You are on page 1of 109

C O N T E N T S

Center for the Study of Intelligence


Washington, DC 20505

EDITORIAL POLICY HISTORICAL PERSPECTIVES


Articles for Studies in Intelligence may
be written on any historical, opera- A Long Look Back
tional, doctrinal, or theoretical aspect Directors of Central Intelligence, 19462005 1
of intelligence. David S. Robarge
The final responsibility for accepting
or rejecting an article rests with the Famous Espionage Cases
Editorial Board.
Tracking Julius Rosenbergs
The criterion for publication is
whether, in the opinion of the Board,
Lesser Known Associates 13
the article makes a contribution to the Steven T. Usdin
literature of intelligence.
Effective Interagency Collaboration
EDITORIAL BOARD Intelligence Liaison between the FBI and
Paul M. Johnson, Chairman State, 194044 25
Frans Bax G. Gregg Webb
A. Denis Clift
Joan Dempsey
Nicholas Dujmovic
Two Steps Backward
Dawn R. Eilenberger The Collapse of Intelligence Support
Joanne O. Isham for Air Power, 194452 39
William C. Liles Michael Warner
Carmen A. Medina
William Nolte
Maj. Gen. Richard J. OLear,
USAF (Ret.)
INTELLIGENCE TODAY AND TOMORROW
Dwight Pinkley
Barry G. Royden Collection and Analysis on Iraq
Jon A. Wiant Issues for the US Intelligence Community 47
Members of the Board are drawn from the Richard Kerr, Thomas Wolfe, Rebecca Donegan,
Central Intelligence Agency and other and Aris Pappas
components of the Intelligence Commu-
nity.
Connecting the Virtual Dots
EDITORIAL STAFF How the Web Can Relieve Our Information
Glut and Get Us Talking to Each Other 55
Barbara F. Pace, Editor
Matthew S. Burton
Andres Vaart, Publication Editor
The Wiki and the Blog
Toward a Complex Adaptive
Intelligence Community 63
D. Calvin Andrus

iii
INTELLIGENCE IN RECENT PUBLIC
LITERATURE
Spy Handler 71
Reviewed by John Ehrman

Counterspy: Memoirs of a Counterintelligence


Officer in World War II and the Cold War 75
Reviewed by Kevin C. Ruffner

Three Memoirs by Former CIA Officers 79


Reviewed by John Hollister Hedley

The Intelligence Officers Bookshelf 85


Compiled and Reviewed by Hayden B. Peake

COMMENTARY
Raising Questions
A Different Take on FDR at Teheran
and Yalta 101
Warren F. Kimball

iv
CSIs Mission The Center for the Study of Intelligence (CSI) was founded in 1974 in response to
DCI James Schlesingers desire to create within CIA an organization that could
think through the functions of intelligence and bring the best intellects avail-
able to bear on intelligence problems. The Center, comprising both professional
historians and experienced practitioners, attempts to document lessons learned
from past operations, to explore the needs and expectations of intelligence con-
sumers, and to stimulate serious debate on current and future intelligence chal-
lenges.

To support these activities, CSI publishes Studies in Intelligence, as well as


numerous books and monographs addressing historical, operational, doctrinal
and theoretical aspects of the intelligence profession. It also administers the CIA
Museum and maintains the Agencys Historical Intelligence Collection.

Contributions Studies in Intelligence welcomes articles, book reviews, and other communica-
tions from authors both within and outside the government community on
any historical, operational, doctrinal, or theoretical aspect of intelligence.
Submissions should be sent to:

Studies Editor
Center for the Study of Intelligence
Central Intelligence Agency
Washington, DC 20505

Awards The Sherman Kent Award of $2,500 is offered annually for the most signifi-
cant contribution to the literature of intelligence submitted for publication in
Studies. The prize may be divided if two or more submitted articles are
judged to be of equal merit, or it may be withheld if no article is deemed suffi-
ciently outstanding. An additional $5,000 is available for other prizes, including
the Walter L. Pforzheimer Award. The Pforzheimer Award is given to the
graduate or undergraduate student who has written the best article on an
intelligence-related subject.

Unless otherwise announced from year to year, articles on any subject within
the range of Studies purview, as defined in its masthead, will be considered
for the awards. They will be judged primarily on substantive originality and
soundness, secondarily on literary qualities. Members of the Studies Edito-
rial Board are excluded from the competition.

The Editorial Board welcomes readers nominations for awards but reserves
exclusive prerogative in the decision.

i
A Long Look Back

Directors of Central Intelligence, 19462005


David S. Robarge

For nearly six decades, the direc- dent budget or personnel to


tor of central intelligence (DCI) manage, no authority to collect
headed the worlds most impor- foreign secrets, and no power to
tant intelligence agency and bring about a consensus among
oversaw the largest, most sophis- agencies. Maybe that is why
ticated, and most productive set of Souers, when asked not long
intelligence services ever known. after his appointment, What do
From 1946 to 2005, 19 DCIs you want to do? replied, I want


served through 10 changes in to go home. 2
president; scores of major and
minor wars, civil wars, military
Nineteen DCIs served incursions, and other armed con- Then came the National Security
through 10 changes in flicts; two energy crises; a global Act of 1947, which set forth a
president, scores of recession; the specter of nuclear description of the DCIs job:
wars, . . . a global holocaust and the pursuit of arms
recession, the specter control; the raising of the Berlin There is a Director of Central
Wall and the fall of the Iron Cur- Intelligence who shall . . .
of nuclear holocaust, tain; the proliferation of weapons serve as head of the United
and the arrival of of mass destruction; and the States intelligence commu-
international arrival of international terrorism nity . . . act as the principal
terrorism on US on the shores of America and the adviser to the President for
shores. war against it overseas. During intelligence matters related to
that time, the DCIs participated the national security; and . . .


in or oversaw several vital contri- serve as head of the Central
butions that intelligence made to
Intelligence Agency.
US national security: strategic
warning, clandestine collection,
independent analysis, overhead Two years later, the Central Intel-
reconnaissance, support to war- ligence Agency Act laid down the
fighters and peacekeepers, arms DCIs and the Agencys adminis-
control verification, encourage- trative rubrics. Over the next
ment of democracy, and counter- several decades, the DCI would
terrorism. directly manage thousands of
employees and billions of dollars,
The responsibilities of the DCI and would have an important part
grew logarithmically after Janu- in guiding many thousands and
ary 1946, when President Harry many billions more.
Truman whimsically presented
the first DCI, Sidney Souers,
with a black hat, black cloak, and
1 Christopher Andrew, For the Presidents
Eyes Only: Secret Intelligence and the
wooden dagger and declared him Presidency from Washington to Bush (New
the Director of Centralized York: HarperCollins, 1995), 164.
Dr. David S. Robarge is chief Snooping. 1 At that time, the DCI 2 Tom Braden, The Birth of the CIA,

historian of the CIA. had no CIA to run, no indepen- American Heritage 27 (February 1977): 10.

All statements of fact, opinion, or analysis expressed in this volume are those of the author. Nothing in
the volume should be construed as asserting or implying US government endorsement of a volumes
factual statements and interpretations.
Studies in Intelligence Vol. 49, No. 3 1
DCIs

Directors of Central Intelligence, 19462005


(In counterclockwise order, beginning at the left.)

RAdm. Sidney William Souers, USNR 23 Jan 1946 10 Jun 1946


Lt. Gen. Hoyt Sanford Vandenberg, USA 10 Jun 1946 1 May 1947
(AAF)
RAdm. Roscoe Henry Hillenkoetter, USN 1 May 1947 7 Oct 1950
Gen. Walter Bedell Smith, USA 7 Oct 1950 9 Feb 1953
Allen Welsh Dulles 26 Feb 1953 29 Nov 1961
John Alex McCone 29 Nov 1961 28 Apr 1965
VAdm. William Francis Raborn Jr., USN (ret.) 28 Apr 1965 30 Jun 1966
Richard McGarrah Helms 30 Jun 1966 2 Feb 1973
James Rodney Schlesinger 2 Feb 1973 2 Jul 1973
William Egan Colby 4 Sep 1973 30 Jan 1976
George Herbert Walker Bush 30 Jan 1976 20 Jan 1977
Adm. Stansfield Turner, USN (ret.) 9 Mar 1977 20 Jan 1981
William Joseph Casey 28 Jan 1981 29 Jan 1987
William Hedgcock Webster 26 May 1987 31 Aug 1991
Robert Michael Gates 6 Nov 1991 20 Jan 1993
R. James Woolsey 5 Feb 1993 10 Jan 1995
John Mark Deutch 10 May 1995 15 Dec 1996
George John Tenet 11 Jul 1997 11 Jul 2004
Porter Johnston Goss 24 Sep 2004 21 Apr 2005a

On this date, John Negroponte assumed leadership of the US Intelligence Community as the first
a.

director of national intelligence. Mr. Goss, retitled Director of the Central Intelligence Agency,
continued to head CIA.

2 Studies in Intelligence Vol. 49, No. 3


DCIs


With no political,
military, or industrial
base, the DCI was the
Its a Very Hard Job sisoften carried the implicit
easiest man in message, Mr. President, your
After John McCone was sworn in Washington to fire. policy is not working. Presi-
as DCI in November 1961, Presi- dents often have unrealistic
dent John Kennedy shook his
hand and gently warned him that
he was now living on the bull's
eye, and I welcome you to that
spot. 3 The bulls eye seems an

The purpose for establishing the
position of DCI and the CIA
expectations about what the
CIAs espionage and covert action
capabilities can achieve, and they
usually did not appreciate hear-
ing from their DCIs that the
appropriate metaphor, consider- world was complicated and
under law in 1947 was to help
ing how often DCIs were the tar- uncertain. No wonder R. James
avoid another Pearl Harbor sur-
gets of recrimination and attack. Woolsey said his version of the
prise by taking strategic intelli-
George H. W. Bush called the job jobs description could be written
gence functions from the confines
the best . . . in Washington, 4 but very simply: Not to be liked. 7
of separate departments and ele-
arguably it also was the toughest. vating them to the national level.
The DCI was to have been the
The DCI really did not direct DCIs in Profile
only adviser to the president with
something called central intelli- even a chance of presenting him
gence. He was responsible for with unbiased, nondepartmental Allen Dulles once told Congress
coordinating national collection intelligence. The seemingly that the CIA should be directed
and analysis, but he lacked the straightforward phrases in the by a relatively small but elite
authority to do so, faced formida- National Security Act, however, corps of men with a passion for
ble competitors in other agen- only gave the DCI the potential anonymity and a willingness to
cies, and had no constituency to to be a leader of the Intelligence stick at that particular job. 8
support him. He had to walk the Community. Whether a given While Dulless advice may be
knifes edge between politics and DCI came close to being one was applicable to the heads of the
politicization, and was the handy a result of the interplay of per- Agencys directorates and offices,
scapegoat for intelligence mis- sonalities, politics, and world hardly any part of his statement
steps often committed or set in events. With line authority only was borne out over the history of
train years before. And he had to over the CIA, the DCI depended the DCIs position. Elite, yes; but
deal with the reality that, as on his powers of bureaucratic neither small in number nor
Allen Dulles wrote, Intelligence persuasion and, most vitally, his anonymousmany were well
is probably the least understood political clout at the White House known in their various pursuits
and most misrepresented of the to be heard and heeded. Richard when they were nominated. And
professions. 5 Helms often noted that the secre- even if they were willing to stay
tary of defense was the second for the long haul, few did. In late
most powerful person in Wash- 1945, an interdepartmental com-
3 White House press release, Remarks of
ingtonexcept, perhaps for a few mittee that was developing a
the President at the Swearing-In Ceremo- plan for a national-level intelli-
nies of John McCone, 29 November 1961, first ladieswhereas the DCI
Executive Registry Files, Job 80B01676R, was the easiest man in Washing- gence agency recommended that
box 8, folder 7. The subhead quotation is ton to fire. I have no political, its director be appointed for a
John Deutchs, in Charles E. Lathrop, The military, or industrial base. 6
Literary Spy: The Ultimate Source for
Quotations on Espionage and Intelligence
Moreover, the DCIs showcase 6 Trudi McC. Osborne, The (Really) Quiet

(New Haven: Yale University Press, 2004), productnational-level analy- American: Richard McGarrah Helms,
118. The Washington Post, 20 May 1973, C2.
4 Stansfield Turner, Secrecy and Democ- 7 Lathrop, 117.

racy: The CIA in Transition (Boston: 5Allen Dulles, The Craft of Intelligence 8 The Silent Service, Time, 24 February

Houghton Mifflin, 1985), 24. (New York: Harper and Row, 1963), 5. 1967, 16.

Studies in Intelligence Vol. 49, No. 3 3


DCIs


The average time DCIs
served was just over
three years.
long term, preferably not less the fall of the Allende regime in
than six years. 9 Testifying to Chile in 1973; the publication of
Congress in early 1947 about the
proposed National Security Act,
Dulles asserted that appoint-
ment as DCI should be some-
what comparable to appointment

als they led under 11 administra-
tions over nearly six decades that
the leaked Pike Committee
report in 1976; the breakdown in
the SALT II talks in 1977; a
military coup attempt in recently
democratized Spain in 1981; the
to high judicial office, and should they were able to accomplish as assassination of the Lebanese
be equally free from interference much as they did despite all the prime minister in 1987; the
due to political changes. 10 bureaucratic disruptions.
official breakup of the Soviet
Union in 1991; and a deadly
The reality of a DCIs tenure was The frequency of these regime terrorist attack in Egypt in 2004.
otherwise. The average time they changes at the CIA must further
served was just over three years, be considered in light of the fact
and only five DCIs stayed at least that most new DCIs had next to In other instances, major events
four. It is a tribute to the DCIs no time to settle in and read in. immediately preceded the DCIs
and all the intelligence profession- Over half had to face foreign arrival: the signing of the
policy or intelligence-related Vietnam War peace accords in
9 Preliminary Report of Committee
crises within their first month. 1973 and the terrorist shootings
Appointed to Study War Department
These included: the Chinese outside the CIA headquarters
Intelligence Activities, 3 November 1945, invasion of North Korea in 1950; compound in 1993. Soon after his
document 42 in Foreign Relations of the the death of Stalin in 1953; the appointment in 1950, Walter
United State, 1945-1950: Emergence of the US military incursion into the Bedell Smith said, I expect the
Intelligence Establishment (Washington: Dominican Republic in 1965;
Government Printing Office, 1996), 102. worst and I am sure I wont be
10 Statement to the Senate Armed Ser-
Frances withdrawal from NATO disappointed. 11 Most subsequent
vices Committee, 25 April 1947, National and a marked upsurge in the DCIs likewise were not. Perhaps
Security Act clipping file, folder 29, CIA Cultural Revolution in China in the best advice they could have
Historical Intelligence Collection. 1966; the Yom Kippur war and
received from the presidents who
picked them was, Be ready to hit
the ground running.

Who were the DCIs? President


Eisenhower called the CIA one
of the most peculiar types of
operation[s] any government can
have and said it probably takes
a strange kind of genius to run
it. 12 Whatever the validity of
that characterization, these are
the salient demographic facts
about the 19 DCIs: 13

11 Lathrop, 110.
12 Stephen E. Ambrose, Eisenhower the Presi-
dent (New York: Simon and Schuster, 1984), 227.
13 Most of the following biographic data comes

from Directors and Deputy Directors of Central


Intelligence (Washington: CIA Center for the
Study of Intelligence, 1998).

4 Studies in Intelligence Vol. 49, No. 3


DCIs

They were born in 14 different Historians and DCIs Smith, Dulles, McCone, Casey,
states. Most hailed from the and possibly Helmsare por-
Midwest (nine) and the North- An inconsistency exists between trayed as making noteworthy
east (seven). One was born in the fairly extensive bibliography contributions to the way the US
the Southwest, one in the West, on DCIs and historians evalua- government conducts intelli-
and one overseas. tion of their personal contribu- gence activity.
tion to US national security.
They attended 21 different col- Nearly as many biographies have That consensus may derive from
leges, universities, and been written about DCIs as about conceptions of the proper place of
graduate or professional comparable members of the intelligence practitioners in the
schools. Eight finished college, American foreign policy commu- foreign policy process. Intelli-
and ten others went on for post- nitythe secretaries of state and gence, the premise goes, should
graduate degrees. One, Bee- defense, the presidents national be detached from policy so as to
tle Smith, completed only high security advisers, and the chair- avoid cross-corruption of either. If
school. Considering that he men of the Joint Chiefs of Staff. intelligence services have a stake
ended his public service with However, the 19 heads of the in policy, they may skew their
four stars and an ambassador- largest agglomeration of secret analyses or become aggressive
ship, he could be called the services in what used to be called advocates of covert action. The
Horatio Alger of DCIs. the Free World generally have Intelligence Community must
not been perceived as being remain a source of objective
Before their appointments, the nearly as influential as most of assessment and not become a
DCIs came from a variety of their counterparts. politicized instrument of the
walks of life, some from more incumbent administration. As
than one. Six were from the Historians have regarded a num- heads of the Community, DCIs
military, eight had been govern- ber of secretaries of state and should be intellocrats who
ment officials and/or lawyers, defensenotably George Mar- administer specialized secret
three had been businessmen, shall, Dean Acheson, John Fos- functions, not to benefit any
and four came from politics, ter Dulles, Dean Rusk, Robert departmental interests but to
academe, or journalism. All McNamara, and Henry Kiss- advance policies set elsewhere in
three branches of government ingeras major players in the the executive branchspecifi-
were represented, as were three diplomatic and military develop- cally, the White House.
of five military services. ments of their times, as is at
least one national security The DCIs reported to the
Two-thirds of the DCIs had adviser, Kissinger. The DCIs are National Security Council and
direct experience with intelli- another matter. Only two, Dulles truly served at the pleasure of
gence in military or civilian life and Casey, usually are consid- the president. Indeed, much of
before their appointments. One ered to have had an impact rival- every DCIs influence was
served in the OSS (William ing that of the other top foreign directly proportional to his per-
Casey), two in the CIA (Robert policy officials in the administra- sonal relationship with the chief
Gates and Porter Goss), and tions in which they served. The executive. At the same time, and
three in both (Dulles, Helms, rest rarely get mentioned in most somewhat paradoxically, after
and William Colby). foreign affairs surveys (although incoming presidents began choos-
Helms and Colby may come up ing their DCIs in 1977, the non-
The DCIs average age at the when the Agencys time of trou- partisan stature of the DCI
time of their appointment was bles in the 1970s is discussed). diminished and, along with it, his
slightly under 55. The young- Even in overviews of the CIA and independence. The general rule
est was 43 (James Schlesinger); the Intelligence Community, only of new president, new DCI did
the oldest was 67 (Casey). a handfulHoyt Vandenberg, not always translate into greater

Studies in Intelligence Vol. 49, No. 3 5


DCIs


No DCI ever had a
chance to become as
autonomous as
influence. The presidents complicated situations are some-
national security adviser and the J. Edgar Hoover at FBI. times made less square to fit
secretaries of state and defense more easily into the models
usually still had more access to
the Oval Office.

The situation was not much dif-


ferent at Langley. Directors came
round holes, or so many different
holes are created that compari-
sons among individuals become
too hard to draw.
to be thought of, or to think of
and went, but bureaucracies A straightforward approach to
themselves as, a network of old
stayed. When DCIs tried to the DCIs would take into account
boys or, in William Colbys
clean house (Schlesinger and the institutional and political
words, the cream of the aca-
Stansfield Turner) or manage limitations on their authority, the
demic and social aristocracy.
through loyalists from previous objectives they were appointed to
Biographers attached those
jobs (Turner and John Deutch), accomplish, and the personality
labels largely to former opera-
the result was administrative traits they exhibited and mana-
tors in the Office of Strategic Ser-
disarray and low morale. For gerial methods they used during
vices who joined the early CIA their tenures. What were the
these reasons and more, no DCI
and then stayed ona situation directors told to do (mission) and
ever had a chance to become as
autonomous as J. Edgar Hoover that applies to only three DCIs how did they go about doing it
at the FBI, or to be assessed as (Dulles, Helms, and Colby). 14 (style)? With those questions
having more than an episodic addressed, an evaluation of their
impact on US foreign policy This heterogeneity does not effectiveness can be made. How
achievements. mean, however, that the DCIs well did the DCIs do what they
cannot be analyzed collectively. were expected to do, given their
At least some aspects of the authorities, resources, and access
A Leadership Typology many models applied to political (record)? What types of DCIs, if
and corporate leaders can be any, have been most successful
Can DCIs, then, be regarded as used with the DCIs, although (patterns)?
leaders, as opposed to heads of empiricism or utility may suf-
organizations or chief adminis- fercomplex personalities and Using this perspective, five vari-
trators? Was US intelligence eties of DCIs are evident. The
noticeably different because a first is the administrator-custo-
certain individual served as DCI? 14 See Stewart Alsop, The Center: People
dian or administrator-techno-
Did DCIs havecould they have and Power in Political Washington (New crat, charged with implementing,
York: Harper and Row, 1968); Burton
hada leadership role commen- Hersh, The Old Boys: The American Elite
fine-tuning, or reorienting intelli-
surate with that of their counter- and the Origins of the CIA (New York: gence activities under close direc-
parts at the Departments of Charles Scribners Sons, 1992); Rhodri tion from the White House.
State and Defense? One way to Jeffreys-Jones, The Socio-Educational Examples of this type have been
begin answering those questions Composition of the CIA Elite: A Statistical Souers, Roscoe Hillenkoetter,
Note, Journal of American Studies 19:3
is through serial biography and (December 1985): 42124; Robert E.
William Raborn, Woolsey,
group analysis. In contrast to Spears, Jr., The Bold Easterners Revis- Deutch, and George Tenet. Usu-
clandestine services officers, how- ited: The Myth of the CIA Elite,in Rhodri ally appointed at a time of uncer-
ever, DCIs have not been exam- Jeffreys-Jones and Andrew Lownie, eds., tainty about the Intelligence
ined in such a fashion. They do North American Spies: New Revisionist Communitys roles and capabili-
Essays (Lawrence: University Press of
not fit into categories like pru- Kansas, 1991), 20217; and William Colby
ties (the late 1940s and the mid-
dent professionals and bold and Peter Forbath, Honorable Men: My 1990s), these DCIs tried to main-
easterners, and they lack the Life in the CIA (New York: Simon and tain stability in the CIAs rela-
sociological homogeneity needed Schuster, 1978), 180. tionships with other Community

6 Studies in Intelligence Vol. 49, No. 3


DCIs

agencies, Congress, and the pub- with espionage and counterintel- the insidera career intelligence
lic. Their main goal was to do ligence. Because of the promi- officer who used his experience at
better with what they already nent place clandestine affairs the CIA to reorganize its bureau-
had, and to avoid distractions had in American foreign policy cracy and redirect its activities
and scandals. Except for Raborn, when they served, this type of during or after a time of political
all of these administrators had DCI generally served longer by controversy and lack of certitude
experience with intelligence farseven years on average about its direction. Two DCIs
affairs, but they were not intelli- than any other type. functioned as manager-reformer
gence careerists. Some had a very insiders: Colby and Gates. Colby,
low-key style, almost to the point The high level of secret activity an operations veteran with a
of acting like placeholders and during those long tenures recur- career dating back to the OSS,
time-servers (Hillenkoetter, rently produced operational mis- sought to rescue the CIA from the
Raborn). Others energetically haps, revelations of flaps, and political tempests of the mid-
pursued administrative changes other intelligence failures that 1970s and to regain some of the
designed to make the CIA and hurt the CIAs public reputation Agencys lost prestige through his
the Community more responsive and damaged its relations with policy of controlled cooperation
to policymakers and better the White House and Congress. with congressional investigators
adapted to a new political envi- The Bay of Pigs disaster under and targeted termination of ques-
ronment (Deutch, Tenet). Dulles, the ineffective covert tionable activities. Gates, a long-
action in Chile under Helms, and time Soviet analyst who had
The next type is the intelligence the Iran-Contra scandal under worked on the NSC in two admin-
operatorDCIs who were cur- Casey are prominent examples. istrations and also served as dep-
rent or former professional intel- As journalist James Reston noted uty director for intelligence,
ligence officers tasked with during the Agencys dark days in moved the Agency into the post-
devising, undertaking, and over- the mid-1970s, DCIs who came Cold War era after a period of
seeing an extensive array of up through the ranks might have undynamic leadership.
covert action, espionage, and known more about what CIA
counterintelligence programs in should be doing than outsiders, The other type of manager-
aggressive pursuit of US national but they are not likely to be the reformer is the outsider, who was
security policy. Three DCIs fit best men at knowing what it chosen because of his experience
this category: Dulles, Helms, and should not be doing. 15 in the military, business, govern-
Casey. The presidents they ment, or politics to implement a
served had no qualms about Failures, indiscretions, and other major reorganization of the CIA
using all of the US governments such controversies in turn have and the Intelligence Community,
clandestine capabilities against led to the departures of those or to regroup and redirect the
Americas adversaries, and they intelligence-operator DCIs and Agency, especially after major
relied on their DCIs knowledge their replacement by manager- operational setbacks or public
of and experience with opera- reformers charged with cleaning conflicts over secret activities. Six
tions to help them accomplish up the mess and preventing simi- DCIs were manager-reformer
that end. The DCI as intelli- lar problems from happening outsiders: Vandenberg, Smith,
gence operator may have empha- again. There have been two kinds McCone, Schlesinger, Turner, and
sized different secret activities of manager-reformer DCIs. One is Porter Goss. Collectively, they
depending on individual back- were responsible for more major
grounds and predilections, and changes at the CIA (or its prede-
15Renze L. Hoeksema, The Presidents
the targets they worked against. Role in Insuring Efficient, Economical, and
cessor, the Central Intelligence
For example, Dulles and Casey Responsible Intelligence Services, Presi- Group [CIG]) than any other cat-
were devotees of covert action, dential Studies Quarterly 8, no. 2 (Spring egory of director. For example,
while Helms preferred to work 1978): 193. under Vandenberg, the CIG

Studies in Intelligence Vol. 49, No. 3 7


DCIs

acquired its own budgetary and tried toand did not worry about FLASH/DCI EYES ONLY cable
personnel authority, received whom they antagonized along the had just arrived. The messages
responsibility for collecting all way, some of them were among contents were so sensitive that
foreign intelligence (including the most disliked or hardest to whoever delivered the printed
atomic secrets) and preparing get along with DCIs. copy had to retrieve it and
national intelligence analyses, destroy it. The duty officer took
and coordinated all interdepart- Finally, there are the restorers: the cable to McCone at the hotel
mental intelligence activities. George Bush and William Web- where he was staying. The DCI,
Smithin response to intelli- ster. Like the manager-reformer wearing a bathrobe, read the con-
gence failures before the Korean outsiders, they became DCIs tents and put the paper in his
War and to infighting among after the Agency went through pocket. The duty officer asked for
operations officerscentralized difficult timesthey succeeded it back, saying he was supposed
espionage and covert actions, Colby and Casey, respectively to retrieve it for disposal.
analysis, and administration by but they were not charged with McCone unfolded the cable, held
rearranging the CIA into three making significant changes in it up, and asked the officer to tell
directorates and creating the the way the CIA did business. him who sent it. Reading the
Office of National Estimates. In Instead, they used their people From line, the officer replied,
effect, he organized the Agency skills and public reputations to Director. Right, McCone said,
into the shape it has today. raise morale, repair political and Im the Director. He put the
damage, and burnish the cable back in his pocket and said
Schlesinger and Turner facili- Agencys reputation. Bush, a good night. 16
tated the departure of hundreds prominent figure in Republican
of clandestine services veterans Party politics, went to Langley to Some DCIs were affable; some
in their quests to streamline the mend the CIAs relations with were bland; some were blunt.
Agencys bureaucracy, lower the Congress and use his amiability Beetle Smith greeted the
profile of covert action, and move to improve esprit de corps and attendees at his first staff meet-
the CIA more toward analysis put a more benign face on the ing with these words: Its inter-
and technical collection. Goss Agency. Webster, a director of the esting to see all you fellows here.
was the only one in the group FBI and former federal judge, Itll be even more interesting to
who had previously worked at brought a quality of rectitude to see how many of you are here a
the Agency, but he was selected an Agency mired in scandal and few months from now.
because he headed the intelli- helped raise its stature in the Schlesinger informed Agency vet-
gence oversight committee in the Community and with the public. eran John McMahon and his
House of Representatives. Tak- superior, Director of Science and
ing over during imbroglios over Some DCIs gave early, strong sig- Technology Carl Duckett, at 9:30
collection and analytic failures nals about how they intended to one morning that he had just
connected with the 9/11 terrorist run the Agency, as when Casey appointed McMahon to head the
attacks and assessments of Iraqs brought in Max Hugela street- Office of Technical Service.
weapons of mass destruction, he savvy, by-the-bootstraps busi- Thinking of the time needed for a
set about revamping the Agencys nessman from Brooklyn with no smooth transition, Duckett sug-
work on international terrorism. intelligence experienceto shake gested, How about if he starts at
Most DCIs in this category were up the Directorate of Operations. the first of the month?
far more concerned about achiev- Sometimes, DCIs gave smaller, Schlesinger answered, How
ing their objectives quickly than but no less telling, signs. On one about at 10:00? 17
about angering bureaucratic of his early trips overseas,
rivals or fostering ill will among McCone was in a European capi-
subordinates. Largely because tal when an Agency duty officer 16 Authors conversation with Harold

they accomplished so muchor called late at night to say that a Bean, 30 October 2001.

8 Studies in Intelligence Vol. 49, No. 3


DCIs


Some DCIs tried to
resolve the Agencys
culture wars between
And the contrasts continue. Some nominee. After that, two other
DCIs tried hard to be true direc- the spooks and the nominations received significant
tors of the Intelligence Commu- scholars. numbers of no votes (Colby and
nity, even though the jobs of the Gates), and four had to be with-
DCI as Community manager and
head of the CIA historically were
competing, not complementary,
roles. 18 Others chose to run the
Agency primarily and went about

and the cowboys who did covert
actionbut most left that inter-
drawn (Theodore Sorensen,
Gates, Michael Carns, and
Anthony Lake). 20

The contrast between the two


their Community functions as an worlds in which DCIs existed
nal sociology alone. Some sought
aside. Some DCIs emphasized secret and publicfell into stark
a policymaking role; others
analysis over operations and relief from the mid-1960s to the
spurned it. And while some DCIs
intensely scrutinized the Direc- mid-1970s, when the relationship
were inclined to convey perils
torate of Intelligences products. between intelligence and democ-
and forebodings to their custom-
Others placed operations over racy in the United States under-
ers, others were more helpful at
analysis and reveled in war sto- went a sea change. Statements
clarifying ambiguities and
ries rather than estimates. from two DCIs of that period cap-
assessing alternatives.
According to Richard Lehman, a ture the magnitude of the change.
senior officer in the Directorate After he was appointed DCI in
of Intelligence, Allen Dulles had Out of the Shadows 1966, Helms said, I think theres
a habit of assessing estimates by a tradition that the CIA is a silent
weight. He would heft them and One defining characteristic of the service, and its a good one. I think
decide, without reading them, DCIs was that they were the the silence ought to begin with
whether or not to accept them. 19 most unsecret heads of any secret me. 21 In 1978, Colby, looking back
Some directors were hard charg- agency in the world. DCIs lived on the time of troubles he had
ing, strong willed, and ambi- in the nebulous zone between recently suffered through, said
tious, with mandates and secrecy and democracy, clandes- that such a supersecretive style
agendas for change; others went tinity and openness. They headed of operation had . . . become
about their work in a quieter, the worlds first publicly acknowl- incompatible with the one I
nonconfrontational fashion; and a edged intelligence service. While believed essential.22
few barely left a mark. Some some countries guard the identi-
DCIs tried to resolve the ties of their intelligence chiefs, After that, pragmatic openness
Agencys culture wars between the DCIs were public figures, became the DCIs watchword in
the spooks and the scholars, held to account for what the CIA, dealing with their political moni-
and between the so-called pru- and to some extent the Commu- tors. As the Cold War foreign pol-
dent professionals who ran spies nity, did and did not do. The icy consensus shattered for good,
whole process of vetting a pro- DCIs increasingly had to contend
spective DCI was uniquely trans- with all the various organs of
17 Lathrop, 110. John McMahon, oral his-
parent among intelligence accountability: special commis-
tory interview by Fenton Babcock, 4
December 1997, 25. (Transcript in CSI
services. His confirmation hear- sions, watchdog groups, the courts,
Oral History Program files.) ings usually were open, and more
18 See Douglas F. Garthoff, Directors of than a few times were used for
Central Intelligence as Leaders of the U.S. partisan purposes and political 20 Gates was nominated twice. His name

Intelligence Community, 1946-2005 theater. That phenomenon is not was withdrawn during contentious hear-
(Washington: CIA Center for the Study of ings in 1987.
Intelligence, 2005).
recent. The first controversial 21 John Ranelagh, The Agency: The Rise

19 Richard Kovar, Mr. Current Intelligence: confirmation was John McCones and Decline of the CIA (New York: Simon
An Interview with Richard Lehman, Stud- in 1962the first in which any and Schuster, 1986), 614.
ies in Intelligence 43, no. 2 (1999-2000): 27. senators voted against a DCI 22 Colby, 334.

Studies in Intelligence Vol. 49, No. 3 9


DCIs


DCIs were the most
unsecret heads of any
secret agency in the
the media, and, most importantly The First Customer is Always
of course, Congress. Later DCIs world. Right
could scarcely imagine the hal-
cyon days of their predecessors
dealings with Capitol Hill in the
1950s, when oversight was really
overlook. It is hard today to envi-
sion what it was like in 1956, when

The era of congressional benign
Historically, the most important
factor in the life of the DCI was
his relationship with the presi-
dent. The CIA is more of a presi-
dential organization than any
Senator Richard Russell, the CIAs neglect ended during the period other in the US governmenta
longtime friend and protector, said 1974-80, with the adoption of the special quality that was both a
that If there is one agency of the Hughes-Ryan Amendment boon and a bane to the DCIs.
government in which we must requiring a presidential finding Presidents have their own pecu-
take some matters on faith, with- liar appreciation of intelligence
for covert actions; the Church
out a constant examination of its and their own way of dealing
and Pike Committee investiga-
methods and sources, I believe this with the CIA and their DCIs. We
tions; the establishment of the have had presidents experienced
agency is the CIA.
House and Senate permanent with intelligence, or who were
In those days, the DCI briefed oversight committees; and the fascinated with intelligence or
Congress a handful of times a year passage of the Intelligence with certain kinds of secret infor-
at most and almost always left Accountability Act mandating mation or operations. Other pres-
with a figurative, if not literal, that Congress be promptly and idents had little experience with
blank check. One of the Agencys fully informed of covert actions. intelligence, or did not care about
legislative counsels, John Warner, After that flurry, the DCI rela- it, or did not like it or the CIA. As
told of an encounter he and Dulles tionship with Congress was former Deputy Director of Cen-
had with one of the CIA subcom- altered forever. For a few event- tral Intelligence Richard Kerr
mittees in the late 1950s: aptly put it, a number of admin-
ful years, Casey tried to stand as
istrations . . . started with the
the immovable object against the expectation that intelligence
It was sort of a crowded room,
irresistible force. As Robert Gates could solve every problem, or
and [the subcommittee chair-
observed, Casey was guilty of that it could not do anything
man, Representative] Clarence
Cannon greets Dulles [with] contempt of Congress from the right, and then moved to the
Oh, its good to see you again, day he was sworn in. 24 The trend opposite view. Then they settled
Mr. Secretary. He thinks its was soon back on track, however, down and vacillated from one
[Secretary of State John] Foster and by the year 2000, Agency extreme to the other. 25
Dulles, or mistakes the name; I officers were briefing Congress in
dont know. Dulles, hes a great some fashion an average of five Presidents relations with their
raconteur. He reminds Cannon times a day, and the DCIs fre- DCIs often followed a similarly
of this, and Cannon reminds erratic course. Some began by
quent testimony on the Hill was
him of that, and they swap sto- regarding the DCI as their senior
a headline-grabbing event.
ries for two hours. And at the intelligence adviser and saw him
end, [Cannon asks,] Well, Mr. regularly. Occasionally that
Secretary, have you got enough 23 John S. Warner, oral history interview degree of contact continued; more
money in your budget for this by Woodrow Kuhns, 27 September 1996, often, it did not. Other presidents
year [and] the coming year? 48. (Transcript in CSI Oral History Pro-
gram files.)
[Dulles replies,] Well, I think 24 Robert M. Gates, From the Shadows: The 25 Richard J. Kerr and Peter Dixon Davis,
we are all right, Mr. Chairman. Ultimate Insiders Story of Five Presidents Ronald Reagan and the Presidents Daily
Thank you very much. That and How They Won the Cold War (New Brief, Studies in Intelligence 41, no. 2
was the budget hearing.23 York: Simon and Schuster, 1996), 213. (1997): 31.

