STUDIES IN INTELLIGENCE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80-00630A000100040001-5
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
19
Document Creation Date: 
December 16, 2016
Document Release Date: 
March 15, 2005
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1978
Content Type: 
STUDY
File: 
AttachmentSize
PDF icon CIA-RDP80-00630A000100040001-5.pdf989.43 KB
Body: 
Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET 1TL~1~~ ~~'~T~~.T,I~I~~~~l~ CENTRAL INTELLIGENCE AGENCY VOL. 22 No. 3 FALL 1978 TR-SINT 78-003 SECRET 0436 Approved For Release - DP80-00630A000100040001-5 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET Materials in the Studies are in general to be reserved to U.S. personnel holding appropriate clearances. The existence of this iournal is to be treated as information privy to the U.S. official community. All copies of each issue beginning Summer 1964 are numbered serially, accountable, and subiect to recall. Copies which are no longer needed by recipients must be returned to the Editor's office, 1036 C of C Bldg., or may be destroyed if a Destruction Notice showing Volume number, Issue number, and Copy number is sent to the Editor. All opinions expressed in the Studies are those of the authors. They do not necessarily represent the official views of the Central Intelligence Agency or any other component of the intelligence community. M/arning Notice Sensitive Intelligence Sources and Methods Involved NATIONAL SECURITY INFORMATION Unauthorized Disclosure Subject to Criminal Sanctions Approved For Release 2005/06/1 :CIA-RDP 0-00630A000100040001-5 25X1 25X1 25X1 25X1 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET STUDIES IN INTELLIGENCE Articles for the Studies in Intelligence may be written on any theoretical, doctrinal, operational, or historical aspect of intelligence. The final responsilrility for accepting or rejecting an article rests with the Editorial Board. The criterion for publication is whether or not, in the opinion of the Board, the article makes a contribu- tion to the literature of intelligence. 25X1 Helene Boatner Maurice C. Ernst Harry E. Fitzwater Sidnev N. Graybeal 25X1 Sayre Stevens John Waller Additdonal members of the Board are drawn from other CIA components. Approved For Release 2005/g6/16 :CIA-RC'P80-00630A000100040001-5 25X1 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET Contributions to the Studies or communications to the editors may come from any member of the intelligence community or, upon invitation, from persons outside. Manuscripts should be submitted directly to the Editor, Studies in Intelligence, Room 1036 Chamber of Commerce Bldg. and need not be coordinated through channels. They should be typed in up icate, double-spaced, the original on bond paper. Footnotes should be inserted in the body of the text following the line in which the reference occurs. Articles may be classified through Secret. Supplements, separate- ly distributed, can accommodate articles of higher classification. For inclusion on the regular Studies distribution list call your office dissemination center or the responsible Office of Training desk, For back issues and on other questions, call the Office of the Editor, Xerox-quality copies of back articles can be obtained from Document Services Branch, Office of Central Reference, 0 'THE STUDIES IN INTELLIGENCE AND SHERMAN KENT AWARDS An annual award of $500 is offered for the most significant contribution to the literature of intelligence submitted for publication in the Studies. The prize may be divided if the two or more best articles submitted are fudged to be of equal merit, or it may be withheld if no article is deemed sufficiently outstanding. An additional $500 is available for other prizes. Except as may be otherwise announced from year to year, articles on any subiect within the range of the Studies' purview, as defined in its masthead, will be considered for the awards. They will be fudged primarily on substantive originality and soundness, secondarily on literary qualities. Members of the Studies editorial board and staff are of course excluded from the competition. The editorial board will welcome readers' nominations for awards but reserves to itself exclusive competence in the decision. SECRET /wipproved For Release 2005/0 /16 : CIA-RD 80-00630A000100040001-5 25X1 25X1 25X1: 25X1 25X1 Approved For Release 2005/06/S1~~R~If4-RDP80-00630A000100040001-5 .25X1 CONTENTS 25X1 Assessing DUO Human Source Reporting ................................ Fenton Babcock Evaluation + feedback =guidance ~SECRET~ A Bible Lesson on Spying ........................................................ John M. Cardwell 59 Another critique of Moses and Joshua ~UNCLASSIFIED~ SECRET MORI/HRP THIS PAGE Approved For Release 2005/ 6/16 :CIA-RD 80-00630A000100040001"~ 25X1 25X1 gpproved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Next 50 Page(s) In Document Exempt Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Approved For Release 2005/06/16 :CIA-RDP80-00630A0001000~~~~'~~5 There is no phase in the intelligence Prosiness which is more important than the proper relationship between intelligence itself and the people who use its product. Oddly enough, this relationship, which one would expect to establish itself automati- cally, does not do this. It is established as a result of a great deal of persistent conscious effort, and is likely to disappear when the effort is relaxed. Sherman Kent, Strategic Intelligence for American World Policy ASSESSING DDO HUMAN SOURCE REPORTING Sherman Kent's call for close and continuing contact between intelligence producers and consumers came in the CIA's formative years. It is appropriate to sound it again as centralized management of the intelligence community takes on new form and importance and new life. In recent years, the Directorate of Operations (DO) has been making a particularly conscious effort to get closer to the people who use its products, as it seeks to produce better intelligence, on a wider variety