Professional Documents
Culture Documents
iii
INTELLIGENCE IN RECENT PUBLIC
LITERATURE
Spy Handler 71
Reviewed by John Ehrman
COMMENTARY
Raising Questions
A Different Take on FDR at Teheran
and Yalta 101
Warren F. Kimball
iv
CSIs Mission The Center for the Study of Intelligence (CSI) was founded in 1974 in response to
DCI James Schlesingers desire to create within CIA an organization that could
think through the functions of intelligence and bring the best intellects avail-
able to bear on intelligence problems. The Center, comprising both professional
historians and experienced practitioners, attempts to document lessons learned
from past operations, to explore the needs and expectations of intelligence con-
sumers, and to stimulate serious debate on current and future intelligence chal-
lenges.
Contributions Studies in Intelligence welcomes articles, book reviews, and other communica-
tions from authors both within and outside the government community on
any historical, operational, doctrinal, or theoretical aspect of intelligence.
Submissions should be sent to:
Studies Editor
Center for the Study of Intelligence
Central Intelligence Agency
Washington, DC 20505
Awards The Sherman Kent Award of $2,500 is offered annually for the most signifi-
cant contribution to the literature of intelligence submitted for publication in
Studies. The prize may be divided if two or more submitted articles are
judged to be of equal merit, or it may be withheld if no article is deemed suffi-
ciently outstanding. An additional $5,000 is available for other prizes, including
the Walter L. Pforzheimer Award. The Pforzheimer Award is given to the
graduate or undergraduate student who has written the best article on an
intelligence-related subject.
Unless otherwise announced from year to year, articles on any subject within
the range of Studies purview, as defined in its masthead, will be considered
for the awards. They will be judged primarily on substantive originality and
soundness, secondarily on literary qualities. Members of the Studies Edito-
rial Board are excluded from the competition.
The Editorial Board welcomes readers nominations for awards but reserves
exclusive prerogative in the decision.
i
A Long Look Back
served through 10 changes in to go home. 2
president; scores of major and
minor wars, civil wars, military
Nineteen DCIs served incursions, and other armed con- Then came the National Security
through 10 changes in flicts; two energy crises; a global Act of 1947, which set forth a
president, scores of recession; the specter of nuclear description of the DCIs job:
wars, . . . a global holocaust and the pursuit of arms
recession, the specter control; the raising of the Berlin There is a Director of Central
Wall and the fall of the Iron Cur- Intelligence who shall . . .
of nuclear holocaust, tain; the proliferation of weapons serve as head of the United
and the arrival of of mass destruction; and the States intelligence commu-
international arrival of international terrorism nity . . . act as the principal
terrorism on US on the shores of America and the adviser to the President for
shores. war against it overseas. During intelligence matters related to
that time, the DCIs participated the national security; and . . .
in or oversaw several vital contri- serve as head of the Central
butions that intelligence made to
Intelligence Agency.
US national security: strategic
warning, clandestine collection,
independent analysis, overhead Two years later, the Central Intel-
reconnaissance, support to war- ligence Agency Act laid down the
fighters and peacekeepers, arms DCIs and the Agencys adminis-
control verification, encourage- trative rubrics. Over the next
ment of democracy, and counter- several decades, the DCI would
terrorism. directly manage thousands of
employees and billions of dollars,
The responsibilities of the DCI and would have an important part
grew logarithmically after Janu- in guiding many thousands and
ary 1946, when President Harry many billions more.
Truman whimsically presented
the first DCI, Sidney Souers,
with a black hat, black cloak, and
1 Christopher Andrew, For the Presidents
Eyes Only: Secret Intelligence and the
wooden dagger and declared him Presidency from Washington to Bush (New
the Director of Centralized York: HarperCollins, 1995), 164.
Dr. David S. Robarge is chief Snooping. 1 At that time, the DCI 2 Tom Braden, The Birth of the CIA,
historian of the CIA. had no CIA to run, no indepen- American Heritage 27 (February 1977): 10.
All statements of fact, opinion, or analysis expressed in this volume are those of the author. Nothing in
the volume should be construed as asserting or implying US government endorsement of a volumes
factual statements and interpretations.
Studies in Intelligence Vol. 49, No. 3 1
DCIs
On this date, John Negroponte assumed leadership of the US Intelligence Community as the first
a.
director of national intelligence. Mr. Goss, retitled Director of the Central Intelligence Agency,
continued to head CIA.
With no political,
military, or industrial
base, the DCI was the
Its a Very Hard Job sisoften carried the implicit
easiest man in message, Mr. President, your
After John McCone was sworn in Washington to fire. policy is not working. Presi-
as DCI in November 1961, Presi- dents often have unrealistic
dent John Kennedy shook his
hand and gently warned him that
he was now living on the bull's
eye, and I welcome you to that
spot. 3 The bulls eye seems an
The purpose for establishing the
position of DCI and the CIA
expectations about what the
CIAs espionage and covert action
capabilities can achieve, and they
usually did not appreciate hear-
ing from their DCIs that the
appropriate metaphor, consider- world was complicated and
under law in 1947 was to help
ing how often DCIs were the tar- uncertain. No wonder R. James
avoid another Pearl Harbor sur-
gets of recrimination and attack. Woolsey said his version of the
prise by taking strategic intelli-
George H. W. Bush called the job jobs description could be written
gence functions from the confines
the best . . . in Washington, 4 but very simply: Not to be liked. 7
of separate departments and ele-
arguably it also was the toughest. vating them to the national level.
The DCI was to have been the
The DCI really did not direct DCIs in Profile
only adviser to the president with
something called central intelli- even a chance of presenting him
gence. He was responsible for with unbiased, nondepartmental Allen Dulles once told Congress
coordinating national collection intelligence. The seemingly that the CIA should be directed
and analysis, but he lacked the straightforward phrases in the by a relatively small but elite
authority to do so, faced formida- National Security Act, however, corps of men with a passion for
ble competitors in other agen- only gave the DCI the potential anonymity and a willingness to
cies, and had no constituency to to be a leader of the Intelligence stick at that particular job. 8
support him. He had to walk the Community. Whether a given While Dulless advice may be
knifes edge between politics and DCI came close to being one was applicable to the heads of the
politicization, and was the handy a result of the interplay of per- Agencys directorates and offices,
scapegoat for intelligence mis- sonalities, politics, and world hardly any part of his statement
steps often committed or set in events. With line authority only was borne out over the history of
train years before. And he had to over the CIA, the DCI depended the DCIs position. Elite, yes; but
deal with the reality that, as on his powers of bureaucratic neither small in number nor
Allen Dulles wrote, Intelligence persuasion and, most vitally, his anonymousmany were well
is probably the least understood political clout at the White House known in their various pursuits
and most misrepresented of the to be heard and heeded. Richard when they were nominated. And
professions. 5 Helms often noted that the secre- even if they were willing to stay
tary of defense was the second for the long haul, few did. In late
most powerful person in Wash- 1945, an interdepartmental com-
3 White House press release, Remarks of
ingtonexcept, perhaps for a few mittee that was developing a
the President at the Swearing-In Ceremo- plan for a national-level intelli-
nies of John McCone, 29 November 1961, first ladieswhereas the DCI
Executive Registry Files, Job 80B01676R, was the easiest man in Washing- gence agency recommended that
box 8, folder 7. The subhead quotation is ton to fire. I have no political, its director be appointed for a
John Deutchs, in Charles E. Lathrop, The military, or industrial base. 6
Literary Spy: The Ultimate Source for
Quotations on Espionage and Intelligence
Moreover, the DCIs showcase 6 Trudi McC. Osborne, The (Really) Quiet
(New Haven: Yale University Press, 2004), productnational-level analy- American: Richard McGarrah Helms,
118. The Washington Post, 20 May 1973, C2.
4 Stansfield Turner, Secrecy and Democ- 7 Lathrop, 117.
racy: The CIA in Transition (Boston: 5Allen Dulles, The Craft of Intelligence 8 The Silent Service, Time, 24 February
Houghton Mifflin, 1985), 24. (New York: Harper and Row, 1963), 5. 1967, 16.
The average time DCIs
served was just over
three years.
long term, preferably not less the fall of the Allende regime in
than six years. 9 Testifying to Chile in 1973; the publication of
Congress in early 1947 about the
proposed National Security Act,
Dulles asserted that appoint-
ment as DCI should be some-
what comparable to appointment
als they led under 11 administra-
tions over nearly six decades that
the leaked Pike Committee
report in 1976; the breakdown in
the SALT II talks in 1977; a
military coup attempt in recently
democratized Spain in 1981; the
to high judicial office, and should they were able to accomplish as assassination of the Lebanese
be equally free from interference much as they did despite all the prime minister in 1987; the
due to political changes. 10 bureaucratic disruptions.
official breakup of the Soviet
Union in 1991; and a deadly
The reality of a DCIs tenure was The frequency of these regime terrorist attack in Egypt in 2004.
otherwise. The average time they changes at the CIA must further
served was just over three years, be considered in light of the fact
and only five DCIs stayed at least that most new DCIs had next to In other instances, major events
four. It is a tribute to the DCIs no time to settle in and read in. immediately preceded the DCIs
and all the intelligence profession- Over half had to face foreign arrival: the signing of the
policy or intelligence-related Vietnam War peace accords in
9 Preliminary Report of Committee
crises within their first month. 1973 and the terrorist shootings
Appointed to Study War Department
These included: the Chinese outside the CIA headquarters
Intelligence Activities, 3 November 1945, invasion of North Korea in 1950; compound in 1993. Soon after his
document 42 in Foreign Relations of the the death of Stalin in 1953; the appointment in 1950, Walter
United State, 1945-1950: Emergence of the US military incursion into the Bedell Smith said, I expect the
Intelligence Establishment (Washington: Dominican Republic in 1965;
Government Printing Office, 1996), 102. worst and I am sure I wont be
10 Statement to the Senate Armed Ser-
Frances withdrawal from NATO disappointed. 11 Most subsequent
vices Committee, 25 April 1947, National and a marked upsurge in the DCIs likewise were not. Perhaps
Security Act clipping file, folder 29, CIA Cultural Revolution in China in the best advice they could have
Historical Intelligence Collection. 1966; the Yom Kippur war and
received from the presidents who
picked them was, Be ready to hit
the ground running.
11 Lathrop, 110.
12 Stephen E. Ambrose, Eisenhower the Presi-
dent (New York: Simon and Schuster, 1984), 227.
13 Most of the following biographic data comes
They were born in 14 different Historians and DCIs Smith, Dulles, McCone, Casey,
states. Most hailed from the and possibly Helmsare por-
Midwest (nine) and the North- An inconsistency exists between trayed as making noteworthy
east (seven). One was born in the fairly extensive bibliography contributions to the way the US
the Southwest, one in the West, on DCIs and historians evalua- government conducts intelli-
and one overseas. tion of their personal contribu- gence activity.
tion to US national security.
They attended 21 different col- Nearly as many biographies have That consensus may derive from
leges, universities, and been written about DCIs as about conceptions of the proper place of
graduate or professional comparable members of the intelligence practitioners in the
schools. Eight finished college, American foreign policy commu- foreign policy process. Intelli-
and ten others went on for post- nitythe secretaries of state and gence, the premise goes, should
graduate degrees. One, Bee- defense, the presidents national be detached from policy so as to
tle Smith, completed only high security advisers, and the chair- avoid cross-corruption of either. If
school. Considering that he men of the Joint Chiefs of Staff. intelligence services have a stake
ended his public service with However, the 19 heads of the in policy, they may skew their
four stars and an ambassador- largest agglomeration of secret analyses or become aggressive
ship, he could be called the services in what used to be called advocates of covert action. The
Horatio Alger of DCIs. the Free World generally have Intelligence Community must
not been perceived as being remain a source of objective
Before their appointments, the nearly as influential as most of assessment and not become a
DCIs came from a variety of their counterparts. politicized instrument of the
walks of life, some from more incumbent administration. As
than one. Six were from the Historians have regarded a num- heads of the Community, DCIs
military, eight had been govern- ber of secretaries of state and should be intellocrats who
ment officials and/or lawyers, defensenotably George Mar- administer specialized secret
three had been businessmen, shall, Dean Acheson, John Fos- functions, not to benefit any
and four came from politics, ter Dulles, Dean Rusk, Robert departmental interests but to
academe, or journalism. All McNamara, and Henry Kiss- advance policies set elsewhere in
three branches of government ingeras major players in the the executive branchspecifi-
were represented, as were three diplomatic and military develop- cally, the White House.
of five military services. ments of their times, as is at
least one national security The DCIs reported to the
Two-thirds of the DCIs had adviser, Kissinger. The DCIs are National Security Council and
direct experience with intelli- another matter. Only two, Dulles truly served at the pleasure of
gence in military or civilian life and Casey, usually are consid- the president. Indeed, much of
before their appointments. One ered to have had an impact rival- every DCIs influence was
served in the OSS (William ing that of the other top foreign directly proportional to his per-
Casey), two in the CIA (Robert policy officials in the administra- sonal relationship with the chief
Gates and Porter Goss), and tions in which they served. The executive. At the same time, and
three in both (Dulles, Helms, rest rarely get mentioned in most somewhat paradoxically, after
and William Colby). foreign affairs surveys (although incoming presidents began choos-
Helms and Colby may come up ing their DCIs in 1977, the non-
The DCIs average age at the when the Agencys time of trou- partisan stature of the DCI
time of their appointment was bles in the 1970s is discussed). diminished and, along with it, his
slightly under 55. The young- Even in overviews of the CIA and independence. The general rule
est was 43 (James Schlesinger); the Intelligence Community, only of new president, new DCI did
the oldest was 67 (Casey). a handfulHoyt Vandenberg, not always translate into greater
No DCI ever had a
chance to become as
autonomous as
influence. The presidents complicated situations are some-
national security adviser and the J. Edgar Hoover at FBI. times made less square to fit
secretaries of state and defense more easily into the models
usually still had more access to
the Oval Office.
agencies, Congress, and the pub- with espionage and counterintel- the insidera career intelligence
lic. Their main goal was to do ligence. Because of the promi- officer who used his experience at
better with what they already nent place clandestine affairs the CIA to reorganize its bureau-
had, and to avoid distractions had in American foreign policy cracy and redirect its activities
and scandals. Except for Raborn, when they served, this type of during or after a time of political
all of these administrators had DCI generally served longer by controversy and lack of certitude
experience with intelligence farseven years on average about its direction. Two DCIs
affairs, but they were not intelli- than any other type. functioned as manager-reformer
gence careerists. Some had a very insiders: Colby and Gates. Colby,
low-key style, almost to the point The high level of secret activity an operations veteran with a
of acting like placeholders and during those long tenures recur- career dating back to the OSS,
time-servers (Hillenkoetter, rently produced operational mis- sought to rescue the CIA from the
Raborn). Others energetically haps, revelations of flaps, and political tempests of the mid-
pursued administrative changes other intelligence failures that 1970s and to regain some of the
designed to make the CIA and hurt the CIAs public reputation Agencys lost prestige through his
the Community more responsive and damaged its relations with policy of controlled cooperation
to policymakers and better the White House and Congress. with congressional investigators
adapted to a new political envi- The Bay of Pigs disaster under and targeted termination of ques-
ronment (Deutch, Tenet). Dulles, the ineffective covert tionable activities. Gates, a long-
action in Chile under Helms, and time Soviet analyst who had
The next type is the intelligence the Iran-Contra scandal under worked on the NSC in two admin-
operatorDCIs who were cur- Casey are prominent examples. istrations and also served as dep-
rent or former professional intel- As journalist James Reston noted uty director for intelligence,
ligence officers tasked with during the Agencys dark days in moved the Agency into the post-
devising, undertaking, and over- the mid-1970s, DCIs who came Cold War era after a period of
seeing an extensive array of up through the ranks might have undynamic leadership.
covert action, espionage, and known more about what CIA
counterintelligence programs in should be doing than outsiders, The other type of manager-
aggressive pursuit of US national but they are not likely to be the reformer is the outsider, who was
security policy. Three DCIs fit best men at knowing what it chosen because of his experience
this category: Dulles, Helms, and should not be doing. 15 in the military, business, govern-
Casey. The presidents they ment, or politics to implement a
served had no qualms about Failures, indiscretions, and other major reorganization of the CIA
using all of the US governments such controversies in turn have and the Intelligence Community,
clandestine capabilities against led to the departures of those or to regroup and redirect the
Americas adversaries, and they intelligence-operator DCIs and Agency, especially after major
relied on their DCIs knowledge their replacement by manager- operational setbacks or public
of and experience with opera- reformers charged with cleaning conflicts over secret activities. Six
tions to help them accomplish up the mess and preventing simi- DCIs were manager-reformer
that end. The DCI as intelli- lar problems from happening outsiders: Vandenberg, Smith,
gence operator may have empha- again. There have been two kinds McCone, Schlesinger, Turner, and
sized different secret activities of manager-reformer DCIs. One is Porter Goss. Collectively, they
depending on individual back- were responsible for more major
grounds and predilections, and changes at the CIA (or its prede-
15Renze L. Hoeksema, The Presidents
the targets they worked against. Role in Insuring Efficient, Economical, and
cessor, the Central Intelligence
For example, Dulles and Casey Responsible Intelligence Services, Presi- Group [CIG]) than any other cat-
were devotees of covert action, dential Studies Quarterly 8, no. 2 (Spring egory of director. For example,
while Helms preferred to work 1978): 193. under Vandenberg, the CIG
acquired its own budgetary and tried toand did not worry about FLASH/DCI EYES ONLY cable
personnel authority, received whom they antagonized along the had just arrived. The messages
responsibility for collecting all way, some of them were among contents were so sensitive that
foreign intelligence (including the most disliked or hardest to whoever delivered the printed
atomic secrets) and preparing get along with DCIs. copy had to retrieve it and
national intelligence analyses, destroy it. The duty officer took
and coordinated all interdepart- Finally, there are the restorers: the cable to McCone at the hotel
mental intelligence activities. George Bush and William Web- where he was staying. The DCI,
Smithin response to intelli- ster. Like the manager-reformer wearing a bathrobe, read the con-
gence failures before the Korean outsiders, they became DCIs tents and put the paper in his
War and to infighting among after the Agency went through pocket. The duty officer asked for
operations officerscentralized difficult timesthey succeeded it back, saying he was supposed
espionage and covert actions, Colby and Casey, respectively to retrieve it for disposal.
analysis, and administration by but they were not charged with McCone unfolded the cable, held
rearranging the CIA into three making significant changes in it up, and asked the officer to tell
directorates and creating the the way the CIA did business. him who sent it. Reading the
Office of National Estimates. In Instead, they used their people From line, the officer replied,
effect, he organized the Agency skills and public reputations to Director. Right, McCone said,
into the shape it has today. raise morale, repair political and Im the Director. He put the
damage, and burnish the cable back in his pocket and said
Schlesinger and Turner facili- Agencys reputation. Bush, a good night. 16
tated the departure of hundreds prominent figure in Republican
of clandestine services veterans Party politics, went to Langley to Some DCIs were affable; some
in their quests to streamline the mend the CIAs relations with were bland; some were blunt.
Agencys bureaucracy, lower the Congress and use his amiability Beetle Smith greeted the
profile of covert action, and move to improve esprit de corps and attendees at his first staff meet-
the CIA more toward analysis put a more benign face on the ing with these words: Its inter-
and technical collection. Goss Agency. Webster, a director of the esting to see all you fellows here.
was the only one in the group FBI and former federal judge, Itll be even more interesting to
who had previously worked at brought a quality of rectitude to see how many of you are here a
the Agency, but he was selected an Agency mired in scandal and few months from now.
because he headed the intelli- helped raise its stature in the Schlesinger informed Agency vet-
gence oversight committee in the Community and with the public. eran John McMahon and his
House of Representatives. Tak- superior, Director of Science and
ing over during imbroglios over Some DCIs gave early, strong sig- Technology Carl Duckett, at 9:30
collection and analytic failures nals about how they intended to one morning that he had just
connected with the 9/11 terrorist run the Agency, as when Casey appointed McMahon to head the
attacks and assessments of Iraqs brought in Max Hugela street- Office of Technical Service.
weapons of mass destruction, he savvy, by-the-bootstraps busi- Thinking of the time needed for a
set about revamping the Agencys nessman from Brooklyn with no smooth transition, Duckett sug-
work on international terrorism. intelligence experienceto shake gested, How about if he starts at
Most DCIs in this category were up the Directorate of Operations. the first of the month?
far more concerned about achiev- Sometimes, DCIs gave smaller, Schlesinger answered, How
ing their objectives quickly than but no less telling, signs. On one about at 10:00? 17
about angering bureaucratic of his early trips overseas,
rivals or fostering ill will among McCone was in a European capi-
subordinates. Largely because tal when an Agency duty officer 16 Authors conversation with Harold
they accomplished so muchor called late at night to say that a Bean, 30 October 2001.
Some DCIs tried to
resolve the Agencys
culture wars between
And the contrasts continue. Some nominee. After that, two other
DCIs tried hard to be true direc- the spooks and the nominations received significant
tors of the Intelligence Commu- scholars. numbers of no votes (Colby and
nity, even though the jobs of the Gates), and four had to be with-
DCI as Community manager and
head of the CIA historically were
competing, not complementary,
roles. 18 Others chose to run the
Agency primarily and went about
and the cowboys who did covert
actionbut most left that inter-
drawn (Theodore Sorensen,
Gates, Michael Carns, and
Anthony Lake). 20
Intelligence Community, 1946-2005 theater. That phenomenon is not was withdrawn during contentious hear-
(Washington: CIA Center for the Study of ings in 1987.
Intelligence, 2005).
recent. The first controversial 21 John Ranelagh, The Agency: The Rise
19 Richard Kovar, Mr. Current Intelligence: confirmation was John McCones and Decline of the CIA (New York: Simon
An Interview with Richard Lehman, Stud- in 1962the first in which any and Schuster, 1986), 614.
ies in Intelligence 43, no. 2 (1999-2000): 27. senators voted against a DCI 22 Colby, 334.
DCIs were the most
unsecret heads of any
secret agency in the
the media, and, most importantly The First Customer is Always
of course, Congress. Later DCIs world. Right
could scarcely imagine the hal-
cyon days of their predecessors
dealings with Capitol Hill in the
1950s, when oversight was really
overlook. It is hard today to envi-
sion what it was like in 1956, when
The era of congressional benign
Historically, the most important
factor in the life of the DCI was
his relationship with the presi-
dent. The CIA is more of a presi-
dential organization than any
Senator Richard Russell, the CIAs neglect ended during the period other in the US governmenta
longtime friend and protector, said 1974-80, with the adoption of the special quality that was both a
that If there is one agency of the Hughes-Ryan Amendment boon and a bane to the DCIs.
government in which we must requiring a presidential finding Presidents have their own pecu-
take some matters on faith, with- liar appreciation of intelligence
for covert actions; the Church
out a constant examination of its and their own way of dealing
and Pike Committee investiga-
methods and sources, I believe this with the CIA and their DCIs. We
tions; the establishment of the have had presidents experienced
agency is the CIA.
House and Senate permanent with intelligence, or who were
In those days, the DCI briefed oversight committees; and the fascinated with intelligence or
Congress a handful of times a year passage of the Intelligence with certain kinds of secret infor-
at most and almost always left Accountability Act mandating mation or operations. Other pres-
with a figurative, if not literal, that Congress be promptly and idents had little experience with
blank check. One of the Agencys fully informed of covert actions. intelligence, or did not care about
legislative counsels, John Warner, After that flurry, the DCI rela- it, or did not like it or the CIA. As
told of an encounter he and Dulles tionship with Congress was former Deputy Director of Cen-
had with one of the CIA subcom- altered forever. For a few event- tral Intelligence Richard Kerr
mittees in the late 1950s: aptly put it, a number of admin-
ful years, Casey tried to stand as
istrations . . . started with the
the immovable object against the expectation that intelligence
It was sort of a crowded room,
irresistible force. As Robert Gates could solve every problem, or
and [the subcommittee chair-
observed, Casey was guilty of that it could not do anything
man, Representative] Clarence
Cannon greets Dulles [with] contempt of Congress from the right, and then moved to the
Oh, its good to see you again, day he was sworn in. 24 The trend opposite view. Then they settled
Mr. Secretary. He thinks its was soon back on track, however, down and vacillated from one
[Secretary of State John] Foster and by the year 2000, Agency extreme to the other. 25
Dulles, or mistakes the name; I officers were briefing Congress in
dont know. Dulles, hes a great some fashion an average of five Presidents relations with their
raconteur. He reminds Cannon times a day, and the DCIs fre- DCIs often followed a similarly
of this, and Cannon reminds erratic course. Some began by
quent testimony on the Hill was
him of that, and they swap sto- regarding the DCI as their senior
a headline-grabbing event.
ries for two hours. And at the intelligence adviser and saw him
end, [Cannon asks,] Well, Mr. regularly. Occasionally that
Secretary, have you got enough 23 John S. Warner, oral history interview degree of contact continued; more
money in your budget for this by Woodrow Kuhns, 27 September 1996, often, it did not. Other presidents
year [and] the coming year? 48. (Transcript in CSI Oral History Pro-
gram files.)
[Dulles replies,] Well, I think 24 Robert M. Gates, From the Shadows: The 25 Richard J. Kerr and Peter Dixon Davis,
we are all right, Mr. Chairman. Ultimate Insiders Story of Five Presidents Ronald Reagan and the Presidents Daily
Thank you very much. That and How They Won the Cold War (New Brief, Studies in Intelligence 41, no. 2
was the budget hearing.23 York: Simon and Schuster, 1996), 213. (1997): 31.
