T03194A000300010013-8 Approdn For Release 2005/02/17 : CIA-RDP78T03194A000%% 13-8 ing with devastating effect. Obviously, misjudgments of the enemy's intentions in such cases have been heavily influenced by the seeming delay in his response, which induces a false sense of security that he will not respond at all. Political factors also may weigh heavily or even decisively in the timing of operations. This, of course, will be particularly true when (as is often the case) the nation in question intends to resort to mili- tary operations only as a last resort and hopes that the threat of such action will induce the opponent to capitulate. Obviously, in such cases, the decision of the national leadership that the political options have run out and that only force will succeed will be the determining factor in when the military operation is launched. In this event, operations may be deferred for weeks beyond the date when mili- tary preparations are completed, and the assessment of the timing of the attack may be almost exclusively dependent on knowledge of the political situation and insight into the enemy's decision-making process. Still another political variant which may affect the timing of attack is when one nation is attempting to induce the other to strike the first major blow and thus appear as the aggressor. In this case, a series of harassments, border violations and various clandestine tactics may be employed as the conflict gradually escalates until one or the other power decides to make an overt attack. Clearly, the point at which this may happen will be very difficult to predict. Apart from the various reasons noted above, there may be other largely tactical considerations which will affect the timing of attack. Weather, as already mentioned, is one of these-not only visibility, but in some cases winds, tides, moonlight or lack of it. Conditions of roads and terrain of course have been a major determining factor in when some operations will be launched. Military operations and logistic movements of Communist forces in Southeast Asia have tra- ditionally been greatly slowed, if not halted altogether, at the height of the rainy season, and spring thaws on the plains of central Europe have delayed many operations. In cases where weather effectively precludes overland movement, it is of course highly probable that attacks will not occur. Nonetheless, there is always a chance that an enemy may choose to attack even in highly adverse conditions in the interests of achieving surprise. As is well known, many attacks are initiated near dawn, for two reasons: the nighttime cloaks the final deployments of the attacking units, and the hours of daylight are desirable to pursue the opera- tion. Several Communist nations, however, have shown a marked SECRET 83 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Warning favoritism for attacks in the dead of night. This has been particularly true of North Vietnamese and Viet Cong forces, which have shown themselves highly adept in night penetration operations and assaults. The USSR also has often launched attacks or other operations hours before dawn: the operation to crush the Hungarian revolt began be- tween about midnight and 0330; the Berlin sector borders were sealed about 0300; the invasion of Czechoslovakia began shortly before midnight. The USSR also has shown some favoritism for Sunday, both the Hungarian and Berlin operations having occurred in the early hours of a Sunday morning. It would be dangerous, however, to assume that this would be the case. The invasion of Czechoslovakia occurred, for instance, on a Tuesday night, slightly to the surprise of some who had come to expect Soviet operations to begin on Sundays. Whaley has found some preference for Sunday operations among Communist states but not in a majority of cases; it was true in only about one- fourth of the operations which he studied .4 Among other nations, there does not appear to be any evident preference for particular days of the week. In cases where Sunday is chosen, it is not for any anti- religious reason, but because the alert status of most Western nations is then usually lowest. The Japanese selected Sunday for the Pearl Harbor attack because their observations had shown that most US ships would then normally be in port. & me Examples of Problems in Assessing Timing Because of space limitations, discussion of more than a few examples is precluded, and even these must be covered briefly. There is considerable military historical writing, particularly on World War II, which may be consulted by those who wish to study this aspect in more detail, as well as the many examples in Whaley's previously cited work. Since much of this material is readily available, the examples below include only two from World War 11 with the remainder drawn from more recent intelligence experience. The German Attack on Holland, Belgium and France, May 1940 World War II had been under way for eight months before Hitler finally launched his offensive against Western Europe in May 1940, the long delay in the opening of the western front having generated the phrase "phony war." All three victims of the final assault had ample and repeated warnings, and indeed it was the redundancy of 84 ved For Release 2005/02/17 : CIA-RDP78T03194A0003Q8010013-8 Appro Apprqxepdn For Release 2005/02/17 : CIA-RDP78TO3194A000 00010013-8 warnings which in large part induced the reluctance to accept the final warnings when they were received. The "cry-wolf" phenomenon has rarely been more clearly demonstrated-Hitler is said to have postponed the attack on the West 29 times, often at the last minute. Owing to their access to one of the best-placed intelligence sources of modern times, the Dutch had been correctly informed of nearly every one of these plans to attack them, from the first date selected by Hitler, 12 November 1939, to the last, 10 May 1940. Their source was Colonel Hans Oster, the Deputy Chief of German Counterintelligence, who regularly apprised the Dutch Military Attache in Berlin of Hitler's plans-and of their postponements. Although in the end Oster provided one week's warning of the 10 May date, and there was much other evidence as well that the German attack was probably imminent, the Dutch ignored the warnings and failed even to alert their forces prior to the German attack. The Belgians, more heedful of. the numerous warnings received, did place their forces on a general alert. The French, having also experienced several false alarms of a German attack, seem to have ignored the repeated warnings of their own intelligence in early May, including a firm advisory on 9 May that the attack would occur the following day. These instances also illustrate two fun- damental precepts of indications intelligence: "more facts" and first-rate sources do not necessarily produce "more warning," and intelligence warnings are useless unless some action is taken on them. The Soviet Attack on Japanese Forces, August 1945 This is one of the lesser studied World War II examples, but clearly shows the difference between strategic and tactical warning. The Japanese watched the buildup of Soviet forces in the Far East for about seven months (December 1944 through July 1945). They correctly judged that the USSR would attack the Japanese Kwantung Army in Manchuria, and they were: able by July to conclude, also correctly, that the status of Soviet military preparations indicated that the USSR would be ready to attack at any time after 1 August. Despite this expectation which almost certainly must have resulted in a high degree of alert of the Japanese forces in Manchuria, the Kwantung Army had no immediate warning of the timing of the attack, which occurred about midnight on the night of 8-9 August. The North Korean Attack on South Korea, June 1950 . This was a notable example of both strategic and tactical surprise, and indeed one of the few operations of this century which truly may SECRET 85 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300O 0013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET Warning be described as a surprise attack. Neither US intelligence, at least in its official publications, nor policy and command levels had expected the attack to occur, as a result of which there had been no military preparations for it. The South Koreans, despite many previously expressed fears of such an attack, also were not prepared and had not alerted their forces. Since strategic warning had been lacking, the short-term final preparations of the North Korean forces (insofar as they were detected) were misinterpreted as "exercises" rather than bona fide combat deployments. In considerable part, the warning failure was attributable to inadequate collection on North Korea- but the failure to have allocated more collection effort in turn was due primarily to the disbelief that the attack would occur. In addition, the "cry-wolf" phenomenon had in part inured the community-for at least a year, there had been about one report per month alleging that North Korea would attack on such-and-such a date. When another was received for June, it was given no more credence than the previous ones-nor, in view of the uncertain reliability and sourcing of all these reports, was there any reason that it should have been given greater weight. Although we can never know, most and perhaps all of these reports may have been planted by the North Korean or Soviet intelligence services in the first place. The attack is a notable example of the importance of correct prior assessments of the likeli- hood of attack if the short-term tactical intelligence is to be correctly interpreted. Chinese Intervention in the Korean War, October-November 1950 Among the several problems in judging Chinese intentions in the late summer and fall of 1950 was the question of the timing of their intervention. Based on the premise that the less territory one gives up to the enemy, the less one's own forces will have to recover, the Chinese can be said to have intervened much "too late" in the conflict. And this conception of the optimum time for Chinese intervention strongly