DISINFORMATION: OR, WHY THE CIA CANNOT VERIFY AN ARMS-CONTROL AGREEMENT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84B00049R001102720030-1
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 20, 2016
Document Release Date:
June 25, 2007
Sequence Number:
30
Case Number:
Publication Date:
June 24, 1982
Content Type:
MISC
File:
Attachment | Size |
---|---|
![]() | 862.01 KB |
Body:
,,JF1 Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
co 'titpt
commentary
165 EAS l .)O S I tQX I
NEW YORK, N. Y. '10022
(212) 751-4000
ALL Rf&TS
is RFSERVicit Or, Whir the CIA Cannot
Verify an Arms-Control Agreement
Edward Jay Epstein
HEN Secretary of Defense Caspar
W Weinberger revealed last April that
the Soviet Union had achieved superiority over
the United States in intercontinental missiles, he
provoked a furor in Congress over the status of
the nuclear balance. Weinberger's revelation also
pointed to an intelligence failure of unprecedented
proportions that extended back over two decades,
and that cast a great shadow of doubt over the
capacity of the United States to keep accurate track
of the Soviet military arsenal and therefore to verify
any arms-control agreement with the Soviet Union
in the future.
In 1961, the Soviet Union, despite all its bluff
and bluster, had deployed only four cumbersome
and unreliable intercontinental missiles. U.S. intelli-
gence had confidently asserted that there was no
way the Soviet Union cot-.!d ever deploy the ntttn-
her of missiles nereccarv to threaten the ranirlly ex-
panding American missile force without providing
years of advance warning.
Such confidence then seemed fully warranted, as
U.S. intelligence had through its technical wizardry
found means of intercepting virtually all the Soviet
missile-testing d;.ta, or teleme,ry, and of determin-
ing the accuracy of the missiles. It was on the basis
of this powerful array of intelligence about Soviet
activity that American leaders made crucial deci-
sions throughout the 1960's concerning the number,
location, and defense of America's missiles.
Yet in the event, these intelligence assumptions
proved to be seriously flawed. Even though its mis-
sile testing was being relentlessly monitored by
America's electronic sentinels in space and on land,
the Soviet Union, without alerting U.S. intelli-
gence, managed to develop-and deploy-missiles
with multiple warheads accurate enough to attack
the most hardened missile silos in the United States.
EowARn JAY EPSTEIY writes often on issues of intelligence.
Among his books in this field are Legend: The Secret
World of Lee Harvey Oswald and Inquest: The kl'arren
Commission and the Establishment of Truth. He has also
contributed articles to the New Yorker, the New York
Tines Magazine, and COMMENTARY (including "The War
Within the CIA," August 1978). Mr. Epstein's latest book
is The Rise and Fall of Diamonds (Simon & Schuster).
2 4 JUN 1y3Z
How could such a massive development not have
been detected?
At first, explanations for this incredible intelli-
gence failure tended to focus on the errors of the
American analysts. The inability to see improved
Soviet missile accuracy was attributed either to the
prevailing disposition grossly to underestimate
Soviet technical competence, or to incorrect assump-
tions about the method by which Soviet scientists
tested missile accuracy. The fault, in other words,
lay in self-deception.
However, when the data taken from the Soviet
missiles were studied in retrospect, with the help of
new and better methods of analysis, it appeared that
considerably more was involved in the intelligence
failure than American mistakes and self-deception.
This reanalysis suggested that the Soviet Union had
deliberately and systematically misled American in-
telligence by manipulating and "biasing." as it is
called, the missile transmissions that were being in-
tercepted. In other words, by channeling doctored
data into our most sophisticated scientific spying de-
vices, Soviet intelligence had duped the satellites
and antennas on which American intelligence had
come to depend. The Soviets had thereby effected a
decisive change in the delicate balance of strategic
missiles.
After nearly a decade of bitter debate within the
secret world of intelligence, the deception issue still
remains unresolved. Recently a plan was drawn up
by the National Security Council staff to pace tech-
nical as well as human spies under the scrutiny of a
centralized counterintelligence authority. The pro-
ponents of this reorganization argue that without
such an "all-source" unit, able to piece together in-
formation from secret agents, surveillance cameras,
and the interception of coded messages and tele-
metry, the various intelligence-gathering services
could again be easily deceived. The opponents of
this plan in the American intelligence agencies
doubt that the Soviets ever in fact orchestrated a
massive deception of our highly sophisticated moni-
toring devices, and reject the proposed centraliza-
tion as unnecessary and destructive of morale. The
deep and intense divisions over this plan were re-
flected in the sudden resignation of Admiral Bobby
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
1st tc rirnu
22/COMMENTARY JULY 1982
Inman, who opposed it, as the Deputy Director of
the CIA.