The DCI often served
at the clear displeasure
of the president.
preferred from the start to have it. 27 Or when Nixon returned a
their national security advisers thick package of PDBs given to
function as their principal intelli-
gence officers. A few presidents at
least made a bow toward giving
their DCIs authority over other
Community departments, but in
him during the transition period
unopened, called Agency officers
clowns, and asked, What use
are they? Theyve got 40,000 peo-
ple over there reading newspa-
most cases the Communitys cen- pers. 28
with his rigid military staff struc-
ter of gravity meandered between
ture; John Kennedy and his loose
CIA Headquarters, the Pentagon, The DCI often served at the clear
agglomeration of ad hoc working
Foggy Bottom, and the West displeasure of the president, who
groups and catch-as-catch-can
Wing. meetings with advisers; Lyndon directed him to act and then
Johnsons congressional cloak- often tried to denynot very
A few DCIs were close to their room approach, in which the plausiblythat he had anything
presidents; some had cordial, real deals were made in infor- to do with the outcome. Bill Clin-
businesslike relationships; some mal settings outside the National ton remarked that cutting the
had only infrequent contact; and Security Council; and Richard intelligence budget during peace-
some had no relationships to Nixons notorious Berlin Wall of time was like canceling your
advisersHenry Kissinger, H. R. health insurance when you felt
speak of. From the start, DCIs
good. 29 But chief executives have
had to overcome assorted barri- Haldeman, and John Ehrli-
not always been the best stew-
ersphysical, administrative, chmanwho controlled access to
ards of the resources of the
psychologicalin their interac- the Oval Office.
Agency they have so often called
tion with the presidents.
on to help implementand, in
Lawrence Red White, the DCIs sometimes could work more than a few cases, salvage
Agencys longtime director of around those kinds of obstacles, their foreign policies.
administration, recalled the time most notably by changing the
when Dulles told Eisenhower look and content of the daily
about a possible location for the It should be noted, however, that
briefing productthe Central closeness was not an absolute
headquarters building. Were Intelligence Bulletin, the Presi-
thinking of tearing down that old good for the DCIs or a solution to
dents Intelligence Checklist, and some of these difficulties. Some
brewery [where the Kennedy the Presidents Daily Briefand
Center is now] and building it DCIs paid a cost for being too
developing more flexible and close, or trying to be. They wore
right there. Eisenhower went responsive methods for provid-
through the roof. He said, You out their welcomes, or became too
ing current intelligence and committed to the success of
are not going to build that build- answers to taskings. But even
ing in the District of Columbia. with those improvements, DCIs
This town is so cluttered up now, found it extremely hard to sur- 27 Lathrop, 174, 339.
you cant get from one end to the mount the psychological barriers 28 John L. Helgerson, Getting to Know the
other, and you are going to get some presidents erected. What President: CIA Briefings of Presidential
out of town. 26 Then there were Candidates, 1952-1992 (Washington: CIA
was a DCI to do when Johnson Center for the Study of Intelligence,
the ways presidents chose to run said that the CIA is made up of 1995), 91; Richard Helms, with William
their White Houses: Eisenhower boys whose families sent them to Hood, A Look Over My Shoulder: A Life in
Princeton but wouldnt let them the Central Intelligence Agency (New
York: Random House, 2003), 410; Thomas
26 James Hanrahan, Soldier, Manager,
into the family brokerage busi- Powers, The Man Who Kept the Secrets:
Leader: An Interview with Former Execu- ness; and told Helms, Dick, I Richard Helms and the CIA (New York:
tive Director Lawrence K. Red White, need a paper on Vietnam, and Ill Alfred A. Knopf, 1979), 201.
Studies in Intelligence 42, no. 3 (1998): 89. tell you what I want included in 29 Lathrop, 344.
Throughout, the DCIs
were honorable men,
devoted to [the
covert actions, or were accused of peace, in flush times and lean,
politicization, or became linked nations] service. amid accolades and scorn. No one
with controversial policies. It was
of their various leadership styles
not an automatic benefit for the insured success. Their standing
Agency or the DCI for him to be
and accomplishments depended
able to say, as William Casey did,
You understand, I call him interpretation of those facts. In on circumstances they could not
Ron. 30 peacetime, the necessary facts . influence: presidential agendas,
. . and their interpretation are world events, and domestic poli-
essential to the development of tics. On occasion, with the right
Honorable Men policy to further our long-term conjunction of circumstances and
national security . . . . To pro- personalities, DCIs reached the
At the cornerstone laying cere- vide information of this kind is inner circle of the national secu-
mony for the Original Headquar- the task of the organization of rity apparatus; more often, they
ters Building in 1959, President which you are a part. No task did not. Throughout, however,
Eisenhower said: could be more important.31 they werein Richard Helmss
famous phrasehonorable men,
In war, nothing is more impor-
For almost 60 years, the DCIs devoted to [the nations] service. 32
tant to a commander than the
carried out that task in war and
facts concerning the strength,
dispositions, and intentions of 32 Richard Helms, Global Intelligence and
his opponent, and the proper 31Our First Line of Defense: Presidential the Democratic Society, speech to the
Reflections on US Intelligence (Washing- American Society of Newspaper Editors,
ton: CIA Center for the Study of Intelli- 14 April 1971, 13, DCI Files, Job
30 Kovar, 36. gence, 1996), 19. 80R01284R, box 1, folder 6.
lels to some contemporary intelli- ination to conceive of massive
gence issues. Soviet espionage against indus-
trial targets undertaken by
Like 9/11, the most The National Commission on American citizens or had taken
important government Terrorist Attacks Upon the seriously the vetting procedures
failure in the cases of United States, also known as the for granting access to classified
Rosenberg, Barr, and 9/11 Commission, concluded in information.
Sarant, was one of 2004 that the most important
failure that left America vulner-
imagination. In contrast to Rosenberg, Barr
able to attack was one of imagi- and Sarant evaded detection and
nation. The cases of Rosenberg, slipped out of the United States.
Barr, and Sarant demonstrate Their subsequent careers behind
that the responses of the Federal the Iron Curtain, where they
Bureau of Investigation and the became pioneers of Soviet high
US Army to communist penetra- technology, are evocative of
tion during World War II were another contemporary concern:
characterized by a similar lack of the transfer of trained personnel
imagination. The FBI aggres- from the former Soviet Union to
sively identified communists who rogue states.
held sensitive positions in gov-
ernment, including jobs that
afforded communists routine
access to classified military infor- The Rosenberg Ring
mation. But the Bureau and the
army treated communists as Joel Barr was one of the original
potential subversives, not as members of a group of engi-
spies acting on behalf of the neerscivilian employees of the
Soviet Union. US military and its contractors
whom Julius Rosenberg recruited
Steven T. Usdin is a senior editor at The 9/11 Commission also high- to spy for the Soviet Union. From
BioCentury Publications and author lighted the lack of coordination the time they joined the Young
of Engineering Communism: How between intelligence and law Communist League in 1936, Barr
Two Americans Spied for Stalin and enforcement agencies. The and Rosenberg viewed the United
Founded the Soviet Silicon Valley, to Rosenberg case involved a simi- States government as a fascist
be published by Yale University lar breakdown, primarily regime little better than Nazi
Press in October 2005. between the army and the FBI on Germany.
Barr and Sarant
passed the Soviets
more than 9,000 pages
Later, Barr recruited Alfred tions, the Rosenberg group had
Sarant, the only known member of relating to more than jobs that provided unfettered
the Rosenberg ring who was nei- 100 weapons programs access to a wide range of sensitive
ther Jewish nor a graduate of City during World War II. technologies.
College of New York. Barr and
Sarant were talented electrical
engineers who found technical
advances in radar and electronics
as compelling and important as
class struggle. This dual set of
during World War II and, in the
process, helped the Soviet Union
Military security officials
attempted to compartmentalize
R&Dfor example by assigning
the design of the various compo-
nents in a weapons system to
interests made them remarkably lay the foundation for a defense teams at different institutions. At
successful, first as spies for the industry that maintained rough some point, however, all the
USSR and later as senior figures parity with the United States pieces had to be assembled and
in the Soviet defense industry. throughout the Cold War. tested by people who understood
how they fit together and what
Controversy over the value of the Barr, Sarant, and Rosenberg held they were supposed to do. As
atomic secrets that Rosenberg low-level positions during World manufacturing engineers, Barr
helped transmit to the USSR has War II helping to design manufac- and Sarant were exactly at that
obscured the tremendous value of turing processes and performing point. In order to help design and
the information about conven- quality assurance inspections. In optimize manufacturing pro-
tional weapons systems that he contrast to more senior scientists cesses, they had to comprehend
and his comrades stole. They and engineers, who typically were the basic principles underlying a
provided detailed specifications aware of the details of only a few particular weapon and to have
for some of the most important specific projects and who were detailed knowledge of all of its
military technologies developed subject to intense security precau- components. Men assigned to fig-
ure out how to mass produce
advanced technologies were in an
excellent position to teach the
Soviets how to do the same.
bore a striking
resemblance to
Postwar Russian radar
Their ability to operate
unmolested can
only be attributed to
communicating it to the KGB (CPUSA). The army immediately
was not the result of cunning stunningly incompetent moved to fire Rosenberg from his
tradecraft. They were amateurs American position as an inspector in mili-
working under the loose over- counterintelligence. tary weapons plants, but his his-
sight of professional intelligence trionic defense convinced a civil
officers who struggled to impose
minimal discipline. Their ability
to operate unmolested can only
be attributed to stunningly
incompetent and uncoordinated
being a Russian spy and the FBI
service review panel that the
charges were untrue. Rosenberg,
who had headed a Young Com-
munist League chapter at col-
lege, claimed he had no
American counterintelligence. briefly put him under surveil- connection to or sympathy for
The FBI and the army had iden- lance. The attention did not pre- communism.
tified Barr, Sarant, Rosenberg, vent Golos from personally
and other members of their meeting with Rosenberg and run- A few months later, following up
group as communists and poten- ning an extensive espionage net- on signatures on the nominating
tial spies years before they were work, or from helping coordinate petitions that led to Ethel Rosen-
put out of business. Basic secu- the August 1940 assassination in berg, the FBI discovered that
rity measures, such as requiring Mexico of Lev Trotsky, Lenins sec- Barrs ex-roommate and fellow
that defense contractors check ond in command and ardent foe of Signal Corps engineer Samuel
the references of applicants for Stalin.7 Sack was a communist. The room-
sensitive jobs, would have neu- mate was fired, but neither the
tralized Barr and his comrades army nor the FBI made enquiries
In addition to failing to keep its
early in their espionage careers. about his close associates.
eyes on Golos, the FBI and its
counterparts in army counterin-
The armys Signal Corps Labora- telligence made poor use of infor-
tories hired Barr as an electrical The FBI finally caught up with
mation that could have shut Barr in December 1941, matching
engineer in July 1940; Rosen- down Rosenbergs operation long
berg signed on with the corps as his signature on a Cacchione
before any important secrets nominating petition to one on his
a junior engineer two months were stolen. The FBI had an
later. Some time in 1941, they civil service application. On
active program to identify and 23 February 1942, the Signal
started funneling military tech- weed out communists in govern-
nology secrets to the USSR Corps fired Barr and placed his
ment, especially those with name on a list of undesirable
through a longtime Soviet opera- access to sensitive or classified
tive, Jacob Golos. At the time, employees who were ineligible for
information. In the spring of employment by the army. More
Golos was well known to the FBI. 1941, the Bureau gave the army than 100 of Barrs colleagues at
a dossier on Rosenberg. His wife, the Signal Corps laboratory signed
In March 1940, the Justice Depart- Ethel, had signed a nominating
ment indicted Golos, whom it had petitions requesting that the army
petition for Peter Cacchione, a reconsider the action; many of
identified as the source of forged communist candidate for New
passports for communist party offi- them scratched their names off or
York City Council, and the ripped up the petitions when they
cials and Soviet agents, for failing Rosenbergs had shared an apart-
to register as a foreign agent. As learned that he had been fired
ment with a couple who were because he was a communist.8
part of a deal that shielded other open members of the Communist
party members from prosecution, Party of the United States
Golos pled guilty, paid a $500 fine, 8 Executive Sessions of the Senate Permanent
and received a four-month sus- Subcommittee on Investigations of the Commit-
pended sentence. The attorney 7 Elizabeth Bentley, Out of Bondage (London: tee on Government Operations, Vol. 3, (Washing-
general publicly accused him of Rupert Hart-Davis, 1952), 8788. ton: Government Printing Office, 2003), 2801.
Less than a month
after the army fired
him, Barr began work
Up to this point, Barr had Worried that the FBI might have
provided little information to the on sensitive systems at Rosenberg under surveillance,
KGB. Being fired from the Signal G.E. Soviet intelligence quickly moved
Corps should have been the end to isolate him. It need not have
of Barrs careers in military
electronics and as a Soviet spy.
And it would have been, if the
FBI, army, or military
contractors had implemented
Clues Continually Ignored
worried: Neither the Army nor
the FBI made any effort to track
Rosenbergs activities after he
was fired.
Barr and Sarant rode out
the dangerous years of
Stalinist paranoia in the
identifying Sarant in clear text had worked with in the United
as an espionage recruit. relative safety of States, they created an analog
Prompted by the cable, as well as Czechoslovakia. computer that received input
an investigation of Barr that from radar and controlled the
revealed his friendship with
Sarant, two FBI agents knocked
on Sarants door on the after-
noon of 19 July 1950. He agreed
to answer the agents questions
dangerous years of Stalinist
paranoia in the relative safety of
aiming and firing of artillery. The
system, with some minor
improvements, was still defend-
ing Czechoslovakian air space as
late as the 1980s, according to
and allowed them to search his Barr.
Czechoslovakia.
house.
Impressed by their accomplish-
During the intense weeklong Dedicating Their Talents to ments, the head of the Soviet
interrogation that followed, Moscow State Committee on Aviation
Sarant denied that he was a spy. Technology, Pyotr V. Dementyev,
Correctly surmising that the FBI While Barr had recruited Sarant recruited Sarant and Barr to
planned to arrest him, Sarant into espionage and was viewed by apply their talents for the bene-
slipped through its surveillance their American friends as the fit of the USSR. 13 They moved
and crossed the Mexican border dominant figure in the partner- with their families to Leningrad
in the company of his next-door ship, the roles were reversed in January 1956. Sarant and
neighbors wife, Carol Dayton. behind the Iron Curtain. Sarant Barr quickly learned enough
The couple eluded Mexican police became the front man and leader Russian to operate without trans-
and contacted Polish intelligence for the rest of his life. lators. Placed in charge of a
officers in Mexico City. Acting on secret laboratory that was identi-
Soviet orders, the Poles hid Barr had already learned Czech fied on official correspondence by
Sarant and Dayton for six and Sarant picked up the lan- a fictitious mailbox address, they
months before smuggling them guage quickly. They were put in were given a free hand to recruit
across the border to Guatemala, charge of a team of 30 engineers employees. The laboratorys first
where they boarded a cargo ship at a military R&D institute. project was commissioned by
headed to Casablanca. The cou- Overcoming difficult technical Adm. Berg, the man who had
ple took another ship to Spain, obstaclesbasic electronic com- received information that Barr
where they were put on a flight ponents were unavailable, so and Sarant had stolen from West-
to Warsaw. Given the new name they had to make their ownas ern Electric during World War II.
Staros, they were stashed in a well as the distrust of security They designed a critical compo-
luxury apartment in Warsaw for officials who thought they were nent for the radar that tracked
six months, before being reunited foreign spies, Barr and Sarant the first Sputnik and subsequent
with Barr in Moscow. 11 designed and built a prototype of satellites. In February 1958,
a computerized anti-aircraft Sarant and Barr were awarded
weapon. 12 Based on designs they the Order of the Red Banner, one
In a move that undoubtedly
of the Soviet Unions most presti-
saved their lives, after six weeks
gious medals.
in Moscow, Barr, Sarant, and 12 Documents obtained by the author from the
Dayton were sent to Prague. Czech Ministry of Interior archives describe sev-
They rode out some of the most eral investigations of Barr and Sarant that were 13 Henry Eric Firdman, Decision-Making
They were awarded the
Soviet Order of the
Red Banner.
Microelectronics issues. Support from Ustinov and
his network, combined with
The two men then turned their
attention to designing and build-
ing microelectronic components,
primarily for military applica-
tions. Their work won rave reviews
transistors. The UM-1, intended
as an airborne computer to con-
Sarant and Barrs continuing abil-
ity to deliver impressive techno-
logical accomplishments, fueled a
meteoric ascent through the ranks
of industry that would have been
from Andrei Tupolev, the Soviet trol navigation and weapons sys- extraordinary for Russians and
Unions leading aircraft designer. 14 tems, was small enough to fit on was unprecedented for foreigners.
a kitchen table, was light enough
An evangelist for microelectron- for one person to lift, and The two Americans received the
ics, Sarant lectured at universi- required about the same power ultimate stamp of approval on
ties and made presentations to as a light bulb. Dmitri Ustinov 4 May 1962 when Khrushchev
government and party officials (then chairman of the Military- visited their design bureau.
starting in the late 1950s. He Industrial Commission and later Sarant showed the Soviet leader
predicted the development and defense minister), the head of the how his team assembled tiny
widespread adoption of digital Soviet Air Force, and other top electronic components and dem-
computers and the integration of military officers visited Sarant onstrated a new computer, the
electronic intelligence into every for demonstrations of the UM-1. UM-2. Sarant lectured Khrush-
aspect of modern life. Public dis-
chev on the potential for micro-
cussion of cybernetics had been
Although the UM-1 was never put electronicsa word he had
banned under Stalin, and there
into production, it helped Sarant introduced into the Russian lan-
was still a great deal of skepti-
secure personal backing from guageto transform industry.
cism among Soviet scientists
Ustinov, who for decades was sec- The new science would make it
about the value of computers.
ond only to premiers Nikita possible for networks of military
The Soviet computer establish-
Khrushchev and Leonid Brezh- satellites to spy on the United
ment advocated the construction
nev regarding military industry States, for the USSR to protect
of complex, room-sized behe-
moths, not the small, mass-pro-
duced, easily programmable
machines Sarant envisioned. 15
Khrushchev agreed
on the spot. A new
research city
itself with anti-missile defenses, Khrushchev agreed on the spot. A new
and for Moscow to attack its ene- was turned over city that was already under construc-
mies with high-precision bomb- to Sarant. tion on the outskirts of Moscow was
ing, Sarant promised. His words turned over to Sarant. He was made a
were carefully calibrated to rein-
force Khrushchevs belief that
technological advances, such as
missiles, would make it possible
to sharply reduce the size and
institutes and factories
throughout the Soviet Union.
Soviet citizen and Khrushchev person-
ally signed papers inducting him into
the communist party.
Barr and Sarants fall
from grace . . . was even
more spectacular than
glossy propaganda magazine Sea of the navys newest, most
Soviet Union, although the iden- their ascent. advanced submarine design. The
tities of its designers were care- first digital computer installed
fully hidden. The computer also
received favorable reviews in an
American technical journal and
in a classified CIA report that
ranked it among the most
Tainted by association with the
disgraced Soviet leader, the two
onboard a Soviet submarine, the
Uzel correlated information from
sonar, engines, and sensors to plot
the crafts location, as well as the
locations of a half dozen potential
important special purpose com- men battled with the Leningrad targets, on a green display. Like
puters disclosed in Soviet open communist party bureaucracy to the analog computer that Sarant
publications. 17 It earned Staros maintain their autonomy and and Barr had developed for the
and Berg the State Prize, for- access to resources. They hung Czech Army, the Uzel aimed tor-
merly called the Stalin Prize, the onto their positions by producing pedoes based on the predicted
second-highest award in the a stream of valuable technical path of targets. 19
Soviet Union. achievements, ranging from an
innovative memory technology to Project 641B, or Tango class, sub-
new computer designs, including marines were the largest diesel-
Sudden Eclipse some that were recognized on electric submarines ever built.
both sides of the Iron Curtain. Coated with sonar-absorbing
Soviet Cybernetics Review, a Rand tiles, the 60-man craft were
Technical success did not shield Corporation journal, described
the ambitious foreigners from the designed to hunt NATO subma-
one of their computers as the rines, particularly to defend the
harsh realities of Soviet politics. first Soviet production computer
Sarant and Barrs fall from grace, USSRs home waters, or bas-
that can be fairly characterized as tions, areas in the Barents and
precipitated by the ouster of their well engineered. It may not be up Okhotsk seas where the Soviet
champion, Nikita Khrushchev, to Western standards, but it eas- Navy stationed nuclear-missile-
was even quicker and more spec- ily surpasses anything else known equipped submarines.
tacular than their ascent. Within to be currently available in the
months of Khrushchevs forced Soviet Union for process control
retirement, powerful men whom automation. 18 Although the Project 641Bs have
Sarant and Barr had antago- all been retired, the Uzel lives on
nized struck back. Accused of inside a newer generation of
everything from wasting scarce Turning to the Navy submarines dubbed Kilo class by
resources to participating in a NATO. Like the 1970s-era com-
Zionist anti-Soviet conspiracy, Sarant and Barrs team modified puters on NASAs space shuttles,
the American engineers feared their UM-2 computer, which was Russia has maintained the Uzel
that they might end their days in originally designed for use on mil- into the 21st century, upgrading
prison. Instead, Sarant was fired itary airplanes and in spacecraft, the software while retaining the
as scientific director of the Cen- for the unique needs of the Soviet original hardware design.
ter for Microelectronics, but he Navy, creating the Uzel (Knot)
and Barr were permitted to fire-control computer system.
19 Authors interview with Joel Barr, April 1992;
return to their design bureau in Sarant demonstrated the Uzel in
Russian Command and Weapon Control Sys-
Leningrad. early 1973 to a group of admirals tems, Janes Naval Weapon Systems, 16
during a trial run in the Baltic December 2003; and Adm. Yu. V. Alekseev and
Yu. P. Blinov, Dr Sc (techn.), Korabelnye Avtom-
17 Computers In Communist Countries: atiziovannye Sistemy Upravleniya (Ship Auto-
Production, Requirements and Technol- 18 Wade Holland and Willis Ware, K-200: mated Control Systems), (publication of the
ogy, CIA, CSI-2001-00001, 14 February 1966 Space Computer or Engineering Oddity? Soviet Russian Navy, undated), accessed at:
(declassified 24 January 2001). Cybernetics Review 2, no. 3 (May 1972): 1318. http://www.navy.ru/science/rv7.htm.
The Izvestia obituary
lauded him . . . but did
not, of course, mention
Uzels can be found today lurking Funding for the project dried up
under the Indian Ocean, the that he was an as the Soviet Union fell apart,
Mediterranean and Black Seas, American. however, and Barr decided to
and the Pacific and Atlantic look in an unlikely place for
Oceans in the fleets of a half-
dozen navies, including those of
several potential adversaries of
the United States. If Iran decides
to send oil tankers to the bottom
artificial intelligence institute
that was part of the Soviet Acad-
investors: the United States.
gence shortcomings to past past 60 years has, quite deserv-
disasters, such as Pearl Harbor edly, been focused on the agencys
in 1941 or the Bay of Pigs in successes in the field. These
Berle and Hoovers 1961. The impulse to identify ranged from high-level penetra-
collaboration reversed common errors in individual tions of foreign governments to
years of dysfunction judgment and interagency action dogged hunts for smugglers and
between the FBI and State between the terrorist attacks in spies throughout the Western
over intelligence. New York and Washington in Hemisphere. SIS agents, in con-
September 2001 and previous cert with State Department and
tragedies cannot be ignored. Yet, armed services personnel,
dissecting mistakes should be quashed virtually all Axis intelli-
only part of this nations strat- gence operations in Central and
egy to retool its Intelligence Com- South America during World War
munity for the fight against II. The numbers are impressive.
international terrorism. Between 1 July 1940 and 31
December 1945, the SIS identi-
Another important perspective fied 832 Axis espionage agents,
for planning intelligence reforms apprehended 336 of these, and
comes from past instances of ultimately gained convictions
effective cooperation among against 105 individuals for a total
agencies. Just as America stands of more than 1,340 years in
to benefit from coolly analyzing prison. The SIS further identified
intelligence missteps, careful con- 222 smugglers of strategic mate-
sideration of intelligence suc- rials in the Western Hemisphere
cesses also can be constructive. and captured 75 of them. SIS
This article surveys one of the employees conducted 641 sepa-
earliest, most extensive, and rate investigations at the request
most successful examples of of other US government agencies
interdepartmental intelligence and shut down 24 clandestine
collaboration in American his- radio stations used by Axis agents
tory. In a community famous for to communicate with their han-
its deep fissures and debilitating dlers and each other. 1
rivalries, the working relation-
G. Gregg Webb is currently ship forged between the Depart- This work explores the largely
pursuing a law degree at Stanford ment of State and the Special unexamined bond between poli-
University. Intelligence Service of the Fed- cymakers at the FBI and the
The rivalry flowed from
stark policy differences
and blurred lines of
Department of State that acted nal inquiriessuch as those
as the foundation for the SISs authority. involving suspected intelligence
impressive accomplishments. breacheswith the catch being
Central to this spirit of interde-
partmental cooperation was the
cordial relationship between FBI
Director J. Edgar Hoover and
Assistant Secretary of State
The FBIs original authority ema-
nated from an 1871 appropria-
the addition of the Secretary of
States permission. 4
President Roosevelt
finally settled the pre-war
power struggle.
liberties complications, Hoover reforms and funding require-
informed Roosevelt that, pursuant ments. Roosevelt named Hoovers
to the appropriations statute, he
would need the Secretary of
States authorization to proceed. 7
Secretary of State Cordell Hull
gave his blessing on 1 September
(ONI)to conduct independent
investigations where their
immediate superior, Attorney
General Homer Cummings,
chairman of this new committee,
but limited its participants to a
fraction of the agencies then con-
1936; thereafter, State-FBI respective personnel and instal-
ducting counterintelligence
relations deteriorated rapidly. 8 lations were concerned. In
investigations. 12 Both the Depart-
return, he received steady sup-
port from both MID and ONI in ment of State and the Treasury
The rivalry between the Bureau Departments Secret Service were
his fight against Messersmith. 10
and the Department of State over left off the Cummings Commit-
domestic security work between tee. Not surprisingly, the Com-
1936 and 1939 flowed from two On the other side, Messersmith
mittee found that its restricted
sources: stark policy differences and State were bent on preserv-
ing the more decentralized sta- membership could manage the
and hopelessly blurred lines of
tus quo, in which responsibility security burden of the US gov-
authority. On the policy front,
for counterintelligence investiga- ernment without outside help.
neither J. Edgar Hoover nor his
chief adversary at State, Assis- tions was divided among several
tant Secretary George S. Messer- agencies and the Department of The President soon added more
smith, could agree on how the State served as the chief facilita- confusion to the jurisdictional
United States should organize its tor for interdepartmental activ- melee. In the spring of 1939, he
response to German, Russian, ity. 11 Additionally, the 1916 directed Assistant Secretary
and other foreign infiltrations. amendment to the Justice appro-
Messersmith to lead a second
For Hoover, the answer lay in priations statute had given State
counterintelligence panel made
consolidation of all civilian coun- a virtual veto over FBI counterin-
up of representatives from the
terintelligence responsibility, telligence activities.