of subjects, with fewer resources. The DO has gotten direct payoff from this development; hundreds of consumers and users of DO reporting have found benefit in responding to the DO's techniques for getting their evaluative feedback; and closer communication has brought some problems and solutions that could well have relevance at the intelligence community level. This is a record of producer-consumer contacts that have settled into awell- defined relationship that is, in Sherman Kent's terms, both proper and effective. As a result, progress has been made toward the goal of producing valuable reporting from economical exploitation of resources. Much remains to be done, however, in relating collection results to resources in a systematic way. Human source reporting does not defy centralized management; it simply requires that the development of systems for this purpose proceed with extra care and attention to the human and security factors involved. This applies to the collection and production of HUMINT as well as the assessment of its effect, impact, and value. The DO record of improvement in its evaluation system is one of careful pioneering. It has involved: a. increasing the field collector's responsibility for pre-selection of intelligence information according to its projected value; b. shifting emphasis in the headquarters reports officer's role from that of intelligence processor to that of quality control specialist responsible for providing reliable value readings and projections to the field; and c. developing communication with consumers and users so as to increase the regularity, scope, and depth of evaluative feedback for collection guidance, resource allocation, and budgetary purposes. A~i~d For Release 2005/06/16 :CIA-RDP80-00630A000100040001 ~l MORI/HRP PAGES 51-57 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET Assessing HUMINT VaCue Assessment in the Field Historically and typically, the DO reports evaluation process begins in the field with the quality control applied by the individual case officer overseas, or the Domestic Collection Division (DCD) intelligence officer in the United States, under the supervision of their chiefs. The important task of the field collector has already been well described in terms of fundamental responsibility and technique by Bruce L. Pechan in "The Collector's Role in Evaluation." ~ In brief, the case officer must provide up-to-date evaluation of his source's reliability, and as collector he is also responsible for giving a current account of changeable circumstances surrounding the acquisition of the information being reported. In addition to these evaluative inputs, the field collector must also apply his iudgment on the relevance, importance, and timeliness of the information obtained. If he kills his own draft report, his iudgment is usually final, and his right to do so is virtually uncontested. Indeed, he is enioined not to process information that he confidently fudges to be marginal. In recent years there has been fairly steady increase in the percentage of the DO's overseas field reports that are received in cable form for dissemination. Much of that reporting is held briefly (at the field's request) for special review by the controlling area division, but it arrives in finished form designed for consumer use in response to expressed requirements. Headquarters evaluation may result in stopping dissemina- tion or adding commentary which is clearly labelled as such and differentiated from any field comment or source comment the report may contain. Field comment rarely addresses the basic value of the information reported, for that is implicit in the finished form of the report. Determination of the value of a disseminated report is properly left to headquarters, where a good basis for comparison with other information exists and direct reading from Washington consumers can be obtained. Intelligence information of a largely tactical nature is frequently passed by the field collector to the U.S. mission directly concerned without formal dissemination. In those cases, the local consumers of such "actionable intelligence," on narcotics for example, are obviously most accessible to the field collector for his evaluation purposes. Field evaluation as a basic responsibility is similar in the case of DCD's domestic voluntary collection.2 Only a small percentage of DCD's reporting is processed in cable form, but it is nevertheless prepared by the field intelligence officers in finished form, ready, in their iudgment, for dissemination in response to legitimate need. Again, the individual collector is acting as initial evaluator and is expected to equip himself constantly through the reading of available collection guidance, standing and spot requirements, and collateral material such as finished intelligence. In recent years, the DO has been pushing and improving its training courses on reporting for both clandestine and DCD collection officers in order to sharpen not only their processing capabilities but also their evaluative skills and iudgment. There has been direct payoff in terms of quality control exercised by the field collector on his own and his responsiveness to the headquarters quality control measures described below. The best evidence of this is the substantial decline recorded in the Directorate's total volume of reporting over the past few years and the assessed general increase in quality relative to the total number of reports produced. What makes this assessment possible is the advent of truly systematic collection of consumer feedback by a Directorate-level evaluation staff. ' Studies V/3, pp. 37-47. E'I'he term "domestic voluntary collection" is introduced here as a substitute for the misleading expression "overt collection," as applied to the Domestic Collection Division of the DO. 5/$pproved For Release 2005/06/16 :CIA-RDP80-00630A0001000~~1~T5 ~4pprQved~.gM~~,lease 2005/06/16 :CIA-RDP80-00630A0001000S4~Q~~~~S ssessmg UU Value Assessment in the Headquarters Divisions Evaluative comment