Thus, at the core of the dispute is not merely a
jurisdictional struggle over who should test the
probity of exotic intelligence, but a powerful dis-
agreement over the vulnerability of American in-
telligence to deception on matters of vital national
security. With a multibillion-dollar global intelli-
gence system at our command, have we nonetheless
been consistently misled by fraudulent bits of infor-
mation? And if so, is there anything we can do
to make certain it will never happen again?
D FCEPTION among nations is not of course
a new subject in power politics. As
early as the 16th century Machiavelli concluded
that there were only two means for a nation to gain
its objective from an unwilling adversary: force or
fraud. Since the application of force entailed ex-
pending resources and taking serious risks, Machia-
velli strongly recommended that a ruler should
"never attempt to win by force what he might
otherwise win by fraud." The .basic economy of
power that 'Machiavelli described is, if anything,
pvPn mnre relevant in an age of mlrlear weapons.
To be successful, fraud requires changing an ad-
versary's perceptions of reality. It is commonly em-
plnyed in wartime to mislead an enemy into believ-
ing that a military force is either stronger or weaker
than it is in reality; indeed, as the Chinese strategist
Sun Tzu wrote in the 4th century B.C.E., "All war-
fare is based on deception." In peacetime, though
its applications are far less obvious, fraud still re-
mains an effective means of altering the geopolitical
balance of power. These peacetime frauds are usual-
ly perpetrated on an adversary's intelligence-gather-
ing system on the presumption that the fraudulent
intelligence will eventually reach and influence deci-
sion-makers.
Consider, for example, one such case that took
place in New York City in the 1960's and early 70's.
It began when a KGB officer working at the United
Nations Secretariat contacted the FBI and offered
to betray the Soviet Union by supplying secret in-
formation. He claimed that the KGB had mis-
treated him by taking back part of his UN salary,
and he asked the FBI to pay him for his services.
The FBI accepted his terms and gave him the code
name "Fedora." Since Fedora would continue to
work for the KGB while also working for the FBI,
he was considered to be a double agent.
Fedora told the FBI that the KGB had ordered
him to organize a spy ring in New York that would
ferret out American scientific secrets-especially
those involving defense and missile technology. By
reporting all the activities and targets of this scien-
tific spying to the FBI, he could provide American
intelligence with information about the priorities
of Soviet intelligence. As the relationship devel-
oped, Fedora also acted as a "mole" in the KGB,
and passed on a continuous flow of secret data.
Later that year, the FBI had another Soviet
"walk-in," as a volunteer is called, from the UN. He
identified himself as an officer in Soviet military in-
telligence, the GRU, and explained that he was in
New York, under UN cover, attempting to ferret
out American military secrets in overt literature.
He also offered to work for the FBI as a double
agent, and he was given the code name "Tophat."
For the next ten years, Fedora and Tophat pro-
vided the FBI with dovetailing bits of information
on the development of Soviet weaponrywhich were
brought at times by J. Edgar Hoover directly to
the attention of the President and his National
Security Adviser. Some of these reports were indeed
responsible for provoking serious changes id the de-
fense strategy of the United States. In 1969, for in-
stance, Hoover in a personal briefing informed
President Nixon that the FBI had established
through super-secret sources (i.e., Fedora and Top-
hat) that the Soviet Union was on the brink of
launching a crash program to develop chemical-
biological weapons. Specifically, Fedora had learned
that Soviet leaders had been shocked to discover
that the United States had a decisive lead in this
field and believed that even with a crash Program it
would take years to narrow the gap. It further ap-
peared, according to Tophat, that Soviet military
leaders were not eager to divert enormous resources
into the research necessary for chemical weapons,
and they were therefore requesting fu then intelli-
gence assessments of the American chemical-warfare
effort.
Just at the time this intriguing intelligence was
received, President Nixon was weighing the merits
of a unilateral cutback in the production of chem-
ical and biological weapons. The reports from Fedora
and Tophat now suggested that (with the Soviet
Union presumably far behind in development) the
United States could gain a definite advantage by freez-
ing chemical and biological weapons at their exist-
ing levels. On November 9-5, 1969, President Nixon
announced accordingly that the United States was
ending production of these weapons in the hope that
the Soviet Union would similarly stop its produc-
tion. Shortly thereafter Fedora and Tophat report-
ed to the FBI that the Soviet crash program had
been abandoned. It was therefore assumed that the
United States had retained its lead in these weapons.