War, Navy, Treasury, Post Office
investigations, and funding in his
and Justice Departments. Mess-
FBI. 9 Hoover recognized the Not only did the FBI and State
ersmiths job was to coordinate
rights of the two service intelli- deadlock on policy grounds, but
the individual and joint efforts of
gence agenciesthe Military also their relationship, as delin-
Intelligence Division (MID) and eated by the 1916 amendment, these agencies against foreign
the Office of Naval Intelligence was violated repeatedly by the forces inside the United States. 13
president and other high offi- According to one account, no FBI
cials. For example, in October representative was included in
7 Ibid. 1938, President Roosevelt had this group, although a member-
8 Memorandum from Hoover to Edward
become so alarmed by the threat from the FBIs parent Depart-
Tamm, 10 September 1936, as cited in the
Church Committee Report, Book III, 396. from Axis agents and the dys- ment of Justice was. 14
9 Raymond J. Batvinis, In the Beginning: function in Americas counterin-
An Examination of the Development of telligence community that he
the Federal Bureau of Investigations created a Committee to inquire
12 The Cummings Committee was limited
Agency (Washington, DC: Center for the 10 Batvinis, 3738, and Church Committee ments in Don Whitehead, The FBI Story,
Study of Intelligence, Central Intelligence Report, Book III, 39798. 165, as cited in Troy, 12, and the Church
Agency, 1981), 12. 11 Batvinis, 45, and Troy, 12. Committee Report, Book III, 402.
Convoluted and conflicting divi- term, but the long-term impact of addition to moralistic arguments
sions of authority were a hall- this move far outweighed any against secret intelligence work,
mark of Roosevelts executive immediate loss of face for the the high cost in money and man-
leadership style. 15 Yet, on 26 Department. The presidents power required to obtain such
June 1939, the president finally June 1939 Directive freed State information, as well as the poten-
settled the pre-war power strug- from its nominal leadership role tial for geopolitical embarrass-
gle between the FBI and Depart- in domestic counterintelligence ment should such activity be
ment of State. In a secret and helped clarify the overall discovered, added to the general
directive, he expressed his intelligence relationship between distaste for espionage in the pre-
desire that the investigation of the FBI and State. Thus, when war Department of State. Conse-
all espionage, counter-espionage, war broke out in earnest the next quently, though State acted as the
and sabotage matters be cen- year, the Department of State official eyes, ears, and voice of the
tered in the FBI, MID, and ONI was able to focus on building a US government around the world,
alone. 16 foreign-intelligence alliance with the Department did not possess
the FBIs Special Intelligence any covert intelligence organiza-
Service. tions or responsibilities during the
Roosevelts decision was a clear late 1930s. 18
bureaucratic defeat for the
Department of State in the short- From Improvisation to
As the Department of State was
Organization
taking a back seat to the FBI and
14 Don Whitehead, The FBI Story, 165, as
Messersmiths extended competi- others on the domestic counterin-
cited in Troy, 12. The circumstances of
tion with Hoover for control over telligence front in the fall of 1939,
Messersmiths intervention remain a few US diplomats and service
unclear. After World War II, Messersmith Americas internal security pro-
maintained that President Roosevelt had vided clear proof that the Depart- attachs around Latin America
compelled him to undertake coordination ment of State had no qualms attempted to organize clandes-
of the counterintelligence field. However, about conducting domestic coun- tine collection of intelligence in
some historical accounts have portrayed
terintelligence work. During the their host countries. The reports
Messersmith as assuming this role for these pioneers sent back to their
himself. Likewise, Messersmith argued inter-war years, the Depart-
that Hoover refused to participate in his ments attitude towards clandes- superiors in Washington played a
initiative until forced by the president; tine foreign-intelligence collection, vital role in alerting policymak-
whereas, Whiteheads Hoover-sanctioned or espionage, was very different.
account asserts that Messersmith shut
the FBI out. What is clear is that Messer-
Many American diplomats did not 17 This account relies on a description of a
smith, likely with Roosevelts knowledge, regard espionage work as an letter from Messersmith to Geist dated 19
sought to coordinate the counterintelli- appropriate method for fulfilling May 1938 as cited in Batvinis, 32. Though
gence field soon after the Cummings Com- their duty to keep the American Messersmith may have considered espio-
mittee had set out on the same mission. government informed about nage work unsavory, he was not as reluc-
Neither effort succeeded, and both height- tant to use aggressive foreign intelligence
ened the general confusion and interde-
regimes and developments means as other diplomats at State. Before
partmental rancor. abroad. Even States intelligence World War II, he sought to limit the use of
15 Mediating rivalries was one mechanism czar, Messersmith, called the espi- local informants by members of the US
Roosevelt used to control subordinates, onage work of German agents legation in Mexico, but as wartime
hence the presidents apparent duplicity un-American in a 1938 letter to Ambassador to Mexico, he presided over
in assigning both Justice and State coordi- an active and successful State-SIS intelli-
nating roles in the counterintelligence
a friend about Americas tenuous gence collaboration that maintained
field. These statements are based on the domestic security situation. 17 In extensive secret contacts throughout Mex-
authors unpublished senior thesis at ico.
Princeton University entitled Conflict 18 This statement is based on the authors
and Creation: A Comparative Study of the 16 Presidential Directive, 26 June 1939, research and writing for an unpublished
US and British Joint Intelligence Com- Section 2, File 64-4104, Administrative senior thesis at Princeton University
mittees in the Second World War (2003). Records of the SIS, RG 65, NACP. (supra note 15).
Berle quickly
recognized the
burgeoning threat
ers at State to the need for a for- In the six months after Messer-
eign-intelligence capability in from Axis intrigue in smiths reining in of Boal and
Latin America and the inade- Latin America Dillon, both world affairs and the
quacy of existing personnel and Department of States foreign-
resources for undertaking such a
task. Awareness of both these
issues was central to the Depart-
ment of States acquiescence in a
wartime relationship with the
In December 1939, Boal wrote to
Messersmith in Washington sum-
intelligence landscape changed
dramatically. On the interna-
tional stage, Germanys inva-
sions of Denmark, Norway,
Belgium, the Netherlands, and
FBIs Special Intelligence Service. marizing the lessons he was France during the first half of
learning about interdepartmen- 1940 bolstered the threat from an
By far, the most sophisticated of tal intelligence cooperation and increasing number of Axis agents
these improvised intelligence asking for money and personnel in Central and South America. 25
shops operated in Mexico under to enlarge his and Dillons activi- At the Department of State,
the guidance of Pierre de Lagarde ties. Messersmith refused Boals Messersmith was dispatched to
Boal, counselor of the US embassy request. In an internal memoran- Cuba as US ambassador in Feb-
in Mexico City.19 In late 1939, dum to other Department man- ruary 1940. His replacement as
working closely with the naval agers, Messersmith laid out his the assistant secretary of state
attach for Mexico, Lt. Cdr. Will- opposition, citing diplomacy (we responsible for intelligence
iam Dillon, Boal established a should not in any case engage in affairs was Columbia Law School
three-man intelligence coordinat- such work on such a scale with- professor and Roosevelt brain-
ing committee composed of repre- out the knowledge and consent of truster Adolf A. Berle. Berle
sentatives from the embassy, the the government concerned) and quickly recognized the burgeon-
military attachs office, and the finances ([e]ven if it were desir- ing threat to American political
naval attachs office.20 This com- able to go ahead we do not and financial interests from Axis
mittee met for one hour each day have the money and could not do intrigue in Latin America and,
and maintained index-card files on it) as reasons not to devote more during the spring of 1940, began
a range of topics, including anti- resources to foreign-intelligence to press for a comprehensive
US foreign nationals in Mexico, work in Americas next door interdepartmental response. 26
local confidential informants used neighbor. 22 The official reply
by the embassy, and reliable Messersmith sent Boal explicitly
Americans who could provide use- stated that leaders at State did The Berle-Hoover Connection
ful information to the legation.21 not then believe the ends of
Most of the information processed investigating German and other On 24 June 1940, President
by this committee arrived through anti-American activities in Mex- Roosevelt issued a directive by
the operational exertions of Naval ico justified the clandestine col- telephone making the Federal
Attach Dillon. lection means that Boal sought to Bureau of Investigation
expand. 23 However, Messersmith
19 Other ad hoc intelligence arrangements
did authorize Boal to continue 24 Ibid.
were operated, or at least proposed, before
the activities of his intelligence 25 Leslie B. Rout, Jr., and John F. Bratzel,
World War II by Ambassadors Jefferson coordinating committee. 24 Origins: US Intelligence in Latin Amer-
Caffery in Brazil, E. C. Wilson in Uru- ica, Studies in Intelligence (Winter 1985):
guay, and Spruille Braden in Colombia. 50, in Folder 108, Box 9, Studies in Intelli-
20 Letter from Boal to Messersmith, 22 22 Memorandum from Messersmith to gence, Center for the Study of Intelligence,
December 1939, 5, and attached Memoran- Warren, Duggan, and Chapin, 28 Decem- RG 263, NACP.
dum, as reprinted in John Mendelsohn, ed., ber 1939, as reprinted in Mendelsohn. 26 Memorandum for the Files from W. M.
Covert Warfare: Covert Warfare in Latin 23 Letter from Messersmith to Boal, 24 Crane, 3 June 1940, 810.20 Defense/20,
America (New York: Garland, 1989), vol. 10. January 1940, as reprinted in Mendel- Box 3375, State Department General Dec-
21 Ibid. sohn. imal File, 19401944, RG 59, NACP.
A key collaborative
success was securing the
assignment of legal
responsible for foreign intelli- collecting information and inves-
gence work in the Western attachs in US missions. tigative leads from indigenous
Hemisphere, on the request of contacts and undercover SIS
the State Department. By 1
July 1940, FBI Director J.
Edgar Hoover had established a
Special Intelligence Service
within his Bureau and had
measures on which the SISs
indispensable intelligence net-
agents. 31 The legal attachs
passed these data on to FBI
headquarters in Washington and
sometimes used them to formu-
late local actions with embassy
embarked on the colossal task work in Latin America rested. diplomats and armed services
of creating from scratch a for- attachs. To implement this cen-
eign-intelligence capability in Among their most important col- terpiece of SIS organization,
the FBI. 27 The presidents stipu- laborative successes was secur- Berle played the role of interme-
lation that this new agency ing the assignment of SIS agents diary between the FBI Director
the first foreign-intelligence as legal attachs in US mis- and skeptical ambassadors and
bureaucracy in US history sions throughout Central and bureaucrats at State. The pair
should conduct its activities in South America. 29 By October also teamed up against opposi-
Latin America at the behest of 1942, 77 FBI legal attachs, with tion to a FBI-proposed courier
the Department of State forced diplomatic status, worked out of system for SIS communica-
two longtime adversaries into US embassies in 18 nations in tions. 32 Such a system never
common cause. the region. 30 These officers coor- developed, but SIS personnel did
dinated secret intelligence opera- gain the ability to send corre-
Fortunately, the two men tasked tions in their assigned countries, spondence back to Bureau head-
to direct this State-FBI intelli- quarters through the
gence union proved anything but Department of States official dip-
28 The IIC was the first interdepartmental
adversarial towards one another. lomatic pouches. 33
body in the United States for sustained
Adolf Berle, as the assistant sec- intelligence-policy coordination. In May
retary of state with intelligence and June 1940, the IIC served as incuba-
liaison duties, and J. Edgar tor for the idea that America needed a dis- Diverse Backgrounds
Hoover, as FBI director, were tinct foreign-intelligence organization.
President Roosevelts 24 June 1940 direc- Little in the backgrounds of Berle
involved in every phase of the tive was in response to the IICs proposal
SIS project, from cultivating its of such an agency.
or Hoover suggested that they
roots in the pre-war Interdepart- 29 Draft Letter from Berle to Fletcher War- would become such close partners
mental Intelligence Committee ren, 19 May 1941, Folder 1, File 64-4104,
established as a result of Presi- Administrative Records of the SIS, General
Records of the FBI, RG 65, NACP; and 31 This description of legal attach respon-
dent Roosevelts 1939 counterin- Memorandum for the Director from Tamm, sibilities extends from a similar discus-
telligence delimitation 20 May 1941, Folder 1, File 64-4104, sion in a FBI memorandum on the SIS, 12
directiveto resolving delicate Administrative Records of the SIS, General February 1946, Folder 11, File 64-4104,
administrative challenges in the Records of the FBI, RG 65, NACP (Berles Administrative Records of the SIS, Gen-
Services wartime work. 28 Operat- advocacy within State of legal attach con- eral Records of the FBI, RG 65, NACP, 2.
cept). See also Memorandum for the Direc- 32 Memorandum for the Director from
ing in tandem, the two men insti- tor from Ladd, 23 April 1942, Folder 4, File Tamm, 13 May 1941, Folder 1, File 64-
tuted several of the bedrock 64-4104, Administrative Records of the 4104, Administrative Records of the SIS,
SIS, General Records of the FBI, RG 65, General Records of the FBI, RG 65, NACP.
NACP (Berles pride on this point, update 33 Ambassadors and other high embassy
27 For details on the creation of the FBIs on legal attach coverage, and FBI pres- officials retained the right to read SIS cor-
Special Intelligence Service, see Troy, sure for more legal attachs), 4. respondence sent via this method. Memo-
1617, and G. Gregg Webb, The FBI and 30 Memorandum for the Director from Ladd, randum for the Director from Ladd, 23
Foreign Intelligence: New Insights into 26 October 1942, Folder 6, File 64-4104, April 1942, Folder 4, File 64-4104, Admin-
J. Edgar Hoovers Role, Studies in Intelli- Administrative Records of the SIS, General istrative Records of the SIS, General
gence 48, no. 1 (2004): 4649. Records of the FBI, RG 65, NACP, 2. Records of the FBI, RG 65, NACP, 46.
Notwithstanding their
differences, the
cooperation of Hoover
on the SIS. Though the two were particularly on social matters.
born less than a month apart in and Berle on the SIS Berle was a passionate interna-
January 1895, their professional proved exceptionally tionalist; Hoover was wary of all
lives followed very different paths functional. things foreign. In personality,
until their intersection on intelli- Berle was an intellectual,
gence in early 1940. Raised in
Boston, Berle was the youngest
graduate in Harvard Law School
history when he received his J.D.
in 1916 at the age of 21. 34 After a
Justice and rose rapidly, becom-
ing the acting director of the
though not unskilled in policy
administration; Hoover, as a
master bureaucrat, was deeply
practical, though highly intelli-
gent. Notwithstanding these dif-
stint in the Armys Military Intel- Departments Bureau of Investi- ferences, their cooperation on
ligence Division during World War gation (later renamed FBI) in the SIS proved exceptionally
I, he became a professor at the 1924 and director soon thereaf- functional.
Harvard Business School in 1924 ter. 39 Hoovers early career was
and then at Columbia Law School dominated by his work in the
in 1927. 35 He penned ground- various counterintelligence divi- Personal Dynamics
breaking work in the fields of cor- sions of the Bureau during World
porate law and economics during War I and the subsequent Red Several personal and institu-
the 1930s. A member of Scare. His ascension was a prod- tional circumstances contributed
Roosevelts brain trust, he also uct of his reputation in the to the general harmony between
worked on New York City affairs Department of Justice as an Adolf Berle and J. Edgar Hoover.
with Mayor Fiorello La Guardia. 36 honest and efficient administra- On a personal level, Berle did not
Appointed assistant secretary of tor and occurred despite his try to battle the director for
state in 1938, Berle was assigned close association with the Depart- administrative control over the
a wide-ranging portfolio, includ- ments contemporary civil liber- Special Intelligence Service.
ing Latin America policy. In Feb- ties abuses. 40 By 1940, Hoover Instead, he willingly left day-to-
ruary 1940, he gained was firmly entrenched in his day management to Hoover and
intelligence-liaison duties. 37 directorship of the FBI and confi- his subordinates, only interven-
dent in the organization that he ing at the request of the Bureau
Hoover was born and raised in had constructed over the previ- or when FBI personnel and
Washington, DC. He worked his ous 16 years. actions aroused the Department
way through George Washington of States ire. Concerning the big
University Law School, earning a Although both Berle and Hoover picture policies of US intelli-
LL.B. in 1916 and a LL.M. in had spent considerable time in gence in Latin America, Berle
1917. 38 During the summer of public service, they were oppo- consistently sought, and for the
1917, he started in an entry-level sites in many ways. Berle was a most part obtained, frank com-
position at the Department of leading liberal in the Roosevelt munication with J. Edgar Hoover.
administration, whereas, the
outwardly apolitical Hoover held Berles approach contrasted
34 Jordan A. Schwarz, Liberal: Adolf A.
Berle and the Vision of an American Era strong conservative convictions, sharply with that of his
(New York: Free Press, 1987), 16. predecessor, George
35 Batvinis, 63, and Beatrice B. Berle and Messersmith. Hoover and
Travis B. Jacobs, eds., Navigating the Rap- 38 Richard Gid Powers, Secrecy and Power:
Messersmiths acrimonious
ids, 19181971: From the Papers of Adolf The Life of J. Edgar Hoover (New York: relationship during the late
Berle (New York: Harcourt, 1973), xviii. Macmillan, 1987), 40.
36 Berle and Jacobs, xxxxi, and Schwarz, 39 Church Committee Report, Book III, 388.
1930s distracted both the FBI
75, 91. 40 This sentence draws from a similar and the Department of State
37 Berle and Jacobs, xxi, xxiv, and statement in the Church Committee from their shared responsibility
Schwarz, 11819, 16970. Report, Book III, 388. to track down German and
Not a career diplomat,
Berle did not feel obliged
to obstruct Hoover out of
communist spies and potential The best evidence that Berles
saboteurs. Indeed, according to interdepartmental laissez faire handling of Hoover
one account, Messersmiths chief jealousy or spite. facilitated constructive coopera-
complaints about Hoover tion between State and the SIS
included the fact that he was
difficult to work with except on
his own terms. 41
nage and United States Counterespionage ture, Berle admitted to Hoovers lieuten- 1943, 102.31/3-1043, Box 52, Department
in Latin America during World War II ant, Edward Tamm, that he had to of State Central Decimal File, RG 59,
(Frederick, MD: University Publications handle as much as 250 pieces of mail a NACP (radio order of battle); letter from
of America, 1986), 37. day and naturally [could not] devote as Hoover to Berle, 27 September 1940,
42 Batvinis, 63. much time to each individual piece as 811.20237/9-2740, Box 3728, Department
43 Undated notes from Box 32; Entry 718; might be desirable. Berle comments of State Central Decimal File, 19401944,
Working Papers and Source Materials for quoted by Tamm in Memorandum for the RG 59, NACP; and letter from Berle to
Histories of Organizational Units, 1938 Director, 17 November 1943, Folder 4, File Hoover, 4 October 1940, 811.20237/9-
1949, Records of the War History Branch, 64-4104, Administrative Records of the 2740, Box 3728, Department of State Cen-
General Records of the Department of SIS, General Records of the FBI, RG 65, tral Decimal File, 19401944, RG 59,
State, RG 59, NACP. NACP. NACP (investigation authorization).
Hoovers rapid response
to Berles criticism
illustrates the quality of
H. 54 Within a month, Hoover of the units spy-hunting success
had a letter out to Berle describ- their personal spread late in World War II, at
ing relevant steps the Bureau relationship. which point he began seeking to
had taken in Chile and Mexico to expand the FBIs post-war intelli-
collect information on the work-
ing classes in those countries,
along with an assurance that
more such operations were in the
works. 55 Berles willingness to
Two considerations dominated
Hoovers calculation. First, the
gence powers. 59
Intelligence in early 1941, Wild Bill ligence Committee, 12 February 1941, ligence Committee, 12 February 1941,
Donovans Office of the Coordinator of 811.20200/3-2741, Box 3728, Department 811.20200/3-2741, Box 3728, Department
Information (COI) later in 1941, and the of State Central Decimal File, 19401944, of State Central Decimal File, 19401944,
Military Intelligence Division in mid-1942. RG 59, NACP, 8. RG 59, NACP, 5.
Berle protected the
FBI-State status quo from
Donovans sticky fingers.
With Hoover skittish about his gathering strength of the Allied
image and eager to cast off the war effort also helped the SIS out-
SIS, one of Berles most consis-
tent challenges was keeping the
Special Intelligence Service in
the FBI, and thus under the
nominal control of the Depart-
Bureau had done an excellent
maneuver enemy agents and har-
vest political, economic, financial,
and industrial intelligence. 65 Even
so, the Berle-Hoover connection
was an indispensable part of SIS
ment of State. No aspect of the job with the SIS and that he dominance. The potent bond
Berle-Hoover liaison provides would be opposed to having it between the twogrowing out of
clearer proof of its exceptional transferred into untried hands. 63 their respectful treatment of one
nature than this one. Incredibly, Berles forceful opposition to another and complementary insti-
between 1940 and 1942, Berle Donovans proposal at the next tutional interestsshielded the
found himself several times IIC meeting ensured that the Special Intelligence Service from
either defending J. Edgar Service stayed within the FBI. the debilitating discord that
Hoovers institutional interests plagued other wartime intelli-
for him or reminding the When Donovan made a second gence organizations, such as
famously competitive bureaucrat stab at the SIS in December Donovans Office of the Coordina-
why his presence in the foreign- 1941, Berle once again was tor of Information (later OSS) and
intelligence field was necessary. instrumental in protecting the the US Joint Intelligence Commit-
FBI-State status quo from Dono- tee. Nevertheless, the State-FBI
Berles most desperate defense of vans sticky fingers. In a Janu- relationship was far from perfect.
the SIS came in September 1941 ary 1942 strategy session with
during a push by Coordinator of Tamm, the assistant secretary
Information William Donovan to professed that he was more than Limits to State-FBI
assume responsibility for covert ever convinced of the absolute Cooperation
intelligence work in Latin Amer- necessity for so handling this sit-
ica. Upon learning of Donovans uation as to insure the continua-
tion of SIS operations in the Whenever possible, Berle
ambition, Hoover feared the FBI indulged the FBI directors pen-
would end up working under or Western Hemisphere solely and
exclusively by the Bureau. 64 chant for administrative control.
alongside a Donovan-led unit. Likewise, Hoover made a sincere
The director ordered his subordi- effort to keep the assistant secre-
nate, Edward Tamm, to visit The relationship between Adolf
Berle and J. Edgar Hoover was tary abreast of the activities and
Berle at State and inform him requirements of the SIS. Unfor-
that, as Tamm put it, the not the only reason for the SISs
resounding success in Latin tunately, this spirit of accommo-
Bureau had no feeling one way dation did not trickle down to all
or the other as to whether this America. The organization also
benefited from the help of friendly levels of the State-FBI partner-
transfer should be made. 62 Berle ship. Considerable tension
dismissed this sentiment out- governments and populations
throughout the region. As the con- between the two agencies arose
right to Tamm, declaring that the at State from individuals who
flict progressed, the failing for-
tunes of the Axis states and the either mistrusted or were jealous
62 Memorandum for the Director from
of the FBI and its foreign-intelli-
Tamm, 2 September 1941, Folder 1, File gence mandate.
64-4104, Administrative Records of the 63 Memorandum for the Director from
and other takeover bids involving the SIS, Tamm, 12 January 1942, Folder 2, File 64- 1940, Section 1, File 64-4104, Administra-
see Webb, The FBI and Foreign Intelli- 4104, Administrative Records of the SIS, tive Records of the SIS, General Records
gence, 5156. General Records of the FBI, RG 65, NACP. of the FBI, RG 65, NACP.
