Sei sulla pagina 1di 102

Studies in Intelligence

Journal of the American Intelligence Professional

Unclassified articles from Studies in Intelligence Volume 55, Number 2


(June 2011)

Cultural Topography: A Research Tool


for Intelligence Analysis

Improving Policymaker Understanding of Intelli-


gence

The Pursuit of Intelligence History in


the United Kingdom

From the Archives—At cia.gov only


The Evolution of US Army HUMINT

Reviews

Grappling with Covert Action after the Cold War

Takes on Intelligence and the Vietnam War

Intelligence Officer’s Bookshelf

Center for the Study of Intelligence


This publication is prepared primarily for the use of US government officials. The format, cover-
age, and content are designed to meet their requirements. To that end, complete issues of Stud-
ies in Intelligence may remain classified and are not circulated to the public. These printed
unclassified extracts from a classified issue are provided as a courtesy to subscribers.

All statements of fact, opinion, or analysis expressed in Studies in Intelligence are those of the
authors. They do not necessarily reflect official positions or views of the Central Intelligence
Agency or any other US government entity, past or present. Nothing in the contents should be
construed as asserting or implying US government endorsement of an article’s factual state-
ments and interpretations.

Studies in Intelligence often contains material created by individuals other than US government
employees and, accordingly, such works are appropriately attributed and protected by United
States copyright law. Such items should not be reproduced or disseminated without the express
permission of the copyright holder. Any potential liability associated with the unauthorized use of
copyrighted material from Studies in Intelligence rests with the third party infringer.

Studies in Intelligence is available on the Internet at: https:// www.cia.gov/library/center-for-the-


study-of-intelligence/ index.html.

Requests for subscriptions should be sent to:

Center for the Study of Intelligence


Central Intelligence Agency
Washington, DC 20505

ISSN 1527-0874
The Mission The mission of Studies in Intelligence is to stimulate within the Intelligence
Community the constructive discussion of important issues of the day, to expand
knowledge of lessons learned from past experiences, to increase understanding of
the history of the profession, and to provide readers with considered reviews of
public literature concerning intelligence.

The journal is administered by the Center for the Study of Intelligence, which
includes the CIA’s History Staff, CIA’s Lessons Learned Program, the CIA
Museum, and the Agency’s Historical Intelligence Collection of Literature. The
center also houses the Emerging Trends Program, which seeks to identify the
impact of future trends on the work of US intelligence.

Contributions Studies in Intelligence welcomes articles, book reviews, and other communica-
tions. Hardcopy material or data discs (preferably in .doc or .rtf formats) may be
mailed to:

Editor
Studies in Intelligence
Center for the Study of Intelligence
Central Intelligence Agency
Washington, DC 20505

Awards The Sherman Kent Award of $3,500 is offered annually for the most signifi-
cant contribution to the literature of intelligence submitted for publication in
Studies. The prize may be divided if two or more articles are judged to be of
equal merit, or it may be withheld if no article is deemed sufficiently outstand-
ing. An additional amount is available for other prizes.

Another monetary award is given in the name of Walter L. Pforzheimer to the


graduate or undergraduate student who has written the best article on an
intelligence-related subject.

Unless otherwise announced from year to year, articles on any subject within the
range of Studies’ purview, as defined in its masthead, will be considered for the
awards. They will be judged primarily on substantive originality and soundness,
secondarily on literary qualities. Members of the Studies Editorial Board are
excluded from the competition.

The Editorial Board welcomes readers’ nominations for awards.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) i


C O N T E N T S
CENTER for the STUDY of INTELLIGENCE
Washington, DC 20505

EDITORIAL POLICY Improving Analysis


Articles for Studies in Intelligence may Cultural Topography: A New Research
be written on any historical, opera- Tool for Intelligence Analysis 1
tional, doctrinal, or theoretical aspect Jeannie L. Johnson and Matthew T. Berrett
of intelligence.
The final responsibility for accepting Improving Policymaker Understanding of Intelligence
or rejecting an article rests with the An Educated Consumer Is Our Best Customer 23
Editorial Board.
Dennis C. Wilder
The criterion for publication is
whether, in the opinion of the Board, Coming to Clarity
the article makes a contribution to the
literature of intelligence. The Pursuit of Intelligence History:
Methods, Sources, and Trajectories in
EDITORIAL BOARD the United Kingdom 33
Christopher R. Moran
Peter S. Usowski, Chairman
Pamela S. Barry From the Archives—At cia.gov only.
Nicholas Dujmovic
John McLaughlin
The Evolution of US Army HUMINT:
Philip Mudd Intelligence Operations in the Korean War 57
Wayne M. Murphy John P. Finnegan
Matthew J. Ouimet
Valerie P. Grappling with Covert Action after the Cold War 71
Michael Richter Matthew P.
Michael L. Rosenthal
Barry G. Royden
Ursula M. Wilder Takes on Intelligence and the Vietnam War 73
Not listed are three members who are
Clayton Laurie
under cover. Members of the board are
drawn from the Central Intelligence Intelligence Officer’s Bookshelf 79
Agency and other Intelligence Commu- Compiled and reviewed by Hayden Peake
nity components.

EDITORIAL STAFF
Andres Vaart

Vol. 55, No. 2 (Extracts, June 2011) iii


Contributors

Matthew Berrett is the Assistant Deputy Director for the DNI President’s Daily
Brief. He has served as an analyst and manager of analysts covering Middle East is-
sues in the CIA’s Directorate of Intelligence.

Jeannie Johnson is a lecturer in the Political Science Department at Utah State Uni-
versity. Ms. Johnson worked in the CIA’s Directorate of Intelligence on Balkans issues
during 1998–99. Her primary research interest, strategic culture, is the role of nation-
al and organizational cultures on the formation of security policy.

Clayton Laurie is a CIA historian. He also teaches military and intelligence history
at the University of Maryland Baltimore County.

Dr. Christopher R. Moran is a research scholar at the University of Warwick. He fo-


cuses on the development of government secrecy in Cold War Britain. Interests include
spy fiction and growth of intelligence communities in the 20th century.

Hayden Peake is curator of the CIA Historical Intelligence Collection. He has served
in the CIA’s Directorates of Science and Technology and the Directorate of Operations.

Matthew P. is a clandestine service officer assigned to the CIA History Staff.

Dennis Wilder is a senior officer in the CIA’s Directorate of Intelligence. He has


served as an analyst, a manager of analysts, a Special Assistant to the President and
Senior East Asia Director on the National Security Council, and a senior reviewer of
the President’s Daily Briefing.

On the Web:

John P. Finnegan was a US Army historian who focused on military intelligence his-
tory. He died two years after his unclassified article appeared in a classified issue of
Studies in 2000. Unfortunately, it was not extracted for an unclassified issue at the
time.

Vol. 55, No. 2 (Extracts, June 2011) v


Improving Analysis

Cultural Topography: A New Research Tool


for Intelligence Analysis
Jeannie L. Johnson and Matthew T. Berrett

In the third edition of his “History of the World,” J.M. Roberts


notes that “Historical inertia is easily underrated…the historical


American
decisionmakers have
shown a need for help in
forces molding the outlook of Americans, Russians, and Chinese for
centuries before the words capitalism and communism were
invented are easy still to overlook.” 1 In this article, Jeannie Johnson
and I offer a variation on Roberts’s view: Cultural inertia is easily
underrated, and American decisionmakers have shown a need for
isolating and help in isolating and understanding the complexity, weight, and rel-
understanding the evance of culture as they consider foreign policy initiatives.
complexity, weight, and
relevance of culture as The view I bring to this discussion is not one of an anthropologist
but rather one of a former economic analyst in US intelligence who
they consider foreign has been a senior manager of analysts in various disciplines for a
policy initiatives. decade. My analytic and management positions have repeatedly
brought me into indirect and sometimes direct interaction with top-

” level US decisionmakers including several US presidents. As I wit-


nessed these decisionmakers in action and tried to help deliver
insights they needed, I came to conclude that the "inertia of culture"
was often underrated in their assessments of opportunities and
obstacles, in part because few if any of their information sources
offered a systematic and persuasive methodology for addressing this
inertia and its implications for their policy options. I also came to
conclude from direct observation and some readings out of the aca-
demic field of strategic culture that America's cultural view fea-
tures the notion that Americans can achieve anything anywhere
including going to the moon—if they just invest enough resources.

This notion is understandable but perhaps hazardous. America’s


remarkable history of achievement includes being the first nation
actually to go to the moon, but the we-can-do-anything part of Amer-
ican self-identity also leads some to argue still that US failures in

The endnotes and an appendix are available in the digital version of the article in
cia.gov.

All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US govern-
ment endorsement of its factual statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 1


Mapping Culture

Vietnam were not the consequence of a poorly managed investment; they were the consequences of invest-
ing too little. 2 How many resources and over what period would have been sufficient to strike “suc-
cess”—particularly if success would have required changes in Vietnam at the cultural level? I have rarely
seen American policymakers ask “Will our desired foreign policy outcome require change over there at the
cultural level? Over what period and with what resources is such cultural change achievable?”

The more I observed the policy-intelligence dynamic, the more I perceived a need for an analytic con-
struct designed exclusively to illustrate clearly and persuasively the inertia of culture. Cultural influ-
ences are typically touched on within US Intelligence Community (IC) analyses as peripheral factors,
described with passing references, and often in general and superficial terms. Although the IC is full of
world-class expertise on foreign peoples, places, and organizations, this industry rarely isolates and illus-
trates culture as a factor deserving its own sophisticated and thorough treatment.

To remedy this perceived deficiency, I teamed with Jeannie Johnson—formerly an intelligence analyst
at CIA and now with Utah State University—who had brought her academic training in strategic cul-
ture to a pursuit similar to mine. For some time she had been amassing training ideas in the area of cul-
tural analysis for IC experts, and our combined efforts, along with significant input from other members
of my former office, 3 trial runs of intelligence products, research, and continued refinements over the past
four years have resulted in a process we call “Cultural Mapping.” This process, or methodology, is
designed to isolate and assess cultural factors at play on issues of intelligence interest and to distin-
guish the degree to which those factors influence decisionmaking and outcomes. Mapping exercises done
across time, spanning multiple issues, and on diverse groups within a society may aid in understanding
that society’s “Cultural Topography.” We describe the process below.-mtb

Target Audience: norms onto others.” Intuition, a requires a significant number of


Intelligence Analysts compass regularly employed by years viewing the world
career analysts, is culturally through the lens of one specific
Understanding this methodol-
encoded and, by nature, ethno- domain. This concentration
ogy and its specific structure
centric. Johnston warns of its gives the expert the power to
requires a grasp of the users for
use as a barometer for analyz- recognize patterns, perform
whom it was designed: intelli-
ing or predicting the behavior of tasks, and solve problems, but
gence analysts. Anthropologist
foreign agents. 5 According to it also focuses the expert’s
Rob Johnston was hired in the
Edward Stewart and Milton attention on one domain to the
wake of 9/11 to complete an eth-
Bennett, American cultural ten- exclusion of others.” 7
nographic analysis of the IC’s
dencies are particularly unhelp-
analytic cadre and to offer sug- Johnston’s cautionary counsel
ful in this regard. Despite vast
gestions for improving its per- regarding the habits of experts
information resources and expo-
formance. He observed biases echoes that penned by Rich-
sure to exotic cultures, Ameri-
produced by both ethnocen- ards Heuer two decades earlier:
cans continue to overemphasize
trism and expertise, which
similarity and assume that
resulted in rather serious cogni- Once people have started
other social groups have values
tive gaps, and he noted a lack of thinking about a problem
and aspirations in line with
systematic tools for going after one way, the same mental
their own. 6
cultural data. 4 circuits or pathways get
It may seem counterintuitive activated and strength-
Johnston defines ethnocen- ened each time they think
to see expertise as a source of
trism as the tendency to proj- about it. This facilitates
bias but Johnston points out
ect “one’s own cognition and the retrieval of informa-
that “becoming an expert

2 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Despite vast information resources and exposure to exotic cul-


tures, Americans continue to overemphasize similarity and as-
tion. These same sume that other social groups have values and aspirations in
pathways, however, also
become the mental ruts
line with their own.
that make it difficult to
reorganize the informa- leaders and the elite cadres Specific cultural knowl-
tion mentally so as to see that surround them. We have, edge is a skill and the
it from a different institutionally, very few tools foundation for forecast-
perspective. 8 aimed at understanding ing the behavior and
national populations or specific decisionmaking of foreign
A third form of observed bias subcultures, a point General actors. Acquiring cultural
among analysts, which might Michael Flynn made in his pub- knowledge should be
be added to Johnston’s list, has lic rebuke of intelligence prac- taken as seriously as
roots in academic training and tices in Afghanistan in January learning any other facet of
is an institutional legacy that 2010. 9 The emphasis on elites one’s analytic capabili-
tends to leave culture out in the has produced cognitive gaps in ties. Moreover, it is
“all-source” approach to analy- our analysis—perhaps illus- incumbent on analysts to
sis. The academic backgrounds trated anew by the surprise educate their own leader-
of most intelligence analysts over the political tumult that ship and policymakers
stem from disciplines that erupted across North Africa about the value and util-
emphasize power and wealth as and the Middle East in early ity of cultural knowledge
the primary human motiva- 2011. Johnston observes: for intelligence analysis. 11
tors, leaving underexplored
other motivators such as iden- [An] analyst, while Johnston’s advice may sound
tity, preservation of social insti- accounting successfully rather obvious, but given the
tutions, alternative value for an adversary’s capa- scope and complexity of the
structures, powerful narra- bility, may misjudge that phenomenon we call “culture,”
tives, or perceptions of the secu- adversary’s intention, not attempting its research and
rity environment distinctive to because of what is cogni- determining—with no prior
a person’s or group’s region and tively available, but training in this field—which
history. Due to institutional because of what is cogni- aspects have policy relevance
habits, the educational para- tively absent. The failure can be an intimidating task
digms of many of our experts, to determine an adver- even for the most talented polit-
and the reticence of members of sary’s intention may ical, economic, or military ana-
the anthropological community simply be the result of lyst. Interviews with analysts
to accept positions within US missing information or, have often revealed a sense of
security institutions, culture just as likely, it may be being overwhelmed by the scope
has received limited attention the result of missing of cultural data that are rele-
as a variable. Most analysts hypotheses or mental vant to their accounts—and of
have simply not been intro- models about an adver- dismay at the length and depth
duced to the training or the sary’s potential behavior. 10 of the historical knowledge nec-
research tools for going after essary to capture a grand stra-
cultural data effectively. Noting that the lack of cul- tegic profile of any region or
tural data in mental models is a group. One reaction is to sub-
This bias also affects intelli- problem not only for analysts consciously search for reasons
gence collection, which aims but also for the policymakers why cultural data are not nec-
disproportionately at foreign they support, Johnston exhorts: essary—a position that ana-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 3


Mapping Culture

Interviews with analysts have often revealed a sense of being


overwhelmed by the scope of cultural data that are relevant to
their accounts, and of dismay at the length and depth of the his- amorphous and often inter-
nally contradictory substance
torical knowledge necessary to capture a grand strategic pro-
we call “national culture” often
file of any region or group. suffer follies of overgeneraliza-
tion and static analysis, and
lysts schooled in the research and analysis forward they reach, as a consequence,
international relations para- within the community. Our questionable conclusions about
digms of realism and neoreal- research tool is designed to the sources of security policy. 12
ism are already trained to take. broaden the IC’s grasp of the Patrick Porter heaps heavy crit-
factors that drive outcomes, spe- icism on many of the West’s
Analysts also face institu- cifically cultural factors, and to nascent efforts at cultural anal-
tional obstacles to in-depth cul- help IC analysts be creative in ysis for making this mistake.
tural study. The organizations their collection of cultural data. He accuses military and intelli-
they work for are required to We make no attempt to deliver gence analysts of drawing static
produce large volumes of often the end point or last word in cul- portraits of Eastern cultures
tactical pieces on a daily basis. tural research. What we offer is rather than recognizing them
For some analytic assignments, an accessible research tool that as moving, flexing, human cre-
this pace can be relentless. IC can produce systematic, sophis- ations—and, in so doing, intro-
institutions simply do not have ticated surveys of cultural vari- ducing dangerous sources of
the manpower to pursue the ables, a grasp of which can error. a 13
type of cultural research greatly help US policymakers
employed by professional achieve desired outcomes and To reference “culture” in the
anthropologists: living in the avoid surprises. singular for any particular pol-
region for extended periods in ity is typically an error; there is
order to conduct ethnography rarely just one internal variety.
(participant observation) and to Research Philosophy Walter Russell Mead identifies
refine fluency in the local lan- Our experience in marrying four distinct narratives within
guage. Many analysts move cultural data and analysis to US strategic culture and posits
from one account to another the daily demands of defense that our various foreign poli-
during their careers and must and intelligence analysis has cies are formed from the “colli-
conduct cultural research via led to a few conclusions about sions and debates” those
short-term stays in theater, best practice. The most overrid- narratives inspire. 14 The idea of
brief stints of language train- ing of these is that sweeping composite cultures is not
ing, and information that can cultural profiles of a region or a restricted to analysis of the US,
be accessed from their desk or national group are of limited of course. Authors writing on
in library holdings. value in the intelligence indus- Germany, China, India, and
try for a number of reasons. As Iran, to name a few, all note the
Given this particular organiza- internal conflict of competing
has been effectively argued by
tional backdrop, our aims have cultural narratives about
Christopher Twomey, security
been modest but effective, we national security within these
studies that attempt to draw
hope, in moving cultural countries. 15 The existence of
predictive power from the

a Porter’s warnings are valid but may be a bit overstated. Today’s Department of Defense is not entirely uninitiated in doctrines of cul-

tural change. Leading-edge training methods emphasize “practice theory”—an approach to culture which treats the change dynamic as
central. Practice theory explains culture as a product of interaction between agent and structure and trains analysts to expect change
rather than stasis.

4 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Most academic work examining the impact of culture on securi-


ty policy mirrors the biases of the IC by privileging elite-level
multiple cultures is present not
only at the national level; it is culture (usually at the organizational level) over other types.
true right down to the ordinary
individual. As Kevin Avruch institutional and academic according to logical,
quips, “for any individual, cul- work already done on their understandable princi-
ture always comes in the topic and assess afresh which ples that every person
plural.” 16 The cultural influ- actors and cultural influences living in the culture must
ences at play on a single actor are most relevant for the policy understand, at least intui-
could derive from a background issue they are researching. In tively, in order to get
that features Northern Euro- some cases this may be a vastly along with each other.
pean, Catholic, engineering understudied section of the pop- With some basic study,
school, and family-specific ulation, one which has received [others] can also recog-
influences. little attention within official nize and understand these
channels, and one whose principles and apply that
Most academic work examin- research will require unortho- understanding to their
ing the impact of culture on dox (for the institution) survey operations. 18
security policy mirrors the and collection methods.
biases of the IC by privileging It is with our specific audi-
elite-level culture (usually at Culture at any level—organi- ence and these basic assump-
the organizational level) over zational, tribal, ethnic, tions about culture in mind that
other types. The typical justifi- regional, or national—is a we constructed the Cultural
cation of this approach is that dynamic human creation and Mapping method. It is pre-
while public opinion may play a subject to change, but this sented here in the step-by-step
peripheral role, “it is arguably should not discourage analysts process we have provided
the elite—owing to its role as from its study. Any tool devised recently to groups of analysts.
gatekeeper, its expert knowl- to track cultural influences
edge and its privileged access to must employ questions that
means of communication—that challenge previous assump- Cultural Mapping Exercise
ultimately decides which way tions, unearth fresh data, and
Step 1: Identify an Issue of
security policy goes.” 17 But this highlight possible areas of
Intelligence Interest
logic breaks down when one is change, but as Barak A. Sal-
The first injunction to ana-
assessing the impact of culture moni and Paula Holmes-Eber
lysts is to narrow the scope of
within the context of counterin- remind Marines who may be
cultural inquiry by isolating a
surgency and stability opera- intimidated by the complexity
particular policy question of
tions, for instance. Given the and movement of the cultures
interest. The narrower the
pivotal role of local popular they are studying:
issue, the more targeted the
opinion in this type of military
Although people are, by cultural research, and the more
engagement, understanding
nature, variable and likely it will yield actionable
public culture, the cultures of
unpredictable, they still data. The issue selected may
significant substate groups, and
need to work with others reflect a frequently asked ques-
how these affect security policy
in social and cultural tion that needs examining from
becomes paramount.
groups. These groups a new angle, or a question that
The research method pre- —and their associated policymakers are not ask-
sented here asks analysts to beliefs and struc- ing—perhaps due to ethnocen-
step outside the biases of the tures—are organized tric blinders, habit, or limited

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 5


Mapping Culture

knowledge of the region—but group properties. Analysts are the world works; and foreign
should be. invited to loop back to this youth who work part time at
stage after an initial round of America’s franchises may be
Step 2: Select an Actor research in order to disaggre- internalizing a strong dose of
Analysts are urged in the this gate, refine, or switch actor sets capitalist work ethic. We
step to isolate a particular pop- in a way most profitable for encourage analysts to consider
ulation for study. All “players” intelligence analysis. all plausible influences ini-
within this issue arena are tially, pursuing this as an
identified for consideration, Continued refinement occurs exploratory stage. Decisions
stretching to include some not to the central policy question as about which influences are
typically examined. A sampling well. Analysts may find that most relevant will come later.
of possible actors might include they were as captive to ethno-
prosperous urban elites, an eth- centric blinders as the clients Step 4: Explore the Cultural
nic subgroup, a particular gov- they serve when crafting the Data from Four Perspectives
ernment institution, a dissident initial intelligence question. In order to supply structure to
group, a village council, house- Looped-back refinements on the cultural exploration encour-
wives across a region, a youth this front are to be expected. aged in Step 3, we suggest the
bulge, or the cadre around a following four categories for
leadership figure. From among Step 3: Amass a Range of assessing cultural data: Iden-
these subgroups, or actors, one Cultural Influences tity, Norms, Values, and Percep-
is selected for focused study. Assuming Avruch’s logic that tual Lens. This is not an
This actor may be the one all individuals and groups pos- exhaustive list of important cul-
expected to play the most piv- sess culture in the plural, ana- tural factors but is a useful
otal role in a particular out- lysts are asked to map out the starting point in examining cul-
come on the issue selected or various cultural influences ture from four policy relevant
one that is dangerously under- which may guide the behavior perspectives. The categories are
studied and may present a wild of members of this distinctive enough from one
card for the future. group—again, within the con- another to inspire different sets
text of the issue they are assess- of questions and elastic enough
The actor in question need not ing. These influences range to capture a wide range of data:
have a discernible “group cul- from the local, such as clan,
ture.” The important question tribal, or organizational cul- Identity: The character traits
here is not “what is this actor’s tures, to wider cultural influ- the group assigns to itself, the
culture?” but rather “what cul- ences, such as regional, ethnic, reputation it pursues, and indi-
tural influences will weigh in religious, national, gendered, vidual roles and statuses it des-
on decisionmaking on this issue socioeconomic, or generational. ignates to members.
for members of this group?” Analysts need not confine
themselves to fleshing out “typ- Norms: Accepted and
The mapping exercise is ical” cultural influence sets but expected modes of behavior.
designed as a looping process. rather think expansively and
The actor who seems most rele- creatively about the specific Values: Material or ide-
vant initially may fade into the group they are studying. ational goods that are honored
background as research pro- or that confer increased status
gresses and the salience of New forms of social media to members.
other actors becomes apparent. have norms embedded and
Conversely, the initial actor learned by new users; a leader- Perceptual Lens: The filter
may remain of interest but ship cadre hailing from a simi- through which this group deter-
emerge as a far more complex lar educational institution may mines “facts” about others.
entity once research magnifies espouse a common view of how

6 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Unearthing and isolating factors that might be captured as


identity, norms, values, and perceptual lens is a messy busi-
Analysts receive an in-depth
ness.
list of questions for each cate-
gory. a The magnitude of cul-
tural data unearthed in • Would our proposed changes answers are readily apparent
answering the questions in in this policy area offer group and attainable. The reality is
these four categories may be members a way out of increas- that unearthing and isolating
managed by keeping a litmus ingly unpopular normative factors that might be captured
test for policy relevance in practices? Which members? as identity, norms, values, and
mind. An initial short list of perceptual lens is a messy busi-
questions might examine the Values. ness. It involves doing heavy
issue selected in Step 1 in the amounts of open-source read-
ways below. • What is considered “honor- ing, using the research skills
able” behavior in this issue honed in graduate school
Identity. area? (rather than the typical day-to-
• Which local values may be in day practices of the intelli-
• Which factors surrounding gence business), and wading
this issue would cause this conflict with our approach to
this issue? through a lot of data of ques-
actor’s identity to be threat- tionable relevance.
ened? Alternatively, which
might provide the US com- • Which values might be co-
opted in moving US interests Most analysts need to take
mon ground for co-option? themselves off-line for a period
forward?
in order to accomplish this task
• Is group cohesion strong along with any effectiveness. This
identity lines in response to • Where might value differ-
ences between target groups sort of research does not mix
this issue? What would cause well with the often frenetic pace
the group to fracture or to present an opportunity to
exploit cleavages? of producing current intelli-
unite behind a common front? gence. Some offices have been
• What individual roles and sta- Perceptual Lens: particularly proactive in this
tuses might group members regard and have offered their
• What are the preconceived analysts short sabbaticals in
seek to protect? notions of this group concern- order to get them away from
Norms. ing the behavior and charac- their desks. These intelligence
ter of the United States? officers remove themselves to a
• Does this issue place social separate location—in most
institutions or common prac- • What are group’s beliefs about instances to an institution with
tices under threat? the future? significant holdings on their
• What hurdles must we over- area of interest—to conduct
• Which practices are deeply research. Other offices have
internalized and likely to come in messaging to this
group on this issue? assigned analysts into research
inspire resistance? or methodology teams where
This tidy and rather simple they can focus on a long-term
• Which practices are compati- research endeavor with the nec-
ble with US interests on this list of questions may provide
the false impression that the essary consistency.
issue?

a The questions are contained in an appendix available in digital versions of this article.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 7


Mapping Culture

Most analysts need to take themselves off-line for a period in


order to accomplish this task with any effectiveness.
tory but of a glorious defeat in
1389 at the hands of the Otto-
After immersing themselves One way to gauge those aspects man Turks. Serbs celebrate the
in what cultural data is avail- of history relevant to the issue valor of the war’s hero, Prince
able through official channels, being tracked is to pay atten- Lazar, who received a heavenly
open-source searches, and (ide- tion to historic references made visitation on the eve of battle
ally) visits to the region, ana- when the policy issue is and was told that unless he sur-
lysts begin to identify cognitive addressed, whether in political rendered he faced certain
gaps in previous modes of anal- rhetoric, private conversation, defeat the next day. Given the
ysis. In addition to benefitting lessons in school, or expres- choice, Lazar declared that it
from new data accumulated on sions from the artistic commu- was better to die in battle than
their account, they become far nity. Which narratives do to live in shame. 21 He did pre-
more attuned to what they politicians draw on to legiti- cisely that—and became
don’t know—what information mize their behavior on this cemented in Serbian legend.
the institution is not collecting. issue and to pacify the public?
Identifying key knowledge gaps Which narratives work? Which This tale permeates Serbian
means coming up with creative do not? society. It is taught to young-
solutions for going after the tar- sters in school and is repre-
get data. Time constraints limit Physical manifestations such sented in homes and offices in
the ability of intelligence ana- as architecture, street names, the renowned painting “Kosovo
lysts to employ extended eth- statues, and memorials demon- Girl.” Most analysts working
nography as a tool, and strate which aspects of a this issue were familiar with
institutional restraints can nation’s history it chooses to these aspects of Serbian cul-
limit the ability to employ preserve and celebrate. Find- ture but lacked a method for
methods pursued by academic ing and understanding the tracking and weighing them
or other institutions. The fol- selection of heroes, for exam- systematically and thus acquir-
lowing is a collection of cul- ple, lends itself to understand- ing the footing necessary to
tural research strategies ing national values. 19 Of articulate persuasively to poli-
proffered by a variety of ana- particular interest are those cymakers the potential impact
lysts representing the full symbols that people volun- on Serbian behavior: that is,
range of experience, with some tarily display in their homes. 20 that Serbia would find victory
residing in academic venues by standing up to an overpow-
and others in policymaking Understanding historic narra- ering military force when the
forums. tives can be critical to making world expected it to fold.
sense of the strategic choices of
Historical Narratives foreign populations. The 1999 Understanding the weight of
Nearly all analysts begin with bombing campaign against Ser- this narrative for Serbs in
the assumption that one must bia supplies an example. US defining honorable conduct dur-
conduct a thorough back- analysts vastly underestimated ing war would probably have
ground investigation to become the duration and expense of the disabused planners of the idea
familiar with a regime’s his- 1999 engagement, in part that the bombing campaign
tory, geography, internal social because they undervalued the would be over quickly. Instead
codes, and general interactions role of historic narratives of vic- of projecting a three-day cam-
with other states. If not con- tory and defeat. Serbia’s paign, we might have helped
ducted with strategic efficiency, national holiday is not a cele- policymakers plan for a cam-
this task can be overwhelming. bration of a past battlefield vic-

8 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Useful interaction with the population under survey can range


from rudimentary (daily records of anecdotal interaction) to
paign closer to the almost 80
highly institutionalized methods (sophisticated polling conduct-
days it eventually took. 22
ed nationwide).
Tapping into the Population
Useful interaction with the language modes, and percep- story.” 30 The patterns and
population under survey can tual lens of the local themes developed across con-
range from rudimentary (daily community. 27 A key keeper may versations helped uncover gen-
records of anecdotal interac- be institutional. In determin- erally accepted notions about
tion) to highly institutionalized ing core values within Israeli self and others. Additional
methods (sophisticated polling society, Greg Giles looked first probing may reveal notions of
conducted nationwide). 23 One to shared, institutionalized identity—what is taken for
popular method for both insti- socialization processes. He pin- granted as a natural role for
tutions and individual pointed the Israeli Defense the nation, what is expected,
researchers is targeted focus Force (IDF) since universal con- and what is controversial. 31
groups. Much has been written scription requires that all
on this particular survey tech- Israeli citizens experience One inventive young scholar
nique, but the advice of ana- socialization and training from Monterey’s Naval Post-
lysts in the field is that through this institution. Giles graduate School proposed an
effective focus groups must be points out that it is not just alternative to official poll-
preceded by an in-depth study contact with the institution ing—the systematic study of
of the issue at hand so that the that matters, but institutional “RUMINT” (rumor
interviewer can select a sam- legitimacy. The IDF meets intelligence). 32 She surveyed
pling of relevant focus group these criteria based on the high and prioritized the issues on
participants and frame ques- number of young people polled the minds of Iraqis by tracking
tions appropriately. 24 who said they would be willing the frequency of rumors that
to serve in the IDF even if it appeared in local print. One of
One selection device employed were an all-volunteer force. 28 her findings, a surprise for US
by ethnographers is to narrow forces at the time, was that a
interviews to “key informants” An important window into large swath of Iraqis believed
of local culture. 25 Key infor- norms and the color of a group’s the United States was behind
mants can range from subject perceptive lens is the “conven- the insurgency. Their belief
matter experts to those who are tional wisdom”—the things stemmed not so much from an
cynical about their own culture “everybody knows.” 29 Compil- assumption that the United
and are therefore observant, ing and analyzing oral tradi- States was malicious but from
reflective, and articulate. a 26 tions may take a number of the perception that it was
different forms. The author of a impossible that a superpower
A variation on key infor- recent popular survey of Iran with the might of America
mants is “key keepers” of cul- attempted to do this by engag- could not stop the insurgency if
ture. These people are defined ing in dialogue with persons it wanted to. Therefore, the
by frequent contact and from a sampling of all of the United States must be behind
extended conversation with society’s castes and factions and it. Her work produced a num-
other members of the commu- starting each conversation with ber of timely insights for US
nity. As a result, the key keep- the same request: “Tell me your
ers tend to harbor the notions,

a Bernard claims that cynical informants have consistently been his best sources over the years.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 9


Mapping Culture

Those not in-theater could use alternative approaches to track-


ing gossip networks.
vice, and health conditions) in
contrast to state claims about
officials concerning Iraqi atti- est living abroad are often its situation. 38
tudes and priorities. better at identifying beliefs and
norms in their home lands than Content Analysis of Texts
Those not in-theater could use fellow citizens left behind When evaluating national-
alternative approaches to track- because the students have level cultural threads, texts
ing gossip networks. Dr. Debo- experienced the contrast taught in school deserve spe-
rah Wheeler, a specialist in between their national beliefs cial attention. Classroom text-
Middle East studies, has and those of people in their host books explain perceptions of a
focused her research on online countries. 35 nation’s own history, its view of
discussions across her region others, acceptable methods of
—particularly among women Secondhand inter- warfare, and common justifica-
who otherwise do not speak out. views—interviewing those who tions for past behavior (norms).
Chat rooms and editorials frequently interact with mem- Societal values are taught to
posted in pseudonymous blogs bers of the culture—are also children explicitly, particularly
may be one way to evaluate the very useful, especially in cases in the early stages of educa-
thinking of otherwise reticent where the populace does not tion. Their texts may include
populations. 33 Christine Fair, feel comfortable speaking hero legends, songs, rhymes,
an analyst writing on Iran, sug- openly about its thoughts and fables and oversimplified anec-
gests another alternative to opinions. 36 In some cases it is dotes from the nation’s
firsthand interviews with citi- politically incorrect to speak of history. 39 Valuable cultural or
zens of a repressive regime: one’s historic culture, espe- political insights can be drawn
cially where security policy is from noting which figures are
Utiliz[e] consulates of concerned, so there is an celebrated, which are despised,
countries where Iranians absence of civil or political rhet- and why. 40 Education and other
seek US visas (India and oric on the topic. Rodney Jones socialization processes also
Turkey) to collect and notes the case of Japan, where result in a body of shared liter-
develop information dur- Jesuit priests who lived there ature considered “classic.” What
ing the visa interview for extended periods were more are the messages in this body of
process. Defense attachés likely than Japanese states- work? How widely are the clas-
may also engage their in- men to speak freely of Japan’s sics read? How often are they
country counterparts in history and predilections. 37 referenced? 41
countries where military
cooperation with Iran are Joe Bermudez, a longtime Military texts are essential
ongoing to gain insights Korea analyst, notes that when sources of information on the
into Iran. 34 information is hard to come by, values, identity, and acceptable
as it is with North Korea, even methods of achieving security
Expatriates are a self-selected interviews with travelers and a within a regime. Twomey rec-
group, often coming from within careful look at their photo- ommends a deep survey of all
a limited segment of society not graphs can prove beneficial. In sorts of doctrinal texts—tele-
representative of the broader North Korea’s case, it helps grams, military orders, descrip-
base. Despite this sampling unveil the genuine state of tions of training regimens,
drawback, interviews with this affairs for the state’s popula- diaries, memoirs, and communi-
group offer some value. Stu- tion (regarding, for example, cations between military
dents from the region of inter- roads, electricity, phone ser- leaders. 42 This study would