Four years later, when Israel captured Soviet
tanks and other equipment in the Yom Kippur
war, U.S. intelligence found that it had greatly un-
derestimated the Soviet capacity for chemical war-
fare. The captured weapons provided the first ac-
tual evidence of the development and the state of
the art of Soviet chemical weapons and defenses,
and the analysis of this equipment showed that the
United States was unquestionably behind lather
than ahead of the Soviet Union in chemical war-
fare. Moreover, by working backward from the state
of manufacture of this equipment, it was further
established that the Soviet Union had possessed this
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
DISINFORMATION: OR, WHY THE CIA CANNOT VERIFY AN ARMS-CONTROL AGREEMENT/23
technology-and thus a lead-before 1969. Evident-
ly, then, the reports of Fedora and Tophat had
been inaccurate-and possibly fraudulent.
This and other developments led to a reassessment
of the FBI's sources. The CIA had been suspicious
of both Fedora and Tophat from the outset, and
these disclosures reinforced its suspicions. And al-
though FBI counterintelligence officials, such as As---
sistant Director William Sullivan, also doubted the
credentials of Fedora and Tophat, J. Edgar Hoover
insisted on accepting their reports as bona-fide in-
telligence. It was not until after Hoover's death,
and a further reassessment, that the FBI admitted
that both agents, who had by then returned to the
Soviet Union, had actually been working under the
control of the KGB and feeding the FBI misleading
information.
T HE practice of systematically channeling
misleading information, such as that
supplied by Fedora and Tophat, into an adversary's
intelligence system for the purpose of warping its
decision-making process is called "disinformation."
Although the concept is ancient, the term origi-
nated with the German general staff when it created
a "disinformation service" to mislead Germany's
onpmioc in AATnrlri ZA7ar T TTnli
mation, which might be accidental and random, dis-
information was the purposeful shaping of informa-
tion to enhance the military strategy of the German
general staff. While the German Disinformation
Service restricted its scope of activities to sending
misleading radio transmissions to the enemy, the
purview of disinformation gradually expanded after
the war.
Soviet intelligence very quickly adopted the idea
of "dezinformatsiya" to its own purposes and rede-
fined it, as a recent KGB manual discloses, in the
following terms: "Strategic disinformation assists in
the execution of state tasks and is directed at mis-
leading the enemy concerning questions of state
policy." As the manual makes abundantly clear,
strategic disinformation is in both peacetime and
wartime an instrument of Soviet policy. Just as
Clausewitz defined war as the accomplishment of
state policy by "the sword in place of the pen," dis-
information returns the accomplishment of state
policy in Soviet doctrine to the pen-albeit a poi-
soned one. And since strategic disinformation is in-
separable from state policy, it is formulated at the
highest level of the Kremlin.' Indeed, according to
General Jan Sejna, who had served on the Central
Committee in Czechoslovakia, and who defected in
1968: "The Soviet Politburo approves the Ion-term
global plan [for disinformation] for fifteen years
and beyond."?
Whereas strategic disinformation is part and par-
cel of a "political plan" formulated by the Soviet
Politburo, "tactical disinformation" is a mechanism
designed and operated by the KGB itself to manip-
ulate and control the adversary's interpretation of
its own intelligence. Although there are numerous
combinations and permutations available, the basic
device for manipulation consists of a loop of com-
munication channels connecting the KGB with the
adversary's intelligence services. This loop requires
an input channel, through which the disinformation
messages are- fed to the adversary, and a feedback
channel, through which the adversary's response and
interpretation of these messages are fed to the de-
ceiver.
The input channels are relatively easy to or-
ganize. At a rudimentary Ipvei, disinformation mes-
sages can simply be put in the path of the adversary.
Thus Soviet intelligence in the 1950's left disinfor-
mation documents in embassy safes in Washington
knowing that the FBI made a practice of burglariz-
ing and photographing the contents.
A more dependable channel for delivering mes-
sages to the enemy is a double agent, such as
Fedora, who pretends to cooperate with enemy in-
tellience in order to win its confidence. At times,
when the message is of sufficient import, an intelli-
gence agent may even be dispatched to "defect"
physically in order to add to the credibility of the
disinformation. In addition to agents, electronic
taps and "bugs," or hidden microphones, can be
are detected-and left in place. The effectiveness of
such electronic channels will depend of course on
the adversary's not realizing that its listening devices
have been discovered.
The establishment of the feedback in the loop is
a far more difficult enterprise. It has generally re-
quired penetrating the heart of the adversary's in-
telligence system by either planting a "mole" in
position where he learns and reports back inter-
pretations of the disinformation, or by intercepting
and breaking vital intelligence codes. However, now
that computerized encryption has rendered code-
breaking all but impossible, agents in place, or
moles, have become the chief means of feedback in
the deception loop.