influenced US judgments of their intentions. From the time the first direct political warning of the Chinese intention to intervene was issued on 3 October (to the Indian Ambassador in Peking) until the first contact with Chinese forces in Korea on 26 October, all Com- munist resistance in Korea was rapidly collapsing as the US/UN forces were driving toward the Yalu. As the Chinese failed to react and the Communist prospects for recouping their losses appeared increasingly unfavorable, the Washington intelligence community (and probably the Far East Command as well) became increasingly convinced that the time for effective Communist intervention had passed. In the Approved For Release 2005/02/17 : CIA-RDP78T03194A0003&M013-8 App W +P'1 r Release 2005/02/17 : CIA-RDP78T03194A000 T0013-8 week prior to the first contact with Chinese forces, the US national warning committee (then known as the Joint Intelligence Indications Committee, the predecessor of the Watch Committee) actually went on record as stating that there was an increasing probability that a decision against overt intervention had been taken. Once the Chinese forces had actually been engaged, there was an interval of a month before they became militarily effective and launched their massive attacks in late November. Thus in this period the intelligence process again was confronted with the problem of assessing the timing of any future Chinese operations, as well of course as their scope. The four-week period produced many hard indications, both military and political, that the Chinese in fact were preparing for major military action. But there was virtually no available evidence when such action might be launched, and even those who believed that the coming offensive was a high probability were somewhat per- plexed by the delay and were unable to adduce any conclusive indica- tions of when the attack would occur. As is well known, tactical surprise was indeed achieved. Even in retrospect, we cannot be sure whether the Chinese delayed their intervention and their subsequent offensive because of political indecision, the need for more time to complete their military prepara- tions, or as a tactical device to entrap as many UN forces as possible near the Yalu. I believe that military rather than political factors probably delayed the initial intervention and that both preparedness and tactical considerations accounted for the delay in the offensive, but I cannot prove it. Others may argue-and they cannot be proved wrong-that the Chinese may not have decided inevitably on inter- vention by 3 October, and/or that negotiations with the USSR and North Korea may have delayed the intervention as much as military factors. The Arab-Israeli Six-Day War, June 1967 There were many indications of the coming of this conflict. From 22 May, when Nasser closed the Gulf of Aqaba to Israeli shipping, tensions had been mounting, and the possibility of war was universally recognized. Both sides had mobilized and taken numerous other mili- tary preparedness measures. Before 1 June US intelligence was on record that Israel was capable of and ready to launch a preemptive and successful attack with little or no warning, and that there was no indication that the UAR was planning to take the military initiative. The US predictions of the likelihood and probable success of an :Israeli SECRET 87 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Apprggeq Jor Release 2005/02/17: CIA-RDP78T03194A00qW0010013-8 Warning assault were highly accurate, although the precise timing and tactics of the operation, of course, were not known to us .5 The Israelis nonetheless achieved almost total tactical surprise against the Arabs in their attacks on the morning of 5 June, particu- larly in the decisively effective air strikes. The Israelis screened their plans by a combination of rigid security (there was no leak of their decisions or final military preparations) and an exceptionally well- planned and effective deception campaign. There were several facets of the deception plan, one of which was to lead Egypt to believe that the attack, if it occurred, would be in the southern Sinai rather than the north. In addition, numerous measures were taken in the several days prior to the attack to create the impression that attack was not imminent. These included public statements by newly appointed Defense Minister Moshe Dayan that Israel would rely on diplomacy for the present, the issuance of leave to several thousand Israeli soldiers over the weekend of 3-4 June, public announcements that concurrent Israeli cabinet meetings were concerned only with routine matters, and so forth. In addition, the attack was planned for an hour of the morning when most Egyptian officials would be on their way to work and when the chief of the Egyptian Air Force usually took his daily morning flight.6 The Invasion of Czechoslovakia, 20-21 August 1968 This case well demonstrates the impact on intelligence assessments of the seeming deferral of a military operation beyond the date when the forces appear to be ready, and when the intelligence community is psychologically most ready to accept the likelihood of such action. As will be recalled, the major deployments of the Soviet and Warsaw Pact forces for the invasion had largely been completed by 1 August, and it was at this time that US intelligence reached its firmest judg- ments-i.e., that Soviet forces were in a high state of readiness to invade if it was deemed necessary. When the Soviet Union did not invade in early August but instead reached a tenuous political agree- ment with Czechoslovakia, a letdown occurred and intelligence assess- ments almost immediately began placing less stress on the Soviet capability to invade. In fact, that capability was being maintained See J. L. Freshwater, "Policy and Intelligence: The Arab-Israeli War," Studies in Intelligence, Winter 1969, for a discussion of the assessments made by the US intelli- gence community prior to the outbreak of this conflict. 6 A great deal of material on the Israeli planning has been brought to light, much of it unclassified. An excellent, unclassified summary of the techniques of deception and tactical surprise has been prepared by the Syracuse University Research Corporation, Syracuse, New York. 88 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr9ygAF8r Release 2005/02/17: CIA-RDP78T03194A000 J~Nt9013-8 and actually was increasing. Logistic activity was continuing at a high level-the USSR did not announce until 10 August the conclusion of its so-called rear services "exercise" which served as the cover story for the mobilization and forward deployment of the invasion forces. Moreover, substantial additional forces from the Baltic and Belorus- sian Military Districts were continuing to deploy into Poland in the first half of August. So long as this buildup continued, or was being maintained, the possibility of course was in no way reduced that the USSR sooner or later would exercise its military capability. Nonethe- less, the psychological peak of our readiness for the invasion had passed well before it occurred. Since there was very little last-minute warning (such indications as there were mostly reached us too late), the USSR achieved effective tactical surprise against both the Czech- oslovaks and ourselves. The Czechoslovak case provides an outstanding illustration of the critical importance for warning of the judgment of probability of attack and of the lesser likelihood that intelligence will be able to as- sess the timing or imminence of attack. US intelligence in this instance, as in others, placed too great weight on short-term or tactical warning, and too little on the excellent strategic intelligence which it already had. Moreover, many persons (including some at the policy level who were aggrieved that they had not been more specifically warned) tended to place the blame on the collection system which in fact had performed outstandingly in reporting a truly impressive amount of military and political evidence, much of it of high quality and validity, bearing on the Soviet intention. The intelligence community, while clearly reporting the USSR's capability to invade, deferred a judgment of whether or not it would invade in seeming expectation that, some more specific or unequivocal evidence would be received if invasion was imminent. On the basis of historical precedent and the experience derived from numerous warning problems, this was a doubtful expectation; an invasion remained a grave danger, if not probable, so long as the military deployments were maintained, while the timing was far less predictable. The history of warfare, and of warning, demonstrates that tactical evidence of impending attack is dubious at best, that we cannot have confidence that we will receive such evidence, and that judgments of the probable course of enemy action must be made prior to this or it may be too late to make them at all. North Vietnamese Attacks in Laos and South Vietnam, 1969-70, 1971-72 As a final example of problems in timing, three instances of North Vietnamese attacks in Laos and South Vietnam provide quite striking SECRET 89 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 SECRET Warning evidence of the problems of assessing timing of attacks even when the preparatory steps are quite evident and firm judgments of probable attack have been made. Traditionally, in the seesaw war in northern Laos, the Laotian government forces have made gains in the Plaine des Jarres area dur- ing the rainy season, and the Communist forces (almost entirely North Vietnamese invaders) have launched offensives during the dry season (November to May) to regain most of the lost territory and sometimes more. In the fall of 1969, evidence began to be received unusually early of North Vietnamese troop movements toward the Plaine des Jarres, including major elements of a division which had not previously been committed in the area. As a result, the US Watch Report beginning the first week of October unequivocally forecast a major Communist counteroffensive. After eight consecutive weeks of this