You are on page 1of 12

A Pioneering Experiment

OSS Double-Agent Operations in World War II


Robert Cowden

The intricate enterprise of re- This article examines OSS coun-


cruiting and operating an enemy’s terintelligence during World War II,
clandestine agents—working with and addresses the question concern-
double agents—is a difficult counter- ing how the OSS handled double
intelligence tool for an intelligence agents and the subsequent intelli-
service to harness. The complexity, gence impact. The paper traces X-2’s
uncertainty, and risk associated with development from 1943 to 1944 as it
The OSS these operations suggest that such built the apparatus to manage double
counterintelligence activities would be undertaken only agents; discusses X-2 double-agent
by well-established and experienced operations in France, Germany, and
division known as intelligence services. Yet during Italy; and evaluates the performance
X-2 was responsible World War II, from 1944 to 1945, the of X-2’s double-agent operations in
for identifying and United States’ upstart intelligence counterintelligence and deception.
agency—the Office of Strategic
neutralizing German Services (OSS)—conducted its own The article argues that X-2’s
intelligence activity double agent operations in France, double agent operations provided sig-
nificant counterintelligence value by
abroad. Germany, and Italy.
enabling the Allies to understand and
Formed in 1943, the OSS coun- ultimately control Abwehr espionage
terintelligence division—known as activities in France after the inva-
X-2—was responsible for identifying sion. Secondarily, the double agents
and neutralizing German intelligence also offered tactical contributions to
activity abroad. X-2 endeavored several deception operations.
to penetrate the German military
intelligence service, Abwehr, using
double agents as a means of infiltra-
tion. From 1944 to 1945, X-2 officers X-2’s Development, 1943–1944
accompanied Allied invasion forces
in France and Italy to recruit German The history of OSS counterintelli-
“stay-behind” agents in Allied-con- gence—and its double-agent capa-
trolled areas. X-2’s double agents— bilities—traces back to the British
referred to as Controlled Enemy double-cross program launched after
Agents (CEAs), or Wireless Telegra- the outbreak of WWII, when British
phy (W/T) or radio agents—operated intelligence undertook a sophisticated
from behind Allied lines and trans- double-agent effort that neutralized
mitted false reports to the Abwehr via German intelligence operations in
radio.1 Great Britain. “We actively ran and
controlled the German espionage
system in this country,”2 proclaimed

All statements of fact, opinion, or analysis expressed in this article are those of
the author. Nothing in the article should be construed as asserting or implying US
government endorsement of its factual statements and interpretations.

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  65



A Pioneering Experiment

Distribution of X-2 and French CEAs, 1 April - 8 May, 1945

United
Kingdom Netherlands

Muenchen
Gladbach

Lille Belgium Germany


English Channel
Lux.
Cherbourg
Rouen
Metz
Paris
Nancy
St. Pair Strasbourg

Troyes
Mulhouse

France Switzerland

Bay
of
Biscay Lyon

Grenoble
Italy
Bordeaux
Arachon

Montpellier Marseille
Sete

Spain = CEA

66  Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)