The KGB was able to maintain its Fedora-Top-
? Disinformation, Which aims at extending state policy,
is a very different concept in Soviet doctrine from propa-
ganda. Whereas disinformation aims at misleading an
enemy government into making a disadvantageous decision,
propaganda aims at misleading public opinion so that it
resists the advantageous decisions of its government. The
audience for disinformation is thus government decision-
makers, and the prime channel for reaching this audience
is through the intelligence service upon which they rely for
their secret information. The data itself are usually secret
and, as a recent CIA study notes, "almost never receive
public attention." Propaganda, on the other hand, is aimed
at an audience of influential citizens. The main channel
through which it reaches this audience is the media. By its
very nature, propaganda involves public rather than secret
knowledge.
While there has recently been a tendency to use the
more novel term "disinformation" to describe the manipu-
lation of the media, the collapsing of the distinction be-
tween disinformation and propaganda tends to confuse two
very different sets of problems.
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
. Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
24/COMMENTARY JULY 1982
hat deception for more than a decade precisely be-
cause it had recruited a mole inside the New York
office of the FBI. According to William ? Sullivan,
without an inside source, the KGB could not have
constantly modified Fedora's messages so that they
conformed to the expectations of the FBI. While
Sullivan had traced the putative mole to the New-
YorY_ office, he was unable to single him out. "At
the time I left the FBI in 1971, the Russians still
had a man in our office and none of us knew who
he was," he noted in his memoirs.
Feedback is an especially critical part of a con-
tinuing deception. Without it, the success of disin-
fg nation is problematic; with it, not only can the
success of the deception be immediately ascertained
but it can be. modified to accommodate any of its
failings.
L ENIN himself articulated the governing
principle of Soviet disinformation in
the early 1920's. When his first intelligence chief,
Felix Dzerzhinsky, asked him what sort of disin-
formation should be fed to the 'Vest, Lenin re-
plied: "Tell them what they want to believe."
Lenin, who had a natural genius for such manip-
ulations, realized the futility of using the disinfor-
mation channels in an attempt to undermine the
fierce anti-Communist beliefs of Western leaders.
Instead, he recommended using these predisposi-
tions to the Soviet Union's advantage by design-
ing the disinformation around the theme that
Communism was failing. Since Western leaders
wanted to believe that the Communist experiment
would soon collapse, there was a strong disposi-
tion to accept the disinformation.
Lenin provided a credible context for the secret
disinformation campaign by declaring a New Eco-
nomic Policy (or NEP) in which pure Commu-
nism would be replaced by a mixed system of
state socialism and private capitalism. He further
invited foreign capitalists to the Soviet Union,
and offered them concessions in mining and man-
ufacturing that would replace failing Communist
enterprises. Specifically, Lenin called in promi-
nent Western businessmen and told them that
Communism wasn't working in Russia.
Meanwhile, on the covert side, Soviet intelli-
gence organized a device for funneling disinfor-
mation coinciding with this theme into the hands
of Western intelligence services. This was a supposed-
ly anti-Communist resistance group inside the Soviet
Union called the "Trust"-a name not without
irony since the sole purpose of the organization
was to deceive those who trusted it. Representa-
tives of the Trust contacted all the leading anti-
Soviet organizations in exile in Europe and offered
to help them steal Soviet secrets and arrange es-
capes for their relatives and associates inside
Russia. Since the Trust was in reality a creature
of the Soviet intelligence service, it was easily able
to deliver all the services it promised. It thus soon
managed to convince these emigres groups that it
represented a powerful anti-Communist force with
agents infiltrated throughout the Soviet govern-
ment.
Once the Trust was accepted as credible, it began
to parcel out pieces of secret information to the
various anti-Communist groups which, in turn,
sold the information to the Western intelligence
services they were in contact with. Carefully or-
chestrated by Soviet intelligence, these pieces of
disinformation tended to dovetail with and con-
firm each other. The main theme was that the
Soviet government remained in power not because
of the appeal of Communism, but because West-
ern intervention had aroused Russian nationalism
in support of the government. Presumably if for-
eign intervention subsided, Soviet officials and
army officers would themselves overthrow the
Communist government.
As Western governments came to accept this
convenient thesis, they ceased planning troop
landings, economic blockades, and less dramatic
forms of harassment. Moreover, they dissuaded
emigre groups based inside their borders from
undertaking campaigns of sabotage and subver-
sion within the Soviet Union, on the ground that
such acts would hw c iiic uuiiiiuidcd c rc t va
delaying the overthrow of the government.
The Trust proved to be an enormous success
as a channel for disinformation. Not only did it
manage to quiet and anesthetize opposition to the
Soviet Union by holding out the promise of an
inside revolution; it also collected sums of money
from nine Western intelligence services for the
disinformation it provided which proved sufficient
to finance the Trust itself as well as almost all the
international activities of Soviet intelligence for
six years.