conclusion (qualified in later weeks by the proviso "when the Communists have solved their logistic problems"), it was decided to drop it-not because it was considered wrong, but because con- sumers were beginning to question repeated forecasts of an enemy offensive which had not materialized yet, and the impact of the warning was beginning to fade. In mid-January, evidence began to become available that preparations for an attack were being intensi- fied, and a forecast of an impending major offensive was renewed. The long-expected offensive finally came off in mid-February, or four months after the troop buildup and the initial prediction of the attacks. The delay was not a surprise to experienced students of the area, who had learned that the North Vietnamese meticulously plan and rehearse in detail each offensive operation and that their attacks almost always were slow in coming. Two years later in the fall of 1971, a very similar repetition of the North Vietnamese buildup in northern Laos began, again in October and again involving the same division, although this time there were indications (such as the introduction of heavy artillery) that an even stronger military effort would be made. Intelligence assessments again forecast major North Vietnamese attacks in the Plaine des Jarres but for the most part avoided any firm judgment that they were necessarily imminent. There was almost no tactical warning of the attacks which this time were launched in mid-December in unprecedented strength and intensity. Within a few days, all Laotian government forces were driven from the Plaine, and within three weeks thereafter, the North Vietnamese launched an offensive against government bases south- west of the Plaine. Appr% ed For Release 2005/02/17 : CIA-RDP78T03194A000?6?8EFb013-8 ApprWethhr Release 2005/02/17: CIA-RDP78T03194A000 Q013-8 Concurrently, the North Vietnamese were preparing for their major offensive against South Vietnam which finally kicked off on 30 March 1972 after months of buildup and intelligence and public predictions that an offensive was coming. Initial expectations, however, had been that the attacks most likely would come some time after mid-February, possibly to coincide with President Nixon's visit to China later that month. Once again, timing proved one of the most uncertain aspects of the offensive, and we remain uncertain whether Hanoi originally in- tended to launch the attacks earlier and was unable to meet its schedule, or never intended the operation to come off until the end of March. In retrospect, it appears that the forecasts of another "Tet offensive" in mid-February probably were somewhat premature, since the deployments of main force units and other preparations continued through March. Nonetheless, the intelligence forecasts were essentially right, and it could have been dangerous on the basis of the evidence available in mid-February to suggest that the attacks would not come off for another six weeks. Growing Recognition that Warning is Not a Forecast of Imminence It is from experiences like these (which are truly representative and not selected as unusual cases) that veteran warning analysts have become extremely chary of forecasting the timing of attacks. They have learned from repeated instances, in some of which the timing of operations appeared quite a simple or obvious problem, that this was not the case. In most instances, attacks have come later and sometimes much later than one might have expected, but even this cannot be depended on-sometimes they have come sooner. But except in rare cases any forecast of the precise timing of attack carries a high prob- ability of being wrong. There are just too many unpredictable factors- military and political-which may influence the enemy's decision on the timing and a multitude of ways in which he may deceive you when he has decided. This experience has finally borne fruit at the national estimative level. The last estimate to address possible warning of Soviet attack in Europe reversed the previous estimate (cited on the first page of this article) that warning of probable attack could not be given until a few hours before. It concluded instead that, once deployments and other military preparations had been largely completed, the chance of obtaining evidence of further military preparations would be greatly reduced, and that final warning that attack was imminent could likely be dependent largely on chance or other unpredictable factors. SECRET 91 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Apprff(!kVor Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 arning For strategic warning, the key problem is not when attack may oc- cur, but whether the enemy is preparing to attack at all--a judgment which we have a good and sometimes excellent chance of making with accuracy. Judgments often can be made, with less confidence in most cases, that all necessary preparations have probably been completed. A little less confidence still should be placed in forecasts as to when in the future all necessary preparations may be completed. At the bottom, and least reliable of all, will be the prediction of when the adversary may plan to strike. Strategic warning is not a forecast of imminent attack. Strategic warning is a forecast of probable attack and it is this above all which the policy official and commander need to know. If we recognize the un- certainties of timing, we will also be less likely to relax our vigilance or alerts because the enemy has not yet attacked even though he is seemingly ready. 92 ved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appro Approved For Release 2005/02/17 : CIA-RDP78T03194A000013-8 No Foreign Dissem INTELLIGENCE SUPPORT TO THE US SALT DELEGATION SALT, as readers will know, means Strategic Arms Limitation Talks. The talks, which are now under way between the US and the USSR, represent an effort to put a brake on the competition in nuclear delivery systems which has been a major aspect of the arms race between the two countries over the past quarter of a century. The SALT talks began in November 1969, and many of the people involved have been at it almost continuously since then. On 20 May 1971, after the most searching discussions ever held between the US and USSR on subjects of such vital importance to their national sur- vival, the two governments agreed to concentrate for the rest of this year on working out an agreement to limit ABM systems, and, to- gether with concluding such an agreement, to agree on certain measures with respect to the limitation of strategic offensive arms. In the session now under way here in Helsinki, the two delegations are seeking to carry out this guidance. The present session, called SALT V to signify the fifth round, began in July. It has now lasted nearly eleven weeks and is almost over. We will soon have a recess of perhaps a month for consultation in capitals, and will then reconvene at the alternate site of the talks in Vienna for yet another round. There are a number of considerations which have brought the two countries to the conference table to discuss strategic arms limitation. Among the most important are: first, the emergence on each side of a perception of mutual deterrence and rough strategic parity; secondly, an awareness on each side that another round in the arms race, while costly in terms of human and material resources, would almost cer- tainly not bring greater security to either country; third, the avail- ability on each side of intelligence collection systems capable of moni- toring the military programs of the other country without infringing on its territory. At SALT, intelligence resources fitting the foregoing description are called "national technical means of verification." In the SALT context, such systems appear to be tolerable to the USSR, whereas aerial overflight and on-site inspection continue to be a.nath- MORI/HRP PAGES 93-105 SECRET 93 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appr for Release 2005/02/17: CIA-RDP78T03194A00030R%1p013-8 ema to the Soviet leadership. Thus developments in intelligence techniques and capabilities, required by the imperatives of the race in strategic armaments, have helped create conditions in which the two sides can move toward verifiable limitations on such armaments. I am not at liberty to discuss the substantive details of the SALT negotiations. Respect for the privacy of the talks by all participants on both sides has been one of the characteristics which signify the serious and business-like way in which the two sides have proceeded. When the outcome is known, readers will be able to judge the results for themselves. My purpose in this report is to describe the delega- tions, the negotiating procedures, and the role of the CIA representa- tion. Someone around here once said "This isn't a delegation, it's a con- vention." By that he meant that the various members of the US delegation represent the several constituencies in the US government which have an interest in strategic defense programs and policies. He also meant that these constituencies have a certain independence (based on their statutory responsibilities), have certain points of view, and very definitely do not agree on certain issues. Participation by more than one constituency also characterizes the Soviet delegation. The head of the US delegation, Ambassador Gerard C. Smith, is a lawyer with long experience in atomic energy and arms control matters. Smith is Director of the US Arms Control and Disarmament Agency. The four other presently active delegates are: Ambassador J. Graham Parsons, a career foreign service officer from the Department of State; Mr. Paul H. Nitze, former Secretary of the Navy and Deputy Secretary of Defense and now a consultant to the Secretary of Defense; Lt. Gen. Royal B. Allison (USAF), Assistant to the Chairman, Joint Chiefs of Staff, for Strategic Arms Negotiations; Dr. Harold Brown, president of Cal Tech, former Secretary of the Air Force and now a member of the General Advisory Committee of ACDA. There are two inactive members: Ambassador Llewellyn Thompson, former US ambassador