Latin America
US ambassadors in
tus draws on similar accounts in Memo- 68 Ibid., and Memorandum for the Director
randum for the Director from Ladd, 23 from Ladd, 23 April 1942, Folder 4, File 71 Ibid., 8.
April 1942, Folder 4, File 64-4104, Admin- 64-4104, Administrative Records of the 72 Airgram from Hull to Messersmith, 12
istrative Records of the SIS, General SIS, General Records of the FBI, RG 65, August 1942, Box 3728, Department of
Records of the FBI, RG 65, NACP, 2, and NACP, 89. State Central Decimal File, 19401944,
Memorandum for Ladd from F. C. Hollo- 69 Memorandum for the Director from RG 59, NACP.
man, 14 January 1942, Folder 2, File 64- Ladd, 23 April 1942, 9. 73 Letter from Messersmith to Undersec-
4104, Administrative Records of the SIS, 70 List of praise for the SIS from various retary of State Sumner Welles, 18 August
General Records of the FBI, RG 65, NACP, US government officials, Folder 11, File 1942, 811.20200(R)/8-1842, Box 3728,
2. 64-4104, Administrative Records of the Department of State General Decimal
67 Memorandum for Ladd from F. C. Hollo- SIS, General Records of the FBI, RG 65, File, 19401944, RG 59, NACP, 1.
man, 14 January 1942, 23. NACP. 74 Ibid., 2.
Back in Washington, interest in intelligence picture, but they in contrast to those used in
the SIS and opposition to its FBI failed in their bid to become the direct operations. Rommels sub-
management increased steadily Bureaus sole replacement. sequent list of qualities for
during World War II. Before 1940, Instead, State shared worldwide Department representatives pur-
most diplomats at Foggy Bottom, intelligence authority with sev- suing advisory relationships
like their peers in the field, cared eral other agencies, including the with other agencies fit Adolf
little for intelligence work. As the new Central Intelligence Group, Berle to a tee.
SIS grew in size and stature, MID, and ONI.
bureaucrats at State took covet- Her list included:
ous notice. Berle recorded this
transition in his diary on 7 Conclusion Breadth of intellectual
November 1940. Referencing his graspProfessor Berle was
On 28 October 1943, Depart- considered among the bright-
efforts to construct an Intelligence
ment of State administrator est minds of his generation;
Division for the Department, Berle
Rowena B. Rommel produced a
noted how Intelligence is begin-
long memorandum entitled Willingness to understand
ning to be interesting in the another point of viewBerles
Relations of the Department of
[State] Department now, so every- efforts to empathize with
State to Other Federal Agen-
body wants to be in on it.75 By Hoover and defer to his admin-
cies. 77 Rommels piece laid down
September 1944, a determined istrative judgment were
conceptual guidelines for the
opposition had coalesced at State extensive and sustained;
Departments wartime role in
against FBI involvement in the the administration of govern-
foreign-intelligence field. 76 These Planning ahead to give guid-
ment programs in the interna- ance and keep abreast of
anti-FBI forces helped shut J. tional field. In one section, she
Edgar Hoover out of the post-war emerging problemsHoovers
considered the best technique for efforts to keep Berle informed
administering those areas of about SIS troubles and tri-
75 Berle and Jacobs, 351.
activity where other agencies umphs kept the assistant
76 According to Berles assistant Fletcher have operating responsibilities secretary on the organizations
Warren, individuals at State compiled a and the State Department a coor- administrative front lines;
list of mistakes in FBI political reports dinating, advisory responsibil-
distributed to Berle and US ambassadors ity. 78 This described perfectly the Decisiveness so all officials
in Latin America. In retaliation, Hoover know where they stand and
ordered the SIS to Stop sending Political
relative positions of the FBI and
State in their SIS liaison. Accord- business moves alongBerle
Inf[ormation] to State and Ambassadors maintained frequent and sub-
and retrench in SIS coverage. Though ing to Rommel, a conscious dif-
stantive contact with Hoover
Hoover dug in and fought for a post-war ferentiation should be made and several of his FBI subordi-
role in foreign intelligence, he failed to gain between the kind of administra-
President Harry Trumans support and nates and US ambassadors
was elbowed out of the field. For quotation
tive methods and staff needed in throughout Latin America;
and details on States late-war opposition such collaborative arrangements
to the SIS, see Memorandum to Ladd from Delegation of authority to
R. R. Roach, 20 September 1944, Folder 9, lower officials and backing of
File 64-4104, Administrative Records of 77 Memorandum entitled Relations of the
those officials so there is not a
the SIS, General Records of the FBI, RG Department of State to Other Federal
continuous appealing to higher
65, NACP. For more on interdepartmental Agencies, from Rowena B. Rommel, 28
struggles over the post-war intelligence October 1943, Box 33, Entry 718, Working
courtsmost of the day-to-day
field, see C. Thomas Thorne, Jr., and David Papers and Source Materials for Histories contact between State and the
S. Patterson, eds., Emergence of the Intel- of Organizational Units, 19381949, FBI ran between Berles Assis-
ligence Establishment, Foreign Relations Records of the War History Branch, Gen- tant Fletcher Warren and the
of the United States Series, 19451950, eral Records of the Department of State, rest of the FC staff and several
(Washington, DC: Government Printing RG 59, NACP. of Hoovers lieutenants. Berle
Office, 1996). 78 Ibid., 5.
and Hoover never allowed a
Intelligence reformers
should remember that
cooperation is a matter of
SIS-related dispute between intelligence. The two men accom-
them to travel up the chain of individual, and not plished this feat through
command. In contrast, fights institutional, interaction. patience, deference, open commu-
between Hoover and Miles at
nication, and by pursuing com-
MID and Donovan at COI shot
to the Cabinet level, and even mon interests. Berle himself
into the Oval Office. provided the best summary of his
relationship with Hoover when
The relationship that Adolf Berle ONI commander in 1941, refused he wrote in his diary on 28 Feb-
and J. Edgar Hoover constructed Hoovers offer to transfer all SIS ruary 1942, This [SIS] is one
was as close to Rommels theoret- responsibilities in Mexico to Naval case where cooperation between
ical ideal as the stresses of war Intelligence, insisting that such a State and FBI is working out
and reality could be expected to move would be counter to the gov- beautifully. 81
allow. ernments best interests.80
dents of American intelligence the US military soon unlearned
have sometimes viewed develop- these lessons of joint intelligence
ments from World War I through after the war ended. 3 Strategic
the Cold War as an evolution intelligence was transformed after
from simple to complex organiza- World War II, to be sure, but
tional forms, from uncoordinated inter-service military intelligence
and amateurish attempts to more at the theater or operational level
collaborative efforts by dedi- was sadly neglected and actually
cated, professional officers, and
from ad hoc control arrange- 2 Theater commanders themselves
example, in the preface to his Spying for Joint Intelligence Operations During the
America: The Hidden History of US Intel- Second World War, Joint Forces Quar-
ligence (New York: Paragon House, 1989). terly, (Spring 1996): 122, and Support to
See also the report of the Brown-Aspin Military Operations: The Evolution and
Commission, formally cited as the Com- Relevance of Joint Intelligence Centers,
mission on the Roles and Missions of the Studies in Intelligence 49, no. 1 (2005):41
United States Intelligence Community, 54. See also Jeffrey M. Moore, Spies for
Dr. Michael Warner serves in the Preparing for the 21st Century: An Nimitz: Joint Military Intelligence in the
Office of the Director of National Appraisal of US Intelligence (Washing- Pacific War (Annapolis, MD: Naval Insti-
Intelligence. ton: Government Printing Office, 1996), 7. tute Press, 2004).
lost certain capabilities that it terpiece of the American arsenal and it was hardly clandestine,
had acquired in wartime. It is lit- and a constitutive component of but what made it intelligence
tle short of astonishing to note, for the nations thinking about how was the tightly guarded sophisti-
example, that American theater it might deal with foreign cation of the analysis that inter-
commanders between 1945 and threats. Second, Washington preted the pictures in light of
1991, with insignificant excep- learned at Pearl Harbor that one other sources to maximize the
tions, did not control organic joint- man had to be in charge in each strategic impact of air power.
service intelligence staffs to help active theater of war and that Theater commanders needed
them conduct joint operations. unity of effort required a unity of such intelligence to understand
command that transcended the both the effects that their efforts
Scholars like Marchio and Moore individual services and fighting were having on the enemy and
have only scratched the surface of arms. Hence the appointment of the best ways to allocate scarce
this topic. A quick look at theater- theater commanders (most resources.
level intelligence for air power famously Eisenhower in Europe,
from the closing of World War II Nimitz in the Central Pacific, and
Britain, out of necessity, had pio-
through the Korean conflict pro- MacArthur in the South Pacific),
neered this field, creating an
vides ample corroborating evi- and their assembling of inter-
inter-service photo intelligence
dence for an argument that allied support staffs. Third, in
Europe and to a lesser extent in center in late 1940. The British
American military intelligence
the Pacific, these theater staffs taught their newly acquired
lost, rather than gained, organiza-
included large intelligence ele- skills to the Americans, who had
tional sophistication and analytic
ments to support strategic bomb- gone to war with crude intelli-
proficiency at the beginning of the
ing efforts by charting the course gence capabilities. 4 The Army Air
Cold War. The militarys wartime
of the air campaign and gauging Forces (AAF) appreciated the
progress in command and con-
its impact on enemy intentions value of integrating all available
trolfor instance, the creation of
and capabilities. The first two of sources in an organization
theater commanders and the sub-
these lessons proved enduring, employing teams of expert photo-
sequent Unified Command Plan
was not matched by progress in but the third had serious trou- interpreters supported by ana-
intelligence capabilities. The bles when the shooting stopped. lysts like those of the Enemy
decline was particularly jarring in Objectives Unit of the Office of
air intelligence. Indeed, a survey Strategic Services. Indeed, by the
A key component of the intelli-
of recent findings and published gence for strategic bombing was end of the war, imagery pro-
sources suggests that, in the very the interpretation of evidence cessed by theater photo interpre-
years when strategic airpower was gleaned from overhead photogra- tation centerslike the one at
being advocated and recognized as phy. Imagery analysis had won a Medmenham, Englandwas pro-
a key component of national secu- place as its own discipline in viding large portions of the tacti-
rity, intelligence to guide strategic World War II. By 1942, Allied cal and strategic intelligence that
bombing campaigns, especially at bombers were growing so large Allied commanders employed
the operational-level, faced insti- and long-ranged that they prom-
tutional jeopardy and professional ised to make a reality of pre-war 4 For example, the 12th Air Force went to
stagnation. forecasts of the power of strate- North Africa in November 1942 with no
gic bombing. In so doing, aircraft trained photo-interpreters to analyze
technology briefly outstripped the aerial photographs. Its commander, Brig.
Wartime Experience crude reconnaissance capabili- Gen. James Doolittle, analyzed the pic-
tures from its first photoreconnaissance
ties of the Allies to guide target- mission himself. See James Doolittle, with
World War II saw three innova- ing and damage assessment. Carroll V. Glines, I Could Never Be So
tions for the US military. First, Aerial photography long pre- Lucky Again (New York: Bantam, 1991),
strategic bombing became a cen- dated World War II, of course, 332.
AAF commanders
disliked their
dependence on British
against the Axis, and was a key to analyze objectives in Japan
to the bombers success in crip- intelligence. and evaluate the progress of the
pling the German economy. 5 nascent bombing campaign; it did
AAF commanders in Europe were gence, Box 297. See also the memorandum Byrnes also heard a number of our Air
concerned enough about the on this topic prepared for Gen. Carl C. Corps [sic] officers complain of a lack of
Spaatz, commander of the US Strategic adequate American intelligence and
decline of US intelligence profi-
Air Forces in Europe, by his director of praise the high quality of British intelli-
ciency to complain to Secretary of intelligence, Brig. Gen. George C. gence. See Minutes of Meeting [of the
State James Byrnes when he vis- McDonald, on 7 November 1944. Concern Secretaries of State, War, and Navy], 16
ited them. 7 over the dependency may also have influ- October 1945, in Department of State,
enced USSTAFs relocation of much of its Foreign Relations of the United States,
Only in Europe, however, was intelligence organization from Widewing, 19451950, Emergence of the Intelligence
Bushey Park, England, to the new Main Establishment (Washington: Government
this degree of sophistication, Headquarters in St. Germain, France, in Printing Office, 1996), 64.
based on backstopping by the late 1944a move that may have contrib- 8 Roy M. Stanley, II, World War II Photo
uted significantly to the decline in the Intelligence (New York: Charles Scribners
AAFs post-war intelligence capabilities. Sons, 1981), 70.
5 For more on imagery intelligence in See Lt. Col. Lewis F. Powell, Jr., Chief, 9 John F. Kreis, Planning the Defeat of
World War II, see Alexander S. Cochran, Operational Intelligence Division, to Brig. Japan: The A-2 in Washington, 1943
Jr., Robert C. Ehrhart, and John F. Kreis, Gen. McDonald, Notes on Operational 1945, in Kreis, ed., Piercing the Fog, 368
The Tools of Air Intelligence: ULTRA, Intelligence Division of Directorate of 71.
MAGIC, Photographic Assessment, and Intelligence, USSTAF, 9 June 1945, 20. I 10 See, for instance, former Treasury
the Y-Service, in John F. Kreis, ed., Pierc- am grateful to John Ferris of the Univer- Department economic analyst and
ing the Fog: Intelligence and Army Air sity of Calgary for copies of these docu- Amherst College professor George S. Pet-
Force Operations in World War II (Wash- ments, which are held in the MacDonald tees The Future of American Secret Intel-
ington: Air Force History and Museums Research Material, Special Collection, US ligence (Washington: Infantry Journal
Program, 1996), 85, 9293. Air Force Academy Library. Press, 1946), 35.
When the war ended,
the better the officer,
the faster he left.
about 2 million men in Septem- Sophisticated inter-allied sys-
ber 1945 to one-quarter that tems to provide air targeting
number barely six months later. 11
Arnolds deputy, Gen. Carl
Spaatz, warned Congress in
November that our air force [is]
disintegrating before our eyes.
who would inevitably be lost to
civilian life when the war
intelligence through exploiting
imagery and all available sources
were being disbanded, their per-
sonnel demobilized, and their
equipment presumably sold. 18
We see almost hysterical demobi- ended. 15 That seems to be Few of the AAFs leaders under-
lization. 12 Brig. Gen. Leon W. exactly what happened. The stood how dependent these
Johnson, head of the AAFs Per- War Departments point sys- efforts had been on British exper-
sonnel Services Division, com- tem gave demobilization prior- tise, signals intelligence, and
plained in detail: ity to overseas veterans with inter-service coordination; thus
the longest service (and thus little was done to preserve in Air
We didnt demobilize; we the most expertise). Intelli- Force hands the capability that
merely fell apart. We lost gence was no exception: The had been so painfully won in
many records of all the groups better the officer, the faster he wartime. 19 Indeed, the Eber-
and units that operated during left. 16
the war because there was no stadt Report on military unifica-
one to take care of them. So, it tion prepared for Navy Secretary
was not an orderly demobiliza- Military intelligence capabilities James Forrestal in the summer of
tion at all. It was just a riot, were swept away in the haste of 1945 had praised joint photo-
really. 13 demobilization. Soon the combat intelligence and target analysis,
intelligence centers built during but it said nothing about whether
The AAFs specialized support the war were all but gone, dis- that intelligence was provided at
capabilities perhaps suffered mantled like the joint intelli-
the worst. At least 12 recon- gence centers established to help
naissance groups and four theater commanders in the
17 The Joint Intelligence Center Pacific
wings were active on V-J Day, Ocean Area in Adm. Nimitzs command
Pacific and Mediterranean. 17 shut down in October 1945, and the Joint
but only two groups and one Intelligence Center of the Africa-Middle
wing remained in operation at East Theater was dismantled around the
the end of the fiscal year on 30 14 These numbers are derived from a quick same time; see Marchio, Days of Future
June 1946. 14 By then, it is likely and unscientific survey of the lists in Air Past, 122.
that the AAFs ability to utilize Force Combat Units of World War II, pub- 18 For example, American personnel from
lished by the US Air Forces historical perhaps the most important of these orga-
them had been seriously office in 1961, and revised and reprinted nizations, the Allied Central Interpreta-
degraded. Gen. Spaatz had in 1986. The lists are available on-line at tion Unit in Medmenham, England, were
lamented in late 1944 that the http://libraryautomation.com/ withdrawn in August 1945; Ursula Powys-
intelligence components of his nymas/usaaf. The 1946 numbers roughly Lybbe, The Eye of Intelligence (London:
command in Europe were match the totals of operational AAF William Kimber, 1983), 213. British per-
reconnaissance units in mid-1947: two sonnel working in the Joint Target Group
staffed with hundreds of highly tactical reconnaissance groups, one long- of the Army Air Forces A-2 in Washington
trained emergency officers range photo-reconnaissance group, and departed for home before November 1945;
one long-range mapping group. See also see Kreis, Planning the Defeat of Japan,
Wolk, 215. 390.
11 Walton S. Moody, Building a Strategic 15 Spaatz is quoted in the transcript of the 19 With fits and starts, some air targeting
Air Force (Washington: Air Force History Committee for the Reorganization of the intelligence continued to be shared
and Museums Program, 1996), 50. National Defense, a conference of AAF between the British and Americans as
12 Moody, 52. officers held at Spaatzs headquarters at both nations exploited Luftwaffe imagery
13 Quoted in Herman S. Wolk, Planning St. Germain, France, on 6 November of the Soviet Union. Richard J. Aldrich,
and Organizing the Postwar Air Force, 1944. My thanks to John Ferris of the The Hidden Hand: Britain, America, and
19431947 (Washington: Office of Air University of Calgary for this document. Cold War Secret Intelligence (London:
Force History, 1984), 117. 16 Moody, 50. John Murray, 2002), 20617.
the tactical, operational, or stra- codified in the National Security ing the potential of jet aircraft,
tegic levelsor whether and how Act of 1947the same legisla- winning independence from the
to provide it in the future. 20 tion that gave statutory standing Army, and then establishing the
to unified and specified com- institutions of an independent
mands, thus making permanent US Air Force. In the spring of
President Truman wanted intelli-
the wartime innovation in Amer- 1949, the Air Force deactivated
gence reform in late 1945, but as
icas conduct of the operational several more of its tactical recon-
yet he had little time or training
level of war. But while these the- naissance units, leaving only
to understand the subtleties of
ater commanders would reign three squadrons in active status.
what was being done in its name.
relatively supreme in their areas Its strategic reconnaissance units
By the time he examined propos-
of responsibility, nothing in the seemed to have fared better only
als for a new director of central
1947 Act provided for them to by comparison; economy mea-
intelligence (DCI) to guide and
have their own organic intelli- sures had hampered their mod-
coordinate activities at the
gence capabilities. This oversight ernization since the war. 24 The
national level, much of the dam-
would soon have unintended con- problems of developing and field-
age had been done. The presi-
sequences. ing jet-age reconnaissance air-
dent agreed with the Army and
Navy that every department craftand the improved cameras
With no secretary of defense pow- for them to carrywere daunt-
required its own intelligencea
erful enough to coordinate a ing enough, but still worse was
concession that in effect ratified
joint, all-source combat intelli- the decay in the human and orga-
the wholesale scrapping of war-
gence capability, and the DCI nizational assets for imagery
time intelligence capabilities. 21
implicitly barred from this field, intelligence. 25 What time and
Trumans order establishing the
the military services concen- energy they had for air intelli-
post of DCI in January 1946
trated on their own concerns and
accordingly stipulated that the gence seems to have been
had little authority or inclina-
existing intelligence agencies
tion to re-create joint intelli-
shall continue to collect, evalu-
gence staffs. A blue-ribbon panel 23 The larger panel was chaired by former
ate, correlate, and disseminate
appointed by Congress to study president Herbert Hoover and titled the
departmental intelligence (out- Commission on the Organization of the
the organization of the govern-
side the purview of the DCI). 22 Executive Branch of the Government. Its
ment flagged some of the danger
This concession, while necessary national security team, headed by Eber-
signals in its January 1949 stadt, reported to Congress in January
to win military assent in the cre-
report. Its subcommittee to study 1949. The intelligence sections of its final
ation of the DCI and an organiza-
intelligence, headed by Ferdi- report closely tracked a then-classified
tion to serve him, would be chapter of the teams report titled The
nand Eberstadt, warned that the
Central Intelligence Agency: National and
military intelligence arms had
Service Intelligence, which was declassi-
20 US Senate, Committee on Naval Affairs, lost most of the skilled and expe- fied by the CIA in the 1990s. See CIA
Unification of the War and Navy Depart- rienced personnel of wartime, Management of Officially Released Infor-
ments and Postwar Organization for and that those who remained had mation (MORI) system document 400637;
National Security, 79th Congress, First seen their organizations and the quotations are from that chapter, 39
Session, 22 October 1945, 162. 40.
21 Harry S. Truman, Memoirs, Vol. II,
their systems ruined by superior 24 Robert F. Futrell, The United States Air
Years of Trial and Hope (Garden City, NY: officers with no experience, little Force in Korea, 19501953 (Washington:
Doubleday, 1956), 57. capacity, and no imagination. 23 Office of Air Force History, 1983), 545.
22 Truman to the Secretaries of State, War, 25 For a summary of these technical prob-
and Navy, 22 January 1946, reprinted in This neglect devastated the lems, see Moody, 1056, 239. Electronic
Department of State, Foreign Relations of intelligence suffered as well; see John
the United States, 19451950, Emergence
nations ability to provide intelli- Thomas Farquhar, A Need To Know: The
of the Intelligence Establishment (Wash- gence support to a strategic air Role of Air Force Reconnaissance in War
ington: Government Printing Office, campaign. AAF leaders after Planning, 19451953 (Maxwell AFB, AL:
1996), 17879. World War II were busy develop- Air University Press, 2004), 39.
These lessons [of
World War II] either
were forgotten or
devoted to a scramble for data on an all-source imagery intelli-
targets in the Soviet Union. 26 never documented. gence, targeting, and battle-dam-
Nevertheless, by 1950 bomber
age assessment capability. 32 By
crews still had target materials the end of the war, imagery sup-
on only about half of their pro-
port was once again competent
spective targets in the USSR. 27
On the eve of the Korean War, a for the US Army and Air Force in and robust, but recouping that
draft Handbook for Air Intelli- Korea. 29 The Army had pledged capability had been expensive in
gence Officers distributed by the in a series of deals dating from time, money, and livesand
Air Training Command described 1946 to handle much of the inter- there was still little understand-
World War II-vintage procedures pretation of photos of the front- ing that the job was perhaps too
for organizing and running photo lines, but the Eighth Army had big for any one service.
interpretation units because no photo-interpreters at all until
there was nothing else to February 1951, by which time
describe. The booklet sheepishly United Nations forces had twice James Marchios research adds an
explained that the organization been threatened with eviction interesting side note. Early in the
of units engaged in Air Force from the Korean peninsula. Korean war, the several com-
photo interpretation is being When Lt. Gen. Matthew Ridge- manders-in-chief of the unified
modified and promised to update way took over the Eighth Army and specified commands endorsed
the section at a later date. 28 in late December 1950, he found a director of naval intelligence
that his command literally did proposal to fashion joint intelli-
not know the sizes and locations
gence centers in each of their com-
Consequences in Korea of the Chinese formations facing
it. To add insult to injury, an mandsan idea that was soon
The Truman administrations urgent reconnaissance campaign forwarded to the Joint Chiefs of
decision to allow the depart- to locate those forces found little Staff. For some still undeter-
ments to provide their own intel- or nothing, largely because the mined reason, the Joint Secretar-
ligence thus abetted, in practice, harried photo-interpreters were iat in 1951 returned the proposal
a situation in which a single ser- relying in most cases on imagery with the cryptic explanation that
vice, through simple inattention, alone to spot camouflaged Chi- it had been withdrawn from con-
could deprive the nation of a nese positions, without the aid of
sideration by the JCS.33 That is
valuable asset. In Korea, a sur- other intelligence sources. 30
prised US Air Force had to recon- roughly where matters would
struct, almost from scratch, the stand until the implementation of
Something seemed to have gone
sort of intelligence support for the Goldwater-Nichols Act, almost
seriously wrong. Indeed, the chief
strategic air operations it had four decades later.
of the Far East Air Force, Lt.
enjoyed in 1945. For the first two
Gen. Otto Weyland, complained
months of the conflict, a single
that it appears that these les- 31 Cited by Robert F. Futrell in A Case
reconnaissance technical squad-
sons [of World War II] either Study: USAF Intelligence in the Korean
ron in Yokota, Japan, had to han-
were forgotten or never were doc- War, in Walter T. Hitchcock, ed., The
dle all photo interpretation work Intelligence Revolution: A Historical Per-
umented. 31 Not until mid-1952
spective [Proceedings of the Thirteenth
two years into the conflictdid Military History Symposium], (Washing-
26 Moody, 140. theater command have at its call ton: Office of Air Force History, 1991), 275.
27 Ibid., 333. 32 Futrell, The United States Air Force in
June 1950, copy in the CIAs Historical Korea, 19501953, 54546. Operations: The Evolution and Relevance
Intelligence Collection, Declassified. 30 Ibid., 27273. of Joint Intelligence Centers, 4154.