A Pioneering Experiment

J.C. Masterman, the chief of the The British machinations succeed- the X-2 office in London became the
British double-cross system, after the ed and, on 1 March 1943, Donovan center of American counterintelli-
war. In 1939, British intelligence— created the Counter Intelligence gence operations. This arrangement
using information provided by Polish Division. Three months later, Dono- also served British interests as it al-
cryptologists—broke the German van rescinded his order and created lowed British intelligence to maintain
Enigma cipher and was then able to instead a separate Counter-Espionage tight control over the ULTRA traffic
decrypt many German communica- branch within OSS known as X-2.5,6 shared with the United States and to
tions throughout the war. MI-5 and develop relationships with its Ameri-
MI-6 used these communications can counterparts.8
intercepts—designated ULTRA—to ULTRA
identify and apprehend Abwehr British authorities indoctrinated
A type of communications intelligence
agents in Britain. (COMINT) obtained by Britain and X-2 into the double-cross program
the United States during World War and provided training for handling
MI-5’s B1A Division then II, ULTRA consisted of the cryptanal- double agents in preparation for the
selected German agents to serve as ysis of all German radio communica- invasion of Europe. In the fall of
double agents who continued their tions employing the Enigma machine 1943, British intelligence helped X-2
and Japanese military communica-
communications with the Abwehr create Special Counter-Intelligence
tions employing enciphering ma-
under British direction. a The double chines...Japanese diplomatic commu- (SCI) detachments that would ac-
agents served two central purposes: nications were known as MAGIC. company the Allied invading forces
counterintelligence—to identify other in continental Europe and perform
From Spy Book: The Encyclopedia of Es-
German spies and reveal Abwehr counterintelligence operations using
pionage by Norman Polmar and Thomas
plots—and deception, most notably Allen (Random House, 1998) ULTRA intercepts. In these early
in support of Operation Fortitude, the stages of preparation in 1943, MI-6
effort to mislead the German military remained reluctant to grant X-2 re-
about the location of the Normandy sponsibility for managing CEAs. An
landing in 1944. In order to expedite the develop- internal X-2 history of CEA opera-
ment of X-2’s counterintelligence tions in France and Germany written
After the US created the OSS in capacity, MI-5 and Section V of after the war described this ambiva-
1942, British intelligence set out to MI-6 shared their counterintelligence lence during fall of 1943: “Certainly
convince OSS head William Don- records and expertise. A declassified it was felt, more or less vaguely, that
ovan to form a counterintelligence US government history of counter- X-2 should logically have a hand in
division akin to MI-6’s counterintel- intelligence notes the significance of the [CEA] business; but CEA work
ligence section.3 British intelligence this collaboration in building X-2’s was seldom, if ever, discussed by
officials wanted a central counterin- capability: “The United States was the officers of MI-6 (V) who were
telligence office in the US that would given the opportunity of acquiring, helping to establish their American
serve as liaison with London on within a short period, extensive counterpart.”9
double-agent missions, on ULTRA counterintelligence records repre-
traffic about German intelligence, senting the fruits of many decades of The mission of the OSS SCI units,
and on the security of Allied intelli- counterintelligence experience. The however, included the operation of
gence abroad.4 British offered also to train Ameri- double agents and, in September
can personnel in properly using such 1943, the US Joint Chiefs of Staff
Given the highly sensitive nature approved a directive authorizing OSS
records and in conducting counterin-
of the ULTRA intercepts, British in- activities in the European Theater, to
telligence operations.”7
telligence sought to limit distribution include “the control, in collaboration
of ULTRA traffic to a single, secure As MI-6 (V) provided training with British Deception Service, of ac-
OSS counterintelligence division. to their new American counterparts, tion of double agents.”10 Additionally,

a. British military intelligence was and is divided between two agencies: MI-5 was responsible for domestic intelligence, while MI-6 was
responsible for foreign intelligence. MI-5’s B1A division was responsible for running double agents. MI-6’s Section V was MI-6’s counter-
intelligence division, which also carried out double agent missions abroad.