to the USSR; and Mr. Philip Farley, Ambassador Smith's deputy at ACDA. On the USSR side, the head of the delegation is Minister V. S. Semenov, the senior Deputy Minister of Foreign Affairs. (There is a first deputy, so Semenov is number 3 in seniority in the MFA.) The four other active delegates are: R. M. Timerbaev, a Deputy Chief of the International Organizations Division of the MFA and 94 ved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appro Appro94dTFor Release 2005/02/17 : CIA-RDP78T03194A0003QQQ*QV13-8 head of its U.N. component, who has taken over the SALT responsi- bilities of the ailing chief of the disarmament component of that division (there is no independent agency in the USSR equivalent to ACDA, and arms control matters are handled within the MFA); Lt. Gen. K. A. Trusov, a member of the Soviet General Staff; A. N. Shchukin, member of the USSR Academy of Sciences and chairman of its Scientific Council for the Propagation of Radio Waves; P. S. Pleshakov, a Deputy Minister of the USSR Radio Industry. There are two inactive members, Col. Gen. N. N. Alekseyev, a Deputy Minister of Defense, and Col. Gen. N. V. Ogarkov, First Deputy Chief of the Soviet General Staff. The delegations are teams representing their governments, but as their positions indicate, each delegate can also be said to represent a constituency and point of view within his government. This is also true of the advisors. On the US delegation at Helsinki there are 21 advisors and four interpreters. Six of the advisors are from ACDA, 3 from State, 5 from OSD, 4 from JCS, and 3 from CIA. That is to say, 3 of the 6 listed as State are from CIA-at the outset of the SALT talks serious consideration was given to acknowledging the CIA representation openly, but it was decided that it would be preferable not to do so, taking into account both Soviet sensitivities and CIA's general policy with respect to its employees overseas. The USSR delegation at Hel- sinki has 17 advisors and 4 interpreters; of the advisors, 12 are listed as MFA and 5 as Ministry of Defense. No one is listed as KGB or GRU, but our records show that two advisors are known or believed to be from these organizations. The two leaders of the US advisory group are Ray Garthoff, an authority on Soviet strategic affairs who is Deputy Director of the Bureau of Politico-Military Affairs at State, and Sid Graybeal, a missile expert who is Deputy Assistant Director, Bureau of Science and Technology, ACDA. These men are, respectively, Executive Officer and Alternate Executive Officer of the delegation. Both were once employed by CIA, where they dealt mainly with estimates and analysis of Soviet strategic capabilities and policy. Incidentally, the general secretary of the Soviet delegation, N. S. Kishilov, whose role corresponds to Garthoff's is a former military attache and GRU officer. The foregoing sounds like a couple of pretty compact little groups, 30 on the American side and 26 on the Russian. Readers may be surprised to learn that the American contingent at SALT in Helsinki actually comprises 85 people, counting all those others without whom the delegates, advisors and interpreters could not function. There are secretaries, administrative and security officers, documents officers, SECRET 95 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApU&v For Release 2005/02/17: CIA-RDP78T03194A0003S0&0013-8 communicators, Marine guards who provide 24-hour protection for our offices, and even a press officer whose job is to fend 'em off. The Russian contingent is somewhat smaller. This is mainly because the US delegation runs an office complex which is independent of the US embassy in Helsinki (and about 5 miles from it), whereas the USSR delegation moves into the large and very well staffed Soviet embassy, making use of its space and supporting personnel. Also, for some reason, the Russians do not seem to feel any need for a press officer. The Negotiations The fate of nations may once have been decided by ministers plenipotentiary, but not any more. The US delegation receives its guidance directly from Washington on an almost daily basis. This extremely close contact is attributable to the importance of the sub- ject, the participation of various constituencies in Washington, the NSC system as operated by the President and Dr. Kissinger, and the efficiency of modern communications. We have three separate com- munication setups here-State commo serving the delegation as a whole, and in addition State and ACDA; JCS commo serving JCS and OSD; and CIA commo serving CIA, the head of delegation, and the White House. Through these communications means, which in- clude an excellent secure voice telephone link manned by State but available to us all, we keep in constant touch with our masters and helpers back in Washington. The US delegation negotiates on the basis of both broad and detailed guidance in the form of National Security Decision Memoranda staffed through the NSC system and approved by the President. The Washington staffing is performed by the same agencies that are represented here, and CIA has an active role in that work. The role of the delegation here is to carry out the guidance, make the best possible case for the US point of view (talking to the USSR delegation and through it to Moscow), receive and interpret and where necessary rebut the Soviet arguments, expand areas of agreement and narrow areas of difference in the positions of the two sides, and, on all impor- tant issues, report to Washington and get new guidance. The delega- tion recommends to Washington that the US stick, compromise, fall back, or try a new tack as it considers appropriate. All of this takes time, in varying amounts depending on the difficulty and importance of the issue, the unanimity or lack of it within the dele- gation and among the various agencies in Washington, the need for homework, and the competition of non-SALT matters for the time and attention of the top US policymakers. These factors are at work 96 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approgjqffor Release 2005/02/17: CIA-RDP78T03194A0003(13-8 on the other side as well. A Soviet representative once said it took Moscow at least three weeks to respond to a major new proposal. Once recently, when we had every reason to believe the USSR dele- gation already had a prepared response in its pocket, they delivered it in a week. We have the impression that the Russians here limit their activities a bit more strictly to negotiating than we do, and that they rely more exclusively on staffing from Moscow. (One indication is that nine of the US advisors have scientific degrees, whereas at most three of the Soviet advisors have such training.) On the other hand, the USSR delegation once made clear that a new proposal they tabled had been originated by the delegation and approved by Moscow. Be that as it may, they are certainly skilled negotiators. Until recently, the meetings themselves have been held two or three times a week in plenary session. At a plenary session the heads of delegations each make formal set-piece statements, often on unrelated topics because varying time intervals are required for staffing. Such a session is always followed by informal discussion in which ideas and argumentation are swapped by all participants. This technique alleviates the problem caused by the fact that the formal speeches tend to pass each other like ships in the night. Much of the business of the negotiations is thus conducted in informal conversation, with everybody rushing back to the office afterwards to write up his memorandum of conversation. Formal sessions are invariably handled through interpreters, as are informal discussions between Smith and Semenov. The other informal discussions use a fascinating combination of methods to bridge the communications gap. The military delegates and advisors congregate in one corner using military interpreters. Nitze, Brown and Shchukin use French, Parsons and Timerbaev English, Garthoff and Kishilov Russian, and the rest of us patch a conversation together with whichever language we can. Ten of the Soviet advisors speak Eng- lish (a consideration in their appointment?) while only four of the American advisors speak Russian well enough to use it in conversation, so English is used most of the time. At each of the plenary meetings just described, the CIA advisory group has a seat, mostly for purposes of observing and self-fulfillment, and we have shared this opportunity among us. Recently, to break the formality and get more accomplished at this stage of the negotiations, the heads of delegations have tended to replace the plenaries with more frequent, smaller meetings of dele- gates (called "mini-plenaries" and "troikas") and working groups. Representation at such meetings has been limited to delegates and SECRET 97 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 ApU v For Release 2005/02/17: CIA-RDP78T03194A0003gR4.0013-8 advisors from the policymaking agencies. While we CIA representa- tives have not been invited to attend the meetings, we participate actively in the preparation of papers and provide intelligence support to those attending. The pace has become quite intense as the Helsinki session draws to a close: in the past two weeks there have been 13 scheduled meetings with the USSR side, plus a number of unscheduled preparatory and cleanup meetings. The fact is that some of the most important negotiating has oc- curred not in scheduled meetings at all, but in private meetings between Smith and Semenov, including some held during recreational trips arranged for the two delegations by the governments of Austria and Finland. Key exchanges between our two chiefs have occurred on a railroad train in Finland, on a boat trip in the Carinthian Alps in Austria, and on another boat trip on Lake Saimaa in Finland. In Carinthia the exchange was so important that the heads of delegation requested that the boat, with the rest of the delegations and our Austrian hosts aboard, make another loop around the lake, so they could keep talking. This prompted one member of our delegation to remark