The problem of
harnessing
national-level
Conclusion especially close support from
means to intelligence. And this lesson had
This essay is not a comprehen- operational-level to be relearned in later conflicts
sive examination of the litera- needs was too difficult. as well.
ture and documentation on its
topic. It is rather a survey of
clues that suggest what might be
found when additional archival
spadework gets done in the
records of reconnaissance units
problem of harnessing national-
Thus, a Whig interpretation of
the history of American intelli-
gence must be used with cau-
tion, if at all. Indeed, historians
might profit from reexamining
and imagery intelligence organi- level means to operational- certain developments during the
zations. level needs was too difficult. It Cold Warsuch as the growth of
had been solved only tempo- the analytic capabilities of the
At the end of the world war, the rarily for the Combined Bombing Central Intelligence Agency and
Truman administration and Con- Offensive in Europe, and that the creations of the Defense
gress took stock of what had success had lulled Army Air Intelligence Agency, the National
changed in Americas posture Forces into a false confidence in Photographic Interpretation Cen-
toward the world and in its mili- their intelligence capabilities, ter, and the National Reconnais-
tary and intelligence capabilities which were soon demobilized. sance Officenot as progress
and sought to organize these Thus, the new Intelligence Com- toward a higher intelligence syn-
capabilities in a lasting, peace- munity simply was not well pre- thesis, but as ad hoc and partial
time configuration. The military pared for the challenges of the remedies for certain chronic
establishment failed, however, to Cold War and beyond. The Penta- weaknesses and problems cre-
incorporate important lessons gon had to relearn in Korea that ated in the rush to demobilize
from its wartime experience. The strategic air campaigns require after World War II.
acknowledgement of past mis-
racy of those judgments. The takes and a willingness to
second report, also classified, change.
reviewed the intelligence used to
support judgments regarding This report was prepared at a time
weapons of mass destruction in of a great rush to reorganize and
Iraq. Specifically, it reviewed the give the leader of the Intelligence
reporting used to develop the Community new authorities. That
National Intelligence Estimate probably was a necessary activity.
Iraq's Continuing Programs for However, to move the organiza-
Weapons of Mass Destruction, tional boxes and to offer new
published in October 2002. The authorities are not the only
third report, which follows, was answers or perhaps even the best
an unclassified study presented answers. Based on our experience
in July 2004. In it, the team pre- and what we learned during this
sents an assessment of the review, the Group believes that
performance of the Intelligence the quality of intelligence will be
Community from a broad per- improved only by fundamental
Richard J. Kerr served as Deputy changes at the grass roots level.
Director of Central Intelligence; spective, focusing on systemic
That is, changes in collection,
Thomas H. Wolfe as Director of the issues that channeled analysts
analysis, the nature of the prod-
Office of Near Eastern & South evaluations and analyses. Its
uct, and interaction with policy-
Asian Analysis; Rebecca L. observations and recommenda-
makers and other customers.
Donegan as Deputy Inspector tions continue to have relevance
General; and Aris A. Pappas as as the Community evolves. The Intelligence Community
Assistant National Intelligence itself has made some useful
Officer for General Purpose Forces. * * * changes and recommended oth-
The policy community
was receptive to
technical intelligence
ers. Several fixes also have been cultural and political issues
proposed from outside the Com- on WMD, where the (post-Saddam Iraq), where the
munity, which might be helpful analysis was wrong, analysis was right.
but do not address some of the but paid little
core problems identified by the attention to analysis With respect to the weapons pro-
Group. This report focuses on the on post-Saddam Iraq,
question: Does the Community's grams, some critics have argued
flawed performance on Iraq rep-
which was right. that the off-the-mark judgments
resent one-time problems, not to resulted largely from reinforce-
be repeated, or is it symptomatic
of deeper problems?
The ICs tendency to
establish single-issue
centers contributes to
The Context inadequate to deal conclusively
uneven performance. with the multiplicity of threats.
Any examination of the Intelli- Accordingly, the Community in
gence Community must acknowl-
edge the impact of more than 10
years of turmoil that adversely
affected all collection and analytic
efforts, including those on Iraq.
Nonetheless, during the 1990s the
Intelligence Community con-
critical situations has faltered in
its analyses and failed to collect
pertinent information. This has
occurred over a length of time
and across crises sufficient in
The Intelligence Community was fronted numerous crises in which number, quite apart from Iraq, to
designed to focus on the Soviet to demonstrate the relevance of indicate systemic issues rather
Union. It had developed a single- intelligence analysis to policy than just occasional missteps.
minded rigor and attention to deliberations. Regional conflicts,
detail that enriched its analysis, such as the first Gulf war and fol-
particularly with respect to Soviet low-on sanctions against Iraq, the Collection Impeded and
military issues. The end of the breakup of Yugoslavia, and emerg- Misdirected
Cold War, however, brought to a ing threats from North Korea and
close that stable bipolar world Iran provided tests for intelli- Intelligence collection against
and left the United States without gence. The Community's collec- Iraq fell far short of the mark.
a principal enemy. Although never tion and analysis performance The intelligence base for collec-
perfect, the Intelligence Commu- over this period, however, was tion and analysis was thin and
nity's analytic efforts against the seen as inconsistent and some- sketchy. The Intelligence Com-
Soviet threat were generally times faulty, leaving important munity had nothing like the rich-
insightful and its collection largely customers still wondering about ness, density, and detail that it
effective, reflecting the accumula- the relevance of the intelligence worked hard to develop and
tion of deep understanding devel- input to policy deliberations. became accustomed to having on
oped over many years. Soviet issues during the Cold
A significant contributor to this War. To a significant extent this
Absent this singular focus, in the uneven performance was, and resulted from the reduction over
post-Cold War environment the still is, the Community's ten- the past decade of the profes-
Intelligence Community strug- dency to establish single-issue sional collection management
gled to reestablish its identity centers and crisis-response task cadre capable of integrating
and purpose in what had become forces. By stripping expertise HUMINT, imagery, and signals
a world of multiple crises and from regional offices, they dimin- intelligence capabilities into
transient threats. The effort to ish the overall ability to provide coherent strategies. This develop-
define its priorities was further perspective and context for those ment was compounded by the
complicated as policymakers and issues. The resources seldom get increased separation of collection
others raised questions not only returned to the line offices, which professionals from the analytic
about the role of but even the historically have been better cadre who had been intimately
need for intelligence. Accord- equipped to provide complete involved in identifying collection
ingly, intelligence came to be perspectives on country and gaps, needs, and priorities and
seen as an area where the gov- regional issues. developing collection strategies.
ernment could reap resource sav-
ings. The resulting cutbacks in Although resources increased Placing these developments in a
collection (technical and marginally over the decade, they broader context, however, is
HUMINT) and analytic resources were not as robust or focused as important. Iraq was not the only
had a significant adverse impact the capabilities devoted to the significant intelligence problem
on Intelligence Community capa- Soviet Union and were seen by facing the Community in the
bilities. the Intelligence Community as years immediately preceding the
war. Counterterrorism and coun- working them, or what the doc- eration, and Arms Control. It was
terproliferation were given trines for use might be. Con- published contemporaneously
higher priority and absorbed versely, the Community saw no with the 2002 National Intelli-
much of the clandestine services evidence that WMD programs gence Estimate on WMD. The
capability and leadership atten- were slowed, put on hold, or even brief describes in great detail the
tion. Weapons programs in both nonexistent. Nor did it under- information required to support
North Korea and Iran received stand why Saddam's devious and analysis of Iraq's weapons pro-
higher priority than those in Iraq obstructionist behavior contin- grams. The intent of the brief was
until late 2002. In Iraq, technical ued if, as he claimed, he had no to expose gaps in knowledge about
collection priorities emphasized stockpiles of banned weapons. what was believed to be aggres-
coverage of the Iraqi air defense sive, ongoing Iraqi weapons pro-
system in southern Iraq in sup- US intelligence collection strate- grams. The revealed gaps in
port of US military operations gies contributed to the problem. knowledge were not, however,
and prevented collection on other Looking for information on a par- raised as requirements to address
important targets in Iraq. ticular subject with a preconcep- what was not known nor did such
tion of what is needed is almost gaps raise doubts about prevail-
A number of other factors added certain to result in data that ing intelligence judgments.
to the difficulty of clandestine reinforces existing assumptions.
collection on the Iraq target. The The Community directed its col- Discussing largely space-based
Iraqis took pains to carefully hide lection capabilities to filling in collection systems at an unclassi-
their WMD programs. People and what it thought were gaps in fied level is difficult, but a few
operations were protected from information about WMD pro- observations are possible.
US intelligence by a variety of grams, monitoring progress, look- Despite a wide variety of techni-
methods, including isolating sci- ing for new developments in cal capabilities available to the
entists and technicians involved weapons and delivery systems, US, these systems were able to
in the programs and employing and identifying efforts to acquire provide accurate information on
effective camouflage, conceal- materiel and technology abroad. relatively few critical issues.
ment, and deception efforts. The Based on the hard information Monitoring Iraqi reactions to
Iraqis had learned well about US collected by US military forces inspections was informative as
intelligence during more than 10 and UN inspectors during and was reporting on Iraqi acquisi-
years of confrontation and war. following the first Gulf war, rein- tion efforts. Technical collection
forced by subsequent bits of lends itself to monitoring large-
Nevertheless, collection of infor- information, the Intelligence scale, widespread targets, a con-
mation on difficult targets is the Community and the US defense dition not met in the Iraqi case.
core mission of intelligence and establishment had little doubt Analysis of Iraq's WMD pro-
in the Iraq case it did not mea- that Iraq was continuing develop- grams, therefore, provides an
sure up. Many of the more ment of WMD. excellent case study for an
sophisticated clandestine techni- assessment of the limitations of
cal collection techniques did not Collection was not focused or con- relying too heavily on technical
produce results. The Iraq WMD ceptually driven to answer ques- collection systems with little
target was given a high priority tions about the validity of the acknowledgement of the politi-
over more than a decade, even if premise that the WMD programs cal/cultural context in which such
not the highest. Still, the Intelli- were continuing apace. This prob- programs exist.
gence Community did not have lem is well illustrated by a com-
conclusive evidence on what the prehensive collection support brief Accordingly, surprisingly little
Iraqis were working on, what describing intelligence needs pub- collection was directed against
they had achieved, which pro- lished by the DCI Center for several key issues. Neglected
grams were ongoing, who was Weapons Intelligence, Nonprolif- topics for collection included the
Collection strategies
for Iraq were weak and
unimaginative.
social, cultural, and economic ficulty of requiring such a regime
impacts on Iraq of nearly 20 to prove the negative in the face
years of war and 10 years of
sanctions and isolation. Little
attention appears to have been
paid, for example, to collecting
information on the oil-for-food
with considerable effort. It may
also reside in the minds of groups
of assumptions that it is dissem-
bling. Overall, the Intelligence
Community did not acquit itself
well in developing collection
strategies on Iraq.
program. Considerable specula- of people who are accessible but
tion was voiced that several not easily approachable and who
countries and individuals were do not fall into the category of Analysis Adversely Affected
profiting from this program. controlled agents. Although there
Despite the fact that many of the is a strong argument that the No single act of omission or com-
targets for this subject were out- clandestine service should not mission accounts for the inconsis-
side Iraq, it received only spo- divert its attention away from tent analytic performance of the
radic attention. collecting secrets, information Intelligence Community with
on the stresses and strains of regard to Iraq. It appears to be
Although collection itself was a society may be equally, if not the result of decisions made, and
problem, analysts were led to more, important. This type of not made, since the fall of the
rely on reporting whose sourcing information, however, does not fit Soviet Union, which had an
was misleading and even unreli- with the reward system in the impact on the analytical environ-
able. In the case of US clandes- collection world and can be diffi- ment analogous to the effect of
tine reporting, it too often used cult to fully assess and to inte- the meteor strikes on the dino-
different descriptions for the grate with other information. saurs. Nothing was the same
same source, leading analysts to afterwards. In response to
believe they had more corrobora- In the case of Iraq, collection changed priorities and decreased
tive information from more strategies were weak and resources, the Intelligence Com-
sources than was actually the unimaginative and failed to get munity's analytic cadre under-
case. In addition, some critical the richness and density of infor- went changes in both its
judgments were made on the mation required. A careful exam- organization and its methodologi-
basis of intelligence provided by ination might have addressed the cal orientation. Perhaps the most
foreign intelligence services. long-neglected question of the significant change was the shift
Some of those liaison sources value added by the different away from long-term, in-depth
were not available to the US, and types of intelligencee.g., SIG- analysis in favor of more short-
some key information obtained INT and IMINTrelative to the term products intended to pro-
from liaison proved to be false. resources devoted to them. Col- vide direct support to policy.
lection on Iraq also was the vic- Done with the best of intentions,
The Intelligence Community tim of inadequate funding and this shift seems to have had the
knows how to collect secret infor- too intense competition between result of weakening elements of
mation, even though in the Iraq top priority targets. Finally, Iraq the analytic discipline and rigor
situation it did not perform this demonstrates that collection that characterized Intelligence
function well. On the other hand, strategies must take into account Community products through the
the acquisition of softer intelli- that the absence of dangerous Cold War.
gence on societal issues, person- activity in a targeted country
alities, and elites presents an cannot be convincingly demon- The kind of intellectual-capital-
even greater challenge. This lat- strated in the presence of a secre- intensive analysis that tradition-
ter information can be found in tive and devious regime. Or, put ally and effectively preceded pol-
databases, but they are too often differently, collection strategies icy deliberations was unavailable
only accessible indirectly and should recognize the extreme dif- because of the shift away from
No intelligence
product or thread
called into question
research-oriented analytic invest- both the validity and standing of
ments. In reviewing the national the quality of basic finished intelligence products
intelligence products associated assumptions. seem to have been ineffective in
with Iraq, we found that they too identifying key issues affecting
often dealt, seriatim, with a
broad range of subjects but with-
out extensive cross-reference,
and with no attempt to synthe-
size a broader understanding of
did not seem to provoke internal
review within the Intelligence
collection and analysis. Allowing
for a satisfying sense of volumi-
nous production, and reflecting
the approval of receptive consum-
ers, the policy-heavy process pro-
Iraq out of the many detailed vided positive feedback, while the
Community. Indeed, although
pieces that were prepared. The narrowly focused internal archi-
certain gaps were acknowledged,
absence of such a contextual tecture lacked the self-awareness
no product or thread within the
effort contributed to assessments that could otherwise have raised
intelligence provided called into
that failed to recognize the signif- serious and timely warnings.
question the quality of basic
icance of gaps in collection that
assumptions, hastening the con-
may have been more evident
version of heavily qualified judg-
when viewed from a larger per- Interaction with the Policy
ments into accepted fact.
spective. Community
The absence of a unifying analy- As noted earlier, the growing use Few issues have engaged greater
sis was also disguised by the of centers also contributed to policymaker interest in intelli-
rapidity and volume of interac- what was at best a problematic gence than those concerning
tions between intelligence and result. The Intelligence Commu- Iraqparticularly the questions
policy deliberations. Eagerly nity has generally considered of weapons of mass destruction
responsive to quickly developed centers a useful organizational and Saddam's links to al-Qaida.
policy requirements, the quick concept to concentrate analytic The demands for intelligence in
and assured response gave the and collection capabilities the months leading up to the war
appearance of both knowledge against a carefully defined tar- were numerous and intense. The
and confidence that, in retro- get set or issue. They also have Intelligence Community
spect, was too high. the effect, however, of drawing responded to the overwhelming
resources away from more consumer demand with an ever-
Of all the methodological ele- broadly based organizations. The increasing stream of analysis
ments that contributed, posi- post-Cold War reductions both written and oral. Neither
tively and negatively, to the throughout the Intelligence Com- means of communication, how-
Intelligence Community's perfor- munity made this a critical but ever, served the policy commu-
mance, the most important seems insidious factor. Analysis of Iraq's nity as well as it might have.
to be an uncritical acceptance of weapons of mass destruction
established positions and thus became the purview of tech- In periods of crisis, when
assumptions. Gaps in knowledge nically competent analysts, but demands are high and response
were left undiscovered or unat- as has been described elsewhere, time is short, most written intel-
tended, which to some degree is their efforts were not leavened ligence production is in the form
explainable by the absence of through review by more broadly of policy-driven memos and briefs
pervasive, intrusive, and effec- based colleagues. and pieces written for daily
tive collection in Iraq. Although publications. The result of this
many products were appropri- Finally, quality control was weak- narrowly focused and piecemeal
ately caveated, the growing need ened. The extensive layers of criti- intelligence flow is that it
to caveat judgments to explain cal management review that neither fosters continuity of anal-
the absence of direct intelligence traditionally served to ensure ysis nor provides a context within
Too close association
with policy
deliberations can be
which to place seemingly unre- in the run-up to the war consti-
lated information. In the case of troublesome. tuted inappropriate pressure on
Iraq, national intelligence did not intelligence analysts. Although
provide a comprehensive picture
of how the country functioned as
a whole. The Intelligence Com-
munity has made substantial,
although sporadic, efforts over
mixed bag of analytic product.
Consistent application of ana-
viewed in that context as a prob-
lem, serious pressure from policy-
makers almost always
accompanies serious issues. The
more relevant issue is how the
the past decade and a half to lytic or evidentiary standards Intelligence Community responded
explore better and more techno- became next to impossible. to the climate of policy-level pres-
logically advanced methods of sure and expectations. Whether or
communicating with consumers. The fundamental question is not this climate contributed to the
The results, however, have been whether national intelligence problem of inconsistent analytic
modest at best. The requirement estimates add value to the exist- performance, however, remains an
to have background and contex- ing body of analytic work. Histor- open question.
tual information available at the ically, with few exceptions, NIEs
policymaker's fingertips in a have not carried great weight in The cases of WMD and Iraq's
timely fashion remains unful- policy deliberations, although links to al-Qaida illustrate two
filled. customers have often used them different responses to policy pres-
to promote their own agendas. sure. In the case of al-Qaida, the
The policy community was also ill The time may have come to reas- constant stream of questions
served by the national intelli- sess the value of NIEs and the aimed at finding links between
gence estimate (NIE) process. process used to produce them. Saddam and the terrorist net-
NIEs rarely represent new analy- work caused analysts to take
sis or bring to bear more exper- Oral communications have their what they termed a purposely
tise than already exists in own set of problems. While direct aggressive approach in conduct-
analytic offices; indeed, drafters engagement with the policy com- ing exhaustive and repetitive
of NIEs are usually the same munity is essential for intelli- searches for such links. Despite
analysts from whose work the gence to have an impact, too close the pressure, however, the Intelli-
NIE is drawn. Little indepen- association with policy delibera- gence Community remained firm
dent knowledge or informed out- tions can be troublesome. In the in its assessment that no opera-
side opinion is incorporated in case of Iraq, daily briefings and tional or collaborative relation-
estimative products. The prepa- other contacts at the highest lev- ship existed. In the case of Iraq's
ration of an NIE therefore con- els undoubtedly influenced pol- possession of WMD, on the other
sists primarily of compiling icy in ways that went beyond the hand, analytic judgments and
judgments from previous prod- coordinated analysis contained in policy views were in accord, so
ucts and debating points of dis- the written product. Close and that the impact of pressure, if
agreement. The Iraqi WMD continuing personal contact, any, was more nuanced and may
estimate of October 2002 was unfettered by the formal caveats have been considered reinforc-
characterized by all of these that usually accompany written ing. Although it is possible that
weaknesses and more. It was production, probably imparted a in the absence of strong policy
done under an unusually tight greater sense of certainty to ana- interest, analysts would have
time constraintthree weeksto lytic conclusions than the facts been more inclined to examine
meet a deadline for congres- would bear. their underlying assumptions, it
sional debate. And it was the is unlikely that such examina-
product of three separate draft- Some in the Intelligence Commu- tion would have changed judg-
ers, each responsible for indepen- nity and elsewhere hold the view ments that were longstanding
dent sections, drawing from a that intense policymaker demands and firmly held.
US intelligence must
reveal itself as
sufficiently mature to
Final Thoughts vided. Decisions were made and
adapt . . . The their potential risks weighed, but
The intelligence world is one of alternative is the outcome on important issues
ambiguity, nuance, and complex- unthinkable. proved badly flawed. Recognition
ity. Dealing with these elements of these problems must bring a
is difficult in the world intelli-
gence serves, where success or
failure is the uncomplicated
measure by which the Intelli-
gence Community is judged. The
enormous efforts undertaken,
rapid response.
US intelligence is a robust,
highly capable, and thoroughly
motivated community that rep-
controversies over Iraq intelli- the long hours and the intense resents an invaluable asset to
gence can be expressed in the debate. On the other hand, it the nation and its citizens. It
contrast between these two describes failures and weak- must reveal itself as suffi-
worlds: carefully crafted nesses that cannot be ignored or ciently mature to both adapt to
national intelligence that ulti- mitigated. changing circumstances and
mately failed in its singular mis- counteract the evolutionary pro-
sion to accurately inform policy Failures of collection, uncritical cesses that have conspired to
deliberations. This report, the analytical assumptions, and threaten its reputation and its
result of over two years of inadequate management reviews ability to successfully perform
review and consideration, were the result of years of well- its assigned mission. The alter-
reflects the same contrast. On intentioned attempts to do the native is unacceptable and
the one hand, it recognizes the best job with the resources pro- unthinkable.
gence. The program is designed to security structurethe very cre-
tap into the wealth of talent and ator of online. Our search
ideas that reside at all levels of engines return results reminis-
I had thought the IC seniority and responsibility in the cent of the pre-Google Web. Our
would be an IT Intelligence Community. online personnel directories are
wonderland . . . The useless. Agencies and combatant
reality was a colossal Two articles from among the top commands use a hodgepodge of
letdown. entries in last years inaugural incompatible discussion and chat
running of the program modi- tools, furthering our tendency to
fied slightly and updatedare speak only with those in our own
included in this issue of Studies, buildings.
beginning here.
Why is the Web so much more
***
user-friendly than Intelink? Did
the late-1990s Silicon Valley boom
When I joined the Defense Intel-
propel private industry ahead of
ligence Agency as an analyst in
the government? Do our unique
January 2003, what excited me
security requirements make great
most was the opportunity to use
tools inaccessible to us?
the Intelligence Community's
proprietary technology tools. If
the public has access to the The answer is much simpler. The
amazing capabilities of the World Web is user-friendly because its
Wide Web, I thought, the Intelli- users control its content.
gence Community (IC) must be a Intelink's pages are published by
wonderland: search engines that technicians who neither use the
could read my mind, desktop system for research nor under-
video conferencing with team- stand its content. The Webs 900
mates around the world . . . . million users can instantly say
whatever they like in their own
The reality was a colossal let- personal publishing space; on
down. Intelinkthe network that Intelink, content is restricted to
was designed to negate the physi- what our agencies call official
A former Defense Intelligence cal distance that separates intel- products, and several layers of
Agency analyst, Matthew S. ligence agencies and their supervisors, systems administra-
Burton is currently pursuing a
customersseems anachronistic tors, and Web programmers
graduate degree.
The Web makes
geography
meaningless . . . But
stand between intelligence offic- write to Jim or Pattyeven if
ers and their online world. geography is those arent their real names
everything on Intelink. than to an indecipherable office
We should not replace the exist- acronym or a generic e-mail
ing method of online publication,
but rather supplement it with a
community of users. Giving
Intelink users the push-button
publishing technology they have
agencies and offices, not of the
people who wrote them. Corpo-
address? I know I would. But, if
given more choices, I would
largely avoid e-mail, which is fast
becoming as pass as a dial-up
modem.
at home would bring them
rate logos and office symbols are
together and also organize the
much more common than authors E-mail is Dead
systems information more neatly.
phone numbers and e-mail
There is no reason why our at-
addresses. Our electronic person- While the IC has slowly incorpo-
home information services should
nel directories are so cumber- rated e-mail over the past
surpass those in our offices. We
some and outdated that it decade, it is approaching obsoles-
can make Intelink just like the
sometimes seems as if their keep- cence in the outside world. Ever
Web. All we need is permission.
ers dont want us to speak to one since the Defense Department
another. Is the goal of our intra- gave the Internet to the public,
net to keep intelligence officers as its outside-world users have run
Intelinks Impersonal Touch
anonymous as possible? circles around us, creating count-
Interagency cooperation is proba- less new tools while we slowly
bly the ICs most talked-about It is true that in our work, ano- lurch forward. It is a shame that
deficiency. I believe that most of nymity can be imperative. But it US security structureswhich
us want to work with one another. is possible to preserve our ano- used to be the gold standard of
Intelligence analysts, while intro- nymity while maintaining a per- electronic communication with
verted, arent incapable of build- sonal online presence. Anonymity inventions like e-mail (in 1971)
ing trusting relationships with has not kept the Web from estab- are now lagging behind the lat-
coworkers. Those relationships, lishing incredibly close-knit com- est innovations.
however, are predominantly with munities, where many members
people down the hall, while the never show their faces or use Aside from spama crippling
people we should be talking to their real names. Some of these problem that does not threaten
most are either across the Belt- communities are more congenial Intelinke-mail has several defi-
way or on the other side of the and cooperative than are the ciencies that restrict communica-
world. The physical distance neighborhoods we live in. Why? tion:
between us makes cross-Commu- Because people behave on the
nity communication too difficult. Web as peoplethe electronic It is clumsily organized and dif-
buffer zone allows for an honesty ficult to search.