to the field collector is routinely made by the operating area divisions on nearly all clandestine reports that are published, DCD similarly sends comments to the domestic field offices concerned on most of the reports they produce. In both cases the comment made and the grade given each report are supposed to be, and often are, directly reflective of consumer evaluation obtained by the headquarters reports or desk officers. In general, such contacts are limited to obtaining timely feedback on current reporting. Most such comment is obtained by telephone, but often the desk-level officers consult directly with one or more analyst consumers of the report. Consistency in this desk contact procedure is spotty, however, and increasingly so as it extends to the analyst consumers outside the CIA headquarters building and to the users at the policy and program level. The grades given to DO reports by headquarters are weighted to reward quality and discourage reporting that is of minor value. In 1974 the criteria for grading reports were standardized throughout the Directorate, By 1978, however, it had become clear that the area divisions were applying the "standardized" grades with different degrees of strictness, while DCD had developed its own quite different set of grades. In general, grade Category V, for reports that "contribute substantially to an identified national intelligence need," has been overused. In part, this is because the next lower grade available under the existing system is Category I, for reports that "fall near the lower limit of acceptability." The result has been inflated use of the V grade. This, combined with the differing standards of application among the divisions, prevents use of grading results for central management purposes. Within the various divisions, the grading of reports has generally served its original purpose of improving quality relative to quantity. Judicious use by the divisions of the higher grades, on the whole, has contributed to this pattern of improvements the grade X (10) is applied to reports making a "maior contribution to a national level need," and XX (20) to a report that is "outstanding in its significance to the well-being of the U.S." It is on the assignment of these higher grades that consumer influence often is brought directly to bear. The bi-weekly grading sessions on China reporting, for example, are regularly attended by NFAC analysts who comment specifically on the grades being assigned. Value Assessment at the Directorate Level Complementing and following up on this ad hoc communication with consumers of the Directorate's human source reporting is the systematic process carried out by the Evaluation Group, a direct staff element of the Deputy Director for Operations, This group makes regular, personal contact with across-section of key consumers and users of the DO reporting throughout the intelligence community and beyond. The irnmediate Washington customers for both the DO's foreign clandestine and DCD collection products range from specialized analysts in NFAC, State/INR, and DIA to departmental policy action officers. The ultimate users of the DO's intelligence information are the policymakers of the Cabinet and the National Security Council, the heads of U.S. missions and military commands, and the U.S. military R&D project managers throughout the country. The 500 key Washington consumers and users who are interviewed quarterly by members of the Evaluation Group have been remarkably responsive to this evaluation effort, many of them recognizing that regular, active and responsible participation in the process pays them direct dividends. In anticipation of the Evaluation Group's 5iq~~~oved For Release 2005/06/16 :CIA-RDP80-00630A00010004000~35 Approved For Release 2005/06/16 : CIA-RDP80-00630A000100040001-5 SECRET Assessing HUMINT direct periodic contact, many of the analyst consumers and policy-level users not only read the DO reporting with a somewhat different perspective, but many save up specific comment in mental or written note form. In the interviews they are called upon to react to monthly computer listings of the reports by title. In this way, memory of a certain report often serves as an initial indicator of effect. The interview becomes successful, however, only when the customer spells out his actual use, or non-use, of an individual report or the reports in an identifiable stream. When circumstances call for it, he or she will be asked to explain as exactly as possible ho~v a certain report affected the writing of an item of finished intelligence or a U.S. policy action, or haw it may have frustrated the customer, or failed to meet requirements. In the interviewing, the Evaluation Group contact specialists have been successful in getting a mix of candidly critical and complimentary feedback because of the personal, substantive nature of the dialogues they sustain with the customers. Thorough preparation for the interviews is made through prior reading of all the reports being evaluated along with the pertinent operational messages, plus other agency reporting, finished intelligence on the subiects being pursued, and open-source information that bears on them. The subiects covered in interviews are: the "hard targets" (USSR, PRC, Eastern Europe, Cuba, North Korea, Indochina); some 50 non- communist world countries; and international functional topics, including economics, nuclear proliferation, terrorism, and narcotics. Significant comments on individual reports, critical or complimentary, are passed on to the collecting divisions to complement the results of their own earlier ad hoc contact with some of the same customers on some of the reports. Usually, the source of a particularly candid comment made to the Evaluation Group officer on a report, or a collection effort, is not revealed to the division. The retrospective evaluation obtained by the Evaluation Group is frequently passed on farther by the operating desks and reports officers to the collector in the field. The independent