10 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Military texts are essential sources of information on the val-


ues, identity, and acceptable methods of achieving security
reveal national aspirations over within a regime.
time (identity), accepted norms
for achieving them, and per-
haps more particular values tity front, Glenn Chafetz, Hillel and entertainments originat-
such as views on the use of Abramson, and Suzette Grillot ing elsewhere. 49
manpower and loss of life. 43 employ content analysis of lead-
ers’ speeches in order to explain In order to understand iden-
Tracking Political Rhetoric the weapons acquisitions pat- tity distinctions within large
The key to analyzing political terns of diverse states. Their regions, one might systemati-
rhetoric effectively is under- research presents a strong cor- cally observe social ceremonies
standing, in local context, the relation between four identity and rituals. What is the pur-
role it plays in communicating typologies and a “marked ten- pose of the ceremony? Who
with the population of interest. dency toward nuclear attends? 50 Which norms viola-
Russia analyst Fritz Ermarth acquisition.” 47 The method tions are publicly punished?
notes that a first step in weigh- Chafetz et al. suggest for cod- Which achievements publicly
ing the value of political rheto- ing role conception can easily be celebrated? One daily ritual
ric within a nation is to track duplicated for other issues. that often sheds light on iden-
its correlation with actual tity and value structure is the
behavior in the past. Tracking Extended Observation of protocol of salutations, espe-
over time and across politi- Public Behavior cially in conversations between
cians may yield useful general- Public reactions to the moves members of the population
izations about government made by state leadership may meeting for the first time. How
speeches as indicators of sin- highlight areas of congruence or does one introduce oneself? Is it
cere goals and security cleavage between the under- by way of profession, clan ties,
objectives. 44 On China, Twomey standing of values and norms or religious affiliation? 51 Which
points out that the culture fostered by the populace and aspects of personal identity are
tends to weigh private com- the behavior of state officers. most valued?
ments more heavily than pub- Disaffection may come in the
lic statements and that form of protest, local grum- Humor can serve as a useful
inflammatory public state- bling, or biting humor pointed test for one’s grasp of the cul-
ments need to be qualified at political officials, while con- ture under study. What does
accordingly. 45 gruence might manifest itself this group find funny? Why?
through strong turnout for Which alternative group is con-
Once understood, public rhet- state events and parades, vol- sistently used as the object of
oric may represent a rich data untary displays of state insig- ridicule? Which of the alterna-
field for assessing norm nia, or healthy membership in tive group’s characteristics are
strength or identity trends. The state-related organizations. 48 subjected to mockery? How does
work of Andrew Cortell and Congruence or cleavage this illuminate the values of the
James Davis, as well as that of between separate identity group being tracked? What does
Paul Kowert and Jeffrey Legro, groups may be manifest in part it say about their perception of
suggests measuring a norm’s by the degree to which the tar- others?
strength by the frequency with get group is willing to accumu-
which it is referenced by states- Language is an indispensable
late and incorporate traditions
men proposing a course of source of cultural information.
of food, dress, verbal expres-
action or legitimizing one Not every analyst is going to
sion, names given to children,
already taken. 46 On the iden- have the opportunity to become

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 11


Mapping Culture

Entertainment media provides valuable insights for those seek-


ing to understand the current state of a particular set of norms
nizations, media outlets must
within a society.
present a worldview comfort-
able to their audience. The
fluent in the local tongue but In a free society, the bounds worldview captured in news-
will find that pursuing even and content of political debates casts validating (especially con-
novice-level language compe- channeled through the press troversial) state actions may
tence may yield cultural can identify not only cleavages illuminate popular perspec-
insights. Concepts that a popu- in the strategic and political tives and narratives that more
lation values are often assigned culture but also points of popu- formal instruments for measur-
more words than those that are lar congruence. 54 Sometimes ing opinion would miss. 56
not. Recent research suggests what is not addressed is as
that language has a profound interesting as what is. Christo- Entertainment media pro-
impact on our perceptual lens. pher Meyer and Adrian Zdrada vides valuable insights for
It registers the content of our isolated a pronounced identity those seeking to understand the
memories—the aspects of real- aspect to Poland’s willingness current state of a particular set
ity that we record, and how we to ally with the United States of norms within a society. The
record them. 52 in our runup to the invasion of fabric of television sitcoms is
Iraq in 2003 through content the exaggerated presentation of
Evaluating the Output of the analysis of press debates on the social faux pas and situational
Media and the Artistic issue. Their research revealed conundrums. 57 Sitcoms are also
Community an absence of serious security a helpful reference for illustrat-
Depending on the level of discussions relating to Iraq and ing a culture’s typical problem-
independence enjoyed by news, strong emphasis on establish- solving devices and for illumi-
entertainment, and artistic ing Polish identity as a reliable nating changes underway in
producers within a popula- US partner. The identity basis society by poking fun at norms
tion, these may yield signifi- of Poland’s participation helps that are in flux. TV dramas
cant insight into a group’s explain why the failure to serve a different purpose—they
identity and its core norms unearth weapons of mass most often focus on norms vio-
and values. Twomey notes the destruction in the Iraqi theater lations that are serious enough
onerous level of work involved did not diminish the enthusi- to be considered tragedy and
in a comprehensive review of asm for the US alliance in represent a shared core of val-
these sources and commends Poland as it did in Great ues across the society.
two authors who have tackled Britain. 55
it: Peter Hays Gries on China,
Free media may also serve as Step 5: Assemble Critical
and Ted Hopf, on Russia. 53
a reliable watchdog for norms Cultural Factors
Even completely controlled
media may still offer material violations within the state. For After analysts have worked to
for cultural analysis. State example, the flurry of reporting fill cognitive gaps and amassed
propaganda illuminates the in the United States on a sizeable accumulation of cul-
identity, norms, and values excesses in Guantanamo and at tural data, they are then pre-
that the state hopes to Abu Ghraib manifest norms sented with the painful task of
achieve, as well as the narra- violations that are considered setting much of it aside—hon-
tive it hopes will dominate serious and newsworthy in the ing their data down to those
popular perception. United States but may not have cultural factors that are likely
been treated that way in other to play a role in the decision-
countries. As commercial orga- making of this group on this

12 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

The cultural factors that emerge from this rigorous culling pro-
cess are the Critical Cultural Factors (CCFs).
issue. The analyst’s instruc-
tions are to evaluate each cul-
tural factor according to: cymakers? To what degree are play on this issue (i.e., tribal,
we confident that behavior will sectarian, professional/organi-
• Relevance for the issue reflect this cultural influence? zational), or are cultural influ-
selected. How many types of research ences widely dispersed and
sources or methods validate unlikely to provide anything
• Robustness of the factor. a 58 this finding? close to a clear script for action?
•How well established is it?
Step 6: Mapping Step 7: Writing the Paper
•How widely shared is it
among members of this After an analyst has isolated Based on the outcome of the
group? the relevant set of CCFs, she is mapping exercise, a finished
asked to map the primary Cultural Topography paper will
•To what extent is opinion or source of each from among the define for the reader first,
behavior that is inconsis- various cultural influences which aspects of identity,
tent with this aspect of iden- identified in Step 3 (national, norms, values and perceptual
tity, norms, values, or ethnic, tribal, professional, lens are most important to
perceptual lens rewarded or etc.). Are the identity compo- understand when the United
punished internally by other nents on the CCFs list confined States engages this actor on
members of this group? primarily to one domain (i.e., this issue, and second, the prob-
tribal), or shared across other able influence boundaries of the
• Likelihood of this cultural fac- sources of cultural influence CCFs identified. These CCFs
tor to provoke a Response (i.e., ethnic and religious)? provide the primary focus of the
(cooperative or conflictual) What about critical norms and paper. The paper answers, in
when external actors engage values? What about critical specific terms, the following
this group on this issue. aspects of the group’s percep- questions:
tual lens?
The cultural factors that • Which CCFs represent points
emerge from this rigorous cull- The purpose of this portion of of possible leverage and coop-
ing process are the Critical Cul- the mapping exercise is to eration?
tural Factors (CCFs) for this define—for the analyst as well
group on this issue and will be as the eventual audience of her • Which CCF red lines are
the concepts that are addressed intelligence product—the influ- likely to spark resistance or
in the finished intelligence ence boundaries of the CCFs. even armed conflict between
product. In intelligence terms, Are they spread across the cul- foreign elites and their
each factor must be solidly con- tural landscape or confined to broader populations or
nected to a “so-what.” What one or two key cultural influ- between foreign populations
impact is it likely to have on ences? Is there a clear, some- and US actors?
outcomes of interest to US poli- what bounded, cultural force at

a The work of Jeffrey Legro may serve as a useful reference point for this task. He has written extensively on measurement of norm

strength and his work on norms probably has some transferability to identity, values and perceptual lens. He proposes that a norm be
evaluated according to three criteria: how clearly it is recorded in the rules of society (specificity), how long it has existed within this soci-
ety and its strength in standing up to normative competitors (durability), and how widely it is accepted and referenced in discourse (con-
cordance).

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 13


Mapping Culture

A handful of papers based on the Cultural Topography method-


ology have been produced, but they have prompted reaction to
one of only two items—from a
suggest the method offers a way to add analytic value.
large pile of intelligence mate-
rials—he wanted sent back to
• Do most of the CCFs stem Initial Impact of Cultural his office for further study. Sev-
from one cultural tradition or Topography eral senior commanders also
source of influence (i.e., eth- expressed significant interest
nic, religious, tribal)? If so, Only a handful of papers based in this paper.
what else do we need to know on the Cultural Topography
about this cultural domain in methodology have been pro- Additional reactions have been
order to acquire adequate con- duced, but they have prompted consistent with those noted
text for understanding the sufficient reaction to indicate above, but only the continued
CCFs in question? that the insights they offer get application and refinement of
beyond the general body of infor- this tool will fully display
• Are the members of the group mation already grasped by most whether its potential is great or
under study drawing from analysts and policymakers, and limited. The methodology is
multiple cultural tradi- early reactions to such insights being taught in at least one IC
tions/influences when they suggest that the methodology institution, and several new Cul-
respond to this issue? Will it offers a way to add analytic tural Topography papers are in
cause them to fracture when value: motion now. The main challenge
pressure is exerted on the to pursuing and exploiting this
myriad aspects of this issue? • In a meeting that was part of a approach within the IC is the
US policy review on a specific pressure of daily production
• To what extent do adversarial country, an attendee not famil- driven mostly by conventional
groups in the region share the iar with this methodology collection and analysis. Cultural
same cultural mapping on reported that several analysts, Topography holds no promise of
this issue as the group under authors of a Cultural Topogra- advancing the understanding of
study, reflecting common phy paper on this country, cultural influences on foreign
sources of cultural influence? “quickly proved themselves to perceptions and actions unless
Where is this not the case? be as smart or smarter on researchers are given the time to
How does that inform fore- [country of focus] than anyone find additional, often novel data
casting on future cooperation else in the room…on history, and then to incorporate them
or divergence between these ethnic topography.” It is worth into the tool.
groups? adding that the room was filled
with experts who had spent (The appendix and endnotes.
• Within which tradition will significantly more years on the are available in the digital ver-
our messages to this group on subject than had these ana- sion of this article.)
this issue be most persuasive? lysts.
❖ ❖ ❖
• How likely are other groups • While traveling abroad, a spe-
across the region to respond cial envoy with significant
in similar fashion when pre- expertise selected one of the
sented with this issue? Cultural Topography papers as

14 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Appendix A

Cultural Analysis

Concepts and Questions

Identity

•Is individual identity seen as comprising one’s distinct, unique self, or is it bound up in a larger
group (family, clan, tribe)? 59

•Does this group see itself as responsible for and capable of solving social problems? Are prob-
lems responded to with energy or left to fate?

•Which myths and national narratives compose the stories everyone knows? How do these speak
about group identity?

•What is this group’s origin story? Does it inform group members of their destiny?

•What would this group list as defining traits of its national, tribal, ethnic character?

•Is one aspect of identity being overplayed, not because it is foundational for most decisions but
because it is being threatened or diminished?

Values

•For the linguist, which concepts/things are described in nuanced ways (meaning that many words
have been assigned to them)? Which concepts are missing from the language? (For example,
the concept of “fair play” is hard to find outside of English.)

•What generates hope in this population?

•Which is viewed more highly as a communicative tool—emotion or logic? Are conversational


styles which emphasize logic viewed as trustworthy?

•Is conspicuous consumption valued as a status marker? If not, what incentives exist to work hard?

•To what extent do security concerns trump liberty concerns in this society? Which parts of liberty
are deemed attractive?

•Is social mobility considered a good thing, or is it deemed disruptive to a highly organized sys-
tem? Would this group fight to keep a hierarchical arrangement even if offered opportunities for
egalitarianism?

•To what extent does loyalty trump economic advantage?

•Which is more value-laden for this group—“progress” or “tradition”?

•Is optimism rewarded as a character trait or is it considered naive, juvenile, and possibly danger-
ous?

•Which character qualities are consistently praised?

•What composes the “good life”?

•What sorts of myths, hero figures, segments of history, or identity markers does the material cul-
ture celebrate? What is revealed by the decorations in homes, modes of dress, food eaten (or not
eaten), monuments respected (as opposed to those covered with graffiti), gifts given, etc.?

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 15


Mapping Culture

•In describing a proposed project, what will “impress” this audience? The project’s size? Its histori-
cal relevance? The technology used to produce it? How might new projects best be framed in
order to win popular support?

NORMS

Political
•What is considered a legitimate pathway to power? How do “heroes” in film and other popular
media obtain their power? Do they act as isolated individualists or in concert with others?

•“What gives a public the comfortable feeling that the way that decisions are reached and leaders
are chosen is ‘right’?” 60

•How does the group view compromise?

•Where does “genuine” law come from? (Nature? God? A constitution? Current political institu-
tions? Imagined, future institutions? Moral conscience? A personality from the past?)

•Is adherence to state-manufactured law admired or disdained? To what extent is state law equated
with “right” and “wrong”?

Social
•Is social status in this society primarily ascribed (i.e., one is born into it) or achieved? If achieved,
how so? 61

•What are the primary markers of a person of high rank in this society? How would you recognize
him/her? Does political power or intellectual prestige rank higher than economic surplus?

•What is the process for establishing trust? How does one know when it has been achieved?

•Do people perceive their own place and the dominant hierarchy as natural?

•To what extent are subordinates responsible for their own actions? 62

•What do proverbs say about social expectations and the perceived pathway to success?

Economic
•What are the group’s views on work? Which types are admired? Which are disdained? What are
the economic implications?

•Which economic activities are considered immoral?

•Is it considered appropriate to “master” the natural environment and bend it to one’s will?

•To what extent is the economy intertwined with kin obligations?

•What are obstacles to private property ownership?

•How does this culture group stack up when evaluated against the traits some claim are necessary
for successful market economies? 63 These can include:

•Is there trust in the individual?

•Are wealth and resources perceived as finite or infinite? Is the focus on “what exists” or “what
does not yet exist”?

•Is competition seen as healthy or unacceptably aggressive?

•Is this society comfortable with a questioning mind?

•Does the education system encourage investigative learning?

16 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

•Are the “lesser virtues”—punctuality, job performance, tidiness, courtesy, efficiency – admired?

•Which are emphasized—small achievements accomplished by the end of the day (prefera-
ble for market economies) or grandiose projects (the unfinished megaworks of progress-
resistant economies)?

•What is the “radius of trust” in this community? Is trust extended to family only? How far does it
extend to strangers? 64

•What are prestige commodities within this community? Why? Might these serve as stronger incen-
tives for cooperation than direct funding?

•Is risk taking admired or negatively sanctioned? How widely spread is the “harm” of individual fail-
ure (damages family honor, potentially ignites retribution cycle, etc.)?

Security
•What defines “victory” for this group in a kinetic conflict?

•What types of battlefield behavior would result in shame?

•What level of internal destruction is acceptable?

•How do accepted myths describe this group’s military history? What is its projected destiny?

•Are allies viewed as reliable, or historically treacherous? What is the resultant ethic regarding alli-
ance loyalties?

Time/Change Orientation
•Does this group behave according to linear time? Is there a marked contrast between rural and
urban regions? Do deadlines matter? 65

•What is the future orientation of this group? Does it see itself as capable of changing the near
future? Is it deemed appropriate or laudable to make aggressive efforts to do so?

•Which time frames are referenced with strong positive emotion—past or future scenarios?

•Is there a significant gap between socioeconomic expectations and reality? (This often is a precur-
sor of social shifts.) 66

Problem-Solving Devices
•What is the order of activities for solving a social problem (often called an action chain)? Does
face-to-face confrontation happen first or last? Is violence used as a signal or is it an endgame? 67

•How do those outside of official channels of activity (i.e. women in seclusion, youth in elder-ori-
ented cultures) play a part in problem-solving processes?

•Which is preferred—action or deep deliberation? Is this group comfortable with trial and error as a
discovery method?

•Are individuals comfortable with making a wide range of personal choices? Are individual choice
and accountability practiced social norms? Would the choices present in democratic and market
systems be overwhelming?

•To what extent must community consensus be reached in order for a decision to go forward?

PERCEPTIVE LENS

Cognitive processes
•What sources of information yield ‘truth’? Scientific/factual processes? Dreams? 68 Inspired author-
ity figures?

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 17


Mapping Culture

•Are most situations set into dichotomous frames? Are they made to be black and white? How com-
fortable are group members with situational complexity? How patient are they in working to
understand it?

Of Self
•What are the basic expectations about the future? (“Poverty becomes a greater problem the
moment wealth is perceived as a definite possibility.”) 69 How might typical aspirations within this
society be charted?

•How does this group characterize/perceive its own history? Which events are highlighted? Which
are omitted?

•What does this group’s history tell it about “dangerous” behaviors/circumstances for a society?
(For example, Chinese—chaos, Americans—tyranny).

Of Others Generally
•How do members of this group assign intentions? What motives make the most sense to them? (If
the best US intentions do not “make sense” to the host population, they will assign intentions that
do. It is to our advantage to understand and then emphasize areas of cognitive congruence when
embarking on joint ventures.) 70

•What is this group’s view on human nature? Are people generally trustworthy? Are they prone to
excess and beset by vices, or are they able to regulate themselves? How are these views used
for legitimating less or more government?

•How does this group obtain its information about the outside world? Which sources are consid-
ered most reliable? How are those sources biased or deficient?

•Are outsiders perceived as fundamentally different or fairly similar to group members?

Of the US Specifically
•What are regarded by this group as US vulnerabilities?

•What does this group believe drives Americans? 71 What do they value?

•Does this group see common ground with its American counterparts? In which areas?

•To what extent does this group believe American rhetoric matches intentions?

Cosmology (The way the world works...origin and structure of the universe)
•When explanations for events are not easily accessible, how does this group fill in the blanks?

❖ ❖ ❖

18 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Endnotes

1. J.M. Roberts, The Penguin History of the World (London: Penguin Books,
1995), xi–xii.
2. See reviews in this issue of three works on Vietnam, two of which suggest
this approach.
3. Special thanks go to David Newcomb.
4. Rob Johnston, Analytic Culture in the US Intelligence Community: An Eth-
nographic Study, (Washington DC: Center for the Study of Intelligence, 2005).
5. Ibid., 75–76.
6. Edward Stewart and Milton Bennett, American Cultural Patterns: A Cross-
Cultural Perspective (Yarmouth, ME: Intercultural Press, 1991), 11.
7. Johnston, Analytic Culture, 66.
8. Richards Heuer, Psychology of Intelligence Analysis (Washington DC: Cen-
ter for the Study of Intelligence, 1999), 21.
9. MG Michael T. Flynn (USA) et al., Fixing Intel: A Blueprint for Making
Intelligence Relevant to Afghanistan (Washington, DC: Center for a New
American Security, 2010)
10. Johnston, Analytic Culture, 8.
11. Ibid., 84.
12. Christopher Twomey, “Lacunae in the Study of Culture in International
Security,” Contemporary Security Policy 29 no. 2 (August 2008): 338–57.
13. Patrick Porter, Military Orientalism: Eastern War through Western Eyes,
(London: Hurst & Co, 2009)
14. Walter Russell Mead, Special Providence: American Foreign Policy and
How it Changed the World (New York: Alfred A. Knopf, 2001), xvii.
15. Anja Dalgaard-Nielsen, “The Test of Strategic Culture: Germany, Pacifism
and Pre-emptive Strikes,” Security Dialogue 36, no. 3 (September 2005):
339–59; Huiyun Feng, “A Dragon on Defense: Explaining China’s Strategic
Culture,” in Strategic Culture and Weapons of Mass Destruction: Culturally
Based Insights into Comparative National Security Policymaking, eds. J. L.
Johnson, K. M. Kartchner, and J. A. Larsen (New York: Palgrave Macmillan,
2009), 171–88; Rodney Jones, “India’s Strategic Culture and the Origins of
Omniscient Paternalism,” ibid., 117–36; Afshin Molavi, The Soul of Iran: A
Nation’s Journey to Freedom, (New York: W.W. Norton and Company, 2002).
16. Kevin Avruch, Culture and Conflict Resolution, (Washington DC: United
States Institute of Peace Press, 1998), 15.
17. Dalgaard-Nielsen, “The Test of Strategic Culture,” 342.
18. Barak A. Salmoni and Paula Holmes-Eber, Operational Culture for the
Warfighter: Principles and Applications, (Quantico, VA: Marine Corps Univer-
sity Press, 2008), 13.
19. J. Avalos, discussion with author Jeannie Johnson, 2006.
20. C. Boyd, discussion with author Jeannie Johnson, 2006

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 19


Mapping Culture

Endnotes (cont.)

21. Tim Judah, The Serbs: History, Myth and the Destruction of Yugoslavia,
(New Haven: Yale University Press, 2000), 39–47.
22. Author Jeannie Johnson was part of the team conducting intelligence
analysis of Serbia and surrounding countries.
23. K. Moss, discussion with author Jeannie Johnson, 2006.
24. W. Stanley, discussion with author Jeannie Johnson, 2006.
25. H. Russell Bernard, Research Methods in Anthropology: Qualitative and
Quantitative Approaches (Walnut Creek, CA: Alta Mira Press, 2002), 188–93.
26. Ibid., 190.
27. S. Kjar, discussion with author Jeannie Johnson, 2006.
28. Gregory Giles, discussion with author Jeannie Johnson, 2006. See Gregory
Giles, “Continuity and Change in Israel’s Strategic Culture,” in Johnson et al.,
Strategic Culture and Weapons of Mass Destruction, 97–116.
29. W. Stanley, discussion with author Jeannie Johnson, 2006.
30. Molavi, The Soul of Iran.
31. C. Boyd, discussion with author Jeannie Johnson, 2006.
32. Stephanie Kelley, “Rumors in Iraq: A Guide to Winning Hearts and
Minds,” Strategic Insights, 4 (2005). This journal, published by the Naval Post-
graduate School’s Center on Contemporary Conflict, is available on that orga-
nization’s website
www.nps.edu/Academics/centers/ccc/publications/OnlineJour-
nal/2005/Feb/kelleyfeb05.html
33. Deborah Wheeler, discussion with author Jeannie Johnson, 2006.
34. Christine Fair, “Iran: What Future for the Islamic state?,” in Angel M.
Rabasa et al., The Muslim World After 9/11 (Santa Monica, CA: The RAND
Corporation, 2004), 244.
35. V. Daniels, discussion with author Jeannie Johnson, 2006.
36. W. Stanley, discussion with author Jeannie Johnson, 2006.
37. Rodney Jones, discussion with author Jeannie Johnson, 2006.
38. Joe Bermudez, discussion with author Jeannie Johnson, 2006.
39. J. Moyes, discussion with author Jeannie Johnson, 2006.
40. S. Taylor, discussion with author Jeannie Johnson, 2006.
41. W. Stanley, discussion with author Jeannie Johnson, 2006.
42. Christopher Twomey, discussion with author Jeannie Johnson, 2006.
43. A. Haycock, discussion with author Jeannie Johnson, 2006.
44. Fritz Ermarth, discussion with author Jeannie Johnson, 2006.
45. Christopher Twomey, discussion with author Jeannie Johnson, 2006.
46. Andrew Cortell and James Davis, “Understanding the Domestic Impact of
International Norms: A Research Agenda,” International Studies Review 2, no.
1 (2000), 65–87; Paul Kowert and Jeffrey Legro, “Norms, Identity, and their

20 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Mapping Culture

Endnotes (cont.)

Limits: A Theoretical Reprise”, in The Culture of National Security, ed. Peter


Katzenstein (New York: Columbia University Press, 1996), 451–97.
47. Glenn Chafetz, Hillel Abramson, and Suzette Grillot, “Culture and
National Role Conceptions: Belarussian and Ukrainian Compliance with the
Nuclear Proliferation Regime,” in Culture and Foreign Policy, ed. Valerie Hud-
son (London: Lynne Rienner, 1997), 175. The authors also offer a list of seven
typologies unlikely to engage in illegal proliferation. The National Role typolo-
gies are slightly modified versions of those proposed by Kal Holsti. See Kal
Holsti, “National Role Conception in the Study of Foreign Policy,” Interna-
tional Studies Quarterly 14 (1970): 233–309.
48. G. Lawrence, discussion with author Jeannie Johnson, 2006.
49. D. Anderson, discussion with author Jeannie Johnson, 2006.
50. L. Wilde, discussion with author Jeannie Johnson, 2006.
51. A. Richey, discussion with author Jeannie Johnson, 2006.
52. Lera Boroditsky, “Lost in Translation,” Wall Street Journal, 24 July 2010.
53. Peter Hays Gries, China’s New Nationalism: Pride, Politics, and Diplo-
macy, (Berkeley, CA: University of California Press, 2005); Ted Hopf, Social
Construction of International Politics: Identities and Foreign Policies, (Ithaca,
NY: Cornell University Press, 2002).
54. G. Giles, discussion with author Jeannie Johnson, 2006.
55. Christopher Meyer and Adrian Zdrada, “Unpacking the ‘Coalition of the
Willing’: A Comparative Analysis of Norms in British and Polish Press
Debates on the Iraq Invasion,” European Security 15 (2006): 23–45
56. D. Anderson, discussion with author Jeannie Johnson, 2006.
57. C. Curtis, discussion with author Jeannie Johnson, 2006.
58. Jeffrey W. Legro, Cooperation Under Fire: Anglo-German Restraint during
World War II (Ithaca, NY: Cornell Univ. Press, 1995); Legro, “Which Norms
Matter? Revisiting the ‘Failure’ of Internationalism,” International Organiza-
tion 51 (1997): 31–63. Kowert and Legro, “Norms, Identity, and their Limits,”
451–97.
59. Thomas Hylland Ericksen, Small Places, Large Issues: An Introduction to
Social and Cultural Anthropology, 2nd ed. (Sterling, VA: Pluto Press, 2001),
54–55; Stewart and Bennett, American Cultural Patterns, 129–38.
60. Glen Fisher, Mindset: The Role of Culture and Perception in International
Relations, 2nd ed. (Yarmouth, ME: Intercultural Press, 1997), 95.
61. For examples, see ibid., 52, 64.
62. For discussion, see Ericksen, Small Places, Large Issues, 155.
63. Mariano Grondona, “A Cultural Typology of Economic Development” in
Culture Matters: How Values Shape Human Progress, eds. Lawrence E. Harri-
son and Samuel P. Huntington (New York: Basic Books, 2000).
64. The basic theory: the wider the radius of trust, the easier to engage in
economies of scale market economics. See Francis Fukuyama, “Social Capital”
in Culture Matters.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 21


Mapping Culture

Endnotes (cont.)

65. A nice discussion of time orientations and why they matter can be found in
Stewart and Bennett, American Cultural Patterns, 73–76.
66. For diverse examples see Fisher, Mindset, 52.
67. A nice discussion of this, with diverse examples, can be found in Edward T.
Hall, Beyond Culture (New York: Anchor Books, 1989), 157–59.
68. Stewart and Bennett provide an interesting insight on this point in Ameri-
can Cultural Patterns, 62–65.
69. Ericksen, Small Places, Large Issues, 251.
70. For good examples, see Fisher, Mindset, 52.
71. Americans tend to overemphasize similarity. See Stewart and Bennett,
American Cultural Patterns, 11.
❖ ❖ ❖

22 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Improving Policymaker Understanding of Intelligence

An Educated Consumer Is Our Best Customer


Dennis C. Wilder

This essay was a recipient of the top prize in the 2010 Galileo Intelli-
gence Community Award competition. The competition, held annually
since 2004, is intended to provide active members of the Intelligence
Community opportunities to put forward innovative ideas.—Editor

It may seem odd to title a icy-intelligence interface and


paper on Intelligence Commu- implementing a strategic com-


The quality of service a
consumer receives from
the IC depends heavily
nity (IC) innovation in the 21st
century with the commercial
slogan made famous by dis-
count clothier Sy Syms. But
munications strategy that
leverages new social media so
that the American people and
the policy community will bet-
this slogan holds the key to ter understand and appreciate
on the expertise and solving some of the challenges the centrality of the Intelli-
experience that the vexing IC leaders that span gence Community to national
policymaker or legislator issues from policymaker expec- security.
brings to their interaction tations to intelligence budgets
with the IC. to public perceptions of the IC.
At the core of this paper is the Taking Our Customers’
Knowledge of Us for


contention that we have
neglected the education of our Granted
customers—defined as Policymakers who are steeped
appointed and elected officials in the ways of the Intelligence
and the American public—to Community (IC) know how to
our own detriment. The quality get superior service and sup-
of service consumers receive port. Former Acting Director of
from the IC depends heavily on Central Intelligence John
the expertise and experience McLaughlin, from his years of
that policymakers or legisla- experience, explained the savvy
tors bring to their interaction policy consumer of intelligence
with the IC. Our chronic fail- this way:
ure to communicate across the
policy-intelligence divide has Policymakers who knew
led to pent-up frustrations on how to use intelligence
both sides and, too often, generally had a realistic
charges of intelligence failure. view of what it could and
This proposal provides a series could not do. They under-
of recommendations for the stood, for example, that
ODNI on redesigning the pol- intelligence is almost

All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US govern-
ment endorsement of its factual statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 23


Introducing Policymakers to Intelligence

Too often policymakers with no or little exposure to the IC, es-


pecially in the case of the novice policymakers, find themselves The First Customer Will
in a frustrating maze. Always Come First
Who are the IC’s customers?
Our most important customer
always more helpful in sumer did not have the sophis-
is and will remain the presi-
detecting trends than in ticated understanding of IC
dent. He is well served through
predicting specific events. capabilities and limitations
his direct relationship with the
They knew how to ask that would allow them to ask
director of national intelligence
questions that forced the right questions, of the right
and he, each day, receives the
intelligence specialists to people and at the right moment
finest intelligence publication
separate what they actu- to get the best information and
in the world, the President’s
ally knew from what they analysis. Frequently, this has
Daily Briefing (PDB). The his-
thought. They were not led to charges of intelligence
tory of the PDB is one of flexi-
intimidated by intelli- failures because the policymak-
bility and remarkable
gence that ran counter to ers had unrealistic expecta-
adaptation of support to fit each
the prevailing policy but tions of what the IC could do.
president’s needs and informa-
saw it as a useful job to
What we have is a failure to tion acquisition styles. 3
thinking about their
courses of action. 1 communicate across the IC-pol-
I would argue, however, that
icy community divide. Gregory
historically we have not done
My observations during more Treverton, a senior RAND
justice to the rest of our custom-
than four years of service on scholar of the intelligence-pol-
ers, from policymakers below
the National Security Council icy interface had a particularly
the president to the members of
have led me to conclude that useful explanation of why IC
the US Congress to the Ameri-
policymakers with no or little experts typically fail to meet
can public, in large measure
exposure to the IC, especially in the expectations of eager, new
because we have neglected edu-
the case of novice policymak- policymakers out to change the
cational outreach and strategic
ers, too often find themselves in course of history.
communications. Without such
a frustrating maze that
Intelligence analysts are outreach, and in a decade when
involves trial and error and
reflective by nature; they massive deficits burden the
dead ends in their attempts to
want to understand…. national budget and the compe-
get the right kind of intelli-
Policy officials, by con- tition for resources in the fed-
gence support. This inexperi-
trast, tend to be active; eral government will intensify,
ence can, and has, led to serious
they want to do, not just we are in danger of repeating
policymaker disappointment
to think. They came to the disaster that befell us at the
with IC products not because
the IC did not have the correct Washington to signify;
information or analytic insights they want to make a dif-
to offer, but because the con- ference…. If policy officers 2 Gregory F. Treverton, Intelligence for an

are to signify, they have to Age of Terrorism (Rand Corporation, Cam-


do so quickly; the average bridge University Press, 2009), 170–71.
3 For an excellent example of the kind of

1 John McLaughlin “Serving the National


tenure of an assistant sec-
close attention that has been paid to get-
Policymaker,” in Roger Z. George and
retary is not much more ting analysis right for presidents, see
James B. Bruce (eds.), Analyzing Intelli- than a year. 2 John Helgerson, CIA Briefings for Presi-
gence: Origins, Obstacles, and Innova- dential Candidates, (Washington, DC:
tions, 2nd Edition, (Washington, DC: Center for the Study of Intelligence, CIA,
Georgetown University Press, 2008), 72. 1996).