that he had heard of a negotiation going in circles but this was the first time he had literally engaged in one. It illustrates, however, the dedication of Smith and Semenov to their task and one of the many contributions made by the host governments. CIA Representation We comprise three intelligence officers, a secretary, and three TDY communicators. The communicators man the shack at the office and beef up the capability to handle the volume of relay traffic. At SALT I, the first of the five sessions held so far, CIA was repre- sented by one intelligence officer who was accredited as an advisor and one who was assigned TDY I and acted in support. Later, the two participating directorates, DDI and DDS&T, each sent co-equal advisors. A watch officer was added to handle incoming current intelligence materials and other reports. The representatives were changed at each session, and also in the middle of the very long second session. The present pattern evolved from this background during SALT III and obtains now at SALT V. T. am a DDI officer and am the senior CIA representative. I am signed on for the duration. There is an experienced DDS&T officer, chosen for his knowledge of SALT and of the scientific fields expected to be at issue in this session, and an OCI officer with a background in Soviet affairs who has previously supported the SALT effort from the 25X1 98 SECRET Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 ApproVA f or Release 2005/02/17: CIA-RDP78T03194A00030g0C0[ 13-8 Washington end. These individuals will be exchanged for others at the next session. This combination seems to work well; it represents the interests and capabilities of the participating directorates, it main- tains continuity of senior representation, and through the rotation it allows a number of people to feel the pulse of the negotiations. Intelligence support to the delegation does not begin and end here in Helsinki. The CIA communications I have described lead back to the SALT support unit in Langley, presided over by an assistant to the director of OSR. This unit comprises an OSR officer, a ]DDS&T officer, and an OCI officer, who are the funnel through which passes our requests for support and the information and analysis generated for our use by the analytical and estimative components at head- quarters. The headquarters unit also coordinates CIA's staffing of SALT-related studies within the NSC system in Washington. Role of CIA Representatives The CIA advisors here at the site of the negotiations perform four main functions: we report to the delegation on the latest intelligence information and analysis; we respond to requests by delegates or advisors for intelligence backup; we provide advice and assistance to the delegation in its general work, including the preparation of state- ments, talking points and other negotiating material; we keep our headquarters in Washington informed about what is going on here. In addition, we have certain special responsibilities in the fields of security and communications. In carrying out these functions, we take as our model the role CIA plays within the NSC system in Washington. In the NSC, the agency is a participant with limited and clearly-defined responsibil- ities, not to make or recommend policy, but to contribute an objective view of the facts, to project from the facts to estimates of present and future capabilities and intentions, and to evaluate the consequences of given courses of action. We play it down the middle and we try where possible to represent the views of the intelligence community as a whole. This is in keeping with the DCI's role and reflects the special responsibility we bear as the only intelligence representatives here with the delegation. While CIA does not make policy, it has a role in carrying it out, and this obtains with special force in the field of strategic arms limitation. The prerequisite for Soviet participation in any agreement is that compliance will be monitored by "national technical means of veri- fication." This makes it essential that the terms of any agreement be consistent with the actual capabilities of US intelligence to monitor SECRET 99 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET SALT Soviet activities without the aid of any on-site inspection within Soviet territory. Nobody expects intelligence to be able to supply 100 percent assurance of compliance with an agreement-the requirement is rea- sonable assurance that non-compliance could be detected and recognized in sufficient time so that US security would not be jeopardized. But in a game where the stakes are as high as in this one, reasonable assurance needs to be high assurance indeed. On this matter, we too represent a vitally interested constituency and reflect its point of view. To fulfill the task of reporting information and analysis, we receive a daily flow of current intelligence issuances electrically, we receive twice-weekly pouches containing analytical reports selected by the Langley support team, and we receive pertinent NIE's (conclusions electrically, full texts by pouch). Our day starts with a rush. We screen the Central Intelligence Bulletin (CIB) and other current support traffic, select items of importance, and hand-carry a briefing book to the delegates and the two leaders of the advisory group. The hand-carrying is partly to provide prompt, personal service, partly to permit an opportunity for dialogue, and partly to retain physical cus- tody over the most highly classified materials. The briefing rounds start when Ambassador Smith arrives, usually at 0830, with the object- ive of getting to all recipients before the first delegation meeting of the day, usually at 1000. For what it's worth, the time difference (Helsinki is six hours ahead of Washington) means that the US SALT delegates see the day's CIB long before their colleagues at home. For the daily briefing we choose items related to strategic arms and arms limitation, items dealing with the USSR and China generally, L,urope and the Mid-East, and occasionally other items of interest. We aim not to overload and not to duplicate the excellent State daily summaries and the press services. The Finnish News Bureau, for example, supplies both delegations with excellent four-page summaries of press highlights in English and Russian, which are delivered to our hotels each morning before breakfast. We aim, however, to keep the delegates abreast of developments they are specially interested in and of the intelligence reports their colleagues and superiors back home will be reading when they arrive in their offices. Using the less highly-classified materials, we publish a Daily Intel- ligence Summary for delegates and advisors each morning. FBIS transmissions of key Soviet statements and articles are also culled for this publication. The FBIS Washington and London offices keep us in mind when we are in the field, and have given us fast service on such things as a recent Red Star series on US military programs and Ap1tQRed For Release 2005/02/17: CIA-RDP78T03194A0063U00'10013-8 Appro6elTFor Release 2005/02/17: CIA-RDP78T03194A00036 6R 13-8 a recent article by the head of the USSR's American Institute evalu- ating the new departure in US-Chinese relations. The more highly classified materials, both current intelligence and intelligence memos and reports, are kept on a reading table in our offices for use as needed by other advisors. One other current reporting service we perform is to brief the dele- gates and advisors promptly on an all-source basis on the products of US technical intelligence collection programs as they are acquired, using the CIA preliminary assessments of the intelligence significance of the acquisitions together with supplementary materials supplied in response to our specific questions. These briefings serve to keep the US delegation up to the minute on the strategic situation. They also serve to keep the delegation aware of what intelligence can and cannot do in collection and analysis corresponding to that which would be used in monitoring a strategic arms limitation agreement. The briefings are real case studies-not just staff studies-of our unilateral verification capabilities. In responding to requests, we burn up the wires to Washington. Many needs can be met with our own resources--we brought 450 pounds of files with us to Helsinki, and between the three of us we have a, pretty good collective memory. But in the eleven weeks of this session we have cabled 51 messages to the Langley support team and received 69 messages from headquarters in addition to the regular flow of current intelligence materials. One reason for the discrepancy in numbers is that the Langley group anticipates some of our needs and some of our requests are phoned in. The topics covered in these exchanges range from the trivial to the crucial. For example, a recent day's traffic to headquarters included a request for an aerial photograph of the town of Grand Forks, North Dakota (near a US Safeguard ABM site under construction), a re- quest for comments on a self-initiated analysis of a new Soviet proposal on ABM limitations, and a warning that we will soon need new guidance about whether or not CIA can live with a restriction the USSR delegation insists be included in the draft provision on verify- ing an agreement. Our policy is to accept most any request with an intelligence flavor, and to initiate some ourselves, in order to be of maximum assistance to the delegates and advisors from the other agen- cies. We take full advantage of the fact that CIA is an incomparable storehouse of information, its analytical capability is unsurpassed, and the rapidity of its response is unbelievable. (Here the time differ- ence works in our favor we can send in a request in the afternoon at Helsinki, it can be researched all day at headquarters, and we can have SECRET 101 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 AppFMq! For Release 2005/02/17: CIA-RDP78T03194A000?