Unclassified Studies 68 2 June 2024 1
Unclassified Studies 68 2 June 2024 1
ISSN 1527-0874
Owing to a redesign of cia.gov that was introduced in January 2021, URLs for Studies in Intelligence and other
unclassified CSI products can now be found in the following locations:
For the homepage of the Center for the Study of Intelligence, go to:
https://www.cia.gov/resources/csi/
Unclassified and declassified Studies articles from the journal’s inception in 1955 can be found in three locations.
• Articles from 1992 to the present can be found at
https://www.cia.gov/resources/csi/studies-in-intelligence/
• Articles from 1955 through 2004 can be found at
https://www.cia.gov/resources/csi/studies-in-intelligence/archives/
• More than 200 articles released as a result of a FOIA request in 2014 can be found at “Declassified Articles
from Studies in Intelligence: The IC’s Journal for the Intelligence Professional” | CIA FOIA (foia.cia.gov)
https://www.cia.gov/readingroom/collection/declassified-articles-studies-intelligence-ic%E2%80%99s-jour-
nal-intelligence-professional
Cover image: FBI Director Christopher Wray testifies before the House Judiciary Committee on
Section 702 renewal and other issues, July 12, 2023. (Photo: FBI)
Mission The mission of Studies in Intelligence is to stimulate within the Intelligence Community
the constructive discussion of important issues of the day, to expand knowledge of lessons
learned from past experiences, to increase understanding of the history of the profession, and
to provide readers with considered reviews of public media concerning intelligence.
The journal is administered by the Center for the Study of Intelligence, which also includes
the CIA’s History Staff, Lessons Learned Program, and the CIA Museum.
Contact The Studies in Intelligence staff welcomes proposals for articles, book reviews, or commen-
taries and other communications from outside of the Intelligence Community. Proposals may
be sent to the Studies staff through “Contact CIA” on cia.gov or mailed to:
Editor
Studies in Intelligence
Center for the Study of Intelligence
Central Intelligence Agency
Washington, DC 20505
Awards Unless otherwise announced from year to year, articles on any subject within the range of
Studies’ purview, as defined in its masthead, will be considered for monetary awards. They
will be judged primarily on substantive originality and soundness, secondarily on literary
qualities. Members of the Studies Editorial Board are excluded from the competition.
The Sherman Kent Award of $3,500 is offered annually for the most significant contribution
to the literature of intelligence submitted for publication in Studies. The prize may be divided
if two or more articles are judged to be of equal merit, or it may be withheld if no article is
deemed sufficiently outstanding.
Another monetary award is given in the name of Walter L. Pforzheimer to the graduate or
undergraduate student who has written the best article on an intelligence-related subject.
i
ii
Studies in Intelligence
Vol. 68, No. 2 (June 2024)
CENTER for the STUDY of INTELLIGENCE
Washington, DC 20505
Contents
EDITORIAL POLICY
Historical Perspectives
Articles for Studies in Intelligence may
be written on any historical, opera- Evolution of Surveillance Policy
tional, doctrinal, or theoretical aspect of US Intelligence, Domestic Surveillance, and the
intelligence. Time of Troubles 1
David Robarge
The final responsibility for accepting
or rejecting an article rests with the Analytic Tug-of-War
Editorial Board. Cambodia’s Role in Shipping Arms to Communist
Forces in South Vietnam, 1966–70: Competing CIA
The criterion for publication is whether,
and US Military Estimates 11
in the opinion of the board, the article
Richard A. Mobley
makes a contribution to the literature of
intelligence. Board members are all ac- From the Archive
tive or former Intelligence Community
Unpopular Pessimism: Why CIA Analysts Were So
officers.
Doubtful About Vietnam 29
EDITORIAL BOARD Hal Ford
iii
Sparks: China’s Underground Historians and Their Battle for the Future 63
Reviewed by Emily Matson
v v v
iv Studies in Intelligence
C ontributors
Article Contributors
Hal Ford joined CIA in 1950 and served in a variety of positions focused on East Asia,
Vietnam, and China. He left CIA in the early 1970s to enter academe and work on
Capitol Hill. Ford returned to CIA in 1980 to lead the newly established National Intelli-
gence Council. He retired in 1986, but continued to serve as a contract historian on CIA’s
History Staff. He died in November 2010.
Richard A. Mobley was a career naval intelligence officer before entering and then com-
pleting a second career as a military analyst in CIA’s Directorate of Analysis. With publi-
cation of this article, Mobley will have contributed six articles to Studies in Intelligence.
Joe Keogh and Richard Roy were career staff officers in CIA’s Directorate of Science and
Technology who helped develop and teach the PMC during the early 1990s. Both are now
retired.