character of the Evaluation Group's feedback from customers often complements very effectively the earlier feedback obtained by the division at the time of a report's dissemination. In a significant number of instances the value of a report will have risen or fallen substantially since it was assessed by a consumer on a current basis. It is the continuum of feedback and its cumulative weight that contribute so effectively to desk-level or field decisions on reward or termination of a reporting source and to their review of progress and direction in individual collection operations. The customers appreciate this pattern of discreet and effective use of their comments, and many have come to feel personally involved in an evaluation process that they like and respect. They and their supervisors fudge their time to be well spent in responding to requests for current evaluation, and they value and use the privileged channel to the Deputy for Operations and his collection managers that the Evaluation group provides. The results of the Evaluation Group's interviews have other uses after they are compiled and synthesized in narrative form every six months. Combined with statistics prepared by the Group, the customer commentary provides the DDO with a semi-annual independent evaluation of the Directorate's foreign intelligence production. The DDO uses portions of this material frequently in responding to oversight inquiries, and a significant portion of it feeds into the human source collection part of the CIA's annual budget presentation. The narratives are sent to the collecting divisions, which use them in overall collection guidance and send specific extracts to the field stations concerned. A~roved For Release 2005/06/16 :CIA-RDP80-00630A0001000466f~'R~T Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Assessing HUMINT SECRET A Careful Approach to Quantification of Value The feedback achieved through personal contact with consumers and users of DO reporting stands in sharp contrast to the unsuccessful use of cover sheet questionnaires in the past, which were designed to`bring a degree of quantification to the evaluation process. Quantification of the unquantifiable in human source reporting is not now being attempted by the DO. The use of cover sheet questionnaires on approximately one-third of the clandestine reports disseminated came to an end in the mid-1970's. By then, many analyst consumers had been turned off by that mechanistic technique for obtaining evaluation, and the unreliable results had fallen into disuse within the DO. The Domestic Collection Division still uses such forms for some of its S&T reporting but mainly for obtaining follow-up requirements and direct collection guidance, as opposed to evaluation. The Evaluation Group's system of direct, personal contact with customers has, however, been used in a measured approach to value quantification. In 1976 the Evaluation Group's personalized approach brought consumer identification of certain streams of DO reporting that pointed toward dollar value impact among the ultimate users of the intelligence information in the U.S. military R&D community. From DIA and the service command intelligence staffs, the trail led to many U.S. military sub- commands, their foreign intelligence officers, and on to individual R&D project managers in a variety of military and civilian installations and institutions throughout the country. Tracing the reporting through its use in finished intelligence proved to be no problem, for the same warm response was encountered among the ultimate users of the DO human source information as had been the case in the Washington community of customers. Most quickly came to recognize that the DO needed to include in its budget preparation and resource allocation processes what evidence it could of actual effect, impact, and value in its reporting product. The tangible benefit feedback thus obtained by the Evaluation Group over the past two years has identified utility gains associated with certain disseminated information, including beneficial redirection of some U.S. funds in very large amounts and some actual dollar savings. In many cases, the evidence of impact has included information on certain U.S. military vulnerabilities and capabilities that carried an obligation for the Evaluation Group to give it the most careful protection. A few examples will indicate the scope and magnitude of human source report impact that has been certified under the Evaluation Group's tangible benefit feedback program. In the course of several years, DO reports provided information on Soviet electronics countermeasure capabilities and tactics that transformed the U.S. perception of that threat and led to very extensive beneficial change in certain U.S. equipment and troop training procedures. In other instances, the DO's human source reporting has combined critically with the results of technical collection, often providing the confidence factor required by analysts before publishing their findings in vital areas of research and development. This has been the case in many fields including naval weaponry, electronic warfare, aircraft, and missiles. In most cases, very large amounts of R&D funds have been involved, with the cumulative total related directly to DO intelligence information running into billions of dollars. Specific correlation between this human source reporting and dollar value impact has not been pressed by the Evaluation Group in most instances during its personal contacts throughout the U.S. military R&D community. This is because the direct nature of the impact has been so readily certified by nearly all of the key customers involved, and because of methodological difficulties that are encountered in moving the last mile toward quantification of value.3 fed For Release 2005/06/16 :CIA-RDP80-00630A00010004000~55 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 SECRET Assessing HUMINT Conscious of the fundamental difficulty in quantifying the value of human source reporting, the