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  67



A Pioneering Experiment

In preparation for the D-Day landing, X-2 requested


additional personnel to augment the Special Case Unit. rience with CEAs in France.17 A
Spanish national living in Cherbourg,
Frutos had served as an Abwehr agent
since 1935, reporting via radio on
a charter for the SCI units approved It was felt that the Americans naval activity in Cherbourg. By late
in December 1943 declared that one should familiarize themselves 1943, Abwehr suspected an Allied
of the functions of these detachments with as many of the leading invasion was imminent and instruct-
was “to assist and advise in the local British cases as possible, in ed Frutos to maintain his position in
deception of the enemy through order that they might realize Cherbourg.
the control of enemy agents.”11 In what unforeseen problems and
February 1944, British intelligence unimaginable complexities In May 1944, the Abwehr provid-
finally acceded to OSS involvement might—and normally did—arise ed Frutos with two radio sets and in-
in CEA operations, and agreed for in virtually every case. Officers structed him to report on “the arrival
MI-5 and X-2 to administer CEAs on of MI-5, some of whom were of ships or commandos, the number
the continent.12 running cases in the UK at the of soldiers who disembarked, their
moment, were available for arms and the units to which they be-
In March 1944, X-2 established questioning; and the Americans longed, and the number of tanks and
Special Case Units, as subunits of were, on occasion, even per- artillery that were landed.”18 Follow-
SCI, to conduct CEA activities.13 mitted to visit the actual locus ing the Allied landing at Normandy
Lieutenant Edward R. Weismill- of some of the British opera- on 6 June, Frutos issued 10 transmis-
er (US Marine Corps) and radio tions. Obviously, conditions on sions from 6 June to 20 June 1944,
technician Alton Adams reported the Continent were going to apprising the Germans of “vague
to MI-5 for training in British W/T be vastly different from those tactical information” related to the
CEA technique in early March, and in England; yet this reading Allied forces.19 Frutos determined
Captain John B. Oakes (US Army) period was of great value as an that it was too dangerous to conduct
soon joined them.14 Weismiller—a introduction to the enormous transmissions after 20 June and hid
Rhodes Scholar with degrees from human and administrative as his radio sets in the attic.20
Cornell and Harvard—and Oakes—a well as technical problems that
Princeton valedictorian and Rhodes X-2 learned of Frutos’s pres-
have to be faced by every case ence in Cherbourg through ULTRA
Scholar—offered this description of officer.15
their training period with MI-5: traffic and the recruitment of his
In preparation for the D-Day land- former Abwehr handler, Karl Eitel,
The first formal step in the ing, X-2 requested additional person- in Portugal.21 Eitel switched alle-
education of case officers was nel to augment the Special Case Unit; giances in November 1943, meeting
the giving of a verbal introduc- however, by the time of the D-Day with an X-2 officer and revealing
tion to the art of running CEAs invasion, the CEA team included that he knew of at least three German
by Lt. Col. T. A. Robertson and three officers and four enlisted men.16 stay-behind agents in the Brest-Cher-
Mr. J. C. Masterman, two of the bourg area. ULTRA intercepts
principal officers of that section corroborated Eitel’s claim, including
of MI-5 which had been dealing that one of the agents probably was
throughout the war with CEAs Double Agent Operations Frutos. The X-2 station conveyed this
on British territory. The Ameri- information to the SCI detachment in
can newcomers were welcomed DRAGOMAN Cherbourg, which located Frutos and
into the inner recesses of MI-5 The first American CEA case in arrested him on 8 July 1944. Frutos
with utmost cordiality, and were France was that of Juan Frutos, also quickly confessed and agreed to work
given completely free access to known as DRAGOMAN; the Frutos for X-2.22,23
the voluminous files. case was also X-2’s most substantial X-2’s CEA personnel arrived in
and best-documented double-agent France shortly after Frutos’s arrest.
case, and it illustrates X-2’s expe-

68  Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)