David Robarge is CIA’s chief historian.
Chris Rasmussen is a Department of Defense officer and creator of the public-facing
OSINT product platform, www.tearline.mil.
Reviewers
Michael Ard is a former CIA officer. He is now a professor at Johns Hopkins University,
where he directs the graduate program in intelligence analysis.
John Ehrman is a retired CIA analyst.
Yong Suk Lee is a former senior CIA analyst and manager.
Charles Long is the pen name of a retired CIA operations officer.
Emily Matson is a new contributor. She is assistant teaching professor of Modern Chinese
History at Georgetown University’s Edmund A. Walsh School of Foreign Service and
Georgetown College of Arts & Science, Department of History.
Hayden Peake served in CIA’s Directorates of Operations and Science and Technology.
He has contributed to the Intelligence Officer’s Bookshelf since 2002.
J.R. Seeger is a retired CIA paramilitary officer and a frequent media reviewer for Studies.
James Van Hook is a new contributor. He is an analyst in CIA’s Transnational and Tech-
nology Mission Center.
David Welker is a member of CIA History Staff.
v v v
After a prolonged debate, in April “old guard” on Capitol Hill that had
2024 Congress approved a two- run the oversight committees since
year extension of Section 702 of the the late 1940s had largely dwin-
Foreign Intelligence and Surveillance dled through retirements, electoral
Act (FISA).a Concerns about the risk defeats, and deaths. Replacing it
The IC’s protective to privacy of US citizens versus the was a younger, more liberal cadre
“old guard” on Capitol Intelligence Community’s role in of members much more inclined to
defending against terrorism, cyber, criticize what the IC was doing. CIA,
Hill that had run the and foreign malign influence and NSA, FBI, and Army activities that
oversight committees other threats with domestic compo- involved technical and physical
since the late 1940s nents recalled revelations during the surveillance and collection against
1970s of domestic spying. Fifty years Americans and appeared to violate
had largely dwindled ago the political fallout led to lasting departmental charters or consti -
through retirements, changes in IC practices and executive tutional limitations caused the
electoral defeats, and and congressional oversight. greatest alarm when they were
disclosed through media exposés and
deaths. Replacing it The 1970s was a difficult decade official investigations in 1974–76.
was a younger, more for the IC, as it suddenly found itself
under political attack from many
liberal cadre of mem- quarters for conducting activities that, Opening the Mail
bers much more in- although presidentially sanctioned,
For varying lengths of time
clined to criticize what were no longer considered appropri-
between 1952 and 1973 in four US
ate for intelligence agencies or about
the IC was doing. which Congress and the US public
cities, CIA conducted four programs
to cover (i.e., to record the sender and
had been unwitting. The IC was
recipient) and open mail sent between
caught up in the nation’s growing dis-
the United States and the Soviet
trust of government caused by official
Union, China, and Cuba.1b The pur-
evasion and prevarication about the
pose of the programs was to acquire
Vietnam War and the Watergate scan-
information about Soviet and Chinese
dal. In addition, the IC’s protective
intelligence activities in the United
a. According to the Director of National Intelligence Section 702 Overview, “Section 702
is a key provision of the FISA Amendments Act of 2008 that permits the [US] government
to conduct targeted surveillance of foreign persons located outside the United States, with
the compelled assistance of electronic communication service providers, to acquire foreign
intelligence information. The government uses the information collected under Section 702
to protect the United States and its allies from hostile foreign adversaries, including terror-
ists, proliferators, and spies, and to inform cyber-security efforts.” (Source: https://www.
dni.gov/files/icotr/Section702-Basics-Infographic.pdf)
b. The postmasters general and chief postal inspectors concurred with the mail covering,
but only one inspector—a former CIA officer—clearly knew about the mail opening.
The views, opinions, and findings of the author expressed in this article should not be construed as asserting or implying US
government endorsement of its factual statements and interpretations or representing the official positions of any component of
the United States government.
States, conditions inside denied secret writing and censorship tech- governments—the Soviet Union and
areas, and tradecraft and potential niques and some counterintelligence the PRC, but possibly also North
counterintelligence leads. The pro- leads but did not provide enough Korea, North Vietnam, Algeria, and
grams took place in New York City intelligence to warrant the effort it others—and what the secret funding
(1952–73), Hawaii (1954–55), New required and the “flap potential” it and other support was being used
Orleans (1957), and San Francisco possessed. Angleton claimed the for. DCI Richard Helms remembers
(1969–71). The Soviet Union was operation had been valuable, but Johnson saying, “Can’t [the CIA] find
the target of the New York project, internal reviews in the 1960s reached out what’s going on here? Look at
known as SRPOINTER by the Office the opposite conclusion. DCI James these people in the streets; we can’t
of Security and HTLINGUAL by Schlesinger terminated HTLINGUAL imagine that good Americans do
the Counterintelligence (CI) Staff. in 1973, agreeing with operations things like this.”