10 Studies in Intelligence Vol. 49, No. 3


DCIs


The DCI often served
at the clear displeasure
of the president.
preferred from the start to have it. 27 Or when Nixon returned a
their national security advisers thick package of PDBs given to
function as their principal intelli-
gence officers. A few presidents at
least made a bow toward giving
their DCIs authority over other
Community departments, but in
him during the transition period
unopened, called Agency officers
clowns, and asked, What use
are they? Theyve got 40,000 peo-
ple over there reading newspa-
most cases the Communitys cen- pers. 28
with his rigid military staff struc-
ter of gravity meandered between
ture; John Kennedy and his loose
CIA Headquarters, the Pentagon, The DCI often served at the clear
agglomeration of ad hoc working
Foggy Bottom, and the West displeasure of the president, who
groups and catch-as-catch-can
Wing. meetings with advisers; Lyndon directed him to act and then
Johnsons congressional cloak- often tried to denynot very
A few DCIs were close to their room approach, in which the plausiblythat he had anything
presidents; some had cordial, real deals were made in infor- to do with the outcome. Bill Clin-
businesslike relationships; some mal settings outside the National ton remarked that cutting the
had only infrequent contact; and Security Council; and Richard intelligence budget during peace-
some had no relationships to Nixons notorious Berlin Wall of time was like canceling your
advisersHenry Kissinger, H. R. health insurance when you felt
speak of. From the start, DCIs
good. 29 But chief executives have
had to overcome assorted barri- Haldeman, and John Ehrli-
not always been the best stew-
ersphysical, administrative, chmanwho controlled access to
ards of the resources of the
psychologicalin their interac- the Oval Office.
Agency they have so often called
tion with the presidents.
on to help implementand, in
Lawrence Red White, the DCIs sometimes could work more than a few cases, salvage
Agencys longtime director of around those kinds of obstacles, their foreign policies.
administration, recalled the time most notably by changing the
when Dulles told Eisenhower look and content of the daily
about a possible location for the It should be noted, however, that
briefing productthe Central closeness was not an absolute
headquarters building. Were Intelligence Bulletin, the Presi-
thinking of tearing down that old good for the DCIs or a solution to
dents Intelligence Checklist, and some of these difficulties. Some
brewery [where the Kennedy the Presidents Daily Briefand
Center is now] and building it DCIs paid a cost for being too
developing more flexible and close, or trying to be. They wore
right there. Eisenhower went responsive methods for provid-
through the roof. He said, You out their welcomes, or became too
ing current intelligence and committed to the success of
are not going to build that build- answers to taskings. But even
ing in the District of Columbia. with those improvements, DCIs
This town is so cluttered up now, found it extremely hard to sur- 27 Lathrop, 174, 339.
you cant get from one end to the mount the psychological barriers 28 John L. Helgerson, Getting to Know the
other, and you are going to get some presidents erected. What President: CIA Briefings of Presidential
out of town. 26 Then there were Candidates, 1952-1992 (Washington: CIA
was a DCI to do when Johnson Center for the Study of Intelligence,
the ways presidents chose to run said that the CIA is made up of 1995), 91; Richard Helms, with William
their White Houses: Eisenhower boys whose families sent them to Hood, A Look Over My Shoulder: A Life in
Princeton but wouldnt let them the Central Intelligence Agency (New
York: Random House, 2003), 410; Thomas
26 James Hanrahan, Soldier, Manager,
into the family brokerage busi- Powers, The Man Who Kept the Secrets:
Leader: An Interview with Former Execu- ness; and told Helms, Dick, I Richard Helms and the CIA (New York:
tive Director Lawrence K. Red White, need a paper on Vietnam, and Ill Alfred A. Knopf, 1979), 201.
Studies in Intelligence 42, no. 3 (1998): 89. tell you what I want included in 29 Lathrop, 344.

Studies in Intelligence Vol. 49, No. 3 11


DCIs


Throughout, the DCIs
were honorable men,
devoted to [the
covert actions, or were accused of peace, in flush times and lean,
politicization, or became linked nations] service. amid accolades and scorn. No one
with controversial policies. It was


of their various leadership styles
not an automatic benefit for the insured success. Their standing
Agency or the DCI for him to be
and accomplishments depended
able to say, as William Casey did,
You understand, I call him interpretation of those facts. In on circumstances they could not
Ron. 30 peacetime, the necessary facts . influence: presidential agendas,
. . and their interpretation are world events, and domestic poli-
essential to the development of tics. On occasion, with the right
Honorable Men policy to further our long-term conjunction of circumstances and
national security . . . . To pro- personalities, DCIs reached the
At the cornerstone laying cere- vide information of this kind is inner circle of the national secu-
mony for the Original Headquar- the task of the organization of rity apparatus; more often, they
ters Building in 1959, President which you are a part. No task did not. Throughout, however,
Eisenhower said: could be more important.31 they werein Richard Helmss
famous phrasehonorable men,
In war, nothing is more impor-
For almost 60 years, the DCIs devoted to [the nations] service. 32
tant to a commander than the
carried out that task in war and
facts concerning the strength,
dispositions, and intentions of 32 Richard Helms, Global Intelligence and
his opponent, and the proper 31Our First Line of Defense: Presidential the Democratic Society, speech to the
Reflections on US Intelligence (Washing- American Society of Newspaper Editors,
ton: CIA Center for the Study of Intelli- 14 April 1971, 13, DCI Files, Job
30 Kovar, 36. gence, 1996), 19. 80R01284R, box 1, folder 6.

12 Studies in Intelligence Vol. 49, No. 3


Famous Espionage Cases

Tracking Julius Rosenbergs


Lesser Known Associates
Steven T. Usdin
A fresh look at the case of Julius the one hand and civilian defense
Rosenberg, executed in 1953 for contractors on the other. The
conspiracy to commit espionage, leakage to the USSR of vast
in the light of new information amounts of data about highly
about two of his lesser known sensitive technologies would not
associates, Joel Barr and Alfred have occurred if counterintelli-
Sarant, reveals disturbing paral- gence agencies had had the imag-


lels to some contemporary intelli- ination to conceive of massive
gence issues. Soviet espionage against indus-
trial targets undertaken by
Like 9/11, the most The National Commission on American citizens or had taken
important government Terrorist Attacks Upon the seriously the vetting procedures
failure in the cases of United States, also known as the for granting access to classified
Rosenberg, Barr, and 9/11 Commission, concluded in information.
Sarant, was one of 2004 that the most important
failure that left America vulner-
imagination. In contrast to Rosenberg, Barr
able to attack was one of imagi- and Sarant evaded detection and


nation. The cases of Rosenberg, slipped out of the United States.
Barr, and Sarant demonstrate Their subsequent careers behind
that the responses of the Federal the Iron Curtain, where they
Bureau of Investigation and the became pioneers of Soviet high
US Army to communist penetra- technology, are evocative of
tion during World War II were another contemporary concern:
characterized by a similar lack of the transfer of trained personnel
imagination. The FBI aggres- from the former Soviet Union to
sively identified communists who rogue states.
held sensitive positions in gov-
ernment, including jobs that
afforded communists routine
access to classified military infor- The Rosenberg Ring
mation. But the Bureau and the
army treated communists as Joel Barr was one of the original
potential subversives, not as members of a group of engi-
spies acting on behalf of the neerscivilian employees of the
Soviet Union. US military and its contractors
whom Julius Rosenberg recruited
Steven T. Usdin is a senior editor at The 9/11 Commission also high- to spy for the Soviet Union. From
BioCentury Publications and author lighted the lack of coordination the time they joined the Young
of Engineering Communism: How between intelligence and law Communist League in 1936, Barr
Two Americans Spied for Stalin and enforcement agencies. The and Rosenberg viewed the United
Founded the Soviet Silicon Valley, to Rosenberg case involved a simi- States government as a fascist
be published by Yale University lar breakdown, primarily regime little better than Nazi
Press in October 2005. between the army and the FBI on Germany.

Studies in Intelligence Vol. 49, No. 3 13


Rosenberg Ring


Barr and Sarant
passed the Soviets
more than 9,000 pages
Later, Barr recruited Alfred tions, the Rosenberg group had
Sarant, the only known member of relating to more than jobs that provided unfettered
the Rosenberg ring who was nei- 100 weapons programs access to a wide range of sensitive
ther Jewish nor a graduate of City during World War II. technologies.
College of New York. Barr and
Sarant were talented electrical
engineers who found technical
advances in radar and electronics
as compelling and important as
class struggle. This dual set of

during World War II and, in the
process, helped the Soviet Union
Military security officials
attempted to compartmentalize
R&Dfor example by assigning
the design of the various compo-
nents in a weapons system to
interests made them remarkably lay the foundation for a defense teams at different institutions. At
successful, first as spies for the industry that maintained rough some point, however, all the
USSR and later as senior figures parity with the United States pieces had to be assembled and
in the Soviet defense industry. throughout the Cold War. tested by people who understood
how they fit together and what
Controversy over the value of the Barr, Sarant, and Rosenberg held they were supposed to do. As
atomic secrets that Rosenberg low-level positions during World manufacturing engineers, Barr
helped transmit to the USSR has War II helping to design manufac- and Sarant were exactly at that
obscured the tremendous value of turing processes and performing point. In order to help design and
the information about conven- quality assurance inspections. In optimize manufacturing pro-
tional weapons systems that he contrast to more senior scientists cesses, they had to comprehend
and his comrades stole. They and engineers, who typically were the basic principles underlying a
provided detailed specifications aware of the details of only a few particular weapon and to have
for some of the most important specific projects and who were detailed knowledge of all of its
military technologies developed subject to intense security precau- components. Men assigned to fig-
ure out how to mass produce
advanced technologies were in an
excellent position to teach the
Soviets how to do the same.

Because practical how-to expe-


rience from related projects was
often relevant to their own work,
manufacturing engineers were
encouraged to study weapons
systems that they were not spe-
cifically assigned to work on.
Barr and the other engineers
working in his department had
complete freedom of the plant
and were permitted to go into
any other sections, one of his
former supervisors at Western
Electric later told the FBI. 1

1Declassified FBI file, serial 65-159392-120,


Joel Barr (left) and Alfred Sarant in Greenwich Village, New York, in 1944.
(From Barrs personal papers, courtesy of the author. Photographer unknown.) available in FBI Reading Room, Washington, DC.

14 Studies in Intelligence Vol. 49, No. 3


Rosenberg Ring

bore a striking
resemblance to

Postwar Russian radar

Barr and Sarant worked on, or replicas of the SCR-584, as well


had access to, detailed specifica- American designs. as clones of the AN/APQ-13
tions for most of the US air- and radar, a close cousin of the
ground-based radars; the
Norden bombsight; analog fire-
control computers; friend-or-foe
identification systems; and a
variety of other technologies.

and then automatically aimed
and fired artillery. 4
AN/APQ-7.

In conjunction with the technol-


ogy of the US proximity fuse
which Rosenberg literally
Working from a makeshift micro- wrapped up and delivered to Fek-
film studio in a Greenwich Vil- While the Rosenberg groups lisov as a Christmas present in
lage apartment, they copied and technology transfer probably did 1944upgraded Soviet versions
turned over to Soviet intelli- not have a decisive impact dur- of the SCR-584 and M-9 allowed
gence more than 9,000 pages of ing World War IIthe USSR had Moscow to shoot down Francis
secret documents relating to great difficulty keeping up with Gary Powers U-2 plane over
more than 100 weapons pro- the demand for basic weapons Sverdlovsk on May Day 1960.
grams during World War II, systems and was in a poor posi-
according to Alexander Feklisov, tion to absorb high technologyit In addition to data on radars,
one of their case officers. 2 In was extraordinarily useful in the analog computers, and the prox-
addition to Feklisovs memoir, immediate postwar period when imity fuse, the Rosenberg group
some details of the secrets Barr Russia quickly brought its arma- turned over a treasure trove of
and Sarant stole are mentioned ments up to American levels of secret information about jet
in the Venona decrypts, decoded sophistication. engine design and radio and com-
diplomatic cable traffic between puting technologies. The groups
Moscow and Soviet intelligence Much of the information Barr
total contribution amounted to
officers in New York. For exam- and Sarant borrowed from West-
over 20,000 pages of technical
ple, a December 1944 cable noted ern Electrics filing cabinets
documents, plus the entire
that Sarant had handed over 17 ended up in the hands of Adm.
12,000-page design manual for
authentic drawings of the Axel Berg, the man Stalin
the first US jet fighter, the P-80
AN/APQ-7 radar. 3 assigned during World War II to
Shooting Star. 6 In addition to
create a Soviet radar industry.
designs for specific weapons sys-
According to Feklisov, Barr Detailed information about
tems, the data gave Soviet scien-
turned over blueprints for the American R&D helped Berg take
tists and planners invaluable
SCR-584, a microwave radar sys- Soviet radar production from
insights into Americas develop-
tem designed at MITs radiation zero in 1940 to a level in 1955
ment strategies. In technology
lab that the army hailed as one of that equaled or exceeded the
development, information about
the most important technological United States output in quan-
a rivals mistakes and dead ends
breakthroughs of the war. He tity and capabilities. 5 Russian
is almost as valuable as details of
also passed plans for the M-9 gun radar bore a striking resem-
its accomplishments.
director, an analog computer that blance to American designs, par-
predicted a moving objects future ticularly the radar sets
position based on radar input manufactured at Western Elec-
Flawed Counterintelligence
tric. In 1949, for example, the
USSR started mass-producing
2
The success of Barr and his
Alexander Feklisov, The Man Behind the Rosen-
bergs (New York: Enigma Books, 2001), 136.
comrades in gaining access to
3 Venona decrypt 1749-50, New York to Mos- 4 Feklisov, 135. highly classified information and
cow, 13 December 1944. Available at 5 The Electronics Industry in the USSR, CIA,
http://www.nsa.gov/venona/releases/13_Dec_19 SC RR 101, 1 June 1955 (declassified 24 Janu-
44_RI_p2.gif. ary 2001): 711, 2528. 6 Feklisov, 160.

Studies in Intelligence Vol. 49, No. 3 15


Rosenberg Ring


Their ability to operate
unmolested can
only be attributed to
communicating it to the KGB (CPUSA). The army immediately
was not the result of cunning stunningly incompetent moved to fire Rosenberg from his
tradecraft. They were amateurs American position as an inspector in mili-
working under the loose over- counterintelligence. tary weapons plants, but his his-
sight of professional intelligence trionic defense convinced a civil
officers who struggled to impose
minimal discipline. Their ability
to operate unmolested can only
be attributed to stunningly
incompetent and uncoordinated

being a Russian spy and the FBI
service review panel that the
charges were untrue. Rosenberg,
who had headed a Young Com-
munist League chapter at col-
lege, claimed he had no
American counterintelligence. briefly put him under surveil- connection to or sympathy for
The FBI and the army had iden- lance. The attention did not pre- communism.
tified Barr, Sarant, Rosenberg, vent Golos from personally
and other members of their meeting with Rosenberg and run- A few months later, following up
group as communists and poten- ning an extensive espionage net- on signatures on the nominating
tial spies years before they were work, or from helping coordinate petitions that led to Ethel Rosen-
put out of business. Basic secu- the August 1940 assassination in berg, the FBI discovered that
rity measures, such as requiring Mexico of Lev Trotsky, Lenins sec- Barrs ex-roommate and fellow
that defense contractors check ond in command and ardent foe of Signal Corps engineer Samuel
the references of applicants for Stalin.7 Sack was a communist. The room-
sensitive jobs, would have neu- mate was fired, but neither the
tralized Barr and his comrades army nor the FBI made enquiries
In addition to failing to keep its
early in their espionage careers. about his close associates.
eyes on Golos, the FBI and its
counterparts in army counterin-
The armys Signal Corps Labora- telligence made poor use of infor-
tories hired Barr as an electrical The FBI finally caught up with
mation that could have shut Barr in December 1941, matching
engineer in July 1940; Rosen- down Rosenbergs operation long
berg signed on with the corps as his signature on a Cacchione
before any important secrets nominating petition to one on his
a junior engineer two months were stolen. The FBI had an
later. Some time in 1941, they civil service application. On
active program to identify and 23 February 1942, the Signal
started funneling military tech- weed out communists in govern-
nology secrets to the USSR Corps fired Barr and placed his
ment, especially those with name on a list of undesirable
through a longtime Soviet opera- access to sensitive or classified
tive, Jacob Golos. At the time, employees who were ineligible for
information. In the spring of employment by the army. More
Golos was well known to the FBI. 1941, the Bureau gave the army than 100 of Barrs colleagues at
a dossier on Rosenberg. His wife, the Signal Corps laboratory signed
In March 1940, the Justice Depart- Ethel, had signed a nominating
ment indicted Golos, whom it had petitions requesting that the army
petition for Peter Cacchione, a reconsider the action; many of
identified as the source of forged communist candidate for New
passports for communist party offi- them scratched their names off or
York City Council, and the ripped up the petitions when they
cials and Soviet agents, for failing Rosenbergs had shared an apart-
to register as a foreign agent. As learned that he had been fired
ment with a couple who were because he was a communist.8
part of a deal that shielded other open members of the Communist
party members from prosecution, Party of the United States
Golos pled guilty, paid a $500 fine, 8 Executive Sessions of the Senate Permanent
and received a four-month sus- Subcommittee on Investigations of the Commit-
pended sentence. The attorney 7 Elizabeth Bentley, Out of Bondage (London: tee on Government Operations, Vol. 3, (Washing-
general publicly accused him of Rupert Hart-Davis, 1952), 8788. ton: Government Printing Office, 2003), 2801.

16 Studies in Intelligence Vol. 49, No. 3


Rosenberg Ring


Less than a month
after the army fired
him, Barr began work
Up to this point, Barr had Worried that the FBI might have
provided little information to the on sensitive systems at Rosenberg under surveillance,
KGB. Being fired from the Signal G.E. Soviet intelligence quickly moved
Corps should have been the end to isolate him. It need not have
of Barrs careers in military
electronics and as a Soviet spy.
And it would have been, if the
FBI, army, or military
contractors had implemented

Clues Continually Ignored
worried: Neither the Army nor
the FBI made any effort to track
Rosenbergs activities after he
was fired.

even rudimentary procedures for Barrs past finally caught up with


vetting individuals who had Barr was not the only spy to fall him more than five years after
access to classified information. through the cracks in the FBIs the FBI first identified him as a
pursuit of potential subversives. security risk and three years
Within two weeks of his termina- In March 1944, the FBI obtained after it received definite informa-
tion, Barr applied for work at copies of the New York County tion that he was a communist
Western Electric, one of the Sig- Committee of the CPUSAs mem- party member. In June 1947, a
nal Corps major suppliers. The bership records, probably security official at Sperry Gyro-
company failed to contact the Sig- through an illegal burglary. The scope Company, which hired Barr
nal Corps to confirm Barrs claim records included the names of in October 1946 to work on a
that he had voluntarily quit to Rosenberg, Barr, and Sarant, classified missile defense project,
seek a better position. Less than a along with their addresses and contacted the FBI to ask about a
month after the army fired him, party aliases. Quick action on security clearance for their new
Barr began working at Western this intelligence would have pre- employee. The Bureau quickly
Electric on airborne radar sys- vented the group from making noted that he had been fired from
tems that incorporated some of some of its most important con- the army as a subversive and
the most highly classified sensi- tributions to the USSR, includ- that he was on a list of commu-
tive technologies in the American ing the SCR-584 radar, proximity nist party members. Nonethe-
arsenal. fuse, and P-80 designs, all of less, it spent months collecting
which were passed after March documents from the army, inter-
Although the army had appar- 1944. viewing Barrs neighbors, and
ently forgotten about Barr, paper- peering into his bank accounts.
work on his case drifted through Rosenberg was finally fired in In the first week of October 1947,
the FBI for months. Headquar- February 1945, 11 months after the Bureau sent a summary of its
ters was sufficiently concerned to the FBI received unambiguous investigation to Sperry, which
ask the New York field office to evidence of his communist party fired him a week later.
consider placing him on a list of membership. As with Barr, how-
individuals targeted for custodial ever, termination as a security The FBIs success in finally end-
detention. New York responded to risk did not have a detrimental ing Barrs espionage career was
Washingtons inquiries with a effect on Rosenbergs career. Put- marred by its failure to exploit
flurry of correspondence, but it ting out the word that his dis- the leads generated by his case.
never put a shoe on the ground or missal was motivated by anti- The Bureau treated Barr as a
lifted a telephone receiver to semitism, Rosenberg was almost security risk but did not seri-
investigate Barr. In July 1942, immediately hired by Emerson ously investigate the possibility
when the FBIs New York field Radio and Phonograph Corpora- that he was a Soviet spy. On his
office suspended its investigation tion. Ironically, this was the firm job application, which Sperry had
of Barr, the FBI did not have a from which Rosenberg, working turned over to the FBI, Barr had
clue that he was working at West- as a Signal Corps inspector, had listed three personal references.
ern Electric. stolen the proximity fuse. FBI agents interviewed two of

Studies in Intelligence Vol. 49, No. 3 17


Rosenberg Ring

them, but inexplicably ignored On 17 July 1950, in an effort to


the third: Julius Rosenberg. If substantiate his assertions to the
the agents who reviewed Barrs FBI that Julius Rosenberg was
file had looked, they would have the head of an espionage ring,
seen that the Bureau had an Greenglass recalled a conversa-
extensive file on Rosenberg. tion in which his brother-in-law
urged him to flee with his wife
The FBI turned its attention to and their children to Mexico,
Barr again in the summer of where the Russians would
1948, when it investigated the arrange their safe transport to
possibility that he was the engi- Czechoslovakia. Greenglass said
neer described in Venona that when he expressed incredu-
decrypts as Liberal (the code- lity that anyone under FBI inves-
name was actually assigned to tigation could get out of the
Rosenberg). After learning from United States, Julius replied:
Barrs mother that he was study- Oh, they let other people out
ing electronics in Sweden, the who are more important than you
FBI asked the CIA to locate him arethey let Barr out, Joel Barr,
and monitored the Barr family and he was a member of our espi-
correspondence. Barr wrote a let- onage ring. 10 Greenglasss state-
ter to his mother when he moved ment lit a fire under the FBIs
to Paris to study music, and the dormant investigation of Barr,
FBI obtained his address from Joel Barrs notebook page with prompting it to attempt to deter-
description of the KGBs procedures
the envelope. for arranging covert meetings in Pra-
mine if the US government could
gue. Notes at the bottom refer to his lay its hands on him.
Meanwhile, the Venona decrypts cover story, including reminder to say
he received a Czech visa in Brussels.
sparked investigations that cul- On 25 July, a week after Julius
(From Barrs personal papers, photo-
minated in the arrests in Decem- graphed by the author.) Rosenberg was taken into cus-
ber 1949 and February 1950, tody, the FBI sent an urgent mes-
respectively, of atomic spy Klaus sage to the US legal attach in
Fuchs and his courier, Harry Berg, the son of Jewish immi- Paris requesting that he track
Gold. Gold provided information grants to South Africa. The name down Barr. The attach visited
that led the FBI to David Green- was a KGB joke: Joe Berg from Barrs last known address and
glass, who fingered his brother- Joburg. But Barr took it seri- quickly learned that he was a
in-law, Julius Rosenberg. The spy ously. His wife, whom he met in month too late.
network unraveled. Czechoslovakia, did not learn
that he had been born in Amer- Two weeks after the FBI arrested
ica until 20 years after their mar- Greenglass, army security agency
Evading Capture riage. 9 The Russians continued to cryptanalysts gave their FBI liai-
act as if Barr was in a hostile son a more complete version of a
The day after Greenglasss arrest environment, meeting with him previously decrypted 5 May 1944
was announced in American clandestinely and keeping the KGB cable. The new version
newspapers, the Soviets sent Czech authorities in the dark filled in critical blanks in previ-
Barr from Paris to Prague. On about his real identity. ous iterations, for the first time
his arrival in the Czech capital,
the KGB cloaked Barr in a new
identity. For the next four 9 Authors interview with Barrs ex-wife, Vera 10 David Greenglasss 17 July 1950 statement to

decades he was known as Joseph Bergova, August 2002. the FBI.

18 Studies in Intelligence Vol. 49, No. 3


Rosenberg Ring


Barr and Sarant rode out
the dangerous years of
Stalinist paranoia in the
identifying Sarant in clear text had worked with in the United
as an espionage recruit. relative safety of States, they created an analog
Prompted by the cable, as well as Czechoslovakia. computer that received input
an investigation of Barr that from radar and controlled the
revealed his friendship with
Sarant, two FBI agents knocked
on Sarants door on the after-
noon of 19 July 1950. He agreed
to answer the agents questions

dangerous years of Stalinist
paranoia in the relative safety of
aiming and firing of artillery. The
system, with some minor
improvements, was still defend-
ing Czechoslovakian air space as
late as the 1980s, according to
and allowed them to search his Barr.
Czechoslovakia.
house.
Impressed by their accomplish-
During the intense weeklong Dedicating Their Talents to ments, the head of the Soviet
interrogation that followed, Moscow State Committee on Aviation
Sarant denied that he was a spy. Technology, Pyotr V. Dementyev,
Correctly surmising that the FBI While Barr had recruited Sarant recruited Sarant and Barr to
planned to arrest him, Sarant into espionage and was viewed by apply their talents for the bene-
slipped through its surveillance their American friends as the fit of the USSR. 13 They moved
and crossed the Mexican border dominant figure in the partner- with their families to Leningrad
in the company of his next-door ship, the roles were reversed in January 1956. Sarant and
neighbors wife, Carol Dayton. behind the Iron Curtain. Sarant Barr quickly learned enough
The couple eluded Mexican police became the front man and leader Russian to operate without trans-
and contacted Polish intelligence for the rest of his life. lators. Placed in charge of a
officers in Mexico City. Acting on secret laboratory that was identi-
Soviet orders, the Poles hid Barr had already learned Czech fied on official correspondence by
Sarant and Dayton for six and Sarant picked up the lan- a fictitious mailbox address, they
months before smuggling them guage quickly. They were put in were given a free hand to recruit
across the border to Guatemala, charge of a team of 30 engineers employees. The laboratorys first
where they boarded a cargo ship at a military R&D institute. project was commissioned by
headed to Casablanca. The cou- Overcoming difficult technical Adm. Berg, the man who had
ple took another ship to Spain, obstaclesbasic electronic com- received information that Barr
where they were put on a flight ponents were unavailable, so and Sarant had stolen from West-
to Warsaw. Given the new name they had to make their ownas ern Electric during World War II.
Staros, they were stashed in a well as the distrust of security They designed a critical compo-
luxury apartment in Warsaw for officials who thought they were nent for the radar that tracked
six months, before being reunited foreign spies, Barr and Sarant the first Sputnik and subsequent
with Barr in Moscow. 11 designed and built a prototype of satellites. In February 1958,
a computerized anti-aircraft Sarant and Barr were awarded
weapon. 12 Based on designs they the Order of the Red Banner, one
In a move that undoubtedly
of the Soviet Unions most presti-
saved their lives, after six weeks
gious medals.
in Moscow, Barr, Sarant, and 12 Documents obtained by the author from the
Dayton were sent to Prague. Czech Ministry of Interior archives describe sev-
They rode out some of the most eral investigations of Barr and Sarant that were 13 Henry Eric Firdman, Decision-Making

squelched by the personal intervention of Anto- in the Soviet Microelectronics Industry:


nin Novotny, the First Secretary of the Central The Leningrad Design Bureau, a Case Study
11 Authors interviews with Carol Dayton, April Committee of the Communist Party of Czecho- (Falls Church, VA: Delphic Associates, 1985), 2,
1992, and her daughter, Kristina Staros, October slovakia, suggesting that the KGB worked and interview with Firdman, a former employee
2003. behind the scenes to protect its agents. of Sarant and Barr, April 2003.

Studies in Intelligence Vol. 49, No. 3 19


Rosenberg Ring


They were awarded the
Soviet Order of the
Red Banner.
Microelectronics issues. Support from Ustinov and
his network, combined with
The two men then turned their
attention to designing and build-
ing microelectronic components,
primarily for military applica-
tions. Their work won rave reviews

transistors. The UM-1, intended
as an airborne computer to con-
Sarant and Barrs continuing abil-
ity to deliver impressive techno-
logical accomplishments, fueled a
meteoric ascent through the ranks
of industry that would have been
from Andrei Tupolev, the Soviet trol navigation and weapons sys- extraordinary for Russians and
Unions leading aircraft designer. 14 tems, was small enough to fit on was unprecedented for foreigners.
a kitchen table, was light enough
An evangelist for microelectron- for one person to lift, and The two Americans received the
ics, Sarant lectured at universi- required about the same power ultimate stamp of approval on
ties and made presentations to as a light bulb. Dmitri Ustinov 4 May 1962 when Khrushchev
government and party officials (then chairman of the Military- visited their design bureau.
starting in the late 1950s. He Industrial Commission and later Sarant showed the Soviet leader
predicted the development and defense minister), the head of the how his team assembled tiny
widespread adoption of digital Soviet Air Force, and other top electronic components and dem-
computers and the integration of military officers visited Sarant onstrated a new computer, the
electronic intelligence into every for demonstrations of the UM-1. UM-2. Sarant lectured Khrush-
aspect of modern life. Public dis-
chev on the potential for micro-
cussion of cybernetics had been
Although the UM-1 was never put electronicsa word he had
banned under Stalin, and there
into production, it helped Sarant introduced into the Russian lan-
was still a great deal of skepti-
secure personal backing from guageto transform industry.
cism among Soviet scientists
Ustinov, who for decades was sec- The new science would make it
about the value of computers.
ond only to premiers Nikita possible for networks of military
The Soviet computer establish-
Khrushchev and Leonid Brezh- satellites to spy on the United
ment advocated the construction
nev regarding military industry States, for the USSR to protect
of complex, room-sized behe-
moths, not the small, mass-pro-
duced, easily programmable
machines Sarant envisioned. 15

In July 1959, Sarant and Barr


attracted attention at the high-
est levels of the Soviet military
when they completed a working
prototype of a digital computer
based on off-the-shelf compo-
nents, including germanium

14 L. L. Kerber, Stalin's Aviation Gulag: A

Memoir of Andrei Tupolev and the Purge


Era (Washington, DC: Smithsonian, 1996),
25051, 253.
15 The Soviet campaign against cybernet-

ics is described in Slava Gerovitch, From


Newspeak To Cyberspeak: A History of Khrushchevs May 1962 visit to Design Bureau Number 2. Joseph Berg is stand-
Soviet Cybernetics (Cambridge, MA: MIT ing to the Soviet leaders left, wearing glasses. (From Barrs personal papers,
Press, 2002). photographer unknown.)

20 Studies in Intelligence Vol. 49, No. 3


Rosenberg Ring


Khrushchev agreed
on the spot. A new
research city
itself with anti-missile defenses, Khrushchev agreed on the spot. A new
and for Moscow to attack its ene- was turned over city that was already under construc-
mies with high-precision bomb- to Sarant. tion on the outskirts of Moscow was
ing, Sarant promised. His words turned over to Sarant. He was made a
were carefully calibrated to rein-
force Khrushchevs belief that
technological advances, such as
missiles, would make it possible
to sharply reduce the size and

institutes and factories
throughout the Soviet Union.
Soviet citizen and Khrushchev person-
ally signed papers inducting him into
the communist party.

Sarant drove the first symbolic


cost of the USSRs standing army. Modeled on Bell Laboratories, stake into the ground at an
but hundreds of times larger, August 1962 ceremony marking
At the end of Khrushchevs the center would embody all of the start of construction work on
visit, Sarant pitched an idea the virtues that Sarant and the scientific center, the heart of
that he, Barr, and some of their Barr imagined set the commu- the new city of Zelenograd
sponsors had been dreaming nist system apart from capital- (Greentown). From the begin-
and scheming over for months. ism: Through central planning ning, the project did not work out
The USSR could leap ahead of and the concentration of as Sarant and Barr had hoped.
the West by creating a massive resources for the pursuit of The idea of putting foreigners in
Center for Microelectronics, national priorities, not profits, charge of a massive, high-profile
Sarant said. It would be located the USSR would create technol- project was unacceptable to pow-
in a city dedicated to the new ogies that its capitalist rivals erful party bosses; Sarant reluc-
technology and have links to could only dream of. 16 tantly had to accept a position as
second in command. Although he
was bitterly disappointed, the
position put him in charge of
institutes at Zelenograd employ-
ing over 20,000 researchers with
advanced degrees. Even if
progress was not as rapid or dra-
matic as the Americans had
hoped, the enterprises at Zeleno-
grad quickly made significant
advances in Soviet technology,
especially in the design and man-
ufacturing of semiconductors, pri-
marily for military applications.

In addition to their roles at Zele-


nograd, Sarant and Barr retained
control over a design bureau in
Leningrad. Their team created a
computer, the UM-1NKh, which
became a mainstay of civilian
industry. The UM-1NKh was pro-
Joseph Bergs Communist Party booklet, noting his birth in 1917, acceptance into
the party in 1966, monthly salary, and payment of party dues. His base salary in moted as a major advance in the
1974 was 650 rubles, more than a deputy ministers, while bonuses boosted it to an
average of 837 rubles, an enormous sum when many engineers were paid less than
200 rubles. (Photo by Anton Berg, with permission.) 16 Authors interview with Joel Barr, April 1992.

Studies in Intelligence Vol. 49, No. 3 21


Rosenberg Ring


Barr and Sarants fall
from grace . . . was even
more spectacular than
glossy propaganda magazine Sea of the navys newest, most
Soviet Union, although the iden- their ascent. advanced submarine design. The
tities of its designers were care- first digital computer installed
fully hidden. The computer also
received favorable reviews in an
American technical journal and
in a classified CIA report that
ranked it among the most

Tainted by association with the
disgraced Soviet leader, the two
onboard a Soviet submarine, the
Uzel correlated information from
sonar, engines, and sensors to plot
the crafts location, as well as the
locations of a half dozen potential
important special purpose com- men battled with the Leningrad targets, on a green display. Like
puters disclosed in Soviet open communist party bureaucracy to the analog computer that Sarant
publications. 17 It earned Staros maintain their autonomy and and Barr had developed for the
and Berg the State Prize, for- access to resources. They hung Czech Army, the Uzel aimed tor-
merly called the Stalin Prize, the onto their positions by producing pedoes based on the predicted
second-highest award in the a stream of valuable technical path of targets. 19
Soviet Union. achievements, ranging from an
innovative memory technology to Project 641B, or Tango class, sub-
new computer designs, including marines were the largest diesel-
Sudden Eclipse some that were recognized on electric submarines ever built.
both sides of the Iron Curtain. Coated with sonar-absorbing
Soviet Cybernetics Review, a Rand tiles, the 60-man craft were
Technical success did not shield Corporation journal, described
the ambitious foreigners from the designed to hunt NATO subma-
one of their computers as the rines, particularly to defend the
harsh realities of Soviet politics. first Soviet production computer
Sarant and Barrs fall from grace, USSRs home waters, or bas-
that can be fairly characterized as tions, areas in the Barents and
precipitated by the ouster of their well engineered. It may not be up Okhotsk seas where the Soviet
champion, Nikita Khrushchev, to Western standards, but it eas- Navy stationed nuclear-missile-
was even quicker and more spec- ily surpasses anything else known equipped submarines.
tacular than their ascent. Within to be currently available in the
months of Khrushchevs forced Soviet Union for process control
retirement, powerful men whom automation. 18 Although the Project 641Bs have
Sarant and Barr had antago- all been retired, the Uzel lives on
nized struck back. Accused of inside a newer generation of
everything from wasting scarce Turning to the Navy submarines dubbed Kilo class by
resources to participating in a NATO. Like the 1970s-era com-
Zionist anti-Soviet conspiracy, Sarant and Barrs team modified puters on NASAs space shuttles,
the American engineers feared their UM-2 computer, which was Russia has maintained the Uzel
that they might end their days in originally designed for use on mil- into the 21st century, upgrading
prison. Instead, Sarant was fired itary airplanes and in spacecraft, the software while retaining the
as scientific director of the Cen- for the unique needs of the Soviet original hardware design.
ter for Microelectronics, but he Navy, creating the Uzel (Knot)
and Barr were permitted to fire-control computer system.
19 Authors interview with Joel Barr, April 1992;
return to their design bureau in Sarant demonstrated the Uzel in
Russian Command and Weapon Control Sys-
Leningrad. early 1973 to a group of admirals tems, Janes Naval Weapon Systems, 16
during a trial run in the Baltic December 2003; and Adm. Yu. V. Alekseev and
Yu. P. Blinov, Dr Sc (techn.), Korabelnye Avtom-
17 Computers In Communist Countries: atiziovannye Sistemy Upravleniya (Ship Auto-
Production, Requirements and Technol- 18 Wade Holland and Willis Ware, K-200: mated Control Systems), (publication of the
ogy, CIA, CSI-2001-00001, 14 February 1966 Space Computer or Engineering Oddity? Soviet Russian Navy, undated), accessed at:
(declassified 24 January 2001). Cybernetics Review 2, no. 3 (May 1972): 1318. http://www.navy.ru/science/rv7.htm.

22 Studies in Intelligence Vol. 49, No. 3


Rosenberg Ring


The Izvestia obituary
lauded him . . . but did
not, of course, mention
Uzels can be found today lurking Funding for the project dried up
under the Indian Ocean, the that he was an as the Soviet Union fell apart,
Mediterranean and Black Seas, American. however, and Barr decided to
and the Pacific and Atlantic look in an unlikely place for
Oceans in the fleets of a half-
dozen navies, including those of
several potential adversaries of
the United States. If Iran decides
to send oil tankers to the bottom

artificial intelligence institute
that was part of the Soviet Acad-
investors: the United States.