Evaluation Group has moved carefully in extending its effort in this regard beyond the tangible benefit feedback program. At one extreme the Group highlights for the DDO many instances of reporting where intangible benefit of considerable significance has been identified by policy users. A good example here is frequent reporting on bilateral or multilateral negotiations involving the United States. Cabinet-level officials have been quick to certify direct, heavy impact of DO intelligence upon negotiations they have conducted, particularly in the field of international economics. Similar hard evidence of impact, however intangible, has been readily forthcoming with regard to nuclear proliferation. Here, policy users have several times been able to trace for us the connection bet~yen the DO intelligence they received-often a combination of clandestine and DCD reporting-and successful U.S. diplomatic demarches made to foreign governments. At the other end of the Evaluation Group's quantification spectrum lie the tentative steps taken so far toward possible scalar valuation of the Directorate's human source reporting. So far, this has involved learning about the efforts made under professional guidance at the Department of Health, Education, and Welfare, for example, in placing numerical values on the intangible results of some of its programs.? The Evaluation Group's contact specialists have undertaken some systematic use of specific value criteria in their interviews on an experimental basis. This has been done with a view to bringing outside methodological expertise to bear in analyzing the results, for possible use in moving toward limited quantification where it is feasible. The Evaluation Group's approach to the quantification of value in its human source reporting has been one of alert carefulness, and the appropriateness of this approach has been confirmed by the experience of other collection managers in the intelligence community. Along with its narrative accounts of key customer feedback in synthesized form, and the certifiable evidence of impact and benefit noted above, the Evaluation Group's comprehensive semi-annual production reviews have included various statistical arrays designed to give the DDO semi-quantitative evaluation of the DO reporting product. These have included recorded use of reports in finished intelligence; responsiveness to Key Intelligence Questions; and responsiveness to those national-level information needs identified in the course of FOCUS reviews (carried out by the National Intelligence Officers and the DCI's Human Resources Committee), which have been accepted by the DO as suitable for clandestine collection and levied as requirements on the field. In addition, the Evaluation Group has tracked reporting responsiveness to portions of DCID 1/2 and some of the draft National Intelligence Topics, on an experimental basis. Relevance at the Intelligence Community Level Many of the Evaluation Group's regular contacts have sought to use it as a channel for levying requirements and giving collection guidance. Although generally discouraged by the interviewers, this type of customer feedback is recorded by the Group when it is evaluative in nature. Most of the consumer analysts know well that other, regular channels exist for requirements and guidance, but a dismaying number simply don't know exactly what those channels are or how to use them. A substantial number of customers have felt frustrated in their use of regular, formal channels over `See "Effectiveness Assessment in Government," by Lynn P. Madden (Management Sciences Training Center, U.S. Civil Service Commission). A'~oroved For Release 2005/06/16 :CIA-RDP80-00630A000100046T Approved For Release 2005/06/16 :CIA-RDP80-00630A00010(~~-5 Assessing HUMINT the years, and have overloaded the informal channels that exist or stopped using either effectively. The Evaluation Group's experience over several years has shown, for example, that the present system of communication between some U.S. military end-users and CIA's collectors of human source intelligence is not adequate. In many instances, the fact that certain human source information, if collected within a certain time frame, could have tremendous impact on very high-cost U.S. military programs has just not found its way through the existing communication circuit. That circuit contains various filters that serve the good purpose of preventing tasking overload, but they are counterproductive when they stop the kind of directional feedback cited above from reaching critical points. The present system for U.S. military tasking of human source collection lacks a reliable, centralized tuning capability, Clear beneficial results have come from careful correlation between HUMINT collection effort and ultimate potential yield in this realm of very large U.S. military payoff; but they have often stemmed only from special task force approaches or crusades carried out key individual users. This tasking-type feedback on relative priority among customers' needs for information from human source collection has made up an integral part of the semi- annual production reviews prepared by the Evaluation Group for the DDO. For the division reports officer, who may upon occasion get too close to the intelligence information he is processing, and the operations officer who may get overly bound up in his particular collection effort, this type of directional feedback from key customers can be very useful. This is particularly true, of course, where all-source comparison by the customers brings out undesirable duplication of collection effort and helps to identify those areas of intelligence need where human source collection can contribute best, if not uniquely. Reliability in consumer and end-user feedback on the effect, impact, and relative value of intelligence information depends much upon the nature of the relationship between the collector and these customers. If it is a proper relationship, both systematic and personalized, then built-in dangers