Finally, in 1927, after the end of the NEP and
the nationalization of almost all foreign conces-
sions, Soviet intelligence liquidated the Trust by
sending a false defector to Helsinki to reveal that
it had been a fraud from the beginning. This
revelation served the purpose of further demoral-
izing and confusing the anti-Soviet opposition.
Deceptions like the Trust involve a remarkable
degree of cooperation, albeit unwitting, between
the deceived and the deceiver. Like a form of in-
tellectual jiujitsu, the disinformation takes full
advantage of the weight of an adversary's predis-
positions in order to mislead it. If successfully de-
ceived, an intelligence service views the messages
it has received from the enemy as a triumphant
coup, and it therefore can be expected to resist
any subsequent efforts to debunk or discredit it
(as the FBI later did for so long with Fedora and
Tophat).
W iTti the outbreak of World War II
came a new reliance on intelligence
-and its nemesis, disinformation. The radio sig-
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
1st Rhr-K( J
DISINFORMATION: OR, WHY THE CIA CANNOT VERIFY AN ARMS-CONTROL AGREEMENT/25
nals, electronic data, and coded messages that
were intercepted to pinpoint the movements of
military units could also be fabricated by disinfor-
mation experts iit order to confuse and mislead
rival intelligence services. Since both real intelli-
gence and disinformation originate in the enemy--
camp, with the only difference that the former
is meant to be kept secret and the latter disclosed,
the) are extraordinarily difficult to separate. In
this sense, disinformation is analogous to cancer-
ous cells which the body's immunological system
cannot differentiate from healthy cells. The injec-
tion of electronic disinformation managed, if
nothing else, to paralyze and confuse the gather-
ing of crucial military intelligence.
Strategic deception was used by almost every
participant in the war, with Britain and Germany
each successful in manipulating and misleading
adversaries through the use of controlled double
agents and misleading radio transmissions.* As
the war progressed, deception-planning staffs in
Germany, England, America, and the Soviet
Union were attached to the high command, and
thereby became responsible for overall strategy.
William R. Harris, an analyst at RAND and a
leading expert on international deception, sug-
a?
ge"L, illai. 1111) devellAp?`er." ?u?u :or I
foundation for the modern double-cross system."
This "double cross" involved feeding false or
biased data into enemy satellites, ground anten-
nas, and other "national technical means," as this
spying is euphemistically called. Harris writes: .
Once deception planning was part of the stra-
tegic planning process, the systematic targeting
of an adversary's technical means of collection
was inevitable. Unlike their counterparts in the
field, the planners at the political centers had
access to the most sensitive counterintelligence
resources. These resources included access,
through decryption of enemy ciphers, to key
intelligence and decision-making channels. This
feedback led deception planners to the target-
ing of technical indicators, and especially those
that were most credible to an adversary.
Soviet intelligence in World War II lost little
time in exploiting the technical capacity of its
enemies to intercept Soviet communications. When
it found that German intelligence had tapped
into the cable links between the Soviet embassy'
in Tokyo and Moscow, and had broken the diplo-
matic ciphers, it neither closed down the tapped
line nor switched to using the same kind of "one-
time" codes which it used elsewhere (and were
unbreakable). Instead, it turned the compromised
communications to its own advantage by arrang-
ing for its diplomats to transmit disinformation
messages in the code that it knew full well had
been broken. Feedback on German interpreta-
tions of this Soviet disinformation was supplied
by a group of moles who had been recruited in
German intelligence-f
In general, the Soviets proved extremely pro-
ficient at this new species of disinformation. For
example, in the summer of 1944, the Soviet de-
ception staff managed through fake radio traffic
and double-agents to persuade German intelli-
gence that the Soviet offensive would come on the
flanks in Finland and Rumania, and not in the
center of the front in Byelorussia. Even though
the Soviets amassed an army of 1,500,000 troops in
Byelorussia, German intelligence was by this time
so focused on the flanks that it failed to see this
gigantic army. The Soviet offensive, which swept
through an area the size of West Germany, caught
the Germans totally by surprise.
T HE wartime refinement of disinforma-
tion provided Stalin with an extraordi-
narily useful instrument for waging the cold war.
Swords could again be replaced by poisoned pens.
In the immediate postwar years, Soviet disinforma-
tion focused on undermining American efforts to
organize opposition to Soviet rule in Eastern Eur-
ope. In 1951, for example, Soviet -intelligence or-
ganized a fictitious underground "army" in Poland
known by the acronym WIN (which stood in
Polish for "Freedom and Independence"). Working
through Polish exiiea ill Lulydtxl, WiN wui Lieu
the CIA and British Intelligence (SIS) and repre-
sented itself as a group commanding thousands of
armed guerrillas in Poland. These claims were rein-
forced by a number of double agents under Soviet
control, and by interceptions of police and militia
radio broadcasts in Poland, which seemed to con-
firm that Soviet and Polish units were being
harassed by guerrillas.