Barr returned to the United


States in October 1990, traveling
of the Persian Gulf, if Chinese emy of Sciences. Barr remained as Joseph Berg on a Soviet pass-
submarines attack Taiwanese in Leningrad, where he contin- port. To his astonishment, nei-
destroyers, or if India opts to ued to receive a salary on par ther the FBI nor any other
scuttle Pakistani cargo ships, the with a deputy minister but he government agency approached
torpedoes will probably be aimed had few official duties. him or took any apparent inter-
by Uzels. Each of these nations, est. Barr was even more sur-
along with Poland, Algeria, and When Sarant died in March 1979 prised when he returned a year
Romania, has purchased Kilo- from a massive heart attack, later to receive a new US pass-
class submarines equipped with Izvestia lauded him as a tireless port and Social Security Admin-
Uzel fire-control systems from scientist, a talented organizer istration benefits. He divided the
the Soviet Union or Russia. who for many years gave all his remaining years of his life
strength and bright talent to the between Russia and the United
development of Soviet science States.
Final Years and technology. The obituary
noted that he made a large con- In April 1992, Barr voted in the
The Uzel was Sarant and Barrs tribution to the establishment New York primary election for
last major success, and, along and the development of domestic Jerry Brown. Four years later,
with Zelenograd, is the longest- microelectronics. It did not, of
using his Soviet name, he cast a
lasting legacy of their careers in course, mention that he was an
ballot in Leningrad for Gennadii
Soviet industry. In 1972, a few American.
Zhuganov, the communist party
months before the Uzel passed
presidential candidate.
the Red Navys final tests and Barr rose to prominence in the
was accepted for use, their opera- Soviet electronics industry again
tion was merged into a huge con- in the 1980s when officials at Joel Barr remained an ardent
glomerate. Unable to tolerate his Zelenograd agreed to support communist. He died in a
reduced stature, Sarant quit in development of his proposed Moscow hospital of complica-
May 1973. He moved to Vladivos- innovative integrated circuit tions from a throat infection on
tok to serve as the head a new manufacturing technology. 1 August 1998.

Studies in Intelligence Vol. 49, No. 3 23


Effective Interagency Collaboration

Intelligence Liaison between the FBI and


State, 194044
G. Gregg Webb
The post-9/11 debate over intelli- eral Bureau of Investigation in
gence reform has been framed as Latin America during World War
a response to the intelligence II is both unique and instructive.
failures that led to that infa-
mous day. Many commentators What limited scholarly attention
and policymakers have com- the FBIs Special Intelligence Ser-
pared Americas current intelli- vice (SIS) has received over the


gence shortcomings to past past 60 years has, quite deserv-
disasters, such as Pearl Harbor edly, been focused on the agencys
in 1941 or the Bay of Pigs in successes in the field. These
Berle and Hoovers 1961. The impulse to identify ranged from high-level penetra-
collaboration reversed common errors in individual tions of foreign governments to
years of dysfunction judgment and interagency action dogged hunts for smugglers and
between the FBI and State between the terrorist attacks in spies throughout the Western
over intelligence. New York and Washington in Hemisphere. SIS agents, in con-
September 2001 and previous cert with State Department and


tragedies cannot be ignored. Yet, armed services personnel,
dissecting mistakes should be quashed virtually all Axis intelli-
only part of this nations strat- gence operations in Central and
egy to retool its Intelligence Com- South America during World War
munity for the fight against II. The numbers are impressive.
international terrorism. Between 1 July 1940 and 31
December 1945, the SIS identi-
Another important perspective fied 832 Axis espionage agents,
for planning intelligence reforms apprehended 336 of these, and
comes from past instances of ultimately gained convictions
effective cooperation among against 105 individuals for a total
agencies. Just as America stands of more than 1,340 years in
to benefit from coolly analyzing prison. The SIS further identified
intelligence missteps, careful con- 222 smugglers of strategic mate-
sideration of intelligence suc- rials in the Western Hemisphere
cesses also can be constructive. and captured 75 of them. SIS
This article surveys one of the employees conducted 641 sepa-
earliest, most extensive, and rate investigations at the request
most successful examples of of other US government agencies
interdepartmental intelligence and shut down 24 clandestine
collaboration in American his- radio stations used by Axis agents
tory. In a community famous for to communicate with their han-
its deep fissures and debilitating dlers and each other. 1
rivalries, the working relation-
G. Gregg Webb is currently ship forged between the Depart- This work explores the largely
pursuing a law degree at Stanford ment of State and the Special unexamined bond between poli-
University. Intelligence Service of the Fed- cymakers at the FBI and the

Studies in Intelligence Vol. 49, No. 3 25


Interagency Collaboration


The rivalry flowed from
stark policy differences
and blurred lines of
Department of State that acted nal inquiriessuch as those
as the foundation for the SISs authority. involving suspected intelligence
impressive accomplishments. breacheswith the catch being
Central to this spirit of interde-
partmental cooperation was the
cordial relationship between FBI
Director J. Edgar Hoover and
Assistant Secretary of State

The FBIs original authority ema-
nated from an 1871 appropria-
the addition of the Secretary of
States permission. 4

This potentially awkward


arrangement remained benign
Adolf A. Berle, the wartime intel- tions statute that limited through the gauntlets of World
ligence liaison at the Depart- Department of Justice investiga- War I and the subsequent Red
ment of State. Through patience tions to the detection and prose- Scare. By the mid-1930s, federal
and mutual conciliation, these cution of crimes against the counterintelligence activity had
two bureaucratic heavyweights United States. 2 In 1916, Ger- been temporarily stopped due to
ensured the effectiveness of US man espionage agents and sabo- the embarrassing excesses of the
intelligence and counterintelli- teurs threatened both Americas Palmer Raids, which had fea-
gence efforts in Latin America. national security and her highly tured unlawful detentions of indi-
valued neutrality in World War I. viduals based on their nationality
and political affiliation and
To counter this threat, Attorney
Interagency Rivalry instilled fear and skepticism of
General Thomas Gregory
federal law enforcement agen-
obtained an obscure amendment
That members of the FBI and cies among large portions of
to the Department of Justice
Department of State were capa- Americas immigrant commu-
appropriations statute authoriz-
ble of forming a successful for- nity. The FBI, in particular, was
ing the Bureau to pursue such
eign-intelligence union during under strict orders to observe its
World War II is remarkable given other investigations regarding original, narrow mandate and
the competition and ill will that official matters under the control avoid investigations of subver-
plagued their pre-war interac- of the Department of Justice or sive organizations inasmuch as
tions over domestic counterintel- the Department of State as may it does not appear that there is
ligence work. During the late be directed by the Attorney Gen- any violation of a Federal Penal
1930s, the FBI and State were eral. 3 Thus, without public fan- Statute involved. 5
important players in the US gov- fare or debate, the Bureau of
ernments counterintelligence Investigation gained legal In August 1936, President
program, competing with each authority to conduct non-crimi- Franklin Roosevelt ended this
other for presidential favor and counterintelligence calm by
scarce funding. This odd bureau- 2 US Statutes at Large, 65th Cong., April
requesting that FBI Director J.
cratic division, in which the de 1917March 1919, vol. XL, 155. This sen-
Edgar Hoover provide him with
facto national police force had to tence extends from one in US Senate, a broad picture of the effects of
battle the governments foreign- Select Committee to Study Governmental Communism and Fascism on the
policy arm for control over Operations with Respect to Intelligence economic and political life of the
domestic counterintelligence Activities, Final Report, Supplementary country as a whole . 6 Given
Detailed Staff Reports on Intelligence
operations, originated in a legis- Activities and the Rights of Americans,
this clear order for an intelligence
lative quirk. Book III, 94th Cong., 2nd sess. (23 April report and his fear of further civil
1976), Report No. 94-755, Serial 13133-5,
379 [hereinafter: Church Committee
1 Statistics from Tables 1 & 2, SIS Statis- Report, Book III]. 4 Ibid., 379.
tics; Section 10, File 64-4104, Administra- 3 Ibid. Emphasis added. This sentence and 5 Memorandum from Hoover to Ridgeley,
tive Records of the SIS, Record Group 65 the next draw from related passages in 14 May 1925, as cited in the Church Com-
(RG 65), National Archives at College the Church Committee Report, Book III, mittee Report, Book III, 390.
Park, MD (NACP). 37879. 6 Church Committee Report, Book III, 395.

26 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration


President Roosevelt
finally settled the pre-war
power struggle.
liberties complications, Hoover reforms and funding require-
informed Roosevelt that, pursuant ments. Roosevelt named Hoovers
to the appropriations statute, he
would need the Secretary of
States authorization to proceed. 7
Secretary of State Cordell Hull
gave his blessing on 1 September

(ONI)to conduct independent
investigations where their
immediate superior, Attorney
General Homer Cummings,
chairman of this new committee,
but limited its participants to a
fraction of the agencies then con-
1936; thereafter, State-FBI respective personnel and instal-
ducting counterintelligence
relations deteriorated rapidly. 8 lations were concerned. In
investigations. 12 Both the Depart-
return, he received steady sup-
port from both MID and ONI in ment of State and the Treasury
The rivalry between the Bureau Departments Secret Service were
his fight against Messersmith. 10
and the Department of State over left off the Cummings Commit-
domestic security work between tee. Not surprisingly, the Com-
1936 and 1939 flowed from two On the other side, Messersmith
mittee found that its restricted
sources: stark policy differences and State were bent on preserv-
ing the more decentralized sta- membership could manage the
and hopelessly blurred lines of
tus quo, in which responsibility security burden of the US gov-
authority. On the policy front,
for counterintelligence investiga- ernment without outside help.
neither J. Edgar Hoover nor his
chief adversary at State, Assis- tions was divided among several
tant Secretary George S. Messer- agencies and the Department of The President soon added more
smith, could agree on how the State served as the chief facilita- confusion to the jurisdictional
United States should organize its tor for interdepartmental activ- melee. In the spring of 1939, he
response to German, Russian, ity. 11 Additionally, the 1916 directed Assistant Secretary
and other foreign infiltrations. amendment to the Justice appro-
Messersmith to lead a second
For Hoover, the answer lay in priations statute had given State
counterintelligence panel made
consolidation of all civilian coun- a virtual veto over FBI counterin-
up of representatives from the
terintelligence responsibility, telligence activities.
War, Navy, Treasury, Post Office
investigations, and funding in his
and Justice Departments. Mess-
FBI. 9 Hoover recognized the Not only did the FBI and State
ersmiths job was to coordinate
rights of the two service intelli- deadlock on policy grounds, but
the individual and joint efforts of
gence agenciesthe Military also their relationship, as delin-
Intelligence Division (MID) and eated by the 1916 amendment, these agencies against foreign
the Office of Naval Intelligence was violated repeatedly by the forces inside the United States. 13
president and other high offi- According to one account, no FBI
cials. For example, in October representative was included in
7 Ibid. 1938, President Roosevelt had this group, although a member-
8 Memorandum from Hoover to Edward
become so alarmed by the threat from the FBIs parent Depart-
Tamm, 10 September 1936, as cited in the
Church Committee Report, Book III, 396. from Axis agents and the dys- ment of Justice was. 14
9 Raymond J. Batvinis, In the Beginning: function in Americas counterin-
An Examination of the Development of telligence community that he
the Federal Bureau of Investigations created a Committee to inquire
12 The Cummings Committee was limited

Counterintelligence Program, 1936 to representatives from the FBI, MID, and


1941, (Ph.D. dissertation, Catholic Uni-
into the so-called espionage situ- ONI. This and the previous sentence
versity, 2001), 3740, and Thomas F. Troy, ation and to identify needed extend from Batvinis, 37, and the Church
Donovan and the CIA: A History of the Committee Report, Book III, 39798.
Establishment of the Central Intelligence 13 This sentence draws from similar state-

Agency (Washington, DC: Center for the 10 Batvinis, 3738, and Church Committee ments in Don Whitehead, The FBI Story,
Study of Intelligence, Central Intelligence Report, Book III, 39798. 165, as cited in Troy, 12, and the Church
Agency, 1981), 12. 11 Batvinis, 45, and Troy, 12. Committee Report, Book III, 402.

Studies in Intelligence Vol. 49, No. 3 27


Interagency Collaboration

Convoluted and conflicting divi- term, but the long-term impact of addition to moralistic arguments
sions of authority were a hall- this move far outweighed any against secret intelligence work,
mark of Roosevelts executive immediate loss of face for the the high cost in money and man-
leadership style. 15 Yet, on 26 Department. The presidents power required to obtain such
June 1939, the president finally June 1939 Directive freed State information, as well as the poten-
settled the pre-war power strug- from its nominal leadership role tial for geopolitical embarrass-
gle between the FBI and Depart- in domestic counterintelligence ment should such activity be
ment of State. In a secret and helped clarify the overall discovered, added to the general
directive, he expressed his intelligence relationship between distaste for espionage in the pre-
desire that the investigation of the FBI and State. Thus, when war Department of State. Conse-
all espionage, counter-espionage, war broke out in earnest the next quently, though State acted as the
and sabotage matters be cen- year, the Department of State official eyes, ears, and voice of the
tered in the FBI, MID, and ONI was able to focus on building a US government around the world,
alone. 16 foreign-intelligence alliance with the Department did not possess
the FBIs Special Intelligence any covert intelligence organiza-
Service. tions or responsibilities during the
Roosevelts decision was a clear late 1930s. 18
bureaucratic defeat for the
Department of State in the short- From Improvisation to
As the Department of State was
Organization
taking a back seat to the FBI and
14 Don Whitehead, The FBI Story, 165, as
Messersmiths extended competi- others on the domestic counterin-
cited in Troy, 12. The circumstances of
tion with Hoover for control over telligence front in the fall of 1939,
Messersmiths intervention remain a few US diplomats and service
unclear. After World War II, Messersmith Americas internal security pro-
maintained that President Roosevelt had vided clear proof that the Depart- attachs around Latin America
compelled him to undertake coordination ment of State had no qualms attempted to organize clandes-
of the counterintelligence field. However, about conducting domestic coun- tine collection of intelligence in
some historical accounts have portrayed
terintelligence work. During the their host countries. The reports
Messersmith as assuming this role for these pioneers sent back to their
himself. Likewise, Messersmith argued inter-war years, the Depart-
that Hoover refused to participate in his ments attitude towards clandes- superiors in Washington played a
initiative until forced by the president; tine foreign-intelligence collection, vital role in alerting policymak-
whereas, Whiteheads Hoover-sanctioned or espionage, was very different.
account asserts that Messersmith shut
the FBI out. What is clear is that Messer-
Many American diplomats did not 17 This account relies on a description of a

smith, likely with Roosevelts knowledge, regard espionage work as an letter from Messersmith to Geist dated 19
sought to coordinate the counterintelli- appropriate method for fulfilling May 1938 as cited in Batvinis, 32. Though
gence field soon after the Cummings Com- their duty to keep the American Messersmith may have considered espio-
mittee had set out on the same mission. government informed about nage work unsavory, he was not as reluc-
Neither effort succeeded, and both height- tant to use aggressive foreign intelligence
ened the general confusion and interde-
regimes and developments means as other diplomats at State. Before
partmental rancor. abroad. Even States intelligence World War II, he sought to limit the use of
15 Mediating rivalries was one mechanism czar, Messersmith, called the espi- local informants by members of the US
Roosevelt used to control subordinates, onage work of German agents legation in Mexico, but as wartime
hence the presidents apparent duplicity un-American in a 1938 letter to Ambassador to Mexico, he presided over
in assigning both Justice and State coordi- an active and successful State-SIS intelli-
nating roles in the counterintelligence
a friend about Americas tenuous gence collaboration that maintained
field. These statements are based on the domestic security situation. 17 In extensive secret contacts throughout Mex-
authors unpublished senior thesis at ico.
Princeton University entitled Conflict 18 This statement is based on the authors

and Creation: A Comparative Study of the 16 Presidential Directive, 26 June 1939, research and writing for an unpublished
US and British Joint Intelligence Com- Section 2, File 64-4104, Administrative senior thesis at Princeton University
mittees in the Second World War (2003). Records of the SIS, RG 65, NACP. (supra note 15).

28 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration


Berle quickly
recognized the
burgeoning threat
ers at State to the need for a for- In the six months after Messer-
eign-intelligence capability in from Axis intrigue in smiths reining in of Boal and
Latin America and the inade- Latin America Dillon, both world affairs and the
quacy of existing personnel and Department of States foreign-
resources for undertaking such a
task. Awareness of both these
issues was central to the Depart-
ment of States acquiescence in a
wartime relationship with the

In December 1939, Boal wrote to
Messersmith in Washington sum-
intelligence landscape changed
dramatically. On the interna-
tional stage, Germanys inva-
sions of Denmark, Norway,
Belgium, the Netherlands, and
FBIs Special Intelligence Service. marizing the lessons he was France during the first half of
learning about interdepartmen- 1940 bolstered the threat from an
By far, the most sophisticated of tal intelligence cooperation and increasing number of Axis agents
these improvised intelligence asking for money and personnel in Central and South America. 25
shops operated in Mexico under to enlarge his and Dillons activi- At the Department of State,
the guidance of Pierre de Lagarde ties. Messersmith refused Boals Messersmith was dispatched to
Boal, counselor of the US embassy request. In an internal memoran- Cuba as US ambassador in Feb-
in Mexico City.19 In late 1939, dum to other Department man- ruary 1940. His replacement as
working closely with the naval agers, Messersmith laid out his the assistant secretary of state
attach for Mexico, Lt. Cdr. Will- opposition, citing diplomacy (we responsible for intelligence
iam Dillon, Boal established a should not in any case engage in affairs was Columbia Law School
three-man intelligence coordinat- such work on such a scale with- professor and Roosevelt brain-
ing committee composed of repre- out the knowledge and consent of truster Adolf A. Berle. Berle
sentatives from the embassy, the the government concerned) and quickly recognized the burgeon-
military attachs office, and the finances ([e]ven if it were desir- ing threat to American political
naval attachs office.20 This com- able to go ahead we do not and financial interests from Axis
mittee met for one hour each day have the money and could not do intrigue in Latin America and,
and maintained index-card files on it) as reasons not to devote more during the spring of 1940, began
a range of topics, including anti- resources to foreign-intelligence to press for a comprehensive
US foreign nationals in Mexico, work in Americas next door interdepartmental response. 26
local confidential informants used neighbor. 22 The official reply
by the embassy, and reliable Messersmith sent Boal explicitly
Americans who could provide use- stated that leaders at State did The Berle-Hoover Connection
ful information to the legation.21 not then believe the ends of
Most of the information processed investigating German and other On 24 June 1940, President
by this committee arrived through anti-American activities in Mex- Roosevelt issued a directive by
the operational exertions of Naval ico justified the clandestine col- telephone making the Federal
Attach Dillon. lection means that Boal sought to Bureau of Investigation
expand. 23 However, Messersmith
19 Other ad hoc intelligence arrangements
did authorize Boal to continue 24 Ibid.
were operated, or at least proposed, before
the activities of his intelligence 25 Leslie B. Rout, Jr., and John F. Bratzel,
World War II by Ambassadors Jefferson coordinating committee. 24 Origins: US Intelligence in Latin Amer-
Caffery in Brazil, E. C. Wilson in Uru- ica, Studies in Intelligence (Winter 1985):
guay, and Spruille Braden in Colombia. 50, in Folder 108, Box 9, Studies in Intelli-
20 Letter from Boal to Messersmith, 22 22 Memorandum from Messersmith to gence, Center for the Study of Intelligence,
December 1939, 5, and attached Memoran- Warren, Duggan, and Chapin, 28 Decem- RG 263, NACP.
dum, as reprinted in John Mendelsohn, ed., ber 1939, as reprinted in Mendelsohn. 26 Memorandum for the Files from W. M.

Covert Warfare: Covert Warfare in Latin 23 Letter from Messersmith to Boal, 24 Crane, 3 June 1940, 810.20 Defense/20,
America (New York: Garland, 1989), vol. 10. January 1940, as reprinted in Mendel- Box 3375, State Department General Dec-
21 Ibid. sohn. imal File, 19401944, RG 59, NACP.

Studies in Intelligence Vol. 49, No. 3 29


Interagency Collaboration


A key collaborative
success was securing the
assignment of legal
responsible for foreign intelli- collecting information and inves-
gence work in the Western attachs in US missions. tigative leads from indigenous
Hemisphere, on the request of contacts and undercover SIS
the State Department. By 1
July 1940, FBI Director J.
Edgar Hoover had established a
Special Intelligence Service
within his Bureau and had

measures on which the SISs
indispensable intelligence net-
agents. 31 The legal attachs
passed these data on to FBI
headquarters in Washington and
sometimes used them to formu-
late local actions with embassy
embarked on the colossal task work in Latin America rested. diplomats and armed services
of creating from scratch a for- attachs. To implement this cen-
eign-intelligence capability in Among their most important col- terpiece of SIS organization,
the FBI. 27 The presidents stipu- laborative successes was secur- Berle played the role of interme-
lation that this new agency ing the assignment of SIS agents diary between the FBI Director
the first foreign-intelligence as legal attachs in US mis- and skeptical ambassadors and
bureaucracy in US history sions throughout Central and bureaucrats at State. The pair
should conduct its activities in South America. 29 By October also teamed up against opposi-
Latin America at the behest of 1942, 77 FBI legal attachs, with tion to a FBI-proposed courier
the Department of State forced diplomatic status, worked out of system for SIS communica-
two longtime adversaries into US embassies in 18 nations in tions. 32 Such a system never
common cause. the region. 30 These officers coor- developed, but SIS personnel did
dinated secret intelligence opera- gain the ability to send corre-
Fortunately, the two men tasked tions in their assigned countries, spondence back to Bureau head-
to direct this State-FBI intelli- quarters through the
gence union proved anything but Department of States official dip-
28 The IIC was the first interdepartmental
adversarial towards one another. lomatic pouches. 33
body in the United States for sustained
Adolf Berle, as the assistant sec- intelligence-policy coordination. In May
retary of state with intelligence and June 1940, the IIC served as incuba-
liaison duties, and J. Edgar tor for the idea that America needed a dis- Diverse Backgrounds
Hoover, as FBI director, were tinct foreign-intelligence organization.
President Roosevelts 24 June 1940 direc- Little in the backgrounds of Berle
involved in every phase of the tive was in response to the IICs proposal
SIS project, from cultivating its of such an agency.
or Hoover suggested that they
roots in the pre-war Interdepart- 29 Draft Letter from Berle to Fletcher War- would become such close partners
mental Intelligence Committee ren, 19 May 1941, Folder 1, File 64-4104,
established as a result of Presi- Administrative Records of the SIS, General
Records of the FBI, RG 65, NACP; and 31 This description of legal attach respon-
dent Roosevelts 1939 counterin- Memorandum for the Director from Tamm, sibilities extends from a similar discus-
telligence delimitation 20 May 1941, Folder 1, File 64-4104, sion in a FBI memorandum on the SIS, 12
directiveto resolving delicate Administrative Records of the SIS, General February 1946, Folder 11, File 64-4104,
administrative challenges in the Records of the FBI, RG 65, NACP (Berles Administrative Records of the SIS, Gen-
Services wartime work. 28 Operat- advocacy within State of legal attach con- eral Records of the FBI, RG 65, NACP, 2.
cept). See also Memorandum for the Direc- 32 Memorandum for the Director from
ing in tandem, the two men insti- tor from Ladd, 23 April 1942, Folder 4, File Tamm, 13 May 1941, Folder 1, File 64-
tuted several of the bedrock 64-4104, Administrative Records of the 4104, Administrative Records of the SIS,
SIS, General Records of the FBI, RG 65, General Records of the FBI, RG 65, NACP.
NACP (Berles pride on this point, update 33 Ambassadors and other high embassy

27 For details on the creation of the FBIs on legal attach coverage, and FBI pres- officials retained the right to read SIS cor-
Special Intelligence Service, see Troy, sure for more legal attachs), 4. respondence sent via this method. Memo-
1617, and G. Gregg Webb, The FBI and 30 Memorandum for the Director from Ladd, randum for the Director from Ladd, 23
Foreign Intelligence: New Insights into 26 October 1942, Folder 6, File 64-4104, April 1942, Folder 4, File 64-4104, Admin-
J. Edgar Hoovers Role, Studies in Intelli- Administrative Records of the SIS, General istrative Records of the SIS, General
gence 48, no. 1 (2004): 4649. Records of the FBI, RG 65, NACP, 2. Records of the FBI, RG 65, NACP, 46.

30 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration


Notwithstanding their
differences, the
cooperation of Hoover
on the SIS. Though the two were particularly on social matters.
born less than a month apart in and Berle on the SIS Berle was a passionate interna-
January 1895, their professional proved exceptionally tionalist; Hoover was wary of all
lives followed very different paths functional. things foreign. In personality,
until their intersection on intelli- Berle was an intellectual,
gence in early 1940. Raised in
Boston, Berle was the youngest
graduate in Harvard Law School
history when he received his J.D.
in 1916 at the age of 21. 34 After a

Justice and rose rapidly, becom-
ing the acting director of the
though not unskilled in policy
administration; Hoover, as a
master bureaucrat, was deeply
practical, though highly intelli-
gent. Notwithstanding these dif-
stint in the Armys Military Intel- Departments Bureau of Investi- ferences, their cooperation on
ligence Division during World War gation (later renamed FBI) in the SIS proved exceptionally
I, he became a professor at the 1924 and director soon thereaf- functional.
Harvard Business School in 1924 ter. 39 Hoovers early career was
and then at Columbia Law School dominated by his work in the
in 1927. 35 He penned ground- various counterintelligence divi- Personal Dynamics
breaking work in the fields of cor- sions of the Bureau during World
porate law and economics during War I and the subsequent Red Several personal and institu-
the 1930s. A member of Scare. His ascension was a prod- tional circumstances contributed
Roosevelts brain trust, he also uct of his reputation in the to the general harmony between
worked on New York City affairs Department of Justice as an Adolf Berle and J. Edgar Hoover.
with Mayor Fiorello La Guardia. 36 honest and efficient administra- On a personal level, Berle did not
Appointed assistant secretary of tor and occurred despite his try to battle the director for
state in 1938, Berle was assigned close association with the Depart- administrative control over the
a wide-ranging portfolio, includ- ments contemporary civil liber- Special Intelligence Service.
ing Latin America policy. In Feb- ties abuses. 40 By 1940, Hoover Instead, he willingly left day-to-
ruary 1940, he gained was firmly entrenched in his day management to Hoover and
intelligence-liaison duties. 37 directorship of the FBI and confi- his subordinates, only interven-
dent in the organization that he ing at the request of the Bureau
Hoover was born and raised in had constructed over the previ- or when FBI personnel and
Washington, DC. He worked his ous 16 years. actions aroused the Department
way through George Washington of States ire. Concerning the big
University Law School, earning a Although both Berle and Hoover picture policies of US intelli-
LL.B. in 1916 and a LL.M. in had spent considerable time in gence in Latin America, Berle
1917. 38 During the summer of public service, they were oppo- consistently sought, and for the
1917, he started in an entry-level sites in many ways. Berle was a most part obtained, frank com-
position at the Department of leading liberal in the Roosevelt munication with J. Edgar Hoover.
administration, whereas, the
outwardly apolitical Hoover held Berles approach contrasted
34 Jordan A. Schwarz, Liberal: Adolf A.
Berle and the Vision of an American Era strong conservative convictions, sharply with that of his
(New York: Free Press, 1987), 16. predecessor, George
35 Batvinis, 63, and Beatrice B. Berle and Messersmith. Hoover and
Travis B. Jacobs, eds., Navigating the Rap- 38 Richard Gid Powers, Secrecy and Power:
Messersmiths acrimonious
ids, 19181971: From the Papers of Adolf The Life of J. Edgar Hoover (New York: relationship during the late
Berle (New York: Harcourt, 1973), xviii. Macmillan, 1987), 40.
36 Berle and Jacobs, xxxxi, and Schwarz, 39 Church Committee Report, Book III, 388.
1930s distracted both the FBI
75, 91. 40 This sentence draws from a similar and the Department of State
37 Berle and Jacobs, xxi, xxiv, and statement in the Church Committee from their shared responsibility
Schwarz, 11819, 16970. Report, Book III, 388. to track down German and

Studies in Intelligence Vol. 49, No. 3 31


Interagency Collaboration


Not a career diplomat,
Berle did not feel obliged
to obstruct Hoover out of
communist spies and potential The best evidence that Berles
saboteurs. Indeed, according to interdepartmental laissez faire handling of Hoover
one account, Messersmiths chief jealousy or spite. facilitated constructive coopera-
complaints about Hoover tion between State and the SIS
included the fact that he was
difficult to work with except on
his own terms. 41

Berle could afford to be concilia-



tion to managing the relatively
comes from Hoover himself.
The famously sensitive FBI
Director was prone to curtail-
ing communication with any
government agency or individ-
small FC staff, by 1944 Berle ual that he considered a threat
tory with Hoover for two rea-
was directing States Passport to his own or his Bureaus
sons. First, Berle, unlike
authority. Yet, Hoover conscien-
Messersmith, was not a career Division, Visa Division, and
tiously kept Berle updated on
diplomat. He did not feel obliged Special War Problems Division
SIS activities throughout his
to obstruct Hoover out of inter- (which dealt with American pris- tenure as States intelligence
departmental jealousy or spite. 42 oners-of-war), plus States Office liaison from 1940 to 1944. Dur-
In fact, Berle repeatedly of Transportation and Communi- ing this period, Hoover sent
defended the SIS and Hoover Berle reams of documents con-
cation, which included Divisions
from the machinations of oth- cerning the SIS, ranging from
ers, including MID, OSS, and for Aviation, Shipping, and
elaborate color maps with the
several factions within State Telecommunications. 44 Berle
disposition of secret, Bureau-
itself. Second, Berle had far too also frequently drafted speeches
run radio stations in Latin
many other duties within the for Secretary of State Cordell America to requests to send FBI
Department of State to micro- Hull and played a key role in the agents on special assignments
manage SIS affairs. He effected Departments Latin America abroad. 46 Most of the informa-
his liaison with Hoover through policymaking. 45 tion provided to Berle and his
States Division of Foreign Activ- FC staff by Hoover were reports
ity Correlation (FC). 43 In addi- on intelligence operations and
44 Ibid., and Dept. of State Organizational
counterintelligence investiga-
Chart and Table, 15 January 1944, Folder tions.
41 In their pioneering book on the SIS, Chapter II Office Departmental Adminis-
Rout and Bratzel write that As early as tration, Box 2, Entry 714, Drafts of Chap-
the fall of 1939, Assistant Secretary of ters for an Overall History of the Berles unobtrusive attitude
State George Messersmith had Department of State during World War II, proved useful as Hoover molded
denounced Hoover as a glory hound and Records of the War History Branch, Gen- the nascent SIS. Atop the direc-
difficult to work with except on his own eral Records of the Department of State,
terms (37). George S. Messersmith RG 59, NACP.
tors list of professional pet
Papers, University of Delaware Library, 45 One indication of the assistant secre- peeves were indistinct lines of
Newark, Delaware, file 2018/5, n.d., 35, tarys overflowing administrative platter
as cited in Leslie B. Rout, Jr., and John F. appeared in 1943. Dismissing a critical
Bratzel, The Shadow War: German Espio- letter sent to the Bureau under his signa- 46 Letter from Hoover to Berle, 10 March

nage and United States Counterespionage ture, Berle admitted to Hoovers lieuten- 1943, 102.31/3-1043, Box 52, Department
in Latin America during World War II ant, Edward Tamm, that he had to of State Central Decimal File, RG 59,
(Frederick, MD: University Publications handle as much as 250 pieces of mail a NACP (radio order of battle); letter from
of America, 1986), 37. day and naturally [could not] devote as Hoover to Berle, 27 September 1940,
42 Batvinis, 63. much time to each individual piece as 811.20237/9-2740, Box 3728, Department
43 Undated notes from Box 32; Entry 718; might be desirable. Berle comments of State Central Decimal File, 19401944,
Working Papers and Source Materials for quoted by Tamm in Memorandum for the RG 59, NACP; and letter from Berle to
Histories of Organizational Units, 1938 Director, 17 November 1943, Folder 4, File Hoover, 4 October 1940, 811.20237/9-
1949, Records of the War History Branch, 64-4104, Administrative Records of the 2740, Box 3728, Department of State Cen-
General Records of the Department of SIS, General Records of the FBI, RG 65, tral Decimal File, 19401944, RG 59,
State, RG 59, NACP. NACP. NACP (investigation authorization).

32 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration

administrative authority and Department of State. Although Bureau. 52 Hoover concluded I


nebulous or conflicting agency Berle labored to keep ambassa- very definitely resent the intru-
mandates. 47 Hoover faced sev- dors and State personnel from sion into this aspect of our
eral threats to his power as sole meddling in the administrative administrative policy . 53
collector of secret intelligence in affairs of the SIS, a certain
the Western Hemisphere. 48 MID amount of unsolicited input and Just as Adolf Berles impressive
launched one such an assault in criticism slipped into the FBI discretion in dealing with Hoover
late 1940 and early 1941. During chain of command. For example, can only be appreciated in light
this period, Hoover and MID in November 1943, Ambassador of Hoovers strict bureaucratic
chief Gen. Sherman Miles fought to Peru R. Henry Norwebs con- principles, the FBI directors
an increasingly bitter battle over tacts at the State Department respect for Berle must be mea-
intelligence collection authority made inquiries at FBI Headquar- sured relative to Hoovers other
in the New York area. 49 On 12 ters in Washington to see if the contacts in Washington. Hoover
February 1941, the Interdepart- wife of a particular SIS agent had a close personal relationship
mental Intelligence Committee could join him abroad. 51 Hoovers with President Roosevelt and
with Hoover, Miles, and Berle all reaction to this feeler was imme- many of his successors. He often
presentheld a lengthy meeting diate and severe. He fired off a used this ace to circumvent his
to resolve the dispute. The FBI memorandum to his lieutenants immediate superiors in the attor-
Director expressed his position declaring that he thought it ney generals office when he had
on the New York conundrum as [was] rather presumptuous for something to communicate to the
an ultimatum: either the FBI the State Department or an president, whether it was a FBI
was in charge, or he would hand Ambassador to inject himself into operational success or a jurisdic-
over SIS coverage to the mili- an administrative policy of this tional complaint. With such high
tary. This all-or-nothing approach access, Hoover rarely acknowl-
to resolving a bureaucratic tan- edged FBI inadequacies raised by
gle was classic Hoover. Through- 50 Minutes of the Interdepartmental Intel- anyone outside his agency and
out the meeting, Berle worked to ligence Committee, 12 February 1941, not inside the Oval Office. One
811.20200/3-2741, Box 3728, Department indication of his personal respect
pacify the warring parties. 50
of State Central Decimal File, 19401944,
for Adolf Berle was manifest in
RG 59, NACP, 7, 9. Despite Berles exer-
tions and the Committees extended dis- his promptly addressing criti-
Hoovers obsession with strict
cussion, the IIC failed to adjudicate this cism of the SIS delivered by the
divisions of authority extended jurisdictional dispute, and the matter assistant secretary in a conversa-
into his relations with the wound up in President Roosevelts lap. tion with FBI Special Agent Jer-
The president attempted to solve the
ome Doyle on 3 January 1942.
problem by bypassing Hoover and Miles
47 Batvinis makes a similar point, 50. For and appointing his wealthy friend and
more on Hoovers disgust for unclear man- confidante Vincent Astor as Area Con- According to a summary of this
dates and commitment to direct divisions troller for the New York Area, with meeting prepared for the direc-
of responsibility, see Webb, The FBI and authority to mediate jurisdictional dis-
Foreign Intelligence, 5156, 58. putes (Troy, 47, 49). For more on Astors
tor, Berle had expressed concern
48 Webb, The FBI and Foreign Intelli- amateur intelligence adventures, see that intelligence collection was
gence, 4956. Christopher Andrew, For the Presidents not adequately covering the
49 Army intelligence had established a Eyes Only: Secret Intelligence and the lower classes in South America.
New York City office to obtain information American Presidency from Washington to In the margin next to this
on Latin America from firms based in the Bush (New York: HarperPerennial, 1995),
city that conducted business in the region. Ch. 3.
account, Hoover scribbled, Take
Friction developed because the SIS also 51 Memorandum for Tamm, Ladd, Carson, steps at once to cover this aspect.
operated an undercover outlet in New and Tolson, from Hoover, 13 November
York whose staff sought information from 1942, Folder 5, File 64-4104, Administra-
the same international businesses. See tive Records of the SIS, General Records 52 Ibid.
Troy, 4649. of the FBI, RG 65, NACP, 1. 53 Ibid.