such as human error and bias can be dealt with professionally.5 Statistical support to evaluation and the goal of quantification can, as a result, be kept on the right perspective. With the array of techniques now in use, and direct customer participation steadily adding scope and depth to evaluation, the DO can proceed with some confidence in matching its shrinking resources to the increasing demands of our time. Could other intelligence agencies and the community as a whole benefit from the DO's experience? Several agencies have been interested enough to request detailed briefings on the DO system, and a community seminar is being organized on the problern of quantification in assessing human source reporting. As the DO has found, close consumer contact, with evidence of results obtained therefrom, is the best way to make intelligence consumers and users clear on both the potentialities and the limitations of human source collection, as compared to other forms. Good, regular communication on through to the field, by extension, has also helped many customers better assess, sort out, and articulate their intelligence needs and. priorities. Such, then, can be the mutually beneficial results of the proper, effective relationship between intelligence and its users that Sherman Kent called for some thirty years ago. ' See Richarcls J. Heuer, Jr. "Cognitive Biases: Problems in Hindsight Analysis," Studies XXII/2. S~-~~~ved For Release 2005/06/16 :CIA-RDP80-00630A00010004000~5 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 One more round with espionage by Moses and Joshua A BIBLE LESSON ON SPYING For the past few years the Central Intelligence Agency has come under considerable scrutiny. Major issues have been raised regarding oversight and control, the intent being to insure accountability and legality. With the advent of the Carter administration, the issue of morality has also been made a major concern. Today the CIA and the nation are confronted with a perplexing situation: how can we engage in secret operations with oversight of these operations lying essentially in the public domain (Congress) and conduct inherently insidious spying activities that must also conform to traditional non-spying standards of ethical conduct and morality. In an effort to seek some solutions to these problems, it is natural that we should explore historical precedents to determine what lessons and. insights the past might offer. One rich source of information that should not be overlooked is the Holy Bible. The purpose therefore of this discussion is to explore the issue of spying as it occurs in the Bible and examine the lessons it might offer. Perhaps new perspectives can be found that will offer guidance regarding how "...one Nation, under God ..." should go about the business of spying. The subject of spying appears in numerous places throughout the Old and New Testament. ~ Spies were used by the Israelites against their adversaries, and on occasion various factions within the tribes of Israel used spies against each other. In the New Testament, spies were used by the political forces opposed to the emerging Christian movement and by members of the early Christian church to protect itself. There are many additional incidents in which individuals clearly engaged in espionage activities but are not normally referenced using those terms. For example, Judas could be described as leaving been a secret agent for the Sanhedrin because of his role in the betrayal of Jesus. Spying as an activity is not treated as an issue in either the Old or the New Testaments and is discussed or mentioned only as an event worth reporting. As a consequence, the lessons to be learned from examining the Scriptures must be inferred in the context of narrative experiences. Guidance to be derived from the study of biblical spying events is therefore subjective and dependent upon the approach and depth from which inferences are drawn. In this discussion, however, the objective has been to emphasize the facts and keep interpretations to a minimum. The earliest mention of spying i.rt the Old Testament occurs in the story of Joseph,z After Joseph had been sold 1>y his brothers into bondage and had later maneuvered himself into a position of influence in the Egyptian government, his ' All references cited in this article can be found in the Holy Bible, Revised Standard Version, Thomas Nelson and Sons, New York, 1959. Approved For Release 2005/06/16 :CIA-RDP80-00630A0001000400~5 MORI/HRP PAGES 59-63 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Biblical Spying brothers came to Egypt to buy food during a famine, They were brought before Joseph but did not recognize him. Joseph, however, did recognize them, and in an effort to hide his recognition, accused them of coming to Egypt not to buy food but to spy. Evidently spying was an established fact of life, well familiar to Joseph. There are only two spying incidents in the Bible in which methods and sources are discussed in any detail, and both occur in the Old Testament. The first incident occurred under the direction of Moses shortly after he led the Israelites out of Egypt.a They had camped in the wilderness of Paran near the boundary of the Promised Land, and Moses used spies to determine what the Promised Land was like. The second occurred approximately 40 years later under the direction of Joshua.' At that time, the Israelites had completed their soiourn in the desert and were again about to enter the Promised Land. There is a remarkable contrast not only in terms of methods and sources used by these two outstanding biblical leaders, but also in the different administrative procedures governing these two operations and the kinds of people involved. From an analysis of these two operations, biblical experience and perspectives with respect to spying are revealed.g The children of Israel were divided into 12 tribes, or family groups, each tribe having its own leaders and hierarchy. The society was predominantly patriarchal in nature with the leader of