The Web makes geography mean- that is hard to find in the physi-
cal world. With fewer inhibi- It makes group discussions
inglessusers can quickly find
cumbersome.
and meet new people who share tions, people write in their own
their interests, regardless of their voice about their own ideas. Com-
It comes across too much like
location. But geography is every- munication on the Web has a per- official communication and too
thing on Intelink. Intelink is more sonal touch. Instead of formal little like personal dialogue.
like an oligarchy of agencies than documents with generic e-mail
a community of individuals with addresses, readers get unfiltered It restrains the raw thoughts
shared interests. Our documents words written in natural lan- of corporate users. Since e-mail
are presented as the products of guage. Wouldnt we all rather is a written, recorded, and
Broadcasting a blog
has a big advantage
over point-to-point
traceable medium, users too The IC desperately needs this
often treat messages as official e-mail. kind of attitude. There are multi-
communication instead of ple cases in which it would have
personal dialogue, for fear of
retribution.
Google judges a page
by the company it
keeps.
And when the time came for such Google changed all that in 1998.
meetings, those present would Instead of looking only at a page's
already have a solid foundation
for discussion instead of having
to spend time learning the
names, roles, and interests of
those involved. Intelink has the
became impossible to find a cate-
gory for every single page and to
content, Google judges a page by
the company it keeps, so to speak.
It does this through link analysis.
When Site A links to Site B, Site
A is essentially vouching for the
potential to be a place where fit each page into a single cate- quality of Site B. As more pages
groups of intelligence officers gory. Instead of making Web link to Site B, its reputation is
from around the world can speak users wander through a maze of improved in the eyes of Google.
freely and substantively on a The content on the linking pages
categories, it started to make
daily basis. Such continuous, can- also matters. If NBA.com links to
did dialogue is the only way to more sense to let them search for your site with the word basket-
forge relationships of trust in an an item directly. ball, Google will forever associ-
industry where people are ate your site with basketball
trained to be distrustful. Unfortunately, search engines and because NBA.com is consid-
were not very good, because a ered authoritative, its link to your
user's search terms were the only site will do wonders for your Pag-
The Google World eRank, Googles value-rating of
factor that determined search
your page.
The reason the Web feels com- results. Engines could not tell
fortable to its users is the same whether a page was reputable or
The Web is so named because the
reason that its search engines even coherent. For example, a 8 billion pages that link to one
are so efficient. Back in the mid- page with nothing but a user's another form a massive web of
1990s, Yahoo! was the place to search term repeated over and connected dots. But what looks
find Web pages. Yahoo! sorted the over was considered a perfect like a mess has logic to it: Pages
Web into categories. The Web had match. with similar content link to one
about 100-million pages then,
and most of them were on mas-
sive sites like those of media
organizations and corporations.
Over half of all Web traffic went
to the top 1,000 sites. 1 Any site
that mattered fit neatly into a
Yahoo! category.
another. Google has faith that sources that it is based upon. We those documents. But we have
when Web-page authors make are forced to take the authors very few of these links. Instead,
links, theyre connecting them to word for it. If there is any indus- Intelink is more of a tree than a
sites similar to their own. And, in try that should make its sources web: Similar pages lie at opposite
general, they do. Google can readily available to readers, it is edges of the tree, separated by a
therefore make extremely accu- ours. Instances where such infor- thicket of trunk and limbs. Search
rate estimates of which sites are mation would have averted disas- engines read this as a lack of simi-
related to one another and which ter are numerousthe most recent larity between the pages. Without
sites provide reliable information. and embarrassing case coming two more direct links between similar
years ago, when the claims of mul- pages, Intelinks search engines
tiple sources regarding Iraqs will continue to deliver poor
Intelink is No Google weapons programs turned out to results.
be those of a single person.
Intelink is different. As I men- Blogs Can Change Things
tioned earlier, intelligence prod- But while poor linking practices
ucts are presented for customers make Web browsing hard for How will giving individual users
rather than for analysts conduct- humans, they pose an even big- their own posting space change
ing research. While pages on the ger problem for search engines. the linkage problem? First,
public Web lead you from one Remember how Google associated giving us free rein over content
resource to the next via links to an aforementioned page with bas- would rid Intelink of its
related content, Intelink products ketball simply based on links from hierarchical structure. The mess
do not. You will not find a CIA other pages? Cross-Community you see in Figure 1 is a good
assessment that links to source links would allow our search thing. Second, because users are
documents from NSA, even though engines to find relationships the same people who write the
the assessment makes multiple between documents and to under- content, they are in a unique
references, implicit or explicit, to stand the content and quality of position to give it a good online
those sources. Instead, most links
simply move up or down within a
hierarchy. For example, a product
links to the page of the office that
produced it, which in turn links to
the directorate it lies under, which
links to other directorate offices
and the parent agency. The lack of
cross-Community links makes
Intelink look much like our indi-
vidual agencies organizational
charts. There is nothing inherent
in Intelink that makes it this way.
The Intelink Management Office
(IMO) does not dictate content.
This is just the way things are
done.
Logical dots are easier
to connect if the virtual
ones are already
home. Analysts and collectors gathering information on their
understand their information connected. users interests. This is hard to
better than Web programmers do in the public world.
and technical editors, so we know
what links to place where. And
because the quality of a personal
home page would reflect upon its
owner, we would have motivation
others know, making the puzzle
much easier to solve. The moral
Corporate intranets like Intelink,
however, have an advantage. All
IC employees consent to having
their computer actions moni-
to see that our pages provide is that logical dots are easier to tored. This means that every Web
good information for readers. connect if the virtual ones are page we read and every e-mail
already connected. we write could be used to create a
A web-like structure would take profile of our interests. Intelink
some time to realize, but the ben- In the opening paragraph of this search engines would then be
efits would be enormous. Imag- article, I mentioned that I had able to automatically weed out
ine having tools that could spot expected search engines that reams of information they knew
emerging patterns for you and could read my mind. This proba- we didnt want, helping to ease
guide you to documents that bly elicited some laughs. But it is the information overload that has
might be the missing pieces of not far-fetched. Many e-com- burdened the IC in recent years.
evidence youre looking for. Ana- merce sites do this already. Ama-
lytical puzzles, such as terror zon.com, for example, customizes
plots, are often too piecemeal for its home page for each person Conclusion
individual brains to put together. depending on his or her past pur-
Having our documents aware of chases. One of Google's stated Stronger professional relation-
each other would be like hooking goals is to know what users are ships and better search capabili-
several brains up in a line, so looking for before they start typ- ties would be the two greatest
that each one knows what the ing. How can they do this? By rewards of personal home pages,
del.icio.us (pronounced "delicious"): Among the WMD Commission's recommendations was an IC-wide
directory of personnel and their skills and clearances. But the details of an intelligence officer's
responsibilities are much too granular to be confined to a phone book entry. A better way to learn about a
person's job is to look at what he's been reading and writing. del.icio.us lets you maintain a public list of
bookmarks so that others can see what your interests are. Similarly, you can discover who has bookmarked
a given page, making it easy to find people who share your interests. The site is maintained by a single
person and has about 30,000 users. See: http://del.icio.us.
RSS: RSS is a public standard for tracking your favorite blogs. Because entries are published on the Web
instead of delivered like e-mails, you have to periodically check those blogs for new entries. This is very
time-consuming. RSS "readers" track your favorite blogs and automatically retrieve new messages for
display in an Outlook-like interface. The Intelink Management Office has deployed a Web-based RSS
reader, but it is relatively unknown, and its existence as Web-based software makes it difficult for some
agencies' systems to run properly.
Technorati: With 9 million blogs on the Web, the "blogosphere" is messy. Technorati sorts out the good
from the bad for you. Because blogs have a built-in referral system, Technorati can instantly show you the
most authoritative bloggers on a given subject. During the next crisis in a lesser-known country, search for
the country name at technorati.com and you'll be shown the blogs of expatriots giving up-to-the-minute,
on-the-ground updates. Technorati also points you to the day's most blogged-about topics.
Managers should not
see blogging as
haphazard
both of which would take time to Community communication have
realize. But there would be intelligence or dilly- failed due to competing stan-
smaller, more immediate bene- dallying. dards and incompatibility with
fits as well. Analysts would be agency-level network configura-
able to provide supporting docu-
mentation for their products
something that is usually lost in
the editing processgiving coun-
terparts and customers as much
given soapboxes. This article is
drawn from a paper submitted to
tions.
Emergence: The Connected Lives of Ants, Brains, Cities, and Software, Over the past four years, policy-
by Steven Johnson, especially Chapter 3, The Pattern Match. makers and the press have end-
lessly underscored the need for
Smart Mobs: The Next Social Revolution, by Howard Rheingold. Intelligence Community agen-
cies to work more closely
News Turns from a Lecture to a Conversation, by Jay Rosen, at
together. Few of us in the IC can
http://journalism.nyu.edu/pubzone/weblogs/pressthink/2004/12/29/
tp04_lctr.html. say they are wrong. But even
fewer of us can say we have the
If these tools are good
enough to help a whole
world communicate,
necessary tools for doing so. The people communicateeveryone
Commission on the Intelligence
we should see what from hermitic techies to senior
Capabilities of the United States everyone is raving citizensthen they are good
Regarding Weapons of Mass about. enough for us. We should see
Destruction understood this what everyone is raving about. 2
problem and recommended the
creation of new technologies to
aid IC communication. What it
did not understand is that such
computers. If these tools are good 2 The author can be reached at:
tools already exist on our home enough to help a whole world of matt@alumni.duke.edu.
minutes. Decisions about a cumstances to which we
response are made in Washing- respondin and of themselves
ton within minutes. These deci- develop more quickly. These rap-
We must transform the sions are implemented in idly changing circumstances take
IC into a community Baghdad within minutes. The on lives of their own, which are
that dynamically total intelligence-decision-imple- difficult or impossible to antici-
reinvents itself . . . as mentation cycle time can be as pate or predict. The US national
the national security short as 15 minutes. While this is security communityand the
an extreme example, it high- Intelligence Community (IC)
environment changes. within itis faced with the ques-
lights the tremendous compres-
tion of how to operate in a secu-
sion of the response time
required by all involved com- rity environment that, by its
pared to previous generations. nature, is changing rapidly in
This severe compression not only ways we cannot predict. A sim-
affects the highest priority ple answer is that the Intelli-
gence Community, by its nature,
issues, but also ripples back into
must change rapidly in ways we
the most routine intelligence,
cannot predict.
decision, and implementation
processes.
Wrong Way, Right Way
It does so for good reason. The
compressed response cycle gives What was that? How can we
the United States significant change ourselves in ways we can-
strategic and tactical superiority not predict? More directly, how do
over our adversaries. Our we modify our nature to enable
national security is best pro- such unpredictable changes?
tected when we operate more Before giving the right answer,
quickly than those who would do there is a wrong answer that can
harm to our people and our free- be dismissed up frontreorgani-
dom. This compressed response zation. Any reorganization by its
time allows us to disrupt, inter- nature is both predictable and
dict, preempt, and respond to slow. By the time any particular
injurious efforts before our adver- reorganization has taken effect,
Dr. D. Calvin Andrus serves in the saries can achieve their goals the causes that spawned it will
CIAs Directorate of Support. against us. have been replaced by new and
Intelligence officers
must be enabled
to act more on their
behavior of the originator either empowered to make their own
as a positive (amplified) or nega- own. purchases, individual ants in a
tive (dampened) influence. For colony can decide which task to
example, an ant crosses a phero-
mone trail it previously laid
down. The ant says to itself, Ive
already been here, so Id better
wander somewhere else. It is
kids adapt by fighting over who
perform, and military units are
able to choose battlefield tactics
in real-time, so, too, intelligence
officers must be allowed to
reactin independent, self-orga-
also important that the histori- made which mess. In the ruckus, nized waysto developments in
cal memory of the system be part they knock over a shelf that the national security environ-
of the feedback (amplifying or breaks one childs arm. The dad ment.
dampening) loop. did not predict that he would be
going to the emergency room by Intelligence officers must be more
Adaptability. The system is open offering ice cream to the children. expert in tradecraft. It is this
so that information (and/or expertise that engenders the trust
energy) flows in and out. New required for independent action.
information enters into the feed- Application to Intelligence Military units know the rules of
back loops and influences the engagement and are thus
behavior of the individuals, and The objective that was identi- entrusted to engage in battle. Ants
thus the overall behavior of the fied at the outset of this article have a hardwired rule set, which
system adapts to the external was that the Intelligence Com- enables the colony. Cities are built
environment. For example, think munity must be able to dynami- on the rules that govern property
of a group of kids engaged in cally reinvent itself by deeds, titles, and liens. Expertise
unsupervised play in the base- continuously learning and in tradecraft for each intelligence
ment as a self-organized system. adapting as the national secu- discipline must become a constant
When the dad opens the base- rity environment changes. Com- quest for each officer.
ment door and yells everyone plexity Theory tells us that we
gets an ice cream cone when the can only achieve this objective if Intelligence officers must share
toys are picked up and closes the several conditions exist. much more information. Just as
door, he adds new external infor- Enabling these conditions will military units in the field must
mation into the system. The kids be a big change for the IC, but if know where other units are
adapt to the external influence we are serious about succeeding located in geographic space,
by stopping play and putting the in improving ourselves, it is intelligence analysts must know
toys away. Systems that are con- imperative that these changes where their colleagues across
tinuously open to new informa- be made. the Community are located in
tion from the environment and intellectual space. This knowl-
circulate the information within edge results from sharing infor-
Intelligence officers must be
the system will continuously mation. Information-sharing
enabled to act more on their own.
change in response. among individuals allows mar-
Just as people in a market are
ket niches to be filled, ants to
Non-Linearity. Small changes in fend off predator attacks, and
the initial conditions or external 2 Edward N. Lorenz, Predictability: Does plants to distribute themselves
environment have large (unpre- the Flap of a Butterflys Wings in Brazil in the ecosystem. Increased
dictable) consequences in the out- Set off a Tornado in Texas? A talk given information-sharing among
in 1972 to the 139th meeting of the Amer-
comes of the systemalso known ican Association for the Advancement of
intelligence officers will allow
as the butterfly effect. 2 For Science, as found in Lorenz, The Essence these officers to self-organize to
example, when the dad yells of Chaos (Seattle: The University of Wash- respond in near-real-time to
down the stairs for ice cream, the ington Press, 1993), 18184. national security concerns.
A new generation of
Internet tools allows
people to self-organize
Intelligence officers must receive 2004 edition of the 32-volume
more feedback from the national around shared Encyclopedia Britannica contains
security environment. The only knowledge. just over 65,000 entries (store.bri-
way to learn from and adapt to tannica.com). Other wikis include
the changing national security
environment is to be in constant
receipt of feedback from that
environment. Just as zoo-raised
animals cannot compete in the
Self-organizing Tools: The
Wiki
dictionaries (en.wiktionary.org),
books (en.wikibooks.org), quota-
tions (en.wikiquotes.org), and doc-
ument collections (wikisource.org).
In the blogosphere,
the IC will ride
along the edge of
In sum, from the little bits of to the changing national security
work by many, many people fol- chaos. environment. The few brilliant
lowing simple rules of content ideas will survive in the market-
contribution and editing, the
most comprehensive, authorita-
tive, and bias-free encyclopedia
in the world has been produced
in four years. This is an encyclo-
in the last few years. It is called
place of ideas. As individual blogs
comment on each others ideas,
the brilliant ideas will spread as
feedback throughout the Commu-
nity. Individuals, recognizing the
pedia that is dynamically and blogging. The term comes from
brilliance, will respond. From
constantly changing in response Web log, shortened to blog. A
this self-organized response will
to the world as the world itself is blog is a journal or diary that is
kept in the public space of the emerge the adaptive behavior
changing. The lists of medals required of the Intelligence Com-
received in the 2004 Athens Internet. Individuals maintain
personal blogs on an hourly, munity.
Olympics were updated as the
events concluded. No manager daily, weekly, or some other peri-
made the assignment. No editor- odic basis. They are their own
in-chief reviewed the accuracy. It editors. Current technology A Sharing-Space
happened, as if by magic. A per- makes it easy to manage ones
son took the initiative to update blogsee www.blogger.com, for We need a space for change that
the entries and hundreds (or pos- example. Most blogs take the is not organization dependent
sibly thousands) of others form of citing a current event and
(remember, reorganizations are
reviewed the content for quality. offering a point of view about it.
not part of the solution set). We
Often one blog will cite a com-
need an independent space to
One of the Wikipedias strengths ment in another blog and com-
begin implementing the five mis-
is also a weaknessno points of ment on it. The blogosphere is
truly a marketplace of ideas. sion changes. To allow sharing
view. Much of the self-corrective and feedback, we need a space
knowledge in the Intelligence that is open not just to the Intel-
Community resides in personal Enabling intelligence officers ligence Community but also to
points of view. Currently, almost across the Community to express non-intelligence national secu-
no official outlet exists for points and share opinions may be one of rity elements. We need a space
of view in the IC. A healthy mar- the largest paradigm shifts ever with a large critical mass of intel-
ket of debatable ideas emerges for the IC. It will be uncomfort-
ligence officers. We need a space
from the sharing of points of able for some because it will be in
that is neither organizationally
view. From the ideas that pros- the blogosphere where the Com-
nor geographically nor tempo-
per in a market will arise the munity will ride along the edge of
adaptive behaviors the Intelli- rally bound. We need a secure
chaos. The blogosphere probably
gence Community must adopt in will obey the 99-to-1 Edison rule: space that can host a corporate
order to respond to the changing Genius is one percent inspira- knowledge repository. We need a
national security environment. tion and ninety-nine percent per- flexible space that supports tools
Not all good ideas originate at spirationfrom wikiquotes.com. for self-organizing (wiki), infor-
the top. For every 99 mediocre ideas, mation sharing (blog), searching,
there will likely only be one bril- and feedback. We need a place in
liant idea. A few brilliant ideas, which tradecraft procedures can
Self-organizing Tools: The however, are worth the invest- be implemented. In short, we
Blog ment of many mediocre (and cha- need a space that is always on,
otic) ones. It is these few brilliant ubiquitously distributed, and
A second self-organizing, infor- ideas that will provide the direc- secure. We need an electronic
mation-sharing tool has matured tion for the Community to adapt network. We need SIPRNet.
With a robust wiki and
blog Web space, the
nature of intelligence
SIPRNet (Secret Internet Proto- I suggest a corollary to Met-
col Router Network) is managed will change forever. calfes Law. The value of a knowl-
by the Defense Information Sys- edge-sharing Web space (wiki
tems Agency (www.disa.mil). It is
widely accessible by intelligence
officers and other national secu-
rity officers alike. It has been
deployed to every embassy and
Effecting the Transformation
and blog) grows as the square of
the number of links created in
the Web space. There is knowl-
edge not just in content items (an
intelligence cable, for example),
every military command. It is a Robert Metcalfe, inventor of the but also in the link between one
more attractive experimental Ethernet protocol and founder of content item and anothera
sharing-space than the Top 3Com, asserted that the value of link, for example, from a com-
Secret Community Network a communication system grows ment in a blog to an intelligence
(JWICS), because more intelli- as approximately the square of cable. Think of the value of a blog
gence officers access it, policy the number of nodes of the sys- that links a human source cable
community officials access it, the tem. This assertion has become to an intercept cable to an image
tradecraft (security) rules are known as Metcalfes Law. A sin- cable to an open source docu-
simpler, and it reaches more ment to an analytic comment
gle telephone or a single fax
organizations and geographic within the context of a national
machine has no communication
locations. Moreover, SIPRNet is security issue. When such links
value. Two phones have a little
designed to host the Internet- are preserved for subsequent
value. Two thousand phones have
based tools outlined above. Once officers to consider, the value of
some value. Two hundred mil-
the wiki and blog processes and the knowledge-sharing Web
lion interconnected phones are a
content mature on SIPRNet space increases dramatically.
system that has incredible com-
that is, once the IC embraces the When 10,000 intelligence and
munication value. 4
mission changes and becomes national security officers are pre-
proficient in the use of the tech- serving such links on a daily
nologythe wiki and blog could 4 Bob Metcalfe, There Oughta Be a Law, basis, a wiki and blog system has
be replicated on the Top Secret New York Times, Section D:7, col.1, Late incredible intelligence value. 5
network. Edition, 15 July 1996.
We must overcome
inertia and act, or we
will continue to be
Larry Downes and Chunka mation-sharing tools from the
Mui call the Law of Disruption. 6 acted upon. Internet, the wiki and the blog, be
Once the Intelligence Commu- deployed on SIPRNet. As these
nity has a robust and mature
wiki and blog knowledge-shar-
ing Web space, the nature of
intelligence will change forever.
This is precisely the prescrip-
will emerge an IC that continu-
ously and dynamically reinvents
tools and processes become robust
and mature, a critical mass will
emerge that will change the ICs
nature so that it can adapt to the
rapidly changing national secu-
tion we are looking for as laid itself in response to the needs of rity environment.
out at the beginning of this arti- the national security environ-
cle. The Community will be able ment.
The Intelligence Community is
to adapt rapidly to the dynamic
Jessica Lipnack and Jeffrey under extreme political pressure
national security environment
by creating and sharing Web Stamps make a case that a suc- in the wake of the 9/11 Commis-
links and insights through wikis cessful virtual community is 90 sion Report, the Senates report
and blogs. percent culture and 10 percent on pre-war intelligence, and the
technology. 7 The most profound WMD Commissions report. 8 If
cultural change will be for IC ever there was a time for the
In Sum managers to let go of their offic- Community to reexamine its
ers. Managers must trust their modus operandi it is now. Our
This article identifies a pressing officers to share directly with political leaders are demanding
Intelligence Community issue each other and with the policy these changes from us. 9 The
namely, that the IC must trans- community. A managers role will changes in mindset suggested in
form itself into a community that become less command and con- this article are significant.
dynamically reinvents itself by trol and more teacher of trade- Enabling intelligence officers to
continuously learning and adapt- craft and communicator of express their points of view inde-
ing as the national security envi- purpose and objectives. The IC pendently in a Community-wide
ronment changes. It has will need to put into place power- setting is groundbreaking.
elucidated the principles from an ful incentives and rewards for
exceptionally rich and exceed- managers to change. Intelligence
8 National Commission on Terrorist
ingly deep theory (Complexity officers must feel encouraged by
Attacks Upon the United States, The 9/11
Theory) about how the world their managers to spend their Commission Report (Washington: Govern-
works and has shown how these workday engaged in sharing ment Printing Office, 2004)PDF ver-
principles apply to the Intelli- activities. These changes will sion available at: www.9-
gence Community. These princi- allow the dynamic learning com- 11commission.gov. US Senate, Report on
the US Intelligence Communitys Pre-war
ples include self-organization, munity to emerge.
Intelligence Assessments on Iraq (Wash-
information sharing, feedback, ington: Senate Select Committee on Intel-
tradecraft, and leadership. The Recognizing that these changes in ligence, 2004)PDF version available at:
article argues that from intelli- attitude and work processes will www.intelligence.senate.gov. Commission
gence officers who are allowed to be challenging to implement, I on the Intelligence Capabilities of the
have recommended some first United States Regarding Weapons of
share information and act upon it Mass Destruction, Report to the President
within a simple tradecraft regime steps. I have suggested that of the United States (Washington: The
recent self-organizing and infor- White House, 31 March 2005)PDF ver-
sion available at: www.wmd.gov.
6 Larry Downes and Chunka Mui, 9 George W. Bush, Executive Order
Unleashing the Killer App: Digital Strate- 7 Jessica Lipnack and Jeffrey Stamps, Vir- Strengthening the Sharing of Terrorism
gies for Market Dominance (Cambridge, tual Teams: Reaching Across Space, Time, Information to Protect Americans (Wash-
MA: Harvard Business School Press, and Organizations with Technology (New ington: The White House, 27 August
1998). York: John Wily and Sons, Inc., 1997). 2004).
Equally avant-garde is letting Homeland Security, the military compared to the changes
intelligence officers create a commands, and elsewhereto be required to bring the Commu-
body of intelligence knowledge full participants in these infor- nity into the 21st century. We
without an editor-in-chief. More- mation-sharing activities is must overcome our inertia and
over, inviting our policy commu- breathtaking. If anything, how- act, or we will certainly con-
nity counterpartsat State, ever, these changes are timid tinue to be acted upon.
Spy Handler
By Victor Cherkashin and Gregory Feifer. New York: Basic Books, 2005. 338 pages.
Cherkashin had a long career in the KGB. The son of an NKVD officer, Cherkashin
was born in 1932 and vividly recalls growing up amid the horrible conditions of
World War II. After graduating from a railway engineering school in 1952, he
accepted a job offer from the MGB, the NKVDs successor organization. After train-
ing, he was assigned to the Second Chief Directorate of what was by then the KGB,
and sent to work CI against the British in Moscow. In 1963, Cherkashin was
moved to the First Chief Directorate, the KGBs external intelligence organiza-
tion, and became a foreign CI officer. Postings to Australia, Lebanon, and India fol-
lowed, along with assignments in Moscow, before he was sent to Washington,
where he served from 1979 until 1986.
Other aspects of Cherkashins memoir are even more disturbing than his nostal-
gia for Soviet power. He says little about his fathers career in the NKVD, for
example, but what he mentionsjoining the Bolsheviks in 1917, overseeing collec-
tivization before his assignment to the Ukraine in the late 1930s, and having been
away fighting counterrevolutionaries in the days before Germany invaded the
Soviet Union in 1941strongly suggests that the elder Cherkashin had a great
deal of blood on his hands. Nor does Cherkashin seem bothered by the character of
the post-Stalin system he served or of the service in which he worked. He claims,
unconvincingly, to regret that spies he helped uncover, like Martynov, were exe-
cuted rather than given long prison terms, but he makes no comments about the
KGBs role in the Gulag or other Soviet crimes. Indeed, in the few spots where he
considers the morality of his profession and service, Cherkashin asserts a simplis-
tic argument of moral equivalence between the Soviet and Western services. Many
of the operational activities of intelligence services, he claims, are pointless
gamesthieves stealing from thieves, as he puts it (109).