A Pioneering Experiment

Oakes traveled to Cherbourg on 14 cember 1944.30 Frutos was no longer received accolades from his German
July after learning of the case, and at risk of being exposed by other handlers, and he was rewarded with
Weismiller and Adams followed on German agents in the area. more in-depth questionnaires on
25 July.24 Oakes and Major Christo- Allied naval activities.34
pher Harmer of the British 104th SCI Through the fall of 1944, Frutos’s
Unit interrogated Frutos to determine X-2 handlers worked to build his Frutos’s role in Cherbourg
if his CEA status could be blown by credibility and status with his Abwehr increased in significance in Decem-
his mistress or by two other Abwehr handlers. Frutos had previously sent ber as the German offensive in the
agents believed to be in the area. terse messages and not more than Ardennes and the Battle of the Bulge
Though officials in London wanted to one at a time. Consequently, X-2 prompted new waves of Allied troops
send Frutos to England for further in- increased volume and detail of his to arrive there, and X-2 finally elect-
terrogation, Oakes and Harmer con- reporting slowly to avoid suspicion.31 ed to use Frutos for deception. At the
cluded that Frutos would be worth- In addition, the X-2 case officers had end of November, the Abwehr sent
while as a double agent and unlikely to gain approval from the so-called Frutos a questionnaire requesting in-
to work against them.25 Moreover, “212 Committee” for all the intelli- formation about the anti-torpedo nets
the need for expediency overrode gence (known as “foodstuff”) that that merchant ships used to protect
London’s concerns; Frutos had been Frutos relayed to the Germans. against German submarine attacks.
off the air since 20 June, and further British intelligence was already feed-
Formed in August 1944, the 212 ing deceptive statistics on anti-torpe-
delay would arouse suspicion. On 25
Committee was a coordinating body do nets to the Germans through their
July 1944, Frutos resumed contact
for authorities from X-2 and the 21st own CEAs, and so the 212 Commit-
with the Abwehr, this time as an
and 12th Army Groups to approve tee approved Frutos to participate in
American CEA assigned the cryp-
deception information for American the deception. He delivered the false
tonym DRAGOMAN.26
CEA’s in France and Germany. Not information on the anti-torpedo nets
Frutos’s position as a trusted Ger- only was this a slow process, but to the Germans on 27 and 28 Decem-
man agent stabilized in August 1944. the 212 Committee prohibited X-2 ber 1944, citing a fictional subsource
He retained a job at the Army Real from using Frutos for deception and on an American cargo vessel, and
Estate and Labor Office, a position denied foodstuff that could endanger continued to disseminate the decep-
that demonstrated to neighbors in Allied operations. As a result, the tive naval information through the
Cherbourg how he earned his living case officers complained that Frutos winter. After the war, X-2 praised
and that was closely related to the was “forced into equivocation, cir- Frutos’s role—passing false reports
fake job of interpreter at an American cumlocution, inference, explanation, from the fictional subagent—in the
port office that he presented to the avoidance to such an extent that his naval deception operation:
Abwehr.27 Weismiller and Adams also messages became longer and longer
located a secure house from which and throughout the month of October He [the fictional subagent] had
Frutos could broadcast his radio we faced with helpless alarm the fact passed a considerable amount
transmissions to the Abwehr.28 that, for all the reasons enumerated of important naval deception,
above, Frutos’s outgoing traffic was and all the data he had notion-
In late August, Frutos was con- reaching almost unmanageable pro- ally supplied, on the anti-tor-
tacted by Alfred Gabas, a German portions.“32 pedo nets, convoy routes and
agent in the Cherbourg area for protection, Antwerp traffic,
whom X-2 had been searching.29 X-2 Frutos struggled to explain to the V-bomb damage, etc., had been
arrested Gabas, who then led them to Abwehr why he could not provide carefully contrived and edited
a German agent in nearby Granville details on activities in plain sight at the highest level to dovetail
named Jean Senouque; X-2 later such as troop movements through perfectly with information the
recruited Senouque as a CEA. The Cherbourg harbor and blamed his Germans were already known
other supposed German agent in the deficient reporting constraints on to have, to support information
area fled Cherbourg for Paris after the his mobility, his subsources, and the supplied by other accepted
invasion and was arrested in De- local security.33 Nonetheless, Frutos agents, and to fill out and con-