Studies in Intelligence Vol. 49, No. 3 33


Interagency Collaboration


Hoovers rapid response
to Berles criticism
illustrates the quality of
H. 54 Within a month, Hoover of the units spy-hunting success
had a letter out to Berle describ- their personal spread late in World War II, at
ing relevant steps the Bureau relationship. which point he began seeking to
had taken in Chile and Mexico to expand the FBIs post-war intelli-
collect information on the work-
ing classes in those countries,
along with an assurance that
more such operations were in the
works. 55 Berles willingness to

Two considerations dominated
Hoovers calculation. First, the
gence powers. 59

A second reason why Hoover will-


ingly cooperated with Berle and
raise the point constructively and director had not pursued a major the Department of State, even as
Hoovers rapid response illus- foreign-intelligence assignment; he tried to shed the SIS responsi-
trate the quality of their per- rather, the FBIs presence in the bility, was his fear of bad public-
sonal relationship. field was a product of President ity. After devoting much of the
Roosevelts organizational cre- previous decade to blowing hot air
ativity. The Interdepartmental into public perceptions of himself,
Institutional Dynamics Intelligence Committee had con- his G-men, and their crime
sidered placing the FBI in charge fighting abilities, Hoover was
The way Berle and Hoover of clandestine work in Latin
intensely reluctant to see his or
treated each other as individuals America, but no decision had
the Bureaus reputation sullied by
was only one reason their rela- been reached by the time the
president divided the intelli- embarrassing intrigues abroad. 60
tionship succeeded. A second To avoid being disowned in a
dynamic governing their collabo- gence pie himself in June 1940. 57
Consequently, while Hoover and pinch, Hoover welcomed a record
ration was the unique institu-
Berle built the SIS, the director of close association between his
tional status of the Special
Intelligence Service. Unlike checked his ambition and FBI and the Department of State
Hoovers jealous guarding of his regarded it as a genuine service over SIS affairs. He expressed this
domestic duties, he did not ini- agency, collecting secret intelli- anxiety over the FBIs image
tially draw a line in the bureau- gence and conducting counterin- openly during the IICs long
cratic sand and fight off other telligence investigations for the debate on intelligence contacts in
agencies interested in the SIS. benefit of others. 58 New York City. 61
He rejected sharing the foreign-
intelligence sphere under blurred Hoovers initial lack of interest in
authority, but he encouraged aggrandizing his and the 59 In December 1944, Hoover submitted a

Bureaus foreign intelligence role proposal for a world-wide intelligence


overtures to have the Service system to be run after the war by the FBI
transferred out of the Bureau. 56 was expressed at the same IIC and modeled on the SIS. Webb, The FBI
meeting in which intelligence and Foreign Intelligence, 5758.
jurisdictions in New York City 60 For more on Hoovers public relations

54 Memorandum for the Director from Ladd,


were so hotly debated. He contin- endeavors during the 1930s, see Kenneth
4 February 1942, Folder 2, File 64-4104, ued to see the Special Intelli- OReilly, A New Deal for the FBI: The
Administrative Records of the SIS, General Roosevelt Administration, Crime Control,
Records of the FBI, RG 65, NACP, 1.
gence Service as an unsolicited and National Security, The Journal of
55 Letter from Hoover to Berle, 26 Febru- and unwieldy burden until word American History 69 (December 1982): 3.
ary 1942, Folder 2, File 64-4104, Adminis- For references to Hoovers publicity con-
trative Records of the SIS, General cerns regarding the SIS, see Batvinis, 63,
Records of the FBI, RG 65, NACP. 57 Troy, 17. 317.
56 SIS suitors included the Office of Naval 58 Minutes of the Interdepartmental Intel- 61 Minutes of the Interdepartmental Intel-

Intelligence in early 1941, Wild Bill ligence Committee, 12 February 1941, ligence Committee, 12 February 1941,
Donovans Office of the Coordinator of 811.20200/3-2741, Box 3728, Department 811.20200/3-2741, Box 3728, Department
Information (COI) later in 1941, and the of State Central Decimal File, 19401944, of State Central Decimal File, 19401944,
Military Intelligence Division in mid-1942. RG 59, NACP, 8. RG 59, NACP, 5.

34 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration


Berle protected the
FBI-State status quo from
Donovans sticky fingers.
With Hoover skittish about his gathering strength of the Allied
image and eager to cast off the war effort also helped the SIS out-
SIS, one of Berles most consis-
tent challenges was keeping the
Special Intelligence Service in
the FBI, and thus under the
nominal control of the Depart-

Bureau had done an excellent
maneuver enemy agents and har-
vest political, economic, financial,
and industrial intelligence. 65 Even
so, the Berle-Hoover connection
was an indispensable part of SIS
ment of State. No aspect of the job with the SIS and that he dominance. The potent bond
Berle-Hoover liaison provides would be opposed to having it between the twogrowing out of
clearer proof of its exceptional transferred into untried hands. 63 their respectful treatment of one
nature than this one. Incredibly, Berles forceful opposition to another and complementary insti-
between 1940 and 1942, Berle Donovans proposal at the next tutional interestsshielded the
found himself several times IIC meeting ensured that the Special Intelligence Service from
either defending J. Edgar Service stayed within the FBI. the debilitating discord that
Hoovers institutional interests plagued other wartime intelli-
for him or reminding the When Donovan made a second gence organizations, such as
famously competitive bureaucrat stab at the SIS in December Donovans Office of the Coordina-
why his presence in the foreign- 1941, Berle once again was tor of Information (later OSS) and
intelligence field was necessary. instrumental in protecting the the US Joint Intelligence Commit-
FBI-State status quo from Dono- tee. Nevertheless, the State-FBI
Berles most desperate defense of vans sticky fingers. In a Janu- relationship was far from perfect.
the SIS came in September 1941 ary 1942 strategy session with
during a push by Coordinator of Tamm, the assistant secretary
Information William Donovan to professed that he was more than Limits to State-FBI
assume responsibility for covert ever convinced of the absolute Cooperation
intelligence work in Latin Amer- necessity for so handling this sit-
ica. Upon learning of Donovans uation as to insure the continua-
tion of SIS operations in the Whenever possible, Berle
ambition, Hoover feared the FBI indulged the FBI directors pen-
would end up working under or Western Hemisphere solely and
exclusively by the Bureau. 64 chant for administrative control.
alongside a Donovan-led unit. Likewise, Hoover made a sincere
The director ordered his subordi- effort to keep the assistant secre-
nate, Edward Tamm, to visit The relationship between Adolf
Berle and J. Edgar Hoover was tary abreast of the activities and
Berle at State and inform him requirements of the SIS. Unfor-
that, as Tamm put it, the not the only reason for the SISs
resounding success in Latin tunately, this spirit of accommo-
Bureau had no feeling one way dation did not trickle down to all
or the other as to whether this America. The organization also
benefited from the help of friendly levels of the State-FBI partner-
transfer should be made. 62 Berle ship. Considerable tension
dismissed this sentiment out- governments and populations
throughout the region. As the con- between the two agencies arose
right to Tamm, declaring that the at State from individuals who
flict progressed, the failing for-
tunes of the Axis states and the either mistrusted or were jealous
62 Memorandum for the Director from
of the FBI and its foreign-intelli-
Tamm, 2 September 1941, Folder 1, File gence mandate.
64-4104, Administrative Records of the 63 Memorandum for the Director from

SIS, General Records of the FBI, RG 65, Tamm, 2 September 1941, 2.


NACP, 1. For a fuller description of this 64 Memorandum for the Director from 65 Letter from Hoover to Miles, 3 August

and other takeover bids involving the SIS, Tamm, 12 January 1942, Folder 2, File 64- 1940, Section 1, File 64-4104, Administra-
see Webb, The FBI and Foreign Intelli- 4104, Administrative Records of the SIS, tive Records of the SIS, General Records
gence, 5156. General Records of the FBI, RG 65, NACP. of the FBI, RG 65, NACP.

Studies in Intelligence Vol. 49, No. 3 35


Interagency Collaboration

Latin America

US ambassadors in

were the most frequent


US ambassadors stationed in much pleased with the work
Latin America were the most fre- antagonists of which Mr. Jones (Civil Attache in
quent antagonists of the SIS. the SIS. Mexico) is doing here with his
Ambassadors existed outside the associates. They are showing
bureaucratic hierarchy at State.
They served, instead, as the presi-
dents personal envoys to foreign
governments; as a group, they con-
stituted a third party in the rela-

and perhaps looking for some fun,
enjoyed identifying fresh Ameri-
good judgment and discretion
and zeal . 71

On the other hand, even as he


fostered friendships with individ-
tionship between State and the ual SIS agents, Ambassador
can agents and reporting their
FBI.66 The most widespread fric- Messersmith lobbied hard to
arrival to unsuspecting ambassa-
tion between ambassadors and the limit the Bureaus intelligence
dors.69 The anger and distraction
Bureau during World War II footprint. For example, Secretary
this undercover policy created sub-
erupted with the dispatch of of State Cordell Hull asked Mess-
sided with the assignment of legal
undercover SIS agents to Latin ersmiths opinion in August 1942
attachs to most Latin American
America. In the first months of the about having a short-wave radio
embassies by late 1942.
project, all agents sent abroad by set installed at the US embassy
the FBI went in a clandestine in Mexico City, with a FBI opera-
capacity. The Bureau believed that Among the critics of the Special tor acting under Messersmiths
keeping its agents identities Intelligence Service was Hoovers control to man it, saying that
secret from local American lega- former nemesis and wartime such radio units had already
tions was essential for both the ambassador to Mexico, George been set up in several other
safety of SIS personnel and the Messersmith. While serving in embassies around Latin Amer-
security of their mission. Not sur- Mexico from 1941 to 1946, Mess- ica. 72 Messersmith argued
prisingly, US ambassadors ersmith assumed two distinct against a radio in Mexico City,
rejected having an indeterminate attitudes towards the Service. On citing the delicacy of obtaining
number of FBI agents conducting one hand, he supported SIS coun- permission from the Mexican
investigations and running net- terintelligence investigations and government. 73 Messersmiths
works of informants in their zones engendered close ties with the argument reflected his divided
of responsibility. 67 They feverishly FBIs legal attachscalled civil feelings. He stated, The F.B.I.
set about discerning the identity attachs in Mexico. The ambassa- representative in this Embassy is
and location of every SIS agent in dor sent several messages back to a very good man but I do not
the field. 68 British intelligence, Washington praising the FBI like the idea of communications
likely feeling threatened by the men under his jurisdiction. 70 In a between the [State] Department
Services presence in the region December 1942 letter to Berle, and this Embassy on all sorts of
Messersmith gushed, I am very matters passing through the
F.B.I. representative. 74
66 This description of ambassadorial sta-

tus draws on similar accounts in Memo- 68 Ibid., and Memorandum for the Director

randum for the Director from Ladd, 23 from Ladd, 23 April 1942, Folder 4, File 71 Ibid., 8.
April 1942, Folder 4, File 64-4104, Admin- 64-4104, Administrative Records of the 72 Airgram from Hull to Messersmith, 12
istrative Records of the SIS, General SIS, General Records of the FBI, RG 65, August 1942, Box 3728, Department of
Records of the FBI, RG 65, NACP, 2, and NACP, 89. State Central Decimal File, 19401944,
Memorandum for Ladd from F. C. Hollo- 69 Memorandum for the Director from RG 59, NACP.
man, 14 January 1942, Folder 2, File 64- Ladd, 23 April 1942, 9. 73 Letter from Messersmith to Undersec-

4104, Administrative Records of the SIS, 70 List of praise for the SIS from various retary of State Sumner Welles, 18 August
General Records of the FBI, RG 65, NACP, US government officials, Folder 11, File 1942, 811.20200(R)/8-1842, Box 3728,
2. 64-4104, Administrative Records of the Department of State General Decimal
67 Memorandum for Ladd from F. C. Hollo- SIS, General Records of the FBI, RG 65, File, 19401944, RG 59, NACP, 1.
man, 14 January 1942, 23. NACP. 74 Ibid., 2.

36 Studies in Intelligence Vol. 49, No. 3


Interagency Collaboration

Back in Washington, interest in intelligence picture, but they in contrast to those used in
the SIS and opposition to its FBI failed in their bid to become the direct operations. Rommels sub-
management increased steadily Bureaus sole replacement. sequent list of qualities for
during World War II. Before 1940, Instead, State shared worldwide Department representatives pur-
most diplomats at Foggy Bottom, intelligence authority with sev- suing advisory relationships
like their peers in the field, cared eral other agencies, including the with other agencies fit Adolf
little for intelligence work. As the new Central Intelligence Group, Berle to a tee.
SIS grew in size and stature, MID, and ONI.
bureaucrats at State took covet- Her list included:
ous notice. Berle recorded this
transition in his diary on 7 Conclusion Breadth of intellectual
November 1940. Referencing his graspProfessor Berle was
On 28 October 1943, Depart- considered among the bright-
efforts to construct an Intelligence
ment of State administrator est minds of his generation;
Division for the Department, Berle
Rowena B. Rommel produced a
noted how Intelligence is begin-
long memorandum entitled Willingness to understand
ning to be interesting in the another point of viewBerles
Relations of the Department of
[State] Department now, so every- efforts to empathize with
State to Other Federal Agen-
body wants to be in on it.75 By Hoover and defer to his admin-
cies. 77 Rommels piece laid down
September 1944, a determined istrative judgment were
conceptual guidelines for the
opposition had coalesced at State extensive and sustained;
Departments wartime role in
against FBI involvement in the the administration of govern-
foreign-intelligence field. 76 These Planning ahead to give guid-
ment programs in the interna- ance and keep abreast of
anti-FBI forces helped shut J. tional field. In one section, she
Edgar Hoover out of the post-war emerging problemsHoovers
considered the best technique for efforts to keep Berle informed
administering those areas of about SIS troubles and tri-
75 Berle and Jacobs, 351.
activity where other agencies umphs kept the assistant
76 According to Berles assistant Fletcher have operating responsibilities secretary on the organizations
Warren, individuals at State compiled a and the State Department a coor- administrative front lines;
list of mistakes in FBI political reports dinating, advisory responsibil-
distributed to Berle and US ambassadors ity. 78 This described perfectly the Decisiveness so all officials
in Latin America. In retaliation, Hoover know where they stand and
ordered the SIS to Stop sending Political
relative positions of the FBI and
State in their SIS liaison. Accord- business moves alongBerle
Inf[ormation] to State and Ambassadors maintained frequent and sub-
and retrench in SIS coverage. Though ing to Rommel, a conscious dif-
stantive contact with Hoover
Hoover dug in and fought for a post-war ferentiation should be made and several of his FBI subordi-
role in foreign intelligence, he failed to gain between the kind of administra-
President Harry Trumans support and nates and US ambassadors
was elbowed out of the field. For quotation
tive methods and staff needed in throughout Latin America;
and details on States late-war opposition such collaborative arrangements
to the SIS, see Memorandum to Ladd from Delegation of authority to
R. R. Roach, 20 September 1944, Folder 9, lower officials and backing of
File 64-4104, Administrative Records of 77 Memorandum entitled Relations of the
those officials so there is not a
the SIS, General Records of the FBI, RG Department of State to Other Federal
continuous appealing to higher
65, NACP. For more on interdepartmental Agencies, from Rowena B. Rommel, 28
struggles over the post-war intelligence October 1943, Box 33, Entry 718, Working
courtsmost of the day-to-day
field, see C. Thomas Thorne, Jr., and David Papers and Source Materials for Histories contact between State and the
S. Patterson, eds., Emergence of the Intel- of Organizational Units, 19381949, FBI ran between Berles Assis-
ligence Establishment, Foreign Relations Records of the War History Branch, Gen- tant Fletcher Warren and the
of the United States Series, 19451950, eral Records of the Department of State, rest of the FC staff and several
(Washington, DC: Government Printing RG 59, NACP. of Hoovers lieutenants. Berle
Office, 1996). 78 Ibid., 5.
and Hoover never allowed a

Studies in Intelligence Vol. 49, No. 3 37


Interagency Collaboration


Intelligence reformers
should remember that
cooperation is a matter of
SIS-related dispute between intelligence. The two men accom-
them to travel up the chain of individual, and not plished this feat through
command. In contrast, fights institutional, interaction. patience, deference, open commu-
between Hoover and Miles at
nication, and by pursuing com-


MID and Donovan at COI shot
to the Cabinet level, and even mon interests. Berle himself
into the Oval Office. provided the best summary of his
relationship with Hoover when
The relationship that Adolf Berle ONI commander in 1941, refused he wrote in his diary on 28 Feb-
and J. Edgar Hoover constructed Hoovers offer to transfer all SIS ruary 1942, This [SIS] is one
was as close to Rommels theoret- responsibilities in Mexico to Naval case where cooperation between
ical ideal as the stresses of war Intelligence, insisting that such a State and FBI is working out
and reality could be expected to move would be counter to the gov- beautifully. 81
allow. ernments best interests.80

Before creating new intelligence


The Berle-Hoover partnership was However, Berle and Hoovers col-
agencies or overhauling old ones,
not the only instance in World War laboration was unique, and all
contemporary intelligence
II where close personal relations the more impressive because it
reversed years of dysfunction reformers should consider the
among intelligence chieftains gen-
between State and the FBI over deeply personal dynamics that
erated interdepartmental, and
even international, cooperation. made the Berle-Hoover connec-
J. Edgar Hoover fostered a produc- tion so formidable. Effective liai-
79 Minutes of IIC Meeting, 3 June 1940,
tive relationship with at least two sons like theirs serve as
811.20200/6-1040, Box 3728, Department
wartime heads of ONI, Rear Adm. of State Central Decimal File, 19401944,
compelling reminders that intel-
Walter S. Anderson and Capt. RG 59, NACP, and Troy, 17. See also ligence cooperation is, at its most
(later Vice Adm.) Alan G. Kirk, as Batvinis, 62. basic level, a matter of individ-
80 Memorandum for the Director from
well as their organization. Ander- ual, and not institutional, inter-
Tamm, 11 August 1941, Folder 1, File 64-
son worked with Hoover and Berle 4104, Administrative Records of the SIS, action.
in establishing the SIS during the General Records of FBI, RG 65, NACP.
summer of 1940 and witnessed the See also G. Webb, The FBI and Foreign
Services initial progress.79 Kirk, as Intelligence, 5253. 81 Berle and Jacobs, 404.

38 Studies in Intelligence Vol. 49, No. 3


Two Steps Backward

The Collapse of Intelligence Support


for Air Power, 194452
Michael Warner
Historians of American intelli- This Whiggish interpretation of
gence must be tempted at times American intelligence history may
to follow a modified form of what be true in the main, but new
scholars have dubbed the Whig scholarship is revealing serious
theory of history. The English retrograde digressions in the over-
Whigs, or their camp-following all march of progress toward inte-
historians, supposedly viewed the gration and professionalization.

course of political evolution in Scholars such as James D. Mar-


chio and Jeffrey M. Moore, for
Britain and America as a grad-
example, are showing the degree
American military ual (if sometimes bumpy)
to which the American military in
intelligence lost, progress from premodern and
World War II made great strides
rather than gained, autocratic rule to broader and in producing joint combat intelli-
proficiency at the deeper forms of democratic par- gence in support of theater com-
ticipation. In short, from worse to
beginning of the Cold manders. 2 Marchio has also
better, in a sort of cosmically pre- dropped the other shoe in this
War. ordained pattern. Similarly, stu- story of progress by noting that


dents of American intelligence the US military soon unlearned
have sometimes viewed develop- these lessons of joint intelligence
ments from World War I through after the war ended. 3 Strategic
the Cold War as an evolution intelligence was transformed after
from simple to complex organiza- World War II, to be sure, but
tional forms, from uncoordinated inter-service military intelligence
and amateurish attempts to more at the theater or operational level
collaborative efforts by dedi- was sadly neglected and actually
cated, professional officers, and
from ad hoc control arrange- 2 Theater commanders themselves

ments to codified systems of over- marked something of an innovation in


sight and accountability. 1 Again, American military practice. Imposed upon
the services after Pearl Harbor, they con-
from worse to better, in a provi-
trolled all forces operating in their respec-
dential way. tive areas of responsibility and thus (in
theory) made the separate services fight
as a team.
1 This is suggested by Nathan Miller, for 3 James D. Marchio, Days of Future Past:

example, in the preface to his Spying for Joint Intelligence Operations During the
America: The Hidden History of US Intel- Second World War, Joint Forces Quar-
ligence (New York: Paragon House, 1989). terly, (Spring 1996): 122, and Support to
See also the report of the Brown-Aspin Military Operations: The Evolution and
Commission, formally cited as the Com- Relevance of Joint Intelligence Centers,
mission on the Roles and Missions of the Studies in Intelligence 49, no. 1 (2005):41
United States Intelligence Community, 54. See also Jeffrey M. Moore, Spies for
Dr. Michael Warner serves in the Preparing for the 21st Century: An Nimitz: Joint Military Intelligence in the
Office of the Director of National Appraisal of US Intelligence (Washing- Pacific War (Annapolis, MD: Naval Insti-
Intelligence. ton: Government Printing Office, 1996), 7. tute Press, 2004).

Studies in Intelligence Vol. 49, No. 3 39


Intelligence and Air Power

lost certain capabilities that it terpiece of the American arsenal and it was hardly clandestine,
had acquired in wartime. It is lit- and a constitutive component of but what made it intelligence
tle short of astonishing to note, for the nations thinking about how was the tightly guarded sophisti-
example, that American theater it might deal with foreign cation of the analysis that inter-
commanders between 1945 and threats. Second, Washington preted the pictures in light of
1991, with insignificant excep- learned at Pearl Harbor that one other sources to maximize the
tions, did not control organic joint- man had to be in charge in each strategic impact of air power.
service intelligence staffs to help active theater of war and that Theater commanders needed
them conduct joint operations. unity of effort required a unity of such intelligence to understand
command that transcended the both the effects that their efforts
Scholars like Marchio and Moore individual services and fighting were having on the enemy and
have only scratched the surface of arms. Hence the appointment of the best ways to allocate scarce
this topic. A quick look at theater- theater commanders (most resources.
level intelligence for air power famously Eisenhower in Europe,
from the closing of World War II Nimitz in the Central Pacific, and
Britain, out of necessity, had pio-
through the Korean conflict pro- MacArthur in the South Pacific),
neered this field, creating an
vides ample corroborating evi- and their assembling of inter-
inter-service photo intelligence
dence for an argument that allied support staffs. Third, in
Europe and to a lesser extent in center in late 1940. The British
American military intelligence
the Pacific, these theater staffs taught their newly acquired
lost, rather than gained, organiza-
included large intelligence ele- skills to the Americans, who had
tional sophistication and analytic
ments to support strategic bomb- gone to war with crude intelli-
proficiency at the beginning of the
ing efforts by charting the course gence capabilities. 4 The Army Air
Cold War. The militarys wartime
of the air campaign and gauging Forces (AAF) appreciated the
progress in command and con-
its impact on enemy intentions value of integrating all available
trolfor instance, the creation of
and capabilities. The first two of sources in an organization
theater commanders and the sub-
these lessons proved enduring, employing teams of expert photo-
sequent Unified Command Plan
was not matched by progress in but the third had serious trou- interpreters supported by ana-
intelligence capabilities. The bles when the shooting stopped. lysts like those of the Enemy
decline was particularly jarring in Objectives Unit of the Office of
air intelligence. Indeed, a survey Strategic Services. Indeed, by the
A key component of the intelli-
of recent findings and published gence for strategic bombing was end of the war, imagery pro-
sources suggests that, in the very the interpretation of evidence cessed by theater photo interpre-
years when strategic airpower was gleaned from overhead photogra- tation centerslike the one at
being advocated and recognized as phy. Imagery analysis had won a Medmenham, Englandwas pro-
a key component of national secu- place as its own discipline in viding large portions of the tacti-
rity, intelligence to guide strategic World War II. By 1942, Allied cal and strategic intelligence that
bombing campaigns, especially at bombers were growing so large Allied commanders employed
the operational-level, faced insti- and long-ranged that they prom-
tutional jeopardy and professional ised to make a reality of pre-war 4 For example, the 12th Air Force went to
stagnation. forecasts of the power of strate- North Africa in November 1942 with no
gic bombing. In so doing, aircraft trained photo-interpreters to analyze
technology briefly outstripped the aerial photographs. Its commander, Brig.
Wartime Experience crude reconnaissance capabili- Gen. James Doolittle, analyzed the pic-
tures from its first photoreconnaissance
ties of the Allies to guide target- mission himself. See James Doolittle, with
World War II saw three innova- ing and damage assessment. Carroll V. Glines, I Could Never Be So
tions for the US military. First, Aerial photography long pre- Lucky Again (New York: Bantam, 1991),
strategic bombing became a cen- dated World War II, of course, 332.

40 Studies in Intelligence Vol. 49, No. 3


Intelligence and Air Power

AAF commanders
disliked their
dependence on British
against the Axis, and was a key to analyze objectives in Japan
to the bombers success in crip- intelligence. and evaluate the progress of the
pling the German economy. 5 nascent bombing campaign; it did

AAF commanders in Europe


understood their dependence on
the British and disliked it, but
there was not much they could

British, achieved. Perhaps the
closest analogue to it in the war
indeed perform all-source analy-
sis, but it did so in Washington,
under the wing of the AAFs com-
mander, Gen. Hap Arnold. 9

do. They had unintentionally against Japan was the Joint


developed a system to provide Intelligence Center Pacific Ocean Postwar Changes
what would later be called Area, a Navy and Marine Corps-
national-level imagery support staff that collated imagery, sig- Victory in World War II made
to theater-level operations, but nals intelligence, and human strategic air power a cornerstone
the national system providing source reporting to support Adm. of American defense policy, but it
that support was owned by Great also showed, for the observant
Nimitzs island-hopping cam-
Britain. We have built up the few, that strategic air operations
paign across the Central Pacific. 8
only really competent Intelli- depended for their success on
In the last year of the war, the
gence service that exists or has vast quantities of accurate and
AAFs intelligence staff also
existed in the Air Forces of the timely intelligence reports. 10 The
United States, reflected one of established a Joint Target Group
operative word here is few.
the American commanders of the
Combined Bomber Offensive in 6 The officer was Maj. Gen. Frederick
The rout for the Army Air Forces
October 1944. Nevertheless, he Anderson, deputy commanding general began just after V-J Day. Victori-
continued, if it would become for operations for the US Strategic Air
Forces in Europe (USSTAF); see Confer-
ous over the Axis, the AAF now
necessary for us to break off from
ence held in the Office of the Deputy Com- collapsed from within. It fell from
British sources of Intelligence at
mander, Operations, USSTAF, 9 October
short notice we would be lost. 6 1944, in the Library of Congress, Carl
Less than a year later, senior Spaatz Papers, USSTAF Files, Intelli- 7 According to H. F. Matthews, Mr.

AAF commanders in Europe were gence, Box 297. See also the memorandum Byrnes also heard a number of our Air
concerned enough about the on this topic prepared for Gen. Carl C. Corps [sic] officers complain of a lack of
Spaatz, commander of the US Strategic adequate American intelligence and
decline of US intelligence profi-
Air Forces in Europe, by his director of praise the high quality of British intelli-
ciency to complain to Secretary of intelligence, Brig. Gen. George C. gence. See Minutes of Meeting [of the
State James Byrnes when he vis- McDonald, on 7 November 1944. Concern Secretaries of State, War, and Navy], 16
ited them. 7 over the dependency may also have influ- October 1945, in Department of State,
enced USSTAFs relocation of much of its Foreign Relations of the United States,
Only in Europe, however, was intelligence organization from Widewing, 19451950, Emergence of the Intelligence
Bushey Park, England, to the new Main Establishment (Washington: Government
this degree of sophistication, Headquarters in St. Germain, France, in Printing Office, 1996), 64.
based on backstopping by the late 1944a move that may have contrib- 8 Roy M. Stanley, II, World War II Photo

uted significantly to the decline in the Intelligence (New York: Charles Scribners
AAFs post-war intelligence capabilities. Sons, 1981), 70.
5 For more on imagery intelligence in See Lt. Col. Lewis F. Powell, Jr., Chief, 9 John F. Kreis, Planning the Defeat of

World War II, see Alexander S. Cochran, Operational Intelligence Division, to Brig. Japan: The A-2 in Washington, 1943
Jr., Robert C. Ehrhart, and John F. Kreis, Gen. McDonald, Notes on Operational 1945, in Kreis, ed., Piercing the Fog, 368
The Tools of Air Intelligence: ULTRA, Intelligence Division of Directorate of 71.
MAGIC, Photographic Assessment, and Intelligence, USSTAF, 9 June 1945, 20. I 10 See, for instance, former Treasury

the Y-Service, in John F. Kreis, ed., Pierc- am grateful to John Ferris of the Univer- Department economic analyst and
ing the Fog: Intelligence and Army Air sity of Calgary for copies of these docu- Amherst College professor George S. Pet-
Force Operations in World War II (Wash- ments, which are held in the MacDonald tees The Future of American Secret Intel-
ington: Air Force History and Museums Research Material, Special Collection, US ligence (Washington: Infantry Journal
Program, 1996), 85, 9293. Air Force Academy Library. Press, 1946), 35.

Studies in Intelligence Vol. 49, No. 3 41


Intelligence and Air Power


When the war ended,
the better the officer,
the faster he left.
about 2 million men in Septem- Sophisticated inter-allied sys-
ber 1945 to one-quarter that tems to provide air targeting
number barely six months later. 11
Arnolds deputy, Gen. Carl
Spaatz, warned Congress in
November that our air force [is]
disintegrating before our eyes.

who would inevitably be lost to
civilian life when the war
intelligence through exploiting
imagery and all available sources
were being disbanded, their per-
sonnel demobilized, and their
equipment presumably sold. 18
We see almost hysterical demobi- ended. 15 That seems to be Few of the AAFs leaders under-
lization. 12 Brig. Gen. Leon W. exactly what happened. The stood how dependent these
Johnson, head of the AAFs Per- War Departments point sys- efforts had been on British exper-
sonnel Services Division, com- tem gave demobilization prior- tise, signals intelligence, and
plained in detail: ity to overseas veterans with inter-service coordination; thus
the longest service (and thus little was done to preserve in Air
We didnt demobilize; we the most expertise). Intelli- Force hands the capability that
merely fell apart. We lost gence was no exception: The had been so painfully won in
many records of all the groups better the officer, the faster he wartime. 19 Indeed, the Eber-
and units that operated during left. 16
the war because there was no stadt Report on military unifica-
one to take care of them. So, it tion prepared for Navy Secretary
was not an orderly demobiliza- Military intelligence capabilities James Forrestal in the summer of
tion at all. It was just a riot, were swept away in the haste of 1945 had praised joint photo-
really. 13 demobilization. Soon the combat intelligence and target analysis,
intelligence centers built during but it said nothing about whether
The AAFs specialized support the war were all but gone, dis- that intelligence was provided at
capabilities perhaps suffered mantled like the joint intelli-
the worst. At least 12 recon- gence centers established to help
naissance groups and four theater commanders in the
17 The Joint Intelligence Center Pacific

wings were active on V-J Day, Ocean Area in Adm. Nimitzs command
Pacific and Mediterranean. 17 shut down in October 1945, and the Joint
but only two groups and one Intelligence Center of the Africa-Middle
wing remained in operation at East Theater was dismantled around the
the end of the fiscal year on 30 14 These numbers are derived from a quick same time; see Marchio, Days of Future
June 1946. 14 By then, it is likely and unscientific survey of the lists in Air Past, 122.
that the AAFs ability to utilize Force Combat Units of World War II, pub- 18 For example, American personnel from

lished by the US Air Forces historical perhaps the most important of these orga-
them had been seriously office in 1961, and revised and reprinted nizations, the Allied Central Interpreta-
degraded. Gen. Spaatz had in 1986. The lists are available on-line at tion Unit in Medmenham, England, were
lamented in late 1944 that the http://libraryautomation.com/ withdrawn in August 1945; Ursula Powys-
intelligence components of his nymas/usaaf. The 1946 numbers roughly Lybbe, The Eye of Intelligence (London:
command in Europe were match the totals of operational AAF William Kimber, 1983), 213. British per-
reconnaissance units in mid-1947: two sonnel working in the Joint Target Group
staffed with hundreds of highly tactical reconnaissance groups, one long- of the Army Air Forces A-2 in Washington
trained emergency officers range photo-reconnaissance group, and departed for home before November 1945;
one long-range mapping group. See also see Kreis, Planning the Defeat of Japan,
Wolk, 215. 390.
11 Walton S. Moody, Building a Strategic 15 Spaatz is quoted in the transcript of the 19 With fits and starts, some air targeting

Air Force (Washington: Air Force History Committee for the Reorganization of the intelligence continued to be shared
and Museums Program, 1996), 50. National Defense, a conference of AAF between the British and Americans as
12 Moody, 52. officers held at Spaatzs headquarters at both nations exploited Luftwaffe imagery
13 Quoted in Herman S. Wolk, Planning St. Germain, France, on 6 November of the Soviet Union. Richard J. Aldrich,
and Organizing the Postwar Air Force, 1944. My thanks to John Ferris of the The Hidden Hand: Britain, America, and
19431947 (Washington: Office of Air University of Calgary for this document. Cold War Secret Intelligence (London:
Force History, 1984), 117. 16 Moody, 50. John Murray, 2002), 20617.

42 Studies in Intelligence Vol. 49, No. 3


Intelligence and Air Power

the tactical, operational, or stra- codified in the National Security ing the potential of jet aircraft,
tegic levelsor whether and how Act of 1947the same legisla- winning independence from the
to provide it in the future. 20 tion that gave statutory standing Army, and then establishing the
to unified and specified com- institutions of an independent
mands, thus making permanent US Air Force. In the spring of
President Truman wanted intelli-
the wartime innovation in Amer- 1949, the Air Force deactivated
gence reform in late 1945, but as
icas conduct of the operational several more of its tactical recon-
yet he had little time or training
level of war. But while these the- naissance units, leaving only
to understand the subtleties of
ater commanders would reign three squadrons in active status.
what was being done in its name.
relatively supreme in their areas Its strategic reconnaissance units
By the time he examined propos-
of responsibility, nothing in the seemed to have fared better only
als for a new director of central
1947 Act provided for them to by comparison; economy mea-
intelligence (DCI) to guide and
have their own organic intelli- sures had hampered their mod-
coordinate activities at the
gence capabilities. This oversight ernization since the war. 24 The
national level, much of the dam-
would soon have unintended con- problems of developing and field-
age had been done. The presi-
sequences. ing jet-age reconnaissance air-
dent agreed with the Army and
Navy that every department craftand the improved cameras
With no secretary of defense pow- for them to carrywere daunt-
required its own intelligencea
erful enough to coordinate a ing enough, but still worse was
concession that in effect ratified
joint, all-source combat intelli- the decay in the human and orga-
the wholesale scrapping of war-
gence capability, and the DCI nizational assets for imagery
time intelligence capabilities. 21
implicitly barred from this field, intelligence. 25 What time and
Trumans order establishing the
the military services concen- energy they had for air intelli-
post of DCI in January 1946
trated on their own concerns and
accordingly stipulated that the gence seems to have been
had little authority or inclina-
existing intelligence agencies
tion to re-create joint intelli-
shall continue to collect, evalu-
gence staffs. A blue-ribbon panel 23 The larger panel was chaired by former
ate, correlate, and disseminate
appointed by Congress to study president Herbert Hoover and titled the
departmental intelligence (out- Commission on the Organization of the
the organization of the govern-
side the purview of the DCI). 22 Executive Branch of the Government. Its
ment flagged some of the danger
This concession, while necessary national security team, headed by Eber-
signals in its January 1949 stadt, reported to Congress in January
to win military assent in the cre-
report. Its subcommittee to study 1949. The intelligence sections of its final
ation of the DCI and an organiza-
intelligence, headed by Ferdi- report closely tracked a then-classified
tion to serve him, would be chapter of the teams report titled The
nand Eberstadt, warned that the
Central Intelligence Agency: National and
military intelligence arms had
Service Intelligence, which was declassi-
20 US Senate, Committee on Naval Affairs, lost most of the skilled and expe- fied by the CIA in the 1990s. See CIA
Unification of the War and Navy Depart- rienced personnel of wartime, Management of Officially Released Infor-
ments and Postwar Organization for and that those who remained had mation (MORI) system document 400637;
National Security, 79th Congress, First seen their organizations and the quotations are from that chapter, 39
Session, 22 October 1945, 162. 40.
21 Harry S. Truman, Memoirs, Vol. II,
their systems ruined by superior 24 Robert F. Futrell, The United States Air

Years of Trial and Hope (Garden City, NY: officers with no experience, little Force in Korea, 19501953 (Washington:
Doubleday, 1956), 57. capacity, and no imagination. 23 Office of Air Force History, 1983), 545.
22 Truman to the Secretaries of State, War, 25 For a summary of these technical prob-

and Navy, 22 January 1946, reprinted in This neglect devastated the lems, see Moody, 1056, 239. Electronic
Department of State, Foreign Relations of intelligence suffered as well; see John
the United States, 19451950, Emergence
nations ability to provide intelli- Thomas Farquhar, A Need To Know: The
of the Intelligence Establishment (Wash- gence support to a strategic air Role of Air Force Reconnaissance in War
ington: Government Printing Office, campaign. AAF leaders after Planning, 19451953 (Maxwell AFB, AL:
1996), 17879. World War II were busy develop- Air University Press, 2004), 39.