Because the CI Staff directed the chief William Colby’s judgment that
operation longer, the latter cryptonym the “substantial political risk [was] Helms initially believed that CIA
is better known. not justified by the operation’s con- could support Johnson’s request and
tribution to foreign intelligence and stay inside the terms of its charter as
Soviet Russia Division in the counterintelligence collection.” long as it concentrated on the foreign
Directorate of Plans (the Directorate countries or networks and deferred
of Operation’s predecessor) and the to the FBI on the domestic side.
Office of Security ran the program at CIA’s “Domestic Espionage” Because MHCHAOS was so fraught
first, and the CI Staff took it over in with potential controversy, however,
On August 15, 1967, under
1955. At that time, James Angleton, Helms placed it inside the secretive
presidential direction, CIA began
head of the CI Staff, proposed that CI Staff and had the program chief
investigating possible links between
CIA review all mail to and from the report directly to him.
US antiwar protesters and hostile
Soviet Union that went through New
foreign governments.2 Codenamed CIA gave its first response to
York and open about 2 percent of the
MHCHAOS, the program expanded President Johnson in November
letters (approximately 400) monthly.
to include overseas collection on 1967. The operation had uncovered
Richard Helms, then the CIA’s sec-
the foreign contacts of other radical no significant foreign support for the
ond-ranking operations manager and
groups and a few operations inside protests. Several months later, the
later Director of Central Intelligence
the United States targeting American agency concluded that the radicalism
(DCI), approved this phase of the
citizens. The program was publi- of many of US and other nations’
program, which began in early 1956.
cized in 1974 and became one of the youth stemmed from genuine domes-
The FBI became aware of focuses of congressional and media tic social and political factors and was
HTLINGUAL in 1958 and began scrutiny of CIA that further eroded not the result of manipulation from
receiving information and levy- public trust in the CIA during its abroad. These findings, however,
ing requirements soon after. CIA’s “time of troubles” in the 1970s. only made the White House keener to
Technical Services Division opened uncover foreign connections, which
Seeing the growing intensity of
a facility in New York in 1961 to supposedly were so sophisticated that
domestic opposition to the war in
work exclusively on mail opening. CIA would have to use more creative
Vietnam, especially from American
According to CIA records that were methods to find them.
youth in urban areas and on college
disclosed to Congress in the mid-
campuses, President Lyndon Johnson At the behest of both the Johnson
1970s, more than 2,700,000 letters
became convinced that such dissent and Nixon White Houses, CIA pur-
were covered and more than 215,000
was not possible without foreign sued MHCHAOS more vigorously,
were opened during HTLINGUAL’s
(and likely Communist) backing. In including engaging in domestic
21 years of operation.
August 1967, Johnson tasked the espionage. In those instances—only a
The consensus of senior CIA offi- CIA, NSA, and FBI with tracking tiny part of the overall program—CIA
cers was that HTLINGUAL produced down the links he presumed to exist officers recruited three US citizens as
some useful information about Soviet between the protesters and foreign agents to penetrate dissident groups,
Seymour Hirsch’s revelations marked a turning point in the IC’s relationship with the media and congressional oversight. (Source: New
York Times)
collected intelligence on antiwar and Family Jewels changes occurred in the oversight
other left-wing groups, and amassed process.
One of the most consequential
files on US citizens engaged in purely
journalistic exposés in CIA’s history After hearing that CIA officers
domestic activity (most of the content
appeared on December 22, 1974, had earlier contact with the White
came from the FBI and open sources,
when the New York Times disclosed House “Plumbers” unit that con-
not CIA clandestine collection). CIA
details about a secret compilation ducted the Watergate break-in, DCI
served as the clearing house for the
of alleged CIA charter violations James Schlesinger on May 9, 1973,
information that it, FBI, and NSA
known as the Family Jewels.3 The ordered CIA employees to report any
collected. This comprised eventually
leak prompted White House and activities that seemed to violate CIA’s
300,000 names in its computer index
congressional inquiries into some charter.4 The Office of Security staffer
and approximately 7,200 files on US
of the agency’s more controversial es- in charge of the project flippantly
citizens and 6,000 on political groups.
pionage, covert action, and technical dubbed the hundreds of pages of
Despite the huge amount of material
operations. As a result, CIA’s political collected material the Family Jewels.