Both the CIA and British SIS accepted WIN as
a bona-fide anti-Communist "army." Thus for
more than a year, the CIA parachuted to WIN
forces in Poland large caches of weapons, elec-
tronic equipment, and gold bullion. It also put
its own agents and Polish dissidents directly in
touch with WIN commanders. In December 1952,
after arresting all the agents and dissidents who
had contacted WIN, Polish security forces an-
nounced over the radio sufficient details about
WIN to make it clear to the CIA that it had been
duped by an intelligence fraud.
The WIN deception achieved a double success:
it lured virtually all the resistance groups inside
*For the British deception that concealed the time,
place, and purpose of the Normandy landings in 1944, see
Anthony Cave Brown, Bodyguard of Lies (Harper & Row,
1976). The British use of double agents for disinformation
is detailed in J.D. Masterman, The Double Cross Systern
(Yale University Press, 1972). For a full account of the
German use of disinformation to confuse Stalin over the
purpose of the movement of over 100 divisions to the
Soviet border, see Barton Whaley, Codeword Barbarossa
(MIT Press, 1979).
T Reinhard Gehlen, The Service (World Publishing,
1972), p. 70.
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1 nmwmm~
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
1st REPRO
Poland into a trap; and it thoroughly demoralized
-and discredited-the exile groups outside Poland.
The fact that the CIA had inadvertently financed
the deception with gold bullion was an added bonus
to Soviet intelligence.
A LTHOUGH deceptions may employ a
highly convoluted series of actions,
they proceed from a basic theme that involves misrep-
resenting either strength or weakness. "I make the
enemy see my strengths as weaknesses and weaknesses
as strengths," a commentator notes in Sun Tzu's
Art of War. In the case of both the Trust decep-
tion of the 1920's and the Polish Home Army de-
ception in the late 1940's, the Soviet Union con-
cealed its political strength (and capacity for
repression) behind a mask of political weakness
and internal strife. This theme was reversed in
the 1950's, at least in the area of strategic wea-
pons, when Soviet leaders began misrepresenting
their weakness in intercontinental bombers and
missiles as strength. Not only did Soviet intelli-
gence attempt to mislead U.S. intelligence into
overestimating Soviet bombers and missile capac-
ity through the usual orchestration of double
agents, leaks from Soviet scientists at conferences,
and official statements; it also staged elaborate
"fly-bys" of bombers at parades in which the same
planes circled repeatedly over the reviewing stand
in order to give an exaggerated impression of
strength.
During this period, Soviet intelligence also at-
tempted to give the United States an impression
of strength in its capacity to manufacture nuclear
weapons. A German double agent, Heinz Felfe,
actually under the control of the KGB, provided
the CIA with a high-grade sample of uranium ore
supposedly from mines in Czechoslovakia which led
the CIA to revise upward its estimates of the num-
ber of Soviet nuclear bombs. The Soviet projec-
tion of intercontinental strength, which was char-
acterized as the "missile gap" in the election of
1960, succeeded in making the threats and bluster
of Khrushchev more credible. Moreover, by focus-
ing the attention of U.S. intelligence on the inter-
continental threat, the Soviets diverted attention
from the rapid expansion of their medium-range
bomber and missile forces that were de-
ployed against Eurasian targets during this same
period.
A few years later, reversing the process once
again to convey an impression of weakness, the
Soviets misled the CIA into the belief that Soviet
missiles-and especially the giant SS-9-lacked
accurate guidance systems. From this it followed
that these missiles were not a threat to our land-
based ICBM force (the Minuteman complexes),
and thus there was no need to disperse or reinforce
the silos, or to attempt to develop an antiballistic
missile. Given these assumptions about the relative
inaccuracy of the Soviet guidance system, Secretary
of Defense McNamara concluded, as he testified
in 1963:
It is clear that the Soviets do not have anything
like the number of missiles necessary to knock
out our Minuteman force, nor do they appear
to have any present plans to acquire such a
capacity. If they were to undertake the con-
struction, and deployment of a large number of
high-yield missiles, we would probably have
knowledge of this and would have ample time
to expand our Minuteman force, or to disperse
it more widely.
As it turned out, McNamara, along with the
entire American strategic establishtuent, was dead
wrong. Without "knowledge" by U.S. intelligence,
the Soviet Union did proceed to deploy 'a highly
accurate force that threatened to overwhelm the
Minuteman deterrent. How could U.S. intelli-
gence, with all its satellites, electronic sensors, and
other resources, have been led into missing or
misinterpreting such a massive development in
Soviet missile technology?