Studies in Intelligence Vol. 49, No. 3 43


Intelligence and Air Power


These lessons [of
World War II] either
were forgotten or
devoted to a scramble for data on an all-source imagery intelli-
targets in the Soviet Union. 26 never documented. gence, targeting, and battle-dam-
Nevertheless, by 1950 bomber


age assessment capability. 32 By
crews still had target materials the end of the war, imagery sup-
on only about half of their pro-
port was once again competent
spective targets in the USSR. 27
On the eve of the Korean War, a for the US Army and Air Force in and robust, but recouping that
draft Handbook for Air Intelli- Korea. 29 The Army had pledged capability had been expensive in
gence Officers distributed by the in a series of deals dating from time, money, and livesand
Air Training Command described 1946 to handle much of the inter- there was still little understand-
World War II-vintage procedures pretation of photos of the front- ing that the job was perhaps too
for organizing and running photo lines, but the Eighth Army had big for any one service.
interpretation units because no photo-interpreters at all until
there was nothing else to February 1951, by which time
describe. The booklet sheepishly United Nations forces had twice James Marchios research adds an
explained that the organization been threatened with eviction interesting side note. Early in the
of units engaged in Air Force from the Korean peninsula. Korean war, the several com-
photo interpretation is being When Lt. Gen. Matthew Ridge- manders-in-chief of the unified
modified and promised to update way took over the Eighth Army and specified commands endorsed
the section at a later date. 28 in late December 1950, he found a director of naval intelligence
that his command literally did proposal to fashion joint intelli-
not know the sizes and locations
gence centers in each of their com-
Consequences in Korea of the Chinese formations facing
it. To add insult to injury, an mandsan idea that was soon
The Truman administrations urgent reconnaissance campaign forwarded to the Joint Chiefs of
decision to allow the depart- to locate those forces found little Staff. For some still undeter-
ments to provide their own intel- or nothing, largely because the mined reason, the Joint Secretar-
ligence thus abetted, in practice, harried photo-interpreters were iat in 1951 returned the proposal
a situation in which a single ser- relying in most cases on imagery with the cryptic explanation that
vice, through simple inattention, alone to spot camouflaged Chi- it had been withdrawn from con-
could deprive the nation of a nese positions, without the aid of
sideration by the JCS.33 That is
valuable asset. In Korea, a sur- other intelligence sources. 30
prised US Air Force had to recon- roughly where matters would
struct, almost from scratch, the stand until the implementation of
Something seemed to have gone
sort of intelligence support for the Goldwater-Nichols Act, almost
seriously wrong. Indeed, the chief
strategic air operations it had four decades later.
of the Far East Air Force, Lt.
enjoyed in 1945. For the first two
Gen. Otto Weyland, complained
months of the conflict, a single
that it appears that these les- 31 Cited by Robert F. Futrell in A Case
reconnaissance technical squad-
sons [of World War II] either Study: USAF Intelligence in the Korean
ron in Yokota, Japan, had to han-
were forgotten or never were doc- War, in Walter T. Hitchcock, ed., The
dle all photo interpretation work Intelligence Revolution: A Historical Per-
umented. 31 Not until mid-1952
spective [Proceedings of the Thirteenth
two years into the conflictdid Military History Symposium], (Washing-
26 Moody, 140. theater command have at its call ton: Office of Air Force History, 1991), 275.
27 Ibid., 333. 32 Futrell, The United States Air Force in

28 US Air Force, Air Training Command, Korea, 19501953, 5014.


Handbook for Air Intelligence Officers, 29 Futrell, The United States Air Force in 33 James D. Marchio, Support to Military

June 1950, copy in the CIAs Historical Korea, 19501953, 54546. Operations: The Evolution and Relevance
Intelligence Collection, Declassified. 30 Ibid., 27273. of Joint Intelligence Centers, 4154.

44 Studies in Intelligence Vol. 49, No. 3


Intelligence and Air Power


The problem of
harnessing
national-level
Conclusion especially close support from
means to intelligence. And this lesson had
This essay is not a comprehen- operational-level to be relearned in later conflicts
sive examination of the litera- needs was too difficult. as well.
ture and documentation on its
topic. It is rather a survey of
clues that suggest what might be
found when additional archival
spadework gets done in the
records of reconnaissance units

problem of harnessing national-
Thus, a Whig interpretation of
the history of American intelli-
gence must be used with cau-
tion, if at all. Indeed, historians
might profit from reexamining
and imagery intelligence organi- level means to operational- certain developments during the
zations. level needs was too difficult. It Cold Warsuch as the growth of
had been solved only tempo- the analytic capabilities of the
At the end of the world war, the rarily for the Combined Bombing Central Intelligence Agency and
Truman administration and Con- Offensive in Europe, and that the creations of the Defense
gress took stock of what had success had lulled Army Air Intelligence Agency, the National
changed in Americas posture Forces into a false confidence in Photographic Interpretation Cen-
toward the world and in its mili- their intelligence capabilities, ter, and the National Reconnais-
tary and intelligence capabilities which were soon demobilized. sance Officenot as progress
and sought to organize these Thus, the new Intelligence Com- toward a higher intelligence syn-
capabilities in a lasting, peace- munity simply was not well pre- thesis, but as ad hoc and partial
time configuration. The military pared for the challenges of the remedies for certain chronic
establishment failed, however, to Cold War and beyond. The Penta- weaknesses and problems cre-
incorporate important lessons gon had to relearn in Korea that ated in the rush to demobilize
from its wartime experience. The strategic air campaigns require after World War II.

Studies in Intelligence Vol. 49, No. 3 45


Collection and Analysis on Iraq

Issues for the US Intelligence Community


Richard Kerr, Thomas Wolfe, Rebecca Donegan, and Aris Pappas

Editors Note: This is the third in The Intelligence Community's


a series of reports supporting the uneven performance on Iraq from
Director of Central Intelligences 20024 raised significant ques-
evaluation and critique of intelli- tions concerning the condition of
gence and analysis associated intelligence collection, analysis,
with the war in Iraq. It was pre- and policy support. The discus-
pared on contract by the Kerr sion of shortcomings and failures
Group, a team of former senior that follows is not meant to imply

intelligence officers. The Group's that all surprises can be pre-


first report, a classified study, vented by even good intelligence.
There are too many targets and
The quality of was a documentation of the
too many ways of attacking them
intelligence will be Intelligence Community's judg-
for even the best intelligence
ments before the war. It
improved only by agencies to discover all threats in
characterized the intelligence
fundamental changes process, product content, and
time to prevent them from hap-
at the grass roots level. pening. Nonetheless, improving
analytic shortcomings but was performance requires an
not a commentary on the accu-


acknowledgement of past mis-
racy of those judgments. The takes and a willingness to
second report, also classified, change.
reviewed the intelligence used to
support judgments regarding This report was prepared at a time
weapons of mass destruction in of a great rush to reorganize and
Iraq. Specifically, it reviewed the give the leader of the Intelligence
reporting used to develop the Community new authorities. That
National Intelligence Estimate probably was a necessary activity.
Iraq's Continuing Programs for However, to move the organiza-
Weapons of Mass Destruction, tional boxes and to offer new
published in October 2002. The authorities are not the only
third report, which follows, was answers or perhaps even the best
an unclassified study presented answers. Based on our experience
in July 2004. In it, the team pre- and what we learned during this
sents an assessment of the review, the Group believes that
performance of the Intelligence the quality of intelligence will be
Community from a broad per- improved only by fundamental
Richard J. Kerr served as Deputy changes at the grass roots level.
Director of Central Intelligence; spective, focusing on systemic
That is, changes in collection,
Thomas H. Wolfe as Director of the issues that channeled analysts
analysis, the nature of the prod-
Office of Near Eastern & South evaluations and analyses. Its
uct, and interaction with policy-
Asian Analysis; Rebecca L. observations and recommenda-
makers and other customers.
Donegan as Deputy Inspector tions continue to have relevance
General; and Aris A. Pappas as as the Community evolves. The Intelligence Community
Assistant National Intelligence itself has made some useful
Officer for General Purpose Forces. * * * changes and recommended oth-

Studies in Intelligence Vol. 49, No. 3 47


Postmortem


The policy community
was receptive to
technical intelligence
ers. Several fixes also have been cultural and political issues
proposed from outside the Com- on WMD, where the (post-Saddam Iraq), where the
munity, which might be helpful analysis was wrong, analysis was right.
but do not address some of the but paid little
core problems identified by the attention to analysis With respect to the weapons pro-
Group. This report focuses on the on post-Saddam Iraq,
question: Does the Community's grams, some critics have argued
flawed performance on Iraq rep-
which was right. that the off-the-mark judgments
resent one-time problems, not to resulted largely from reinforce-
be repeated, or is it symptomatic
of deeper problems?

Principal Findings of the



provided perceptive analysis on
Iraq's links to al Qa'ida; calcu-
ment of the Community's
assumptions by an audience that
was predisposed to believe them.
This, however, seems to have
been less a case of policy reinforc-
Earlier Reports lated the impact of the war on oil ing helpful intelligence judg-
markets; and accurately forecast ments than a case of policy
The central focus of national the reactions of the ethnic and
deliberations deferring to the
intelligence reporting and analy- tribal factions in Iraq. Indeed,
Community in an area where
sis prior to the war was the intelligence assessments on post-
Saddam issues were particularly classified information and techni-
extent of the Iraqi programs for
developing weapons of mass insightful. These and many other cal analysis were seen as giving
destruction (WMD). The analysis topics were thoroughly examined it unique expertise.
on this issue by the Intelligence in a variety of intelligence prod-
Community clearly was wide of ucts that have proven to be On the other hand, the Intelli-
the mark. That analysis relied largely accurate. gence Community's analysis of
heavily on old information post-Saddam Iraq rested on little
acquired largely before late 1998 The national intelligence pro- hard information, was informed
and was strongly influenced by duced on the technical and cul- largely by strong regional and
untested, long-held assumptions. tural/political areas, however, country expertise developed over
Moreover, the analytic judg- remained largely distinct and
ments rested almost solely on time, and yet was on the mark.
separate. Little or no attempt
technical analysis, which has a Intelligence projections in this
was made to examine or explain
natural tendency to put bits and the impact of each area on the area, however, although largely
pieces together as evidence of other. Thus, perspective and a accurate, had little or no impact
coherent programs and to equate comprehensive sense of under- on policy deliberations.
programs to capabilities. As a standing of the Iraqi target per
result the analysis, although se were lacking. This indepen- The bifurcation of analysis
understandable and explainable, dent preparation of intelligence between the technical and the
arrived at conclusions that were products in these distinct but cultural/political in the analytic
seriously flawed, misleading, and interrelated areas raises signifi-
product and the resulting impli-
even wrong. cant questions about how intelli-
cations for policy indicates sys-
gence supports policy. In an
Intelligence produced prior to the ironic twist, the policy commu- temic problems in collection and
war on a wide range of other nity was receptive to technical analysis. Equally important, it
issues accurately addressed such intelligence (the weapons pro- raises questions about how best
topics as how the war would gram), where the analysis was to construct intelligence prod-
develop and how Iraqi forces wrong, but apparently paid lit- ucts to effectively and accurately
would or would not fight. It also tle attention to intelligence on inform policy deliberations.

48 Studies in Intelligence Vol. 49, No. 3


Postmortem


The ICs tendency to
establish single-issue
centers contributes to
The Context inadequate to deal conclusively
uneven performance. with the multiplicity of threats.
Any examination of the Intelli- Accordingly, the Community in
gence Community must acknowl-
edge the impact of more than 10
years of turmoil that adversely
affected all collection and analytic
efforts, including those on Iraq.

Nonetheless, during the 1990s the
Intelligence Community con-
critical situations has faltered in
its analyses and failed to collect
pertinent information. This has
occurred over a length of time
and across crises sufficient in
The Intelligence Community was fronted numerous crises in which number, quite apart from Iraq, to
designed to focus on the Soviet to demonstrate the relevance of indicate systemic issues rather
Union. It had developed a single- intelligence analysis to policy than just occasional missteps.
minded rigor and attention to deliberations. Regional conflicts,
detail that enriched its analysis, such as the first Gulf war and fol-
particularly with respect to Soviet low-on sanctions against Iraq, the Collection Impeded and
military issues. The end of the breakup of Yugoslavia, and emerg- Misdirected
Cold War, however, brought to a ing threats from North Korea and
close that stable bipolar world Iran provided tests for intelli- Intelligence collection against
and left the United States without gence. The Community's collec- Iraq fell far short of the mark.
a principal enemy. Although never tion and analysis performance The intelligence base for collec-
perfect, the Intelligence Commu- over this period, however, was tion and analysis was thin and
nity's analytic efforts against the seen as inconsistent and some- sketchy. The Intelligence Com-
Soviet threat were generally times faulty, leaving important munity had nothing like the rich-
insightful and its collection largely customers still wondering about ness, density, and detail that it
effective, reflecting the accumula- the relevance of the intelligence worked hard to develop and
tion of deep understanding devel- input to policy deliberations. became accustomed to having on
oped over many years. Soviet issues during the Cold
A significant contributor to this War. To a significant extent this
Absent this singular focus, in the uneven performance was, and resulted from the reduction over
post-Cold War environment the still is, the Community's ten- the past decade of the profes-
Intelligence Community strug- dency to establish single-issue sional collection management
gled to reestablish its identity centers and crisis-response task cadre capable of integrating
and purpose in what had become forces. By stripping expertise HUMINT, imagery, and signals
a world of multiple crises and from regional offices, they dimin- intelligence capabilities into
transient threats. The effort to ish the overall ability to provide coherent strategies. This develop-
define its priorities was further perspective and context for those ment was compounded by the
complicated as policymakers and issues. The resources seldom get increased separation of collection
others raised questions not only returned to the line offices, which professionals from the analytic
about the role of but even the historically have been better cadre who had been intimately
need for intelligence. Accord- equipped to provide complete involved in identifying collection
ingly, intelligence came to be perspectives on country and gaps, needs, and priorities and
seen as an area where the gov- regional issues. developing collection strategies.
ernment could reap resource sav-
ings. The resulting cutbacks in Although resources increased Placing these developments in a
collection (technical and marginally over the decade, they broader context, however, is
HUMINT) and analytic resources were not as robust or focused as important. Iraq was not the only
had a significant adverse impact the capabilities devoted to the significant intelligence problem
on Intelligence Community capa- Soviet Union and were seen by facing the Community in the
bilities. the Intelligence Community as years immediately preceding the

Studies in Intelligence Vol. 49, No. 3 49


Postmortem

war. Counterterrorism and coun- working them, or what the doc- eration, and Arms Control. It was
terproliferation were given trines for use might be. Con- published contemporaneously
higher priority and absorbed versely, the Community saw no with the 2002 National Intelli-
much of the clandestine services evidence that WMD programs gence Estimate on WMD. The
capability and leadership atten- were slowed, put on hold, or even brief describes in great detail the
tion. Weapons programs in both nonexistent. Nor did it under- information required to support
North Korea and Iran received stand why Saddam's devious and analysis of Iraq's weapons pro-
higher priority than those in Iraq obstructionist behavior contin- grams. The intent of the brief was
until late 2002. In Iraq, technical ued if, as he claimed, he had no to expose gaps in knowledge about
collection priorities emphasized stockpiles of banned weapons. what was believed to be aggres-
coverage of the Iraqi air defense sive, ongoing Iraqi weapons pro-
system in southern Iraq in sup- US intelligence collection strate- grams. The revealed gaps in
port of US military operations gies contributed to the problem. knowledge were not, however,
and prevented collection on other Looking for information on a par- raised as requirements to address
important targets in Iraq. ticular subject with a preconcep- what was not known nor did such
tion of what is needed is almost gaps raise doubts about prevail-
A number of other factors added certain to result in data that ing intelligence judgments.
to the difficulty of clandestine reinforces existing assumptions.
collection on the Iraq target. The The Community directed its col- Discussing largely space-based
Iraqis took pains to carefully hide lection capabilities to filling in collection systems at an unclassi-
their WMD programs. People and what it thought were gaps in fied level is difficult, but a few
operations were protected from information about WMD pro- observations are possible.
US intelligence by a variety of grams, monitoring progress, look- Despite a wide variety of techni-
methods, including isolating sci- ing for new developments in cal capabilities available to the
entists and technicians involved weapons and delivery systems, US, these systems were able to
in the programs and employing and identifying efforts to acquire provide accurate information on
effective camouflage, conceal- materiel and technology abroad. relatively few critical issues.
ment, and deception efforts. The Based on the hard information Monitoring Iraqi reactions to
Iraqis had learned well about US collected by US military forces inspections was informative as
intelligence during more than 10 and UN inspectors during and was reporting on Iraqi acquisi-
years of confrontation and war. following the first Gulf war, rein- tion efforts. Technical collection
forced by subsequent bits of lends itself to monitoring large-
Nevertheless, collection of infor- information, the Intelligence scale, widespread targets, a con-
mation on difficult targets is the Community and the US defense dition not met in the Iraqi case.
core mission of intelligence and establishment had little doubt Analysis of Iraq's WMD pro-
in the Iraq case it did not mea- that Iraq was continuing develop- grams, therefore, provides an
sure up. Many of the more ment of WMD. excellent case study for an
sophisticated clandestine techni- assessment of the limitations of
cal collection techniques did not Collection was not focused or con- relying too heavily on technical
produce results. The Iraq WMD ceptually driven to answer ques- collection systems with little
target was given a high priority tions about the validity of the acknowledgement of the politi-
over more than a decade, even if premise that the WMD programs cal/cultural context in which such
not the highest. Still, the Intelli- were continuing apace. This prob- programs exist.
gence Community did not have lem is well illustrated by a com-
conclusive evidence on what the prehensive collection support brief Accordingly, surprisingly little
Iraqis were working on, what describing intelligence needs pub- collection was directed against
they had achieved, which pro- lished by the DCI Center for several key issues. Neglected
grams were ongoing, who was Weapons Intelligence, Nonprolif- topics for collection included the

50 Studies in Intelligence Vol. 49, No. 3


Postmortem


Collection strategies
for Iraq were weak and
unimaginative.
social, cultural, and economic ficulty of requiring such a regime
impacts on Iraq of nearly 20 to prove the negative in the face
years of war and 10 years of
sanctions and isolation. Little
attention appears to have been
paid, for example, to collecting
information on the oil-for-food

with considerable effort. It may
also reside in the minds of groups
of assumptions that it is dissem-
bling. Overall, the Intelligence
Community did not acquit itself
well in developing collection
strategies on Iraq.
program. Considerable specula- of people who are accessible but
tion was voiced that several not easily approachable and who
countries and individuals were do not fall into the category of Analysis Adversely Affected
profiting from this program. controlled agents. Although there
Despite the fact that many of the is a strong argument that the No single act of omission or com-
targets for this subject were out- clandestine service should not mission accounts for the inconsis-
side Iraq, it received only spo- divert its attention away from tent analytic performance of the
radic attention. collecting secrets, information Intelligence Community with
on the stresses and strains of regard to Iraq. It appears to be
Although collection itself was a society may be equally, if not the result of decisions made, and
problem, analysts were led to more, important. This type of not made, since the fall of the
rely on reporting whose sourcing information, however, does not fit Soviet Union, which had an
was misleading and even unreli- with the reward system in the impact on the analytical environ-
able. In the case of US clandes- collection world and can be diffi- ment analogous to the effect of
tine reporting, it too often used cult to fully assess and to inte- the meteor strikes on the dino-
different descriptions for the grate with other information. saurs. Nothing was the same
same source, leading analysts to afterwards. In response to
believe they had more corrobora- In the case of Iraq, collection changed priorities and decreased
tive information from more strategies were weak and resources, the Intelligence Com-
sources than was actually the unimaginative and failed to get munity's analytic cadre under-
case. In addition, some critical the richness and density of infor- went changes in both its
judgments were made on the mation required. A careful exam- organization and its methodologi-
basis of intelligence provided by ination might have addressed the cal orientation. Perhaps the most
foreign intelligence services. long-neglected question of the significant change was the shift
Some of those liaison sources value added by the different away from long-term, in-depth
were not available to the US, and types of intelligencee.g., SIG- analysis in favor of more short-
some key information obtained INT and IMINTrelative to the term products intended to pro-
from liaison proved to be false. resources devoted to them. Col- vide direct support to policy.
lection on Iraq also was the vic- Done with the best of intentions,
The Intelligence Community tim of inadequate funding and this shift seems to have had the
knows how to collect secret infor- too intense competition between result of weakening elements of
mation, even though in the Iraq top priority targets. Finally, Iraq the analytic discipline and rigor
situation it did not perform this demonstrates that collection that characterized Intelligence
function well. On the other hand, strategies must take into account Community products through the
the acquisition of softer intelli- that the absence of dangerous Cold War.
gence on societal issues, person- activity in a targeted country
alities, and elites presents an cannot be convincingly demon- The kind of intellectual-capital-
even greater challenge. This lat- strated in the presence of a secre- intensive analysis that tradition-
ter information can be found in tive and devious regime. Or, put ally and effectively preceded pol-
databases, but they are too often differently, collection strategies icy deliberations was unavailable
only accessible indirectly and should recognize the extreme dif- because of the shift away from

Studies in Intelligence Vol. 49, No. 3 51


Postmortem


No intelligence
product or thread
called into question
research-oriented analytic invest- both the validity and standing of
ments. In reviewing the national the quality of basic finished intelligence products
intelligence products associated assumptions. seem to have been ineffective in
with Iraq, we found that they too identifying key issues affecting
often dealt, seriatim, with a
broad range of subjects but with-
out extensive cross-reference,
and with no attempt to synthe-
size a broader understanding of

did not seem to provoke internal
review within the Intelligence
collection and analysis. Allowing
for a satisfying sense of volumi-
nous production, and reflecting
the approval of receptive consum-
ers, the policy-heavy process pro-
Iraq out of the many detailed vided positive feedback, while the
Community. Indeed, although
pieces that were prepared. The narrowly focused internal archi-
certain gaps were acknowledged,
absence of such a contextual tecture lacked the self-awareness
no product or thread within the
effort contributed to assessments that could otherwise have raised
intelligence provided called into
that failed to recognize the signif- serious and timely warnings.
question the quality of basic
icance of gaps in collection that
assumptions, hastening the con-
may have been more evident
version of heavily qualified judg-
when viewed from a larger per- Interaction with the Policy
ments into accepted fact.
spective. Community

The absence of a unifying analy- As noted earlier, the growing use Few issues have engaged greater
sis was also disguised by the of centers also contributed to policymaker interest in intelli-
rapidity and volume of interac- what was at best a problematic gence than those concerning
tions between intelligence and result. The Intelligence Commu- Iraqparticularly the questions
policy deliberations. Eagerly nity has generally considered of weapons of mass destruction
responsive to quickly developed centers a useful organizational and Saddam's links to al-Qaida.
policy requirements, the quick concept to concentrate analytic The demands for intelligence in
and assured response gave the and collection capabilities the months leading up to the war
appearance of both knowledge against a carefully defined tar- were numerous and intense. The
and confidence that, in retro- get set or issue. They also have Intelligence Community
spect, was too high. the effect, however, of drawing responded to the overwhelming
resources away from more consumer demand with an ever-
Of all the methodological ele- broadly based organizations. The increasing stream of analysis
ments that contributed, posi- post-Cold War reductions both written and oral. Neither
tively and negatively, to the throughout the Intelligence Com- means of communication, how-
Intelligence Community's perfor- munity made this a critical but ever, served the policy commu-
mance, the most important seems insidious factor. Analysis of Iraq's nity as well as it might have.
to be an uncritical acceptance of weapons of mass destruction
established positions and thus became the purview of tech- In periods of crisis, when
assumptions. Gaps in knowledge nically competent analysts, but demands are high and response
were left undiscovered or unat- as has been described elsewhere, time is short, most written intel-
tended, which to some degree is their efforts were not leavened ligence production is in the form
explainable by the absence of through review by more broadly of policy-driven memos and briefs
pervasive, intrusive, and effec- based colleagues. and pieces written for daily
tive collection in Iraq. Although publications. The result of this
many products were appropri- Finally, quality control was weak- narrowly focused and piecemeal
ately caveated, the growing need ened. The extensive layers of criti- intelligence flow is that it
to caveat judgments to explain cal management review that neither fosters continuity of anal-
the absence of direct intelligence traditionally served to ensure ysis nor provides a context within

52 Studies in Intelligence Vol. 49, No. 3


Postmortem


Too close association
with policy
deliberations can be
which to place seemingly unre- in the run-up to the war consti-
lated information. In the case of troublesome. tuted inappropriate pressure on
Iraq, national intelligence did not intelligence analysts. Although
provide a comprehensive picture
of how the country functioned as
a whole. The Intelligence Com-
munity has made substantial,
although sporadic, efforts over

mixed bag of analytic product.
Consistent application of ana-
viewed in that context as a prob-
lem, serious pressure from policy-
makers almost always
accompanies serious issues. The
more relevant issue is how the
the past decade and a half to lytic or evidentiary standards Intelligence Community responded
explore better and more techno- became next to impossible. to the climate of policy-level pres-
logically advanced methods of sure and expectations. Whether or
communicating with consumers. The fundamental question is not this climate contributed to the
The results, however, have been whether national intelligence problem of inconsistent analytic
modest at best. The requirement estimates add value to the exist- performance, however, remains an
to have background and contex- ing body of analytic work. Histor- open question.
tual information available at the ically, with few exceptions, NIEs
policymaker's fingertips in a have not carried great weight in The cases of WMD and Iraq's
timely fashion remains unful- policy deliberations, although links to al-Qaida illustrate two
filled. customers have often used them different responses to policy pres-
to promote their own agendas. sure. In the case of al-Qaida, the
The policy community was also ill The time may have come to reas- constant stream of questions
served by the national intelli- sess the value of NIEs and the aimed at finding links between
gence estimate (NIE) process. process used to produce them. Saddam and the terrorist net-
NIEs rarely represent new analy- work caused analysts to take
sis or bring to bear more exper- Oral communications have their what they termed a purposely
tise than already exists in own set of problems. While direct aggressive approach in conduct-
analytic offices; indeed, drafters engagement with the policy com- ing exhaustive and repetitive
of NIEs are usually the same munity is essential for intelli- searches for such links. Despite
analysts from whose work the gence to have an impact, too close the pressure, however, the Intelli-
NIE is drawn. Little indepen- association with policy delibera- gence Community remained firm
dent knowledge or informed out- tions can be troublesome. In the in its assessment that no opera-
side opinion is incorporated in case of Iraq, daily briefings and tional or collaborative relation-
estimative products. The prepa- other contacts at the highest lev- ship existed. In the case of Iraq's
ration of an NIE therefore con- els undoubtedly influenced pol- possession of WMD, on the other
sists primarily of compiling icy in ways that went beyond the hand, analytic judgments and
judgments from previous prod- coordinated analysis contained in policy views were in accord, so
ucts and debating points of dis- the written product. Close and that the impact of pressure, if
agreement. The Iraqi WMD continuing personal contact, any, was more nuanced and may
estimate of October 2002 was unfettered by the formal caveats have been considered reinforc-
characterized by all of these that usually accompany written ing. Although it is possible that
weaknesses and more. It was production, probably imparted a in the absence of strong policy
done under an unusually tight greater sense of certainty to ana- interest, analysts would have
time constraintthree weeksto lytic conclusions than the facts been more inclined to examine
meet a deadline for congres- would bear. their underlying assumptions, it
sional debate. And it was the is unlikely that such examina-
product of three separate draft- Some in the Intelligence Commu- tion would have changed judg-
ers, each responsible for indepen- nity and elsewhere hold the view ments that were longstanding
dent sections, drawing from a that intense policymaker demands and firmly held.

Studies in Intelligence Vol. 49, No. 3 53


Postmortem


US intelligence must
reveal itself as
sufficiently mature to
Final Thoughts vided. Decisions were made and
adapt . . . The their potential risks weighed, but
The intelligence world is one of alternative is the outcome on important issues
ambiguity, nuance, and complex- unthinkable. proved badly flawed. Recognition
ity. Dealing with these elements of these problems must bring a
is difficult in the world intelli-
gence serves, where success or
failure is the uncomplicated
measure by which the Intelli-
gence Community is judged. The

enormous efforts undertaken,
rapid response.

US intelligence is a robust,
highly capable, and thoroughly
motivated community that rep-
controversies over Iraq intelli- the long hours and the intense resents an invaluable asset to
gence can be expressed in the debate. On the other hand, it the nation and its citizens. It
contrast between these two describes failures and weak- must reveal itself as suffi-
worlds: carefully crafted nesses that cannot be ignored or ciently mature to both adapt to
national intelligence that ulti- mitigated. changing circumstances and
mately failed in its singular mis- counteract the evolutionary pro-
sion to accurately inform policy Failures of collection, uncritical cesses that have conspired to
deliberations. This report, the analytical assumptions, and threaten its reputation and its
result of over two years of inadequate management reviews ability to successfully perform
review and consideration, were the result of years of well- its assigned mission. The alter-
reflects the same contrast. On intentioned attempts to do the native is unacceptable and
the one hand, it recognizes the best job with the resources pro- unthinkable.

54 Studies in Intelligence Vol. 49, No. 3


Connecting the Virtual Dots

How the Web Can Relieve Our Information


Glut and Get Us Talking to Each Other
Matthew S. Burton
In June 2005, the Director of in comparison to the Web we use
National Intelligence issued a at home. As a technology enthusi-
call for submissions for the sec- ast with seven years of Web
ond Galileo Awards contest. development experience, I was
Intelligence professionals are appalled that the rest of the
invited to offer innovative ideas to world had access to better online
shape the future of US intelli- tools than did the US national


gence. The program is designed to security structurethe very cre-
tap into the wealth of talent and ator of online. Our search
ideas that reside at all levels of engines return results reminis-
I had thought the IC seniority and responsibility in the cent of the pre-Google Web. Our
would be an IT Intelligence Community. online personnel directories are
wonderland . . . The useless. Agencies and combatant
reality was a colossal Two articles from among the top commands use a hodgepodge of
letdown. entries in last years inaugural incompatible discussion and chat
running of the program modi- tools, furthering our tendency to


fied slightly and updatedare speak only with those in our own
included in this issue of Studies, buildings.
beginning here.
Why is the Web so much more
***
user-friendly than Intelink? Did
the late-1990s Silicon Valley boom
When I joined the Defense Intel-
propel private industry ahead of
ligence Agency as an analyst in
the government? Do our unique
January 2003, what excited me
security requirements make great
most was the opportunity to use
tools inaccessible to us?
the Intelligence Community's
proprietary technology tools. If
the public has access to the The answer is much simpler. The
amazing capabilities of the World Web is user-friendly because its
Wide Web, I thought, the Intelli- users control its content.
gence Community (IC) must be a Intelink's pages are published by
wonderland: search engines that technicians who neither use the
could read my mind, desktop system for research nor under-
video conferencing with team- stand its content. The Webs 900
mates around the world . . . . million users can instantly say
whatever they like in their own
The reality was a colossal let- personal publishing space; on
down. Intelinkthe network that Intelink, content is restricted to
was designed to negate the physi- what our agencies call official
A former Defense Intelligence cal distance that separates intel- products, and several layers of
Agency analyst, Matthew S. ligence agencies and their supervisors, systems administra-
Burton is currently pursuing a
customersseems anachronistic tors, and Web programmers
graduate degree.

Studies in Intelligence Vol. 49, No. 3 55


Networking


The Web makes
geography
meaningless . . . But
stand between intelligence offic- write to Jim or Pattyeven if
ers and their online world. geography is those arent their real names
everything on Intelink. than to an indecipherable office
We should not replace the exist- acronym or a generic e-mail
ing method of online publication,
but rather supplement it with a
community of users. Giving
Intelink users the push-button
publishing technology they have

agencies and offices, not of the
people who wrote them. Corpo-
address? I know I would. But, if
given more choices, I would
largely avoid e-mail, which is fast
becoming as pass as a dial-up
modem.
at home would bring them
rate logos and office symbols are
together and also organize the
much more common than authors E-mail is Dead
systems information more neatly.
phone numbers and e-mail
There is no reason why our at-
addresses. Our electronic person- While the IC has slowly incorpo-
home information services should
nel directories are so cumber- rated e-mail over the past
surpass those in our offices. We
some and outdated that it decade, it is approaching obsoles-
can make Intelink just like the
sometimes seems as if their keep- cence in the outside world. Ever
Web. All we need is permission.
ers dont want us to speak to one since the Defense Department
another. Is the goal of our intra- gave the Internet to the public,
net to keep intelligence officers as its outside-world users have run
Intelinks Impersonal Touch
anonymous as possible? circles around us, creating count-
Interagency cooperation is proba- less new tools while we slowly
bly the ICs most talked-about It is true that in our work, ano- lurch forward. It is a shame that
deficiency. I believe that most of nymity can be imperative. But it US security structureswhich
us want to work with one another. is possible to preserve our ano- used to be the gold standard of
Intelligence analysts, while intro- nymity while maintaining a per- electronic communication with
verted, arent incapable of build- sonal online presence. Anonymity inventions like e-mail (in 1971)
ing trusting relationships with has not kept the Web from estab- are now lagging behind the lat-
coworkers. Those relationships, lishing incredibly close-knit com- est innovations.
however, are predominantly with munities, where many members
people down the hall, while the never show their faces or use Aside from spama crippling
people we should be talking to their real names. Some of these problem that does not threaten
most are either across the Belt- communities are more congenial Intelinke-mail has several defi-
way or on the other side of the and cooperative than are the ciencies that restrict communica-
world. The physical distance neighborhoods we live in. Why? tion:
between us makes cross-Commu- Because people behave on the
nity communication too difficult. Web as peoplethe electronic It is clumsily organized and dif-
buffer zone allows for an honesty ficult to search.
The Web makes geography mean- that is hard to find in the physi-
cal world. With fewer inhibi- It makes group discussions
inglessusers can quickly find
cumbersome.
and meet new people who share tions, people write in their own
their interests, regardless of their voice about their own ideas. Com-
It comes across too much like
location. But geography is every- munication on the Web has a per- official communication and too
thing on Intelink. Intelink is more sonal touch. Instead of formal little like personal dialogue.
like an oligarchy of agencies than documents with generic e-mail
a community of individuals with addresses, readers get unfiltered It restrains the raw thoughts
shared interests. Our documents words written in natural lan- of corporate users. Since e-mail
are presented as the products of guage. Wouldnt we all rather is a written, recorded, and

56 Studies in Intelligence Vol. 49, No. 3


Networking


Broadcasting a blog
has a big advantage
over point-to-point
traceable medium, users too The IC desperately needs this
often treat messages as official e-mail. kind of attitude. There are multi-
communication instead of ple cases in which it would have
personal dialogue, for fear of
retribution.

It shuts out interested parties


from discussions that are not

Definition: A blog (a contraction
of Web log) is an online journal
been useful for customers to hear
analysts unfiltered opinions,
which are often substantially
diluted by the time they finally
make it to Intelink.
necessarily private. When we maintained by a single or multiple
send an e-mail, we make the writers. Readers can respond to a
assumption that the recipients Broadcasting a blog has another
blog entry with their own
care what we have to say and big advantage over a point-to-
comments, which will then be
that nobody else does. visible to other readers as well, like
point e-mail conversation: It lets
a public chalkboard. Because blogs previously unknown people par-
E-mail has its place. When corre- require so little technical ticipate in the dialogue. After two
spondence is truly private, it is knowledge, millions of people once years in the IC, I have probably
the best electronic option. But hindered by a lack of know-how are met fewer than half of the doz-
many times, broadcasting a mes- now contributing to the Web ens of people who share my ana-
sage is better than point-to-point instead of just reading it. Some of lytical focus, mainly due to our
communication. these previously unheard-of poor directories and the scarcity
writers have become powerful of personal information on offi-
voices in politics, media, and cial products. If we all had our
technology.
If Not E-mail, Then What? own homes on Intelinkblog
siteswe would be much more
usually groan when it shows up
If I had arrived in the IC two visible to people trying to reach
in our inbox. How dare he waste
years ago to find no e-mail us.
my time and hard-disk space
access, I would have been
with this? We victims of poor e-
appalled. But in a few years, our And visitors to our blogs wouldnt
mail etiquette dont want to be
new employees will think of e- just read. Blogs allow readers to
seen as the annoying uncle, so
mail as an outdated technology. contribute to the discussion by
before we send e-mails, we self
They'll be asking: Where's my adding their own comments to a
censor, taking into account our
blog? writers posts. Do you have a
addressee's possible reaction:
Will he think Im stupid? Will he question to which someone out
A blog lets ordinary computer delete this in disgust? Maybe I there is bound to know the
users with average technical should remove this sentence. answer? Blog the question and
knowledge instantly publish on wait for someone to come across
the Web. Since blogs came along A blog is different. Its our own it and post an answer. Do you
two years ago, 9 million people space. Readers have the option of have thoughts on an intelligence
have started their own, many of viewing it every day or com- product? Write them down and
them at no cost. Most authors are pletely ignoring it, but whatever let the rest of your community
just looking to keep friends and they do, were not necessarily lia- know what you think; then watch
family updated without overload- ble for their reaction. Were not as your counterparts contribute
ing their inboxes. telling them that they have to their own opinions.
read it, so if they dont like it, we
This nonintrusive publication arent to blame. This gives us If the IC used blogs, analysts, col-
method lets writers say what freedom to speak our minds. lectors, and customers could hold
they really think. We all have impromptu discussions at any
that uncle who forwards every time, instead of having to sched-
terrible joke he finds online. We ule meetings weeks in advance.

Studies in Intelligence Vol. 49, No. 3 57


Networking


Google judges a page
by the company it
keeps.
And when the time came for such Google changed all that in 1998.
meetings, those present would Instead of looking only at a page's
already have a solid foundation
for discussion instead of having
to spend time learning the
names, roles, and interests of
those involved. Intelink has the

became impossible to find a cate-
gory for every single page and to
content, Google judges a page by
the company it keeps, so to speak.
It does this through link analysis.
When Site A links to Site B, Site
A is essentially vouching for the
potential to be a place where fit each page into a single cate- quality of Site B. As more pages
groups of intelligence officers gory. Instead of making Web link to Site B, its reputation is
from around the world can speak users wander through a maze of improved in the eyes of Google.
freely and substantively on a The content on the linking pages
categories, it started to make
daily basis. Such continuous, can- also matters. If NBA.com links to
did dialogue is the only way to more sense to let them search for your site with the word basket-
forge relationships of trust in an an item directly. ball, Google will forever associ-
industry where people are ate your site with basketball
trained to be distrustful. Unfortunately, search engines and because NBA.com is consid-
were not very good, because a ered authoritative, its link to your
user's search terms were the only site will do wonders for your Pag-
The Google World eRank, Googles value-rating of
factor that determined search
your page.
The reason the Web feels com- results. Engines could not tell
fortable to its users is the same whether a page was reputable or
The Web is so named because the
reason that its search engines even coherent. For example, a 8 billion pages that link to one
are so efficient. Back in the mid- page with nothing but a user's another form a massive web of
1990s, Yahoo! was the place to search term repeated over and connected dots. But what looks
find Web pages. Yahoo! sorted the over was considered a perfect like a mess has logic to it: Pages
Web into categories. The Web had match. with similar content link to one
about 100-million pages then,
and most of them were on mas-
sive sites like those of media
organizations and corporations.
Over half of all Web traffic went
to the top 1,000 sites. 1 Any site
that mattered fit neatly into a
Yahoo! category.