obtained, the idea that the antiwar
standing declined precipitously, its Schlesinger’s successor, William
movement was a massive influence
operational activities were curtailed Colby, felt obliged to tell CIA’s
operation run out of the Soviet Union
significantly, and major, lasting congressional oversight committees
or China was not demonstrated.
about the compilation, and Times
investigative reporter Seymour Hersh into retirement, the White House NSA and SHAMROCK
began to work on the story soon af- quickly initiated an inquiry led by
During this same time frame,
ter.a (The source of his information is Vice President Nelson Rockefeller,
NSA was investigated for its sur-
still unknown.) When Colby learned and the Senate and the House of
veillance of US citizens through two
in early December 1974 that Hersh Representatives set up investigative
programs.6 SHAMROCK, started
was looking into some potentially committees led by Frank Church
in 1945 by NSA’s predecessor and
controversial operations the Agency and Otis Pike, respectively. By
active until 1975, involved collecting
had conducted in the United States— the time the public furor subsided
microfilm copies of telegraphic mes-
particularly MHCHAOS—he met around 1977, the agency’s budget
sages from the major US communica-
with the journalist to try to set the had been cut, some of its operations
tions companies coming into, tran-
record straight. were restricted, and two permanent
siting, or being sent from the United
congressional committees oversaw its
Instead, Hersh went far beyond States and reviewing them for ac-
activities.
what the DCI had told him and tionable intelligence or law enforce-
described a “massive, illegal” oper- ment information, which was then
ation against US dissidents run by passed to CIA, the FBI, the Secret
Angleton’s CI Staff. In response to Service, the Justice Department,
Hersh’s story, Colby forced Angleton or the Defense Department. At
a. Hersh was one of a new cohort of investigative journalists working the national security beat that included Bob Woodward, Carl Bern-
stein, Daniel Schorr, and Jack Anderson later in his career. They moved beyond the gossipy reportage of Drew Pearson and made sensation-
al scoops—often driven by leaks—about real and perceived government malfeasance and ineptitude.
a. The FBI also ran a subsidiary operation to COINTELPRO called COMINFIL, which involved investigating legitimate non-Communist
organizations that it suspected had been infiltrated by Communists to determine the extent to which they were influenced.
went toward examining CIA activi- rights of speech and association, the committee’s recommendations
ties in the Family Jewels, but it also on the theory that preventing the was one for a standing committee
addressed other sensational charges, growth of dangerous groups and in the House that would have juris-
such as assassination plots against the propagation of dangerous diction over all intelligence-related
foreign leaders and drug testing on ideas would protect the national legislation and oversight functions.
unwitting Americans, as well as some security and deter violence.
covert actions and the IC budget.
NSA and the FBI got their share of Pike Committee Congressional Oversight
the investigatory spotlight for their The Pike Committee, established
on February 19, 1975, is the common The committees significantly
domestic surveillance activities. added to the new political envi-
name for the House Permanent Select
Committee on Intelligence during ronment in which US intelligence
In its multi-volume final report
the period when it was chaired by agencies were moved out of the
issued in April 1976, the Church
Otis Pike (D-NY).11 The commit- shadows and expected to adhere to
Committee concluded that rather than
tee’s inquiry was the first significant high standards of accountability.
being out of control, CIA operated
House investigation of the IC since The emergence of the Senate Select
under presidential authorization—
CIA’s creation in 1947. Pike and Committee on Intelligence (SSCI)
sometimes vague, sometimes ex-
his colleagues had a mandate, set to and the House Permanent Select
plicit—but that congressional review
expire on January 31, 1976, to inves- Committee on Intelligence (HPSCI)
of the IC had been lax. Among its
tigate similar subjects as the Church amidst a growing climate of suspi-
more significant recommendations
Committee, but unlike their Senate cion about US intelligence agencies
were the establishment of a standing
counterparts, they generally avoided marked a significant shift in public
Senate oversight committee, perma-
sensational operational topics and and congressional attitudes toward
nent intelligence agency charters, and
focused on more strategic matters like them and helped bring about a more
controls on potential violations of
the IC’s analytical, operational, and regularized and professional over-
individual rights.
budgetary effectiveness. sight of intelligence.