each tribe acting as a kind of benevolent dictator or governor over his group. In him was vested the responsibility for providing administrative, leggy, military, social, economic, and religious guidance and leadership. Moses was~the overall leader and spokesman of the tribes but he exercised final authority only upon the consensus of the people and the leaders of the 12 tribes. Forty years later Joshua occupied roughly the same position as Moses. Both men, therefore, were not absolute rulers of the tribes of Israel. The people could, and occasionally did, reiect their leadership. Moses conducted the earliest spying operation recorded in the Bible. As previously mentioned, the purpose of this operation was to "spy out" Canaan.g He chose 12 prominent individuals, one from each of the 12 tribes, to be his spies and instructed them to go into the Promised Land and learn what the land was like. To provide proof that indeed it was a "land flowing with milk and honey," he instructed his spies to return with samples of fruit. These spies spent 40 days in the Promised Land, returned as instructed with information regarding the cities and the population, and delivered samples of fruit. Upon their return, they reported their findings publicly to Moses and the 12 tribes. They brought back a uniform opinion regarding the cities, number of peoplet lay of the land, and the fact that the countryside was indeed "flowing with milk and honey." Ten of the spies, however, reported that the people were so physically large and well organized that if an invasion was attempted, the Israelites would be destroyed. Only two of the spies reported that they were confident that they could succeed and argued strenuously to go forward with the invasion. In the ensuing public debate, the Israelites became frightened by the negative report of the 10 spies and lost confidence that they could succeed in an invasion. They advocated stoning the two spies who said that an invasion should be attempted. ? Numbers 13-14 ' Joshua 2 ?Intelligence operations by Moses and Joshua have previously figured in "Decision Trees" by Dr. Edwin C. Sapp, Studies XVIII/4, and "Scientific and Technical Intelligence" by Robert M. Clark, Studies XIX/1, pp. 46-47. ? The complete story of the espionage mission can be found in Numbers 13 and Numbers 14:1-10. The consequences are described in Numbers 14:10-34. A~roved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 B~bliral Spying Moses was distraught at the loss of confidence by the Israelites, especially after they had been safely delivered out of Egypt and had successfully crossed the Red Sea. Their attitude brought them dangerously close to losing their status as God's chosen people, but Moses argued successfully on their behalf. They were nevertheless severely punished for their failure. They were told that they would be required to remain in the wilderness one year for every day the spies spent in the Promised Land, that is, 40 years for the 40 days spent spying. They were furthermore told that everyone over the age of 20 would be denied entry into the Promised Land, and that the only exceptions would be the two spies who maintained their faith. Even Moses was told he would not enter the Promised Land, and he did not,' Thus the first spying operation discussed in the Bible ended in failure and had disastrous consequences for the population. Forty years later the Israelites found themselves again preparing to enter the Promised Land, this time under the leadership of Joshua.8 Joshua was, by the way, one of the two surviving spies who had participated in the operation conducted under Moses.9 As before, there was a need. to send spies into the Promised Land to get intelligence to support the invasion. Joshua, however, went about things quite differently. He chose two young men whose names are not recorded and instructed them to go into Canaan and to reconnoiter the city of Jericho.10 The spies went to Jericho and visited a harlot named Rahab. Although the presence of the spies was reported to the local authorities, Rahab hid the spies and kept them from being captured. She told the two spies that the people had been expecting an Israelite invasion for some time. She reported that-despite the fact that the city was well fortified and the army well trained-tl~e people were frightened of the Israelites and had lost the courage to stand up to them. The escape of the Israelites from the Egyptians, their successful crossing of the Red Sea, the subsequent destruction of Pharaoh and his armies, and their exploits during their 40 years of wandering in the desert were well known to the people and had convinced them of the Israelites' superiority. Rahab likewise was convinced the city would fall and made an agreement with the spies that she would help them leave the city and not reveal what she had told them if in return they would spare her and her family during the attack. The spies agreed and with Rahab's help they successfully escaped capture and eventually made their way back to their own people. The spies reported to Joshua everything that had happened, especially the information given to them by the harlot regarding the fear of the people. Using this information, Joshua made plans far the invasion and reported his plan to the 12 tribes. The plan was approved, the invasion proceeded, and the attack, capture, and subsequent destruction of the city of Jericho was successful." Rahab and her family were, as agreed, spared by Joshua during the battle of Jericho.12 'The contrast between these two incidents is significant. Moses used 12 people, all amateurs, each with both political and military responsibilities in his own tribe. Each was a prominent individual who is named in the Bible. On the other hand, Joshua apparently used two professional (throughout they were referred to only as "spies") anonymous (their names are not given) people to conduct his mission. Moses' spies brought back reports only of the physical characteristics of the land, whereas Joshua's also reported the