24 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Introducing Policymakers to Intelligence

How do we encourage deeper policymaker literacy about the


IC?
end of the Cold War with the
advent of the peace divi-
dend—debilitating budget cuts, Informed Policymakers
dangerously slashed human Such products, the author
intelligence capabilities, and How do we encourage deeper argued, are useful to a policy-
even debate about the neces- policymaker literacy about the maker needing to get up to
sity of the US Intelligence Com- IC? Brookings Institution in speed on a topic, but they tend
munity, the most expensive 2009 published a thoughtful not to force IC analysts to think
intelligence enterprise on the study by Ken Lieberthal—a for- through the implications of
planet. mer special assistant to a presi- their data, debate the relative
dent, senior director on the significance of different facts,
In the decade after 9/11, the NSC, and a long-time student of and make explicit their levels of
IC has demonstrated the cen- intelligence—analyzing the confidence in the responses
trality of intelligence to policy, strengths and shortcomings of they produce. In short, because
but that position may not be the IC in the wake of the our consumers are not well
secure as the memory of 9/11 2004–2005 intelligence reforms schooled in what we can pro-
fades and as we enter an era of that provides some clues. Liber- vide, we often fall short of help-
belt tightening. The new reality thal reported from his inter- ing them make deeply informed
that the US foreign policy views with then active and policy recommendations to the
establishment, and by exten- former policymakers and intel- president and his Cabinet.
sion the IC, faces is spelled out ligence professionals that most
in a thought-provoking book by policymakers are underedu- What can be done to create
Michael Mandelbaum in which cated in the use of intelligence intelligence-literate policy cus-
he warns that because of and have no systematic under- tomers? First, we need to
domestic obligations this coun- standing of the IC or of the understand that educating the
try faces, particularly caring for products they receive from the customer is an extremely diffi-
the ever increasing ranks of its IC. Moreover, he contended that cult task that we have never
older citizens, “The defining most policymakers are ill done well. We have avoided
fact of foreign policy in the sec- equipped to ask the right ques- tackling the issue because it
ond decade of the 21st century tions and therefore ask for can seem condescending and
and beyond will be ‘less.’” 4 briefings on topics that often can lead to charges of attempts
Thus, we are living in an era elicit “a relatively standard to politicize the relationship.
that none of us has ever experi- bureaucratic process that pulls Beginning with the legendary
enced because, unlike most together pertinent information Sherman Kent, we have ana-
countries, our economic con- and lays it out without serious lyzed exhaustively every aspect
straints have not affected US attention being given to priori- of the IC side of the relation-
foreign policy decision-making ties, underlying uncertainties, ship with the policymaker, and
for the past seven decades. and real insights.” 5 we have set up high firewalls
not to be crossed between the
policymaker and the IC produc-
ers. 6 We have as a result, after
each perceived intelligence fail-
5 See Dr. Kenneth Lieberthal, The U.S. ure, studied carefully what the
4Michael Mandelbaum, The Frugal Intelligence Community and Foreign Pol- IC did that led to that intelli-
Superpower: America’s Global Leadership icy: Getting Analysis Right, (Brookings gence mistake and then care-
in a Cash-Strapped Era, (New York:Public Institution, Foreign Policy Paper Series,
Affairs, 2010). Number 17, September 2009), 56.
fully schooled our officers to

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 25


Introducing Policymakers to Intelligence

I believe some of our problems only can be ameliorated by rad-


ically revising our interaction with new administrations from the
moment that presidential candidates are selected. we would propose to help the
team prepare to use intelli-
gence more efficiently and effec-
tively than any past
help them discern what consti- Steinberg, currently deputy sec- administration through a delib-
tutes success and failure in retary of state, lamented this erate and thoughtful education
intelligence analysis. lack of attention to the issue in process.
2008 saying, “Given the enor-
But I am unaware of any mous consequences of the evi- Obviously, this new process of
effort to systematically study dent breakdown apparent both education is far more complex
the policymaker’s role in either in the September 11 and Iraq than what I just outlined and so
intelligence successes or intelli- events, it is vital that practitio- let me present some of the foun-
gence debacles. Most often, if ners on both sides try to under- dational work that needs to be
policies work out, policymakers stand the challenges inherent done in advance of such an
will assume that it was their in the policy-intelligence inter- opportunity. Now in our third
hard work that made the differ- action and how to overcome the year of the Obama administra-
ence and, unfortunately, if there gulf and suspicion that haunts tion and with a new Congress,
is a policy debacle there is a this critical relationship.” 7 we have new faces involved in
strong tendency to blame the security policy. If the past is
community. any indicator, too many of these
Designing a New new officials will have come
We know what we could have Relationship with the into office, eagerly been read
done better on the Iraq WMD White House into their top secret codeword
issue because we have written clearances, and started reading
I believe some of our problems
excellent studies of our short- daily intelligence with only the
only can be ameliorated by radi-
comings, and we have appropri- most superficial understanding
cally revising our interaction
ately implemented systematic of what it is they are reading.
with new administrations from
changes to our analytic trade- Many will immediately be dis-
the moment that presidential
craft. I am, however, unable to appointed because they had
candidates are selected by their
find any parallel effort, either convinced themselves that, once
political parties and are given
within government or in aca- they got their clearances, they
their first national security
demia, to systematically edu- would see the “real secrets.” If
briefing. This is the point at
cate current and future they are lucky enough to have a
which the relationship with the
policymakers to maximize the personal briefer, this will help
next president and his core
utility of intelligence and to ask but too often the briefers them-
national security team—in
the right questions to avoid pol- selves are young and only
effect, his national security
icy failures because of inade- steeped in the intelligence anal-
players in waiting—forms and
quately tapping of the ysis side of this question.
needs to be shaped with brief-
capabilities of the IC. James
ings not only on top national
security concerns, but on how Creating Intelligence
Connoisseurs
6 For an example, see the incisive article

written by CIA analyst Jack Davis on the What is required is the equiv-
history of the debates over how to serve 7James B. Steinberg, “The Policymaker’s alent of the course now taught
the policymaker, “The Kent-Kendall Perspective: Transparency and Partner-
for analysts on the art of intelli-
Debate of 1949,” in Studies in Intelligence ship” in George and Bruce, Analyzing
1992, Issue 5. Intelligence, 83. gence analysis, but this would

26 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Introducing Policymakers to Intelligence

To provide the intellectual rigor needed to undergird a course


for new policymakers and Congress, the DNI also should seek
be for policymakers and mem-
bers of Congress—let’s call it,
out a partnership with prominent think tanks and relevant aca-
Applied Intelligence for the demic institutions.
Savvy Policymaker. With
today’s technology we are capa-
ble of deploying such a course Director of National Intelli- cor, the case studies might avoid
in various appealing media for- gence John Negroponte, Dep- recent politically charged con-
mats to include interactive on- uty Secretary of State Thomas troversies such as the issue of
line presentations. This course Pickering, US Trade Represen- intelligence support to decision
would not just be given by intel- tative Charlene Barshevsky, making on Iraq WMD but could
ligence professionals but co- Chairman of the Joint Chiefs of be just as useful if done on such
taught with former policymak- Staff Peter Pace, DCIA Michael issues as IC support to policy-
ers willing to share the lessons Hayden, DCI George Tenet, and makers on the Soviet Union or
they have learned in working Acting DCI John McLaughlin intelligence support during the
with the IC. Ideally, new policy- spring to mind but there are, of Kosovo conflict. 8
makers in the future would course, many others with the
want to take this course requisite expertise. Once case studies are drafted,
because it would be known to it would be in the best interest
provide them a sophisticated of the IC to present them to a
understanding of the IC under
Partnering with the conference of academics and
the ODNI. Demand for the Private Sector policymakers, current and for-
course would be high if it were To provide the intellectual mer, at a symposium for a real-
known that the president and rigor needed to undergird a ity check and fine-tuning. Such
his cabinet had endorsed it. course for new policymakers a symposium might be appro-
and Congress, the DNI also priately convened at one of the
Any attempt to design this should seek out a partnership presidential libraries and per-
course for new policymakers with prominent think tanks haps carried on CSPAN televi-
and members of Congress that and relevant academic institu- sion, providing the added
in exclusively done in-house is tions that span the political benefit of educating the gen-
vulnerable to charges of IC spectrum to design case study eral public on this new initia-
attempts at propaganda and materials from past policy suc- tive.
proselytizing. Also, we have cesses and failures analyzing
simply not developed a deep how policymakers either got the
enough understanding of the Net Gens and
best or inadequate support from Unauthorized Disclosures
topic ourselves to provide a rich the IC.
and systematic briefing at this One final important aspect of
point. Thus, the director of This process would require this tutorial would be a frank
national intelligence should ask extensive interviews with those discussion of the damage
prominent former officials from who were intimately involved in
both major parties to lead a the intelligence support and
8 IC assessment of the Soviet Union is
task force to develop such a policymaking during the period
attractive as a topic because it has
course. Former officials such as studied. Such an effort would already been extensively studied from the
Congressman Lee Hamilton, be open to suspicion if it was IC side. For example, see Douglas J.
Deputy Secretary of Defense done in house and the academ- MacEachin, CIA Assessments of the Soviet
John Hamre and National Union: The Record Versus the Charges,
ics would need access to the
(Washington, DC: Center for the Study of
Security Advisor Steve Hadley, classified record. To avoid ran- Intelligence, CIA, 1996).

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 27


Introducing Policymakers to Intelligence

The general public’s understanding of the IC and its mission


and capabilities is equally worrisome.
sistently shows that elements of
the IC typically glean only
caused by unauthorized public be effective, such a course about a 50-percent approval
disclosure. We should take heed should be open with policymak- rating from the general public.
of the implications of the recent ers and members of Congress in This contrasts starkly with the
arrest and arraignment of the discussing the specific, recent various armed services and the
22-year-old member of the US examples of unauthorized leaks FBI, which routinely poll at
military on charges of unau- and the damage they have least 15 percentage points
thorized disclosure of the classi- inflicted. higher than the CIA in public
fied information revealed opinion surveys. 11 Surveys do
through Wikleaks. He is a not even try to measure the
member of Net Gen, the genera- An Informed Public public approval for the ODNI
tion of children, teens, and The general public’s under- since there is very little public
young adults aged 11 to 31 who standing of the IC and its mis- recognition of the name and
have grown up immersed in sion and capabilities is equally almost no general understand-
digital technology. He allegedly worrisome. All of us have expe- ing of its role. In the aftermath
downloaded a staggering rienced the uneasy feeling as of 9/11, it seems counterintui-
260,000 documents because he we watched our profession per- tive and surprising that we
hoped their release would lead sonified by Hollywood as either have gained little in public
to a “worldwide discussion, the omnipotent Jack Bauer or approval ratings despite our
debate, and reform” of the tac- the bumbling Maxwell Smart. large role in the battle with ter-
tics in the war on terror. 9 The At times we are portrayed as rorists and the fact that intelli-
younger generation, whether flagrantly violating the US gence has played a vital role in
policymakers or members of the Constitution and abusing the making sure that another 9/11
IC, come into government with human rights of US citizens has not happened. Many IC
much more opens view of infor- and foreigners alike. At other officials have pointed to the
mation and information shar- times, we are portrayed as large number of excellent
ing and need help laughingly incompetent or, resumes received each year by
understanding our unique worse yet, creating wars and the IC to demonstrate that our
issues. 10 Thus, the course crises because we act in secret public image is strong, but this
should include a discussion of without oversight. Few and far indicator may say as much
the enormous damage to US between are the accurate por- about the state of the job mar-
security and the financial costs trayals of the critical mission of ket and the glamorized Holly-
to the American taxpayer when the IC as the “Silent Service,” wood vision of the IC as it says
unauthorized disclosures result going where others cannot go, about public attitudes.
in damage to sensitive intelli- risking our lives to protect
gence collection capabilities. To Americans from harm, and pro- Why does our public image
viding the needed raw and fin- pale in comparison to that of
ished intelligence products to the armed services? To be fair, a
inform and elevate policy delib- part of our problem is simply
9 Kevin Poulsen, Kim Zetter, “I can’t

believe what I am confession to you: The erations.


Wikileaks Chats,” Wired Magazine on-
line, 6 June 2010. 11 See for example, “Distrust, Discontent,

10 For an excellent study of the challenges


Middling Public Approval Anger and Partisan Rancor: The People
we face in the information age see Where Ratings and Their Government,” Pew Research
Tomorrow Will Take Us: The New Envi- Center for the People and the Press
ronment for Intelligence, (Washington, It is therefore not surprising http://people-press.org/2010/04/18/dis-
DC: Center for the Study of Intelligence, trust-discontent-anger-and-partisan-ran-
CIA, 2010).
that public opinion polling con- cor/ (accessed 9 May 2011).

28 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Introducing Policymakers to Intelligence

Part of the problem is that we have not worked hard enough at


strategic communications with the general public.
that we must operate under the
cloak of secrecy and are there-
fore perceived as a bad fit for an
open democracy. As Secretary of of www.dni.gov website in com- sensitive or inappropriate
Defense Robert Gates recently parison to the websites of the questions.
put it when speaking about the Department of Defense or even
CIA, “The truth is, across the the Defense Intelligence Agency • Outreach to Local Officials
political spectrum, it has had to see that we are not communi- and Emerging Leaders. It is
relatively few supporters other cating as well as we could with striking when meeting with
than presidents who find they the public. Here are a few other officials at the state and city
like its clandestine powers. It’s ideas on developing stronger level around this nation how
just an itch in our system that’s public insight into the IC: little contact most have with
hard to scratch.” 12 Secretary the IC, beyond the FBI. Simi-
Gates may be a bit too fatalistic • Internet Chats with IC larly, most politicians only
about our lot, and I believe it is experts. Many executive have an association with the
this kind of presumption that branch agencies, including the IC if they serve in Washing-
holds us back from exploring White House, offer the public ton. Although there is a natu-
new ways to convince Ameri- the opportunity for periodic ral IC reluctance to hold
cans that we are not an anom- on-line chats with administra- town-hall meetings with the
aly but a necessity in American tion officials on topics of wide general public on intelli-
democracy. To me, part of the interest. This is also being gence, by invitation seminars
problem is again that we have done with regularity by major for local officials and emerg-
not worked hard enough at academic think tanks. There ing politicians would expose
strategic communications with is no reason that the ODNI them to our issues long before
the general public. Too often, and other IC leaders could not they became Washington poli-
we allow others to define us do the same under carefully cymakers. This kind of semi-
(mostly negatively) by making controlled circumstances. nar is a proven formula that
it sound as if the sum total of National intelligence officers IC elements have used for
our role can be summarized by (NIOs) and other top-notch recruiting sessions with stu-
referring to such controversies experts could provide on-line dents at universities and col-
as Abu Ghraib and water chat opportunities on impor- leges.
boarding. tant topics of the day to the
general public. For example, • An Official Guidebook to Intel-
the NIO for South Asia might ligence. The CIA World Fact-
Reengineering Our Public field questions from the pub- book is a wonderful resource
Profile lic on the implications of the to the general public that is
floods in Pakistan or the NIOs heavily used on line. Although
Although some argue that the
for economics and East Asia the DNI publishes the “A Con-
IC by its very nature should not
might discuss the implica- sumer’s Guide” to intelli-
have a public profile, that phi-
tions of China’s recent emer- gence, the document is
losophy may be outdated in the
gence as the world’s second primarily intended for senior
age of new social media.
largest economy. On-line chat- intelligence consumers in the
Frankly speaking, we only need
ting of this sort allows for the US government and is not
to look at the outmoded design
public to submit questions in particularly user friendly for
advance so that they can be the general public. Creation of
12 David Ignatius, “Gates: The Pentagon’s screened for any politically a general guidebook might be
Accountability Cop,” The Washington Post, best accomplished by commis-
9 September 2010. sioning a prominent, profes-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 29


Introducing Policymakers to Intelligence

There is one major aspect of intelligence policy that needs a


clear rethinking…the bright line we have drawn over the years
tion with the Executive Branch
between intelligence and policy. and the US Congress. This is
the bright line we have drawn
sional writer outside of the IC forward is this simple fact over the years between intelli-
to write an unclassified guide —there will be successful ter- gence and policy. Sherman Kent
that captures more fully what ror strikes on US soil in our was adamant in his belief that
the uninitiated would want to future, and they may even intelligence analysis is a ser-
know. 13 involve the use of weapons of vice arm to policymakers and
mass destruction. We need only that it should not be a formula-
• Greater Publicity to Our Role look at the major outcry against tor of objectives, a drafter of
in Supporting the Military. the IC that occurred after the policy, or a maker of plans. But
Part of the public’s high failed terrorist attempt to blow increasingly today, policymak-
respect for the armed forces up a commercial airliner last ers and legislators find that the
comes from their long tradi- December to see a glimpse of the intelligence analysts’ adher-
tions of service to the nation. kind of blame game that is ence to this article of faith robs
Most Americans can hum the likely to engulf the IC when the the policymaker of the ideas
tune of the Marine Corps next successful foreign terrorist and suggestions for policy that
Hymn. The tradition of intelli- attack occurs. As two promi- a highly informed analyst can
gence support to the military nent British observers of our provide. They often complain
began with General George profession sagely put it, “Intelli- that briefings that provide just
Washington, but the public gence failure is a matter of the facts are simply not rele-
perception is that the IC is expectations, and seeking to vant and helpful enough. They
only about 60 years old. While adjust expectation of what can get the facts off of the Inter-
I am not suggesting uniforms intelligence can and cannot do net at a greater speed than we
and salutes, I am suggesting is surely essential to informed can deliver them, but what they
that we look harder at those democratic debate. Yet if and crave from us is analytic insight
things we might do to make when a catastrophic terrorist and our thoughts on how US
ourselves more associated attack succeeds, public confi- foreign policy can be advanced.
with proven, military tradi- dence in the intelligence and
tions. One such effort is a security services will inevitably I believe former DNI Dennis
recent Studies special edi- be tested.” 14 We cannot afford to Blair took a large step toward
tion, CIA at War, which com- wait passively for that test to toning down the bright line
memorates the work of CIA come before we try to shape when in a media roundtable in
men and women in conflict public expectations and under- March 2009 he told the press
zones around the world since standing of what we do. that he had mandated that every
the Agency’s creation. piece of analysis on important
issues not only have a threat
Confronting a Taboo analysis section but also an
Perceived Intelligence opportunities analysis section.
Failures Are Inevitable As we begin a new century
there is one major aspect of He described opportunity analy-
A final reason I would cite on intelligence policy that needs a sis as helping policymakers “find
why strategic communications clear rethinking in consulta- the levers…which will enable us
to the public is important going to advance our interests and our
common interests.”15 Despite his
14 Len Scott and R. Gerald Hughes, “Intel-
pronouncement, opportunities
13The DNI guide is located at ligence in the 21st Century,” Intelligence analysis remains uncomfortable
http://www.dni.gov/reports/ and Security 24, No. 1 (February 2009), and controversial in many IC
IC_Consumers_Guide_2009.pdf. 24.

30 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Introducing Policymakers to Intelligence

My worry is that, if we continue to defend a rigid line of detach-


ment from policy, we will lose our reason for existence—the op-
components. Analytic managers
are far too concerned that pro- portunity to elevate the policy debate.
viding some suggestion on policy
options will taint analysis and
destroy its purity. Yet in most of pen because you have the the intelligence provided
the advanced intelligence ser- fact on that, or you don’t becomes much better targeted to
vices around the globe no such know what’s going to hap- assist the policymaker. This is in
bright line is drawn. And, I pen, or you know what part because, when we stay out-
would argue, this bright line your body of ignorance is side the policy circles, we have
robs the policymaker of some of and you told me what that less understanding of what is
the most useful byproducts of is. Now when you tell me really needed. Whereas when we
analytic depth and sophistica- what’s most likely to hap- are in the circle, we are better
tion. pen, then I, as the able to target our resources and
policymaker, have to make analysis to the exacting needs of
We have consistently not pre- a judgment as to whether I the moment.
pared our customers to use intel- act on that, and I won’t
ligence wisely, and thus we are hold you accountable for it This brings me to my final rec-
afraid of what they will do with because that is a judg- ommendation and that is the
even guarded policy inputs. ment; and judgments of need for a Center for the Study
Were we better at in-depth com- this kind are made by poli- of the Intelligence Innovation
munication with our customers, cymakers, not by administered by the ODNI. As
we could jointly set parameters intelligence experts. 16 noted above, we can do a great
on opportunity analysis that deal by reaching out to former
would protect the IC from accu- I recognize that many will officials, the academic commu-
sations of politicization or med- argue that, if we cross the divide, nity and think tanks for help on
dling in policy. In this regard, I we will lose our analytic objectiv- educating our consumers. But
am reminded of Secretary of ity and integrity. I think that ultimately we should have a per-
State Colin Powell’s famous this was more of a problem when manent staff of professionals
adage that demonstrates his we were just beginning after who study this centrally impor-
sophisticated understanding of World War II to create the craft tant question on a continuing
the role of intelligence: of intelligence analysis. That basis. The Center for the Study
craft is now well developed, and of Intelligence (CSI) at CIA pro-
I will hold you [the intelli- we have a keen sense of how to vides a good model for this activ-
gence expert] accountable keep our integrity. My worry is ity and is adapting to widen its
for what you tell me is a that, if we continue to defend a focus beyond CIA. CSI recently
fact; and I will hold you rigid line of detachment from has begun assuming the IC’s
accountable for what you policy, we will lose our reason for Lessons Learned and history
tell me is not going to hap- existence—the opportunity to ele- functions and is thus taking a
vate the policy debate. Policy- greater community role. Policy-
makers have often stated that, maker needs are dynamic and
15 Media roundtable with DNI Dennis
when the IC becomes a part of a change quickly because of the
Blair. 26 March 2009. Available at: policy-intelligence task force flow of world events and rapid
http//www.dni.gov/interview/ working a particular problem, technological advances. If we are
20090326_interview.pdf. For another chal- to remain relevant, we cannot
lenge to the taboo, see Josh Kerbel and
Anthony Olcott, “The Intelligence-Policy
neglect serious study of the pol-
Nexus: Synthesizing with Clients, Not 16 Secretary Colin L. Powell, “Testimony icy-intelligence interface.
Analyzing for Customers,” Studies in before the Senate Governmental Affairs
Intelligence 54, No. 4 (December 2010). Committee,” 13 September 2004. ❖ ❖ ❖

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 31


Coming to Clarity

The Pursuit of Intelligence History:


Methods, Sources, and Trajectories in the
United Kingdom
Christopher R. Moran

This article is an overview of the history of the academic study of intelli-


gence in the United Kingdom since 1945, a time marked by three
distinctive periods of historiography. Each, labelled here as Absence,
Emergence, and Efflorescence, has contained unique themes and
approaches to intelligence history as it has been practiced in Britain. a


Clarity has come to
intelligence history much
like the restoration of an
Clarity has come to intelligence history much like the restoration of an
aged fresco in which hidden details are gradually revealed through
repeated cleansings until a full-bodied picture emerges. Attempts to
establish the history of British intelligence have ranged greatly in style
aged fresco. and quality, from the lurid works served up by the media and by the
purveyors of conspiracy theory (appropriately described by Nicholas


Hiley as “lightweight meals that sit so heavily on the stomach”), 1 to the
tomes, written by official historians and born of patient work in
archives and historical scholarship.

Writers on intelligence have been a fissiparous bunch, their focus and


approach shaped to a large extent by forces and events in the real
world. In the 1960s and 1970s, as public fascination with and fear
about espionage grew exponentially following a string of high-profile
fiascoes (including the U-2 spy plane incident in May 1960, the abor-
tive Bay of Pigs invasion in April 1961, the John Vassall spy case in
1962, and the Profumo Affair in 1963), many authors made their
names by looking at scandal.

For the likes of Andrew Boyle— whose book The Climate of Treason:
Five who Spied for Russia led to the public unmasking in 1979 of
Anthony Blunt as a former Soviet agent—writing intelligence history
was both a professional and a political activity, designed to shake the
Establishment by shining a harsh and bright light on its unethical

aThis article is an adaptation of a chapter written by the author for Spooked: Britain,
Empire and Intelligence since 1945 (Cambridge, UK: Cambridge Scholar Publishers,
2009). Prepared with the permission of the publisher.

The endnotes are available in the digital version of the article in cia.gov.

All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US govern-
ment endorsement of its factual statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 33


Intelligence History in the UK

Secret service work was wreathed in a miasma of secrecy; its


practitioners were spectral figures, known only to their exclu- disclosure it is perfectly obvi-
sive fraternal initiates. ous to me as to honorable mem-
bers opposite that there is no
longer any Secret Service and
practices. 2 In the mid- to late future of the past has never been that you must do without it.” 4
1970s and then into the 1980s, as more important.
governments lifted the lid on Governments, irrespective of
Allied codebreaking successes their political persuasion,
during the Second World War, so Absence
refused to avow the very exis-
historians paid much closer For a long time, intelligence tence of the intelligence agen-
attention to the role of intelli- history was the Cinderella of cies. As Sir Frank Newsam
gence. Similarly, in the 1990s, as disciplines of history, starved of (then Home Office permanent
the British intelligence services recognition and marginalized undersecretary) wrote in Octo-
themselves began to edge toward by its more successful scholarly ber 1952: “I was brought up in
the light—they were first listed in the tradition that the existence
sisters. In 1984, Christopher
the statute books, for example,
Andrew and David Dilks of the Security Service should
and began declassifying hitherto
famously described intelligence never be mentioned save in the
secret records—so the nascent dis-
as the “missing dimension” in highest circles, and, for a very
cipline of intelligence studies
entrenched itself in academia. historical inquiry, conspicuous long time, I never knew its
in its absence from the litera- address and have only recently
In the 21st century, the history of ture of both modern govern- entered its portals.” 5 It was
Britain’s intelligence services has ment and international often said that the British atti-
enjoyed a revival in the wake of relations. 3 Filling this signifi- tude toward intelligence mir-
the terrorist attacks of 9/11, cant lacuna was a task for rored societal attitudes toward
Madrid, and London, as well as which few serious historians marital sex; that is, everyone
the conflicts in Iraq and Afghani- had the stomach. Throughout knew that it went on, but to
stan. Thanks to the spooks of much of the 20th century, the “speak, write or ask questions
today, the spies of the past are no UK intelligence community was about it” was not done. 6
longer the supporting cast in the “invisible man” of govern-
some larger drama of interna- ment, a state within a state, Much to the chagrin of inde-
tional relations but are front and and an entity about which pendent historians, the taboo of
center on the historical stage. questions were never asked, secrecy surrounding intelli-
even in Parliament. gence was undergirded by the
Intelligence history, while pres- indefinite closure of service
ently booming, is fast Secret service work was records. No matter how old or
approaching another tipping wreathed in a miasma of how sensitive, all documents
point. With the official histories of secrecy; its practitioners—like that referred to intelligence
the Security Service (MI5), the members of a collegiate soci- found themselves in a histori-
Secret Intelligence Service ety—were spectral figures, cal never-never land, withheld
(SIS/MI6) and the Joint Intelli- indefinitely from release to the
known only to their exclusive
gence Committee (JIC) hitting
fraternal initiates. “It is the Public Record Office (PRO),
bookshops in 2009, 2010, and
essence of a Secret Service,” now The National Archives
2013 respectively, much of the
declared Sir Austen Chamber- (TNA). 7 Section 3 (4) of the
original fresco will have been
restored. For the intelligence his- lain (then foreign secretary) in Public Records Act (1958,
torian, therefore, plotting the December 1924, “that it must 1967), otherwise known as the
be secret, and if you once begin “blanket” exemption, gave the

34 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

With historians deprived of documents and governments deter-


mined to choke off public debate, the “history” of Britain’s intel-
lord chancellor discretionary ligence services was written largely by investigative journalists
power to hold back any file
related to intelligence or the
and “exposé merchants.”
intelligence services. In 1982,
the Wilson Committee on Mod- rior,” intoned RAdm. A. H. Tay- earlier as a possible Russian
ern Public Records highlighted lor in June 1945: “It is spy. 10 Unlike Pincher, however,
absurd examples of closed necessary for his own morale as Wright was an insider who had
material, including postal inter- well as for his security that he taken a lifelong oath of silence
cept files from the 18th century should know it will be faith- and whose account was less
and intelligence bulletins from fully observed.” 8 easily “deniable.” In 1987,
the Battle of Waterloo. The therefore, Her Majesty’s Gov-
dearth of primary source mate- Whitehall’s commitment to ernment (HMG) banned Spy-
rial discouraged even the most keeping intelligence matters catcher in the UK, prohibited
intrepid historian, to whom secret was so unyielding that newspaper reportage with a
accessible documentation was officials often went to remark- series of gag orders, and sought
the lifeblood of good scholar- able lengths to prevent disclo- a court injunction to halt the
ship. sures from occurring. Nothing book’s publication in Australia.
illustrates this better than the
Keeping the intelligence ser- Spycatcher affair of 1986–88, The insistence on a blanket
vices walled off from public when then Prime Minister Mar- ban was ludicrous. Spycatcher
view was generally defended on garet Thatcher tried unsuccess- had already been published in
the grounds of operational secu- fully to suppress the memoir of the United States and ranked
rity. The agencies claimed, with Peter Wright, an embittered first on The New York Times
some justification, that intelli- former assistant director of best sellers list; thousands of
gence gathering would be jeop- MI5. Ghost written by Paul copies had crossed the Atlantic
ardized if its sources or Greengrass (who would later and were washing up in second-
methods were disclosed. In the direct the Jason Bourne films), hand bookstores. 11 The affair
field of human intelligence Spycatcher alleged that the late descended into complete farce
(HUMINT), for example, the Sir Roger Hollis, a past direc- when Cabinet Secretary Sir
identification of an individual tor general of the service, had Robert Armstrong was dis-
as a secret agent is very often a been a Soviet mole, and it patched to an Australian court
matter of life or death. accused MI5 of plotting against, to present the government’s
snooping on, and defaming then case.
Indeed, since the danger of Prime Minister Harold Wilson
retribution against a spy is not in the mid-1970s. 9 Famously, Armstrong endured
necessarily restricted to a sin- a torrid time, harried by a
gle generation, one should not Wright’s allegations were nei- brash young advocate and ridi-
assume that the passage of ther novel nor discernibly dam- culed by the world’s media for
time concurrently diminishes aging to national security. In refusing to accept that SIS
the hazards of disclosure. With- March 1981, Fleet Street’s existed. Armstrong’s credibility
out a promise of absolute greatest scoop-merchant, Chap- was fatally undermined when,
secrecy, moreover, it was feared man Pincher, published Their under cross-examination, he
that agent recruitment would Trade is Treachery, which was forced to concede, in a
diminish and service morale forced Thatcher to admit in priceless admission, that he
plummet. “Secrecy is the breath Parliament that Hollis had had been “economical with the
of life to the clandestine war- been investigated some years truth.” Since open sales of Spy-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 35


Intelligence History in the UK

“Toffs to a man, Guy Burgess, Donald Maclean, Philby, Blunt


and John Cairncross had all advanced because they had at-
tended the right schools and the right gentlemen’s clubs.” (Guy seen in certain quarters as sym-
bolic of a nation losing its way.
Burgess on left, Kim Philby on the right.)
In Britain, the early 1960s
were punctuated by a series of
real-life spy scandals, beginning
with the exposure of George
Blake as a Soviet spy in 1961
and culminating with the reve-
lation in 1963 that the secre-
tary of state for war, John
Profumo, had shared his prosti-
tute girlfriend, Christine Keeler,
with a Russian spymaster. By
the late 1960s, things got worse.
In 1967, the Daily Express
revealed that the Government
Images © Bettmann/Corbis
Communications Headquarters
(GCHQ) routinely intercepted
catcher overseas had rendered vinced that Hollis was a Soviet thousands of private cables, set-
moot the question of secrecy, agent.) 12 ting in motion a chain of events
attempts to squelch publication that brought personal obloquy
ultimately failed and brought Sometimes referred to pejora- upon Harold Wilson and very
mockery upon intelligence tively as the “airport bookstall” nearly spelled the end for the D-
taboos. school of intelligence Notice Committee, the joint gov-
historiography, 13 this genre of ernment/media body whose pur-
With historians deprived of spy literature first came to pose was to prevent the public
documents and governments prominence in the 1960s, a disclosure of information that
determined to choke off public period known as the “era of would adversely affect the
debate, the “history” of Brit- exposure” for the intelligence defense of the realm. A year
ain’s intelligence services was and security agencies. 14 In the later, Kim Philby, the ruthless
written largely by investigative United States, the CIA’s ill- SIS traitor and “Third Man”
journalists and “exposé mer- fated attempt to overthrow who had defected to the Soviet
chants,” relying on inside infor- Cuban dictator Fidel Castro at Union in January 1963, pub-
mation obtained from well- the Bay of Pigs made front-page lished his KGB-blessed memoir,
connected friends in Whitehall. news, as did the shoot-downs of My Silent War, which remorse-
With an impish pleasure in the U-2 and the RB-47 in 1960. lessly revealed the details of SIS
wreaking havoc, authors such Later in the decade, as the pub- personnel and relationships and
as Pincher, Nigel West, and lic became increasingly disillu- his own role as a Russian spy for
Andrew Boyle focused on sub- sioned with the war in over 30 years.
jects perfectly calculated to rile Vietnam, and as stories
the Establishment, including emerged that US-sponsored Philby and his band of turn-
the Wilson Plot, the Cambridge covert action was propping up coats became a “magnetic
Five, and the purported duplic- corrupt regimes in Central and specter” 15 to a generation of sen-
ity of Roger Hollis. (Now in his South America, the CIA was sation-seeking writers. Just
nineties, Pincher remains con- about every “airport bookstall”

36 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

In the UK, the emergence of intelligence was more specifically


linked to a series of accessibly written, authoritative, and re-
author with basic literary abil- vealing histories of wartime deception published by respected
ity—and some without—tried to
intelligence veterans in the early 1970s.
make a quick buck by peddling
tall tales of treachery, betrayal,
murder, and whatnot. In pur-
suit of the “Fourth Man” (even- ery within its ranks. Toffs to a first professional intelligence
tually revealed as Anthony man, Guy Burgess, Donald historians.
Blunt), accounts tended to focus Maclean, Philby, Blunt and
on the cloistered quadrangles of John Cairncross had all
Cambridge in the 1930s and on advanced because they had Emergence
the secret societies, such as the attended the right schools and By the late 1980s, intelli-
Apostles, that became Marxist the right gentlemen’s clubs. gence history had started to
cells for the disaffected mon- Similarly, many accounts of the come of age, demonstrating how
eyed elite. The spate of books Profumo Affair were not espio- attention to the form and func-
that were produced on Philby nage yarns per se, but commen- tion of espionage could chal-
were in the main deeply critical taries on Britain’s moral lenge existing orthodoxies
of the spy, suggesting that he landscape, critiquing those who about international relations
had handed over thousands of had become sexually liberated and modern governance. Its
state secrets and caused hun- and Bohemian long before it ascent was in part the corollary
dreds of deaths. was fashionable. of seismic events in the United
States. In 1975, the Senate’s
In what many regard as an By the late 1970s, the spread famous Church Committee
unforgivable apologia that may of “mole mania,” coupled with hearings exposed some of the
have cost him a knighthood and the felicitous cresting of the CIA’s most dubious, if not out-
a Nobel Prize, the novelist Gra- James Bond phenomenon, argu- right illegal activities, includ-
ham Greene was a lone voice in ably had created an unquench- ing the surveillance of domestic
depicting Philby as a misunder- able public thirst for dissidents and the covert sub-
stood idealist, or “passionate sensational tales of espionage, a version of foreign governments.
pilgrim,” who sacrificed every- trend that continues today. As Church’s festival of revelation
thing for the cause of the Oliver Hoare argues, “Racy his- was transformative for the US
oppressed proletariat. 16 tories of secret services…have intelligence community and
Greene—a close friend of often been the norm.” 18 In aca- “provided scholars, in the West-
Philby, following Greene’s time demic circles, “airport book- ern world, at least, with hith-
in SIS during the Second World stall” accounts were frequently erto absent incentives and
War—compared the spy to a met with ridicule or outright reasons to study intelligence.” 19
persecuted Catholic in Elizabe- hostility, and served only to
than England. devalue the credibility of intelli- Revealing World War II
gence as a respectable field of History
By many accounts, the real inquiry. In the years to come, it In the UK, the emergence of
sin of the Cambridge Five was is possible scholars will rehabil- intelligence was more specifi-
not betraying their country, but itate the “airport bookstall” cally linked to a series of acces-
betraying their class. 17 The school as a form of “protohis- sibly written, authoritative, and
motivation for disclosure was to tory” which, despite its flaws, revealing histories of wartime
expose the Establishment for facilitated the public emer- deception published by
being so blinded by class preju- gence of Britain’s intelligence respected intelligence veterans
dice that it failed to spot treach- agencies and the writings of the in the early 1970s. In 1972, the