%4910013-8 the answer at opening of business the next day.) Our aim is to stay a couple of jumps ahead of the negotiations, to anticipate likely needs, and to have the answer available when the question arises. Providing intelligence advice and assistance to representatives of policymaking agencies is a tricky business. Every intelligence officer who has dealt with policymakers has faced the question of when to speak as an intelligence representative, when to speak as an individual, and when to keep silent. The distinction between intelligence support and policymaking must be consciously maintained by the intelligence representative. One's judgment about the proper role of the agency plays a part, as does one's personality. It should also be noted that there is a difference between the DCI's credentials at the NSC and ours here. The DCI is appointed by the President and by decision of the NSC stands in the relationship of permanent advisor to that body. The SALT delegates were appointed by the President, but the senior CIA representative at SALT was not, and the fact of CIA representa- tion is not acknowledged to the other side. So we stick pretty close to our knitting and remain in the background. In providing general advice and assistance to the delegation, the ('IA group here at Helsinki divides its tasks as follows: Ron Stivers, the OCI man, handles the current intelligence account; Maury Lipton, the DDS&T man, represents us at meetings of the advisors' working groups; I represent us at delegates' meetings. The advisors' working groups draft and polish speeches and talking points for use in negoti- ating with the other side. The delegates' meetings initiate these papers, give them a final review, and review delegation proposals or requests for guidance to Washington (these are drafted mostly by Garthoff). We CIA representatives frequently draft and always comment on papers dealing with Soviet capabilities and programs and papers deal- ing with monitoring compliance with an agreement. As members of the delegation with experience in SALT matters, we comment and make suggestions on papers dealing with other subjects as well. I am not included in those delegates' meetings which deal with the tactics of the negotiations (neither are other advisors, except Garthoff). I don't really think CIA should devote much attention to tactics, especially in light of the fact that the US SALT delegates are by now much more familiar than anyone else with the attitudes and reactions of their Soviet counterparts. But I am bound to say that meetings which start out on tactics often end up covering a very broad range of topics on which I think afterwards that a CIA contribution might have been helpful. This exclusion is also a potential handicap in that if we don't watch out, we can get left behind on delegation 102 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apprg4h For Release 2005/02/17: CIA-RDP78T03194A0003b6ffb013-8 thinking about important issues. We guard against this danger by hustling and maintaining good contacts. We keep headquarters informed about what is going on here by sup- plementing the flow of communications which the delegation sends to Washington via State channels for distribution to the NSC agencies. The cabled output of the delegation is very rich: there is always a cable summarizing each plenary or mini-plenary meeting, cables are prepared on each Smith-Semenov informal discussion and on other informal discussions of substantive importance, and delegation think- ing about the state of play is often summarized in cables requesting further guidance from Washington. We alert headquarters to partic- ularly urgent or sensitive delegation cables, send selected memos of conversation electrically to speed up their receipt by the agency, add nuances about issues and views gleaned from our participation in meetings or talking with participants afterwards, and offer our own opinions about important developments. In performing this service, we are looking after the interests of our constituency. The aim is to help our colleagues at home participate as effectively as possible in the ongoing work on SALT within the NSC machinery, and to alert them to developments which affect CIA's very special interests in the verification of an agreement. In this connection, it should be noted that we have no intelligence collection assignments here, nor do any other delegates or advisors. Of course the very process of discussing strategic arms limitations with the Soviet delegation is a source of information about Soviet strategic thinking, policy, and technology, and we keep on the alert for revelations of potential intelligence significance. But we are here to assist in the negotiations, not to service collection requirements. With respect to security of classified information, in addition to routine duties like maintaining physical custody of sensitive intelli- gence documents, we have the special responsibility of advising the delegation about what intelligence information can be disclosed to the other side. With our help the delegation strikes a careful balance be- tween the need to protect US intelligence sources and methods (for example, by being circumspect about precisely what we know and don't know) and the need to conduct a dialogue which will lead to verifiable arms limitation. It must be obvious that consideration of the ability of the two sides to monitor various activities by using "national technical means of verification" has had to play a part in the dialogue about what is to be included in an agreement. It is equally obvious that a dialogue re- quires a base of common understanding and terminology. The USSR's SECRET 103 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 AppffiUFor Release 2005/02/17: CIA-RDP78TO3194A0003( 'I10013-8 pathological concern for security allows the Soviet delegation almost no latitude in these matters. They cannot disclose state secrets, which include even such things as the names the USSR gives its missiles. The two delegations therefore discuss Minuteman and SS--9 ICBM's, BMEW's and Hen House radars, and Spartan and Galosh ABM's, using the US terms for the Soviet systems. When necessary, the US side gets facts about Soviet forces and programs onto the table, to help make our points or to ensure common understanding by both delegations. The other side never confirms these facts, and there is strong evidence that our information about the USSR's forces is often news to the civilian members of the Soviet delegation. So the responsibilities of the CIA representatives include making judgments-in consultation with headquarters when necessary about the gains and risks of disclosing various items of intelligence information before they are released. In this connection, we review and clear all statements provided to the Soviet side by the US dele- gation. We sometimes tease that the texts we approve for release should be reclassified "SECRET NOFORN EXCEPT USSR." Finally, CIA communications serve the head of delegation by pro- viding him with a direct, secure link to the White House. Since mes- sages on this link are EYES ONLY and are not read by the CIA advisors, we are involved only peripherally-for example, when the communicator wants advice about how to handle an IMMEDIATE which arrives in the wee hours. This communications link, however, is an important supporting service and one for which Ambassador Smith gives CIA high marks. Why are we here? Because CIA has committed itself just as firmly to contributing to verifiable arms limitation as it has been committed over the years to providing intelligence support for adequate defense programs. Because it is understood that the national interest requires the US negotiating team to be armed with up-to-date information and objective analysis of Soviet capabilities, programs and policy. Because it is essential that the terms of any SALT agreement be compatible with the collection and analysis capabilities of US intelligence. What will be the outcome? The arms race will not be stopped by any measures we agree on in this phase of the negotiations. There is a good chance, however, that after 25 years of strategic arms competition between the US and the USSR, the SALT talks will result in the appli- cation of a brake. If this is the outcome, the investment of time and energy will have been worth it. 104 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 ApprgxgV For Release 2005/02/17: CIA-RDP78T03194A000 J 1 9013-8 What will be the implications for CIA? Intelligence will have acquired still another responsibility-that of monitoring the USSR's compliance with a set of agreed limitations on strategic armaments. In the agreement, the USSR will have acknowledged explicitly the acceptability of "national technical means of verification" and will have pledged not to interfere with the use of such means. The actual task of monitoring will probably not require much adjustment in our collection and analytical priorities, which are already designed to maintain close watch on those Soviet military programs that will be the subject of any SALT agreement. But intelligence will be confronted with the difficult challenge of being able to advise the policymaker with high assurance as to whether or not the USSR is complying with the terms of the agreement. My article, written in September 1971 during SALT V, does not accurately reflect the situation at SALT VII, the session which con- cluded with the signing of the ABM Treaty and Interim Offensive Agreement in Moscow on 26 May 1972. At SALT VII, the US Delegation functioned as a unified team, and a highly effective one at that. In the final stages of the negotiations, the differences among constituencies within the Delegation and in Washington were minimal. This trend was actually emerging before September 1971, but I failed to recognize it at that time. Also, at SALT VII the senior CIA advisor was invited to participate in virtually all deliberations of the US delegates. The minor problems I felt earlier, arising from my exclusion from certain meetings, no longer existed. Finally, in the last days of the negotiations, the role of CIA commu- nications became much more important than indicated in the article. Helsinki, 31 May 1972 