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  69



A Pioneering Experiment

The geographic distribution of CEAs convinced German


intelligence it had achieved a saturation of agents behind which prompted American, French,
enemy lines. and British authorities to devise an
operation to capture Kaulen.
trol the picture which the Allied this agent network in consultation Allied intelligence hoped Kaulen
Naval Command wished the with X-2 in London, and liaised with could provide insight on German
Germans to have of its meth- French double-agent authorities. The intelligence plans for France, details
ods and dispositions along the geographic distribution of CEAs of the stay-behind network along
Atlantic coast of Europe. convinced German intelligence it the North Sea coast of Germany and
had achieved a saturation of agents Holland, and designs for the post-
At a more crucial period of behind enemy lines. German intel- war. 41 On the night of 6 April 1945,
the war the second mate might ligence thus focused on servicing a Senouque rendezvoused with Kaulen
have had a decisive influence network that was, in fact, controlled on the banks of the Gironde River,
on the whole German U-boat by the United States, and when it did but Kaulen was killed as French and
campaign in American and attempt to insert new agents, X-2 American soldiers attempted to cap-
British waters; as it was, he was was able to identify and capture them ture him. Though denied the opportu-
as useful as the war situation through CEA traffic and ULTRA nity to interrogate Kaulen, American
permitted, and his employment intercepts.38 authorities did find Kaulen’s written
came near to being a model of
instructions for Senouque. These
what high-level interservice The CEA case of Jean Senouque
documents demonstrated to the X-2
cooperation in a deception demonstrates the counterintelligence
officers that “[Kaulen’s] entire net-
campaign can be.35 value of this CEA network. Prior
work in France is clearly under our
to the Allied invasion of France, an
Frutos’s role in the deception control and always has been.”42
Abwehr officer named Friederich
operation ended in March 1945, Kaulen recruited a network of agents The American CEA network in
but he remained a trusted German along the French coast to spy for the France also performed deception
intelligence source through the end of Abwehr’s naval division, I-Marine. operations, including an effort to
the war. One of these agents was Senouque, mislead German authorities about
who was assigned to report on “the the Allied troop presence in south-
CEA Network in France
port of Granville and the surrounding ern France in the spring of 1945.
and Germany
area at the western base of the of the Paul Jeannin, a CEA in the I-Marine
In addition to Frutos, X-2 devel- Normandy peninsula.”39 After the network in Marseille in southern
oped a stable of 15 CEAs in France invasion, Allied forces uncovered France, and a CEA in Draguignan—
and Germany by the spring of 1945.36 Kaulen’s network—in part through cryptonymed FOREST—participated
In conjunction with CEAs operated Frutos—and arrested Senouque and in Plan Jessica, a deception operation
by French intelligence, a CEA net- the other agents. Senouque agreed to designed to “retain as many German
work the Americans were able to es- work for the Americans, and by De- troops as possible on the Franco-Ital-
tablish provided geographic coverage cember he was joined by four other ian border, but to discourage them
across France.37 American and French CEAs, all from Kaulen’s I-Marine from crossing into France.”43
CEAs were positioned all along the network.40
French coast in every major city from The Germans were interested in
the Mediterranean to the western and X-2 used Senouque to glean Allied troop arrivals at Marseille,44
northern coasts. In the interior, X-2 information on the Abwehr’s and Allied deception authorities
operated several agents in Paris and a handling of Frutos and the I-Marine requested the nearby CEAs exagger-
cadre of agents in northeast France. CEAs, as well as to obtain clues ate the number of troops in Southern
about the existence of other German France to indicate a likely Allied
X-2 also maintained two CEAs agents. In March 1945, Kaulen offensive at the Italian border. 45
in Germany near the French border. traveled to Boudreaux for meetings FOREST provided false reports on
X-2 established a CEA office in Paris with Senouque and two other CEAs, troop movements, while Jeannin—
led by John Oakes, who managed

70  Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)



A Pioneering Experiment

X-2 achieved a remarkable counterintelligence feat by


who was not positioned to report capturing and controlling the German network of stay-
credibly on troop movements—de-
behind agents in France.
livered complementary reports that
supported FOREST’s accounts of
troop landings and preparations for
mans fail to uncover either agent’s re- very last stages.”51 This case allowed
an offensive on the Italian front sim-
lationship with X-2, but they valued Angleton and Berding to observe a
ply by not refuting them. The overall
one of them—Henri Giallard—so successful CEA deception operation
deception effort was successful,
highly that he was awarded the Iron and prepare to run their own CEAs
according to an assessment by the US
Cross on 10 February 1945.49 in Italy.
6th Army Group: “It is at least certain
that two German divisions, badly Double Agents in Italy X-2 undertook its first true CEA
needed elsewhere, were held with the operation in June 1944 when the Al-
X-2 also conducted CEA oper-
Italian divisions guarding the Fran- lied forces arrived in Rome. Though
ations in Italy, under the training
co-Italian front all winter long, and surprised by timing of the final Allied
and supervision of its British allies.
that the Germans are now known to offensive in Rome, German intel-
Though the X-2 SCI unit in Italy did
have been continually worried about ligence had prepared a network of
not undergo double agent training
this front.” 46 Jeannin and FOREST stay-behind agents in Italy. An X-2
in London with M-5 as Weismiller
contributed to the success of this unit led by Berding entered Rome on
and Oakes had, X-2 officers James
deception, though they were only one 5 June 1944 and soon found one of
Angleton—later the longtime CIA
small component of the operation. the stay-behind agents: Cesare D’On-
counterintelligence head—in London
and Anthony Berding in Italy were ofrio. After Berding’s interrogation,
X-2 also used CEAs for tactical
able to observe MI-6’s Section V X-2 elected to operate D’Onofrio as a
deception along the front in Eastern
as it developed the first Allied CEA CEA—cryptonymed ARBITER—in
France. After the invasion at Nor-
case in Italy. In January 1944, Allied conjunction with four other German
mandy, the 12th Army Group pro-
forces captured three Italian aviators radio agents run by the British and
gressed through Paris to the Eastern
behind Allied lines, and an MI-6 (V) French.52 The Section V report on
border of France where it engaged
unit was able to operate one of the CEAs in Italy notes that, “ARBITER
German forces through the winter of
aviators as a CEA—cryptonymed ran well for three months, but was
1944–45. The X-2 SCI unit attached
PRIMO. Beginning with small-scale closed down in September when a
to the 12th Army Group captured a
deception material, the British han- courier with money visited him and
small network of German agents in
dlers quickly expanded the deception was arrested.”53
the fall of 1944 and operated them as
CEAs.47 operation to support Operation Ven- The report then concludes with a
detta, a deception operation designed general assessment of the six Allied
In December, at the direction to keep eight German divisions in double agent operations in Italy:
of Allied military leadership, X-2 Southern France so they would not “Overall, double agents in Italy have
used two of the CEAs to deceive be available to combat the Allied paid good dividends…Most of them
the Germans about the movement of invasion at Normandy. 50 have made some CE [counterespio-
Patton’s 3rd Army to the Ardennes
An MI-6 (V) report in 1944 noted nage] contribution during their DA
during a critical point in the Battle of
PRIMO’s successful contribution careers and all the Abwehr agents
the Bulge. The two CEAs reported to
to the Allied deception operation: have played a large part in the imple-
the Germans that the 3rd Army was
“[PRIMO] survived his early ups mentation of strategic deception to
moving to the Ardennes in segments
and downs and was a prime and most the success of which Field Marshall
instead of all at once, as it actually
successful instrument in the imple- Alexander paid tribute.” 54
did—reinforcing the German as-
sumption that an entire Army would mentation of all DOWAGER’s decep-
not be able to travel “so far and so tive plans. MSS [Most Secret Source
fast under adverse conditions of road or ULTRA] showed how high a value
and weather.”48 Not only did the Ger- the Germans put on the case up to the