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 37


Intelligence History in the UK

Published after 1945, the official histories of the Second World


War were carefully doctored to maintain state security and thus
contained no mention of Bletchley Park. possession of event-influencing
information, military histori-
ans who had been enamored of
Oxford don, John Masterman, kept secrets of all time. In July a particular general or admiral
published The Double-Cross 1945, amid concerns that its lost faith, igniting a firestorm of
System in the War of 1939–45, revelation might preclude post- historical revisionism.
an account of the highly suc- war rapprochement with Ger-
cessful XX Committee and its many (whose leaders might Opening Archives
turning of German spies into claim that they were not “well With the Ultra secret in the
double agents during World and fairly beaten,” à la 1918), public domain, Whitehall, per-
War II. 20 With outstanding the JIC had considered it haps unexpectedly, began to
social connections (then Prime “imperative that the fact that reassess its approach to intelli-
Minister Edward Heath was a such intelligence was available gence archives. Although
former student), Masterman should NEVER be disclosed.” 24 spread over many years so “as
was persona grata to members to generate the minimum pub-
of the Establishment who Published after 1945, the offi- lic interest,” 26 from the mid-
shared the author’s desire to cial histories of the Second 1970s HMG started to declas-
champion the achievements of World War were carefully doc- sify its Great War SIGINT
the system and to head off erro- tored to maintain state secu- record, the Room 40 O.B.
neous “outsider” histories. rity and thus contained no archive. In 1977, the first batch
mention of Bletchley Park. of Enigma decrypts and other
Two years later, Group Cap- Despite his reputation as some- Ultra-related material was
tain Frederick Winterbotham, a thing of a loose cannon, a man released to the National
former intelligence officer at wanting in constraint and fickle Archives. Two years later, min-
the Government Code and in his loyalties to the rules of isters took a bolder step in
Cypher School at Bletchley censorship, Winston Churchill authorizing the publication of
Park, was allowed to publish was silent on the subject in his the first volume of Professor Sir
the first English-language work multivolume memoir of the con- Harry Hinsley’s official history,
dedicated to the Ultra flict. As David Reynolds argues, British Intelligence in the Sec-
secret—“the greatest secret of for such a great aficionado of ond World War, researched and
World War Two after the atom Signals Intelligence (SIGINT), written with the help of several
bomb” 21—and the influence of Churchill made a “considerable able hands who, like Hinsley,
Enigma decryption on the sacrifice,” a point not lost on had served at Bletchley Park
course of the war. 22 Although Bletchley Park veterans who, during the war. 27
hagiographic and unreliable in should their wartime prime
places (Winterbotham was minister have spilled the beans, The brainchild of former Cabi-
accused of lacking “the most may have followed suit. 25 net Secretary Sir Burke Trend,
elementary technical knowl- Hinsley’s multivolume tome
edge” of cryptography, as well Winterbotham’s account had been conceived as a “coun-
as downgrading the Polish and opened up a brand new chapter terblast” against the deluge of
French contributions in break- in the public’s understanding of salacious outsider accounts. 28
ing German ciphers), 23 The WW II and provoked a ground- Depending upon who was spin-
Ultra Secret represented a sig- swell of academic interest in ning the tale, British intelli-
nificant milestone in the pur- the role of intelligence, counter- gence was increasingly seen as
suit of intelligence history. intelligence, and deception. a safe haven for disillusioned
Ultra ranked as one of the best- Knowing the Allies had been in toffs more accustomed to dis-

38 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Hinsley’s [below] multivolume British Intelligence in the Sec-


ond World War had been conceived as a “counterblast”
gorging secrets to the enemy
than defending the realm. In against the deluge of salacious outsider accounts.
his widely read “Karla Trilogy”
(1974–79), for example, John le
Carré explored a world of
betrayal, treason, and murder,
peopled by those who become
what they behold. Fair but
forthright, unfailingly well
written, and meticulously
researched (Hinsley and his
team had been granted unre-
stricted access to official
papers), British Intelligence in
the Second World War won
wide-ranging praise from aca-
demia’s most knowledgeable and
discerning commentators. CIA
officer-turned-scholar Walter
Pforzheimer called it “the sin-
Image © Hulton-Deutsch Collection /Corbis
gle greatest work on intelli-
gence ever produced,” and it set
the benchmark by which all
other works on the subject are so-called “adjacent” records, those officials’ personal papers.
judged. 29 such as Foreign Office and For example, in Eden’s stock-
Treasury files, the aforemen- pile, formally deposited in the
Hacking into Other Sources tioned demonstrated that there Birmingham University
Hinsley’s history firmly con- was sufficient declassified Library in 1990, was the first
tested the para-historian’s material to “fill in both the gen- page of Sir Edward Bridges’ Top
attempt to annex intelligence to eral outline of the missing intel- Secret report into the disap-
the domain of “airport book- ligence dimension and much of pearance of SIS frogman Lionel
stall” literature and piqued the its operational detail.” 31 “Buster” Crabb (not officially
curiosity of an emerging gener- declassified until 2006).
ation of professional research- Private collections were par-
ers. In the 1980s and early ticularly bountiful, as long as Authors with a penchant for
1990s, scholars became less an author was prepared to weed lateral thinking also started to
inclined to scoff and increas- through, canvass, and weight prize UK records out of the
ingly skilled at what one each folio of inchoate docu- archives and libraries of for-
scholar has termed “archival ments; statesmen of the first eign states. With its sunshine
intelligence hacking.” 30 Hacker rank, including Winston laws and landmark Freedom of
in chief was Christopher Churchill and Anthony Eden, Information Act, signed into
Andrew, Hinsley’s heir appar- had routinely taken copies of law by President Lyndon B.
ent, but the roll also included confidential documents home Johnson on 4 July 1966, Amer-
David Stafford, Julian Lewis with them—copies which, unbe- ica was increasingly seen as an
and Bradley Smith. Drawing knownst to the Cabinet Office, Aladdin’s cave—or wonder-
upon private papers as well as were often retained among land—where any number of

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 39


Intelligence History in the UK

In recent years, the discipline of intelligence studies has gone


from strength to strength, becoming a magnet for postgraduate
students and postdoctoral researchers around the world. ous scholarship was problem-
free and beyond critical self-
examination. As stated by John
Lewis Gaddis, the “British
jewels could be found. 32 The political history and kindred School of Intelligence Studies”
archive of the Office of Strate- disciplines. (as it became known) lent itself
gic Services (OSS), the wartime to “buffism,” preoccupied with a
counterpart of SIS and forerun- Others soon shared this senti- love of particular and esoteric
ner of the CIA, was said to con- ment. As Keith Jeffrey has terminology. 38 Many
tain “not just isolated argued, a “conclusive indicator” works—framed within the
documents,” but quite often of the subject’s newfound legiti- parameters of organizational
“entire files of British macy was the acceptance of theory and institutional prac-
material.” 33 In his biography of articles by traditional periodi- tice—elided context and
Sir Stewart Graham Menzies cal outlets. 36 In 1986, for exam- expended little effort in show-
(“C” during and after World ple, both The Journal of ing how the intelligence ser-
War Two), the globe-trotting Contemporary History and The vices made a difference. In
writer Anthony Cave Brown English Historical Review pub- consequence, they were beyond
showed that Special Opera- lished articles on intelligence the ken of the average student.
tions Executive (SOE) materi- for the first time. 37 The prolifer-
als were available for public ation of conferences was also Published fitfully between
inspection in the papers of C‘s instrumental in ushering in a 1979 and 1990, the five vol-
American equivalent, William growing scholarly appreciation umes produced by Hinsley and
J. Donovan, which were housed for espionage-related topics. his assistants were a monu-
at the US Army War College in ment to the triumph, but also to
Carlisle, Pennsylvania. 34 This is not to say, however, the inherent problems of intelli-
that the first generation of seri-
The desire to open up the
“missing dimension” enveloped
Christopher Andrew in writing
what became a massively
detailed history of the British
intelligence services. Published
in 1985 and stretching to over
700 pages, Secret Service: The
Making of the British Intelli-
gence Community demon-
strated the value of sustained
and creative archival
research. 35 In 1986, Andrew
cofounded Intelligence and
National Security, the first (and
now preeminent) academic jour-
nal in the field. The premise of
its first issue was that intelli-
In December 1991 Stella Rimington became the first spy chief to be publicly
gence represented a “proper” named; the first to pose openly for cameras; and the first to publish a bro-
subject of study for scholars in chure. Image © Capital Pic/Corbis Sygma

40 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

gence history in its earliest toral researchers around the During the Cold War, as made
manifestation. As Ralph world, and producing an famous by John le Carré’s novel
Erskine noted of Volume 3, impressive and varied litera- The Spy Who Came in from the
“Hinsley makes too few judge- ture. The steady stream of Cold (1963), the Wall was the
ments, and his book is defi- scholarship that has accrued literal and symbolic epicenter of
nitely not bedside reading. over the past two decades has the great game of espionage; by
Order of battle appreciations coincided with an ever-growing the early 1990s it had been torn
loom all too large.” 39 The pur- public awareness about intelli- down. The lifting of the veil in
suit of intelligence history, gence. Following the high the UK began in 1989, when
therefore, demanded not only drama of 1989 and the end of MI5 was placed, for the first
the centrifugal instinct to locate the Cold War, the intelligence time, on a legislative footing.
minutiae in the archives, but and security services entered a The Security Service Act (1989)
also a centripetal inclination to new phase in their history. As came into being partly as a
contextualize those details for a borders opened and free elec- response to complaints about
readership that might not be tions ousted communist unauthorized government sur-
cognizant of the basic contours regimes across Eastern Europe, veillance. Four years earlier,
and outlines. the UK intelligence community MI5 had faced a barrage of
confidently anticipated a period media scrutiny when a former
of relative geopolitical calm officer, Cathy Massiter, pro-
Efflorescence and, in turn, placed greater vided evidence before the Euro-
In recent years, the discipline emphasis on accountability and pean Court of Human Rights
of intelligence studies has gone transparency. that the service had been ille-
from strength to strength, gally bugging the telephones of
becoming a magnet for post- This new era of optimism and pressure groups, such as the
graduate students and postdoc- openness had a physical Campaign for Nuclear Disar-
metonym: the Berlin Wall. 40 mament (CND), as well as polit-
ical “high fliers,” including
In the same year SIS and GCHQ entered
the UK’s statute books (1994), SIS
Patricia Hewitt and Harriet
moved into a gleaming new building at Harman, then leading mem-
Vauxhall Cross (left). GCHQ moved into bers of the National Council for
its new facility, unsurprisingly called the
“Donut” by many, in 2003. The promi-
Civil Liberties.
nence of the structures bespoke the
emergence of both institutions into pub- In the 18 months following
lic and academic eyes. Images © Corbis. her appointment as director
general of MI5 in December
1991, Stella Rimington became
the first spy chief to be publicly
named; the first to pose openly
for cameras; and the first to
publish a brochure, entitled
MI5: The Security Service
(1993), describing the organiza-
tion’s activities. 41 Perhaps even
more surprisingly, on 7 May
1992, then Prime Minister John
Major acknowledged in Parlia-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 41


Intelligence History in the UK

Since 2001, few subjects have commanded so much attention


and controversy as intelligence.
what is being done to combat
this menace. 44
ment that Sir Colin McColl was By the early 2000s, however,
the incumbent head of SIS. 42 this belief had been shown to be The British government has
Hitherto, McColl and his prede- naïve. The post-Cold War era played an instrumental, if not
cessors had been ritually had not brought an end to con- always positive, role in drag-
referred to as “C,” the fabled flict or instability, nor had it ging its intelligence community
code name that originated with confirmed “the end of history,” into the sunlight. In the sum-
Captain Sir Mansfield Cum- in which secular free-market mer of 2003, members of the
ming, the first director of the democracy reigned unchal- administration of then Prime
service. lenged. The intelligence ser- Minister Tony Blair, in particu-
vices, having lost the stabilizing lar Downing Street’s then
In 1994, SIS and GCHQ force of a common enemy, found Director of Communications
joined the MI5 on the statute themselves required to adapt to and Strategy Alastair Camp-
book, while the Intelligence and a host of new threats, from the bell, came under heavy fire
Security Committee (ISC) was development of corruption, car- amid allegations that intelli-
established to oversee the “pol- tels, and mafias in transition- gence on Iraqi WMD had been
icy, administration and expen- ing countries, to the global deliberately twisted—or “sexed
diture” of the three agencies. 43 spread of terrorism, organized up”—in its representation to
It should be said that the Brit- crime, drug smuggling, and the public in order to present
ish glasnost was not in isola- human trafficking. an exaggerated case for mili-
tion; the collapse of communism tary action. The row centered
prompted most Central and Terrorism and Iraq on the publication of two highly
Eastern European secret ser- Since 2001, few subjects have contentious dossiers, which,
vices, previously little more commanded so much attention using intelligence-derived infor-
than Soviet surrogates, to and controversy as intelligence. mation (including both
enshrine their responsibilities The terrorist attacks of 9/11, HUMINT gathered by SIS
and powers in statute. Madrid, and in London, the and—for the first time—JIC
wars in Iraq and Afghanistan, assessments), claimed that Iraq
Underpinning this new spirit debates about weapons of mass had reconstituted its nuclear
of openness was a perception destruction (WMD), domestic weapons program and could
that intelligence as a whole was surveillance, and secret deten- “deploy [chemical and biologi-
becoming less important. For tion and rendition have all cal] weapons within 45 min-
statesmen and practitioners brought unwelcome notoriety utes of a decision to do so.” 45
alike, the passing of Marxism- and exposure to the intelli-
Leninism from the Soviet gence services. In a world of Asking the JIC to produce
Union, the diminution of the media plenty, the importance, material for public consump-
likelihood of large-scale conflict but also the limitations and tion was an act without paral-
between states, and the pur- abuses of intelligence, have lel in British politics. Blair,
ported universalization of West- never been more visible. In the writes Christopher Andrew,
ern liberal democracy as the face of threats from militant “finally laid to rest the tradi-
final form of government all jihadists, public expectations of tional taboo that British gov-
pointed to a “New World Order” intelligence have soared to an ernments do not mention their
in which intelligence would all-time high, as have calls for intelligence services.” 46 As the
take a backseat. greater transparency about months passed without any
sign of the weapons about

42 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

In a community-wide bid to restore public confidence, each in-


telligence service now places job advertisements in the nation-
which Blair and his security
al press, offers career presentations at academic recruitment
apparatchiks had ominously
warned, breaking this taboo fairs, and maintains a website.
proved disastrous. Ministers
were accused of “spinning” transparency, on 6 January Cold War files on Soviet intelli-
intelligence to sell the war on a 2009 Jonathan Evans became gence operations. 49 SIS, despite
false premise, and the intelli- the first serving director gen- retaining its own archive, has
gence services, historically eral in MI5’s 100-year history released a number of docu-
unswayed by the interests of to meet the press. ments held in the files of other
any political party or class, departments and approved the
were criticized for compromis- New Openings declassification of all surviving
ing their independence and suc- Historiography has benefited SOE records in its custody.
cumbing to political influence. immeasurably from the two- Now, rather than retain entire
decade waning of intelligence documents, departments pro-
As Richard Aldrich argues, taboos. Declassification of docu- ducing classified material
“the opening up of intelligence mentary evidence, especially increasingly extract or “white-
has followed the law of unin- older material, has gone hand out” sensitive passages (a
tended consequences.” 47 Intend- in hand with the more general redaction technique CIA has
ing only to disclose selected opening up of intelligence agen- used since the 1970s—though it
snippets of information, the cies. The process began with blacks out passages).
government instead put intelli- the Waldegrave Initiative on
gence into a goldfish bowl, Open Government in 1993, The opening of new reposito-
encouraging the ceaseless scru- which saw the first release of ries in Eastern Europe has also
tiny of an increasingly inquisi- historical records generated by given historians a revealing
torial Parliament and a the secret services and afforded glimpse at intelligence activi-
decreasingly deferential media. independent historians the ties and the mindset on the
Symbolizing the slide towards opportunity to assist in the for- other side of the Iron Curtain.
greater openness, the Hutton mulation of retention and Materials bearing on the work
Inquiry, which reported on release policies. 48 of the East German Ministry
28 January 2004, posted online for State Security (Stasi) have
virtually all of its evidence, By the end of the second mil- revealed a web of foreign espio-
including sensitive documents lennium, hundreds of files nage in Britain during the Cold
written only weeks before. relating to SOE, MI5, and Ultra War. By referring to a vast
had been transferred to TNA, array of German sources in his
In a community-wide bid to though few related to the period book The Stasi Files, Anthony
restore public confidence, each beyond 1945. Since then, a tsu- Glees suggested that some 100
intelligence service now places nami of declassified material Britons operated—wittingly or
job advertisements in the has occurred. To date, MI5 has not—as agents of influence,
national press, offers career declassified approximately including prominent CND
presentations at academic 4,000 “pieces” of historically members and, most controver-
recruitment fairs, and main- significant information (in offi- sially, Lord Roper, former direc-
tains a website delineating cial usage, a piece may repre- tor of studies at Chatham
objectives and staffing. Gener- sent a whole file or a particular House. 50
ally speaking, MI5 is more open portion of it), including war-
than its sister service, SIS. In a time material on German spies It should be said, of course,
recent step towards greater and double agents, and early that former Eastern bloc read-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 43


Intelligence History in the UK

In Britain, where spin doctors have a particular resonance in


this field, the sincerity of declassification efforts has been the
deception and dissimulation,
subject of much debate.
who are just as likely to fake
the historical record as any-
ing rooms do present problems. barding the public with a mass thing else.” 56
Although the communist sys- of largely insignificant
tem was akribisch—that is, information. 54 The first tranche Some researchers therefore
obsessive about documenting of SOE material, which have turned to oral his-
itself—officials often talked included hefty batches of files tory—“growing their own
“newspeak rather than brass on sabotage devices (e.g., incen- records”—in order to corrobo-
tacks even behind closed doors.” diary cigarettes and exploding rate the accuracy of their archi-
Files relating to agents and rats), and papers setting out val findings. 57 This, too, of
informants, moreover, are noto- plans to assassinate Adolf Hit- course, has inherent flaws—the
riously patchy. 51 In a memora- ler, was presented to the public inevitable diminished memory,
bly bitter review, Paul Maddrell as one of the biggest “wind- especially when a subject
attacked The Stasi Files for falls” of the end of the Cold worked in secrecy. Such testi-
inflating its subject matter and War. Such material is all well mony is often polluted by what
accused Glees of committing a and good, auguring, as it did, a has been absorbed from subse-
cardinal sin for any historian, more open future. It would be quent experience and dis-
failing to authenticate the reli- well to bear in mind, however, course, or, in the case of the
ability of his evidence. 52 that such programs of docu- once powerful, corrupted by a
ment release might also serve self-conscious desire to entomb
In Britain, where spin doctors as the perfect matador’s a good reputation. As Philip
have a particular resonance in cape—waved ostentatiously to Davies convincingly argues, the
this field, the sincerity of draw the eye away from more most effective intelligence
declassification efforts has been critical areas. scholar should not use witness
the subject of much debate. For testimony to the exclusion of all
British intelligence scholar Ken Richard Aldrich is another other material but should “tri-
Robertson they have been tan- scholar who has warned against angulate” research through a
tamount to carefully coordi- taking the Waldegrave Initia- triad of archival, secondary, and
nated publicity stunts by a tive at face value. Before enter- oral sources. 58
government intent on “policing ing the public domain, he
its past,” providing officials reminds us, official records are Communities of Research
with the opportunity to rhapso- meticulously “preselected, Although the scope of histori-
dize about transparency while cleaned and processed” by the cal writing on intelligence today
it exerts control over the pace Whitehall machine. With no is so wide that it is difficult to
and content of disclosure. external assurance that what is pigeonhole scholars into
Newly released files, it is said, released is “necessarily an ana- research communities or sub-
only disclose what govern- logue of reality,” what is to stop schools, Wesley Wark’s treatise
ments deem safe to put on pub- the researcher from becoming Espionage: Past, Present,
lic view. 53 an official historian, albeit once Future? notes that certain
removed? 55 Documents written “projects” are presently being
Following Robertson’s exam- by actual spies require perhaps pursued and suggests a few
ple, Peter Gill argues that the most careful handling. As categories. 59
Whitehall has become increas- Bernard Porter writes, “all
ingly skilled at what he calls spies and secret agents are Frameworks. The first might
“burying,” a strategy of bom- liars, trained in techniques of be called the “Research Proj-

44 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Until recently—in the much-quoted words of Walter Laque-


ur—“all attempts to develop ambitious theories of intelligence
ect,” the main task of which is
have failed.”
to establish the historical
framework of intelligence,
rediscovering and interpreting Until recently—in the much- lenges the assertion that intelli-
its growth, performance, and quoted words of Walter gence is organized by the state
relevance. Centered on the “epi- Laqueur—“all attempts to for the state. 66
sodic treatment of intelligence develop ambitious theories of
in peace and war” during the intelligence have failed.” 63 Offi- The recent emphasis on open
period from the creation of the cialdom stuck to a very rigid source intelligence (OSINT) has
Secret Service Bureau in 1909 definition of intelligence as further muddied the water,
to the end of the Cold War, 60 the “information about things for- “blurr[ing] distinctions between
“Research Project” involves a eign”—capabilities, intentions, intelligence and information
prolonged immersion in archi- or activities. In academic writ- and the barrier between secret
val sources and favors the case ing, meanwhile, the term was and non-secret.” 67 Although
study methodology. Many texts defined de novo by each scholar OSINT under one name or
are understandably prone to who discussed it. Today we tend another has been around for
narrative and description. to think about intelligence in centuries, with the rise of the
Without such work, however, terms of a three-part schema. 64 Internet and global communica-
intelligence history would The first, usually labelled “the tions, the ability to search
remain conjectural, even con- intelligence cycle,” is a series of material at the click of a but-
spiratorial and misconceived, steps that begins with a request ton has given it much greater
and laden with epistemic blind for information, which is then prominence and added new
spots. collected, analyzed, and dissem- components, for example, the
inated to the client. Secondly, it blogosphere and social media.
Theory. A second project is seen as a “product,” used by
works to answer the question, decisionmakers at several lev- The Interdisciplinary. A
“What is intelligence?” The els. Thirdly, it is seen as an commitment to interdisciplin-
effort to define intelligence rubs “institution,” encompassing the ary synergies has become one of
shoulders with political sci- roles of related pursuits such as the hallmarks of intelligence
ence, gives rise to what is often covert action, deception, and historiography. The involve-
referred to as “intelligence clandestine diplomacy. ment of historians and political
theory,” 61 and is, as Michael scientists, as well as partners in
Warner explains, far more com- Warner’s definition—“Intelli- English, sociology, and law has
plicated than painting a carica- gence is secret, state activity to made it a distinctive research
ture of “some shadowy understand or influence for- cluster. Certain intelligence
figure…skulking in a dark eign entities”—is as apt as it is scholars would consider them-
alley.” Moreover, how we define succinct. 65 This said, in the 21st selves as “hybrid” or “hyphen-
intelligence has significant century it is arguably getting ated” historians, taking their
implications for practitioners harder to build a properly research and perspectives
and scholars alike, shaping the encompassing taxonomy of intel- beyond the academy. Although
work and remit of oversight ligence. The increased produc- those who write for nonaca-
committees, as well as influenc- tion and consumption of demic audiences are still some-
ing declassification policies by surreptitiously acquired infor- times disparaged, for many in
elucidating what are and are mation by private groups, such the community, the develop-
not activities that governments as water suppliers, electricity ment of a synthetic literature
are required to keep secret. 62 companies, and airlines chal- that connects intelligence his-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 45


Intelligence History in the UK

The need to relate historical analysis to contemporary prob-


lems has led to the establishment of dedicated research cen-
is the Center for Intelligence
ters. and Security Studies at the
University of Mississippi.
tory and public policy is familiar with failed British
essential. 68 attempts to estimate Soviet The “Official History.” The
nuclear capability during the most common way to connect
History, proponents claim, can Cold War, they would have real- history with policy is, of course,
be quarried for lessons and can ized that approximating WMD to write full-scale histories,
inform current and future prac- stocks is fraught with difficulty which analyze all stages of the
titioners. The most vocal and potential intellectual blink- intelligence cycle and seek to
spokesman for the “Public Pol- ering. identify trends and themes
icy Project” has been Christo- from past to present. With their
pher Andrew. From salutary The need to relate historical access to resources of state,
warnings about the dangers of analysis to contemporary prob- including former agents and
failing to heed the lessons of lems has led to the establish- personnel, the best people to
history, Andrew has moved to ment of dedicated research undertake such a task may be
the assertion that today’s politi- centers, such as the Brunel official historians: “Just as
cal culture suffers from “Histor- Centre for Intelligence and intelligence chiefs have to be
ical Attention Span Deficit Security Studies (BCISS) and able to tell policymakers what
Disorder,” a widespread belief the Buckingham University they do not want to know, so
that the past is “irrelevant to Centre for Security and Intelli- official historians have to be
present and future policy and gence Studies (BUCSIS), that free, on occasion, to tell intelli-
intelligence analysis.” 69 For foster links with practitioners gence agencies uncomfortable
example, had decisionmakers and offer degree program? in truths.” 71
prior to the Iraq War been both historical and policy-ori-
ented contexts. 70 Designed as In 2009, MI5 marked its cen-
“career-relevant” degrees, MA tenary with the publication of
programs are invariably filled an authorized history, written
by those in quest of, or engaged by Christopher Andrew. In
in, security-related jobs. Aca- 2010, Keith Jeffrey's officially
demics at Brunel and Bucking- sanctioned history of SIS hit
ham double as consultants, bookshops. It covered the his-
providing custom-made aca- tory of the service from its
demic packages to both profes- beginnings in 1909 to the early
sional and corporate clients. Cold War. Yet not everyone has
warmed to such works. As Len
It is pleasing to note that the Scott and Peter Jackson
United States has similar cen- explain, “For some academics
ters to prepare students for the Ivory Tower should remain
careers in intelligence and pro- a sanctuary and provide a pan-
vide educational tools to the orama on the world outside.” 72
intelligence community. A clus- Is it not profoundly unfair, crit-
ter exists, not surprisingly, ics ask, that Professors Andrew
among the several universities and Jeffrey have been able to
in the Washington, DC area. feast their eyes on materials
“Hacker in chief,” Christopher
Andrew. Image courtesy C. Andrew.
Exemplary outside the capital denied to the remainder of their

46 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

It should be clear, by now, that this is an exciting time for UK


students of intelligence, a subject no longer obscured by secre-
profession? For Anthony Glees,
cy or bedecked with flights of the imagination.
the risk of whitewashing is all
too great: “I don’t think govern-
ments should write their own Eye), and other cultural miscel- Britain at the top table in an
history. Academics should not lanea. age of postimperial decline,
become ambassadors or politi- became a law unto itself, impli-
cians, or work for the secret The second is a strategy for cated in the surveillance and
service.” 73 writing intelligence history infiltration of dissident groups;
from the “bottom up,” moving the secret funding of propa-
Christopher Andrew, having beyond the intensively culti- ganda and smearing oppo-
twice coauthored officially spon- vated field of high politics to nents; and the formulation of
sored histories of the KGB explore the private experience “disruptive action,” including
(with the aid of Soviet defec- of spies and their most inti- assassination plots, against
tors, Oleg Gordievsky and mate details, such as sexuality, such leaders as Mohammed
Vasili Mitrokhin), has been social class, and political orien- Mossadeq, Slobodan Milosevic,
labelled by cynical voices as a tation. Among the most vocifer- and Muammar Qaddafi.
“court historian.” This is too ous proponents of the “Civil
strong. Andrew and Jeffrey, Liberties Project” are Robin Few mainstream authors sup-
who throughout their careers Ramsay and Stephen Dorril. port the “para-political” belief
have railed against the official Their investigations deftly sur- that what the intelligence ser-
position that there could be no vey the heartless aspects of the vices do is nefarious and dispro-
middle ground between total secret state, upending estab- portionate to the threat posed
secrecy and total disclosure, lished orthodoxy by rendering by the nation’s enemies. Peter
have to preserve their aca- Western and Eastern Euro- Hennessy, in his excellent study
demic standing at all costs. pean intelligence services as of the Cold War secret state and
Sanitizing the historical record equally contemptuous and contingency planning in the
now, knowing that documents equally corrupt. event of Soviet attack, makes
in question will in due course an impressive case for the view
enter the public domain, would MI6: Fifty Years of Special that the UK intelligence com-
be making whips for their own Operations was in itself an munity, far from being a rogue
flogging. exposition of the basic tenets of elephant, comprised a noble
“para-political” approaches. In band of skillful patriots, and
The Countervailing View. A the preface, Dorril writes: “In was instrumental in defending
small group of intelligence his- order to unravel the activities the realm and keeping Britain
torians in the UK is engaged in of SIS, one has to dig deep and out of nuclear war. 76 In time, he
dissecting the seamier side of sift carefully, in the manner of proposes, as new evidence is
espionage. The so-called “Civil an archaeologist, but also accul- marshalled on communist sub-
Liberties Project” (also known turate, like some intrepid version and the dirty work of
as the “para-political” school) anthropologist, to a strange and the KGB, the dominant histo-
conjoins two scholarly secretive society whose intri- riographical assumption will
agendas. 74 The first is a pro- cate social and professional net- probably be that British coun-
gram for researching intelli- works are familiar to their terintelligence was grossly
gence history by way of members but quite baffling to inadequate.
nonofficial sources, including the outsider.” 75 What emerges
obituaries, editorials, satirical from Dorril’s 900-page tome is
magazines (such as Private that SIS, determined to keep

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 47


Intelligence History in the UK

British historiography of intelligence—having grown out of tra-


ditional British political history, which frankly precludes an inter-
British interests worldwide
est in the non-Western world—has neglected the role of (diplomatic properties and staff;
intelligence services in imperial contexts. businesses and investments;
and citizens living abroad) has
long fallen within the remit of
New Directions ans? Leaving aside fears about its functions. Both Philip Mur-
It should be clear, by now, that whitewashing and sycophancy, phy and Calder Walton have
this is an exciting time for UK the recently published official made initial forays into this
students of intelligence, a sub- histories of MI5 and SIS are topic, demonstrating how the
ject no longer obscured by truly exhaustive in their cover- intelligence services attempted
secrecy or bedecked with flights age; that is the official histo- to gather information about
of the imagination. All the rian’s privilege. When the indigenous groups, to police
omens point to a healthy future. official history of the JIC is political opponents, and to
Fourteen British universities released, little of the general extinguish “colonial fires,”
presently offer undergraduate outline will be left unsaid. With albeit with diminishing success
or postgraduate courses explic- this, the original raison d'être of in the 1950s. 80
itly on intelligence and secu- intelligence history—namely, to
rity; at least a further dozen rescue from oblivion the gaps in Although spy fiction is a sub-
offer modules on terrorism and knowledge—will appear tired ject well traversed in literary
political violence. 77 As the Cold and slow. As is the way of and film studies (exploring the
War continues to recede into things, intelligence historians formulaic nature of the genre,
history, more archival openings will have become settlers rather plot conventions, and the like),
are anticipated. Indeed, as Don- than pioneers, required to think there has been conspicuously
ald Cameron Watt once pointed reflexively about the nature of little attention by historians to
out, historians of intelligence their enterprise. Arguably, less the genre, specifically the
will always be better off than time will be spent doing intelli- important question of how its
scholars working on the Greco- gence history, and more reflect- products relate to and reflect
Roman period or the Middle ing on how it is done and where the real world of intelligence. 81
Ages. 78 it needs to go.
The debunking of intrigue
For the foreseeable future, A handful of areas seem narratives has become a com-
intelligence will remain a cor- deserving of more attention, pulsory practice. However, as
nerstone of democratic govern- however. So far, British histori- Wark implored over 10 years
ment, tasked to counter the ography of intelligence—hav- ago, the relationship between
enduring threat from al-Qa‘ida ing grown out of traditional social reality and popular cul-
and associated networks, but British political history, which tural construction should be
also used increasingly in peace- frankly precludes an interest in addressed. 82 Rightly or wrongly,
keeping, crisis management the non-Western world—has spy fiction has to a large extent
and contingency planning. For neglected the role of intelli- shaped public perceptions of
those researching contempo- gence services in imperial con- intelligence. Many retired SIS
rary matters, therefore, it is a texts, especially during the officers, including John le Car-
case of “having to run to keep period of decolonization. Con- ré, often admit to joining Brit-
up.” 79 trary to popular belief, the geo- ish intelligence as young men
graphical scope of MI5’s work partly because they had been
But can the same necessarily has never been restricted to the brought up on a fictional diet of
be said for intelligence histori- metropole. The protection of swashbuckling yarns.