SECRET 105 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A0003S&W13-8 No Foreign Dissem NOTES AND COMMENTS MEMORANDUM FOR: Editor, Studies in Intelligence SUBJECT: CIA's Role in Combatting the Desert Locust in Africa and the Middle East REFERENCE: "Intelligence in the Ecological Battle," Studies in Intelligence, Vol 14, No 2, Fall 1970, p 123-126 Having read the article, "Intelligence in the Ecological Battle," I must commend the OCI analysts for describing how CIA can make a significant contribution to an environmental problem. On the other hand, I was chagrined at the major oversight of recognizing some of the major contributors to the intelligence effort. While I do not wish to discredit OCI, I feel the role of all those that contributed should be placed in proper perspective. The major significance of this particular episode was the excellent example of how the intelligence community can work together through USIB with CIA as the focal point. This demonstrated the ability of the intelligence community to react to a problem requiring a coordi- nated input of scientific, economic and political information. It also established a mechanism for formal and informal workable coopera- tion with non-USIB Government Agencies. OCT. did write the fortuitous item which initiated the subsequent fervor the authors described. The subsequent events, however, were shaped mainly through the combined coordinated efforts of CIA, Air Force, State Department and the Department of Agriculture. This work was accomplished through the aegis of the Scientific Intelli- gence Committee/USIB, and in particular the Biomedical Intelligence Subcommittee/SIC. Because of this, the Life Sciences Division/Office of Scientific Intelligence/ DDS&T played the role of coordinator of this intelligence activity. This role was served from the time the US Air Force became interested through the period of actual Air Force spraying operations in Saudi Arabia. BMIS designated OCI as the coordinator of cable traffic for community use. OCI also wrote further timely OCI Weekly items staying abreast of the current situation. MORI/HRP PAGES 107-108 SECRET 107 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apprggeg or Release 2005/02/17 :CIA-RDP78T0$194A0Q0300010013-8 es Ommen Summary of significant events relating to the problem: a. 23 May 1968-Gordon Torrey/OCI published initial item in the Central Intelligence Bulletin. b. Early June 1968-The Undersecretary of the Air Force requested, through the Office of the Surgeon General, that the intelligence community assess the desert locust problem. c. 17 June 1968-First of a series of meetings of BMIS/SIC/ USIB in response to the Undersecretary. Participants included selected BMIS members who had a direct interest plus invited guests from DDI/CIA, USDA, State and AID. d. June 1968--Intelligence Memorandum--"The Desert Lo- cust Threat"---CIA/BGI/GM 68-5. e. 22 July 1968-OSI-STIR/68-17, "The Desert Locust Threat in the Middle East and North Africa." Substantive contributions came from OBGI and OER. This served as the intelligence com- munity's response to the Undersecretary's request. f. 13 January 1969-Special briefing for USAF Desert Locust Survey Team assigned to Saudi Arabia. Briefers were from OSI/ DDS&T and USDA. g. 19 February 1969--OSI participated in debriefing of USAF Survey Team. ti. March 1969-USAF spray team conducted a successful spraying operation in Saudi Arabia. It should also be pointed out that while OCI indicated in October 1968 that Saudi Arabia was the major obstacle to the antilocust effort, the coordinated OSI--STIR described the importance of Saudi Arabia in July 1968. Again, OCI should take its credit due; however, the coordinated community effort was by far the most significant in terms of elucidat- ing the problem and getting the job done. It is unfortunate that this point was not made clear in the published Studies in Intelligence article. I hope this information will serve to set the record straight. Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Apprb4z dsFwrdRUwmenW05/02/17: CIA-RDP78T03194A000 D13-8 MORE ON "LUCY" The article "The Rote Drei: Getting Behind the Lucy Myth"* is an admirable contribution to the literature of an important case. However, it is unlikely that its readers will feel that they have been taken very far behind the myth; instead, the article's effect is to per- petuate it. Even the author seems to entertain doubts, since a sentence on his penultimate page would tend to dismiss much of his previous argument. (I will return to this sentence later.) Part of the article's argument, and symptoms of its weakness, are to be found in three phrases: (1) "The record clearly shows that Lucy had four important sources." (P. 63). The author is, of course, referring to the record of the trans- missions from Switzerland, which however bulky is still in- adequate for any such conclusion. There is no record of the trans- missions from Germany to Switzerland, which would offer a more solid base from which to speculate on the identity of the sources. Any material received from Germany-in whatever form---could have been edited in Switzerland, perhaps partly to hide the identity of the source or sources. (2) "Rudolf Roessler did divulge the identity of his sources . . . to a trusted friend." (P. 64). In addition to the author's apparent assumption that the four "divulged" by Roessler are identical with the four "clearly shown by the record," other assumptions underlie this phrase, some of them perhaps naive: - the assumption that (Roessler) had sources, - the assumption that he knew their identities, and - the assumption that he divulged them truthfully. Note the coincidence that those "divulged" were, with one (unidentified) exception, well-known resistance figures who had been the subject of guesswork concerning "Lucy's sources," probably for years before Roessler revealed their identities to his intimate friend: Even without this coincidence, one should be more skeptical than the author about Roessler's own statements. Roessler's postwar silence and relative obscurity are well known; the motives for his silence, which stands out oddly in an era of SECRET 109 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appa for Release 2005/02/17: CIA-RDP7F oqs %J& 0orr3iK0f10013-8 memoirs and revelations about the very network with which he worked, must have been strong ones; such motives might have led him to throw out red herrings. (3) ". . . the characteristics of the Lucy messages and of their trans- mission from Germany to Switzerland suggest that Werther and the others probably had Abwehr communications channels at their dis- posal. There seems to be no plausible alternative theory." (P. 67). One searches the article in vain for any substantiation of this theory. It would seem to be more guesswork, although one must admit that it is at least more acceptable than the inference, in some published books, that the refugee Roessler and his sources must individually have operated agent transmitters and receivers. There seems to he equally little justification for attributing as much as the article does to Gisevius' travels (and why would Gisevius' information go to the refugee Roessler?). I would suggest that we examine, as the article does not despite its title, the possibility that "Lucy" really was a myth, and a purposeful one. This might help explain why the secret of his sources has never been nosed out despite a generation of publicity and journalistic curiosity, and might also lead us to the "plausible alternative theory" which the article denies on page 67. I refer to a possibility alluded to (in passing, surprisingly) on page 88, the penultimate page of the article: "Only the Swiss know today whether the vital information coming from Germany went first to Lucy and then, via Haussmann, to Masson, or whether the Swiss received the bulk of the information from their sources in Germany and passed it to Sedlacek for relay to the British and to Lucy for relay to the Russians." The article also allows, on the preceding page, that Bureau Ha might have been created to free the operation from the shackles of neutrality. More of the truth about "Lucy," I think, lies in these two sentences than in all the rest of this long article. If so, much of the rest of the article loses its pertinence. The following would seem more plausible, professionally: That the "Lucy" sources were reporting to Swiss intelligence in Berlin, not to Roessler in Switzerland. That there is no compelling reason, given the large number of dissident, anti-Hitler officers in Berlin, to believe that the "Lucy" sources were involved in known resistance groups such as Oster's. That the information was transmitted from Berlin to Switzer- land not by agent transmitters or agent couriers (nor by 110 SECRET Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Appropgof q6 ftiq AQO5/02/17: CIA-RDP78TO3194A0003Q@@k@q13-8 Abwehr communications) but by Swiss staff communications channels. -That Roessler was nothing more than a front man "created" along with Bureau Ha by Swiss Intelligence as a mechanism to pass the information to the Allies while preserving Swiss neutrality. That Roessler neither had sources of his own (at least not the key sources in Berlin) nor knew their identity nor controlled their commo. --And that Roessler was inclined or compelled to hide these facts. (I believe he was paid again for his silence by the light punishment he received for his later espionage in 1953, to which the article does not pay enough attention.) Even the opening words of the sentence on p. 88, which I cite above, is probably misleading: one cannot assume that "only the Swiss know." The Soviets might also know: they got all the messages, and with their capture of Berlin and informed interrogations of key individuals, they could have identified the sources. Switzerland's continued interest in preserving a neutral history, and the well proven discipline of its people, do not offer much hope for disclosures. But I agree with the article's contention that our continued interest in this case goes beyond our duty to Clio. Among other reasons, we should try to identify the Lucy sources because if the Soviets did, they may have been able, by pressure, to gain, assets who might have provided later access to sensitive levels in postwar West Germany. The version above might offer new and promising lines of investigation. (For example, who were the Swiss MA's, in prewar and wartime Berlin? Who were their closest German friends?) But the Lucy myth will only lead us into dead ends. SECRET 1 1 1 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approved For Release 2005/02/17: CIA-RDP78T03194WPAQQJ@@13-8 INTELLIGENCE IN PUBLIC LITERATURE In Quest of Justice, Abraham Brumberg, editor. Protest and Dis- sent in the Soviet Union Today. Praeger, New York, 1970. 