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  71



A Pioneering Experiment

British intelligence was...wary that the American novices


would expose the British double-cross system or, worse, Allied authorities opted not to use
expose the ULTRA secret. X-2’s CEAs on a larger scale because
the Allies did not have broad decep-
tion plan for France at this time. After
Evaluating X-2’s Performance onage for any length of time without the invasion, the campaign moved
falling under our control.”56 so quickly that there was not time
X-2 achieved a remarkable coun- to develop and implement strategic
terintelligence feat by capturing and Interrogations of German intelli- deception operations.
controlling the German network of gence officials after the war further
revealed that the Abwehr did not Historian Michael Howard ex-
stay-behind agents in France. Writing plains that in the latter months of the
after the war, X-2 double-agent case suspect that its stay-behind agents
had been doubled, although it viewed war, “Allied strategy itself was so
officers John Oakes, Edward Weis- opportunistic, so lacking in long-term
miller, and Eugene Waith noted that the information provided by these
agents as low quality.57 Not only did plans for developing enemy points of
the CEA operations in France and weakness and then exploiting them,
Germany were “conducted in the na- this CEA network prevent German
intelligence from gleaning accurate that no serious cover plans could be
ture of a pioneer experiment.”55 None made… the Allies were so strong that
of the X-2 personnel had experience intelligence about the Allied forces
in France in 1944–45, but it also they effectively dispensed with strat-
running double agents, and yet just egy altogether and simply attacked
one year after X-2’s creation they caused the Germans to waste time
and resources maintaining a network all along the line, much as they had
performed these complex operations in the closing months of 1918.”58 In
without German detection. controlled by their enemy.
addition, a double agent must gen-
X-2’s rapid development and X-2 did use its double agents erally build up his credibility over a
ultimate success was in large part for deception on several occasions, period of time before he can deliver
enabled by British training and guid- although it did not use the network in deception material. X-2 had neither
ance throughout the process, ULTRA a cohesive fashion for any large-scale the benefit of time nor high-quality
intercepts to identify German agents or strategic deception. X-2 utilized foodstuff material as it attempted to
and monitor operations, and the several agents in France for decep- build its agents’ credibility.
Abwehr’s diminishing intelligence ca- tion operations, including to deliver
false naval information regarding X-2 acquired its CEAs in France
pabilities and inability to uncover the in the late summer and fall of 1944;
recruitments. Additionally, X-2 per- anti-torpedo nets, to exaggerate the
numbers of Allied troops in southern by the spring of 1945, Abwehr dis-
sonnel from the case officers to the banded and the war ended. Further-
leadership displayed the competence, France, and to obfuscate the move-
ment of Patton’s 3rd Army to the more, deception operations would
creativity, and bravado necessary for risk exposing the CEA network, and
such a difficult undertaking. Ardennes.
Allied officials did not want to lose
The most significant intelligence In Italy, X-2 also used its CEAs to the counterintelligence value of this
contribution of X-2’s CEA operations support British deception operations. network. British intelligence was
was to allow the Allies to under- These operations succeeded in deliv- also wary that the American novic-
stand and ultimately control German ering false or misleading information es would expose the British dou-
espionage activities in France. The that German intelligence accepted ble-cross system or, worse, expose
X-2 history of CEA’s in France and as credible and reinforced broader the ULTRA secret.
Germany concludes: “From the ev- Allied deception operations against
the Germans. X-2 did not, however, Thus, despite X-2’s success in de-
idence of MSS [ULTRA] and of the veloping and implementing the CEA
interrogations of a number of leading use the agents for deception on a con-
sistent basis beyond these few cases, program, the operations did not have
personalities of the GIS [German a significant strategic impact on the
Intelligence Service] it is certain nor did it apply the French CEA
network to an overarching deception overall campaign in Europe. With the
that not more than two or three W/T invasion at Normandy in June 1944,
agents succeeded in carrying on espi- mission.