attitude of the people. The spies Moses sent made their report ? Deuteronomy 1:37 B Joshua 1:1-2 e Deuteronomy 1:38 10 The mission into Jericho is described in Joshua 2. "Joshua 3, 4, 5, and 6:1-21 12 Joshua 6:22-25 Approved For Release 2005/06/16 :CIA-RDP80-00630A00010004000'I~$ Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Biblical Spying openly, and the discussion that followed was conducted in public. Joshua's spies, by contrast, reported only to Joshua, who then made the necessary decisions. Moses' spies, who also would have been principals in any military actions to be taken, participated in the decision-making process. Joshua's spies neither had leadership responsibilities nor did they participate in the policy-making decision process. The consequences of these two operations are significantly different. Moses' operation, conducted by amateurs more or less in the public domain, resulted in a weakening of Moses' position of authority, led to a loss of the people's confidence in themselves, and precipitated an extended period of severe national punishment. Joshua's operation, conducted in private by professionals, led to an achievement of national destiny. An implicit point is made regarding the procedures used during these two spying operations. It is not specifically stated, but one is left with the impression that the 12 spies sent by Moses more or less went about their business as tourists, and the report they brought back is typical of the kind of thing that a tourist would report. The information reported to Moses consisted both of facts and conclusions drawn by the spies. The negative report given by the majority of the spies, for example, reflected their perception regarding the consequences of military actions, which, if taken, they would be called upon to lead. The people agreed with the negative position, not because of facts reported, but because of the negative interpretation given these facts by individuals of prominence. Joshua's spies, on the other hand, went in secret (although they were discovered) and visited a harlot who gave them valuable information regarding the attitude of her people. The spies did not interpret this information but simply reported to Joshua what they had been told. No moral judgment was made regarding the fact that Joshua's spies visited a harlot, nor is the information provided by her fudged to be of questionable validity. 'Che relationship between Rahab and the spies was evidently amoral. No conditions of "conversion" were imposed in the recruitment, but merely an agreement for conspiratorial silence in exchange for a harlot's life. Joshua made no recorded comment or judgment regarding his spies' recruitment of or the agreement with the harlot. He did, however, honor the agreement, despite the fact that he had not given his prior approval and took no part in making it. After the Battle of Jericho, Rahab joined the Israelites and lived with them. No mention is made of whether or not she continued to practice her old profession. All references to her, in both the Old and the New Testament, refer to her only as "Rahab the harlot." I:f there is a lesson to be learned, it would appear that a strong case is made for the conduct of spying activities in secret by professionals, unencumbered by other political or military responsibilities, and that these professionals should report in secret to higher authority who would make policy decisions without debate. Spies should definitely not participate in the policy-decision-making process, nor should they take their cases to the public. When that occurs, although stoning is passe, the people are likely to throw figurative rocks at the wrong people for the wrong reasons. It can be argued that the Moses operation suffered from complications that arose because of oversight and political issues. The selection of twelve spies, one from each of the twelve tribes, was probably motivated by political considerations, and the very specific instructions given by Moses to the spies were probably necessary in order to define the specific objectives and procedures in order to obtain approval from the twelve tribes. All the Israelites knew that the operation was to occur, who was going, and what they were to accomplish on the mission. When they returned, their report 6P~proved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Biblical Spying was likewise made in public, the results of which have been noted earlier. It is noteworthy that the spies successfully accomplished all mission objectives. The point at which the Moses operation actually failed can be traced to the negative comments made during the public "mission debriefing." Taken overall, it can be argued that the negative report of the spies and the loss of control over the situation was actually stimulated because of too much oversight and the tightly controlled administrative procedures used. In summary, this episode is a classic example of an operation that was successful, but in which the "patient" died. The contrasts offered by the Joshua operation are startling, Joshua certainly did not have an oversight problem, nor did he worry about defining a politically acceptable mission scenario. His spies were sent in secret, were given absolutely minimal instructions, "Go, view the land, especially Jericho," and reported back only to Joshua. The operational scenario could. hardly have been predicted, and if it could, it is questionable that it would have been met with approval. Joshua handled all administrative matters alone, provided Flexible and responsive support to his spies by keeping their bargain, and made the necessary judgments required to successfully lead his people to victory. From a purely administrative point of view, the Joshua mission was a nightmare; nevertheless, the operation can only be judged as an unqualified success. Approved For Release 2005/06/16 :CIA-RDP80-00630A000100040001-5 Approved For Release 20~.~6/~-~IA-RDP80-00630A000100040001-5 SECRET Approved For Release X005/06/16 : CIA~DP80-00630A000100040001-5