As individual users started mak-


ing their own pages, however, the
amount of Web content bal-
looned, and Yahoo! fell behind.
The Web began to cover a seem-
ingly infinite number of topics. It

1 The statistic is from an internet data

firm called Alexa Internet It was cited in


Internet World on 31 August 1998. See:
http://www.netvalley.com/
intvalstat.html.

58 Studies in Intelligence Vol. 49, No. 3


Networking

another. Google has faith that sources that it is based upon. We those documents. But we have
when Web-page authors make are forced to take the authors very few of these links. Instead,
links, theyre connecting them to word for it. If there is any indus- Intelink is more of a tree than a
sites similar to their own. And, in try that should make its sources web: Similar pages lie at opposite
general, they do. Google can readily available to readers, it is edges of the tree, separated by a
therefore make extremely accu- ours. Instances where such infor- thicket of trunk and limbs. Search
rate estimates of which sites are mation would have averted disas- engines read this as a lack of simi-
related to one another and which ter are numerousthe most recent larity between the pages. Without
sites provide reliable information. and embarrassing case coming two more direct links between similar
years ago, when the claims of mul- pages, Intelinks search engines
tiple sources regarding Iraqs will continue to deliver poor
Intelink is No Google weapons programs turned out to results.
be those of a single person.
Intelink is different. As I men- Blogs Can Change Things
tioned earlier, intelligence prod- But while poor linking practices
ucts are presented for customers make Web browsing hard for How will giving individual users
rather than for analysts conduct- humans, they pose an even big- their own posting space change
ing research. While pages on the ger problem for search engines. the linkage problem? First,
public Web lead you from one Remember how Google associated giving us free rein over content
resource to the next via links to an aforementioned page with bas- would rid Intelink of its
related content, Intelink products ketball simply based on links from hierarchical structure. The mess
do not. You will not find a CIA other pages? Cross-Community you see in Figure 1 is a good
assessment that links to source links would allow our search thing. Second, because users are
documents from NSA, even though engines to find relationships the same people who write the
the assessment makes multiple between documents and to under- content, they are in a unique
references, implicit or explicit, to stand the content and quality of position to give it a good online
those sources. Instead, most links
simply move up or down within a
hierarchy. For example, a product
links to the page of the office that
produced it, which in turn links to
the directorate it lies under, which
links to other directorate offices
and the parent agency. The lack of
cross-Community links makes
Intelink look much like our indi-
vidual agencies organizational
charts. There is nothing inherent
in Intelink that makes it this way.
The Intelink Management Office
(IMO) does not dictate content.
This is just the way things are
done.

The lack of substantive linkages


has obvious human implications. If
we question a product's assess-
ment, we cannot delve into the

Studies in Intelligence Vol. 49, No. 3 59


Networking


Logical dots are easier
to connect if the virtual
ones are already
home. Analysts and collectors gathering information on their
understand their information connected. users interests. This is hard to
better than Web programmers do in the public world.
and technical editors, so we know
what links to place where. And
because the quality of a personal
home page would reflect upon its
owner, we would have motivation

others know, making the puzzle
much easier to solve. The moral
Corporate intranets like Intelink,
however, have an advantage. All
IC employees consent to having
their computer actions moni-
to see that our pages provide is that logical dots are easier to tored. This means that every Web
good information for readers. connect if the virtual ones are page we read and every e-mail
already connected. we write could be used to create a
A web-like structure would take profile of our interests. Intelink
some time to realize, but the ben- In the opening paragraph of this search engines would then be
efits would be enormous. Imag- article, I mentioned that I had able to automatically weed out
ine having tools that could spot expected search engines that reams of information they knew
emerging patterns for you and could read my mind. This proba- we didnt want, helping to ease
guide you to documents that bly elicited some laughs. But it is the information overload that has
might be the missing pieces of not far-fetched. Many e-com- burdened the IC in recent years.
evidence youre looking for. Ana- merce sites do this already. Ama-
lytical puzzles, such as terror zon.com, for example, customizes
plots, are often too piecemeal for its home page for each person Conclusion
individual brains to put together. depending on his or her past pur-
Having our documents aware of chases. One of Google's stated Stronger professional relation-
each other would be like hooking goals is to know what users are ships and better search capabili-
several brains up in a line, so looking for before they start typ- ties would be the two greatest
that each one knows what the ing. How can they do this? By rewards of personal home pages,

Three Cheap, Simple Technologies Intelink Needs Now

del.icio.us (pronounced "delicious"): Among the WMD Commission's recommendations was an IC-wide
directory of personnel and their skills and clearances. But the details of an intelligence officer's
responsibilities are much too granular to be confined to a phone book entry. A better way to learn about a
person's job is to look at what he's been reading and writing. del.icio.us lets you maintain a public list of
bookmarks so that others can see what your interests are. Similarly, you can discover who has bookmarked
a given page, making it easy to find people who share your interests. The site is maintained by a single
person and has about 30,000 users. See: http://del.icio.us.

RSS: RSS is a public standard for tracking your favorite blogs. Because entries are published on the Web
instead of delivered like e-mails, you have to periodically check those blogs for new entries. This is very
time-consuming. RSS "readers" track your favorite blogs and automatically retrieve new messages for
display in an Outlook-like interface. The Intelink Management Office has deployed a Web-based RSS
reader, but it is relatively unknown, and its existence as Web-based software makes it difficult for some
agencies' systems to run properly.

Technorati: With 9 million blogs on the Web, the "blogosphere" is messy. Technorati sorts out the good
from the bad for you. Because blogs have a built-in referral system, Technorati can instantly show you the
most authoritative bloggers on a given subject. During the next crisis in a lesser-known country, search for
the country name at technorati.com and you'll be shown the blogs of expatriots giving up-to-the-minute,
on-the-ground updates. Technorati also points you to the day's most blogged-about topics.

60 Studies in Intelligence Vol. 49, No. 3


Networking


Managers should not
see blogging as
haphazard
both of which would take time to Community communication have
realize. But there would be intelligence or dilly- failed due to competing stan-
smaller, more immediate bene- dallying. dards and incompatibility with
fits as well. Analysts would be agency-level network configura-
able to provide supporting docu-
mentation for their products
something that is usually lost in
the editing processgiving coun-
terparts and customers as much

given soapboxes. This article is
drawn from a paper submitted to
tions.

Once blogs have been deployed,


managers must encourage their
employees to use the new tech-
backup information as they want. last years inaugural Galileo nologies. They should not see
Authors of assessments whose Awards program, which solicited blogging as a waste of time, dilly-
information has become out- innovative ideas from the Com- dallying, or haphazard intelli-
dated could amend those assess- munity. Before then, many bril- gence. Instead, they should view
ments as situations change. liant ideas were probably lost due it as a venue for brainstorming
Veteran officers could use their to the lack of an audience. Why and relationship building. Active
space to archive their thoughts let good ideas vanish? offices will see the benefits. Their
before they retire, preserving staffs will be in the vanguard of
institutional knowledge. The Intelink Management Office establishing strong working rela-
is now testing Weblogging tools, tionships with other agencies and
Finally, intelligence officers but success is not guaranteed. offices, reaping the benefits of
would no longer be bound by defi- The IMO must choose a tool that increased contacts and access to
nitions of what is and what is not early adopters will find familiar. information. Their intelligence
an intelligence product. Right Some tech-savvy intelligence products will accommodate cus-
now, the contents of Intelink rep- officers already use such soft- tomers desire for details. And
resent only a small fraction of the ware at home, and the best way their work areas will become
ICs collective knowledge. Our to gain their support is by giving more vibrant atmospheres that
brains are full of hunches and them something theyre already buzz with new ideas.
half-formed ideas that, while used to. Once a decision is made,
unsuitable for finished intelli- systems managers across the IC Finally, users must embrace the
gence, could have an impact on must fully support the chosen new technology. Early adopters
the thinking of other analysts software. Too many technology who love experimenting with
and policymakers if we were tools designed to increase cross- technology are key. If you are one
of these people, you have the
chance to become the envy of
Suggested Reading
your colleagues by radically
The Cluetrain Manifesto: The End of Business As Usual, by increasing your visibility and
Christopher Locke, Rick Levine, Doc Searls, David Weinberger. productivity. Your success will be
this program's best marketing
Small Pieces, Loosely Joined, by David Weinberger. tool.

Emergence: The Connected Lives of Ants, Brains, Cities, and Software, Over the past four years, policy-
by Steven Johnson, especially Chapter 3, The Pattern Match. makers and the press have end-
lessly underscored the need for
Smart Mobs: The Next Social Revolution, by Howard Rheingold. Intelligence Community agen-
cies to work more closely
News Turns from a Lecture to a Conversation, by Jay Rosen, at
together. Few of us in the IC can
http://journalism.nyu.edu/pubzone/weblogs/pressthink/2004/12/29/
tp04_lctr.html. say they are wrong. But even
fewer of us can say we have the

Studies in Intelligence Vol. 49, No. 3 61


Networking


If these tools are good
enough to help a whole
world communicate,
necessary tools for doing so. The people communicateeveryone
Commission on the Intelligence
we should see what from hermitic techies to senior
Capabilities of the United States everyone is raving citizensthen they are good
Regarding Weapons of Mass about. enough for us. We should see
Destruction understood this what everyone is raving about. 2
problem and recommended the
creation of new technologies to
aid IC communication. What it
did not understand is that such

computers. If these tools are good 2 The author can be reached at:

tools already exist on our home enough to help a whole world of matt@alumni.duke.edu.

62 Studies in Intelligence Vol. 49, No. 3


The Wiki and the Blog

Toward a Complex Adaptive


Intelligence Community
D. Calvin Andrus
US policymakers, war-fighters, This compression is not just a
and law-enforcers now operate in preferred work style within the
a real-time, worldwide decision US national security community.
and implementation environ- It is characteristic of the way the
ment. Information about a new world works in the 21st century.
development in Baghdad is Thus, not only do we respond
known in Washington within more quickly, but also the cir-


minutes. Decisions about a cumstances to which we
response are made in Washing- respondin and of themselves
ton within minutes. These deci- develop more quickly. These rap-
We must transform the sions are implemented in idly changing circumstances take
IC into a community Baghdad within minutes. The on lives of their own, which are
that dynamically total intelligence-decision-imple- difficult or impossible to antici-
reinvents itself . . . as mentation cycle time can be as pate or predict. The US national
the national security short as 15 minutes. While this is security communityand the
an extreme example, it high- Intelligence Community (IC)
environment changes. within itis faced with the ques-
lights the tremendous compres-
tion of how to operate in a secu-


sion of the response time
required by all involved com- rity environment that, by its
pared to previous generations. nature, is changing rapidly in
This severe compression not only ways we cannot predict. A sim-
affects the highest priority ple answer is that the Intelli-
gence Community, by its nature,
issues, but also ripples back into
must change rapidly in ways we
the most routine intelligence,
cannot predict.
decision, and implementation
processes.
Wrong Way, Right Way
It does so for good reason. The
compressed response cycle gives What was that? How can we
the United States significant change ourselves in ways we can-
strategic and tactical superiority not predict? More directly, how do
over our adversaries. Our we modify our nature to enable
national security is best pro- such unpredictable changes?
tected when we operate more Before giving the right answer,
quickly than those who would do there is a wrong answer that can
harm to our people and our free- be dismissed up frontreorgani-
dom. This compressed response zation. Any reorganization by its
time allows us to disrupt, inter- nature is both predictable and
dict, preempt, and respond to slow. By the time any particular
injurious efforts before our adver- reorganization has taken effect,
Dr. D. Calvin Andrus serves in the saries can achieve their goals the causes that spawned it will
CIAs Directorate of Support. against us. have been replaced by new and

Studies in Intelligence Vol. 49, No. 3 63


Wiki and Blog

different causes. The reorganiza-


tion is thus not suited to address
these new and different causes. All
major restructurings are based on
the assumption that we can take
the recent past and predict the
future. Such assumptions may
have been reasonable in previous
centuries, but not in this one.

The only way to meet the contin-


uously unpredictable challenges
ahead of us is to match them
with continuously unpredictable
changes of our own. We must
transform the Intelligence Com-
munity into a community that
dynamically reinvents itself by
continuously learning and adapt-
ing as the national security envi-
ronment changes. Unless we, in This graphic depicts the six characteristics of a complex adaptive system. From sim-
the IC, allow ourselves this abil- ple, self-organized personal relationships emerges complex adaptive behavior. Infor-
ity to change, we cannot hope to mation from the external environment enters the system and impinges on the
fulfill our mission to insure relationships as either positive or negative feedback. The personal relationships are
changed and the complex behavior adapts.
domestic tranquility, provide for
the common defense, and secure
the blessings of liberty for our fel- exhibit the characteristics individual geese flying. The
low citizens from those who aim described by Complexity Theory group behavior is distinct from
to deprive us of these values. are known as complex adaptive the individual behavior.
systems. The six critical compo-
nents of a complex adaptive sys- Relationships. Individuals look at
Complexity Theory tem are: their nearest neighbors to try to
figure out what is happening so
To describe a community that Self-organization. Individuals they can make decisions. For
dynamically reinvents itself by (people, ants, chemicals) decide to example, House Speaker Tip
continuously learning and adapt- act in similar ways in proximity ONeil declared, All politics is
ing in response to environmen- to and in concert with each other, local. By this, he meant that
tal changes harks to theoretical for their own reasons. For exam- people vote for national leaders
developments in the philosophy ple, two boys independently on the basis of what is happen-
of science that matured in the shooting hoops decide to go one- ing in and around their homes. It
1990s collectively known as Com- on-one to 20 points. A critical doesnt matter what the national
plexity Theory. 1 Systems that mass of individuals is required unemployment rate is; it only
for self-organization to happen. matters what the local unemploy-
ment rate is.
1See Roger Lewin, Complexity: Life at the
Edge of Chaos (New York: Macmillan,
Emergence. The whole is greater
1992) and Steven Johnson, Emergence: The than the sum of the parts. For Feedback. Information circu-
Connected Lives of Ants, Brains, Cities and example, 12 canadian geese fly- lates, is modified by others, and
Software (New York: Touchstone, 2001). ing in a V is more than just 12 then comes back to influence the

64 Studies in Intelligence Vol. 49, No. 3


Wiki and Blog


Intelligence officers
must be enabled
to act more on their
behavior of the originator either empowered to make their own
as a positive (amplified) or nega- own. purchases, individual ants in a
tive (dampened) influence. For colony can decide which task to
example, an ant crosses a phero-
mone trail it previously laid
down. The ant says to itself, Ive
already been here, so Id better
wander somewhere else. It is

kids adapt by fighting over who
perform, and military units are
able to choose battlefield tactics
in real-time, so, too, intelligence
officers must be allowed to
reactin independent, self-orga-
also important that the histori- made which mess. In the ruckus, nized waysto developments in
cal memory of the system be part they knock over a shelf that the national security environ-
of the feedback (amplifying or breaks one childs arm. The dad ment.
dampening) loop. did not predict that he would be
going to the emergency room by Intelligence officers must be more
Adaptability. The system is open offering ice cream to the children. expert in tradecraft. It is this
so that information (and/or expertise that engenders the trust
energy) flows in and out. New required for independent action.
information enters into the feed- Application to Intelligence Military units know the rules of
back loops and influences the engagement and are thus
behavior of the individuals, and The objective that was identi- entrusted to engage in battle. Ants
thus the overall behavior of the fied at the outset of this article have a hardwired rule set, which
system adapts to the external was that the Intelligence Com- enables the colony. Cities are built
environment. For example, think munity must be able to dynami- on the rules that govern property
of a group of kids engaged in cally reinvent itself by deeds, titles, and liens. Expertise
unsupervised play in the base- continuously learning and in tradecraft for each intelligence
ment as a self-organized system. adapting as the national secu- discipline must become a constant
When the dad opens the base- rity environment changes. Com- quest for each officer.
ment door and yells everyone plexity Theory tells us that we
gets an ice cream cone when the can only achieve this objective if Intelligence officers must share
toys are picked up and closes the several conditions exist. much more information. Just as
door, he adds new external infor- Enabling these conditions will military units in the field must
mation into the system. The kids be a big change for the IC, but if know where other units are
adapt to the external influence we are serious about succeeding located in geographic space,
by stopping play and putting the in improving ourselves, it is intelligence analysts must know
toys away. Systems that are con- imperative that these changes where their colleagues across
tinuously open to new informa- be made. the Community are located in
tion from the environment and intellectual space. This knowl-
circulate the information within edge results from sharing infor-
Intelligence officers must be
the system will continuously mation. Information-sharing
enabled to act more on their own.
change in response. among individuals allows mar-
Just as people in a market are
ket niches to be filled, ants to
Non-Linearity. Small changes in fend off predator attacks, and
the initial conditions or external 2 Edward N. Lorenz, Predictability: Does plants to distribute themselves
environment have large (unpre- the Flap of a Butterflys Wings in Brazil in the ecosystem. Increased
dictable) consequences in the out- Set off a Tornado in Texas? A talk given information-sharing among
in 1972 to the 139th meeting of the Amer-
comes of the systemalso known ican Association for the Advancement of
intelligence officers will allow
as the butterfly effect. 2 For Science, as found in Lorenz, The Essence these officers to self-organize to
example, when the dad yells of Chaos (Seattle: The University of Wash- respond in near-real-time to
down the stairs for ice cream, the ington Press, 1993), 18184. national security concerns.

Studies in Intelligence Vol. 49, No. 3 65


Wiki and Blog


A new generation of
Internet tools allows
people to self-organize
Intelligence officers must receive 2004 edition of the 32-volume
more feedback from the national around shared Encyclopedia Britannica contains
security environment. The only knowledge. just over 65,000 entries (store.bri-
way to learn from and adapt to tannica.com). Other wikis include
the changing national security
environment is to be in constant
receipt of feedback from that
environment. Just as zoo-raised
animals cannot compete in the

Self-organizing Tools: The
Wiki
dictionaries (en.wiktionary.org),
books (en.wikibooks.org), quota-
tions (en.wikiquotes.org), and doc-
ument collections (wikisource.org).

wild, intelligence officers clois- The Wikipedia has an interest-


tered in the Intelligence Commu- ing and innovative tradecraft,
At first blushand in the con-
nity are not adapted to or fitted or rule set, by which contribu-
text of how the Intelligence Com-
for the national security environ- tors and editors must abide. All
munity now operatesthe five
ment. content contributions are self-ini-
prescriptions seem almost ridicu-
lous, especially the two most tiated. There is no editor-in-chief.
Intelligence managers must be important ones about informa- Because all contributors are also
more persuasive about strategic tion-sharing and independent, editors, when a person notices an
objectives. Quadrennial strategic self-organized action. The good article that needs content revi-
directions are good, but these news is that technology advances sions or does not abide by the
directions must become part of in the last four years make rules, that person makes the edit.
the everyday dialog at all levels implementing such prescriptions All previous versions of the arti-
in the Community. Many intelli- easier than one might initially cle are available and all changes
gence officers, with their noses to think. are attributable. Another wiki
the grindstone, know little about rule for the encyclopedia is that
the overall strategic intelligence contributions must be facts;
There is a new generation of Inter-
objectives. One must know how explicit or implicit points of view
net tools that enable people to self-
ones own piece of work fits into are out of bounds. They are
organize around shared knowl-
the overall intelligence mosaic, edited out quickly.
edge. The first of these self-orga-
because the intelligence mosaic is nizing tools is known as wiki. It
constantly changing and, thus, is named after the Hawaiian term Beyond the normal contributor,
ones own piece must constantly wiki wiki, which means fast.3 Wiki there are privileged contributors
change to remain well fitted. tools allow any person to add con- with administrative powers. They
Intelligence managers must be tent to a Web site and any other can adjudicate disputes among
constantly communicating their person to edit the content. The contributors. The existing adminis-
constantly changing objectives. most famous implementation of trators confer such powers to a
Intelligence officers will, in turn, wiki is the Wikipedia (www.wikipe- person on the basis of the quantity
adapt. dia.com). This is an encyclopedia and quality of that persons contri-
created and edited by Internet butions. If a person disengages
From intelligence officers who users. It has been in existence from performing administrative
are allowed to share information since 2001 and now has over 1 mil- duties, the privileges are revoked.
and act upon it within a simple lion entries in over 100 different
tradecraft regime will emerge an languages. By comparison, the The rules themselves are also
Intelligence Community that con- subject to the wiki process. Any
tinuously and dynamically rein- 3 See Bo Leuf and Ward Cunningham, The
person can introduce changes at
vents itself in response to the Wiki Way: Collaboration and Sharing on any time. Disputes over the rules
needs of the national security the Internet (New York: Addison-Wesley, can be escalated to a board of
environment. 2001). administrators.

66 Studies in Intelligence Vol. 49, No. 3


Wiki and Blog


In the blogosphere,
the IC will ride
along the edge of
In sum, from the little bits of to the changing national security
work by many, many people fol- chaos. environment. The few brilliant
lowing simple rules of content ideas will survive in the market-
contribution and editing, the
most comprehensive, authorita-
tive, and bias-free encyclopedia
in the world has been produced
in four years. This is an encyclo-

in the last few years. It is called
place of ideas. As individual blogs
comment on each others ideas,
the brilliant ideas will spread as
feedback throughout the Commu-
nity. Individuals, recognizing the
pedia that is dynamically and blogging. The term comes from
brilliance, will respond. From
constantly changing in response Web log, shortened to blog. A
this self-organized response will
to the world as the world itself is blog is a journal or diary that is
kept in the public space of the emerge the adaptive behavior
changing. The lists of medals required of the Intelligence Com-
received in the 2004 Athens Internet. Individuals maintain
personal blogs on an hourly, munity.
Olympics were updated as the
events concluded. No manager daily, weekly, or some other peri-
made the assignment. No editor- odic basis. They are their own
in-chief reviewed the accuracy. It editors. Current technology A Sharing-Space
happened, as if by magic. A per- makes it easy to manage ones
son took the initiative to update blogsee www.blogger.com, for We need a space for change that
the entries and hundreds (or pos- example. Most blogs take the is not organization dependent
sibly thousands) of others form of citing a current event and
(remember, reorganizations are
reviewed the content for quality. offering a point of view about it.
not part of the solution set). We
Often one blog will cite a com-
need an independent space to
One of the Wikipedias strengths ment in another blog and com-
begin implementing the five mis-
is also a weaknessno points of ment on it. The blogosphere is
truly a marketplace of ideas. sion changes. To allow sharing
view. Much of the self-corrective and feedback, we need a space
knowledge in the Intelligence that is open not just to the Intel-
Community resides in personal Enabling intelligence officers ligence Community but also to
points of view. Currently, almost across the Community to express non-intelligence national secu-
no official outlet exists for points and share opinions may be one of rity elements. We need a space
of view in the IC. A healthy mar- the largest paradigm shifts ever with a large critical mass of intel-
ket of debatable ideas emerges for the IC. It will be uncomfort-
ligence officers. We need a space
from the sharing of points of able for some because it will be in
that is neither organizationally
view. From the ideas that pros- the blogosphere where the Com-
nor geographically nor tempo-
per in a market will arise the munity will ride along the edge of
adaptive behaviors the Intelli- rally bound. We need a secure
chaos. The blogosphere probably
gence Community must adopt in will obey the 99-to-1 Edison rule: space that can host a corporate
order to respond to the changing Genius is one percent inspira- knowledge repository. We need a
national security environment. tion and ninety-nine percent per- flexible space that supports tools
Not all good ideas originate at spirationfrom wikiquotes.com. for self-organizing (wiki), infor-
the top. For every 99 mediocre ideas, mation sharing (blog), searching,
there will likely only be one bril- and feedback. We need a place in
liant idea. A few brilliant ideas, which tradecraft procedures can
Self-organizing Tools: The however, are worth the invest- be implemented. In short, we
Blog ment of many mediocre (and cha- need a space that is always on,
otic) ones. It is these few brilliant ubiquitously distributed, and
A second self-organizing, infor- ideas that will provide the direc- secure. We need an electronic
mation-sharing tool has matured tion for the Community to adapt network. We need SIPRNet.

Studies in Intelligence Vol. 49, No. 3 67


Wiki and Blog


With a robust wiki and
blog Web space, the
nature of intelligence
SIPRNet (Secret Internet Proto- I suggest a corollary to Met-
col Router Network) is managed will change forever. calfes Law. The value of a knowl-
by the Defense Information Sys- edge-sharing Web space (wiki
tems Agency (www.disa.mil). It is
widely accessible by intelligence
officers and other national secu-
rity officers alike. It has been
deployed to every embassy and

Effecting the Transformation
and blog) grows as the square of
the number of links created in
the Web space. There is knowl-
edge not just in content items (an
intelligence cable, for example),
every military command. It is a Robert Metcalfe, inventor of the but also in the link between one
more attractive experimental Ethernet protocol and founder of content item and anothera
sharing-space than the Top 3Com, asserted that the value of link, for example, from a com-
Secret Community Network a communication system grows ment in a blog to an intelligence
(JWICS), because more intelli- as approximately the square of cable. Think of the value of a blog
gence officers access it, policy the number of nodes of the sys- that links a human source cable
community officials access it, the tem. This assertion has become to an intercept cable to an image
tradecraft (security) rules are known as Metcalfes Law. A sin- cable to an open source docu-
simpler, and it reaches more ment to an analytic comment
gle telephone or a single fax
organizations and geographic within the context of a national
machine has no communication
locations. Moreover, SIPRNet is security issue. When such links
value. Two phones have a little
designed to host the Internet- are preserved for subsequent
value. Two thousand phones have
based tools outlined above. Once officers to consider, the value of
some value. Two hundred mil-
the wiki and blog processes and the knowledge-sharing Web
lion interconnected phones are a
content mature on SIPRNet space increases dramatically.
system that has incredible com-
that is, once the IC embraces the When 10,000 intelligence and
munication value. 4
mission changes and becomes national security officers are pre-
proficient in the use of the tech- serving such links on a daily
nologythe wiki and blog could 4 Bob Metcalfe, There Oughta Be a Law, basis, a wiki and blog system has
be replicated on the Top Secret New York Times, Section D:7, col.1, Late incredible intelligence value. 5
network. Edition, 15 July 1996.

At some point in the accelerat-


ing value along the Metcalfe
curve, a critical mass is reached
and the way we work begins to
change. Two phones do not
change society. Nor do 2,000
phones. Two hundred million
phones, however, change society
forever. The way the human
world works is qualitatively dif-
ferent in the era of 200 million
phones than in the era of no
phones. This technology-driven
societal change is what authors

5 Daniel W. Drezner and Henry Farrell,

Web of Influence, Foreign Policy 148,


(November/December 2004).

68 Studies in Intelligence Vol. 49, No. 3


Wiki and Blog


We must overcome
inertia and act, or we
will continue to be
Larry Downes and Chunka mation-sharing tools from the
Mui call the Law of Disruption. 6 acted upon. Internet, the wiki and the blog, be
Once the Intelligence Commu- deployed on SIPRNet. As these
nity has a robust and mature
wiki and blog knowledge-shar-
ing Web space, the nature of
intelligence will change forever.
This is precisely the prescrip-

will emerge an IC that continu-
ously and dynamically reinvents
tools and processes become robust
and mature, a critical mass will
emerge that will change the ICs
nature so that it can adapt to the
rapidly changing national secu-
tion we are looking for as laid itself in response to the needs of rity environment.
out at the beginning of this arti- the national security environ-
cle. The Community will be able ment.
The Intelligence Community is
to adapt rapidly to the dynamic
Jessica Lipnack and Jeffrey under extreme political pressure
national security environment
by creating and sharing Web Stamps make a case that a suc- in the wake of the 9/11 Commis-
links and insights through wikis cessful virtual community is 90 sion Report, the Senates report
and blogs. percent culture and 10 percent on pre-war intelligence, and the
technology. 7 The most profound WMD Commissions report. 8 If
cultural change will be for IC ever there was a time for the
In Sum managers to let go of their offic- Community to reexamine its
ers. Managers must trust their modus operandi it is now. Our
This article identifies a pressing officers to share directly with political leaders are demanding
Intelligence Community issue each other and with the policy these changes from us. 9 The
namely, that the IC must trans- community. A managers role will changes in mindset suggested in
form itself into a community that become less command and con- this article are significant.
dynamically reinvents itself by trol and more teacher of trade- Enabling intelligence officers to
continuously learning and adapt- craft and communicator of express their points of view inde-
ing as the national security envi- purpose and objectives. The IC pendently in a Community-wide
ronment changes. It has will need to put into place power- setting is groundbreaking.
elucidated the principles from an ful incentives and rewards for
exceptionally rich and exceed- managers to change. Intelligence
8 National Commission on Terrorist
ingly deep theory (Complexity officers must feel encouraged by
Attacks Upon the United States, The 9/11
Theory) about how the world their managers to spend their Commission Report (Washington: Govern-
works and has shown how these workday engaged in sharing ment Printing Office, 2004)PDF ver-
principles apply to the Intelli- activities. These changes will sion available at: www.9-
gence Community. These princi- allow the dynamic learning com- 11commission.gov. US Senate, Report on
the US Intelligence Communitys Pre-war
ples include self-organization, munity to emerge.
Intelligence Assessments on Iraq (Wash-
information sharing, feedback, ington: Senate Select Committee on Intel-
tradecraft, and leadership. The Recognizing that these changes in ligence, 2004)PDF version available at:
article argues that from intelli- attitude and work processes will www.intelligence.senate.gov. Commission
gence officers who are allowed to be challenging to implement, I on the Intelligence Capabilities of the
have recommended some first United States Regarding Weapons of
share information and act upon it Mass Destruction, Report to the President
within a simple tradecraft regime steps. I have suggested that of the United States (Washington: The
recent self-organizing and infor- White House, 31 March 2005)PDF ver-
sion available at: www.wmd.gov.
6 Larry Downes and Chunka Mui, 9 George W. Bush, Executive Order

Unleashing the Killer App: Digital Strate- 7 Jessica Lipnack and Jeffrey Stamps, Vir- Strengthening the Sharing of Terrorism
gies for Market Dominance (Cambridge, tual Teams: Reaching Across Space, Time, Information to Protect Americans (Wash-
MA: Harvard Business School Press, and Organizations with Technology (New ington: The White House, 27 August
1998). York: John Wily and Sons, Inc., 1997). 2004).

Studies in Intelligence Vol. 49, No. 3 69


Wiki and Blog

Equally avant-garde is letting Homeland Security, the military compared to the changes
intelligence officers create a commands, and elsewhereto be required to bring the Commu-
body of intelligence knowledge full participants in these infor- nity into the 21st century. We
without an editor-in-chief. More- mation-sharing activities is must overcome our inertia and
over, inviting our policy commu- breathtaking. If anything, how- act, or we will certainly con-
nity counterpartsat State, ever, these changes are timid tinue to be acted upon.

70 Studies in Intelligence Vol. 49, No. 3


Intelligence in Recent Public Literature

Spy Handler
By Victor Cherkashin and Gregory Feifer. New York: Basic Books, 2005. 338 pages.

Reviewed by John Ehrman


Spy Handler is an unusual example of a cold war espionage memoir. Victor
Cherkashin, a retired KGB counterintelligence (CI) officer, at first appears to have
written a straightforward, unexceptional account of his life in the Soviet service,
with little of the score-settling in which authors of such books often indulge. But it
soon becomes apparent that Cherkashin has much more to offer. With his co-
author, journalist Gregory Feifer, Cherkashin not only tells a fascinating story but
also provides numerous insightssome of them probably unintendedinto the
world of the KGB that make this a rewarding book for specialists and general
readers alike.

Cherkashin had a long career in the KGB. The son of an NKVD officer, Cherkashin
was born in 1932 and vividly recalls growing up amid the horrible conditions of
World War II. After graduating from a railway engineering school in 1952, he
accepted a job offer from the MGB, the NKVDs successor organization. After train-
ing, he was assigned to the Second Chief Directorate of what was by then the KGB,
and sent to work CI against the British in Moscow. In 1963, Cherkashin was
moved to the First Chief Directorate, the KGBs external intelligence organiza-
tion, and became a foreign CI officer. Postings to Australia, Lebanon, and India fol-
lowed, along with assignments in Moscow, before he was sent to Washington,
where he served from 1979 until 1986.

Washington was, by any standard, a remarkable tour for Cherkashin. He oversaw


the recruitment of Ronald Pelton, a former NSA employee who volunteered in 1980
to spy for Moscow; the recruitment in 1985 and running of Rick Ames, the CIA
turncoat; and the handling of Robert Hanssen, after the FBI agent resumed his
espionage in 1986. In addition, Cherkashin identified a spy for the FBI at the
KGBs Washington rezidentura, Valery Martynov, and, by assigning him as an
escort for returning defector Vitaly Yurchenko, tricked Martynov into flying to
Moscow, where he was arrested.

Cherkashins career peaked in Washington. After he returned to KGB headquar-


ters in 1986, he was given unsatisfactory assignments. In his telling, he was a vic-
tim of his own successthe KGB leadership was embarrassed when Ames and
Hanssens betrayals revealed the large numbers of US agents in the Soviet service
and so, instead of rewarding Cherkashin for helping to uncover the spies, they
shunted him aside. Finally, as the Soviet Union fell apart in late 1991, he retired
from the KGB rather than be present for what he expected to be the collapse of the
service.

John Ehrman serves in the CIA Directorate of Intelligence.

Studies in Intelligence 49, No. 3 71


Book Reviews

Cherkashin comes across, no doubt unintentionally, as an unattractive figure.


While he portrays himself as an honest, hardworking CI officer who tried to avoid
bureaucratic politics, he freely admits to having been a true believer in commu-
nism and the Soviet system until the bitter end. Indeed, his reference to the com-
munist partys illustrious past and disparaging remarks about former Soviet
leader Mikhail Gorbachev and the fate of Russia since the Soviet collapse make it
clear that he still longs for the old days (279).

Other aspects of Cherkashins memoir are even more disturbing than his nostal-
gia for Soviet power. He says little about his fathers career in the NKVD, for
example, but what he mentionsjoining the Bolsheviks in 1917, overseeing collec-
tivization before his assignment to the Ukraine in the late 1930s, and having been
away fighting counterrevolutionaries in the days before Germany invaded the
Soviet Union in 1941strongly suggests that the elder Cherkashin had a great
deal of blood on his hands. Nor does Cherkashin seem bothered by the character of
the post-Stalin system he served or of the service in which he worked. He claims,
unconvincingly, to regret that spies he helped uncover, like Martynov, were exe-
cuted rather than given long prison terms, but he makes no comments about the
KGBs role in the Gulag or other Soviet crimes. Indeed, in the few spots where he
considers the morality of his profession and service, Cherkashin asserts a simplis-
tic argument of moral equivalence between the Soviet and Western services. Many
of the operational activities of intelligence services, he claims, are pointless
gamesthieves stealing from thieves, as he puts it (109).

For the reader who is willing to tolerate Cherkashins moral obtuseness, however,
Spy Handler has much to offer. The book is especially useful for its insights into
the inner world of the KGB. Cherkashin does not provide a single, discrete descrip-
tion of life in the KGB or its performance; instead, he scatters details throughout
the book that, taken together, portray a bureaucratic institution that was, in many
ways, unimpressive. For example, he describes his arrival in Beirut in 1965, where
he was assigned to carry out CI operations against the CIA. The Soviets had no
agents, operations, or contacts to go up against the Americans; the other opera-
tions officer in the anti-CIA group was inexperienced and too timid to do his job
properly; and the Beirut rezident was in his last posting before retirement and
showed little interest in aggressive CI operations (80). Similarly, when he arrived
in India in 1971, Cherkashin says he found CI operations directed at American
targets to be badly disorganizedofficers scattered all over the country ran a
myriad of badly connected sources and agents (103). In both cases, he describes
how he set about recruiting assets, organizing networks, and collecting informa-
tion that in some cases proved to be useful years later in other countries. The over-
all impression, however, is that the KGBs performance often was uneven, to say
the least.

Cherkashin also paints an unflattering portrait of KGB headquarters. Moscow


Center, according to Cherkashin, was a place of constant intrigue, where patron-
age was vital to a career. A fortunate relationship or alliance could advance or pro-
tect a career, but an officer unfortunate enough to be the protgreal or
imaginedof someone whose star had fallen could see his career ended. Other

72 Studies in Intelligence 49, No. 3


Book Reviews

writers, especially Christopher Andrew and Oleg Gordievsky, have touched on this
in passing, but Cherkashin provides useful details of how internal political maneu-
vering damaged the KGB. 1

The portrait of the KGB that emerges from Spy Handler is of an organization that
had little trust in its officers, an institutional trait that made fear of betrayal self-
fulfilling. An unusual event could end a career, and being pitched by an opposition
service was viewed as especially suspiciousfear of losing their jobs inevitably
led some to work for US intelligence, says Cherkashin as he relates the story of
Sergei Motorin, a KGB officer recruited by the FBI after he tried to trade vodka for
stereo equipment in a Washington store (13). Cherkashin believes that the perva-
sive suspicion and intrigue made the KGB blind to its counterintelligence vulnera-
bilities. While accepting defections and betrayals by lower-level officers as a fact of
life, he asserts that few in the leadership would consider the possibility that a hos-
tile service could run a long-term penetration of the KGB. Doing so, claims
Cherkashin, would have been an unacceptable admission of weakness (218).