477 pages. Short biographical notes on 83 individuals taking part in protests and on officials denouncing them are appended. A compilation of documents in support of any socio-political thesis, regardless of how well organized and representatively selected, fre- quently constitutes a tedious exercise for the reader. When the as- sembled papers interweave the pros and cons of an issue, repetition is less likely; when their bulk is chosen to elaborate and support one set of ideas, repetition normally crowds the compilation. Papers written to uphold the same principles, regardless of the intellectual levels of the authors, tend to reiterate essentially the same story. Brumberg's sizable and interesting assembly of documents illus- trates the open and secret, at times only latent, growth of dissent- literary, social, and to a very feeble degree political-in the Soviet Union in the 1960's. Commentaries on the documents are written by Brumberg himself, perhaps best known as the former editor of Prob- lems of Communism; Sidney Monas, of the University of Rochester; Stephen Weiner, a lawyer and former teaching fellow at Boston College Law School; George Luckyj, of the University of Toronto, who specialized in Ukrainian literature; and Peter Reddaway of the London School of Economics and Political Science, who has been deeply involved with the analysis and presentation of Russian "under- ground" literature for several years now. These literary efforts are technically neither "underground" nor "illegal" in terms of the Soviet constitution, which guarantees freedom of communication. They are, however, mainly unauthorized; and, as we all know, ad- ministrative regulations are often broken with greater risk than legal ones. Unfortunately, from our point of view, none of the commentators takes up the question of even the possibility of KGB control of any of the underground authors, their samizdat or self-publishing facilities, or their channels of transmission to Western outlets. When the KGB is mentioned at all, it is simply as a repressive police force, with no apparent thought of KGB use of the well-known techniques of pene- tration, provocation, manipulation, etc. Monas does point out that "to some degree each poet has become his own KGB," because the MORI/HRP PAGES 113-116 UNCLASSIFIED 1 13 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 App FSerFRease 2005/02/17: CIA-RDP78T03194A000 0010013-8 repression of the past has been so deep that it is hard for today's writer to rise above it, but that is a different concept. It is obvious from the material concerning trials (above 100 pages) that the KGB has penetrated these "underground" circles. It follows that some of its agents must be producing some of the literature and helping in its dissemination, just as the agents of the Tsarist Okhrana helped man the revolutionary printing presses in order to collect evidence for arrest. Its task may be made more difficult by the wider availability of typewriters and carbon paper, but it is hard to believe that it is beyond KGB resources. It seems more likely that what the West is seeing in samizdat is to a great extent what the Soviet government has decided we should see, the decision being a political one balancing the danger of the literature to the internal stability of the USSR on the one hand against the danger of the people's reaction to KGB repression on the other. After all, as Brumberg points out, dissent in the Soviet Union in 1968-69 not only lacked an organizational framework, it did not seek one; "still relatively small, it confronts not only a hostile regime but also a largely indifferent population, vast segments of which are imbued with a traditional suspicion of `smart-alecky' intellectuals and `Jews'. It would therefore be wrong .. . to see it as a serious political challenge to the regime." Most Soviet apparatchiki probably still see the literature of dissent, when they see it at all, as the predictable and unfortunate result of the opening of Pandora's box that came with Khrushchev's "secret speech" criticizing Stalin, rather than as any great threat to the Soviet state. In addition, the number of its readers may well be greater outside the USSR than inside. This fact creates a time-tested ideal situation for the KGB: the appearance of resistance, vis-a-vis the West, without the substance of resistance, or little of it, inside the USSR. This condition has perhaps been best achieved in the past by such Soviet fictions as the Trust and Win, designed to fulfill the two- fold function of leading the West to believe internal resistance would bloom soon enough if only let alone, while attracting to them some Western attention and support. Most of Brumberg's selections date from 1968, with a few in 1969 (they originally appeared in Problems of Communism). At that time The Chronicle of Current Events was just beginning to appear in the West and, as noted above, there was little if any evidence of organization within the dissent and its litera- ture, although several trials involving small groups had been reported. Of course, intelligence approaches from the samizdat milieu may have been made on the covert level unbeknownst to Brumberg (and this reviewer). In any case, it will be surprising if the KGB does not 1 14 UNCLASSIFIED Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 Approbvec~ For Release 2005/02/17: CIA-RDP78T03194~- 03ffiP 13-8 0o s at least take advantage of the opportunity, if indeed it is not partly creating it, to offer the West the organizational framework the move- ment ostensibly now lacks. In fact, some manifestations of this possi- bility have appeared since Brumberg's book was written, perhaps setting the stage for the entrance of players whose attraction will be hard for the West to resist, the minds of its political leaders having been conditioned by the "literature of dissent." The ninety documents included in the book in no sense suggest that the protesters are non-communists or adverse to communism as a basic principle of governmental structure of the USSR. They protest against the revival of Stalinism and its harsh methods of repression. In their descriptions of court trials of writers, poets, artists, demon- strators, or religious and national minority oppositionists, they appeal for justice as guaranteed in the civil rights of the Stalinist constitu- tion. They condemn illegal searches, long detentions, and harsh in- terrogations as identical with the excesses under Stalin; and they expose the court procedures as illegal and contrary to constitutional guarantees. The protest literature engendered by the political trials (Sinyavsky, Ginsburg, et al.) focused for the most part on "constitutionality." The judges and the entire judicial machinery were accused of acting according to habitual party policy in total disregard for the legal rights of the accused. Stephen Weiner, concentrates on "Socialist Legality on Trial." After discussing the volume of protests about the handling of political offenses by the Soviet courts, he suggests that the protesters, by constantly harping on constitutionalism, have aimed at preventing the Party from ideological interpretation of the existing statues on civil rights. He concludes that the ability of the Soviet system to produce an independent judiciary without radical political change may depend upon gradual development of this type of "myth- ical" (constitutional) restraint on political power. One set of documents covers dissent in the Ukraine. George Luckyj comments on this group, while Peter Reddaway discusses the authors or origins of the open and underground documents on "Freedom of Worship and the Law." In each instance, the two writers point to a return to the old Stalinist practices of persecution. The latter is a bit optimistic in stating that the dissent has achieved much toward moder- ating persecution and state interference in internal church affairs. He believes that dissent on this score is apt to grow unless the regime makes very large concessions. "As the spiritual vacuum of Soviet life becomes more intolerable," he writes, "religious dissent, along UNCLASSIFIED 115 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 Approved For Release 2005/02/17 : CIA-RDP78T03194A000300010013-8 UNCLASSIFIED Books with other forms of social defiance, might increase in both scope and intensity." The documents appeared predominantly in western publications which received them through clandestine deliveries from the Soviet Union. Only a few stem from underground or illegal press and open publications in Russia. Added also are a few short stories ridiculing Stalin's regime, and a score of poems. The substance of most of the latter could be considered as dissent in some transcendental sense, but Brumberg obviously included them as literary samples from for- bidden publications in Russia. The volume is no doubt worth reading by students of contemporary social history of Russia. It is not, however, very encouraging. The documents dealing with court procedures and sentences meted out reveal clearly that at this stage dissent in the USSR can still not be considered as much more than so many isolated cries in the wilderness. Approved For Release 2005/02/17: CIA-RDP78T031YYk d5Y0013-8 Approved For Release 2005/02/17 : CIA-RDP78TO3194A000300010013-8 SECRET ISECRET Approved For Release 2 05/02/17 - - 4A000300010013-8 25X1 25X1