For the reader who is willing to tolerate Cherkashins moral obtuseness, however,
Spy Handler has much to offer. The book is especially useful for its insights into
the inner world of the KGB. Cherkashin does not provide a single, discrete descrip-
tion of life in the KGB or its performance; instead, he scatters details throughout
the book that, taken together, portray a bureaucratic institution that was, in many
ways, unimpressive. For example, he describes his arrival in Beirut in 1965, where
he was assigned to carry out CI operations against the CIA. The Soviets had no
agents, operations, or contacts to go up against the Americans; the other opera-
tions officer in the anti-CIA group was inexperienced and too timid to do his job
properly; and the Beirut rezident was in his last posting before retirement and
showed little interest in aggressive CI operations (80). Similarly, when he arrived
in India in 1971, Cherkashin says he found CI operations directed at American
targets to be badly disorganizedofficers scattered all over the country ran a
myriad of badly connected sources and agents (103). In both cases, he describes
how he set about recruiting assets, organizing networks, and collecting informa-
tion that in some cases proved to be useful years later in other countries. The over-
all impression, however, is that the KGBs performance often was uneven, to say
the least.
writers, especially Christopher Andrew and Oleg Gordievsky, have touched on this
in passing, but Cherkashin provides useful details of how internal political maneu-
vering damaged the KGB. 1
The portrait of the KGB that emerges from Spy Handler is of an organization that
had little trust in its officers, an institutional trait that made fear of betrayal self-
fulfilling. An unusual event could end a career, and being pitched by an opposition
service was viewed as especially suspiciousfear of losing their jobs inevitably
led some to work for US intelligence, says Cherkashin as he relates the story of
Sergei Motorin, a KGB officer recruited by the FBI after he tried to trade vodka for
stereo equipment in a Washington store (13). Cherkashin believes that the perva-
sive suspicion and intrigue made the KGB blind to its counterintelligence vulnera-
bilities. While accepting defections and betrayals by lower-level officers as a fact of
life, he asserts that few in the leadership would consider the possibility that a hos-
tile service could run a long-term penetration of the KGB. Doing so, claims
Cherkashin, would have been an unacceptable admission of weakness (218).
Much of what Cherkashin has to say is not new but still is worth considering. That
the KGB, like many intelligence services, simultaneously was capable of brilliant
successes and colossal incompetence has long been understood. So, too, are the
facts that CI operations often take many years to pay dividends; service leaders
are loathe to face up to the possibility of treason in their ranks; and patronage and
bureaucratic politics probably play larger roles in the inner workings of intelli-
gence agencies than other bureaucracies, if only because they tend to be closed
societies. The KGB, however, seems to have suffered from exaggerated cases of
these problems, probably because they were compounded by the suspicious nature
of Soviet society and the importance of ideological correctness. The resulting
heightened vulnerabilities are not unique to the KGB; they can be found in the
intelligence services of similar social and political systems, such as those of China,
Cuba, and North Korea.
His discussions of Ames and Hanssen reflect this point of view. As much as he
appreciates their efforts, Cherkashin has no illusions about either man or case.
Ames, he admits, fell into his lapit was unimaginable, but true, that someone
came along who had valuable information and was willing and able to provide it
(30). The same was true with Hanssen. This acknowledgement leads Cherkashin
1 Christopher Andrew and Oleg Gordievsky, KGB (New York: HarperCollins, 1992).
to make some points well worth remembering. He cautions that the US desire to
view both Ames and Hanssen as losers who turned to treason to escape their fail-
ures obscures an important truth about their cases. Both men, he points out, per-
formed well as spies and Hanssenwho took control of his case and, Cherkashin
claims, successfully hid his identity from the Russianswas especially clever in
his tradecraft. Some of this may be chest-thumping, but Cherkashins basic point
is a good one: A reflexive dismissal of our traitors as contemptible quislings can
skew the analyses of their cases and obscure some of the lessons to be learned and
applied later.
A Yale-educated-lawyer, turned Army Air Forces (AAF) officer, Cutler found him-
self in OSS under rather unusual circumstances. While on leave from the army in
the summer of 1944 before deploying to the Pacific Theater, 2nd Lt. Cutler was in a
Pentagon hallway when a major whom he had met previously in connection with
an interview for OSS spied him. Cutler, in fact, had applied twice to join OSS, but
had heard nothing. This time, the major told him to report to a building in George-
town. Doing what he was told, Cutler proceeded to Georgetown but arrived after
the office had closed. Thinking that the majors information was outdated, he
departed for his parents house in Connecticut for the remainder of his leave.
While at home, Cutler received an urgent telegram to return to his unit in Kan-
sas, as the movement orders had been advanced. Upon his arrival, he dashed off to
his quarters to get his gear when he received a phone call. The adjutant thun-
dered that Cutler needed to report to the commanding officer immediately. As it
turned out, the War Department had just ordered 2nd Lt. Cutler to Washington.
His commanding officer in Kansas was furious, believing that Cutler had procured
a new job to avoid overseas deployment. Cutler pleaded that there must have been
a mistake in Washington.
Cutler soon learned that he owed his transfer to OSS to disagreements over intelli-
gence assessments in the Joint Chiefs of Staff. In the summer of 1944, Gen. Henry
Hap Arnold, AAF chief of staff, had complained that OSS had not yet discovered
the location of German factories producing jet fighters. Arnold wanted to destroy
these factories before German jets could wreak havoc among propeller-driven
American and British aircraft, which were bombing Germany around the clock in
the summer of 1944. Brig. Gen. William Donovan, the Director of Strategic Ser-
vices, protested that OSS was hindered in its ability to perform its intelligence
missions in Europe because the military would not provide him with trained man-
power. Supporting his case, Donovan noted that the AAF was sending 11 lieuten-
ants versed in European languages to the Pacific Theater where their language
skills would go to waste. Thus, 2nd Lt. Cutler, one of the 11 officers, found himself
transferred to OSS at the eleventh hour.
After initial OSS training in Virginia, Cutler enjoyed the remainder of the sum-
mer of 1944 in Washington. Expecting to deploy as a member of a three-man team
to be dropped behind enemy lines to link up with the underground, he brushed up
on his French. The rapid advancement of Allied forces in France that summer can-
celled the need for this battlefield assignment.
Instead, Cutler arrived in London in the fall of 1944 to join X-2s secret efforts with
Britains MI6 to construct an order-of-battle for German forces, using a wide vari-
ety of sources, but most importantly the ULTRA intercepts. In addition, MI6 and
X-2 concentrated on identifying German intelligence officers, agents, and opera-
tions. Cutler set to work tracing German stay-behind agents in France, utilizing
information from signals intelligence. He and his team assisted Special Counter
Intelligence (SCI) teams in France to track down an estimated 3,500 German
agents, destroying the enemy spy networks and turning some members into dou-
ble agents.
By early 1945, Cutler had become an expert in the arcane art of vettingthat is,
checking the bona fides of purportedly friendly agents. This task was time consum-
ing and difficult in the age before computers. And it was complicated by internal
rivalryOSSs Secret Intelligence (SI) group resisted X-2s efforts to oversee its
agent recruitment operations. These turf battles had an impact on work with the
British because MI6 distrusted the ability of the Americans to ensure operational
security.
Norman Holmes Pearson, a Yale University professor and the head of X-2 in Lon-
don, directed Cutler to build up X-2s vetting section. Soon he was working 100
hours a week vetting OSSs growing roster of agents. Drawing from the British
system, Cutler developed the procedures in Europe that were later used by OSS
worldwide for testing its agents. Cutlers work was an early step in the profession-
alization of American intelligence, forming the basis of the modern asset valida-
tion system.
Lack of resources and the relentless pressure not to delay operations took a toll on
Cutlers health. In March 1945, he collapsed and was taken to the hospital, where
he was diagnosed with exhaustion. The doctors prescribed immediate leave, which
he spent in Cornwall as the war drew to a close. He recalls with considerable pride
the role that he played in the wars successful conclusion in Europe.
Cutler did not rest on his laurels for long. With the occupation of Germany, the
need for intelligence grew as Allied forces rooted out Nazis. In the summer of 1945,
OSS consolidated many of its elements at its new headquarters in the confiscated
Henkel champagne factory in Biebrich, a small town near Wiesbaden. The new
German mission, under the former SI chief in Switzerland, Allen Dulles, brought
together a wide array of new agents, including many of Dulless special sources
his so-called Crown Jewels.
The situation, however, was chaotic. X-2 in Germany was responsible not only for
vetting the prospective agents for all OSS branches, but also for sorting out the
identifications of those who claimed to have worked for American intelligence dur-
ing the war. X-2 performed security background checks on new staff members as
well as on all foreign nationals hired by OSS. With the US Armys rapid demobili-
zation in Germany, and the disbandment of OSS and formation of its successor, the
Strategic Services Unit, the job of the vetting section only increased.
As an X-2 officer in the small SSU outpost, Cutler handled a mixed bag of agents,
most of whom had once worked for the Nazis but now earned their keep from a
new master. Initially, these assets were used to spot signs of an underground Nazi
resistance movement and to ferret out war criminals in hiding. Slowly but surely,
these same agents became useful to the Americans for their knowledge of the
Soviet Union. As tensions mounted between East and West, these former enemies
became partners in a new and different struggle for the future of Europe.
Between 1945 and 1947, OSS and SSU laid the foundation for the CIAs later
recruitments during the first half of the Cold War. American intelligence regarded
Germans (including former army intelligence and internal security officers and
their wartime collaborators) as natural resources. Cutlers agent pool in Berlin
clearly reflected this selection. Six decades later, we are left with the uncomfort-
able question: Was the gain worth the price? For over 30 years, the CIA has been
haunted by the ghosts of its past. Recruitments of agents with unsavory back-
grounds in the dark days of 1946 or 1947 appear less valid in light of the countless
US government investigations that have uncovered ignorance of, and in some cases
complicity in, the recruitment of Nazi war criminals by American intelligence.
Under public pressure and congressional scrutiny, the CIA is slowly releasing its
long-secret files on many of its sources, including some of those with whom Cutler
worked in Berlin.
Cutlers descriptions of these agents, both male and female, are especially illumi-
nating because they offer personal insights that are not necessarily found in the
sanitized declassified material. In several cases, he established a real personal
rapport with his sources, in part because they worked so closely together in Ber-
lin. He even lived in the same house as some of his agents.
Cutler remains uncharacteristically vague about the identity of one of his assets,
Gabriel, who was one of his most important sources as the focus shifted to collect-
ing information on the Soviets. He notes that she had amazing powers over oth-
ers, especially men. A resourceful linguist who had worked for German intelligence
during the war, she was also well read in history, philosophy, theater, and politics
and, unlike many intellectuals, she was street smart. As Cutler observes, Gab-
riel was perfectly suited for counterespionage, and she played a key role in one of
the most intriguing German-Italian and later American intelligence plots of World
War II. Although Cutler talks about her in some detail, and although her name is
available in declassified records and other sources, 1 she is not identified in the
book, perhaps out of sensitivity to her prominence in Germany in later years.
Cutler clearly regards his wartime and immediate postwar intelligence work as a
defining period in his life. Drawn to intelligence but suffering health problems as a
result, he debated long and hard about making it a career. In the end, he left the
military as a captain, resumed his law practice, married, and moved to Milwau-
kee. But his final comments on the problems that the CIA faces today show that
Richard Cutler is still hooked on intelligence.
1 See Howard McGaw Smyth, Secrets of the Fascist Era: How Uncle Sam Obtained Some of the Top-Level Documents
of Mussolinis Period (Carbondale: Southern Illinois Press, 1975) and Ray Mosely, Mussolinis Shadow: The Double Life
of Count Galeazzo Ciano (New Haven, CT: Yale University Press, 1999).
2 David E. Murphy, Sergei A. Kondrashev , and George Bailey, Battleground Berlin: CIA vs. KGB in the Cold War (New
As New York Times reporter Tim Weiner said in a review appearing in his paper,
only in America could the intelligence memoir become a literary genre. 1 Well,
make room on your bookshelf, because the genre is growing before our very eyes.
Three recent additions have benefited remarkably from media attention, good
reviews, and enviable sales. Together they are illustrative of what we will see more
of, unless and until the novelty wears off and the news media are less captivated
with the subject of what in the world is wrong with intelligence. Inquiries, commis-
sion reports, reform legislation, hearings, and headlines have helped put a spot-
light on these publications and their authors that is not likely to continue
indefinitely.
John Hollister Hedley served more than three decades with the CIA.
What is annoying about the attention given these books is the suspicion that they
owe it to some degree to publishers persistence in pandering to (and therefore per-
petuating) stereotypes about the CIA. A pet peeve of this reviewer is the apparent
conviction on the part of the media, which of course include book publishers, that
the CIA must appear sinister, stupid, or scandalous for someone to read about it.
On occasion (the Rick Ames story comes notably to mind), the CIA serves up a tri-
fecta on its own. But it should not follow that a CIA memoir will sell only if it sug-
gests an inside revelation of something sinister, stupid, or scandalous.
Publishers cannot resist a titillating (never mind misleading) title, sometimes over
the authors objections. John Ranelagh claimed that calling his seminal history of
the Agencys first 40 years The Rise and Decline of the CIA was strictly the pub-
lishers idea, which he argued against in vain. 3 The catchy title of Fixing the Spy
Machine required its author, Arthur Hulnick, to devote the first part of his book to
explaining that intelligence really isnt a machine, really isnt broken, and really
doesnt need to be fixed. The title of the recent Why Secret Intelligence Fails obliged
author Michael Turner to explain that it really doesnt fail. 4
Moran may well have conceived or delighted in the catchy/sexy title Blowing My
Cover, but Mahle insists that her publisher pressed her for the title Denial and
Deception as well as for rewrites that would make the book less about intelligence
and more about her. 5 Even the New York Times Book Review could not resist
adorning a review of CIA memoirs with a curious illustration of a head that was
half face/half bomb with a fuse protruding from the back and a pistol tucked beside
the face and into a fedora from which a presumably poison pen stuck out. 6 Such
sales gimmicks, if all too predictable, are regrettable because they detract from
serious content. Together with a publishers pressure on an author, they may even
distort the content and thus lessen the value of writing that can in fact make a
meaningful contribution to intelligence literature and to public understanding of
intelligence.
Melissa Boyle Mahles Denial and Deception is the most substantive and useful
memoir of the three, being a balanced mix of personal story and thoughtful, well-
researched perspective on the Agency and its leadership. She, too, laments risk
aversion and draw-downs in the field, plus the lack of language competence and, at
least by implication, the Agencys xenophobia that results in failing to utilize the
linguistic skill and cultural understanding that hyphenated-Americans have to
offer. Mahle, herself a summa-cum-laude graduate of the University of California/
Berkeley in Near Eastern studieswith fluency in Arabic; knowledge of Middle
Eastern culture, traditions, and religions; and a fascination for archaeologywent
from an archaeological dig in Israel to being courted as a CIA intern after begin-
ning graduate work at Columbia.
Mahle spent fewer than 15 years at the CIAwell short of the normal career dura-
tion. Before her regrettable operational mistake brought separation from the
Agency, she served a stint as a recruiter of would-be operations officersan
assignment that featured encounters with bright university students interested in
possible careers in intelligence but understandably curious about what it is that
an operations officer actually does. She shares with Paseman a desire to help sat-
isfy this curiosity. Purely for insight into a career in operations, neither effort
equals Dick Holms The American Agent. 7 But Mahle does render an educational
service with a book that is at once autobiography, primer, and commentary on the
Agency and its tribulations, traced by the tenure of its recent directors.
7 Richard L. Holm, The American Agent: My Life in the CIA (London: St. Ermins, 2003). The book is
it would appear to be difficult for some former CIA authors to gauge how limited
their own knowledge of intelligence is. They may have seen the organization and
its work through a very narrow prism and have a very limited perspective.
The result can be somewhat like the fable of the blind men describing an ele-
phant. Where you touch itand where the Agency touches younot only forms
your perception of it, but also, perhaps less obviously, limits your ability to charac-
terize it. It is a generalization, but it seems a fair one, that the broader a CIA
officers career experience and the more perspectives gathered from inside and out-
side, the more balanced is the view that that author can provide. Having done only
one type of work in one directorate makes characterizing the entire Agency more
difficult and probably somewhat skewed by the particular prism through which
the author experienced it and recalls it.
All three of these books are by former operations officers. This does not say that
former operations officers are more inclined to go public with a grievance, or even
that they are more likely to have a grievance. What it may say is simply that an
operations career fits more readily with the public conception of the CIA as a place
of mystique, romance, danger, and excitement. The operations officer commands
an audience simply by having been an operations officer. Too bad there arent
books about what analysts do, but try interesting a publisher in the adrenalin rush
that comes with having too little solid information to work with but needing to
meet an impossible deadline anyway.
With respect to CIA memoirs generally, this reviewer has a biasbut a bias built
on an experiential base as one-time chairman of the CIAs Publications Review
Board, reading scores of autobiographical efforts and thousands of pages of manu-
script. The result is a conviction that we ought not bog down in finding flaws and
being dismissive of this genre. For one thing, this reviewer does not know of a sin-
gle recruitment pitch, operational plan, or liaison relationship that was ruined or
precluded by the publication of a book.
This is not the place to discuss declassification policy at length (a subject separate
from publication review), but it is worth noting that the CIA is hardly blameless
for the fact that perhaps the three best-known initials in the world are weighted
down by an aura of the sinister and suspicious. Would that CIA declassifiers could
see that there are good-news stories yet to be told that could be and should be told
without compromising sources or truly sensitive collection methodssomething
long since demonstrated by the landmark memoirs of Duane (Dewey) Clarridge
and Tony and Jonna Mendez. 8
8 Duane Clarridge, A Spy for All Seasons (New York: Scribner, 1997); Antonio J. Mendez, Master of Dis-
guise (New York: William Morrow, 1999); Antonio and Jonna Mendez, Spy Dust (New York: Atria Books,
2002).
air. They can illuminate and inform. They can correct misconceptions. They can
contribute expert opinions on current issues. They provide insight into what kind
of people work for the CIApeople with intellect and integrity. The authors of
most intelligence memoirs clearly are smart people who obviously have ethical
standards and who are concerned about how things are done and why they are
done, not merely because they want them done well but because they want them to
serve a high purpose.
So we members of the Agency club, past and present, ought not to be thin-skinned.
Maybe a Lindsay Moran has a point. Whether she does or not, it speaks well for
the Agency that she is allowed to express her view. The writing and publishing of
candid CIA memoirs speaks well for our democracy. And if we are going to plant it
around the globesomething this country has yearned to do since at least the days
of Woodrow Wilsonwe darn well better be willing to practice it. Secret organiza-
tion or no, the first amendment is the cost of doing business in a free society. Hon-
oring by exercising this freedom is why the writing of a CIA memoir is not a bad
thing.
This section contains brief reviews of recent books of interest to intelligence profes-
sionals and to students of intelligence.
In the area of security and personal freedoms, Gary Marx considers the
definition and dimensions of human surveillance, comparing what he calls
traditional with new surveillance practices. He develops some elaborate
theories and adds an ethical dimension. But in the end, common sense will lead
most thoughtful people to the same conclusions.
In the only article to focus on the specific features and functions of intelligence
in the 21st centuryHunters, Not Gatherersformer CIA officer Charles
Cogan, now senior research associate at the Kennedy School of Government at
Harvard, argues that the Intelligence Community in the United States is not
properly centralized to meet the intelligence needs of the post-9/11 world.
Furthermore, he suggests, existing internal security organizations are weak
and ineffective. With the changed world, what is needed is a return to a risk-
oriented culture usually associated with wartime, coupled with an offensive
hunt strategy (156) against terrorists, an aggressive approach that was not
policy in the pre-9/11 era.
The final two chapters evaluate the question of ethics in intelligence. In Ethics
and Intelligence after September 2001, Michael Herman begins by noting that
Perhaps there is no need to mix intelligence and ethics. But while his
admirable objectivity forces him to consider the idea in principle, he is not a
believer. After discussions of why ethics are essential to operations, he suggests
that perhaps what is needed is a new paradigm, although he acknowledges
that this issue is not societys greatest problem, A somewhat different view is
found in Toni Erskines As Rays of Light to the Human Soul? Moral Agents
and Intelligence Gathering. The title comes from comments on intelligence
made by Thomas Hobbes in 1647. Erskine reviews them in light of what she
terms the realist, consequentialist, and deontological approaches advocated by
1Richard Breitman, Official Secrets: What the Nazis Planned, What the British and Americans Knew
(New York: Hill & Wang, 1998).
Born in Louisiana during World War II and raised by his paternal grandparents,
I. C. grew up in an era when youngsters were respectful of authority and polite
to teachers, attributes that remained with him. Graduating from high school in
1960, he tried college briefly before joining the navy where he saw the world
while serving aboard the USS Razorback, a submarine that had once had
convicted spy John Walker among her crew. Four years later, I. C. returned to
Louisiana and college, joined the police force, married, and became a detective.
His police duties sometimes brought him into contact with FBI agents and they
encouraged him to apply to the Bureau when he graduated from college in 1971.
In May 1973, I. C. Smith began his own FBI career.
Inside is a roughly chronological summary of Smiths FBI career, which took him
from St. Louis to Washington via most major countries of the world. He worked
routine criminal cases, congressional corruption investigations, and, while in
charge in Little Rock, Arkansas, the controversial Whitewater case, involving real
estate irregularities. But intelligence professionals will be even more interested
in his insights into the familiar counterintelligence cases of the era. In this
category, he adds details about Larry Wu-tai Chin, the Chinese mole at the CIA;
recounts the FBI side of the Aldrich Ames spy case, including the Bureaus self-
serving cooperation with author Peter Maas; discusses the Parlor Maid, or
Katrina Leung case; and is harshly critical of the Bureaus handling of putative
Chinese agent Wen Ho Lee. Although the Robert Hanssen espionage case came to
a close after Smith retired, he knew Hanssen and is not reticent about
contradicting Director Louis Freehs assertion that the case was a
counterintelligence coup (303). He also takes issue with those who thought
Hanssen was anything but a mediocre special agent motivated by greed. Had the
Soviets not paid him, says Smith, he would not have continued to spy for them.
There are several themes running through the book that have added value
because they are discussed by one who has paid his dues. The first is Smiths
very candid comments about the directors under whom he served. He leaves no
doubt that many of the Bureaus problems follow from their excessive egotism
Professor Carlisles earlier book, The Complete Idiots Guide to Spies and
Espionage, was reviewed in Studies in Intelligence 47, no. 3 (2003). The current
work is a much improved, more scholarly effort, whose entries have greater scope
and depth, are more informative, and are still easy to read. Each of the 72 mostly
academic contributors has, for the most part, used multiple reliable sources that
are indicated at the end of the more than 400 entriessee, for example, those of
former DCIs Richard Helms, James Woolsey, and George Tenet, by State
Department officer Laurie West Van Hook. Equally well crafted is the Allen
Dulles entry by James J. F. Forest at West Point. While the principal focus is on
all aspectsoperational, technical, political, analyticalof American
intelligence, the encyclopedia covers other countries and their services as well.
For example, the entry for Canada, written by Michael Butt of Dalhousie
University, is a discussion of the history of Canadian intelligence. Entries under
other country names follow the same format. The appendix contains excerpts
from the 9/11 Commission Report, without analytical comment.
One might well ask how this encyclopedia compares with the revised edition of
Spy Book: The Encyclopedia of Espionage. 3 While the present work has fewer
entries than Spy Book, there is greater detail in many of them, and each entry
lists recommended sources (Spy Book does not cite sources for each article). The
topic coverage is close, but not a complete overlap. For example, Carlisle has
2 See for example: Peter Lance, 1000 Years For Revenge: International Terrorism and the FBIThe Untold
Story (New York: Regan Books, 2004) and Richard Gid Powers, Broken: Troubled Past and Uncertain Fu-
ture of the FBI (New York: Free Press, 2004).
3 Norman Polmar and Thomas B. Allen, Spy Book: The Encyclopedia of Espionage, 2nd ed. (New York:
entries for Italy and Ivan the Terrible, while Spy Book does not. The
Encyclopedia of Intelligence and Counterintelligence is hardbound and sells for
about $200 for both volumes; Spy Book costs about $22 (softcover).
When it comes to accuracy, the Encyclopedia has, with one exception, about the
same number and type of errors as Spy Book. The exception is the unrivaled
collection of misstatements in Carlisles entry for Cambridge spy Donald
Maclean. Maclean was not identified by the FBIthe Brits did thatand
Maclean learned of it not from Philby, but from Burgess. Furthermore, the clue
to Macleans guilt was not that he went to London to visit his pregnant wife,
but to New York where she was living with her mother. Maclean did not attend
Eton or Oxford, nor was he a classmate of CairncrossMaclean and Philby had
graduated by the time Cairncross entered Cambridge. And Maclean was not
recruited on a channel ferry or any other boatthat happened while he was
still in London before he went overseas. As for Krivitsky (mentioned in the
Maclean entry), he did not seek refuge with the Britishthey asked him to
come and be debriefed, and he did. Soviet agent Kitty Harris was, first,
Macleans handler-courier and, second, his lover. Maclean wed Melinda in
Paris, not London. And Philby did not join Maclean on his escape to Russia
Burgess did that. Finally, John Cairncross did not live out his life in England,
though he died there after a brief residency (406).