48 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Despite the recent appearance of GCHQ: The Uncensored


History of Britain’s Most Secret Intelligence Agency, by Richard
According to KGB defector
Oleg Gordievsky, the Central
Aldrich, what one might call the “SIGINT Project” has scarcely
Committee of the Soviet Com- begun.
munist Party routinely watched
James Bond films in the vain
hope that its scientists could focus on HUMINT has been cer Reginald “Blinker” Hall,
replicate “Q Branch” more a matter of necessity than had cracked German codes dur-
technology. 83 In the mid-1960s, professional preference. Yet ing the Great War; indeed,
mindful of a “spy fiction gap,” Christopher Andrew has been Room 40’s successful intercep-
the KGB attempted to win the especially critical of intelli- tion of the Zimmermann tele-
thriller war by commissioning gence historians for failing to gram, which accelerated the
Bulgarian author Andrei take account of SIGINT’s con- United States’ entry into the
Gulyashki to write a series of tribution in the Cold War. Its war, had achieved extensive
spy novels in which the “cere- continued absence, he argues, notoriety and fanfare in the
bral powers” and “analytical reflects widespread “cognitive press. 88 Held from November
mind” of a self-styled major dissonance” within the disci- 1945 to July 1946, the Congres-
named Zakhov were pitted pline—that is, reluctance sional Inquiry into Pearl Har-
against James Bond’s “ruth- among scholars to embrace a bor had publicly discussed the
less, intuitive violence.” 84 Need- subject that would fundamen- accomplishments of “Magic,”
less to say, Bond is ultimately tally challenge historiographi- the cryptonym for American
slain at the hand of his supe- cal orthodoxy, not to mention efforts to break Japanese mili-
rior, morally clean Soviet adver- their own career-hardened pat- tary and diplomatic communi-
sary. terns of thought. 86 cations during World War Two.

Despite the recent appear- The current crop of intelli- Despite allowing for the enor-
ance of GCHQ: The Uncensored gence historians, suggests mous benefit of hindsight, the
History of Britain’s Most Secret Andrew, are not the first to dis- fact that no historian, for over a
Intelligence Agency, by Richard play cognitive dissonance with quarter of century, considered
Aldrich, what one might call respect to SIGINT. In 1945, Sir the possibility that the British
the “SIGINT Project” has Edward Travis, operational had enjoyed similar success
scarcely begun. 85 In part, this is head of Bletchley Park and, against Hitler’s ciphers is
because the fast-paced world of later, director of GCHQ, was remarkable. Just as baffling,
covert action has been instantly certain that scholars would when intelligence officer turned
more arresting to historians, soon discover the Ultra secret: author Donald McLachlan dis-
and to their publishers, than “The comparing of the German closed Bletchley Park’s secret
has been the mundane setting and British documents is bound codename—“Station X”—in his
of moth-eaten desk men comb- to arouse suspicion in [their] 1968 publication, Room 39:
ing transcripts of telephone minds that we succeeded in Naval Intelligence in Action
conversations and burrowing in reading the enemy ciphers.” 87 1939–45, it took another 6 years
mountains of diplomatic corre- The clues, it was assumed, were before historians finally con-
spondence. too obvious for historians to nected the dots and started to
miss. consider with confidence the
It is also the case that much of contribution of British cryptog-
the pertinent material has not It was widely known that raphy to the Allied war effort. 89
yet been released. For many in British cryptographers, under
the profession, therefore, the the direction of intelligence offi-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 49


Intelligence History in the UK

It is very important, however, that we also cast our net beyond


the relationship between British intelligence and its partner
agencies in Washington. another recent example of his-
torical writing that success-
fully manages to employ a
One of the biggest challenges clusions about general trends comparative methodology. 91
facing intelligence historians is and dynamics. The Hidden
to resist the urge to study the Hand: Britain, America and It is very important, however,
British intelligence community Cold War Secret Intelligence, by that we also cast our net
in geographic isolation. For its Richard Aldrich, is an exem- beyond the relationship
sins, much of the existing liter- plar of comparative history, between British intelligence
ature is parochial and Panglos- seamlessly shifting between and its partner agencies in
sian; that is, accepting of the two intelligence cultures and Washington. During the Cold
unique and incomparable their institutions. By placing War, in a bid to monitor the
make-up of British institu- intelligence in a hemispheric Soviet Union and its satellites,
tions, and reluctant to analyze perspective, Aldrich reveals not the UK intelligence community
thematic issues in a broader only the cohesion and unities of often liaised with a range of
transnational context. 90 the Anglo-American “Special non-Anglo-Saxon allies, includ-
Relationship,” but also the ing the West German Federal
Embedding the history of the moments of “rancour and suspi- Intelligence Service (BND) and
British intelligence services in cion” that have threatened to the French General Directorate
a comparative history of the derail its continuance. for External Security (DGSE).
20th century intelligence revo- Nuanced, archivally rich, and The task of unpacking these
lution should reveal similari- theoretically informed—an relationships still awaits its
ties and differences between unusual trifecta—Intelligence historian.
particular national systems and Cooperation and the War on
thereby allow us to draw con- ❖ ❖ ❖
Terror, by Adam Svendsen, is

50 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Endnotes

1. N. Hiley, “Book Review of Plots and Paranoia by B. Porter,” Times Literary


Supplement (December 1989): 22–28.
2. A. Boyle, The Climate of Treason: Five who Spied for Russia (London:
Hutchinson, 1979).
3. C. Andrew and D. Dilks, eds., The Missing Dimension: Governments and
Intelligence Communities in the Twentieth Century (London: Macmillan,
1984).
4. Hansard Parliamentary Debates, 5th ser., vol. 150 (15 December 1924), col.
674.
5. F. Newsam to E. Bridges, 17 October 1952, The National Archives (hereaf-
ter cited as TNA), HO 287/1415.
6. M. Howard, “Cowboys, Playboys and Other Spies,” New York Times, 16 Feb-
ruary 1986.
7. W. Wark, “In Never-Never Land? The British Archives on Intelligence,” The
Historical Journal 35, no. 1 (March 1992): 195–203.
8. A.H. Taylor to the Director of Naval Intelligence, “Clandestine Warfare,” 8
June 1945, TNA, ADM 223/480.
9. P. Wright, Spycatcher: The Candid Autobiography of a Senior Intelligence
Officer (Richmond, Australia: Viking Press, 1987).
10. C. Pincher, Their Trade is Treachery (London: Sidgwick & Jackson, 1981).
11. L. Zuckerman, “How not to Silence a Spy,” Time, 17 August 1987.
12. See C. Pincher, “The Far from Glorious History of MI5,” The Independent,
11 December 2005; C. Pincher, Treachery: Betrayals, Blunders and Cover-ups;
Six Decades of Espionage Against America and Great Britain (New York: Ran-
dom House, 2009).
13. C. Andrew, “Historical Research on the British Intelligence Community,”
in Comparing Foreign Intelligence: The U.S., the USSR, the U.K. and the Third
World, ed. R. Godson (London: Brassey’s, 1988).
14. R.J. Aldrich, The Hidden Hand: Britain, America, and Cold War Secret
Intelligence (London: John Murray, 2001), 606.
15. This delightful phrase is used by R. Rosenbaum in “Kim Philby and the
Age of Paranoia,” New York Times, 10 July 1994.
16. G. Greene, foreword,to My Silent War, by K. Philby (London: Grafton,
1968).
17. See M. Carter, Anthony Blunt: His Lives (London, 2001); A. Danchev, “Will
the Weevil Delay?: Creative Writing and the Cold War,” Intelligence and
National Security 20, no. 3 (September 2005): 525–32.
18. O. Hoare, “Introduction,” Intelligence and National Security 17, no. 1
(Spring 2002): 3.
19. W. Wark, “Introduction: The Study of Intelligence: Past, Present, Future?,”
in Espionage: Past, Present, Future? ed. W. Wark (Ilford: Routledge, 1994), 1.
20. J. C. Masterman, The Double-Cross System in the War of 1939–45 (New
Haven and London: Yale University Press, 1972).

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 51


Intelligence History in the UK

Endnotes (cont.)

21. D. Kahn, “Enigma Unwrapped,” New York Times Book Review, 29 Decem-
ber 1974.
22. F. W. Winterbotham, The Ultra Secret (Aylesbury, UK: Harper Collins,
1974).
23. See L. Tordella, review of The Ultra Secret, by F. W. Winterbotham, Stud-
ies in Intelligence 19, no. 3 (Fall 1975): 45–47.
24. United Kingdom. “Use of Special Intelligence by Official Historians,” JIC
(45) 223 (0) Final, 20 July 1945, TNA, CAB 103/288; “General Directive to
Chief Historians for Safeguarding Special Intelligence Sources in Compiling
Official Histories,” 20 July 1945, TNA, CAB 103/288.
25. See D. Reynolds, “The Ultra Secret and Churchill’s War Memoirs,” Intelli-
gence and National Security 20, no. 2 (June 2005): 209–224; D. Reynolds, In
Command of History: Churchill Fighting and Writing the Second World War
(London: Penguin, 2004), 499.
26. United Kingdom. “The Release of SIGINT Records,” JIC (58) 46, 13
November 1968, TNA, PREM 13/3252.
27. F. H. Hinsley et al., British Intelligence in the Second World War: Its Influ-
ence on Strategy and Operations (London: Her Majesty’s Stationery Office,
1979).
28. See R. J. Aldrich, “Policing the Past: Official History, Secrecy and British
Intelligence since 1945,” English Historical Review 119, no. 483 (September
2004): 922–53.
29. Cited in K. Boyd, Encyclopedia of Historians and Historical Writing: Vol-
ume 1 (London: Routledge 1999), 592.
30. R.J. Aldrich, “The Secret State,” in A Companion to Contemporary Britain,
ed. P. Addison and H. Jones (Oxford: Wiley-Blackwell, 2005), 336.
31. Andrew and Dilks, eds., Missing Dimension, 4.
32. See R.J. Aldrich, “Never Never Land and Wonderland? British and Ameri-
can Policy on Intelligence Archives,” Studies in Intelligence 38, no. 5 (1995):
17–26.
33. Ibid.
34. A. C. Brown, C: The Secret Life of Sir Stewart Graham Menzies, Spymaster
to Winston Churchill (New York: Macmillan, 1987).
35. C. Andrew, Secret Service: The Making of the British Intelligence Commu-
nity (London: William Heinemann, 1985).
36. K. Jeffrey, “Intelligence and Military History: A British Perspective,” in
Military History and the Military Profession, ed. D. Charters, M. Milner, and J.
B. Wilson (London: Greenwood, 1992), 110.
37. B. Bridges, “Britain and Japanese Espionage in Pre-War Malaya: The Shi-
nozaki Case,” Journal of Contemporary History 21, no. 1 (January 1986):
23–35; N. Hiley, “Counter-Espionage and Security in Great Britain during the
First World War,” English Historical Review 101, no. 400 (1986): 635–70.
38. J. L. Gaddis, “Intelligence, Espionage and Cold War Origins,” Diplomatic
History 13, no. 2 (April 1989): 191-213. Also see D. C. Watt, “Intelligence Stud-

52 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Endnotes (cont.)

ies: The Emergence of the British School,” Intelligence and National Security
3, no. 2 (April 1988): 338–41.
39. R. Erskine, “Reviews and Commentary,” International Journal of Intelli-
gence and Counterintelligence 6, no. 2 (Summer 1993): 241-53.
40. See P. Major, Behind the Berlin Wall: East Germany and the Frontiers of
Power (Oxford: Oxford University Press, 2009).
41. See W. Schmidt, “Britain’s Spy Agencies Begin to Come Out from the
Cold,” New York Times, 22 August 1993.
42. “The Secret’s Out: Top British Spy Identified,” New York Times, 7 May
1992.
43. See the “Intelligence” page under the “National Security” header on the
Cabinet Office website at http://www.cabinetoffice.gov.uk/content/intelligence/.
44. See L. Scott, “Sources and Methods in the Study of Intelligence: A British
View,” Intelligence and National Security 22, no. 2 (April 2007): 185-205.
45. United Kingdom. Iraq’s Weapons of Mass Destruction: The Assessment of
the British Government (London, 24 September 2002); Iraq: Its Infrastructure
of Concealment, Deception and Intimidation (London, 7 February 2003).
46. C. Andrew, “Intelligence, International Relations and ‘Under-theorisa-
tion,’” Intelligence and National Security 19, no. 2 (Summer 2004): 171.
47. C. Andrew, R.J. Aldrich, and W. Wark, “Preface: Intelligence, History and
Policy,” in Secret Intelligence: A Reader, ed. C. Andrew, R.J. Aldrich, and W.
Wark, (London: Routledge, 2009), xvi.
48. See G. Bennett, “Declassification and Release Policies of the UK’s Intelli-
gence Agencies,” Intelligence and National Security 17, no. 1 (March 2002):
21–32.
49. See the “Management and Destruction of Files” page on the MI5 website,
http://www.mi5.gov.uk/output/retention-and-destruction-of-files.html.
50. A. Glees, The Stasi Files: East Germany’s Secret Operations against Brit-
ain (London: Free Press, 2003).
51. See R. Mitter and P. Major, “East is East and West is West? Towards a
Comparative Socio-Cultural History of the Cold War,” in Across the Blocs: Cold
War Cultural and Social History, ed. R. Mitter and P. Major (London: Frank
Cass, 2004), 1–23.
52. P. Maddrell and A. Glees, “Debate: The Stasi Files,” Intelligence and
National Security 19, no. 3 (2004): 553–69.
53. K. G. Robertson, “The Politics of Secret Intelligence: British and American
Attitudes,” in British and American Approaches to Intelligence , ed. K. G. Rob-
ertson (Basingstoke, UK: Macmillan, 1987), 144.
54. P. Gill, “Reasserting Control: Recent Changes in the Oversight of the UK
Intelligence Community,” Intelligence and National Security 11, no. 2 (1996):
313–20.
55. See Aldrich, Hidden Hand, 4–6.
56. B. Porter, Plots and Paranoia: A History of Political Espionage in Britain
1790–1988 (London: Routledge, 1989), viii.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 53


Intelligence History in the UK

Endnotes (cont.)

57. R.J. Aldrich, “Grow Your Own: Cold War Intelligence and History Super-
markets,” Intelligence and National Security 17, no. 1 (Spring 2002): 135–52.
58. P. Davies, “Spies as Informants: Triangulation and the Interpretation of
Elite Interview Data in the Study of the Intelligence and Security Services,”
Politics 21, no. 1 (2001): 73–80.
59. Wark, ed., Espionage: Past, Present, Future?
60. Ibid., 3.
61. See P. Davies, “Ideas of Intelligence: Divergent National Concepts and
Institutions,” in Secret Intelligence: A Reader, ed. C. Andrew, R. J. Aldrich, and
W. Wark (London: Routledge, 2009), 12–18.
62. M. Warner, “Wanted: A Definition of 'Intelligence’,” Studies in Intelligence
46, no. 3 (2002): 15–22.
63. W. Laqueur, A World of Secrets: The Uses and Limits of Intelligence (New
York: Basic Books 1985), 8.
64. See M. Lowenthal, Intelligence: From Secrets to Policy (Washington: CQ
Press, 2002), 8.
65. Warner, “Wanted,” 21.
66. For more examples, see Eamon Javers, Broker, Trader, Lawyer, Spy: The
Secret Word of Corporate Espionage (New York: HarperCollins, 2010). For a
review of Javers’ book, see “The Intelligence Officer’s Bookshelf,” by Hayden
Peake, Studies in Intelligence 55, no. 1 (March 2011).
67. Andrew, Aldrich, and Wark, eds., Secret Intelligence, 2.
68. Ibid., xv.
69. C. Andrew, “Intelligence Analysis Needs to Look Backwards before Look-
ing Forward,” History and Policy (June 2004), in http://www.historyandpol-
icy.org/papers/policy-paper-23.html.
70. The homepages for Brunel University and The University of Buckingham
contain descriptions of BCISS and BUCSIS. See
http://www.brunel.ac.uk/about/acad/sss/research/centres/bciss and
http://www.buckingham.ac.uk/international/bucsis/.
71. Andrew, “Intelligence Analysis.”
72. L. Scott and P. Jackson, “The Study of Intelligence in Theory and Practice,”
Intelligence and National Security 19, no. 2 (Summer 2004): 152.
73. D. Walker, “Just How Intelligent?” The Guardian, 18 February 2003.
74. Wark, “Introduction,” 7.
75. S. Dorril, MI6: Fifty Years of Special Operations (London: Fourth Estate,
2000), xiv.
76. P. Hennessy, The Secret State: Whitehall and the Cold War (London: Pen-
guin, 2002).
77. P. Maddrell, “Intelligence Studies at UK Universities: An Expanding Sub-
ject,” http://users.aber.ac.uk/rbh/iss/uk.htm.

54 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence History in the UK

Endnotes (cont.)

78. D. C. Watt, “Intelligence and the Historian: A Comment on John Gaddis's ‘Intelli-
gence, Espionage, and. Cold War Origins’,” Diplomatic History 14, no. 2 (Spring 1990):
199-204.
79. Andrew, Aldrich, and Wark, “Preface: Intelligence, History and Policy,”
xvii.
80. P. Murphy, “Creating a Commonwealth Intelligence Culture: The View
from Central Africa, 1945–1965,” Intelligence and National Security 17, no. 3
(Autumn 2002): 131-62; C. Walton, “British Intelligence and Threats to
National Security, 1941-51” (PhD diss., Cambridge University, 2006).
81. A notable exception here is a special issue of the journal Studies in Intelli-
gence. See “Intelligence in Contemporary Media: Views of Intelligence Offi-
cers,” Studies in Intelligence: Special Review Supplement (Summer 2009).
82. Wark, “Introduction: Study of Espionage,” 8.
83. See J. Black, “The Geopolitics of James Bond,” Intelligence and National
Security 19, no. 2 (Summer 2004): 290–303.
84. D. Schmidt, “Bulgarian Tours 007’s London Dens,” New York Times, 27
January 1966.
85. R.J. Aldrich, GCHQ: The Uncensored History of Britain’s Most Secret Intel-
ligence Agency (London: HarperCollins, 2010).
86. Andrew, “Under-Theorisation,” 170–84.
87. United Kingdom. E. Travis, “Special Order,” 7 May 1945, TNA, HW 3/29.
88. Andrew, “Under-Theorisation,” 174.
89. D. McLachlan, Room 39: Naval Intelligence in Action 1939–45 (London:
Littlehampton Book Services, 1968).
90. This argument is often made in relation to British political history. See S.
Pedersen, “What is Political History Now?” in What is History Now? ed. D.
Cannadine, (Basingstoke, UK: Palgrave, 2002), 36–57.
91. A. Svendsen, Intelligence Cooperation and the War on Terror: Anglo-Amer-
ican Security Relations after 9/11 (London: Routledge, 2009).
❖ ❖ ❖

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 55


From the Archives

The Evolution of US Army HUMINT: Intelligence


Operations in the Korean War
John P. Finnegan

This article was originally Lack of Intelligence


published in a classified issue of
Studies (44, no. 2) in 2000. The sudden outbreak of the
—ed. Korean war on 25 June 1950
came as a shock to US leaders.
The traumatic experience of In hindsight, this is not sur-


the Korean conflict was a prising. Since the onset of the
watershed in the evolution of Cold War, the nation’s intelli-
By the end of the Korean Army intelligence. Within six gence assets had been tar-
months, the Army found itself geted almost exclusively
War, the Far East facing two major intelligence
Command had fielded a against the Soviet Union. In
disasters: it was caught unpre- addition, intelligence responsi-
large Army-controlled pared by the initial North bilities in the Far East were
clandestine collection Korean invasion of June 1950 badly fragmented. General of
apparatus, closely linked and by the massive Chinese the Army Douglas MacAr-
with similarly large intervention in November of thur’s Far East Command
operations in the fields of that year. In response, the (FECOM), the major theater
partisan and Army hastily improvised a clan- headquarters in the area, no
destine human intelligence longer had any jurisdiction
psychological warfare. (HUMINT) organization, build- over the Korean peninsula:
ing on a small existing intelli-


authority over the area had
gence unit, the Korean Liaison devolved to the Korean Mili-
Office (KLO). By the end of the tary Advisory Group (KMAG)
Korean War, the Far East Com- after the last American occupa-
mand (FECOM) had fielded a tion forces left in mid-1949.
large Army-controlled clandes- Because the KMAG had no
tine collection apparatus, positive collection capability,
closely linked with similarly Korea was an intelligence
large operations in the fields of vacuum. a1
partisan and psychological war-
fare. More important, the Army
had begun to take steps to cre- a For more on intelligence during this

ate a permanent and profes- period, see Clayton Laurie, “A New Presi-
dent, a Better CIA, and an Old War,” in
sional HUMINT service that Studies in Intelligence 54, No. 4 (Decem-
could carry out positive intelli- ber 2010) and CIA release of documents
gence collection operations. from the period in www.cia.gov/library/
publications/historical-collections-publica-
tions/index.html.

All statements of fact, opinion, or analysis expressed in this article are those of the
author. Nothing in the article should be construed as asserting or implying US govern-
ment endorsement of its factual statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 57


US Army HUMINT in Korean War

In the field of intelligence, as in almost everything else, five Security Agency, Pacific (ASA-
years of peacetime occupation duty had left American forces in PAC) had two companies and
Japan less than well equipped to meet an outside challenge. two detachments in the Far
Maj. Gen. Charles Wil- of the whole Korean Peninsula. East, but these were trained
loughby, MacArthur’s G-2, did At the direction of the presi- and equipped for fixed-site
maintain a residual intelli- dent and acting under the operations and could not easily
gence organization in Korea, authority of the UN, FECOM be shifted to the field. ASA was
the KLO. The reports gener- quickly moved to intervene. But not able to deploy a tactical
ated by this small office, how- it found that in the field of unit in Korea until October,
ever, received little attention in intelligence, as in almost every- when a company was shipped
a preoccupied Tokyo. Similar thing else, five years of peace- from the United States. 5
reports submitted by an Air time occupation duty had left
Force Office of Special Investi- American forces in Japan less
gations (AFOSI) team that also than well equipped to meet an A Need for HUMINT
remained in Korea were like- outside challenge. 3 The adverse combat situation
wise disregarded. Intelligence confronted by FECOM and the
emanating from the small CIA On paper, FECOM controlled Eighth Army in Korea during
presence in Korea received an substantial intelligence assets. the summer of 1950 created a
equally cool reception from Willoughby had more than critical need for hard intelli-
FECOM. Intelligence that came 2,500 intelligence personnel at gence. With other assets
the way of these elements was his disposal, but these ele- unavailable, this could only be
procured largely through liai- ments were organized to sup- provided by HUMINT. An orga-
son with Republic of Korea port an army of occupation. The nization was quickly built
(ROK) sources. As such, it was largest single intelligence com- around the nucleus of the KLO,
deemed unreliable, and the ponent within FECOM was the using personnel from the 441st
information received was often 441st Counter Intelligence CIC Detachment. To carry out
conflicting. Intelligence officers Corps (CIC) Detachment, tar- its mission, the KLO hastily
back in Tokyo had heard “wolf ” geted against Japanese subver- recruited Korean peasants,
cried too often to believe that sive elements. It reported to gave them sketchy training,
anything was actually going to MacArthur in his capacity as and airdropped them behind
happen. Lack of intelligence Supreme Commander Allied enemy lines with instructions
resources and hard data was Powers, not as head of FECOM. to return with intelligence
paralleled by a lack of intelli- The four Army divisions in reports. In addition, it set up
gence perception. Because the Japan had no organic CIC Tactical Liaison Offices (TLOs)
North Korean destabilization detachments. 4 at division level to recruit Kore-
campaign against the South ans as line-crossers to gather
had failed, it was too easily A large Military Intelligence
clandestine HUMINT. a
assumed that the North would Service Company of Japanese
Although it operated in sup-
turn to political initiatives. 2 interpreters supported the
port of Eighth Army and its tac-
441st CIC Detachment, but
tical commanders, the whole
The advance of T-34 tanks there were only two Korean lin-
structure remained firmly
across the 38th parallel shat- guists at G-2’s disposal.
under Willoughby's control. 6
tered the illusions of FECOM FECOM’s Technical Intelli-
policymakers. The rapid col- gence Section had been discon- Agent casualties were high,
lapse of ROK forces meant that tinued in 1949. The PHOTINT and the quality of intelligence
only outside military help could capability of the command had produced unsatisfactory. But, in
prevent a communist takeover shriveled. Cryptologic resources the early stages of the war, it
were equally lacking. The Army

58 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

was all the UN forces had.


By the time of the Inchon landing, the intelligence picture in FE-
Nonetheless, the KLO tried to COM was improving.
improve the collection situa-
tion as early as August 1950.
One basic problem was that
both agent insertion tech- Some Improvement Manchuria. Some of these
niques used by the KLO—para- forces crossed over into Korea
chute drops and line- By the time of the Inchon in October and early Novem-
crossing—were intrinsically landing, the intelligence pic- ber. Sharp clashes with UN
hazardous, and even parachute ture in FECOM was improving. troops ensued, and Army intel-
agents had to exfiltrate through The theater had received addi- ligence discovered the Chinese
enemy lines to bring back their tional intelligence assets, and presence by finding that US
reports. The KLO came up with focus on the Korean problem at and ROK forces had taken Chi-
the idea of using small boats the national level was produc- nese prisoners. 8
both to land its agents behind ing results. The rapid collapse
enemy lines and to retrieve of the North Korean Army The meaning of all this
them, thus bypassing the dan- appeared to make further remained enigmatic. The Chi-
gers of the fighting front. The efforts at establishing a perma- nese soon disengaged, and the
cooperation of the ROK Navy nent intelligence organization Chinese prisoners of war, when
was necessary for this effort, unnecessary. But the very suc- interrogated, claimed they were
however, and this was difficult cess of UN forces exacted a members of “Special Military
to obtain. a The whole idea was price: intelligence elements Units” which at first were
temporarily abandoned in Sep- repeatedly had to move to keep assumed to be only token cad-
tember, when the needs of the up with the pace of the res from the Fourth Field Army.
forthcoming amphibious opera- advance, and this disorganized While Army intelligence real-
tion at Inchon absorbed all the intelligence structure and ized the Chinese did have the
available shipping. 7 impaired its operational capa- military capability for a full-
bilities. scale intervention, it doubted
they would pursue such a
course. If the Chinese had
The Chinese Threat
failed to intervene in August,
a Of the early parachute agents, Marshall
The coming of November when the Eighth Army was
noted that “Frequently the Commanding
General's plane was used to carry these
brought a new threat, the possi- trapped in the Pusan perime-
men into nowhere.” The TLO, as one offi- bility of intervention by the ter and intervention could have
cer put it, was basically a “glorified recon- People’s Republic of China. Chi- been decisive, it seemed irratio-
naissance unit” designed to obtain order nese Foreign Minister Zhou nal for them to intervene when
of battle information by using agents to
conduct shallow penetration missions. To
Enlai had publicly announced North Korea had been broken.
ensure it remained under GHQ FECOM that China would enter the war It appeared more plausible to
control, the TLO was also assigned a if US forces crossed the 38th assume the Chinese presence in
notional strategic intelligence mission. parallel. Although the United Korea was in the nature of a
Agents were a mixed bag whose numbers
included high school-age children, women,
States had decided to ignore face-saving gesture. 9
the aged, and deserters from both the this threat as a bluff, American
North and South Korean armies. intelligence was aware that The hard fact was that
a Marshall grimly noted that in these
400,000 troops of China’s best FECOM again found itself
operations, “Only the loss rate fulfilled reduced to speculation about
expectations.” Returning agents ran the
formation, the Fourth Field
risk of being mistaken for enemy infiltra- Army, were being concentrated enemy intentions because it
tors and shot by troops from their own just across the Yalu River in still lacked the intelligence
side. resources needed to resolve the

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 59


US Army HUMINT in Korean War

At this critical juncture, FECOM turned once more to clandes- equipped with smoke grenades
tine HUMINT to meet its pressing need for intelligence. north of UN lines to establish
the location of the Chinese
problem. Manchuria was off- ued their retreat, the Chinese forces. Only a few teams ever
limits to photographic recon- once more disengaged. Pursued managed to signal Air Force
naissance because of diplo- by an overwhelming force, the spotter planes, all with nega-
matic considerations, limited Eighth Army found itself com- tive results. 13
aerial surveillance of Korea was pletely ignorant of how this
unproductive, and other sophis- force was disposed or where it
ticated collection mechanisms might be attacking next. a 12 The 442d CIC Detachment
were targeted exclusively In these darkest days of the
against the Korean problem At this critical juncture, war, FECOM responded to the
and lacked the linguistic and FECOM turned once more to intelligence challenge by set-
technical capability to switch clandestine HUMINT to meet ting up a new unit to conduct
quickly. 10 its pressing need for intelli- an expanded program of clan-
gence. But the KLO organiza- destine HUMINT. The 442d
With his armies on the tion (now officially titled the CIC Detachment was activated
threshold of victory—the van- Far East Command Liaison on 20 December 1950 in Seoul
guards of the Eighth Army Group, Korea) was in no condi- with 50 assigned personnel to
were across the Chongchon tion to meet the requirements. take over operational control of
River in western Korea, those There were no agent assets in the KLO central office and the
of X Corps nearing the Yalu in the areas in which the Chinese division level TLOs. On paper,
the East—MacArthur was in no were advancing. The KLO did the 442d was a normal CIC
mood to be deprived of triumph have the capability of inserting unit, organized under a stan-
by the mere specter of a Chi- parachute agents in “blind dard cellular Table of Organiza-
nese Army. He decided to sub- drops,” using Air Force C-47s, tion and Equipment (TOE 30-
ject the question of just what but the AVIARY program, as it 500) and commanded by a regu-
Chinese intentions might be to was called, operated under lar army officer, Col. C.A.
an acid test. On 24 November severe disabilities. The stan- Dickey. In reality, it was a
1950, he ordered his widely dis- dard of agent training was low, highly unusual organization
persed forces to attack into the and the KLO had no radios assigned a positive clandestine
unknown. 11 suitable for agent work and no collection mission that went far
agents trained in radio opera- beyond the CIC’s normal
tion. In a desperate attempt to responsibilities. 14
KLO Handicaps clarify the tactical situation,
The UN offensive ran head-on the KLO was reduced to drop- The 442d had a turbulent
into 30 Chinese divisions that ping 12 two-man agent teams beginning. Two days after the
had secretly crossed over from unit was officially activated in
Manchuria. The attack became Seoul, the deteriorating mili-
a Upon assuming command of the Eighth
a fighting retreat. The Eighth tary situation forced it to estab-
Army, Gen. Matthew B. Ridgway recalls
Army fell back from the that all he had in the way of intelligence lish a rear headquarters in the
Chongchon with heavy losses; X about the enemy north of his lines was a city of Taegu. The rest of the
Corps began the difficult pro- map showing “A big red goose egg...with headquarters soon followed to
cess of cutting its way back ‘174,000’ scrawled in the middle of it.” The escape the second Communist
situation did not quickly improve; in Feb-
through the mountains to the ruary 1951, Ridgway reported that, “We occupation of the South Korean
port of Hungnam. By mid- have a curtain beyond the range of our capital. But the rapid revival of
December, as UN forces contin- immediate combat intelligence activities the Eighth Army's fortunes
which I find extremely difficult to pierce.”

60 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

under its new commander,


At the same time, the 442d CIC Detachment's headquarters el-
Gen. Matthew B. Ridgway, put ement implemented a much larger program of amphibious es-
an end to further UN retreats. pionage and was given the codename SALAMANDER.
Working from a secure base,
the 442d was able to upgrade
the FECOM clandestine boats to land agents behind tegically located just five miles
HUMINT program between enemy lines, a course first sug- off the North Korean coast. The
January 1951 and the first gested in the summer of 1950. 16 position gave the 442d’s agents
armistice negotiations in June, access to the whole west coast
making significant accomplish- of Korea up to the Yalu River.
ments in the areas of agent SALAMANDER To complement this west coast
insertion, communications, and Confronted by an unaccept- operation, the 442d later initi-
training. 15 able loss rate among their line- ated plans to establish an east
crossers, the TLO teams of the coast SALAMANDER base on
Until early 1951, agents had 3d and 25th Infantry Divisions the bleak and inhospitable
been inserted by line-crossing began transporting agents by island of Yodo. This move would
and by parachute drop. At the small boats around the enemy’s provide intelligence coverage of
TLO level, hundreds of Korean flank on the west coast of another enemy flank, as well as
peasants were sent to gather Korea. At the same time, the allow agents to provide exten-
limited information about 442d CIC Detachment's head- sive lateral coverage of North
enemy dispositions in front of quarters element implemented Korean positions, because they
the UN lines. The KLO had its a much larger program of could land on one coast and
own line-crossers; it also par- amphibious espionage and was exfiltrate from the other.
adropped smaller numbers of given the codename SALA- Because the native fishing
Korean agents on long-range MANDER. This involved the boats used by the operation
collection missions, using Air use of Korean-manned fishing were both small and unseawor-
Force AVIARY C-47s controlled boats to insert long-range thy, the 442d quickly took steps
by Eighth Army’s Special Activ- agents deep within enemy terri- to secure fast American craft. 18
ities Mission. Both techniques tory. SALAMANDER opera-
resulted in heavy losses of tions were initially conducted
agents. a To remedy this situa- Better Communications
from the numerous islands off
tion, the 442d began to supple- the Korean west coast that Agent communications were
ment its ground and parachute were to the rear of the enemy's also improved. Until the end of
insertion methods by using lines. These islands were ren- December 1950, radios had
dered more or less secure from been unavailable, and the
hostile attack by the UN naval 442d’s agent handlers were
a Parachute operations were particularly blockade, and many were forced to wait until an agent
costly: a former AVIARY operations officer already in the hands of anti- actually returned to base before
estimated that only 20 percent of agents Communist North Korean they could procure any intelli-
dispatched managed to make it back to
UN lines. (However, he thought it possible partisans. 17 gence. The situation gradually
that an unknown number of the agents improved in 1951. Radio teams
who failed to return were stranded North The first SALAMANDER equipped with SCR-300 walkie-
Koreans who had used AVIARY as an air- operations were mounted from talkies were provided for both
line ticket home.) Until agents could be the island of Paengyong Do,
furnished radios, these operations also AVIARY and SALAMANDER
involved long delays in procuring intelli- just below the 38th parallel. operations.
gence: because of the distances involved, They soon moved to a more
paradropped agents commonly took two to advanced base at Cho Do, stra-
three months to complete their missions.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 61


US Army HUMINT in Korean War

The growing efficiency of FECOM's clandestine HUMINT oper- replaced by General Ridgway,
ations was paralleled in other intelligence fields, as language UN forces continued to push
and other problems were resolved. the enemy back across the 38th
The use of voice radio allowed pleting training, the new agents parallel. On 23 June 1951, the
agents to furnish Army intelli- went to the TLO teams and the Soviet UN Ambassador
gence with information on a 442d’s central office. Unsurpris- announced that North Korea
real-time basis. But this was ingly, American intelligence was now interested in peace
not a panacea. Voice radio had personnel rated the new breed talks, and Ridgway offered
its limitations; its short range of agents as “far superior” to armistice negotiations to the
meant that relays had to be their predecessors. For exam- enemy commander. 21
used—SALAMANDER agents ple, reports noted that the new
passed their messages through agents “appear to be enthusias- Peace was not at hand, how-
the Cho Do base—or that air- tic” and “have a basic idea of ever. Although peace talks
craft had to hover in the imme- the mission.” began and the UN forces halted
diate area of the agent radio their advance, there was no
teams, risking compromise of Better training seems to have ceasefire. Negotiations dragged
the mission. An additional com- been partially offset by on for two years, accompanied
plication was that some of the increased enemy security mea- by a static war of attrition in
Air Force crews who provided sures. Line-crossing continued which hills changed hands from
communications support to to be a hazardous operation, time to time in bloody skir-
AVIARY operations were inex- and agent capture rates mishes while the main battle-
perienced because they flew the increased, although a surpris- line remained stable. No longer
mission for an average of only ingly large number of detained forced to respond to the intelli-
two weeks. Many agent radio agents were able to escape and gence crises of the moment,
teams were lost. Continuous make it back to UN lines. At FECOM began to build up an
wave (CW) radios, with their any rate, the new recruitment elaborate semipermanent clan-
longer range, would have and training program made it destine HUMINT structure to
helped, but agents had not yet easier to obtain replacements. 20 meet the needs of a new kind of
been trained in Morse code. a 19 war.