Albert Wohlstetter has suggested that the CIA
estimators tended to shape ambiguities in their data
toward a preconceived theory they held about So-
viet strategy, and the pressure toward "conformity"
and "consensus" overrode hostile evidence. Such
self-deception on the part of the CIA analysts does
not, however, preclude the possibility of their hav-
ing been misled by disinformation. Indeed, when a
feedback channel exists, preconceptions are an im-
portant ingredient in the perpetration of an intelli-
gence fraud ("Tell them what they want to be-
lieve"). And there were at least two such feedback
channels in the early 60's, in the form of moles who
were eventually identified.
One was Jack E. Dunlap, employed at the head-
quarters of the super-secret National Security Agency
(NSA) as an analyst with top-secret clearance and
also as the chauffeur for its chief-of-staff, Major
General Garrison B. Coverdale. In this latter capac-
ity, he was permitted to drive one of the few "no-
inspection" cars off the closely ,guarded base which
he used to smuggle out vast quantities of secret doc-
uments,- including some that concerned the moni-
toring of Soviet missile testing. After the leak was
discovered in 1963, Dunlap committed suicide.
Soviet intelligence also had an unparalleled chan-
nel of feedback at the U.S. Joint Chiefs of Staff in
the person of Colonel William Whalen. Colonel
Whalen, who had been recruited by Soviet intelli-
gence in the late 1950's when lie was serving as a
military liaison officer, was the intelligence adviser
to the Army Chief of Staff, and in this capacity he
had a legitimate "need to know" on virtually any
question concerning U.S. (or Soviet) intelligence.
He could thus tap the combined intelligence re-
sources of the CIA, FBI, and NSA, as well as mili-
tary intelligence, on any matter of presumed inter-
est to the joint Chiefs of Staff. Up until his detec-
tion and arrest in 1963, lie supplied whatever infor-
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
DISINFORMATION: OR, WHY THE CIA CANNOT VERIFY AN ARMS-CONTROL AGREEMENT/27
mation the KGB required concerning American
interpretation of intelligence information inter-
cepted from the Soviet Union. With this in hand,
the KGB could constantly adjust and modify its
stream of disinformation.
In short, since the intelligence establishment was
basing its estimates of the accuracy of Soviet guid-.
ante systems on data intercepted from Soviet trans-
mitters, which the Soviets knew were being mon-
itored, and on reports from double agents under
KGB control, self-deception could only have been
one element of a well-executed scheme of disinfor-
mation.
To be sure, vital pieces of the puzzle were un-
available until the early 1970's when new and
better methods were developed of photographing
and analyzing the craters caused by the impact of
Soviet warheads. These revealed a profound dis-
crepancy between the estimates of missile accuracy
garnered from the interception of Soviet telemetry
and the actual degree of accuracy as measured by
this new photoreconnaissance method. There
could be no doubt that American intelligence
had been misled by disinformation.
AT THE root of the entire problem was
A. , Y .1111411 ~a1-.11.\, lllal~ 111~.OJ Ul~.4 r aV1l~
called an accelerometer. Soviet missiles carried three
accelerometers, and it had been assumed that these
devices performed the critically important task of
determining the exact position of the missile in
flight. If these accelerometers were even a shade in-
accurate, the missile could not accurately hit its
target. Since the CIA was able to intercept the sig-
nals from these accelerometers during tests through
its ground antennas in Iran and Pakistan, it believed
that it had a constant indicator of accuracy. Al-
though the CIA presumed that Soviet intelligence
was aware that its telemetry was being intercepted,
it also assumed that these vital data could not be
falsified because they were needed for guiding the
missile.
Reassessments by the RAND Corporation and
other highly specialized think tanks under contract
to the CIA and the Department of Defense showed,
however, that since the three accelerometers pro-
vided redundant instrumentation, it was technically
possible for the Soviets deliberately to distort the
data from one accelerometer without losing the
ability to monitor the missile test accurately. In-
deed, a reanalysis of the telemetry data seemed to
indicate just such a "systematic bias"-or disinfor-
mation. After studying this telemetry problem,
William Harris of RAND testified before the
Senate Select Committee on Intelligence. He con-
cluded:
With an understanding of the technical indica-
tors and methods of U.S. estimation of ballistic
missile accuracy, the Soviets managed to under-
represent the accuracy of intercontinental ballis-
tic missiles.... Only systematic biasing of tech-
nical indicators would produce the apparently
large errors in guidance... .