Much of what Cherkashin has to say is not new but still is worth considering. That
the KGB, like many intelligence services, simultaneously was capable of brilliant
successes and colossal incompetence has long been understood. So, too, are the
facts that CI operations often take many years to pay dividends; service leaders
are loathe to face up to the possibility of treason in their ranks; and patronage and
bureaucratic politics probably play larger roles in the inner workings of intelli-
gence agencies than other bureaucracies, if only because they tend to be closed
societies. The KGB, however, seems to have suffered from exaggerated cases of
these problems, probably because they were compounded by the suspicious nature
of Soviet society and the importance of ideological correctness. The resulting
heightened vulnerabilities are not unique to the KGB; they can be found in the
intelligence services of similar social and political systems, such as those of China,
Cuba, and North Korea.

Cherkashin also makes a number of worthwhile observations, both general and


individual, about spies. He has no sentimentality about the people recruited by the
KGB or any other service. In fact, he notes that services actually recruit very few
agentsmost are volunteers who recruit themselves when they get the chance. He
also points out that almost every spy signs on for personal, selfish reasonsa need
for money, a desire for revenge, or just the thrill of espionageand that it is rare
for a spy to volunteer for ideological reasons, despite the efforts of almost all ser-
vices to portray their assets as brave people fighting for noble causes.

His discussions of Ames and Hanssen reflect this point of view. As much as he
appreciates their efforts, Cherkashin has no illusions about either man or case.
Ames, he admits, fell into his lapit was unimaginable, but true, that someone
came along who had valuable information and was willing and able to provide it
(30). The same was true with Hanssen. This acknowledgement leads Cherkashin

1 Christopher Andrew and Oleg Gordievsky, KGB (New York: HarperCollins, 1992).

Studies in Intelligence 49, No. 3 73


Book Reviews

to make some points well worth remembering. He cautions that the US desire to
view both Ames and Hanssen as losers who turned to treason to escape their fail-
ures obscures an important truth about their cases. Both men, he points out, per-
formed well as spies and Hanssenwho took control of his case and, Cherkashin
claims, successfully hid his identity from the Russianswas especially clever in
his tradecraft. Some of this may be chest-thumping, but Cherkashins basic point
is a good one: A reflexive dismissal of our traitors as contemptible quislings can
skew the analyses of their cases and obscure some of the lessons to be learned and
applied later.

Spy Handler is a solid addition to the growing number of KGB memoirs. It is a


subtle, complex bookin this, it is a good reflection of the counterintelligence
world in which Cherkashin spent so many yearsbut one that offers useful
insights and lessons. For these reasons, it is worth the time of anyone interested in
the craft and politics of espionage.

74 Studies in Intelligence 49, No. 3


Intelligence in Recent Public Literature

Counterspy: Memoirs of a Counterintelligence


Officer in World War II and the Cold War
By Richard W. Cutler. Washington: Brasseys, 2004. 173pages.

Reviewed by Kevin C. Ruffner

Richard W. Cutlers Counterspy: Memoirs of a Counterintelligence Officer in World


War II and the Cold War is an invigorating account of his military service with X-2
(Counterintelligence) in the Office of Strategic Services (OSS) and the Strategic
Services Unit (SSU). Drawing from a wealth of letters that he wrote home between
1942 and 1947, coupled with declassified documents released by the CIA since the
1980s, Cutlers book is not only good reading, but also perhaps the only firsthand
account of X-2 operations in Berlin at the dawn of the Cold War.

A Yale-educated-lawyer, turned Army Air Forces (AAF) officer, Cutler found him-
self in OSS under rather unusual circumstances. While on leave from the army in
the summer of 1944 before deploying to the Pacific Theater, 2nd Lt. Cutler was in a
Pentagon hallway when a major whom he had met previously in connection with
an interview for OSS spied him. Cutler, in fact, had applied twice to join OSS, but
had heard nothing. This time, the major told him to report to a building in George-
town. Doing what he was told, Cutler proceeded to Georgetown but arrived after
the office had closed. Thinking that the majors information was outdated, he
departed for his parents house in Connecticut for the remainder of his leave.

While at home, Cutler received an urgent telegram to return to his unit in Kan-
sas, as the movement orders had been advanced. Upon his arrival, he dashed off to
his quarters to get his gear when he received a phone call. The adjutant thun-
dered that Cutler needed to report to the commanding officer immediately. As it
turned out, the War Department had just ordered 2nd Lt. Cutler to Washington.
His commanding officer in Kansas was furious, believing that Cutler had procured
a new job to avoid overseas deployment. Cutler pleaded that there must have been
a mistake in Washington.

Cutler soon learned that he owed his transfer to OSS to disagreements over intelli-
gence assessments in the Joint Chiefs of Staff. In the summer of 1944, Gen. Henry
Hap Arnold, AAF chief of staff, had complained that OSS had not yet discovered
the location of German factories producing jet fighters. Arnold wanted to destroy
these factories before German jets could wreak havoc among propeller-driven
American and British aircraft, which were bombing Germany around the clock in

Kevin Ruffner served in the CIA Directorate of Operations.

Studies in Intelligence 49, No. 3 75


Book Reviews

the summer of 1944. Brig. Gen. William Donovan, the Director of Strategic Ser-
vices, protested that OSS was hindered in its ability to perform its intelligence
missions in Europe because the military would not provide him with trained man-
power. Supporting his case, Donovan noted that the AAF was sending 11 lieuten-
ants versed in European languages to the Pacific Theater where their language
skills would go to waste. Thus, 2nd Lt. Cutler, one of the 11 officers, found himself
transferred to OSS at the eleventh hour.

After initial OSS training in Virginia, Cutler enjoyed the remainder of the sum-
mer of 1944 in Washington. Expecting to deploy as a member of a three-man team
to be dropped behind enemy lines to link up with the underground, he brushed up
on his French. The rapid advancement of Allied forces in France that summer can-
celled the need for this battlefield assignment.

Instead, Cutler arrived in London in the fall of 1944 to join X-2s secret efforts with
Britains MI6 to construct an order-of-battle for German forces, using a wide vari-
ety of sources, but most importantly the ULTRA intercepts. In addition, MI6 and
X-2 concentrated on identifying German intelligence officers, agents, and opera-
tions. Cutler set to work tracing German stay-behind agents in France, utilizing
information from signals intelligence. He and his team assisted Special Counter
Intelligence (SCI) teams in France to track down an estimated 3,500 German
agents, destroying the enemy spy networks and turning some members into dou-
ble agents.

By early 1945, Cutler had become an expert in the arcane art of vettingthat is,
checking the bona fides of purportedly friendly agents. This task was time consum-
ing and difficult in the age before computers. And it was complicated by internal
rivalryOSSs Secret Intelligence (SI) group resisted X-2s efforts to oversee its
agent recruitment operations. These turf battles had an impact on work with the
British because MI6 distrusted the ability of the Americans to ensure operational
security.

Norman Holmes Pearson, a Yale University professor and the head of X-2 in Lon-
don, directed Cutler to build up X-2s vetting section. Soon he was working 100
hours a week vetting OSSs growing roster of agents. Drawing from the British
system, Cutler developed the procedures in Europe that were later used by OSS
worldwide for testing its agents. Cutlers work was an early step in the profession-
alization of American intelligence, forming the basis of the modern asset valida-
tion system.

Lack of resources and the relentless pressure not to delay operations took a toll on
Cutlers health. In March 1945, he collapsed and was taken to the hospital, where
he was diagnosed with exhaustion. The doctors prescribed immediate leave, which
he spent in Cornwall as the war drew to a close. He recalls with considerable pride
the role that he played in the wars successful conclusion in Europe.

Cutler did not rest on his laurels for long. With the occupation of Germany, the
need for intelligence grew as Allied forces rooted out Nazis. In the summer of 1945,

76 Studies in Intelligence 49, No. 3


Book Reviews

OSS consolidated many of its elements at its new headquarters in the confiscated
Henkel champagne factory in Biebrich, a small town near Wiesbaden. The new
German mission, under the former SI chief in Switzerland, Allen Dulles, brought
together a wide array of new agents, including many of Dulless special sources
his so-called Crown Jewels.

The situation, however, was chaotic. X-2 in Germany was responsible not only for
vetting the prospective agents for all OSS branches, but also for sorting out the
identifications of those who claimed to have worked for American intelligence dur-
ing the war. X-2 performed security background checks on new staff members as
well as on all foreign nationals hired by OSS. With the US Armys rapid demobili-
zation in Germany, and the disbandment of OSS and formation of its successor, the
Strategic Services Unit, the job of the vetting section only increased.

Cutler grew tired of vettinga redundant double-check on the operating officers


judgmentand sought more action. He soon found it as a new X-2 officer posted
to Berlin in late September 1945. Cutler lived a lifetime of experiences in the war-
ravaged German capital.

As an X-2 officer in the small SSU outpost, Cutler handled a mixed bag of agents,
most of whom had once worked for the Nazis but now earned their keep from a
new master. Initially, these assets were used to spot signs of an underground Nazi
resistance movement and to ferret out war criminals in hiding. Slowly but surely,
these same agents became useful to the Americans for their knowledge of the
Soviet Union. As tensions mounted between East and West, these former enemies
became partners in a new and different struggle for the future of Europe.

Between 1945 and 1947, OSS and SSU laid the foundation for the CIAs later
recruitments during the first half of the Cold War. American intelligence regarded
Germans (including former army intelligence and internal security officers and
their wartime collaborators) as natural resources. Cutlers agent pool in Berlin
clearly reflected this selection. Six decades later, we are left with the uncomfort-
able question: Was the gain worth the price? For over 30 years, the CIA has been
haunted by the ghosts of its past. Recruitments of agents with unsavory back-
grounds in the dark days of 1946 or 1947 appear less valid in light of the countless
US government investigations that have uncovered ignorance of, and in some cases
complicity in, the recruitment of Nazi war criminals by American intelligence.
Under public pressure and congressional scrutiny, the CIA is slowly releasing its
long-secret files on many of its sources, including some of those with whom Cutler
worked in Berlin.

Cutlers descriptions of these agents, both male and female, are especially illumi-
nating because they offer personal insights that are not necessarily found in the
sanitized declassified material. In several cases, he established a real personal
rapport with his sources, in part because they worked so closely together in Ber-
lin. He even lived in the same house as some of his agents.

Studies in Intelligence 49, No. 3 77


Book Reviews

Cutler remains uncharacteristically vague about the identity of one of his assets,
Gabriel, who was one of his most important sources as the focus shifted to collect-
ing information on the Soviets. He notes that she had amazing powers over oth-
ers, especially men. A resourceful linguist who had worked for German intelligence
during the war, she was also well read in history, philosophy, theater, and politics
and, unlike many intellectuals, she was street smart. As Cutler observes, Gab-
riel was perfectly suited for counterespionage, and she played a key role in one of
the most intriguing German-Italian and later American intelligence plots of World
War II. Although Cutler talks about her in some detail, and although her name is
available in declassified records and other sources, 1 she is not identified in the
book, perhaps out of sensitivity to her prominence in Germany in later years.

Cutlers Counterspy is an excellent introduction to this confusing period. A keen


observer during his travels throughout Europe, he provides insights into life dur-
ing and after the war and how the local population reacted to the American pres-
ence. Counterspy nicely complements Battleground Berlin: CIA vs. KGB in the Cold
War, the landmark study of the intelligence war in divided Berlin. 2 Friendly with
numerous intelligence officers who later rose to senior positions in the CIA, Cutler
offers a personal angle on these men who made history. His letters and photo-
graphs are excellent primary sources on X-2 in London, Biebrich, and Berlin. One
hopes that he will make his collection available to researchers at a public institu-
tion to enhance understanding of counterintelligence in those early days.

Cutler clearly regards his wartime and immediate postwar intelligence work as a
defining period in his life. Drawn to intelligence but suffering health problems as a
result, he debated long and hard about making it a career. In the end, he left the
military as a captain, resumed his law practice, married, and moved to Milwau-
kee. But his final comments on the problems that the CIA faces today show that
Richard Cutler is still hooked on intelligence.

1 See Howard McGaw Smyth, Secrets of the Fascist Era: How Uncle Sam Obtained Some of the Top-Level Documents

of Mussolinis Period (Carbondale: Southern Illinois Press, 1975) and Ray Mosely, Mussolinis Shadow: The Double Life
of Count Galeazzo Ciano (New Haven, CT: Yale University Press, 1999).
2 David E. Murphy, Sergei A. Kondrashev , and George Bailey, Battleground Berlin: CIA vs. KGB in the Cold War (New

Haven, CT: Yale University Press, 1997).

78 Studies in Intelligence 49, No. 3


Intelligence in Recent Public Literature

Denial and Deception: An Insiders View of the CIA


from Iran-Contra to 9/11
By Melissa Boyle Mahle. New York: Nation Books, 2004. 352 pages.

Blowing My Cover: My Life as a C.I.A. Spy


By Lindsay Moran. New York: G. P. Putnam & Sons, 2005. 295 pages.

A Spys Journey: A CIA Memoir


By Floyd L. Paseman. St. Paul, MN: Zenith Press, 2004. 287 pages.

Reviewed by John Hollister Hedley

As New York Times reporter Tim Weiner said in a review appearing in his paper,
only in America could the intelligence memoir become a literary genre. 1 Well,
make room on your bookshelf, because the genre is growing before our very eyes.

Three recent additions have benefited remarkably from media attention, good
reviews, and enviable sales. Together they are illustrative of what we will see more
of, unless and until the novelty wears off and the news media are less captivated
with the subject of what in the world is wrong with intelligence. Inquiries, commis-
sion reports, reform legislation, hearings, and headlines have helped put a spot-
light on these publications and their authors that is not likely to continue
indefinitely.

There is nothing inherently wrong with authors capitalizing on publicity. What is


somewhat curious is that publication has bestowed a degree of expertise on these
authors that largely stems from their books appearing at a propitious time. (It is
pertinent, if unkind, to observe that this also is known as luck.) For example, Lind-
say Moran, with the briefest career experience of any memoir writer in memory,
soon after her book was published appeared in the New York Times as an op-ed
author critiquing reform of the clandestine service. 2 This is after a career that
many a veteran CIA officer would consider a cup of coffee with the Agency: five
years and one overseas assignment. Melissa Boyle Mahle abbreviated her career
before 15 years with an operational mistake, best left at that. Only Floyd Pase-
man stayed for a career of normal duration, culminating in a highly successful
stint as a CIA officer-in-residence teaching intelligence at Marquette University.

1 New York Times Book Review, 10 April 2005, 39.


2 Ibid., 12 April 2005, A23.

John Hollister Hedley served more than three decades with the CIA.

Studies in Intelligence 49, No. 3 79


Book Reviews

What is annoying about the attention given these books is the suspicion that they
owe it to some degree to publishers persistence in pandering to (and therefore per-
petuating) stereotypes about the CIA. A pet peeve of this reviewer is the apparent
conviction on the part of the media, which of course include book publishers, that
the CIA must appear sinister, stupid, or scandalous for someone to read about it.
On occasion (the Rick Ames story comes notably to mind), the CIA serves up a tri-
fecta on its own. But it should not follow that a CIA memoir will sell only if it sug-
gests an inside revelation of something sinister, stupid, or scandalous.

Publishers cannot resist a titillating (never mind misleading) title, sometimes over
the authors objections. John Ranelagh claimed that calling his seminal history of
the Agencys first 40 years The Rise and Decline of the CIA was strictly the pub-
lishers idea, which he argued against in vain. 3 The catchy title of Fixing the Spy
Machine required its author, Arthur Hulnick, to devote the first part of his book to
explaining that intelligence really isnt a machine, really isnt broken, and really
doesnt need to be fixed. The title of the recent Why Secret Intelligence Fails obliged
author Michael Turner to explain that it really doesnt fail. 4

Moran may well have conceived or delighted in the catchy/sexy title Blowing My
Cover, but Mahle insists that her publisher pressed her for the title Denial and
Deception as well as for rewrites that would make the book less about intelligence
and more about her. 5 Even the New York Times Book Review could not resist
adorning a review of CIA memoirs with a curious illustration of a head that was
half face/half bomb with a fuse protruding from the back and a pistol tucked beside
the face and into a fedora from which a presumably poison pen stuck out. 6 Such
sales gimmicks, if all too predictable, are regrettable because they detract from
serious content. Together with a publishers pressure on an author, they may even
distort the content and thus lessen the value of writing that can in fact make a
meaningful contribution to intelligence literature and to public understanding of
intelligence.

Lindsay Moran probably needed no prodding. Evidently more interested in profit


than perspective, her Blowing My Cover illustrates how a clever ex-employee can
capitalize on the CIAs undeniable mystique. One looks in vain for a serious mes-
sage in her one-dimensional put-down of the Agencys operational training. Moran
doubtless will not endear herself to her erstwhile colleagues, but for a general
readership she is a facile writer who comes across as a breezy romantic. Fresh
from Harvard, she decided that joining the CIA would be really cool. Before long,
she decided it was even more cool to find a boyfriend. When she did, she decided to
throw over the Agency and get married. She did both. End of story. Morans cheeky
style and brisk prose makes for a good read, but dont look for her book in the
libraries at CIA training sites.

3 Conversation with the author at CIA Headquarters in 1990.


4 Arthur S. Hulnick, Fixing the Spy Machine (Westport, CT: Praeger, 1999); Michael Turner, Why Secret
Intelligence Fails (Dulles, VA: Potomac Books, 2005).
5 Conversation with the author, Tysons Corner, VA, 29 April 2005.

6 New York Times Book Review, op. cit.

80 Studies in Intelligence 49, No. 3


Book Reviews

Floyd Pasemans A Spys Journey is a personal retrospective by a consummate nice


guy, a straight arrow who recounts a life that offers helpful introductory reading
for someone considering a career in the operations directorate. It contains pre-
cious little that is prescriptive, devoting only six pages out of nearly 300 to whats
wrong and whats right with the CIA. The shortcomings he cites are neither origi-
nal nor surprising: To operate effectively in an overseas environment, you need to
know the language and the culture and be there. Whats right is a lot, including
good leadership, an analytic capability second to none, and continuing recruitment
of the best and brightest from college campuses. Pasemans criticism is gentle and
conventional: Noting the adverse impact of the operations directorates dwindling
numbers, foreign language deficiency, risk aversion, and cutbacks in case officers
overseas before 9/11 no longer constitutes a news bulletin, no matter how accurate.

Melissa Boyle Mahles Denial and Deception is the most substantive and useful
memoir of the three, being a balanced mix of personal story and thoughtful, well-
researched perspective on the Agency and its leadership. She, too, laments risk
aversion and draw-downs in the field, plus the lack of language competence and, at
least by implication, the Agencys xenophobia that results in failing to utilize the
linguistic skill and cultural understanding that hyphenated-Americans have to
offer. Mahle, herself a summa-cum-laude graduate of the University of California/
Berkeley in Near Eastern studieswith fluency in Arabic; knowledge of Middle
Eastern culture, traditions, and religions; and a fascination for archaeologywent
from an archaeological dig in Israel to being courted as a CIA intern after begin-
ning graduate work at Columbia.

Mahle spent fewer than 15 years at the CIAwell short of the normal career dura-
tion. Before her regrettable operational mistake brought separation from the
Agency, she served a stint as a recruiter of would-be operations officersan
assignment that featured encounters with bright university students interested in
possible careers in intelligence but understandably curious about what it is that
an operations officer actually does. She shares with Paseman a desire to help sat-
isfy this curiosity. Purely for insight into a career in operations, neither effort
equals Dick Holms The American Agent. 7 But Mahle does render an educational
service with a book that is at once autobiography, primer, and commentary on the
Agency and its tribulations, traced by the tenure of its recent directors.

Agency readers, especially, may wonder if this burgeoning genre of intelligence


memoirs is a good thing. Do such memoirs help or harm the Agencys reputation
and mission? To be sure, ex-CIA authors publish memoirs at varying levels of seri-
ousness and competence. Some are bent on sharing insights into a career in what
must be acknowledged to be a closed world that is a mystery to anyone who has
not worked within it. Many have a reformers zeal: Ive been there, and I can tell
you where its gone astray and how it could be set straight. It must be especially
hard for the reading public to gauge the authority of such an author. Whats more,

7 Richard L. Holm, The American Agent: My Life in the CIA (London: St. Ermins, 2003). The book is

reviewed in Studies in Intelligence 48, no. 1 (2004): 92.

Studies in Intelligence 49, No. 3 81


Book Reviews

it would appear to be difficult for some former CIA authors to gauge how limited
their own knowledge of intelligence is. They may have seen the organization and
its work through a very narrow prism and have a very limited perspective.

The result can be somewhat like the fable of the blind men describing an ele-
phant. Where you touch itand where the Agency touches younot only forms
your perception of it, but also, perhaps less obviously, limits your ability to charac-
terize it. It is a generalization, but it seems a fair one, that the broader a CIA
officers career experience and the more perspectives gathered from inside and out-
side, the more balanced is the view that that author can provide. Having done only
one type of work in one directorate makes characterizing the entire Agency more
difficult and probably somewhat skewed by the particular prism through which
the author experienced it and recalls it.

All three of these books are by former operations officers. This does not say that
former operations officers are more inclined to go public with a grievance, or even
that they are more likely to have a grievance. What it may say is simply that an
operations career fits more readily with the public conception of the CIA as a place
of mystique, romance, danger, and excitement. The operations officer commands
an audience simply by having been an operations officer. Too bad there arent
books about what analysts do, but try interesting a publisher in the adrenalin rush
that comes with having too little solid information to work with but needing to
meet an impossible deadline anyway.

With respect to CIA memoirs generally, this reviewer has a biasbut a bias built
on an experiential base as one-time chairman of the CIAs Publications Review
Board, reading scores of autobiographical efforts and thousands of pages of manu-
script. The result is a conviction that we ought not bog down in finding flaws and
being dismissive of this genre. For one thing, this reviewer does not know of a sin-
gle recruitment pitch, operational plan, or liaison relationship that was ruined or
precluded by the publication of a book.

This is not the place to discuss declassification policy at length (a subject separate
from publication review), but it is worth noting that the CIA is hardly blameless
for the fact that perhaps the three best-known initials in the world are weighted
down by an aura of the sinister and suspicious. Would that CIA declassifiers could
see that there are good-news stories yet to be told that could be and should be told
without compromising sources or truly sensitive collection methodssomething
long since demonstrated by the landmark memoirs of Duane (Dewey) Clarridge
and Tony and Jonna Mendez. 8

Evidence aboundsbound and on bookshelves in growing numberthat former


CIA officers can offer pertinent and valuable insights without damaging national
security in the slightest. Indeed, they can enhance it. Memoirs can help clear the

8 Duane Clarridge, A Spy for All Seasons (New York: Scribner, 1997); Antonio J. Mendez, Master of Dis-

guise (New York: William Morrow, 1999); Antonio and Jonna Mendez, Spy Dust (New York: Atria Books,
2002).

82 Studies in Intelligence 49, No. 3


Book Reviews

air. They can illuminate and inform. They can correct misconceptions. They can
contribute expert opinions on current issues. They provide insight into what kind
of people work for the CIApeople with intellect and integrity. The authors of
most intelligence memoirs clearly are smart people who obviously have ethical
standards and who are concerned about how things are done and why they are
done, not merely because they want them done well but because they want them to
serve a high purpose.

So we members of the Agency club, past and present, ought not to be thin-skinned.
Maybe a Lindsay Moran has a point. Whether she does or not, it speaks well for
the Agency that she is allowed to express her view. The writing and publishing of
candid CIA memoirs speaks well for our democracy. And if we are going to plant it
around the globesomething this country has yearned to do since at least the days
of Woodrow Wilsonwe darn well better be willing to practice it. Secret organiza-
tion or no, the first amendment is the cost of doing business in a free society. Hon-
oring by exercising this freedom is why the writing of a CIA memoir is not a bad
thing.

Studies in Intelligence 49, No. 3 83


Book Reviews

CORRECTION: Thomas Sileos recently published book was incorrectly identified


in a review in Studies in Intelligence 49, no. 2 (2005): 79. The correct title is: CIA
Humor: A Few True Stories from a 31-Year Career.

84 Studies in Intelligence 49, No. 3


Intelligence in Recent Public Literature

The Intelligence Officers Bookshelf


Compiled and Reviewed by Hayden B. Peake

This section contains brief reviews of recent books of interest to intelligence profes-
sionals and to students of intelligence.

L. V. Scott and Peter Jackson, eds. Understanding Intelligence in the Twenty-


First Century: Journeys in Shadows. New York: Routledge, 2004. 234 pages,
end-of-chapter notes, index.

Anthologies of academic articles on the need to define and study intelligence


have appeared with regularity since the groundbreaking work of Roy Godson
at Georgetown University and Christopher Andrew and David Dilks at
Cambridge in the 1980s. The topics covered in the present volume are not new,
but each one of the thoughtful papers conveys a need for wider understanding
and study within academia and the public in the post-9/11 world, where terms
like threat and globalization place increased demands on intelligence agencies
to get it right the first time.

The first chapter, Journeys in Shadows, summarizes the 12 that follow.


Christopher Andrew then provides a historical analysis of the need for better
understanding of what intelligence is supposed to dothe so-called under-
theorization of the topic. Here he points out, inter alia, the need for better
defined criteria for success and failure. Wolfgang Kriefer discusses what he
calls the scant attention intelligence history received in Germanyas opposed
to press coverage of spy scandals, which is prevalent. He sees a need for greater
public understanding in Germany that can only come from serious historical
study in the universities, and he explains why that has not yet occurred.
Military historian John Ferris describes the concepts of netcentric warfare
and C4ISR (command, control, communications, computers, intelligence,
surveillance and reconnaissance), that comprise the infosphere (the total
information pertaining to an event). Put another way, these terms indicate how
the military collects, analyzes, and acts on information. He points out the many
benefits, as well as the risks associated when four-star generals use high-tech
networking to pick targets a continent away.

In the area of security and personal freedoms, Gary Marx considers the
definition and dimensions of human surveillance, comparing what he calls
traditional with new surveillance practices. He develops some elaborate
theories and adds an ethical dimension. But in the end, common sense will lead
most thoughtful people to the same conclusions.

Hayden B. Peake is the curator of the CIAs Historical Intelligence Collection.

Studies in Intelligence 49, No. 3 85


Bookshelf

Michael Smith provides a common-sense historical analysis of the charge,


made by Prof. Richard Breitman in his book Official Secrets, that Winston
Churchill knew from Bletchley Park intercepts that the Nazis were murdering
thousands of Jews and should have made that fact known at the time. 1
Breitman argues that Churchill acted immorally; Smith makes a powerful
argument that he is wrong.

Intelligence historian Nigel West contributes an article that documents the


paradoxical point that in Britain, with all its prohibition against unauthorized
disclosures of intelligence by members of the profession, more intelligence
disclosures have been produced than anywhere else in the world. This article
is followed by Jeremy Blacks Geopolitics of James Bond, which shows how
the fictional world of the Fleming character has had serious influence on public
attitudes toward the intelligence profession.

In the only article to focus on the specific features and functions of intelligence
in the 21st centuryHunters, Not Gatherersformer CIA officer Charles
Cogan, now senior research associate at the Kennedy School of Government at
Harvard, argues that the Intelligence Community in the United States is not
properly centralized to meet the intelligence needs of the post-9/11 world.
Furthermore, he suggests, existing internal security organizations are weak
and ineffective. With the changed world, what is needed is a return to a risk-
oriented culture usually associated with wartime, coupled with an offensive
hunt strategy (156) against terrorists, an aggressive approach that was not
policy in the pre-9/11 era.

Len Scott, professor of international politics at the University of Wales,


contributes a paper on clandestine diplomacy and covert action in the 21st
century. The former involves talking secretly to adversaries; the latter involves
operations designed to influence events in a given country. Scott looks at the
possibility that 9/11 may have given the former more credibility than it enjoyed
during the Cold War.

The final two chapters evaluate the question of ethics in intelligence. In Ethics
and Intelligence after September 2001, Michael Herman begins by noting that
Perhaps there is no need to mix intelligence and ethics. But while his
admirable objectivity forces him to consider the idea in principle, he is not a
believer. After discussions of why ethics are essential to operations, he suggests
that perhaps what is needed is a new paradigm, although he acknowledges
that this issue is not societys greatest problem, A somewhat different view is
found in Toni Erskines As Rays of Light to the Human Soul? Moral Agents
and Intelligence Gathering. The title comes from comments on intelligence
made by Thomas Hobbes in 1647. Erskine reviews them in light of what she
terms the realist, consequentialist, and deontological approaches advocated by

1Richard Breitman, Official Secrets: What the Nazis Planned, What the British and Americans Knew
(New York: Hill & Wang, 1998).

86 Studies in Intelligence 49, No. 3


Bookshelf

others (210). The practical distinctions among these vitally important


endeavours are not made clear and thus it is not surprising that she concludes
further investigation into ethics and intelligence is essential.

Understanding Intelligence in the Twenty-First Century is a thought-


provoking, valuable collection of ideas. There is much here for doctoral
dissertations and todays intelligence practitioners.

I. C. Smith. Inside: A Top G-Man Exposes Spies, Lies, and Bureaucratic


Bungling Inside the FBI. Nashville, TN: Nelson Current, 2004. 394 pages,
appendices, photos, index.

In at least 165 books on intelligence, an author promises an inside story in the


title. Most disappoint. Ivian Charles Smith is the exception. He gives us a
genuine inside look at the FBI and his own life. Both make absorbing reading.

Born in Louisiana during World War II and raised by his paternal grandparents,
I. C. grew up in an era when youngsters were respectful of authority and polite
to teachers, attributes that remained with him. Graduating from high school in
1960, he tried college briefly before joining the navy where he saw the world
while serving aboard the USS Razorback, a submarine that had once had
convicted spy John Walker among her crew. Four years later, I. C. returned to
Louisiana and college, joined the police force, married, and became a detective.
His police duties sometimes brought him into contact with FBI agents and they
encouraged him to apply to the Bureau when he graduated from college in 1971.
In May 1973, I. C. Smith began his own FBI career.

Inside is a roughly chronological summary of Smiths FBI career, which took him
from St. Louis to Washington via most major countries of the world. He worked
routine criminal cases, congressional corruption investigations, and, while in
charge in Little Rock, Arkansas, the controversial Whitewater case, involving real
estate irregularities. But intelligence professionals will be even more interested
in his insights into the familiar counterintelligence cases of the era. In this
category, he adds details about Larry Wu-tai Chin, the Chinese mole at the CIA;
recounts the FBI side of the Aldrich Ames spy case, including the Bureaus self-
serving cooperation with author Peter Maas; discusses the Parlor Maid, or
Katrina Leung case; and is harshly critical of the Bureaus handling of putative
Chinese agent Wen Ho Lee. Although the Robert Hanssen espionage case came to
a close after Smith retired, he knew Hanssen and is not reticent about
contradicting Director Louis Freehs assertion that the case was a
counterintelligence coup (303). He also takes issue with those who thought
Hanssen was anything but a mediocre special agent motivated by greed. Had the
Soviets not paid him, says Smith, he would not have continued to spy for them.

There are several themes running through the book that have added value
because they are discussed by one who has paid his dues. The first is Smiths
very candid comments about the directors under whom he served. He leaves no
doubt that many of the Bureaus problems follow from their excessive egotism

Studies in Intelligence 49, No. 3 87


Bookshelf

and poor leadership. A second theme concerns the working relationship


between the Bureau and the Department of Justice. Examples can be found in
the discussions of CAMPCON (the charges of Chinese campaign financing
irregularities in the 1990s); the Whitewater investigation; the handling of the
Waco and Ruby Ridge incidents involving extremists; and the authors
comments on inaccurate affidavits (281). A third theme concerns the subtle
ways in which the Bureau protects its public image. Of interest here is the
Bureaus tendency toward intolerance of dissenting views, its hesitancy to
assign responsibility for failure, the rationale for its pre-9/11 policies, and its
anti-terrorism record in general. In the books epilogue, Smith looks at the
latter topic in some detail.

After 25 years with the FBI, Smith became a former special-agent-in-charge on


31 July 1998. In writing this book, he has added to recent critical, although
constructive, assessments of the Bureau. 2 Inside is a valuable contribution to
current intelligence issues and to the literature of the profession.

Rodney P. Carlisle, ed. Encyclopedia of Intelligence and Counterintelligence.


2 volumes. Armonk, NY: M. E. Sharpe, Inc., 2005. 750 pages, references, appendi-
ces, photos, index.

Professor Carlisles earlier book, The Complete Idiots Guide to Spies and
Espionage, was reviewed in Studies in Intelligence 47, no. 3 (2003). The current
work is a much improved, more scholarly effort, whose entries have greater scope
and depth, are more informative, and are still easy to read. Each of the 72 mostly
academic contributors has, for the most part, used multiple reliable sources that
are indicated at the end of the more than 400 entriessee, for example, those of
former DCIs Richard Helms, James Woolsey, and George Tenet, by State
Department officer Laurie West Van Hook. Equally well crafted is the Allen
Dulles entry by James J. F. Forest at West Point. While the principal focus is on
all aspectsoperational, technical, political, analyticalof American
intelligence, the encyclopedia covers other countries and their services as well.
For example, the entry for Canada, written by Michael Butt of Dalhousie
University, is a discussion of the history of Canadian intelligence. Entries under
other country names follow the same format. The appendix contains excerpts
from the 9/11 Commission Report, without analytical comment.

One might well ask how this encyclopedia compares with the revised edition of
Spy Book: The Encyclopedia of Espionage. 3 While the present work has fewer
entries than Spy Book, there is greater detail in many of them, and each entry
lists recommended sources (Spy Book does not cite sources for each article). The
topic coverage is close, but not a complete overlap. For example, Carlisle has

2 See for example: Peter Lance, 1000 Years For Revenge: International Terrorism and the FBIThe Untold
Story (New York: Regan Books, 2004) and Richard Gid Powers, Broken: Troubled Past and Uncertain Fu-
ture of the FBI (New York: Free Press, 2004).
3 Norman Polmar and Thomas B. Allen, Spy Book: The Encyclopedia of Espionage, 2nd ed. (New York:

Random House, 2004), reviewed in Studies in Intelligence 49, no. 1 (2005).

88 Studies in Intelligence 49, No. 3


Bookshelf

entries for Italy and Ivan the Terrible, while Spy Book does not. The
Encyclopedia of Intelligence and Counterintelligence is hardbound and sells for
about $200 for both volumes; Spy Book costs about $22 (softcover).

When it comes to accuracy, the Encyclopedia has, with one exception, about the
same number and type of errors as Spy Book. The exception is the unrivaled
collection of misstatements in Carlisles entry for Cambridge spy Donald
Maclean. Maclean was not identified by the FBIthe Brits did thatand
Maclean learned of it not from Philby, but from Burgess. Furthermore, the clue
to Macleans guilt was not that he went to London to visit his pregnant wife,
but to New York where she was living with her mother. Maclean did not attend
Eton or Oxford, nor was he a classmate of CairncrossMaclean and Philby had
graduated by the time Cairncross entered Cambridge. And Maclean was not
recruited on a channel ferry or any other boatthat happened while he was
still in London before he went overseas. As for Krivitsky (mentioned in the
Maclean entry), he did not seek refuge with the Britishthey asked him to
come and be debriefed, and he did. Soviet agent Kitty Harris was, first,
Macleans handler-courier and, second, his lover. Maclean wed Melinda in
Paris, not London. And Philby did not join Maclean on his escape to Russia
Burgess did that. Finally, John Cairncross did not live out his life in England,
though he died there after a brief residency (406).

A few other relatively minor discrepancies were found, as, for example, the
assertion that the so-called Lucy Ring was a conduit for Bletchley Park (402).
This has been debunked by Hinsley, et al. 4 Similarly, Elizabeth Bentleys
testimony did not lead to the arrests and eventual convictions of noted atomic
spies Harry Gold, David Greenglass, and Julius and Ethel Rosenberg
VENONA deserves the credit for that. Lastly, the concept that the defector
remains the best source of invaluable information whether in place or a one-time
crossover is nonsense on its face. In the long run, a defector ranks second to an
agent-in-place or mole since by definition a defector cannot remain in place.

Professor Carlisles Encyclopedia of Intelligence and Counterintelligence is a


good place to start when readers, students, or analysts look for historical
background. Nevertheless, as a matter of prudence, check other sources where
particular facts are important to the case at handintelligence requires
multiple source validation whenever possible.

4 F. H. Hinsley, British Intelligence in the Second World War, Vol. 2 (London: HMSO, 1981), 60. The so-

called Lucy Ring is a journalistic fiction; the net that is meant was the Rote Drei.

Studies in Intelligence 49, No. 3 89


Bookshelf

Sally Bowen and Jane Holligan. The Imperfect Spy: The Many Lives of
Vladimiro Montesinos. Lima, Peru: Ediciones PEISA S.A.C., 2003. 493 pages,
photos, chronology, no index.

In December 1996, 14 masked Cuban Marxist guerrillas invaded the Japanese


ambassadors residence during a reception in Lima, Peru, taking several
hundred hostages. President Alberto Fujimori acted decisively but cautiously.
Over the next four months, all but 72 hostages were released. In April 1996,
after tunnels had been dug under the residence and listening devices placed in
the building , all but one hostage was successfully rescued and the terrorists
shot dead. Fujimoris point man for the rescue operation was his de facto
national security advisor, Vladimiro Montesinos.