On the other hand, at least Improved Capabilities


agents were now provided with The Liaison Detachment
The growing efficiency of
some minimal training. In FECOM's clandestine HUMINT The new effort was conducted
March 1951, the 442d set up a operations was paralleled in under a revised organizational
training school at Pusan that other intelligence fields, as lan- structure. The 442d CIC
provided 20 agents at a time guage and other problems were Detachment was inactivated on
with a basic two-week course of resolved. The overall improve- 26 July 1951, and its personnel
instruction. (The facility moved ment of intelligence capabili- and assets transferred to a new
to Taegu in June.) After com- ties took place during a period organization, the 8240th Army
when the Eighth Army’s for- Unit. (In addition to its Korea-
tunes were on the upswing. As based assets, the 8240th con-
a Twenty UHF-VHF air-sea rescue sets early as mid-January 1951, UN sisted of a headquarters ele-
had been acquired in mid-December but forces had been able to mount a ment in Tokyo and a logistic
had arrived without operating manuals limited counterattack. In element in Sapporo, Japan.)
and proved to be of insufficient range to be
useful. Once voice radios became avail- March, Seoul was recaptured. The former KLO/TLO organiza-
able, airborne radio control support was While MacArthur was relieved tion now became known as the
provided by the C-46s of the 438th Troop for insubordination in April and Far East Command Liaison
Carrier Command staging out of Japan.

62 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

Detachment, Korea. The Liai-


By the summer of 1951, it was at last possible to set up a 10-
son Detachment, commanded week Morse code course for agents, which permitted the nets
by Col. William I. Russell, had to use long-range CW radios.
an authorized strength of 104.
Because of a shortage of intel-
ligence specialists, and the as four line-crossing missions nications. By the summer of
Army's decision to return grad- for the TLOs. Centralized train- 1951, it was at last possible to
ually all CIC personnel to their ing was revived in October, set up a 10-week Morse code
normal assignments, it took when three nets were consoli- course for agents, which permit-
some time to gather the neces- dated and a new school set up ted the nets to use long-range
sary numbers. Colonel Russell in Seoul. Ultimately, a compro- CW radios. By September, an
started out with only the 50-odd mise between the two elaborate communications sys-
people he had inherited from approaches was reached: the tem was in place. A network of
the 442d. 22 nets provided basic agent train- safehouses forward of UN lines
ing and the school became received intelligence reports
The tight personnel situation responsible for advanced radio from agents via voice radio. The
led to a new development in and parachute training. 23 reports were then relayed back
agent training—agent to the various TLOs by means
nets—that were set up by the of Morse code. The safe houses
summer of 1951. These con- New Sources of Agents employed SSR-5-R CW radios;
sisted of permanent agent orga- In addition, the Liaison the TLOs were equipped with
nizations behind enemy lines, Detachment found new sources the standard Army AN/GRC-
linked to headquarters by radio from which to procure agents. A 9’s. Message traffic was then
control and supplied and rein- Korean religious group with passed on by the TLOs to Liai-
forced by SALAMANDER and many adherents in the North, son Detachment headquarters.
AVIARY operations. These nets the Chando Kyo, was tapped to The main SALAMANDER base
were now entrusted with train- provide an agent network. Chi- at Cho Do communicated with
ing, thus allowing the school at nese POWs who rallied to the headquarters and its west coast
Taegu to be shut down. Under UN side were dispatched on agents by similar means. 25
the new arrangements, each net order of battle missions. Finally,
recruited its own agents (many the Liaison Detachment By the fall of 1951, the Liai-
from the large refugee camps acquired 124 agents formerly son Detachment began to
on the island of Koje-do), put employed by the ROK Army’s reevaluate its procedures for
them through a two-week train- Headquarters Intelligence Divi- inserting long-range penetra-
ing course, and sent them to the sion (HID). These agents had tion agents. The SALAMAN-
frontline TLO teams for assign- been operating from bases on DER operation, which used
ment in the field. Agents who the Korean east coast, both at boats to land and retrieve
successfully completed five line- Yodo, where there were already agents, had been very success-
crossing missions were given Liaison Detachment opera- ful. By contrast, the AVIARY
two weeks of additional train- tives, and on islands in Won- program, which dropped para-
ing and then went into the san Harbor. Because the HID chute agents deep within
SALAMANDER or AVIARY had run out of funds, the US enemy territory and then
programs. Army picked up the tab and the required them to make it back
people. 24 to UN lines on their own, pro-
The new approach was not duced less satisfactory results.
completely successful. In prac- The Liaison Detachment also Although AVIARY operations
tice, only 25 percent of agents further improved agent commu- were intensively pursued—111
managed to complete as many

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 63


US Army HUMINT in Korean War

The Liaison Detachment thus became a miniature Army ver- tary intelligence reports. And
sion of the World War II OSS, with responsibilities for secret in- the Liaison Detachment was
telligence and special operations, finally in a position to prevent
agents were parachuted in dur- sion of downed fliers. The CIA partisan operations from inad-
ing a single month—the rate of was another player in the vertently jeopardizing intelli-
return was discouragingly low. secret war. 27 gence activities. 29
At one point in October, the
Liaison Detachment contem- To better coordinate these
plated reducing its airborne fragmented efforts, a new the- More Manpower
operations by 50 percent. ater-level structure was cre- This increase in the Liaison
Instead, it decided to adopt a ated on 10 December 1951, Detachment’s responsibilities
new technique. Agents would be called the Combined Command brought with it an increase in
dropped in teams close behind for Reconnaissance Activities, personnel. By February 1952,
enemy lines, wearing enemy Korea (CCRAK). CCRAK was the Detachment had 150
uniforms and carrying small an umbrella organization set up assigned or attached personnel
arms. In this way, they could to impose centralized control on on board; by the time a cease-
impersonate enemy patrols the secret activities of the fire was finally concluded in the
and, if necessary, shoot their armed services, the CIA, and summer of 1953, the Detach-
way back to UN lines. Use of the ROK allies. At the same ment had a strength of 450.
this tactic, along with better time CCRAK was formed, the (Even then, there were com-
screening of agents and more Army decided to place all its plaints that the Detachment
specific intelligence assign- covert and clandestine efforts still had too few intelligence
ments, greatly reduced losses under a single headquarters. personnel to fulfill mission
and gave AVIARY a renewed The Eighth Army’s 8086th requirements.) While Army
viability. 26 Army Unit, which had been strength in Korea remained
running the partisan effort, was stable from 1951 on, the propor-
dissolved. The Liaison Detach- tion of resources devoted to
CCRAK and the Liaison ment took over its functions intelligence and covert activi-
Detachment and assets. 28 ties was much expanded.
The Army’s clandestine Because UN policy ruled out
The Liaison Detachment thus
HUMINT effort in Korea had additional territorial gains on
became a miniature Army ver-
now become part of a wider the battlefield, the secret war
sion of the World War II OSS,
secret war, waged on an exten- was the only combat arena in
with responsibilities for secret
sive but uncoordinated basis. In which efforts could be
intelligence and special opera-
parallel with the Liaison intensified. 30
tions, the first time these two
Detachment’s operations, the
functions had been combined in A good part of the growth per-
Eighth US Army was support-
a single Army organization. mitted by this strength increase
ing a growing partisan effort on
The arrangement had a certain went into expanding the clan-
the Korean west coast that was
logic to it. In accordance with destine HUMINT effort. By
based on the same islands that
existing doctrine, it moved con- 1953, a large, formidable orga-
served as SALAMANDER
trol of partisan warfare from nization had been fielded. The
bases. These islands also pro-
the field army to the theater Liaison Detachment’s Intelli-
vided bases for various clandes-
level. The reorganization also gence Division controlled five
tine operations undertaken by
provided the Liaison Detach- separate Intelligence Com-
the US Air Force, which used
ment with a partisan force that mands. Each had its own geo-
them to gather intelligence and
could protect its island bases graphic area of responsibility
to support the escape and eva-
and provide it with supplemen-

64 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

(although one command con-


The Korean agents bore most of the costs and risks, and their
ducted operations on both losses had been high, especially in the first stages of the effort.
coasts of Korea and across the
frontlines), but the commands
were also allowed to penetrate
North Korea, Manchuria, and ment had become the chief pro- officer was ambushed and
China proper to the extent their ducer of HUMINT for the whole killed with his agent party in a
resources permitted. The five CCRAK organization, furnish- landing attempt that went
commands directed the activi- ing up to 1,000 intelligence awry. 33
ties of 17 separate agent nets, reports a month, most graded
all with radio links to the by consumers as being of signif-
appropriate command head- icant importance. This repre- Partisan Warfare
quarters. sented a five-fold increase over The expansion of the partisan
the detachment's output in operation that the Liaison
No fewer than 2,100 agents 1951. The Liaison Detach- Detachment had taken over
reported to the Liaison Detach- ment’s contribution to CCRAK from the Eighth Army at the
ment. Badger Net alone had was as great as that of the Air end of 1951 was even more
450 agents. Three hundred of Force’s clandestine service, striking. The private army of
these were in North Korea, ROK Army G-2, and the CIA's guerrillas inherited by the Liai-
either in permanent cells or as collection element combined. 32 son Detachment originated in
temporary inserts; the rest the various groups of anti-com-
were at headquarters, in train- munist refugees from North
ing, or in reserve. 31 Paying a Price
Korea who had fled to the
This elaborate clandestine islands off the western coast of
Intelligence Production HUMINT apparatus was not Korea in the winter of 1950-
built without a certain price. 1951. The Eighth Army had
The nature of the game meant The Korean agents bore most of taken these groups in hand in
that the structure was not per- the costs and risks, and their early 1951 and used them to
fect. The necessity of setting up losses had been high, espe- form a partisan force. So-called
a clandestine organization in a cially in the first stages of the donkey units of partisans were
denied area under wartime con- effort. But Liaison Detachment assembled around a hastily
ditions had forced compromises personnel also met their deaths trained indigenous cadre and
both in administration and in trying to insert agents. An Air used as a raiding force against
the caliber of recruited agents. Force C-46 went down over the mainland. The islands from
(In light of the fact that it was North Korea one night in Feb- which they operated were stra-
not until 1953 that TLO agents ruary 1952, carrying three tegically located behind enemy
received the same pay as day Detachment personnel, seven lines and were protected from
laborers working for the Eighth Air Force crewmen, and six enemy attack by the UN naval
Army, the latter deficiency is Korean agents and an inter- blockade and ROK garrisons.
particularly unsurprising.) preter. Because the partisans required
Some nets produced only incon- only a few American personnel
clusive results, and no evidence In April 1953, the ill-omened as advisers, they represented
exists that any were able to Fizzle Net, operating from Yodo an effective, inexpensive force
supply high-level intelligence on the east coast under the 4th multiplier for the Eighth
on enemy plans. Intelligence Command, ceased Army. 34
to exist when the American
Nevertheless, by the end of lieutenant serving as project
the war the Liaison Detach-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 65


US Army HUMINT in Korean War

But when the final cease-fire was concluded in June 1953, the 1952. At the same time, the
last radio message to reach the Liaison Division from Green Leopard, Wolfpack, and Kirk-
Dragon was a curse. land units were redesignated
By September 1951, the don- sive raids, and some islands respectively as the 1st, 2d, and
key units on the Korean west changed hands two or three 3d Partisan Infantry
coast had been grouped into times. More than 2,000 parti- Regiments. 37
two regiments named Leopard sans became casualties in 1952,
and Wolfpack. In addition, a and more than half of these The first contingent of the 1st
company assigned the designa- were killed or listed as missing PAIR’s new airborne troops was
tion Kirkland had been orga- in action. 36 committed to action in early
nized on Yodo Island off the 1953. On the night of 23 Janu-
east coast of Korea. At this ary, a flight of three Air Force
point, the increased activity PAIR C-119s guided by a B-26 Path-
and visibility of the partisans The Army viewed this kind of finder aircraft airdropped a spe-
began to provoke a violent amphibious warfare as a suc- cial 97-man “Green Dragon”
North Korean reaction. Some of cess. In the Korean War’s wider unit behind enemy lines to set
the more vulnerable islands on context, however, the partisans up an operational base for guer-
the west coast came under were more of a nuisance to the rilla activities. The fate of this
enemy attack. This posed a enemy than a real threat. They first (and, as it turned out,
threat to the partisans and to were never able to establish only) major employment of par-
the SALAMANDER HUMINT any bases on the mainland or tisans in an airborne role was
operations of the Liaison conduct operations larger than not a happy one. After a long
Detachment. The end result raids. Moreover, landing opera- delay, the party made radio con-
was that the guerrillas had tions were hampered by the tact with headquarters and
come under Liaison Detach- harsh Korean winters and, on reported taking heavy casual-
ment control. 35 the west coast, by the enor- ties. Reinforcements and sup-
mous tidal fluctuations that plies were promptly flown in to
During the course of 1952, the regularly turned beaches into sustain the Green Dragon force.
Liaison Detachment expanded vast and impassable mudflats. But when the final cease-fire
the initially small Kirkland was concluded in June 1953,
force on Yodo to regimental Meanwhile, even more ambi- the last radio message to reach
strength. The Leopard and tious schemes were under way. the Liaison Division from
Wolfpack organizations on the In April 1952, FECOM pro- Green Dragon was a curse. The
west coast were also built up. duced a Guerrilla Operations operation had been compro-
Operating from their island Outline, 1952. This proposed mised and was under enemy
safehavens and assisted by a adding an airborne dimension control. 38
sprinkling of American advis- to the existing partisan
ers and US logistic support, the amphibious operations. The whole episode became
partisans waged a lively little FECOM decreed that “all com- just another part of the gener-
war of their own. That year, the mands will qualify paratroops.” ally melancholy story of air-
partisans optimistically claimed Accordingly, paratroop trainees borne special operations during
to have inflicted 51,000 casual- were taken from the existing the Korean War. The 8240th
ties on enemy forces. Partisan Leopard, Wolfpack, and Kirk- Army Unit and its Air Force
casualties, however, were not land formations and grouped in counterpart repeatedly
light: the partisans had to a unit that officially became the launched behind-the-lines sabo-
defend their own island bases 1st Partisan Airborne Infantry tage missions. Hundreds of
in addition to mounting offen- Regiment (PAIR) in November Koreans floated down on night
drops into the black hole of

66 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

North Korea and were never The KLO and its successor organizations, the 442d CIC De-
heard from again. In 1952, the tachment and the Far East Command Liaison Detachment, Ko-
8240th had paradropped “Mus- rea, occupy a unique place in the history of Army intelligence.
tang Ranger” teams of parti-
sans behind enemy lines on
half-a-dozen occasions to attack warfare. In addition to building equipped with its own freight-
enemy railroad lines. The up the 1st PAIR, the Detach- ers, crash boats, and fishing
teams varied in size from five to ment expanded two of its origi- vessels; and consumed 7,500
20 men. They all met the same nal regiments to provide tons of supplies a month. Rice
fate. After the “Green Dragon” additional forces for seaborne accounted for the bulk of the
operation had commenced, raids and assaults. The over- supply allotment; each parti-
additional large sabotage teams strength 1st Partisan Infantry san was issued 100 pounds a
drawn from the ranks of the 1st Regiment was split up, allow- month, some for personal con-
PAIR were sent in. None ing the formation of a new 6th sumption, the rest for barter.
survived. 39 Partisan Infantry Regiment. In The partisans also had their
similar fashion, the 2d Parti- own chaplains, band, and trav-
In 1951 and 1952, the Far san Infantry Regiment contrib- elling entertainment troupe.
East Air Force had dropped uted personnel to form a new The Liaison Detachment even
some 200 sabotage agents of its 5th Partisan Infantry Regi- published a house magazine for
own on 19 separate missions ment. The regiment based on them, The Parachute. 42
directed against North Korean the Korean east coast, the 3d
facilities. The agents accom- Partisan Infantry, was too small All this was something of a
plished practically nothing, and to break up in this way, but its triumph for American-style
only one party ever returned members were given airborne organization. There were, how-
safely to UN lines. Despite training. (There was no 4th ever, some liabilities. Under-
these unpromising precedents, Partisan Infantry Regiment, standably, there was a certain
the Liaison Detachment’s Guer- because Koreans allegedly asso- rivalry between the American-
rilla Division had laid plans in ciated the number four with controlled partisans and the
the spring of 1953 to use the 1st bad luck.) 41 regular ROK forces. Also, the
PAIR's “Southwind” element in partisan operation had swollen
yet another attempt at mount- to such a size that some now
ing sabotage operations. It pro- A Small Army questioned its effectiveness.
posed to parachute in 48 two- As a result of these prepara- While partisan raiders had
man teams to blow up North tions, the Liaison Detachment served as a useful adjunct to
Korean railroads. Perhaps for- had fielded what amounted to UN forces, their value when
tunately for all concerned, the its own Korean Army by the used in large conventional units
mission was never time of the July 1953 ceasefire. was open to dispute, especially
implemented. 40 The six-regiment force had a because of the nature of their
strength of more than 17,000 training and equipment.
The failure of the Green
troops. The small American
Dragon operation did not The question was never fully
cadre assigned to the partisans
become apparent until the resolved. A ceasefire occurred
included 55 personnel from the
fighting had ended. Thus, dur- before the new partisan struc-
Army's newly organized 10th
ing the first part of 1953, the ture could be committed to bat-
Special Forces Group.
Liaison Detachment was tle, the guerrillas were forced to
encouraged to lay down plans This guerrilla army possessed evacuate their island bases,
for an ambitious and greatly 300 trucks and trailers; was which lay north of the Demilita-
expanded program of guerrilla rized Zone now demarcating

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 67


US Army HUMINT in Korean War

North and South Korea, and was providing classroom train- however, would not provide an
most of the partisan units were ing to Koreans in psychological operational model for Army
disbanded. a 43 warfare and preparing propa- intelligence in the future. The
ganda leaflets for distribution Liaison Detachment’s structure
in the enemy rear. In addition, was revamped almost as soon
Psywar Activity it was using propaganda to sus- as the fighting in Korea ended.
In 1953, the Detachment also tain the morale of its own
expanded its responsibilities to partisans. 44 Essentially, the Liaison
include psychological warfare, Detachment was a creature of
or “psywar.” This might seem to the Korean war. Its efforts pro-
Evaluation duced a certain long-term
be an odd area of involvement
for what began as an intelli- The KLO and its successor impact: the Army was made
gence organization, but there organizations, the 442d CIC aware of the potentialities for
were precedents. The OSS had Detachment and the Far East conducting positive human
conducted psychological war- Command Liaison Detach- intelligence collection in peace
fare operations in World War II, ment, Korea, occupy a unique as well as war. Moreover, cer-
and Army doctrine closely place in the history of Army tain Special Forces operations
linked covert operations and intelligence. The KLO started in Vietnam would later paral-
psychological warfare. By mid- out as a small residual FECOM lel, but not replicate, Liaison
1953, the Liaison Detachment intelligence presence in Korea, Detachment activities in Korea.
increased in scope as a result of Generally, however, the organi-
the North Korean invasion, and zation’s accomplishments and
a Evanhoe felt that exacerbating this
then was redesignated and fur- the lessons learned from them
rivalry was the “large influx of South ther expanded during the dark- went down a historical memory
Korean citizens into partisan ranks whose hole and passed into oblivion
only reason for volunteering was to escape est days of the war. Ultimately,
being drafted into the South Korean it was redesignated once more along with other aspects of
Army,” as well as the fact that “Many of and given responsibility for the America’s “forgotten war” in
those recruited were pimps, thieves, and whole Army covert and clandes- Korea. 45
other undesirables who were hiding from
tine effort in Korea. Its particu-
South Korean authorities and wanted to ❖ ❖ ❖
use duty with the partisans to escape.” lar pattern of organization,

Endnotes
1. John K. Singlaub, Hazardous Duty: An American Soldier in the Twentieth
Century (New York: Summit Books, 1991), 156–66.
2. Bruce W. Bidwell, “History of the Military Intelligence Division, War
Department General Staff,” (US Army Center of Military History unpublished
ms., Vol. VII, Chapter III), 22.
3. On the overall unreadiness of the Eighth Army in the summer of 1950, see
Clay Blair, The Forgotten War: America in Korea, 1950–1953 (New York: Times
Books, 1987), 48–50.
4. US Army Intelligence Center, “History of the Counter Intelligence Corps,
Volume I: Introduction and Background,” (Unpublished ms., 1959), 101.
5. Office of the Assistant Chief of Staff, G-2, GHQ FEC, “Historical Report, 1
January-30 October 1950,” 103, RG 338, NARA; Assistant Chief of Staff, G-2,
“Summary of Major Activities Relating to the Korean Conflict, 25 June 1950-8

68 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

Endnotes (cont.)

September 1951,” US Army Center of Military History; S.L.A. Marshall, The


River and the Gauntlet: Defeat of the Eighth Army by the Chinese Communist
Forces, November 1950, in the Battle of the Chongchon River, Korea (Nashville:
Battery Press, 1987), 5.
6. S.L.A. Marshall, The River and the Gauntlet, 3–4, and author’s interview
with Russell K. Leick, 20 January 1985.
7. S.L.A. Marshall, The River and the Gauntlet, 5; 442d Counter Intelligence
Corps Detachment, Historical Report, 1 March 1951, RG 319, NARA; and Ed
Evanhoe, Darkmoon: Eighth Army Special Operations in the Korean War
(Annapolis: Naval Institute Press, 1995), 13.
8. Roy E. Appleman, United States Army in the Korean War: South to the Nak-
tong, North to the Yalu (Washington, DC: Office of the Chief of Military His-
tory, 1961), 761.
9. Ibid., 753, 761–64.
10. Ibid., 769–70; Historical Report, 442d CIC Detachment, 1 March 1951, RG
319, NARA.
11. James F. Schnabel, United States Army in the Korean War: Policy and
Direction: The First Year (Washington, DC: Office of the Chief of Military His-
tory, 1972), 278.
12. Soldier: The Memoirs of Matthew B. Ridgway, as told to Harold H. Martin
(Westport: Greenwood Press, 1974), 205; Roy E. Appleman, Ridgway Duels for
Korea (College Station: Texas A&M Press, 1990), 312.
13. Memorandum for Record, Far East Command Liaison Group, 17 December
1950; Command Report, 442d CIC Detachment,1 January 1951, RG 319,
NARA.
14. GO 86, GHQ FEC, 8 December 50-AMENDED by GO 87, GHQ FEC, 11
December 50; Foreword, Historical Report, 442d CIC Detachment,1 March
1951, RG 319, NARA.
15. Command Report-December 1950, 442d CIC Detachment.
16. Ibid. and author’s interview with Winston J. Morgan, 30 January 1985.
17. Historical Report, 442d CIC Detachment, 1 March 1951.
18. Ibid.; Historical Reports, 442d CIC Detachment, April 1951, May 1951,
June 1951, RG 319, NARA.
19. Memorandum for Record, Far East Command Liaison Group, 17 December
1950; Command Report-December 1950, 442d CIC Detachment; Historical
Report, 442d CIC Detachment, June 1951, RG 319, NARA; and Historical
Report, 442d CIC Detachment, April 1951, RG 319, NARA.
20. Historical Reports, 442d CIC Detachment, April 1951, May 1951, July
1951, RG 319, NARA.
21. Schnabel, United States Army in the Korean War.
22. GO 53, GHQ FEC, 24 July 1951; Historical Report, Far East Command
Liaison Detachment, Korea (FEC/LD(K)), 8240th Army Unit, 1 August 1951.
Eight Navy personnel were assigned to the unit in a temporary duty status.
23. Historical Reports, FEC/LD (K), 1 September 1951, 1
24. Historical Report, FEC/LD (K), l November 1951.
25. Ibid.

69 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


US Army HUMINT in Korean War

Endnotes (cont.)

26. Historical Reports, FEC/LD (K), 1 August 1951, 1 November 1951.


27. Guerilla Warfare and Airpower in Korea, 1950–1953 (Maxwell Air Force Base,
Aerospace Studies Institute, 1964), 64–72; Alfred H. Paddock, Jr., US Army Spe-
cial Warfare: Its Origins: Psychological and Unconventional Warfare, 1941–1952
(Washington, DC: National Defense University Press, 1982), 103.
28. Guerrilla Warfare and Airpower in Korea, 86; Paddock, US Army Special War-
fare, 103. One knowledgeable Army officer dismissed CCRAK as “a hodgepodge
intelligence operation.” Singlaub, Hazardous Duty, 181–82.
29. Guerrilla Warfare and Airpower in Korea, 86.
30. Historical Report, FEC/LD (K), 1 April 1953, RG 319, NARA.
31. Ibid.
32. Ibid.
33. Historical Report, FEC/LD (K), 1 March 1952; Combat Command Report,
Summary of Operations, Intelligence Division, FEC/LD (K), 1 June 1953, RG 319,
NARA.
34. Guerrilla Warfare and Airpower in Korea, 64–65, 70–71, 80–84.
35. Ibid., 89; Historical Reports, FEC/LD (K), 1 November 1951, 1 March 1952, RG
319, NARA.
36. Historical Report, FEC/LD(K), 1 March 1952; Monthly Command Report, HQ,
Partisan Command, FEC/LD (K), 4 April 1953, RG 319, NARA.
37. Guerrilla Warfare and Airpower in Korea, 96–99.
38. Ibid., 148–150.
39. Evanhoe, Darkmoon, 157–60.
40. Guerrilla Warfare and Airpower in Korea, 146–50.
41. Monthly Command Report, HQ Partisan Command, FEC/LD (K), 4 April 1953.
42. Ibid.; Combat Command Report, Summary of Operations, Intelligence Divi-
sion, FEC/LD (K), 1 June 1953; Command Report No. 7, FEC/LD (K), 6 August
1953, RG 319, NARA.
43. Evanhoe, Darkmoon, 163. Combat Command Report, Summary of Operations,
Intelligence Division, FEC/LD (K), 1 June 1953; Paddock, US Army Special War-
fare, p. 103; Command Report No. 7, FEC/LD (K), 6 August 1953.
44. Monthly Command Report, HQ Partisan Command, FEC/LD (K), 4 April 1953.
45. Command Report, FEC/LD (K), September 1953, 1 October 1953, RG 319,
NARA; GO 269, HQ USAFE, 27 September 53; Richard H. Shultz, Jr., The Secret
War Against Hanoi: Kennedy's and Johnson's Use of Spies, Saboteurs, and Covert
Warriors in North Vietnam (New York: HarperCollins, 1999), passim; John P.
Finnegan, The Army Lineage Series: Military Intelligence (Washington, DC: US
Army Center of Military History, 1998), 124—27.
❖ ❖ ❖

70 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence in Public Literature

Grappling with Covert Action after the Cold War


Clinton’s Secret Wars: The Evolution of a Commander in Chief, by Richard Sale. (New York:
St. Martin’s Press, 2009), 491 pp., index.

Matthew P.
Former President Bill Clinton’s foreign pol- Sale provides no solid evidence for all these
icy reputation has suffered from charges that supposed increases in toughness. By the begin-
he was disengaged, ambivalent, and hesitant to ning of Clinton’s second term in January 1997,
use military force. In Clinton’s Secret Wars: The the United States had failed to stop Serbian
Evolution of a Commander in Chief, journalist leader Slobodan Milosevic’s forces from over-
Richard Sale attempts to refute those charges running Srebrenica, and two timid regime
by arguing that nonpublic initiatives, espe- change initiatives had failed in Iraq. At that
cially the use of covert action, show that Clin- point, Clinton still followed the lead of cau-
ton was more proactive and resolute in dealing tious allies on Iraq. With respect to countering
with foreign policy crises than his critics have terrorism, the administration had no real plan,
allowed. Though the book does not succeed in even though Sale claims that by the summer of
making this case—at least in this reader’s 1998, Clinton “was like a great sea bird, a
judgment—Sale does add to public understand- storm petrel, swooping low over the waves alert
ing of some of the lesser-known foreign policy for any prey.” (302) The record shows other-
options available and how the first president to wise: Clinton exerted little or no pressure on
take office after the Cold War used them. the Taliban or the government of Pakistan. Not
until mid-1999 does the book show Clinton in
Sale struggles, sometimes contradicting him- full form, rallying allies to escalate a bombing
self, to show Bill Clinton growing steadily in campaign against Milosevic. But this was
knowledge and fortitude through his terms of hardly a brazen stand, since everyone from
office into a man of action. In describing the France to Human Rights Watch to the Quak-
period after the infamous October 1993 Black ers supported military action. 1
Hawk episode in Somalia, Sale writes, “Some-
thing in Clinton had hardened, and he emerged Sale also is given to interpreting evidence
from the crisis a different man.”(88) By spring selectively in Clinton’s favor. For example,
1994, “Clinton’s aggressiveness had blazed like when Clinton used third countries to supply
a torch…[and] his advisors caught glimpses of arms to Bosnia—a tactic that avoided a covert
some fresh, inner steel.”(114) Yet, Sale contin- action finding and its attendant congressional
ues to depict Clinton as vacillating, exhibiting oversight—the move can be seen as laudably
a caution on Bosnia, for example, that “nearly resourceful if one is sympathetic to the subject
crippled him.” (137) But four pages later, in dis- or as subversively abusive of power if not. Dur-
cussing Clinton’s actions in July 1995, Sale ing the 1995 Dayton negotiations, the Clinton
alludes to “new inner toughness,” (144) and by administration agreed to keep Milosevic in
August, a “new unleashed aggressive- power to retain a negotiating partner who
ness.”(152) could speak for the Serbs. Sale finds this bold:

1On the various human rights groups supporting military action, see Samantha Power, “A Problem from Hell”: America and the Age
of Genocide (New York: Basic Books, 2002), 434–35. Power’s book, especially the pages that address the Clinton presidency (pages
293–502) generally support the conventional wisdom concerning Clinton’s handling of foreign policy.

All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in
the article should be construed as asserting or implying US government endorsement of an article’s
factual statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 71


Secret Wars

“To keep the peace process alive, Clinton would times competing and sometimes cooperating
use Milosevic, squeeze him like a rind, then (although not always amicably) elements of the
toss him away.” (158) A more critical perspec- government, including various members of the
tive might have been that the compromise laid Intelligence Community.
at Clinton’s feet the entire record of Milosevic’s
human rights atrocities from then on. The relationship between intelligence and
policy in the covert action context deserves
The discussion of renditions of terrorists to study, and at times in this book Sale hints at
third countries during that period also reflects exploring it more fully. “It is a common myth
a favorable bias. Even though Clinton’s White that intelligence helps shape policy,” Sale
House counsel warned that such renditions vio- writes, “but the opposite is true. Policy, or the
lated international law, Sale depicts them as lack of it, usually shapes and fashions intelli-
brave, in contrast to the criticism of renditions gence.”(43) Sale’s book also shows CIA in a role
often made of the subsequent administration. that this reviewer believes is its most under-
Similarly, Sale blames most of Clinton’s first- appreciated, that of serving as a shadow State
term foreign policy trials on his predecessor, Department, clandestinely engaging with for-
George H.W. Bush, but he gives no indication eign governments and security services on a
that Clinton similarly burdened his successor range of unacknowledged projects and serving
by not curbing Iran’s influence in the region or as a back channel to foreign leaders. This func-
by delaying action against al-Qa‘ida. If any sin- tion, even if not explored in great detail,
gle sentence in the book highlights Sale’s ten- appears in the background in much of the book.
dency to see toughness where it might not be, it
is the following quote from Clinton: “If any- Overall Clinton’s Secret Wars would have
body f—s with us, we’ll respond. And we’re been better if Sale had not tried to right a per-
going to get the UN to finally show up and take ceived wrong in prior assessments of Clinton’s
over.” (88) foreign policy and had instead taken a more
straightforward look at the use of covert action
Whether the book salvages Clinton’s foreign in the post–Cold War environment. This could
policy reputation or not, it does a service by have been done with only minor tweaks,
exploring the important subject of covert action namely, excising the effusive language about
in the post–Cold War era. The original 1947 the president’s ever-intensifying focus and his
mandate for covert action—a US foreign policy perpetually rejuvenating inner steel, observa-
activity in which Washington’s hand remains tions that repeatedly detract from the more
hidden—specified that it was to be used for interesting material on creative foreign policy
countering communism. Until 1991, the goal of options available to him. Though his succes-
most covert actions—even if they were not in sors used these policy alternatives against sim-
response to a direct communist threat—was to ilar targets, it was Clinton and his team that
counter communist influence or Soviet-backed refined and debated them for the first time
governments. The fact that the United States after the Cold War. By taking the reader on a
continued a robust covert action agenda tour through eight years of an administration
against a complex matrix of threats after the grappling with such questions in a changed
demise of the Soviet Union makes for a fasci- world, Sale has made a significant contribu-
nating field of inquiry. As Sale suggests, the tion other than the one he seems most to have
process by which the US government decides to intended.
undertake a covert action program is interest-
ing in and of itself, drawing input from some- ❖ ❖ ❖

72 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence in Public Literature

Takes on Intelligence and the Vietnam War


Vietnam: The History of an Unwinnable War, 1945–1975, by John Prados. (Lawrence: University Press
of Kansas, 2009), 665 pp.