The "technical indicators" he referred to were of
course the telemetry from the on-board acceler-
ometers. Assuming that the Soviets realized that we
were underestimating their missile accuracy-and
there was sufficient feedback from public as well as
intelligence sources during this period-the con-
tinued biasing of the telemetry could only have
been disinformation.
In addition to thus "double-crossing" our elec-
tronic devices, the Soviets, through the activities of
double agents under KGB control in the U.S., kept
the attention of U.S. intelligence focused on the ac-
celerometers. Fedora, for example, told the FBI
that the Soviet Union was having severe problems
constructing missile-guidance systems. Then, in the
mid-60's, he reported to the FBI that the KGB had
been assigned the task of buying an accelerometer
from an American company. As he was responsible
for stealing secrets on scientific and missile develop-
ments, this KGB request came under his purview. A
few weeks later, a Soviet employee at the UN
named Vadim Isakov visited a dealer in surplus gov-
ernment equipment in Paterson, New Jersey; pro-
ducing a shopping list, he offered to buy a $6,000
accelerometer made by the American Bosch Arma
Company, a miniature computer, and a titanium
pressure vehicle-devices that were all necessary to
missile guidance. The FBI, which had the entire
Soviet buying mission under surveillance, found
that Isakov seemed "Particularly anxious about the
accelerometers. Fedora meanwhile was asked by the
FBI to inquire into the need for this special equip-
ment on a trip he was making to Moscow. When he
returned to New York, he told the FBI the equip-
ment was needed because of a failure in the Soviet
missile program. -
The pieces fit neatly together, and the FBI liaison
duly passed on the evidence of the Soviet missile
failure to the CIA's Directorate of Science and
Technology which found that it dovetailed with
the analysis of the telemetry intercepts. Different
channels of secret information thus seemed to cor-
roborate one another:
It was not until late 1974 that the CIA began an
agonizing examination of the possibility that its satel-
lites and antennas were being "double-crossed" by
Soviet disinformation. A special "reading room" for
this super-secret data was set up for CIA counter-
intelligence specialists at the Directorate of Science
and Technology. Before the problem could be even
initially explored, the entire counterintelligence
staff was shaken up-and most of its key members
forcibly retired-in the wake of the firing (for other
reasons) of its chief, James Angleton, in December
1974.
ISINrORMATION, then, emerges as the
D only plausible explanation of how the
Soviets achieved a strategic breakout of the missile
Approved For Release 2007/06/25: CIA-RDP84B00049RO01102720030-1
Approved For Release 2007/06/25: CIA-RDP84B00049R001102720030-1
28/COMMENTARY JULY 1982
stalemate. The problem for the Soviet Union in the
early 60's was to increase its vulnerable and numeri-
cally inferior missile force to a threatening level-
without provoking the United States similarly to
increase, or defend, its existing missile force. More-
over, the Soviet Union had to effect this build-up at
a time when all its silo-construction and missile=
testing programs were being closely monitored by
the cameras and sensors of U.S. spy satellites. It was
able to accomplish this seemingly impossible task
because U.S. intelligence gravely underestimated the
truly threatening aspect of the Soviet missiles-their
potential for accuracy-on the basis of intercepted
test data and the reports of double agents that had
been deliberately falsified and that played into pre-
conceptioris about the Soviet Union's technological
capacity.
The likelihood that such a deception could have
been detected in a contemporaneous time frame
seems remote. Disinformations that mimic prevail-
ing preconceptions contain their own camouflage.
Moreover, as we have seen, such deceptions rapidly
become entangled and fused with the bureaucratic
interests of the intelligence services themselves, and
any effort to attack them becomes perceived as an
attack on the intelligence service itself. For exam-
ple, to ferret out evidence of the missile deception,
it would have been necessary to call into question
the credibility of such highly productive sources as
the satellites, antennas, and the moles working with-
in Soviet intelligence. Most career officers who tried
to do this found their careers at an end.
THUS, while Congress and the informed public
have been under the impression that satellites and
electronic wizardry can be relied upon for foolproof
intelligence, the story of the misestimates of Soviet
missile accuracy demonstrates that these "national
technical means" are at least as susceptible to Soviet
deception as less exotic means of intelligence-gather-
ing. The persistent denial of the problem of disin-
formation serves only to increase its chances of suc-
cess. And without a radical reorganization of the
kind that is opposed by the CIA bureaucracy, it is
unlikely that any effective measures can be taken to
prevent our intelligence services and ultimately our
national leaders from being "double-crossed" again.
Their continuing vulnerability to Soviet disinfor-
mation casts the most serious doubt on whether
"national technical means" can ever be sufficient to
verify Soviet compliance with any new arms-control
agreement.
Approved For Release 2007/06/25: CIA-RDP84B00049R001102720030-1