72  Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)



A Pioneering Experiment

X-2’s training from British intelligence in double agent


the Allies achieved a decisive victory tradecraft and operations during World War II also pro-
and began their conquest of Germa- vided a doctrinal foundation for future CIA double agent
ny on the continent. Though X-2’s operations.
capture and control of the German
stay-behind network weakened the
Abwehr’s intelligence capabilities in organization’s legacy nonetheless future CIA double-agent operations.
Allied-controlled areas of France and persisted, and X-2’s development X-2’s internal double-agent history
concealed information about Allied during the war formed the basis for after the war documented X-2’s CEA
troop landings and movements, it centralized counterintelligence at the cases, as well as the theory and trade-
was hardly a decisive feature of the Central Intelligence Agency (CIA). craft taught by the British and lessons
campaign. Many X-2 veterans went on to serve learned from these cases for future
The Allies almost certainly in prominent roles in the CIA, estab- practitioners to use. For example, the
would have defeated the Germans in lishing counterintelligence practices study advocated the use of high-qual-
Europe even without X-2’s double and operations in the new organiza- ity “foodstuff” to develop a double
agent network. Moreover, X-2 could tion. agent’s bona fides based on X-2’s
likely have achieved a satisfactory observations that a lack of viable
Most notably, James Angleton foodstuff in some cases prevented
counterintelligence situation even personally guided CIA counterintel-
without doubling the enemy agents, them from convincing Abwehr of the
ligence for much of the Cold War, CEA’s utility. 61
simply by using ULTRA to capture serving as chief of the CIA’s counter-
the German agents and glean further intelligence staff from 1954 through Finally, X-2’s legacy was not con-
information through interrogation. 1974.59 Historian Timothy Naftali fined to the intelligence realm: X-2
This analysis is not to discount the observes that Angleton’s X-2 expe- CEA case officers Oakes, Weismiller,
contribution of the X-2 CEA oper- rience working with double agents and Waith went on to distinguished
ations, but instead to recognize that shaped his hypervigilant approach civilian careers after the war: Oakes,
at this stage in the war, Allied forces to countering Soviet Union decep- as a longtime New York Times edito-
had gained the momentum against tion during the Cold War because rial writer and editor;62 Weismiller,
the retreating German armies and he realized that, if Britain and the as a poet and English professor at
victory was close at hand. Allies could undertake large-scale George Washington University;63 and
deception using double agents during Waith, as a scholar of Shakespeare
World War II, so too could the Soviet and English renaissance drama at
X-2’s Legacy Union.60 Yale University.64 Though short in
duration, X-2’s pioneering experi-
X-2’s training from British intelli- ment with double agent operations
X-2 was disbanded in 1946 as
gence in double-agent tradecraft and over just two years during World War
President Truman reorganized the
operations during World War II also II left behind a lasting legacy.
national security bureaucracy. The
provided a doctrinal foundation for