The Imperfect Spy tells the story of this ambitious, amoral man, whose rise to
great power was as unusual as his descent to prison, where he now resides. He
began his spying by informing on classmates and perfected his skills in a military
career, where he first came to the attention of the CIA in the 1970s. Between then
and 1990 when he gained real power with Fujimori, he spent a year in jail,
assisted Colombian drug dealers while banking a fortune, obtained a law degree,
built a personal security force, married, and acquired several mistresses. As head
of the National Intelligence Service, or SIN (Servicio de Inteligencia Nacional),
Montesinos also collected information, converted it to power and solved problems
for the powerful, often eliminating those unwise enough to oppose him.
Throughout his career, he had official contacts with the CIA and occasionally the
FBI. Both kept him at arms length.

British journalists Sally Bowen and Jane Holligan have lived and worked in
Peru for many years. They have done a splendid job telling the often gruesome,
but always interesting, story of Montesinos and the secret police he created, so
appropriately called SIN. The lack of source notes is largely compensated for by
the chronology and references to known people, dates, and events. The authors
have provided an important exemplar of how a corrupt security service can
influence an entire country.

Vin Arthey. Like Father Like Son: A Dynasty of Spies. London: St. Ermins
Press, 2004. 288 pages, endnotes, bibliography, photos, index.

In his book Strangers On A Bridge, James Donovan tells the story of KGB
illegal, Col. Rudolf Abel, who was betrayed by a KGB defector to the CIA.
Arrested by the FBI in 1957, Abel was sentenced to 30 years in prison. In
February 1962, he was exchanged for U-2 pilot Francis Gary Powers.

Several books were written about the case. One, by Abels friend Kyrill
Khenkin, published only in Russian, had a real surprise. Reviewed by scholar-
author Walter Laqueur in 1983, Khenkins book claimed that Rudolf Abel was
really Willi Fisher, born in Newcastle, England, in 1903. Years later while

90 Studies in Intelligence 49, No. 3


Bookshelf

working as a television producer in Newcastle, author Vin Arthey learned


about the Willi Fisher story and decided to determine whether Khenkin was
right. Like Father Like Son makes it clear that he was. 5

The book has two parts. The first focuses on Willis growing up in England. His
German father and Russian mother were both active communist organizers
working clandestinely for the party. The Russian revolution was motivation to
return to Russia, where they were given quarters in the Kremlin. After
finishing his education and serving a tour in the Red Army, Willi married and
had his only child, a daughter, Evelyn. His knowledge of English got him a job
as a translator-interpreter, first with the KOMSOMOL (Young Communists)
and later with OGPU (a predecessor of the KGB).

Building on his language skills, Fisher was trained as an illegal; his first
assignment was to Scandinavia. In 1935, he was sent to London to work with
another illegal, Alexander Orlov, who, along with Arnold Deutsch, was busy
recruiting the Cambridge ring, a fact Fisher never revealed that is
acknowledged for the first time publicly in this book. After Orlovs defection in
late 1938, Fisher was sacked. Although he survived the purges, he was forced
to work in an aircraft factory until recalled by the NKVD (successor to the
OGPU) in September 1941 as a radio operator. He was assigned to train
illegalsfor example, Kitty Harris, who became Donald Macleans handler. At
some point, he went to work for Pavel Sudaplatov, who directed the NKVD
Special Tasks directorate, and ended the war a hero, having run successful
radio deception operations, Operation MONASTERY among them. 6
Nevertheless, he was then dismissed from the NKVD for a second time, before
being rehired again and sent to the United States in 1948 as Willie Martens
just one of his cover nameswhere his English could be put to use.

Arthey adds considerable detail to Fishers stay in the United States, where he
worked as an artist while supporting the Rosenberg network, atomic spy Ted
Hall, and Morris and Leona Cohen. (The latter escaped just before the
Rosenbergs were caught and eventually became KGB illegals in Britain.) When
arrested, Fisher adopted the name of another KGB colonel, then dead, so that his
masters in Lubyanka would not acknowledge him by any of his cover names.
Abel never revealed his true identity or the details of his work to the FBI.

After his return to the Soviet Union, despite his adherence to the KGB code of
silence during interrogationprotecting his knowledge of Philby and the
Cambridge agentsFisher was never again accepted as an active intelligence
officer. He was involved with training young officers but was never fully

5 Louise Bernikow, ABEL (New York: Trident, 1970); Kyrill Khenkin, Okhhoynik vverkh nogami [The
Hunter on His Head] (Paris: Posev, 1980); Walter Laqueur, From HUMINT to SIGINT, The Times Liter-
ary Supplement, 11 February 1983.
6 For more detail on Operation MONASTERY, see Robert Stephan, Stalins Secret War (Lawrence: Uni-

versity Press of Kansas, 2004), reviewed in Studies in Intelligence 48, no. 4 (2004).

Studies in Intelligence 49, No. 3 91


Bookshelf

trusted. When he was hospitalized in October 1971, the suspicious KGB had
his room bugged. He died a month later. His tombstone reads Willi Fisher and
Rudolph Abel.

During his research for this book, Arthey contacted Fishers daughter and from
her learned the details of his final years. His book adds much to the story of one
of the KGBs most famous illegals, who suffered the sad fate of official obscurity
in the final five years of his life.

Ljubica Erickson and Mark Erickson, eds. Russia: War Peace and Diplomacy:
Essays in Honour of John Erickson. London: Weidenfeld and Nicolson, 2004.
365 pages, endnotes, index.

The late professor John Erickson learned Russian in grammar school; served
in the British Army Intelligence Corps, where he studied Serbo-Croatian,
German, and other European languages; and was an interpreter for the Allied
War Crimes Commission. He then went to Cambridge before joining St.
Antonys College, Oxford, where he became the worlds leading military
historian specializing in the Soviet Union. In 1968, he accepted a post at the
University of Edinburgh, where he remained until his death in 2002. His
writings on the Red Army, especially The Soviet High Command (1962),
became standard works, and he was respected and trusted by the Soviet High
Command as no other Western historian. He is a figure familiar to any student
of Soviet military history.

Ericksons colleagues, students, and friends contributed the 20 essays in this


festschrift. Eighteen deal with military history: Several discuss the Soviet and
German armies; two cover the research Erickson did for his books on Stalingrad;
another looks at the lesser known battles of the Soviet-German war; and one
discusses Jomini versus Clausewitz. Two are on military intelligence: One by
John Chapman is on Russia, Germany and Anglo-Japanese Collaboration,
19891906; the other, by Donald Cameron Watt, is a provocative piece typical of
the author, titled Rumours as Evidence. The final chapter, by former US Air
Force officer Lynn Hansen who studied with Prof. Erickson at the University of
Edinburgh, recounts the Edinburgh Conversations that Erickson held with
senior officials of the Soviet government.

John Erickson set the standard for history with work that was always
thoroughly researched, well argued, and well written. He would be proud of
this collection in his honor.

Daniele Ganser. NATOs Secret Armies: Operation Gladio and Terrorism in


Western Europe. London: Frank Cass, 2005. 326 pages, index.

As part of the planning that led to NATO after World War II, the Western
European nations decided that they should prepare and equip stay-behind
networks for use in the event of a Soviet invasion. Agents would be trained to
operate much as their World War II resistance predecessors. Their mission

92 Studies in Intelligence 49, No. 3


Bookshelf

would be to provide intelligence, perform sabotage, and disrupt


communications. This time, however, initial supplies would come not from
hastily organized, often inaccurate, air drops, but from prepositioned caches for
use by the secretly trained teams.

The existence of such stay-behind networks remained Europes best kept


secret until 1990. 7 About the same time, then Italian Prime Minister Giulio
Andreotti acknowledged that Italy had established what Ganser calls a secret
army coordinated by NATO (1). The response to Andreottis disclosures
included a series of newspaper stories that labeled the Italian role in the secret
NATO network as Operation GLADIO, although other participating nations
had different codenames.

Swiss scholar Daniele Ganser has written the first book on this subject. In it,
he asserts that the CIA and MI6 were the prime movers behind the networks,
unknown to parliaments and populations (1). He goes on to charge that the
CIA in particular, with its covert action policies that are by definition terrorist
in nature, used the networks for political terrorism.

After acknowledging the validity of the stay-behind networks, Ganser quickly


clarifies his argument. He alleges that, since the Soviets never invaded, some
GLADIO members became right-wing terrorists in Italy. In the 1970s and
1980s, using the explosives and other supplies in the prepositioned caches, they
were responsible for hundreds of terrorist attacks whose real purpose was to
discredit the communists. Although Gansers sourcing is largely secondary
newspapers and the likehis argument is convincing to the extent that both
things happened. What is in doubt is the relationship between the attacks and
government policy. Were the caches made available officially to terrorists, and
were the terrorist attacks part of Operation GLADIO? Or were they separate
acts by groups whose members had been trained as part of the now defunct
stay-behind networks and knew the location of some of the caches? Ganser
takes the former position, charging the CIAand to some extent MI6with
responsibility for the terrorist acts. (14)

But proof is a problem for Ganser. He complains at the outset that he was unable
to find any official sources to support his charges of the CIAs or any Western
European governments involvement with Gladio. Nevertheless, his book devotes
14 chapters to the secret war in various Western nations on his list. Much of
the narrative is historical. The chapter on Portugal, for example, begins with
background in 1926; the chapter on Spain, with the Spanish Civil War. The
history of how relationships were established among Western nations after
World War II is interesting and valuable, as is the survey of pubic reaction to
Operation GLADIO. But Ganser fails to document his thesis that the CIA, MI6,
and NATO and its friends turned GLADIO into a terrorist organization.

7 Hugh OShaughency, Gladio: Europes Secret Networks, The Observer, 18 November 1990.

Studies in Intelligence 49, No. 3 93


Bookshelf

Lucas Delattre. A Spy at the Heart of the Third Reich: The Extraordinary
Story of Fritz Kolbe, Americas Most Important Spy in World War II. New
York: Atlantic Monthly Press, 2003. 308 pages, bibliography, photos, no index.

In The Craft of Intelligence (1963), Allen Dulles alludes to but does not name
the man whom he later called his most productive agent in Switzerland during
World War II. Three years later, in The Secret Surrender (1966), Dulles
identifies him by his codename, George Wood. In his 1968 anthology, Great
True Spy Stories, he gives even more details about his agents life, but not his
true name. Others did their best to learn Woods identity and, in 1971, author
Ladislas Farago came close when he identified a Fritz Kople in his book Game
of the Foxes. Official acknowledgement of Wood as Fritz Kolbe, the former Nazi
Foreign Office senior clerk, came when OSS files were declassified in June
2000. Then, in September 2001, the German magazine Der Spiegel published
an article on Kolbe describing him as an anonymous hero of the Second World
War. Until this article, Kolbe was largely unknown in Germanyhe had not
been mentioned in the official history of the Federal Republic of Germany,
which did credit others who had acted against Hitler and the Nazis. Lucas
Delattre, a journalist with Le Monde, decided to look into the case and A Spy
At The Heart of the Third Reich is the result.

Although Fritz Kolbe was never a member of the Nazi party, he performed his
administrative duties in the Foreign Office so well that he survived several
purges and retained access to sensitive classified material throughout World War
II. A truly closet anti-Nazi, he arranged a trip to Switzerland in 1943 to try to
pass documents to the Britishbut he was rebuffed. He next went to OSS
station chief Allen Dulles, who cautiously accepted him. In the end, after many
more trips, his services earned the sobriquet prize intelligence source of the
war.

Delattre conveys admiration for Kolbes contribution and is perplexed that he


did not get more credit at the time. He nudges the British for downplaying
some of Kolbes reports. Subsequent events, however, show that they had good
reason for doing so. For example, the secret transmitter in Dublin that Kolbe
revealed was already known to the British because they were breaking the
German code. Making a fuss about the new intelligence might have alerted the
Germans that London knew about the transmitter, if a leak were to have
occurred. Similarly, Delattre tells how Kolbe alerted OSS to the German
penetration of the British embassy in Ankara. He is concerned that here, too,
the British response was less than enthusiastic when told about it. What he
does not realize is that the British already knew what the situation was from
their code-breaking efforts at Bletchley Park. Moreover, though the British did
not tell OSS, the penetration, code-named CICERO, was not the only mole in
the embassy. One was never caught; the other, the ambassadors chauffeur, was
only identified after the war. 8 When Kolbe reported about CICERO, it was

8 Nigel West, The Guy Liddell Diaries: WALLFLOWERS, Vol. II (London: Routledge, 2005), 460.

94 Studies in Intelligence 49, No. 3


Bookshelf

obvious there was a leak and London therefore discouraged discussion of the
penetration so as not to alert the Germans they were on to them while they
continued to hunt for the other moles.

As for the United States, the skeptical War Department intelligence staffs only
reluctantly accepted the Kolbe material late in the war, further diminishing its
utility. At one point, they refused to send it to the president, and Delattre
describes the ensuing inter-organizational battles. There is no doubt that Fritz
Kolbe took many personal risks and delivered much order-of-battle and other
data2,600 Foreign Office documents in all. But this material tended to
confirm sources unknown to Dulles.

Kolbes espionage for the Allies was known by some trusted friends who helped
him with accommodation addresses and the like during the war. After the war,
using the name George Wood, he permitted an interview that resulted in a
sketchy biographical story in True Magazine (1950). Dulles tried but was
unable to stop its publication in Germany, so a much wider audience became
aware of Kolbes wartime activities. Many viewed him as a traitor, and he did
not live to see his vindication in the Der Spiegel article mentioned above.
Delattres chapter Disgrace tells how Kolbes efforts to find a meaningful
existence in Germany failed.

Despite the irritating absence of specific source notes and an index, this is a
worthwhile book on an important case. Delattre is right when he ends with the
thought that Fritz Kolbe was without any question democratic and pro-
Western. His only mistake was to have been those things before everyone else
in Germany (223).

The book concludes with a remembrance of Kolbe by OSS and CIA veteran
Peter Sichel, who helped handle Kolbe after the war. His firsthand account
adds much to the image of a true German patriot.

Ruth Price. The Lives of Agnes Smedley. New York: Oxford University Press,
2005. 498 pages, endnotes, photos, index.

During the 1976 budget crisis in New York, classes at City College were
cancelled and graduate student Ruth Price used the free time to read a semi-
autobiographical novel, Daughter of Earth, by the controversial author Agnes
Smedley. Thus began an interest that simmered until the mid-1980s when
then-professor Price turned her full attention to Smedleys life and made the
decision to write this biography.

Born in Missouri on 23 February 1892, Agnes Smedley was the daughter of a


failed cattle broker and sometime farmer and his part-Indian wife. Her
birthplace was a two-room cabin without plumbing or electricity. In the early
1900s, the Smedleys moved to Trinidad, Colorado, the first of several towns
where Agnes went to school and worked washing clothes after classes. It was a
period of labor unrest and economic depression, but she managed to get part

Studies in Intelligence 49, No. 3 95


Bookshelf

way though grade school, supplementing her formal education with


voluminous reading. At 17, Agnes passed exams for a one-year secondary
school teaching certificate, and began teaching for $40 a month. When her
certificate expired, she accepted an offer to study in Phoenix, and with that she
was on her way to becoming a progressive, a communist, and a writer. She
would write mostly about China, teach at Berlin University, and later lecture
at Harvard.

Price examines Smedleys life in great detail, explaining how she became
involved in the radical movement of the times and describing the many
communists who played important parts in her life. Smedley traveled widely.
In Germany, she worked for the COMINTERN under chief propagandist Willi
Muenzenberg. In India, she participated actively in the left wing movement
before going to China, where she met and was captivated by Mao and other
communist leaders. It was her activity in Chinaworking for Soviet military
intelligence agent Richard Sorgethat brought her to the attention of the post-
World War II anti-communist movement in the United States. Smedley denied
US Army charges that she was or had been a Soviet agent, and she threatened
to sue for libel if the army did not admit it was wrong and did not apologize.
And that is what the army did. She had worked against the Nazis and the
Japanese, not directly against the United States, they rationalized.

Nevertheless, in 1950, the House Committee on Un-American Activities, using


the same evidence available to the armysupplied by Maj. Gen. Charles
Willoughby, Gen. Douglas Macarthurs G-2upheld the charges and planned
to have her testify. In London at the time, Smedley died after an operation for
ulcers before she had to decide whether to return. For 50 years, Price notes, the
political right maintained her guilt, charging that she was indeed a communist
and had spied for China and the Soviet Union. With at least equal vigor, the
left has maintained that Smedley was an unblemished heroine, the tragic
victim of a McCarthyite smear (even though Smedley died before McCarthy
began his crusade). Price writes that as a self-identified leftist, I, too, initially
dismissed the accusations against Smedley. My Smedley was an
uncompromising liberal.

Then, as her research progressed, Price discovered the Smedley archives in


Moscow; interviewed her former colleagues in China, India, and the United
States; examined contemporaneous FBI interviews with communists who
worked with Smedley, including her Soviet case officer; and found Smedleys
arrest records in Germany. Furthermore, she came across statements by Sorge
that she had been his agent. That is not all. When the British released the
MASK decrypts of communist party pre-war message traffic, Smedley was
mentioned frequently. All these sources supported the fact that Smedley has
been Sorges agent and a COMINTERN agent, and had worked in the Chinese
Bureau of Information as well. The right in this case was correct. Smedley had
had a clandestine life and, to Prices great credit, she documents it wonderfully,
although she admits that this was the last thing I wanted to establish. 9

96 Studies in Intelligence 49, No. 3


Bookshelf

David Oliver. Airborne Espionage: International Special Duties Operations


in the World Wars. Gloucestershire, UK: Sutton Publishing, 2005. 250 pages, bib-
liography, photos, index.

By the start of World War I, flying ace Jules Vdrines was 33 and too old for
frontline service in the French air force (Aviation Militaire). However,
experienced at flying by moonlight, he was soon a special-missions pilot taking
agents behind enemy lines in airframes made of wood. A new solution to the
perennial problem of insertion had been implemented. Special-mission flying
continued during the interwar period in the Far East, the Soviet Union, Italy,
Germany, and Spain, in anticipation of another conflict. World War II became
the glory days of what the Allies called Special Duty (SD) Squadrons. In
Airborne Espionage, David Oliver tells the story of the special pilots, their
aircraft, and the agents they inserted behind enemy lines.

Some of the pilots and their passengers became well known. Capt. George Hill,
a British Russian-speaking military intelligence officer, learned to fly in the
Balkans so he could insert his own agents behind enemy lines. He would go on
to author two books and to work with Sidney (Ace of Spies) Reilly in Moscow.
T. E. Lawrence (of Arabia) employed special-mission flights in the Middle East.
Australian Sidney Cotton, who would later support OSS, pioneered clandestine
aerial-photography flights covering many of the denied areas in Europe,
including Berlin.

During World War II, over 100 of the agents inserted were women, like Noor
Inayat Khan, a British wireless operator who had lived in France. These
already high risk operations were made even more dangerous because the
Gestapo had penetrated many of the resistance networks the SD squadrons
were supporting. The SDs also played a part in the British DOUBLE CROSS
(XX) operation and worked with OSS and various allied elements throughout
the world. For balance, Oliver includes many of the Nazi and Japanese
operations against the Allies and also describes their aircraft.

In a postscript, Oliver reviews the postwar life of some of the SD pilots, agents,
and opponents who survived. A few were ignored and fell on hard times. Some
went into politics. Others, especially the female agents, wrote books. They had
filled a need that still exists, albeit the aircraft and communications equipment
have changed. Airborne Espionage documents their contribution for the first time.

9 Not all readers agree with Prices judgment. One from George Mason University writes: I'm sorry to see

that Price has acquiesced, to some extent, to cold-war anti-communism in failing to affirm Smedley's hard
and dangerous work for anti-imperialism in India and in favor of the Comintern which, whatever its man-
ifold failings, was at least on the right sidethe side of those who opposed class exploitation and imperi-
alismas the US, UK, et al. were not (http://hnn.us/readcomment/). For another look at The Lives of
Agnes Smedley, see the review by Prof. Harvey Klehr in The Weekly Standard, 31 January 2005.

Studies in Intelligence 49, No. 3 97


Bookshelf

Hugh Popham. The FANY in Peace and War: The Story of the First Aid Nurs-
ing Yeomanry, 1907-2003. Revised edition. Barnsley, Yorkshire, UK: Leo Cooper,
2003. 174 pages, bibliography, photos, appendices, index.

Service with Lord Kitchener in the Sudan campaign of 1898 convinced cavalry
Sgt. Maj. Edward Baker that troops wounded in the field needed skilled
medical attention before the ambulance arrived. He envisioned women riding
sidesaddle round the fringes of a traditional battlefield dressed in vivid scarlet
tunics and voluminous skirts tending the wounded and freeing soldiers for
combat (2). He finally launched his all volunteer organizationalthough with
a different dress codein England in 1907, where the headquarters of the First
Aid Nursing Yeomanry (FANY) Corps is still located today.

In the British army, the yeomanry initially consisted of non-combat support


troops. A yeoman in the royal household, on the other hand, was a highly
qualified servant or aide. Baker had both concepts in mind when he recruited
for his unorthodox unit in the local newspapers. Qualifications included
education, horsemanship skills, and foreign language ability. Training in first
aid, map reading, and radio communications would be provided. Enrollment
cost the applicants 10 shillings. The women had to provide their own uniforms
and horse, and commit for one years service.

The initial response was positive although the Corps was to have its difficult
times. The FANYs, as they are called, have since served in both peace and war,
and author Hugh Popham reviews their entire history while telling how the
tasks they performed soon departed from nursing to ambulance driving,
eventually focusing on communications support.

A principal point of interest for the intelligence professional is the FANYs


service in the Special Operations Executive (SOE) during World War II and
their operations with the resistance in occupied France. Some 73 were trained
as agents and 39 went to France. Several were caught by the Gestapo and
ended their lives in Dachau and other camps.

At a time when women in the intelligence services was not an everyday


occurrence, the FANYs established a powerful precedent. Popham summarizes
their story well, and the bibliography provides sources where more detail can
be acquired. In this regard, Leo Markss Silk and Cyanide (HarperCollins,
1998) is to be recommended.

Thomas Boghardt. Spies Of The Kaiser: German Covert Operations in Great


Britain during the First World War Era. New York: Palgrave Macmillan, 2004.
224 pages, endnotes, bibliography, photos, index.

In 1901, with its ship-building program well underway, the German Admiralty
created a naval intelligence department (designated N), a first for Germany,
to keep track of foreign navies in general, and Britains Royal Navy in
particular. Agents were recruited and dispatched to Britain to report on naval

98 Studies in Intelligence 49, No. 3


Bookshelf

order-of-battle and make damage assessments after the anticipated naval


engagements, which never materialized. It was just as well, because the
German agents were too few in number and poorly trained, and they
consequently produced little of value. Thomas Boghardt is the first to write
about the role of N in World War I.

Spies of the Kaiser also examines British counterintelligence capabilities before


and during the war. At the outset, from the British perspective, the German
espionage threat was muddled to put it politely. In 1903, Erskine Childers
published his novel Riddle of the Sands with the aim of increasing public
awareness of the threat of a German invasion. Although the British Admiralty
was not convinced, the public was indeed aroused (23). In 1906, capitalizing on
the public mood, British journalist William Le Queux published his The
Invasion of 1910, which sold over 1 million copies. The battle was joined.
Despite the lack of evidence to support the novelists claims, the government
responded to public pressure by forming a subcommittee of the Committee of
Imperial Defence to reexamine the threat of invasion. Although not a direct
consequence of the subcommittees actions, by 1907 there were calls for a
department to collect foreign intelligence to establish the nature of the threat.
But the War Department resisted. Then in 1909, Le Queux published his
masterpiece of fiction, Spies of the Kaiser, with claimed that 5,000 German
spies were operating in Britain. Adding fuel to the fire, he stated that his novel
was based on fact. That same year, the War Office established new intelligence
elements that would become what is known today as MI5 and MI6.

In contrasting the development and operations of MI5 and N, Boghardt shows


how the former, created on the basis of faulty intelligence, was a public relations
winner and, despite parsimonious resources, had a reasonable record of success.
There were in fact German agents in Britain, although nowhere near the
number proffered by Le Queux and his supporters. MI5s task was hampered
from the start, in part because before the war there were more German agents
than MI5 intelligence officers. The situation was further complicated because the
public responded to the spy scare with hundreds of reported sightings of German
spies, which had to be investigated. Nevertheless, all the important agents were
identified and arrested or neutralized. N, on the other hand, while formed for
the right reasons, failed to develop the professional capabilities to do the job and
in the end never posed a serious threat to British security.

When war was declared, the press claimed that all German agents in Britain
had been arrested. Many historians have accepted this view as accurate. But
because Boghardt had access to recently released German and British archival
documents, he was able to correct that conventional wisdom and show that MI5
manipulated the record to reflect that position. Several spies had indeed been
arrested, but some were never found. During the war, at least 120 agents
operated in Britain and MI5, with Special Branch, arrested 31 of them (105).
The principal method of detection was mail monitoring, although a number
were caught because the agents they attempted to recruit turned them in.

Studies in Intelligence 49, No. 3 99


Bookshelf

Spies of the Kaiser provides summaries of the major wartime cases of N


espionage operations in Great Britain and discusses several that involved
agents operating in the United States. The latter include instances of biological
warfare in which N agents in Washington created anthrax to infect the horses
being shipped to Britainthey were unsuccessful.

Boghardt finds little to suggest that either service made a difference in the war.
After the war, N was disbanded along with the Imperial Navy. MI5, however,
survived with its reputation enhanced and many lessons learned and went on
to be exceptionally successful in World War II.

100 Studies in Intelligence 49, No. 3


Raising Questions

A Different Take on FDR at Teheran


and Yalta
Warren F. Kimball
Gary Kerns piece, How Uncle Joe Bugged FDRpublished in Studies in Intelli-
gence, vol. 47, no. 1 (2003)nicely summarizes what we know about electronic
eavesdropping done by Soviet intelligence at the Teheran and Yalta conferences.
The story Kern tells is well known, although he has dug up some excellent atmo-
spherics from recent memoirs and Russian literature. There is no question that
Roosevelt was bugged at Teheran and Yalta, as the sources published over the
years that I cite below indicate. Kern concludes that FDRs failure to react
stemmed from a combination of profound ignorance of the Bolshevik dictatorship
and wishful thinking, a resuscitation of the hoary FDR-as-naif argument that
has been around since the Second World War.

One of the traps inherent in secret intelligence gathering is the they-know-that-


we-know phenomenon. Intelligence libraries are filled with tales of double-, triple-,
and quadruple-crosses. During meetings with Stalin, both the British and the
American delegations knew their quarters were bugged. Anna Roosevelt, the presi-
dents daughter, recalled the secret service agents finding listening devices at
Yalta. Stalin was correct to wonder, as noted by Kern, if the Anglo-Americans
know we are listening to them and, presumably, misleading their Soviet eaves-
droppers. Mike Reilly, chief of the Secret Service detail that guarded Roosevelt,
waited to debug Livadia Palace, FDRs residence during the Yalta conference, until
it would be too late for the Russians to replace the devices. At the same time, he
warned that no matter how many they found, they would fail to find them all. 1

According to Kerns references, Sergo Beria, who was one of the listeners at the
Teheran Conference, said Stalin had him listen to Roosevelts conversations to
determine the presidents attitude regarding opening a second front, since
Churchill was against it. But what are Berias recollections of what FDR had to
say? During his conversations with his collaborators [advisors] Roosevelt always
expressed a high opinion of Stalin . They know we are listening, commented
Stalin, yet they speak openly! When Beria claimed that the microphones were
too well hidden to be spotted, Stalin marveled: Its bizarre. They say everything in
fullest detail . 2 One can read that as FDR-the-naive or as FDR-the-shrewd, who
knew full well that his words were heard and used the opportunity to try to con-
vince the Soviet leader that the West was not dedicated to the overthrow of his
government.

1 Jim Bishop, FDRs Last Year: April 1944April 1945 (New York: Pocket Books, 1975), 346.

Dr. Warren F. Kimball is Robert Treat Professor of History at Rutgers


University.

Studies in Intelligence 49, No. 3 101


Commentary

Few accuse Winston Churchill of naivet, especially about the Soviet Union, yet
his quarters, at Yalta and during previous meetings with Stalin, were also wired
by the Soviets. In August 1942, during the prime ministers first stay in Moscow
for meetings with Stalin, Churchill received warnings that his rooms were bugged.
He was skeptical, but he played to the secret listeners by calling the Russians
lower in the scale of nature than the orang-outang, intending that they-know-
that-he-knew. 3 I have found no record of the British telling the Americans of the
eavesdropping that took place in Moscow in 1942, but a nation that shared the
ULTRA secret would certainly have shared its knowledge of Soviet electronic
eavesdropping. Since the so-called servants at Teheran were clearly carrying side-
arms under their uniforms, as Kern points out, it was obvious to all that service
was not their primary task.

At the Yalta conference, Churchill wrote in his memoirs that his Russian hosts gave
kindly attention to every chance remark. When a British official commented that
a large fish tank had no fish in it, goldfish quickly appeared. When another com-
plained that they had no lemon peel to use in their drinks, a lemon tree loaded with
fruit materialized the next day.4 Perhaps this was eavesdropping by nearby ser-
vants, but the more likely listener was a microphone with a tape recorder, and
British officials were well aware of what had happened in the past.

I am dubious about Kerns material gathered in interviews and correspondence


with Valentin Berezhkov, who was an unabashed self-promoter. Kern accepts
Berezhkovs claim of being Stalins translator at the Teheran and Yalta confer-
ences. Berezhkov was at Teheran, and may have done some translating for Stalin
in both German and English (German being his better language). But Berezhkov
was not Stalins translator at Yalta, nor can I find any evidence that he was even
there. His wartime memoir neither claims nor indicates that he was at Yalta.
Vladimir Pavlov was the primary English language translator for Stalin at both
meetings. The official records of meetings at Yalta invariably list Mr. Pavlov, but
make no mention of Berezhkov. Berezhkov is not mentioned in Sergo Berias mem-
oir even though Beria was one of the listeners at Teheran. But then neither is
Pavlov. One historian has commented that Berezhkov peddled his story about

2 Sergo Beria, Beria, My Father: Inside Stalins Kremlin, Franoise Thom, ed., Brian Pearce, transl. (Lon-

don: Duckworth, 2001), 9293. Berias recollections are, to say the least, suspect. As the editor of the vol-
ume points out, Beria was raised in a world of lies and half-truths, lies that were all the more inextricable
because the truth was unbearable (viii). The editor makes no mention of notes or records used by Sergo
Beria to write his memoirs, making specific quotations attributed to Stalin dubious at best. That said,
Berias depiction of Stalins reaction to the product of Soviet eavesdropping at Teheran and Yalta contra-
dicts no other evidence and, in the context of that era, is plausible.
3 David Reynolds, In Command of History: Churchill Fighting and Writing the Second World War (Lon-

don: Allen Lane, 2004), 326. Reynolds and others speculate that Churchill was too naive throughout the
war about the dangers of Soviet listeners during conferences. Perhaps, but that assumes he said things
privately that were greatly different from what he was telling Stalina difficult case to prove. See Rey-
nolds, note 12, 611.
4 Winston S. Churchill, Triumph and Tragedy (Boston, MA: Houghton Mifflin, 1953), 347. See also Alex-

ander Cadogan, The Diaries of Sir Alexander Cadogan, David Dilks, ed. (New York: G. P. Putnams Sons,
1972), 471.

102 Studies in Intelligence 49, No. 3


Commentary

being Stalin's interpreter assiduously in the 1980s, while Pavlov was seriously ill
and therefore silent. But that does not change the fact that, as a matter of course,
Soviet listening devices were installed, and understood by the Anglo-Americans to
be installed, when they came to meet with Stalin and, presumably, with other
Soviet leaders. 5

Perhaps, as Kern asserts, the eavesdropping permitted Stalin to learn of moods


and attitudes of his diplomatic counterparts, although the value of such psycho-
logical intelligence is questionable, especially with Churchills volatile mood
swings. Perhaps it provided key information about Anglo-American strategies for
such later litmus-test issues as the postwar political fate of eastern Europe. But
there is no evidence that such was the case, and what happened in 1945 had
already been decided by prior political arrangements and military events (read
that as Churchill and Roosevelt recognizing the need to have the Soviet Union as
an ally in order to defeat Hitler and his Nazis, followed by the reality, as of sum-
mer 1944, of the Red Armys rapid advance across the central European plains).
Historians need to be careful about reading backward interpretations by the new
perfectionists who insist that Churchill and Roosevelt should have become Cold
Warriors even before the Grand Alliance defeated Hitler. 6

The fact is that, probably at Teheran and definitely at Yalta, both Churchill and
Roosevelt and their advisers assumed that the Russians had bugged their quar-
ters. 7 That makes it persuasive, based on evidence and actions, to argue that
neither Churchill nor Roosevelt said (or intended to say) anything that Stalin
could not hear. One historian of the Teheran Conference has argued that
Roosevelt would probably not have been unduly concerned about having his con-
versations overheard. After all, one reason FDR had come to Teheran was to
demonstrate to the Russians that he could be trusted. 8 The same attitude charac-
terized both Churchill and Roosevelt at Yalta. The private strategies of Churchill
and Roosevelt were their public positions, at least to Stalin. Neither was plotting
to overthrow the Stalinist regime or to cheat the Soviet Union of the fruits of vic-

5 Christopher Andrew and Vasili Mitrokhin, The Sword and the Shield (New York: Basic Books, 1999),

17576, mentions Soviet eavesdropping of Churchill and Roosevelt at Teheran. They provide no details
and imply that such intelligence was not used by Stalin. I have seen no allegation of such bugs of the
quarters of British Foreign Secretary Anthony Eden and US Secretary of State Cordell Hull during the
meeting of foreign ministers in Moscow a few weeks prior to the Teheran talks, but it seems reasonable
to assume that such was the case. It seems equally reasonable to assume that both men were warned of
such espionage, given the British experience a year earlier. The official records of the Yalta Conference
are found in US Department of State, Foreign Relations of the United States: The Conferences at Malta
and Yalta, 1945 (Washington: Government Printing Office, 1955).
6 See Warren F. Kimball, The Incredible Shrinking War: The Second World War, Not (Just) the Origins

of the Cold War, Diplomatic History 25:3 (summer 2001): 351. Kern is revealingly presentist, when he
corrects FDR for referring to Russia [sic] rather than Kerns preferred Soviet Union. Common usage
during the Second World War was Russia, although Churchill referred to the Russians when talking
about geopolitics, and the Bolsheviks when speaking of ideology.
7 Beria also refers to planting bugs in gifts presented to Averell Harriman, presumably when he was US

ambassador in Moscow during the war. Beria, 100.


8 Keith Eubank, Summit at Teheran (New York: William Morrow, 1985), 19697. See also Cadogan Dia-

ries, 579.

Studies in Intelligence 49, No. 3 103


Commentary

tory. As for the postwar political structure, both Churchill and Stalin had observed
that, in the Russian leaders oft-quoted phrase, whoever occupies a territory
imposes on it his own social system. 9 The Anglo-Americans had their secrets, par-
ticularly about the atomic bomb project, but there is not a shred of evidence or
even rumor that Churchill and Roosevelt discussed the Manhattan project, pri-
vately or at the conference table, with each other or anyone else, when they met
with the Soviet leader. 10

Most American and British leaders and officials believed Germany, not the Soviet
Union, was the enemy. Criticize both Roosevelt and Churchill, if you wish, for
adopting negotiating and long-term strategies regarding Stalin and the Soviet
Union that, after the Cold War experience, seem to many to have been misguided.
Condemn them both for thinking they could trust Stalin. Poor Neville Chamber-
lain believed he could trust Hitler. He was wrong, said Churchill. But I don't
think I'm wrong about Stalin. 11 But understand that while Roosevelt (and
Churchill) may have twice walked willingly and knowingly into a surveillance
trap, as Kern states, neither of the Anglo-American leaders failed to understand
that the so-called trap could serve their own purposes.

So where does this leave us? Either Winston Churchill and Franklin Roosevelt, the
two men who led their nations to victory in the Second World War, were stupidly
careless and cavalier, or they just did not care if conversations in their quarters
were overheard and passed on to Stalin and his cohorts. Readers choice. 12

9 Churchill used a more flowery phrase"the right to guide the course of history is the noblest prize of

victorybut the meaning was the same as Stalins. Warren F. Kimball, Forged in War (New York: Mor-
row, 1997), 209.
10 The atomic bomb project is again an example of the we-know-that-they-know (and perhaps they-know-

that-we-know-that-they-know) syndrome. FDR knew about Soviet espionage at the Manhattan Project no
later than September 1943. Given reports of Soviet intelligence collection, is it not likely that Stalin knew
that the Americans knew that he knew? Ah, the web we weave. For a discussion of this, see Forged in War,
22021, 27980, 32930.
11 Quoted from the diary of Hugh Dalton by David Reynolds, In Command of History, 469. Christopher

Andrew, the dean of British intelligence historians, depicts Roosevelt as disinterested when confronted
with reports of Soviet spying in the United States. Andrew and Mitrokhin, 107.
12 I am reminded of the claim in the 1950s and early 1960s made by Democratic-leaning pundits that

Dwight Eisenhower was little more than a bland grandfather figure who was not very bright. It seems
not to have occurred to the critics that this kindly dolt had, with great skill and success, managed the
Anglo-American victory against Hitler.

104 Studies in Intelligence 49, No. 3

You might also like