Why Vietnam Matters: An Eyewitness Account of Lessons Not Learned, by Rufus Phillips. (Annapolis,
MD: Naval Institute Press, 2008), 398 pp.

This Time We Win: Revisiting the Tet Offensive, by James S. Robbins. (New York: Encounter Books,
2010), 364 pp.

Reviewed by Clayton Laurie

On hearing different and opposing assess- ographic essay citing a wide range of archival
ments regarding US progress in Vietnam by and published sources, Vietnam: The History of
two members of the same fact-finding team in an Unwinnable War is a recipient of the Henry
the fall of 1963, President John F. Kennedy Adams Prize from the Society for Historians in
quipped, “The two of you did visit the same the Federal Government and has received
country, didn’t you?” Readers of these three numerous accolades from academic reviewers.
books seeking a better understanding of the The history, intended as a broad overview of
CIA’s role in Southeast Asia and the lessons of the conflict, deals extensively with high poli-
that conflict for today may well ask a similar tics and the antiwar movement, but it also fre-
question. Nearly 40 years after the end of the quently refers to the CIA’s role at home and
US involvement, after the publication of a abroad.
score of histories describing CIA activities dur-
ing that time, and after the declassification of Prados tends to view the CIA as an organiza-
thousands of documents, opinions regarding tion whose activities in Southeast Asia and at
Agency failures and accomplishments remain home generally contributed more to the prob-
far apart, as do the authors’ interpretations of lems of the day than to their solutions. Such
how the experiences of Vietnam apply to the critical assessments emerge throughout this
conflicts of today. work when the CIA is mentioned, starting with
the Saigon Military Mission (SMM) in 1954
Independent historian and self-described and extending through passing treatments of
“engaged leftist intellectual” John Prados covert operations, the order-of-battle contro-
needs little introduction to scholars of intelli- versy, Agency activities in Laos, the Phoenix
gence history or of the Vietnam War, as he has program and rural pacification, and involve-
written some 17 books on these subjects. 1 His ment with South Vietnamese leaders. From
latest work, published by the University Press this work, however, a reader new to CIA his-
of Kansas, will undoubtedly have a wide read- tory would get the erroneous impression that
ership and garner acclaim from those who the Agency engaged in all manner of nefarious
share his interpretations of the war and of the activities in Vietnam, failed in most every
CIA. A large study, with a comprehensive bibli- Southeast Asia-related mission, and spent the

1 Prados is affiliated with the George Washington University’s National Security Archive, and he frequently blogs about the CIA on

the archive website, www.gwu.edu/~nsarchiv/.

All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in
this article should be construed as asserting or implying US government endorsement of its factual
statements and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 73


Intelligence and the Vietnam War

better part of its resources on illegal surveil- Robarge’s monograph on the A-12 Archangel
lance and collection activities against those supersonic aircraft would have provided more
involved in the antiwar movement at on that technological feat. 5 Sadly, the por-
home—the latter a rare and relatively brief trayal of the CIA in Prados’s work tends to
deviation from the Agency’s traditional foreign reflect the antiwar, anti-Establishment view so
intelligence mission, which did score numer- often heard since the 1970s, when the Agency
ous Cold War successes in Southeast Asia and first faced lurid and media-sensationalized
elsewhere. allegations of wrongdoing and intense congres-
sional hearings.
Prados has chosen to give little or no atten-
tion to publicly available CIA-commissioned In recent years, a new generation of Viet-
histories of the period, and unfortunately his nam War scholars, many born after the con-
book went to press before the release in 2009 of flict and whose perspectives come from
several in-depth, formerly classified, CIA-spon- scholarly research rather than direct participa-
sored histories written by Thomas L. Ahern, tion in the war’s events at home or in South-
and before the release of documents on the east Asia, have challenged many accepted
Agency’s proprietary airline, Air America. 2 interpretations touched on in Prados’s work,
Other available works, such as the National such as his discussion of the Phoenix program,
Intelligence Council’s published collection of and suggest that revisions in his thinking
estimates produced during the Vietnam War, might be in order. But Prados dismisses those
Ahern’s published history on the CIA and rural other scholars and the debate they have initi-
pacification, and Harold Ford’s CIA and the ated. He writes, “this is not revisionism, it is
Vietnam Policymakers are cited but not exten- neo-orthodoxy.” (328) One would conclude from
sively used in this volume. 3 such statements that the author made up his
mind about US and CIA involvement in South-
Unused and uncited are a number of well- east Asia long ago and that no amount of new
documented and rich treatments of Agency pro- material will change his views. As he writes,
grams that give fuller and more positive per- “Ultimately I side with those who consider
spectives—although not without criticism—on Vietnam an unwinnable war. I came to that
its efforts during the period, and at the same view early, but extensive research and deep
time more accurately reflect the environment analysis confirm that impression.” (xv) For the
in which the Agency operated at home and intelligence officer, Vietnam: The History of an
abroad. For example, MHCHAOS, mentioned Unwinnable War does more to reveal the
in passing by Prados, gets full treatment in author’s perception of the CIA than its role in
Richard Helms as Director of Central Intelli- the war. For the latter, Agency-released histo-
gence, declassified in 2006. 4 Studies in Intelli- ries provide the fullest picture.
gence also has published many now-
declassified articles dealing with Southeast Why Vietnam Matters: An Eyewitness
Asia, especially technical collection and recon- Account of Lessons Not Learned, by Rufus Phil-
naissance programs. Other pertinent publica- lips, certainly ranks as an account that all
tions, such as the CIA chief historian David intelligence officers should read and consider.

2 The Air America material and Ahern’s six studies, with one exception lightly redacted, are available in CIA’s Freedom of Informa-
tion Act Reading Room in its special collections section: http://www.foia.cia.gov/special_collections.asp. Ahern’s volume on rural pac-
ification was published as Vietnam Declassified: The CIA and Counterinsurgency (Lexington: University of Kentucky Press, 2009)
3 Harold Ford, CIA and the Vietnam Policymakers: Three Episodes 1962–1968 (Washington, DC: CIA Center for the Study of Intel-

ligence, 1998). This publication is available online at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publica-


tions/books-and-monographs/cia-and-the-vietnam-policymakers-three-episodes-1962-1968/index.html.
4 Robert M. Hathaway and Russell Jack Smith, Richard Helms as Director of Central Intelligence (Washington, DC: CIA Center for

the Study of Intelligence, 1993). A scanned copy of this publication is available online at http://www.foia.cia.gov/helms.asp.
5 David Robarge, Archangel: CIA's Supersonic A-12 Reconnaissance Aircraft (Washington, DC: CIA Center for the Study of Intelli-

gence, 1997). This publication is available online at https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/


books-and-monographs/a-12/index.html.

74 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence and the Vietnam War

Phillips’s detailed memoir, which describes his American patriots who possessed great knowl-
service with the CIA and USAID in Vietnam edge of Asian cultures and history, superlative
and Laos between 1954 and 1968, draws on interpersonal skills, and a clear ability to work
archival research, interviews, official volumes with, and not around, the South Vietnamese in
from the Department of State and a common fight against communism.
CIA—including Ahern’s pacification vol-
ume—plus many other pertinent scholarly pub- Perhaps most important, Phillips, like Lans-
lications to form a very readable account. The dale—and unlike most American military and
book makes use of many of the same sources as political leaders—recognized that the war
Prados’s work, but it differs greatly in tone and against Ho Chi Minh represented first and
in its views of the CIA’s efforts, although it is foremost a political and ideological war and not
still critical at times. The discursive endnotes a contest of arms. Victory or defeat hinged on
and biographical sketches bring the reader up gaining or losing adherents to the cause in both
to date on the people who played key roles Southeast Asia and the United States. Bullets,
many decades ago, and an extensive biblio- bombs, and troops could not triumph alone, in
graphical essay suggests further reading. any amount or over any length of time. Only by
providing peasants with rural security, lifting
A US Army officer on detached service with them from poverty, and educating them on the
the CIA, Phillips arrived in Southeast Asia as a merits of democracy and the evils of commu-
member of the Agency’s small SMM in July nism, could South Vietnam survive and the US
1954. Established after a request by President obtain its goals. While Lansdale worked with
Dwight Eisenhower to DCI Allen Dulles to the new regime on higher-level state stabiliza-
advise and stabilize the Emperor Bao Dai’s tion matters in Saigon, Phillips worked with
government under Prime Minister Ngo Dinh the peasants in the Mekong Delta, central
Diem, the SMM undertook what must have coast, and central highlands. Phillips found the
seemed a Herculean task. The legendary peasants amenable and loyal to Diem’s govern-
Edward G. Lansdale, a US Air Force officer ment once rural development projects began
assigned to the CIA and fresh from the success- and the peasants realized alternatives to the
ful repression of the Huk rebellion in the Phil- communists existed—the only other presence
ippines, directed the effort. In the fall of 1954, in the countryside prior to 1954 was the
he set out to do in South Vietnam what he had despised French. The Army of the Republic of
done in the Philippines—stabilize, boost, and Vietnam (ARVN), in Phillips’s view, also
strengthen the government, while removing exerted a positive influence once its units
communist-inspired threats to the new regime. moved into the villages. Contrary to most tradi-
tional accounts, Phillips notes that the people
Phillips points out early on, and frequently came over to support the government, ARVN
reiterates, that Lansdale and those small num- troops integrated well into the villages, and
bers concerned with the “other war” (defined as peace and stability came to the countryside.
rural development and winning the support of
the largely peasant southern population) It is here though that Phillips saw the first
worked outside the US diplomatic, military, indications of things going seriously wrong.
economic, and intelligence bureaucracy in coop- The SMM closed in November 1956, its mis-
eration with their South Vietnamese counter- sion accomplished. US efforts then went big,
parts in a relationship based on common years before US efforts went even bigger dur-
knowledge, mutual respect, and shared goals. ing 1964–65. As Phillips writes, bureaucracy
The SMM assisted these local efforts and never took over. The CIA established a station as part
sought to dominate what was a job the Viet- of a larger, ever growing State Department
namese had to do for themselves—as Presi- Country Team. The US Military Assistance
dent Kennedy would say in an interview with and Advisory Group (MAAG)—like its 1962
correspondent Walter Cronkite in the fall of successor, the Military Assistance Command-
1963. SMM personnel, in Phillips’s view, from Vietnam—removed the ARVN from the vil-
Lansdale on down, were sincere and selfless lages and reconstructed the force as a conven-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 75


Intelligence and the Vietnam War

tional Western-style army to counter an ese countryside in the years after 1968,
expected North Vietnamese invasion. The ulti- acknowledging that many of their bases had
mate US–South Vietnamese defeat, Phillips been wiped out in South Vietnam and that
claims, really occurred then, although he still numbers of North Vietnamese and Viet Cong
held out hope as late as 1972 that the overall troops had been compelled to retreat to sanctu-
situation could be saved. Yet the cooperative aries in Cambodia.” (301) These firsthand
connection to the South Vietnamese, both observations confirm much of what newer Viet-
within their government and among the peas- nam scholarship now shows, although improve-
antry, was lost, never to return. ments came too little and too late to affect the
outcome of a war the American public had
Following this early service, Phillips worked abandoned.
in similar programs for the CIA in Laos before
returning to Agency Headquarters in Washing- As a thoughtful participant in the events
ton. Fed up with bureaucracy, especially after described, Phillips offers some practical les-
experiencing the independence of field work, he sons for those involved in today’s counterinsur-
resigned from the Agency. When he returned to gencies. Foremost, Phillips stresses that
Vietnam with USAID in the early 1960s and Americans must know who they are as a peo-
became involved in the Strategic Hamlet Pro- ple, and leaders must know (and be realistic)
gram, he noted with growing alarm the about what they are trying to attain abroad.
strained and distant relationship between most US leaders must also know their allies and
Americans assigned to rural areas and the adversaries.
South Vietnamese. Efforts to shift focus back to
the classic counterinsurgency, to reintroduce More important, however, Phillips main-
Lansdale, and to influence President Ken- tains that if our nation is to be involved in such
nedy’s policies all failed, even though Phillips conflicts, we must know the “x factor”—the
made direct appeals to Kennedy in the fall of political and psychological nature of the strug-
1963. These White House meetings were con- gle for hearts and minds—and the feelings of
tentious, as military and civilian advisers, the people for whom we are fighting. We need
including Secretary of Defense Robert S. to communicate with them on a human level,
McNamara, took issue with Phillips’s assess- understand what motivates them, and view the
ments and showed early signs of favoring a US conflict through their history, society, and cul-
military commitment. ture. We need to know our enemies, their capa-
bilities and motivations, as well as the level of
Although Phillips stayed involved for sev- their willingness to continue their resistance
eral more years, the Americanization of the and up to what level of cost. Decisionmakers
war after 1965 pushed rural development into must be able to explain and connect policies
the background with dire results. Phillips and events abroad to the American public.
writes favorably of the Civil Operations and Finally, Phillips repeatedly emphasizes that we
Revolutionary Development Support (CORDS) must know whether we are fighting a conven-
program, which began in 1967 and increased in tional war or a political/ideological war—or a
intensity after the communist Tet offensive of combination of both—so that we can bring the
1968. To him, CORDS represented the embodi- most suitable weapons to bear. These would
ment of what he had worked towards since the include, of course, knowledgeable intelligence
mid-1950s. With rural pacification and secu- officers and military personnel willing to work
rity, nation building, and anti-Viet Cong activi- long, hard years at the grassroots level.
ties all under one program, progress came
swiftly. “By 1972,” Phillips writes, “most of James S. Robbins’s This Time We Win: Revis-
South Vietnam, particularly in the Delta area, iting the Tet Offensive clearly fits into the revi-
was not only pacified but peaceful. So was most sionist school of Vietnam War history that
of central Vietnam.” Phillips continues, “the Prados dismisses. This Time We Win is not a
North Vietnamese would later admit they suf- history of the CIA in Southeast Asia, although
fered a severe reversal in the South Vietnam- the “Intelligence Failure” chapter accurately

76 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Intelligence and the Vietnam War

speaks of the Agency, its analysis of the war in on the spectacular, gave Tet the appearance of
1967, and the warning it provided before the a major setback and served as proof that US
1968 Tet offensive. Robbins positively portrays policies had failed. The idea that Tet consti-
CIA activities in a way not usually seen in tuted an American catastrophe settled in the
most published histories. public’s mind and never went away. Robbins
concludes that “Tet was less a case of intelli-
The main value of this book for intelligence gence failure than a public relations fiasco.”
officers lies in its descriptions of how public (123)
perceptions—for better or worse—affect a
nation’s foreign policy and the course of its mil- This all matters today, Robbins maintains,
itary conflicts. Focusing on public, political, and “because the Vietnam War is remembered by a
media perceptions of the Tet Offensive during large segment of the political class as point-
its initial phase in January and February 1968, less, immoral, and illegitimate, [and the] mere
Robbins claims that most Americans saw the mention of Vietnam tends to delegitimize any
event negatively and today remember Tet for conflict to which it is compared.” (9) Because
all the wrong reasons. The perception of loss, Vietnam has been so widely seen as an unwin-
he argues, became a self-fulfilling prophecy, nable war, comparisons of that conflict to the
even though history shows that what hap- current battles in Afghanistan and Iraq are not
pened in the offensive was a military defeat for intended to lend clarity, “but rather to couch
the North. In short, the US lost in Vietnam not the discussion in terms of inevitable defeat.” (9)
because of any military defeats but because US
leaders, in effect, chose to lose and repeatedly Robbins warns that US adversaries today
avoided opportunities for victory. have drawn inspiration from the Tet offensive
and hope to score similar victories. They see
Historians have long accepted that the com- “America’s national will as an Achilles heel”
munists suffered a major military defeat during that negates its policies and power. Tet proved
the short but ferocious Tet offensive in 1968. At that a small, weak force could defeat the most
the same time, historians accept that the com- powerful nation in human history by creating a
munists scored a major political and psychologi- big splash and the perception of power where
cal victory as American public opinion turned none existed. This provided an immediate
against the war their leaders had consistently political victory that set up the North’s future
said they were winning. Using a wide variety of military triumph. Robbins concludes that the
government records, published histories, inter- United States could just as easily lose today’s
views, and television and print news accounts, conflicts if its people convince themselves that
Robbins shows that Tet may have shocked the they cannot succeed.
public, but it came as no surprise to US intelli-
gence officials, soldiers, or politicians in the All three books are excellent for their treat-
Johnson administration. All had anticipated a ment of the history of the Vietnam War and the
last-ditch offensive in South Vietnam months in CIA’s role in the conflict. They are less effective
advance, prepared for it militarily, and rapidly in their pointed analogies and comparisons of
defeated it once it occurred, inflicting a clear mil- that war to the current conflicts in Afghanistan
itary defeat on the communists, who failed to and Iraq. History is rarely so neat as to provide
achieve any of their goals. direct and applicable comparisons—as if times,
actors, policies, and circumstances do not
Robbins goes on to describe a US adminis- change. In the authors’ attempts to connect what
tration that essentially snatched defeat from happened in Vietnam to what is happening now,
the jaws of victory. President Johnson failed to one is led to wonder if writing history was their
explain what had happened; what the adminis- goal or if they merely intended to harness his-
tration knew and what it had been doing tory to reinforce, or undermine, present-day poli-
beforehand; and how Tet affected or did not cies and political agendas.
affect long-term US goals. This lackluster
response, reinforced by media reports focusing ❖ ❖ ❖

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 77


Intelligence in Public Literature

Intelligence Officer’s Bookshelf


Compiled and reviewed by Hayden Peake

General
Challenges in Intelligence Analysis: Lessons from 1300 BCE to the Present, by Timothy
Walton
Extreme Risk Management: Revolutionary Approaches to Evaluating and Measuring Risk,
by Christina Ray
The Technical Collection of Intelligence, by Robert M. Clark

Historical
Betrayal: Clinton, Castro and The Cuban Five, by Matt Lawrence and Thomas Van Hare
Black Ops: The Rise of Special Forces in the C.I.A., the S.A.S., and Mossad, by Tony
Geraghty
Double Death: The True Story of Pryce Lewis, the Civil War’s Most Daring Spy, by Gavin
Mortimer
Empire and Espionage: Spies and the Zulu War, by Stephen Wade
Final Verdict: What Really Happened in the Rosenberg Case, by Walter Schneir
The First War of Physics: The Secret History of the Atom Bomb 1939–1949, by Jim Baggott
The Invisible Harry Gold: The Man Who Gave the Soviets the Atom Bomb, by Allen M.
Hornblum
The Kremlin’s Geordie Spy: The Man They Swapped for Gary Powers, by Vin Arthey
Radio Free Europe’s “Crusade for Freedom”: Rallying Americans Behind Cold War Broad-
casting, 1950–1960, by Richard H. Cummings
Secrets of the Cold War: US Army Europe’s Intelligence and Counterintelligence Activi-
ties against the Soviets, by Leland C. McCaslin
Through Hitler’s Back Door: SOE Operations in Hungary, Slovakia, Romania and Bulgaria
1939–1945, by Alan Ogden
Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espio-
nage, by Douglas Waller

Memoirs
All Them Cornfields and Ballet in the Evening, by John Miller
The C.I. Desk: FBI and CIA Counterintelligence As Seen from My Cubicle, by Christo-
pher Lynch
Holding Hands with Heroes, by Jack Kassinger

Intelligence Abroad
The New Nobility: The Restoration of Russia’s Security State and the Enduring Leg-
acy of the KGB, by Andrei Soldatov and Irina Borogan

All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the
article should be construed as asserting or implying US government endorsement of its factual state-
ments and interpretations.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 79


Bookshelf—June 2011

General

Challenges in Intelligence Analysis: Lessons from 1300 BCE to the Present, by Timothy
Walton. (New York: Cambridge University Press, 2010), 294 pp., bibliography, maps, index.

Former CIA analyst Timothy Walton begins In the case of the run-up to the attack on Pearl
his book with a discussion of the basic elements Harbor, Walton provides a good summary of
and tools of intelligence analysis, which in the what happened and then acknowledges it as
end supports decision making. For example, af- “the most famous and consequential example of
ter identifying various factors an analyst must failure in intelligence analysis.” (95) But he fails
be careful to consider—uncertainty, deception, to describe the analyses performed by those in-
surprise, estimates of the accuracy of judg- volved that allowed for the surprise.
ments—he describes some of the important
techniques that can be applied. These include A similar approach applies in the case of the
the time-line or chronology, competitive hypoth- atomic bomb spies. He tells how the FBI learned
eses, and various matrix models. Finally, he of the espionage through defectors and the
stresses the value of presenting the decision Venona messages, but he neglects to comment
maker with options when no single result is di- on how the Bureau approached the difficult an-
rectly on point. alytical problems the decrypts posed. The case
also points to a major weakness of the book.
To illustrate how analysis has functioned in None of the facts presented are sourced, and this
the past, he provides 40 historical “lessons” from leads to careless errors. Thus Walton writes:
biblical times to the present. While the reader “shortly before Gouzenko’s defection [5 Septem-
might legitimately expect the lessons to demon- ber 1945] Elizabeth Bentley had volunteered in-
strate the techniques Walton presented in the formation to the FBI field office in New Haven.”
introductory chapters, that is not what the les- (116) In fact, Bentley went to the Bureau office
sons do. Instead, they are historical summaries in New York on 7 November 1945. In another in-
that set the stage for analyses. For example, his stance, Walton claims that Gouzenko mentioned
account of Moses sending spies into Canaan Harry Gold, Klaus Fuchs’s courier, but he did
only summarizes the conflicting reports he re- not. And Gold was not, as the book claims, the
ceived and the resultant disagreement among one who identified Fuchs; it was the other way
the leaders. There is nothing about fact check- around. 6
ing or other analyses that might have led to con-
clusions they might have reached. Likewise, in In sum, while Challenges in Intelligence Anal-
his discussion of Hitler’s surprise attack on the ysis illustrates historical cases in which analysis
Soviet Union, Walton mentions Stalin’s require- was no doubt performed, the details of that anal-
ments for intelligence and the indicators that an ysis—how it was done, what one really needs to
attack was imminent, but he does not analyze know—are omitted. The reader is left to resolve
why Stalin steadfastly refused to believe them. that.

Extreme Risk Management: Revolutionary Approaches to Evaluating and Measuring


Risk, by Christina Ray. (New York: McGraw Hill, 2010), 287 pp., endnotes, charts, index.

Just days after 9/11, financial analyst Christi- coming attacks had been trading in the market
na Ray read press allegations that Osama bin in anticipation of the impact of the attack. She
Laden collaborators with knowledge of the up- hypothesized that if the story were true, analy-

6 See Amy Knight, How The Cold War Began: The Igor Gouzenko Affair and the Hunt For Soviet Spies (New York: Carroll & Graf,

2005); Allen Hornblum, The Invisible Harry Gold: The Man Who Gave the Soviets the Atom Bomb, (New Haven, CT: Yale University
Press, 2010).

80 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

sis of open source stock market transaction data pares risk methodologies employed by financial
would expose those involved. Extreme Risk and intelligence analysts. Here she argues that
Management does not reveal whether she tested financial models, which are mainly statistical,
her theory. Instead, it focuses on her subsequent can be adapted to show, for example, how the
work, which expanded the concept and explored “intelligence community might benefit from in-
the similarities she found in risk management formation derived from open-source market
techniques employed by the financial and intel- prices converted to knowledge using quantita-
ligence communities. She argues that “the abili- tive sense-making models…as a metric of sover-
ty to reverse-engineer actionable market eign state instability.” (151)
intelligence, or MARKINT,” (vii) might be useful
as an investigative tool in counterterrorism More generally, Ray concludes “financial war-
work and describes a number of risk manage- fare is arguably one of the types of unrestricted
ment models aimed at achieving that goal. In warfare for which the United States is least pre-
fact, Ray points out that “the CIA is now public- pared and to which it is the most vulnerable.”
ly advertising” for experienced financial ana- (254) To meet this threat, she suggests applica-
lysts. (viii) tions for MARKINT by intelligence analysts
dealing with cyberthreats, counterintelligence,
Extreme Risk Management is not a book for be- terrorism, insurgency, and rogue state behavior.
ginners. Most of its chapters are devoted to com- While the practical testing of such applications
plex financial models and the risks associated remains to be done, Extreme Risk Management
with their use. But in chapter nine, “An Alterna- provides the basic techniques for analysts in
tive Path to Actionable Intelligence,” she com- this new field of activity.

The Technical Collection of Intelligence, by Robert M. Clark. (Washington, DC: CQ Press,


2009), 322 pp., end of chapter notes, photos, glossary, index.

Independent consultant and patent lawyer Chapters cover the space-, air-, sea-, and
Robert Clark is a former industrial executive, ground-based collection platforms intelligence
Air Force intelligence officer, and CIA analyst organizations employ today. With the help of im-
with extensive experience in the field of techni- pressive color illustrations, Clark explains what
cal intelligence. His previous books discussed each platform does and how it works. He in-
intelligence analysis. 7 In his latest work he cludes, for example, several types of radar tech-
turns to technical collection, which he defines as niques, passive RF (radio frequency) collection,
the “collection, processing, and exploitation of and digital satellite imagery. Clark also high-
nonliteral information—that is, information in a lights the differences between active and pas-
form not used for human communication” as op- sive systems. The final chapter looks at
posed to that acquired from human agents. (xvi) managing technical collection. He does not get
into detailed operating procedures, though he
The keys to technical collection are signa- does present a list of key management tools for
tures—photographic, electromagnetic, chemi- consideration. One of the most important and
cal, biological, acoustic, and nuclear—collected difficult tasks Clark discusses is the allocation
by various acquisition systems. Clark is careful of collection requirements to meet time-sensi-
to distinguish between signatures and the pat- tive demands that often exceed the capabilities
terns associated with them. For example, the of available systems.
images of the Cuban missile sites acquired by
the U-2 in 1962 are signatures. Their signifi- Technical Collection of Intelligence is a fine,
cance results from analysis of the patterns ob- fully-documented, understandable, and compre-
served by analysts. hensive, though not elementary, introduction to

7See Robert M. Clark, Intelligence Analysis: Estimation & Prediction (Baltimore, MD: American Literary Press, 1996), and Intelli-
gence Analysis: A Target-Centric Approach (Washington, DC: CQ Press, 2003).

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 81


Bookshelf—June 2011

a complex intelligence activity. It is an impor-


tant topic not treated in such depth elsewhere.

Historical

Betrayal: Clinton, Castro and the Cuban Five, by Matt Lawrence and Thomas Van Hare.
(New York: iUniverse, Inc., 2009), 217 pp., bibliography, no index.

On 24 February 1996, Cuban MiGs shot down Pentagon did draft military responses for the
two of three unarmed American light aircraft president, but he chose not to implement them.
over international waters off the Cuban coast. Even if he had done so, the Cubans would have
The four pilots died. The third aircraft escaped been prepared, and not only because of their
and spread the word. The United States govern- “survivor” agent. Their principal agent in the
ment responded with diplomatic gestures. Matt United States, Ann Belén Montes, had been in
Lawrence and Thomas Van Hare think more the Pentagon group that had drawn up the op-
should have been done. Betrayal explains why. tions for White House consideration.

The authors, like the pilots flying near Cuba And there were other Cuban agents involved,
that day, were members of Brothers to the Res- according to this book. At least two were part of
cue, a volunteer group that flew missions be- La Red Avispa (or Wasp) network, one of many
tween Cuba and Florida searching for rafters, or such groups in the Cuban refugee community in
balseros, trying to flee Castro. When the pilots Florida. (73ff) Five Wasps were eventually ar-
spotted rafters, they radioed the US Coast rested, and the authors explain those agents’
Guard so they could be rescued. Between 1994 roles. Perhaps the most controversial conclusion
and the final mission in 2001, Brothers helped of the authors is that the US government knew
save over 17,000 lives, according to Lawrence the Cubans were going to attack the Brothers’
and Van Hare. planes that day and for complex political rea-
sons did nothing to warn the pilots or prevent
The Castro government said the planes shot the attacks. (189ff) The authors’ evidence is not
down in 1996 were in Cuban airspace, and it rock solid, and the reader is left to make an in-
produced a “survivor” to prove it. The authors dependent judgment.
knew no one had survived. They also recognized
the “survivor” as a fellow Brothers pilot and con- In discussing their findings, the authors do not
cluded he had penetrated the organization for neglect the personalities of the Brothers pilots
Cuban intelligence. and their families. They present a poignant pic-
ture of Cuban refugees working against Castro
While the story quickly dropped from public while his agents work to thwart them.
attention, many questions were left answered;
for example, exactly where had the shoot-down
occurred; had they actually flown into Cuban Lawrence and Van Hare do not provide specific
airspace?(one plane did briefly); why did the Cu- sources for key points in the book, though in the
bans risk US Air Force retaliation; what had the “Key References and Bibliography” section,
three survivors said about the mission; and had newspaper articles, books, and persons inter-
any formal investigations been done by US offi- viewed are listed for each chapter.
cials? Betrayal offers answers to these and other
questions that emerged as the authors pursued Betrayal is a sad story of a humanitarian effort
their own investigation. In a chapter titled “Cu- eventually shut down by Castro and interna-
ba’s Queen of Spies,” the authors assert that the tional politics.

82 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

Black Ops: The Rise of Special Forces in the C.I.A., the S.A.S., and Mossad, by Tony Ger-
aghty. (New York: Pegasus Books, 2010), 440 pp., endnotes, appendices, photos, index.

Arabic linguist Tony Geraghty served in the The chapter on British SF describes the often
British Army, flew Nimrods in the RAF, and was stormy evolution of operations by multiple, com-
a war correspondent before turning to writing peting units—SAS and special military intelli-
books. His histories of the SAS (Special Air Ser- gence elements—that battled the IRA,
vice), the IRA conflict, and BRIXMIS (The Brit- supported the Falklands War, and fought in the
ish Commanders-in-Chief Mission to the Soviet Iraqi wars. Much of the controversy was re-
Forces in Germany, which provided cover for a solved in 2005 with the formation of the UK
military intelligence unit in Cold War Europe) Special Forces Group (UKSF), which included
established him as a respected authority. In the SAS, the Special Boat Service (SBS), the
Black Ops he expands his outlook, first to dis- 18th Signal Regiment, and various special mili-
cuss the broad historical origins of Special Forc- tary units designed to provide quick reaction ca-
es (SF) activity, and then to focus on their use by pability.
the United Kingdom, the United States, and Is-
rael.
The Israeli Chapter covers the origins of “at
least thirty” (178) SF units, including the Moss-
To assume, however, that the book’s subtitle
ad, the Aman (military intelligence), the Say-
implies that Geraghty will give equal coverage
eret Matkal (an army reconnaissance and
to each mentioned organization would be a mis-
commando unit), and the Sayeret Shaldag (the
take. After a 39-page introduction that nicely
Special Air-Ground Designating Team, an air
summarizes the entire book, five of the seven
force commando unit). (185) Geraghty records
chapters are devoted to SF in the United States,
their effectiveness in some well known instanc-
one to Israel, and the last to the United King-
es—for example, the aftermath of the Olympic
dom (the SAS and various lesser-known units).
games hostage taking, the Entebbe rescue mis-
Throughout, Geraghty discusses the influence
sion, and the Vanunu case. He also asserts that
of British SF elements on their US and Israeli
in operations of this sort, the Israelis possess an
counterparts.
advantage in that they can presume they will
have the support of Jews wherever Israeli forces
The coverage of US SF units begins with the
operate.
Revolutionary War, but the focus is on their con-
troversial development during WW II, with the
OSS battling the War Department and the Brit- Geraghty takes note of the irony that three of
ish Special Operations Executive (SOE). There the countries discussed in the book—Israel, the
is detailed coverage of the contentious use of SF United States, and Ireland—engaged in suc-
in the Vietnam War. Geraghty goes on to de- cessful resistance to British rule which “depend-
scribe the origins of the Delta Force and the ed, initially, on irregular military forces.” (177)
tragic outcome of its attempted Iranian hostage Black Ops shows how SF units have since devel-
rescue mission. He suggests the Delta Force fi- oped into a major force in the contemporary bat-
nally achieved acceptance in asymmetric war- tle against terrorism. It is well documented and
fare in Iraq. well worth reading.

Double Death: The True Story of Pryce Lewis, the Civil War’s Most Daring Spy, by Gavin
Mortimer. (New York: Walker & Company, 2010), 285 pp., endnotes, appendices, photos, index.

The late NSA analyst and jazz musician Ed- tionalized that even the most believable parts
win Fishel was also an authority on Civil War are suspect.” The memoirs of Allan Pinkerton,
intelligence. Years in the archives convinced he wrote, epitomized this condition. Pinkerton
him that most Civil War intelligence memoirs “paid almost as little respect to factuality as did
qualified as subprime literature, “so heavily fic- the authors of complete fictions.” 8 Author Gavin

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 83


Bookshelf—June 2011

Mortimer agrees with Fishel’s assessment of tempt, Webster told his hangman, “I suffer a
Pinkerton. Although a man of many positive double death,” hence the title of Mortimer’s
qualities, writes Mortimer, “Allan Pinkerton… book. Lewis and Sully were repatriated, and
told the truth only when it suited him; when it their days as spies were over. This is the version
didn’t, he lied.” (14) Double Death gives many of Webster’s demise that Fishel recorded in his
examples, but the most important one concerns book. 9
Pryce Lewis, one of Pinkerton’s principal intelli-
gence agents. While researching the life of Lewis, Mortimer
discovered two documents unknown to Fishel.
The first part of Double Death is devoted to One was a pamphlet written in 1906 by William
Lewis’s early life, the circumstances that Pinkerton, Allan’s son, telling the true story of
brought him to America from his home in Wales, the testimony that led to Webster’s death: “Scul-
his work in America as a traveling book sales- ly made the confession implicating Webster…
man, and his recruitment into the Pinkerton Lewis remained staunch, and did not confess.”
Detective Agency in 1859. When Pinkerton went (236) No one knows why Allan Pinkerton lied.
to Washington to serve General McClellan as an Lewis knew of the pamphlet, but so few others
intelligence officer, Lewis became one of his did that his reputation remained tainted. The
agents. He operated first in the South undercov- second document was a copy of Lewis’s memoir
er as a traveling English gentleman. found in an archive in Canada. Letters indicated
he had tried unsuccessfully to get it published.
At the same time, Pinkerton’s most valuable In the memoir, Lewis writes that he never be-
agent, Timothy Webster, was acting as a Confed- trayed Webster. The memoir also provides de-
erate courier but secretly carrying mail to the tails of Lewis’s life story, told in Mortimer’s book
North. In 1862 Webster came under suspicion for the first time.
while in Richmond. Before he could escape he
fell ill and was confined to bed. When he failed Mortimer makes a weak case for designating
to appear as expected, Pinkerton sent Lewis and Lewis the most daring spy in the Civil War. Web-
another agent, John Scully, to Richmond to see ster is a better fit. In the end, what mattered to
what was wrong. After meeting with Webster, Lewis was his tarnished reputation. Burdened
they too were suspected of being agents and by his failure to cleanse it and by persistent fi-
were arrested. In his memoir, Pinkerton writes nancial problems, he committed suicide on 6 De-
that to save themselves, Lewis and Scully con- cember 1911 in New York City. Double Death
fessed that Webster was a Union agent. Webster sets the record straight in an important Civil
was hanged, twice. The first attempt failed War intelligence case. Well written and soundly
when the noose unraveled. Before the second at- documented, it is a valuable contribution.