A few other relatively minor discrepancies were found, as, for example, the
assertion that the so-called Lucy Ring was a conduit for Bletchley Park (402).
This has been debunked by Hinsley, et al. 4 Similarly, Elizabeth Bentleys
testimony did not lead to the arrests and eventual convictions of noted atomic
spies Harry Gold, David Greenglass, and Julius and Ethel Rosenberg
VENONA deserves the credit for that. Lastly, the concept that the defector
remains the best source of invaluable information whether in place or a one-time
crossover is nonsense on its face. In the long run, a defector ranks second to an
agent-in-place or mole since by definition a defector cannot remain in place.
4 F. H. Hinsley, British Intelligence in the Second World War, Vol. 2 (London: HMSO, 1981), 60. The so-
called Lucy Ring is a journalistic fiction; the net that is meant was the Rote Drei.
Sally Bowen and Jane Holligan. The Imperfect Spy: The Many Lives of
Vladimiro Montesinos. Lima, Peru: Ediciones PEISA S.A.C., 2003. 493 pages,
photos, chronology, no index.
The Imperfect Spy tells the story of this ambitious, amoral man, whose rise to
great power was as unusual as his descent to prison, where he now resides. He
began his spying by informing on classmates and perfected his skills in a military
career, where he first came to the attention of the CIA in the 1970s. Between then
and 1990 when he gained real power with Fujimori, he spent a year in jail,
assisted Colombian drug dealers while banking a fortune, obtained a law degree,
built a personal security force, married, and acquired several mistresses. As head
of the National Intelligence Service, or SIN (Servicio de Inteligencia Nacional),
Montesinos also collected information, converted it to power and solved problems
for the powerful, often eliminating those unwise enough to oppose him.
Throughout his career, he had official contacts with the CIA and occasionally the
FBI. Both kept him at arms length.
British journalists Sally Bowen and Jane Holligan have lived and worked in
Peru for many years. They have done a splendid job telling the often gruesome,
but always interesting, story of Montesinos and the secret police he created, so
appropriately called SIN. The lack of source notes is largely compensated for by
the chronology and references to known people, dates, and events. The authors
have provided an important exemplar of how a corrupt security service can
influence an entire country.
Vin Arthey. Like Father Like Son: A Dynasty of Spies. London: St. Ermins
Press, 2004. 288 pages, endnotes, bibliography, photos, index.
In his book Strangers On A Bridge, James Donovan tells the story of KGB
illegal, Col. Rudolf Abel, who was betrayed by a KGB defector to the CIA.
Arrested by the FBI in 1957, Abel was sentenced to 30 years in prison. In
February 1962, he was exchanged for U-2 pilot Francis Gary Powers.
Several books were written about the case. One, by Abels friend Kyrill
Khenkin, published only in Russian, had a real surprise. Reviewed by scholar-
author Walter Laqueur in 1983, Khenkins book claimed that Rudolf Abel was
really Willi Fisher, born in Newcastle, England, in 1903. Years later while
The book has two parts. The first focuses on Willis growing up in England. His
German father and Russian mother were both active communist organizers
working clandestinely for the party. The Russian revolution was motivation to
return to Russia, where they were given quarters in the Kremlin. After
finishing his education and serving a tour in the Red Army, Willi married and
had his only child, a daughter, Evelyn. His knowledge of English got him a job
as a translator-interpreter, first with the KOMSOMOL (Young Communists)
and later with OGPU (a predecessor of the KGB).
Building on his language skills, Fisher was trained as an illegal; his first
assignment was to Scandinavia. In 1935, he was sent to London to work with
another illegal, Alexander Orlov, who, along with Arnold Deutsch, was busy
recruiting the Cambridge ring, a fact Fisher never revealed that is
acknowledged for the first time publicly in this book. After Orlovs defection in
late 1938, Fisher was sacked. Although he survived the purges, he was forced
to work in an aircraft factory until recalled by the NKVD (successor to the
OGPU) in September 1941 as a radio operator. He was assigned to train
illegalsfor example, Kitty Harris, who became Donald Macleans handler. At
some point, he went to work for Pavel Sudaplatov, who directed the NKVD
Special Tasks directorate, and ended the war a hero, having run successful
radio deception operations, Operation MONASTERY among them. 6
Nevertheless, he was then dismissed from the NKVD for a second time, before
being rehired again and sent to the United States in 1948 as Willie Martens
just one of his cover nameswhere his English could be put to use.
Arthey adds considerable detail to Fishers stay in the United States, where he
worked as an artist while supporting the Rosenberg network, atomic spy Ted
Hall, and Morris and Leona Cohen. (The latter escaped just before the
Rosenbergs were caught and eventually became KGB illegals in Britain.) When
arrested, Fisher adopted the name of another KGB colonel, then dead, so that his
masters in Lubyanka would not acknowledge him by any of his cover names.
Abel never revealed his true identity or the details of his work to the FBI.
After his return to the Soviet Union, despite his adherence to the KGB code of
silence during interrogationprotecting his knowledge of Philby and the
Cambridge agentsFisher was never again accepted as an active intelligence
officer. He was involved with training young officers but was never fully
5 Louise Bernikow, ABEL (New York: Trident, 1970); Kyrill Khenkin, Okhhoynik vverkh nogami [The
Hunter on His Head] (Paris: Posev, 1980); Walter Laqueur, From HUMINT to SIGINT, The Times Liter-
ary Supplement, 11 February 1983.
6 For more detail on Operation MONASTERY, see Robert Stephan, Stalins Secret War (Lawrence: Uni-
versity Press of Kansas, 2004), reviewed in Studies in Intelligence 48, no. 4 (2004).
trusted. When he was hospitalized in October 1971, the suspicious KGB had
his room bugged. He died a month later. His tombstone reads Willi Fisher and
Rudolph Abel.
During his research for this book, Arthey contacted Fishers daughter and from
her learned the details of his final years. His book adds much to the story of one
of the KGBs most famous illegals, who suffered the sad fate of official obscurity
in the final five years of his life.
Ljubica Erickson and Mark Erickson, eds. Russia: War Peace and Diplomacy:
Essays in Honour of John Erickson. London: Weidenfeld and Nicolson, 2004.
365 pages, endnotes, index.
The late professor John Erickson learned Russian in grammar school; served
in the British Army Intelligence Corps, where he studied Serbo-Croatian,
German, and other European languages; and was an interpreter for the Allied
War Crimes Commission. He then went to Cambridge before joining St.
Antonys College, Oxford, where he became the worlds leading military
historian specializing in the Soviet Union. In 1968, he accepted a post at the
University of Edinburgh, where he remained until his death in 2002. His
writings on the Red Army, especially The Soviet High Command (1962),
became standard works, and he was respected and trusted by the Soviet High
Command as no other Western historian. He is a figure familiar to any student
of Soviet military history.
John Erickson set the standard for history with work that was always
thoroughly researched, well argued, and well written. He would be proud of
this collection in his honor.
As part of the planning that led to NATO after World War II, the Western
European nations decided that they should prepare and equip stay-behind
networks for use in the event of a Soviet invasion. Agents would be trained to
operate much as their World War II resistance predecessors. Their mission
Swiss scholar Daniele Ganser has written the first book on this subject. In it,
he asserts that the CIA and MI6 were the prime movers behind the networks,
unknown to parliaments and populations (1). He goes on to charge that the
CIA in particular, with its covert action policies that are by definition terrorist
in nature, used the networks for political terrorism.
But proof is a problem for Ganser. He complains at the outset that he was unable
to find any official sources to support his charges of the CIAs or any Western
European governments involvement with Gladio. Nevertheless, his book devotes
14 chapters to the secret war in various Western nations on his list. Much of
the narrative is historical. The chapter on Portugal, for example, begins with
background in 1926; the chapter on Spain, with the Spanish Civil War. The
history of how relationships were established among Western nations after
World War II is interesting and valuable, as is the survey of pubic reaction to
Operation GLADIO. But Ganser fails to document his thesis that the CIA, MI6,
and NATO and its friends turned GLADIO into a terrorist organization.
7 Hugh OShaughency, Gladio: Europes Secret Networks, The Observer, 18 November 1990.
Lucas Delattre. A Spy at the Heart of the Third Reich: The Extraordinary
Story of Fritz Kolbe, Americas Most Important Spy in World War II. New
York: Atlantic Monthly Press, 2003. 308 pages, bibliography, photos, no index.
In The Craft of Intelligence (1963), Allen Dulles alludes to but does not name
the man whom he later called his most productive agent in Switzerland during
World War II. Three years later, in The Secret Surrender (1966), Dulles
identifies him by his codename, George Wood. In his 1968 anthology, Great
True Spy Stories, he gives even more details about his agents life, but not his
true name. Others did their best to learn Woods identity and, in 1971, author
Ladislas Farago came close when he identified a Fritz Kople in his book Game
of the Foxes. Official acknowledgement of Wood as Fritz Kolbe, the former Nazi
Foreign Office senior clerk, came when OSS files were declassified in June
2000. Then, in September 2001, the German magazine Der Spiegel published
an article on Kolbe describing him as an anonymous hero of the Second World
War. Until this article, Kolbe was largely unknown in Germanyhe had not
been mentioned in the official history of the Federal Republic of Germany,
which did credit others who had acted against Hitler and the Nazis. Lucas
Delattre, a journalist with Le Monde, decided to look into the case and A Spy
At The Heart of the Third Reich is the result.
Although Fritz Kolbe was never a member of the Nazi party, he performed his
administrative duties in the Foreign Office so well that he survived several
purges and retained access to sensitive classified material throughout World War
II. A truly closet anti-Nazi, he arranged a trip to Switzerland in 1943 to try to
pass documents to the Britishbut he was rebuffed. He next went to OSS
station chief Allen Dulles, who cautiously accepted him. In the end, after many
more trips, his services earned the sobriquet prize intelligence source of the
war.
8 Nigel West, The Guy Liddell Diaries: WALLFLOWERS, Vol. II (London: Routledge, 2005), 460.
obvious there was a leak and London therefore discouraged discussion of the
penetration so as not to alert the Germans they were on to them while they
continued to hunt for the other moles.
As for the United States, the skeptical War Department intelligence staffs only
reluctantly accepted the Kolbe material late in the war, further diminishing its
utility. At one point, they refused to send it to the president, and Delattre
describes the ensuing inter-organizational battles. There is no doubt that Fritz
Kolbe took many personal risks and delivered much order-of-battle and other
data2,600 Foreign Office documents in all. But this material tended to
confirm sources unknown to Dulles.
Kolbes espionage for the Allies was known by some trusted friends who helped
him with accommodation addresses and the like during the war. After the war,
using the name George Wood, he permitted an interview that resulted in a
sketchy biographical story in True Magazine (1950). Dulles tried but was
unable to stop its publication in Germany, so a much wider audience became
aware of Kolbes wartime activities. Many viewed him as a traitor, and he did
not live to see his vindication in the Der Spiegel article mentioned above.
Delattres chapter Disgrace tells how Kolbes efforts to find a meaningful
existence in Germany failed.
Despite the irritating absence of specific source notes and an index, this is a
worthwhile book on an important case. Delattre is right when he ends with the
thought that Fritz Kolbe was without any question democratic and pro-
Western. His only mistake was to have been those things before everyone else
in Germany (223).
The book concludes with a remembrance of Kolbe by OSS and CIA veteran
Peter Sichel, who helped handle Kolbe after the war. His firsthand account
adds much to the image of a true German patriot.
Ruth Price. The Lives of Agnes Smedley. New York: Oxford University Press,
2005. 498 pages, endnotes, photos, index.
During the 1976 budget crisis in New York, classes at City College were
cancelled and graduate student Ruth Price used the free time to read a semi-
autobiographical novel, Daughter of Earth, by the controversial author Agnes
Smedley. Thus began an interest that simmered until the mid-1980s when
then-professor Price turned her full attention to Smedleys life and made the
decision to write this biography.
Price examines Smedleys life in great detail, explaining how she became
involved in the radical movement of the times and describing the many
communists who played important parts in her life. Smedley traveled widely.
In Germany, she worked for the COMINTERN under chief propagandist Willi
Muenzenberg. In India, she participated actively in the left wing movement
before going to China, where she met and was captivated by Mao and other
communist leaders. It was her activity in Chinaworking for Soviet military
intelligence agent Richard Sorgethat brought her to the attention of the post-
World War II anti-communist movement in the United States. Smedley denied
US Army charges that she was or had been a Soviet agent, and she threatened
to sue for libel if the army did not admit it was wrong and did not apologize.
And that is what the army did. She had worked against the Nazis and the
Japanese, not directly against the United States, they rationalized.
By the start of World War I, flying ace Jules Vdrines was 33 and too old for
frontline service in the French air force (Aviation Militaire). However,
experienced at flying by moonlight, he was soon a special-missions pilot taking
agents behind enemy lines in airframes made of wood. A new solution to the
perennial problem of insertion had been implemented. Special-mission flying
continued during the interwar period in the Far East, the Soviet Union, Italy,
Germany, and Spain, in anticipation of another conflict. World War II became
the glory days of what the Allies called Special Duty (SD) Squadrons. In
Airborne Espionage, David Oliver tells the story of the special pilots, their
aircraft, and the agents they inserted behind enemy lines.
Some of the pilots and their passengers became well known. Capt. George Hill,
a British Russian-speaking military intelligence officer, learned to fly in the
Balkans so he could insert his own agents behind enemy lines. He would go on
to author two books and to work with Sidney (Ace of Spies) Reilly in Moscow.
T. E. Lawrence (of Arabia) employed special-mission flights in the Middle East.
Australian Sidney Cotton, who would later support OSS, pioneered clandestine
aerial-photography flights covering many of the denied areas in Europe,
including Berlin.
During World War II, over 100 of the agents inserted were women, like Noor
Inayat Khan, a British wireless operator who had lived in France. These
already high risk operations were made even more dangerous because the
Gestapo had penetrated many of the resistance networks the SD squadrons
were supporting. The SDs also played a part in the British DOUBLE CROSS
(XX) operation and worked with OSS and various allied elements throughout
the world. For balance, Oliver includes many of the Nazi and Japanese
operations against the Allies and also describes their aircraft.
In a postscript, Oliver reviews the postwar life of some of the SD pilots, agents,
and opponents who survived. A few were ignored and fell on hard times. Some
went into politics. Others, especially the female agents, wrote books. They had
filled a need that still exists, albeit the aircraft and communications equipment
have changed. Airborne Espionage documents their contribution for the first time.
9 Not all readers agree with Prices judgment. One from George Mason University writes: I'm sorry to see
that Price has acquiesced, to some extent, to cold-war anti-communism in failing to affirm Smedley's hard
and dangerous work for anti-imperialism in India and in favor of the Comintern which, whatever its man-
ifold failings, was at least on the right sidethe side of those who opposed class exploitation and imperi-
alismas the US, UK, et al. were not (http://hnn.us/readcomment/). For another look at The Lives of
Agnes Smedley, see the review by Prof. Harvey Klehr in The Weekly Standard, 31 January 2005.
Hugh Popham. The FANY in Peace and War: The Story of the First Aid Nurs-
ing Yeomanry, 1907-2003. Revised edition. Barnsley, Yorkshire, UK: Leo Cooper,
2003. 174 pages, bibliography, photos, appendices, index.
Service with Lord Kitchener in the Sudan campaign of 1898 convinced cavalry
Sgt. Maj. Edward Baker that troops wounded in the field needed skilled
medical attention before the ambulance arrived. He envisioned women riding
sidesaddle round the fringes of a traditional battlefield dressed in vivid scarlet
tunics and voluminous skirts tending the wounded and freeing soldiers for
combat (2). He finally launched his all volunteer organizationalthough with
a different dress codein England in 1907, where the headquarters of the First
Aid Nursing Yeomanry (FANY) Corps is still located today.
The initial response was positive although the Corps was to have its difficult
times. The FANYs, as they are called, have since served in both peace and war,
and author Hugh Popham reviews their entire history while telling how the
tasks they performed soon departed from nursing to ambulance driving,
eventually focusing on communications support.
In 1901, with its ship-building program well underway, the German Admiralty
created a naval intelligence department (designated N), a first for Germany,
to keep track of foreign navies in general, and Britains Royal Navy in
particular. Agents were recruited and dispatched to Britain to report on naval
When war was declared, the press claimed that all German agents in Britain
had been arrested. Many historians have accepted this view as accurate. But
because Boghardt had access to recently released German and British archival
documents, he was able to correct that conventional wisdom and show that MI5
manipulated the record to reflect that position. Several spies had indeed been
arrested, but some were never found. During the war, at least 120 agents
operated in Britain and MI5, with Special Branch, arrested 31 of them (105).
The principal method of detection was mail monitoring, although a number
were caught because the agents they attempted to recruit turned them in.
Boghardt finds little to suggest that either service made a difference in the war.
After the war, N was disbanded along with the Imperial Navy. MI5, however,
survived with its reputation enhanced and many lessons learned and went on
to be exceptionally successful in World War II.
According to Kerns references, Sergo Beria, who was one of the listeners at the
Teheran Conference, said Stalin had him listen to Roosevelts conversations to
determine the presidents attitude regarding opening a second front, since
Churchill was against it. But what are Berias recollections of what FDR had to
say? During his conversations with his collaborators [advisors] Roosevelt always
expressed a high opinion of Stalin . They know we are listening, commented
Stalin, yet they speak openly! When Beria claimed that the microphones were
too well hidden to be spotted, Stalin marveled: Its bizarre. They say everything in
fullest detail . 2 One can read that as FDR-the-naive or as FDR-the-shrewd, who
knew full well that his words were heard and used the opportunity to try to con-
vince the Soviet leader that the West was not dedicated to the overthrow of his
government.
1 Jim Bishop, FDRs Last Year: April 1944April 1945 (New York: Pocket Books, 1975), 346.
Few accuse Winston Churchill of naivet, especially about the Soviet Union, yet
his quarters, at Yalta and during previous meetings with Stalin, were also wired
by the Soviets. In August 1942, during the prime ministers first stay in Moscow
for meetings with Stalin, Churchill received warnings that his rooms were bugged.
He was skeptical, but he played to the secret listeners by calling the Russians
lower in the scale of nature than the orang-outang, intending that they-know-
that-he-knew. 3 I have found no record of the British telling the Americans of the
eavesdropping that took place in Moscow in 1942, but a nation that shared the
ULTRA secret would certainly have shared its knowledge of Soviet electronic
eavesdropping. Since the so-called servants at Teheran were clearly carrying side-
arms under their uniforms, as Kern points out, it was obvious to all that service
was not their primary task.
At the Yalta conference, Churchill wrote in his memoirs that his Russian hosts gave
kindly attention to every chance remark. When a British official commented that
a large fish tank had no fish in it, goldfish quickly appeared. When another com-
plained that they had no lemon peel to use in their drinks, a lemon tree loaded with
fruit materialized the next day.4 Perhaps this was eavesdropping by nearby ser-
vants, but the more likely listener was a microphone with a tape recorder, and
British officials were well aware of what had happened in the past.
2 Sergo Beria, Beria, My Father: Inside Stalins Kremlin, Franoise Thom, ed., Brian Pearce, transl. (Lon-
don: Duckworth, 2001), 9293. Berias recollections are, to say the least, suspect. As the editor of the vol-
ume points out, Beria was raised in a world of lies and half-truths, lies that were all the more inextricable
because the truth was unbearable (viii). The editor makes no mention of notes or records used by Sergo
Beria to write his memoirs, making specific quotations attributed to Stalin dubious at best. That said,
Berias depiction of Stalins reaction to the product of Soviet eavesdropping at Teheran and Yalta contra-
dicts no other evidence and, in the context of that era, is plausible.
3 David Reynolds, In Command of History: Churchill Fighting and Writing the Second World War (Lon-
don: Allen Lane, 2004), 326. Reynolds and others speculate that Churchill was too naive throughout the
war about the dangers of Soviet listeners during conferences. Perhaps, but that assumes he said things
privately that were greatly different from what he was telling Stalina difficult case to prove. See Rey-
nolds, note 12, 611.
4 Winston S. Churchill, Triumph and Tragedy (Boston, MA: Houghton Mifflin, 1953), 347. See also Alex-
ander Cadogan, The Diaries of Sir Alexander Cadogan, David Dilks, ed. (New York: G. P. Putnams Sons,
1972), 471.
being Stalin's interpreter assiduously in the 1980s, while Pavlov was seriously ill
and therefore silent. But that does not change the fact that, as a matter of course,
Soviet listening devices were installed, and understood by the Anglo-Americans to
be installed, when they came to meet with Stalin and, presumably, with other
Soviet leaders. 5
The fact is that, probably at Teheran and definitely at Yalta, both Churchill and
Roosevelt and their advisers assumed that the Russians had bugged their quar-
ters. 7 That makes it persuasive, based on evidence and actions, to argue that
neither Churchill nor Roosevelt said (or intended to say) anything that Stalin
could not hear. One historian of the Teheran Conference has argued that
Roosevelt would probably not have been unduly concerned about having his con-
versations overheard. After all, one reason FDR had come to Teheran was to
demonstrate to the Russians that he could be trusted. 8 The same attitude charac-
terized both Churchill and Roosevelt at Yalta. The private strategies of Churchill
and Roosevelt were their public positions, at least to Stalin. Neither was plotting
to overthrow the Stalinist regime or to cheat the Soviet Union of the fruits of vic-
5 Christopher Andrew and Vasili Mitrokhin, The Sword and the Shield (New York: Basic Books, 1999),
17576, mentions Soviet eavesdropping of Churchill and Roosevelt at Teheran. They provide no details
and imply that such intelligence was not used by Stalin. I have seen no allegation of such bugs of the
quarters of British Foreign Secretary Anthony Eden and US Secretary of State Cordell Hull during the
meeting of foreign ministers in Moscow a few weeks prior to the Teheran talks, but it seems reasonable
to assume that such was the case. It seems equally reasonable to assume that both men were warned of
such espionage, given the British experience a year earlier. The official records of the Yalta Conference
are found in US Department of State, Foreign Relations of the United States: The Conferences at Malta
and Yalta, 1945 (Washington: Government Printing Office, 1955).
6 See Warren F. Kimball, The Incredible Shrinking War: The Second World War, Not (Just) the Origins
of the Cold War, Diplomatic History 25:3 (summer 2001): 351. Kern is revealingly presentist, when he
corrects FDR for referring to Russia [sic] rather than Kerns preferred Soviet Union. Common usage
during the Second World War was Russia, although Churchill referred to the Russians when talking
about geopolitics, and the Bolsheviks when speaking of ideology.
7 Beria also refers to planting bugs in gifts presented to Averell Harriman, presumably when he was US
ries, 579.
tory. As for the postwar political structure, both Churchill and Stalin had observed
that, in the Russian leaders oft-quoted phrase, whoever occupies a territory
imposes on it his own social system. 9 The Anglo-Americans had their secrets, par-
ticularly about the atomic bomb project, but there is not a shred of evidence or
even rumor that Churchill and Roosevelt discussed the Manhattan project, pri-
vately or at the conference table, with each other or anyone else, when they met
with the Soviet leader. 10
Most American and British leaders and officials believed Germany, not the Soviet
Union, was the enemy. Criticize both Roosevelt and Churchill, if you wish, for
adopting negotiating and long-term strategies regarding Stalin and the Soviet
Union that, after the Cold War experience, seem to many to have been misguided.
Condemn them both for thinking they could trust Stalin. Poor Neville Chamber-
lain believed he could trust Hitler. He was wrong, said Churchill. But I don't
think I'm wrong about Stalin. 11 But understand that while Roosevelt (and
Churchill) may have twice walked willingly and knowingly into a surveillance
trap, as Kern states, neither of the Anglo-American leaders failed to understand
that the so-called trap could serve their own purposes.
So where does this leave us? Either Winston Churchill and Franklin Roosevelt, the
two men who led their nations to victory in the Second World War, were stupidly
careless and cavalier, or they just did not care if conversations in their quarters
were overheard and passed on to Stalin and his cohorts. Readers choice. 12
9 Churchill used a more flowery phrase"the right to guide the course of history is the noblest prize of
victorybut the meaning was the same as Stalins. Warren F. Kimball, Forged in War (New York: Mor-
row, 1997), 209.
10 The atomic bomb project is again an example of the we-know-that-they-know (and perhaps they-know-
that-we-know-that-they-know) syndrome. FDR knew about Soviet espionage at the Manhattan Project no
later than September 1943. Given reports of Soviet intelligence collection, is it not likely that Stalin knew
that the Americans knew that he knew? Ah, the web we weave. For a discussion of this, see Forged in War,
22021, 27980, 32930.
11 Quoted from the diary of Hugh Dalton by David Reynolds, In Command of History, 469. Christopher
Andrew, the dean of British intelligence historians, depicts Roosevelt as disinterested when confronted
with reports of Soviet spying in the United States. Andrew and Mitrokhin, 107.
12 I am reminded of the claim in the 1950s and early 1960s made by Democratic-leaning pundits that
Dwight Eisenhower was little more than a bland grandfather figure who was not very bright. It seems
not to have occurred to the critics that this kindly dolt had, with great skill and success, managed the
Anglo-American victory against Hitler.