v v v

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  73



A Pioneering Experiment

Endnotes

1. John B. Oakes, Edward R. Weismiller, and Eugene Waith, A History of OSS/X-2 Operation of Controlled Enemy Agents in France and
Germany, 1944-1945 Vol. I (Strategic Services Unit, War Department, 1946), 340-343.
2. J.C. Masterman, The Double-Cross System in the War of 1939-1945 (Yale University Press, 1972), 3.
3. Timothy Naftali, “X-2 and the Apprenticeship of American Counterespionage, 1942-1944” (PhD diss., Harvard University, 1993), 13,
80.
4. Ibid., 13, 80.
5. History of United States Counterintelligence, Vol. I, 32. (Records of the Office of Strategic Services, Record Group 226, Entry 117, Box
2, National Archives College Park (NACP).
6. Ibid., 37-38.
7. Ibid., 34.
8. Naftali, “X2”, 7.
9. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 61.
10. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix A, 3.
11. Ibid., Appendix A, 13.
12. Ibid., 62.
13. Ibid., Appendix A, 19–23.
14. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 63-64.
15. Ibid.
16. Ibid., 66.
17. Ibid., i.
18. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 77.
19. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 94–95.
20. Ibid., 95.
21. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 66–72. Also see Naftali, “X-2” 633-634, for further discus-
sion of the Eitel case.
22. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 95-96.
23. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 57.
24. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 70.
25. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 80.
26. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 97-101.
27. Ibid., 104.
28. Ibid., 105-106.
29. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 129–139.
30. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 109.
31. Ibid., 115-116.
32. Ibid., 117.
33. Ibid., 118.
34. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix C, 141.
35. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 135.
36. Ibid., 73-74.
37. Ibid., 344–348.
38. Ibid., 330.
39. Ibid., 158–159.
40. Ibid., 160.
41. Ibid., 178.
42. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix G, 358–359.
43. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 221–225.
44. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. II, Appendix G, 323.
45. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 225.
46. Ibid., 227.
47. Ibid., 251.
48. Ibid., 258.
49. Thaddeus Holt, The Deceivers, 661.
50. Naftali, “X-2”, 613.

74  Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)



A Pioneering Experiment

51. “CEAs in Italy in 1944,” (Unsigned British document, but Timothy Naftali assesses it as MI-6, Section V). 226/119/23 NACP.
52. Naftali, “X-2”, 627-628, and “CEAs in Italy in 1944,” 226/119/23 NACP.
53. National Archives College Park, Record Group 226 Entry (UD) 116 Records of the Office of Strategic Services. London Files Relating
to German Intelligence Service Personalities, 1943 – 1946, Box 23, Folder 177b.
54. Ibid.
55. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, i.
56. Ibid., 327.
57. Ibid., 331.
58. Michael Howard, British Intelligence in the Second World War, Volume 5: Strategic Deception (London, Her Majesty’s Stationary
Office, 1990), 197-198.
59. Stephen Engelberg, “James Angleton, Counterintelligence Figure Dies,” New York Times, May 12, 1987, http://www.nytimes.
com/1987/05/12/obituaries/james-angleton-counterintelligence-figure-dies.html.
60. Naftali, “X-2”, 611–616.
61. Oakes, Weismiller, and Waith, A History of OSS/X-2 Vol. I, 198.
62. Robert D. McFadden, “John B. Oakes, Impassioned Editorial Page Voice of The Times, Dies at 87,” New York Times, April 6, 2001,
http://www.nytimes.com/2001/04/06/nyregion/john-b-oakes-impassioned-editorial-page-voice-of-the-times-dies-at-87.html?pagewant-
ed=all&src=pm.
63. “Celebrating the Life of Professor Emeritus Edward R. Weismiller,” GW English News, September 16, 2010, http://gwenglish.blogspot.
com/2010/09/celebrating-life-of-professor-emeritus.html.
64. “In Memoriam: Eugene M. Waith, Professor of English Literature,” Yale News, November 8, 2007, http://news.yale.edu/2007/11/08/
memoriam-eugene-m-waith-professor-english-literature.

v v v

Studies in Intelligence Vol 58, No. 2 (Extracts, June 2014)  75

You might also like