Empire and Espionage: Spies and the Zulu War, by Stephen Wade. (Barnsley, South York-
shire, UK: Pen & Sword, 2010), 183 pp., endnotes, bibliography, photos, index.

The Anglo-Zulu War began in January 1879, The British force of about 13,000 men—5,000
when troops from the British colony of Natal on British soldiers and 8,000 Africans—advanced
the East Coast of Africa invaded neighboring in three columns. Scouting parties were dis-
Zululand. Africa was not a high priority for Im- patched, but either they failed to gather intelli-
perial Britain, and its army units there had few gence about enemy positions and strength, or
experienced officers and men and suffered from commanders disregarded their reports. In the
inadequate training. The Brits were counting on event, the center column of 1,600 British and Af-
rigid discipline and superior weaponry to deal rican troops was surprised and annihilated by a
with the “primitive peoples’ attack mode.” (37) Zulu force 20,000 strong—one half of the Zulu

8 Edwin C. Fishel, The Secret War for the Union (New York: Houghton Mifflin, 1996).
9 Ibid., 149–49.

84 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

Army—at Isandlwana. More than 1,300 British Empire and Espionage is the only book on this
soldiers died. Zulu losses were estimated at topic, and it is valuable for that reason alone.
2,000 dead and 1,000 injured. Author Stephen But it has a major defect. Throughout, names,
Wade examines in detail the reasons for the de- events, and locations are mentioned but not oth-
feat. He goes on to describe several subsequent erwise identified. Thus, for example, we encoun-
battles. He emphasizes the use and misuse of ter Cetshwayo (the Zulu leader), Garnet
scouts and spies, the personalities involved, the Wolseley and Chelmsford (both British gener-
communications employed, and the role of the als), and Bartle Frere (the governor of South Af-
media in reporting the conflict to London. rica) without ever learning their roles or titles.
Isandlwana, though frequently mentioned in
The British ultimately did overwhelm the Zu- the book’s opening, is not identified as a major
lus, and after capturing the Zulu leader accept- battle until page 36. Wade offers no explanation
ed their surrender on 1 September 1879. for this awkward treatment. Thus, a reader
According to Wade, the British army learned without knowledge of the Anglo-Zulu War will
much from the war. He describes its impact on find the book bumpy going.
the future of military intelligence—although he
acknowledges that some of the same mistakes
were made again in the Boer War.

Final Verdict: What Really Happened in the Rosenberg Case, by Walter Schneir with Pref-
ace and Afterword by Miriam Schneir. (Brooklyn, NY: Melville House Publishing, 2010), 203 pp.,
endnotes, photos, index.

In their 1965 book, Invitation to an Inquest, Walter Schneir died before he could commit his
Walter and Miriam Schneir argued that key wit- new arguments to paper in narrative form, but
nesses at the trial of Julius and Ethel Rosenberg his wife completed the task. She provides an
lied and that the FBI had fabricated evidence. 10 eight-page timeline and a 41-page preface with
Thus the Rosenbergs were not Soviet spies. background on her husband’s research. In a 16-
They were innocent. In 1995, when the Venona page afterword, based on material in the 2010
decrypts proved the Rosenbergs had indeed book Spies, 13 she writes that her husband’s con-
been Soviet spies, the Schneirs, to their credit, clusions hold up. The core of Final Verdict—four
chapters (113 pages)—is attributed to her hus-
revised their position in an article published in
band. It presents his analysis of the critical dis-
The Nation. 11 Julius had been a spy, they admit-
crepancies he claims to have found, though in
ted, but not Ethel, her help in recruiting her
the end his conjectures are only supported by
brother David Greenglass notwithstanding.
imaginative analysis and speculation. One of
Then in 1999, the Schneirs read The Haunted the few unequivocal statements comes from
Wood, by Allen Weinstein and Alexander Schneir himself when he writes, referring to the
Vassiliev, 12 and concluded it contained material Rosenbergs, “Of course they lied and lied when
that cast doubt on aspects of the government’s they contended they knew nothing about espio-
case and might vindicate the defendants after nage. Ethel knew about it and Julius practiced
all. Final Verdict reports the Schneirs’ new posi- it.” (155) In the end, Schneir’s verdict is that the
tion: Julius was only marginally involved in Rosenbergs were prosecuted for a crime they re-
atomic espionage, and Ethel not at all. ally didn’t commit and not for the one they did.

10 Walter and Miriam Schneir, Invitation To An Inquest: A New Look At the Rosenberg-Sobell Case (New York: Doubleday, 1965).
11 Walter and Miriam Schneir, “Cryptic Answers,” The Nation, August 14/21, 1995.
12 Allen Weinstein and Alexander Vassiliev, The Haunted Wood (New York: Random House, 1999). See William Nolte’s review in

Studies in Intelligence 50, No. 2 (June 2006).


13 John Earl Haynes, Harvey Klehr, and Alexander Vassiliev, Spies: The Rise and Fall of the KGB in America (New Haven, CT: Yale

University Press, 2010). For Hayden Peake’s review, see “The Intelligence Officer’s Bookshelf,” Studies in Intelligence 54, No. 3 (Sep-
tember 2010).

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 85


Bookshelf—June 2011

Nothing the Schneirs present changes the sub-


stance of the case. The final verdict remains:
“guilty!”

The First War of Physics: The Secret History of the Atom Bomb 1939–1949, by Jim Baggott.
(New York: Pegasus Books, 2010), 576 pp., endnotes, bibliography, photos, index.

Author Jim Baggott writes in his preface that the impact those agents had on postwar rela-
his book contains “new materials [that] allow a tions among Britain, the Soviet Union, and the
single-volume popular history of the Anglo- United States. But all this has been recounted
American, German, and Soviet [atom bomb] by others. Baggott doesn’t identify anything
programs to be assembled for the first time.” new in his book. The sources are all secondary,
This claim is an exaggeration. The book does and errors made elsewhere are repeated here.
portray the roles played and the controversies For example, MI5 Director General Roger Hollis
experienced by all the well-known scientists in- did not, as claimed, appoint Kim Philby as the
volved, from Oppenheimer to Teller. And it accu- principal liaison officer on the Gouzenko case,
rately chronicles the sequence of events that led
and Sir William Stephenson was not code-
to the bombings in Japan that ended WW II.
named Intrepid. (384)
With regard to intelligence, it reviews the work
of the NKGB agents in the United Kingdom and
the United States who gave the Soviets the The First War of Physics is a good summary of
plans for the US bombs. Baggott also discusses an oft-told story, but nothing more.

The Invisible Harry Gold: The Man Who Gave the Soviets the Atom Bomb, by Allen M.
Hornblum. (New Haven, CT: Yale University Press, 2010), 446 pp., endnotes, bibliography, photos,
index.

Defenders of Julius and Ethel Rosenberg have describes Gold’s hardscrabble early years in
long argued that if Harry Gold had not con- Philadelphia, where he endured bullying at
fessed to being a Soviet agent, they would never school, worked jobs to help the family survive,
have been exposed. Author John Wexley was one and gradually became aware of the menace of
of many who went further by characterizing fascism at home and in Europe. In 1933, desper-
Gold’s trial testimony as “fantasy… unworthy of ate for work, Gold accepted the help of Thomas
belief.” 14 With scholarly elegance, Allen Horn- Black and went to work for him in Jersey City as
blum acknowledges the accuracy of the first chief chemist for the Holbrook Manufacturing
claim and then gently demolishes Wexley’s, not- Company. Black, a staunch communist, saw in
ing that such charges followed Gold beyond the Gold a potential convert. He worked hard to con-
grave. vince Gold that the only hope for defeating fas-
cism lay in helping the Soviet Union since it had
The Invisible Harry Gold is an explana- outlawed anti-Semitism. Though Gold never
tion—not a defense—of Gold’s actions. In ex- joined the Communist Party, he agreed to help it
plaining them, Hornblum invokes the obtain industrial secrets from his employer.
circumstances of the Depression, growing anti- With that decision, there was no turning back.
Semitism in Europe, and the struggles of Jewish Gold eventually graduated to work as a courier
immigrants in the United States. Heinrich for some of the NKVD’s most important agents
Golodnitsky was born in 1910 near Bern, Swit- in the United States, including Klaus Fuchs,
zerland, and became Harry Gold on arrival to David Greenglass, and, indirectly, Greenglass’s
the United States as a four-year-old. Hornblum brother-in-law, Julius Rosenberg.

14 John Wexley, The Judgement of Julius and Ethel Rosenberg (New York: Cameron & Kahn, 1955), 66, 73, 373, 384.

86 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

Hornblum describes Gold’s “gradual seduction erable detail. According to Hornblum, FBI
into industrial espionage” (45) and his often investigative work identified Gold as Fuchs’s
harsh on-the-job training administered by ille- courier. This is contrary to a version reported by
gals who served the Soviets in the United Robert Lamphere that Fuchs himself identified
States. After WW II began, Gold’s assignments Gold as his courier from a picture. 16 The end re-
were redirected onto military targets. The most sult, however, was Gold’s arrest, prompt confes-
important agent he serviced was Klaus Fuchs. sion, and his damning testimony at the
Although Hornblum writes that Moscow Centre Rosenbergs’ trial.
approved Gold as a contact for David and Ruth
Greenglass, who were part of another network, Hornblum presents a well-documented, con-
(145) John Haynes, Harvey Klehr, and Alexan- vincing picture of Harry Gold as an anti-fascist
der Vassiliev in their book Spies revealed that who only wanted to help an American ally.
Gold met with Greenglass as a last-minute sub- Caught up in Soviet espionage he had been un-
stitution for another courier. 15 In any case, had able to forsake, he was sentenced to 30 years in
this contact not occurred, the Rosenberg net- jail and served over half that time. The ultimate
work might have escaped exposure. irony of this story is that while the American
communist agents charged with espionage lied
The Invisible Harry Gold treats Gold’s espio- about their participation, Harry Gold, the non-
nage assignments with the atom spies in consid- communist, is the only one who told the truth.

The Kremlin’s Geordie Spy: The Man They Swapped for Gary Powers, by Vin Arthey. (New
York: Dialogue, 2011), 242 pp., endnotes, bibliography, photos, index, 2nd edition revised.

The first edition of this book was published un- service during the Great Purge of 1938, Fisher
der the title, Like Father Like Son: A Dynasty of was recalled in September, when there was a
Spies. It told the life story of KGB illegal Col. Vi- need for trained radio operators. After WW II,
lyam “Willie” Fisher, aka: “Col. Rudolf Abel, he was trained as an illegal and in 1948 was
KGB.” 17 The new title may puzzle American sent to the United States, where the Soviet net-
readers, but it makes immediate sense to a Brit. works were in disarray thanks to defectors and
A Geordie is the common nickname for those the Venona decrypts.
from the Tyneside region of North East Eng-
land, the region in which Willie Fisher was born Arthey reviews Fisher’s many assignments, in-
on 18 April 1902, in Newcastle upon Tyne. cluding the handling of Soviet agents Morris
and Leona Cohen and atom spy Theodore “Ted”
Author Vin Arthey explains Fisher’s connec- Hall. Fisher used a number of codenames—the
tions to the USSR—his father had been active in best known was Emil Goldfus—and his cover
revolutionary activities in Russia and in 1901 was as a commercial artist. Things began to go
fled to the UK, where he was involved in clan- bad with the arrival of his future replacement,
destine shipping of arms and literature back to Reino Hayhanen, who proved to be an irrespon-
Russia. The family returned to the Soviet Union sible drunk. Fisher had him recalled, but on the
when the younger Fisher was 17. He subse- way home Hayhanen defected to the CIA in Par-
quently served in the Red Army as a radioman. is and revealed that he knew a KGB illegal in
In 1927 he joined the NKVD. His first overseas New York. When the FBI arrested Fisher he
assignment was to England in 1935. There he gave his name as Col. Rudolf Abel, a prear-
worked for Alexander Orlov and Arnold Deutsch ranged signal to the KGB that he was in trouble.
of Cambridge Five fame. Dismissed from the (The real Col. Abel was dead.) Fisher was serv-

15 Haynes, Klehr, and Vassiliev, Spies, pp. 102–3.


16 Robert Lamphere and Tom Shachtman, The FBI-KGB War: A Special Agent’s Story (New York: Random House, 1986).
17 Vin Arthey, Like Father Like Son: A Dynasty of Spies (London: St. Ermin’s Press, 2004). (In the Bookshelf review of the book in

Studies in Intelligence 49, no. 3 (2005) Fisher’s first name was incorrectly rendered as “Willi.”)

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 87


Bookshelf—June 2011

ing a 30-year sentence when he was traded for negotiation that led to his return to the Soviet
U-2 pilot Gary Powers. Fisher returned to limit- Union, and “the Forbidden City”—the location
ed duty for a while but soon retired. He never re- of the KGB headquarters in Potsdam.
vealed what he did in England or the United
States. He died on 15 November 1971 at age 59.
The Kremlin’s Geordie Spy is the only biogra-
While there are no major changes in this edi- phy of Willie Fisher in English that includes de-
tion, a number of corrections have been made tails of his KGB career. Arthey examined new
and new details added. These include Fisher’s materials from Russia, Britain, and the United
date of birth, the name of his imprisoned broth- States to piece together Fisher’s extraordinary
er—Ivan not Boris—and spelling errors. There career. The result is a welcome contribution to
is also some new material on Fisher’s trial, the the intelligence literature.

Radio Free Europe’s “Crusade for Freedom”: Rallying Americans Behind Cold War
Broadcasting, 1950–1960. Richard H. Cummings (Jefferson, NC: McFarland & Company, Inc.,
Publishers, 2010), 257 pp., endnotes, appendices, bibliography, photos, index.

The Crusade for Freedom (CFF) was an early scribes the program’s origin and goes on to
Cold War domestic propaganda campaign aimed review the bureaucratic and financial conflicts
at arousing the “average American against the that persisted throughout its existence. Finally
Communist threat.” (1) Intensely popular at the he looks at the program’s clandestine elements.
time, citizens contributed funds, attended ral-
lies, marched in parades, participated in essay The book treats the public side of CFF in some
contests, and read the Crusade for Freedom detail. This includes discussion of an extensive
Newsletter, which described the nature of the publicity campaign involving Hollywood celebri-
threat and advocated means to counter it. A ties, the news media, and political, industrial,
principal component of the public program was and military figures. Here we read about the
Radio Free Europe (RFE), a broadcast service support of Eleanor Roosevelt, Bing Crosby, Ron-
that sent the ‘truth about communism’ to coun- ald Reagan, General Eisenhower, President
tries behind the Iron Curtain. What was kept Truman, Walter Cronkite, President Kennedy,
from the public at the time was that both CFF and the Boston Symphony Orchestra, to name a
and RFE were covertly sponsored by the CIA. few. Defectors from the Soviet bloc were pressed
The CIA role was officially revealed in 1976, but into service. Col. Joseph Swiatlo of the Polish se-
Radio Free Europe’s “Crusade for Freedom” adds cret service is a case in point. In RFE broadcasts
details not made public at the time. he informed those behind the Iron Curtain how
the KGB dominated the security services of the
Author and former RFE officer Richard Cum- bloc countries. The CIA role in CFF and RFE
mings admits that some might consider CFF was exposed by journalist Drew Pearson in
and its radio operations as a fraud on Ameri- March 1953 (95). Fulton Lewis Jr. added critical
cans. But his view is that if they were a fraud at remarks in 1957, noting “Dulles doesn’t want it
all, they were benign and probably contributed known.” (171) Cummings explains how these
to a Cold War anti-communist consensus. His events were dealt with and how they led to the
book is devoted to documenting that position. demise of CFF in 1962.

Cummings focuses on CFF and RFE from their Radio Free Europe’s “Crusade for Freedom” is
planning stages in 1949 until CFF was termi- well documented and contains a useful chronol-
nated in 1962. RFE continued to function under ogy of major events. Cummings does not com-
CIA sponsorship until 1967, when RFE came ment on the overall value of CFF, but judging
under independent management, an arrange- from this history, it is unlikely that anything
ment that exists to this day. Cummings first de- like it could be attempted successfully today.

88 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

Secrets of the Cold War: US Army Europe’s Intelligence and Counterintelligence Activi-
ties against the Soviets, by Leland C. McCaslin. (Solihull, England: Helion and Company
Limited, 2010), 200 pp., glossary photos, no index.

There are no secrets in this book. Most of the sions that collected intelligence in occupied
19 chapters contain reminiscences written by zones in Germany, the US-Russian hotline, de-
the more than 50 contributors listed on pages fectors, counterintelligence, the Berlin duty
12–14. Curiously, “Special Comments by Fran- train, and several case studies. The latter are il-
cis Gary Powers, Jr.,” though listed in the con- lustrative and contain no specifics—first names
tents, are nowhere to be found. Author and only. No sources are provided.
retired military intelligence officer Leland Mc-
Caslin adds brief introductory comments to Secrets of the Cold War with its many photo-
most chapters and contributes two himself, one graphs does deliver a glimpse of military intelli-
on the annual military intelligence (MI) ball, the gence activities in Europe during the Cold War,
other on travel in Cold War Europe. but its content does not live up to the promise of
its title.
The topics covered are not without interest.
They include the Soviet and Allied military mis-

Through Hitler’s Back Door: SOE Operations in Hungary, Slovakia, Romania and Bul-
garia 1939–1945, by Alan Ogden (Barnsley, South Yorkshire, UK: Pen & Sword, 2010), 284 pp.,
end of chapter notes, bibliography, photos, index.

The British Special Operations Executive communications, and resupply—and the shift-
(SOE) was established early in WW II to run ing loyalties of those contacted in the local gov-
sabotage and support resistance groups in Ger- ernments also were problematic. But in the end,
man-occupied territory. By 1943 the SOE was the uncompromising role of a Soviet Union on
also involved in political subversion—regime its own subversion mission was the dominant
change—in Hungary, Slovakia, Romania, and road block.
Bulgaria, each one a German ally. Teams of the
“wonderfully amateurish” (vi) businessmen, Ogden describes in considerable detail more
bankers, engineers and academics that staffed than 30 missions, with emphasis on the persis-
the SOE were dropped into each country to do tent operational glitches encountered and their
the job. All operations failed to accomplish their often herculean efforts to overcome them. He
primary objectives. Through Hitler’s Back Door pays particular attention to the personnel in-
explains why. volved—those that didn’t survive and the few
that did.
The book is divided into three parts. The first
deals with Hungary and Slovakia, the second Though they fell short of their primary objec-
with Bulgaria, and the third with Romania. Au- tive, the operations were not entirely in vain.
thor Alan Ogden begins each part with a histor- Ogden tells how some tied up German forces
ical summary of the country and then turns to that could have been deployed elsewhere and
SOE efforts to bring it under Allied control. destabilized the planning of the Wehrmacht
“From early on, SOE encountered difficulties in high command. He also records the considerable
setting up subversive networks in Hungary,” number of Allied aircrews the teams helped es-
writes Ogden. (23) The same would prove true in cape the enemy, often with partisan and OSS as-
the other countries. The difficulties included po- sistance.
litical opposition from the British Foreign Of-
fice, competition with the Secret Intelligence This book is reasonably well documented, of-
Service, and a lack of any established partisan ten with primary sources, though in some cases
networks. Logistical problems—air support, lengthy operational descriptions are not refer-

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 89


Bookshelf—June 2011

enced to sources—the efforts of the AUTONO- resourced and diplomatically constrained by the
MOUS team are an example. (249–52) need to defer to and to consult with the USSR,”
they succumbed to “the pull of insuperable polit-
Through Hitler’s Back Door concludes “there ical forces.” The brave efforts of the SOE teams
were few military or political laurels to emerge are a tribute to their courage.
from Hungary, Romania, or Bulgaria. Scantily

Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espio-
nage, by Douglas Waller. (New York: Free Press, 2011), 466 pp., endnotes, bibliography, photos,
index.

Donovan of OSS was the first of four biogra- ed the OSS role and formed its own foreign in-
phies of ‘Wild Bill’ Donovan. 18 It claimed to be telligence service—nicknamed “The
the full story, and few in the public knew other- Pond”—under the control of Major John
wise. The second and third made similar asser- ‘Frenchy’ Grombach, a man Donovan had once
tions, adding new details about OSS operations fired. Donovan’s other biographers do not men-
and bureaucratic battles. 19 Was there anything tion the Grombach episode, which was treated
new left to say? The existence of a fourth biogra- in this journal in 2004. 20 Donovan’s battles with
phy suggests an affirmative answer, and author Hoover and the FBI are also described in detail.
Douglas Waller calmly and carefully documents On the operational side, Waller mentions Oper-
this position. The principal difference, however, ation Kangaroo, a collection effort that defied an
is one of focus. Waller is concerned more with agreement with Hoover not to operate in Latin
Donovan the man than with OSS operations. America, a topic covered in this book for the first
The result depicts an ambitious, brave, hard- time.
charging Donovan, who almost by accident cre-
ated America’s first foreign intelligence service. The third aspect of Donovan’s life treated in
It was only after completing two fact-finding this book, and for the first time, dealt with his
trips to Europe for President Roosevelt that the many dalliances with women, something Waller
idea occurred to him. With the encouragement did not try to hide. Their impact on Donovan’s
of the British, Waller writes, Donovan convinced marriage did not do him credit.
the president to establish the Office of the Coor-
dinator of Information (COI), which became the The fourth part of the Donovan story concerns
OSS after the United States entered WW II. his frustrated attempts to create and head a
postwar intelligence service after President
The book concentrates on five aspects of Dono- Truman abolished the controversial OSS. Here,
van’s life. The first concerns his military career, Hoover again enters the picture, and Waller
his success as a Wall Street lawyer, and his po- leaves little doubt that it was Hoover who
litical ambitions prior to serving Roosevelt. The spread the rumor to the press that such a ser-
second deals with the bureaucratic battles he vice would result in a domestic Gestapo, a
fought and the egos he ruffled as he struggled to charge that applied more to Hoover’s own ambi-
establish COI (later, OSS), and then to maintain tions to direct an all-encompassing, postwar in-
its existence in the face of vigorous opposition telligence operation. Donovan’s hopes were
from elements in the War Department and the dashed forever when neither Truman nor his
FBI. Here we learn that the Army never accept- successor appointed him to head the new CIA.

18 Corey Ford, Donovan of OSS (Boston: Little, Brown, 1970).


19 Richard Dunlop interviewed Donovan for his book, Donovan: America’s Master Spy (Chicago: Rand McNally, 1982). The other was
The Last Hero: Wild Bill Donovan (New York: Times Books, 1982), by British journalist Anthony Cave Brown, who claimed “access
to all Donovan’s papers and his wife’s diaries.”
20 See Mark Stout, “The Pond: Running Agents for State, War, and the CIA—The Hazards of Private Spy Operations,” Studies in

Intelligence 48, No. 3 (September 2004).

90 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

The final phase of Donovan’s career that Wild Bill Donovan is absorbing reading. It is
Waller covers is his service as ambassador to documented with primary sources, though the
Thailand. Although in his late 60s, Donovan format used makes it impossible to tell what fact
was still difficult to control. The concluding a particular document supports. In all other re-
chapter ?overs Donovan’s debilitating sickness spects, it is a major contribution to the intelli-
that led to his death in 1959. gence literature.

Memoirs

All Them Cornfields and Ballet in the Evening, by John Miller. (Kingston upon Thames, Sur-
rey, UK: Hodgson Press, 2010), 324 pp., photos, index.

British journalist John Miller selected the title Like most correspondents, Miller got to know
for this memoir from a line in the 1957 film, I’m the MI6 head of station in Moscow at the time,
All Right Jack, wherein a “leftish” shop steward Rory Chisholm, who was handling the British
played by Peter Sellers proclaims his desire to end of the Penkovsky case. Miller met Penk-
visit the Soviet workers’ paradise with “all them ovsky once at a social function and later covered
cornfields and ballet in the evening.” Beginning his show trial. Miller gives two accounts of Pen-
in 1960, Miller spent 40 years as a newspaper kovsky’s execution—a shot in the back of the
correspondent in the Soviet Union and Russia.
head, and being burned alive in a crematorium
His splendidly humorous reminiscences com-
furnace. The latter version has been reported
pare Soviet reality with the shop steward’s fan-
before, and although Miller names a firsthand
tasy.
witness, the evidence is hearsay and the Soviet
denials must be considered.
While any firsthand account of life in the Sovi-
et Union during the Cold War has inherent val-
ue, Miller’s story is worthy of attention in an A variety of other vignettes include the Soviet
intelligence journal because of his encounters reaction to their shooting down of the U-2 flown
with several subjects of intelligence inter- by Francis Gary Powers in 1960, Miller’s en-
est—Donald Maclean, Guy Burgess, and Kim counter with Alexander Solzhenitsyn, and a
Philby. He tracked down an uncooperative Ma- KGB “honey trap” that caught the British am-
clean after acquiring a scarce copy of the Soviet bassador in an affair with the sister of Captain
phone book and going to his flat, though Miller Eugene Ivanov, a key player in the Profumo af-
was denied an interview four times. Burgess, al- fair, which contributed to the resignation of
ways happy to talk to fellow Brits, gave Miller British Prime Minister Harold Macmillan in
several interviews, and we learn some new de- 1963. Miller recalls frequent “chats” with the
tails of Burgess’s unhappy life in the Soviet KGB without ending up in Lubyanka, even
Union. Miller carried a wreath at Burgess’s fu- though he reported the joke about Brezhnev’s
neral in 1963 and again met Maclean, who was last words: “Comrade Andropov, please stop fid-
more civil that time. Philby did not attend, but
dling with the life support machine.”
Miller later met him serendipitously in a Mos-
cow restaurant where Philby was dining with
his wife Eleanor and Maclean’s wife (and Phil- All Them Cornfields broadens one’s under-
by’s mistress), Melinda. With a curse, Philby standing of Soviet society, adds colorful details
told him to “bugger” off, though Miller did ac- to some well-known Cold War espionage cases,
quire of photo of the elusive defector. and is an unqualified pleasure to read.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 91


Bookshelf—June 2011

The C.I. Desk: FBI and CIA Counterintelligence As Seen from My Cubicle, by Christopher
Lynch. (Indianapolis, IN: Dog Ear Publishing, 2009), 433 pp., index.

After graduating from Michigan State Univer- In 1986, Lynch moved to the CIA where the
sity, Christopher Lynch found a job in an FBI pattern of job-hopping continued. He tells about
mailroom as a GS-2 clerk. It was all uphill from his 20 years there, describing the CI cases he
there. After 10 years with the Bureau he joined analyzed in most of the major divisions in the
the CIA. Twenty years later, he retired as a GS- clandestine service. Many of the assignments
14 and wrote his memoir. Like all dutiful intelli- were initially interesting, others quickly frus-
gence officers before him, he submitted the man- trating. His work on the Ames case and his tours
uscript for clearance, twice: once to the CIA and
in the new Counterintelligence Center are ex-
once to the FBI. In an author’s note, Lynch
amples of the former. His assignment to the Of-
writes that the “successes in which I participat-
fice of Security is an example of the latter.
ed often seemed to get excised from the
text.…As a result operations that fizzled out or Either way, after a year, or at the most two, he
otherwise went nowhere get an unwanted em- would declare that his “frustrations in the
phasis.” (vii) He is right about that! The C.I. Branch kept growing” (320–21), or words to that
Desk reads like the story of a serial misfit whose effect, and move on. Lynch spent most of his fi-
cockroach persistence gets him through a 30- nal years at the CIA reviewing files for declassi-
year career. Though he advanced from the FBI fication and doing CI case reviews in an
mailroom to become a counterintelligence (CI) unspecified office where he “drifted from desk to
analyst at the FBI and the CIA, something dis- desk.” (424)
satisfies him in each job, and he is soon looking
for another position. At the FBI he cut his teeth
Despite his career turbulence, Lynch writes
on the Boris Yushin case and learned how to do
CI case reviews, a task he apparently performed that he loved CI work and the challenges it pre-
skillfully. He later worked for two years for Rob- sented. It is difficult to pin down the message he
ert Hanssen, with whom he got on well, he wants to convey in this book or to explain his
writes. His description of Hanssen as a “nice fel- candor in conveying it. But he does seem to be
low” challenges those offered by other contempo- emphasizing the importance of doing one’s work
raries who cast him as an eccentric computer well. A most unusual contribution to the intelli-
nerd with few social skills. gence literature.

Holding Hands with Heroes, by Jack Kassinger. (Pittsburgh, PA: Dorrance Publishing Co. Inc.,
2010), 242 pp., photos, glossary, no index.

It takes unusual qualifications to begin a CIA Headquarters while raising a family—his wife,
career as a GS-4 and retire as a supergrade. In Cherie, was a career officer too. But it is also
Holding Hands with Heroes Jack Kassinger atypical in that unlike the memoirs of clandes-
tells how he did it: no college degree, service in tine service officers such as Phillips and Milton
the Marine Corps, a recommendation from Dave Bearden that tell of espionage cases in which
Phillips (a senior CIA officer stationed in Latin they were involved, 21 Kassinger explains the
America), and an impressive track record as a critical services a support officer provides to es-
clandestine service support officer. In one re- pionage and covert action operations. His vivid
spect, Kassinger’s memoir is a typical account of descriptions of CIA support operations in Soma-
worldwide assignments and service at CIA lia and other African nations make the point. In

21After retiring, David Atlee Phillips, wrote a memoir of his career, The Night Watch: 25 Years of Peculiar Service (New York: Ath-
eneum, 1977); Milton Bearden and James Risen, The Main Enemy: The CIA in Battle with the Soviet Union (New York: Random
House, 2003)

92 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)


Bookshelf—June 2011

the early 2000s, Kassinger was assigned to the The book’s title refers to the many officers with
Central Eurasia Division, and from that van- whom Kassinger served, some of whom will be
tage point he describes the impact of the Ames familiar to those who worked in the CIA after
case, the efforts to rebuild a new, secure embas- the Vietnam War. In Holding Hands with He-
sy in Moscow, support operations in the Balkans roes Kassinger offers himself as an exemplar for
and Albania, and the turmoil that followed the those considering a CIA career.
appointment of John Deutch as Director of Cen-
tral Intelligence.

Intelligence Abroad

The New Nobility: The Restoration of Russia’s Security State and the Enduring Legacy of
the KGB, by Andrei Soldatov and Irina Borogan. (New York: PublicAffairs, 2010), 301 pp., end-
notes, index.

In the foreword to this book, British investiga- thors tell how it worked to “ferret out foreign
tive journalist Nick Fielding warns that the spies,” (36) to bring human rights organizations
Russian intelligence services “have little toler- under control, and to deal with the oligarchs
ance for criticism…since 2000 seventeen jour- (giving them the choice of leaving the country or
nalists have been murdered.” (vii) That same going to a jail in Siberia). A program to plant in-
year Andrei Soldatov and Irina Borogan created formants in “liberal organizations” was also es-
Agentura.ru (in Russian and English), “a jour- tablished. New counterintelligence regulations
nalism-based website for monitoring the Rus- were created that allowed access to private cor-
sian services.” (7) Though they have been
respondence and communications through wire-
careful to base their often critical articles on
tapping. Restrictions on surveillance were
open sources and have been interrogated more
removed and the right to search all premises
than once by the Federal Security Service
(FSB), 22 the principal successor to the KGB, so was granted. (114ff) As incentive, FSB officers
far they have managed to survive. The New No- were given special benefits, including new brick
bility summarizes their work to date, with em- dachas on land confiscated from the oligarchs.
phasis on the sudden breakup of the KGB, the
struggle for power among the surviving ele- There are several chapters on the FSB re-
ments, and the ascendancy of the FSB. It was sponse to terrorism, the one area in which the
Nikolai Patrushev, the successor to Vladimir organization has not been very successful. It
Putin as FSB director in 1999, who called the was while the authors were preparing articles
FSB the “new nobility” with the mission of “sta-
critical of Russian counterterrorism operations
bility and order.” The authors take care to point
that they were summoned to the notorious Le-
out that the FSB should not be “mistaken for a
fortovo prison; they don’t provide any details of
revival of the Soviet KGB,” though some jour-
nalists have made this error. With all its power, the ensuing interrogation. They do assert that
the KGB was subordinate to the Communist FSB assassination teams have been sent abroad
Party; the FSB is free of party and parliamenta- to deal with Chechen terrorists. And while they
ry control, reporting only to the president or note the stories that claim the FSB poisoned Al-
prime minister. (4–5) exander Litvinenko using polonium-210 in Lon-
don, they conclude that “there is no information
After the chaos of the Yeltsin era, the FSB about whether his death was ordered by the
moved rapidly to consolidate its power. The au- Russian leadership” or by mercenaries. (208)

22 Federalnaya Sluzhba Bezopasnosti.

Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011) 93


Bookshelf—June 2011

The final chapters deal with two interesting is- gram for cyberwarfare that uses its own cadre of
sues. The first looks at rumors that the FSB experts and from time to time employs indepen-
would absorb the foreign intelligence missions dent hackers.
of the SVR (foreign intelligence service) and the
GRU (military intelligence service). That hasn’t The New Nobility presents a persuasive, well-
happened yet, and for the time being Russia has documented view of the FSB that only dedicat-
three foreign intelligence services, with the FSB ed, risk-taking Russians could provide.
empowered to deal with the former Soviet re-
publics. The second issue concerns the FSB pro- ❖ ❖ ❖

94 Studies in Intelligence Vol. 55, No. 2 (Extracts, June 2011)

Potrebbero piacerti anche