The committee investigated
SSCI
COINTELPRO at length, including in Despite that more measured ap-
Believing Congress had not ad-
a separate set of hearings over seven proach, the Pike Committee had con-
equately monitored US intelligence
days. It concluded: tentious relations with CIA and the
services, the Church Committee in its
White House over the committee’s
Many of the techniques used final report in April 1976 proposed
demand for voluminous documents,
would be intolerable in a dem- that a new body, the Senate Select
insistence on its own declassifica-
ocratic society even if all of the Committee on Intelligence (SSCI),
tion authority, and propensity for
targets had been involved in be created to provide the necessary
leaking. Its final report was never
violent activity, but COINTEL- degree of scrutiny.13 The Senate
officially published due to opposition
PRO went far beyond that. The moved quickly on that recommenda-
from House members troubled by
unexpressed major premise of the tion, taking up Senate Resolution 400
the potential effect on CIA activities.
program was that a law enforce- less than a month later. SR 400 stated
However, unauthorized versions of
ment agency has the duty to do that the IC members would keep the
the final draft were leaked to the
whatever is necessary to combat new committee “fully and currently
press, appearing first in The Village
perceived threats to the existing informed” of their activities, includ-
Voice. A full copy of the draft was
social and political order…. ing major anticipated ones.
later published in England.12 Like
[T]he Bureau conducted a Church, Pike backtracked from his On May 19, 1976, the Senate
sophisticated vigilante operation initial contention that CIA was out of voted 72–22 in favor of the reso-
aimed squarely at preventing control and concluded that it operated lution.a The word “select” in the
the exercise of First Amendment under presidential authority. Among
a. The Senate’s changing attitude toward oversight, reflective of the changing times, is demonstrated in its votes on various legislation.
In 1956, it voted down a proposal for a joint oversight committee, 59-27, and did so again 10 years later, 61-28. Then in 1975, the Senate
name meant that SSCI’s members sessions in the absence of the HPSCI The result of congressional
would be appointed by the Senate chairman. deliberations on this issue was the
majority leader and minority leader, Foreign Intelligence Surveillance Act
who would choose eight and seven, Greater Accountability (FISA)—the first piece of legislation
respectively. In addition to being During the next few years, to emerge directly from the 1975–76
briefed on IC activities, SSCI also Congress rode the momentum to investigations.16 The law passed
would review the IC’s budget and launch several investigations into easily in both houses, and President
hold hearings on nominees for direc- various intelligence matters. The Carter signed it into law on October
tor and deputy director (and, later, Senate looked into IC estimates of 25, 1978. FISA established a special
the inspector general and general Soviet strategic weapons, the IC tribunal, the Foreign Intelligence
counsel). budget, and CIA covert action. The Surveillance Court (FISC)—located
House set up probes into CIA’s use at the Department of Justice and
HPSCI of journalists as assets, its connection operating in secret—to hear detailed
At the urging of newly elected to the Kennedy assassination, and its applications and justifications for
Speaker Thomas “Tip” O’Neill (D- crisis warning process, and it closely electronic surveillance warrants. The
MA), on July 14, 1977, the House examined CIA’s budget and covert new law set forth standards upon
passed a resolution creating HPSCI.14 activities. Congress also considered which such applications would be
The lengthy delay in creating an new charter legislation for the agency, granted.
oversight body on the House side and in 1980 it passed the Intelligence
is attributable in large part to the Oversight Act requiring that it be The law did not mention CIA per
partisan rancor and confrontational “fully and currently informed” about se and did not directly affect its activ-
approach of the Pike Committee. covert action programs.15 ities. However, if the agency wanted
The less-than-overwhelming vote to electronic surveillance to be carried
establish HPSCI, 227 to 171, re- out in the United States for foreign
flected lingering sentiments from that FISA intelligence purposes—which it typ-
episode. Although a broad statutory charter ically requested the FBI conduct—
for what the IC could and could such requests would have to meet the
Despite a purported reluctance in criteria of the FISA. Notwithstanding
not engage in proved too difficult
the House to repeat the disagreeable this potentially negative effect on op-
for Congress to enact, the adminis-
experience of the Pike Committee, erations, CIA supported the new law.
tration of President Jimmy Carter,
HPSCI was set up along distinctly
both chambers, and the IC were
partisan lines. Unlike the resolution
able to agree generally on the need
that created SSCI, which mandated Executive Orders
for more congressional oversight of
that no more than eight of the 15
intelligence, especially in the area As a result of the Rockefeller
members come from the majority
of domestic operations. Warrantless Commission and Church-Pike
party, the HPSCI resolution stipulated
electronic surveillance undertaken Committees inquiries, President
that membership of the committee
within the United States for foreign Gerald Ford issued the first execu-
would reflect the party strength in
intelligence purposes drew espe- tive order governing US intelligence
the House as a whole. Since 2003,
cially close attention on Capitol Hill. activities, E.O. 11905, on February
the committee has had 11 members
Members wanted to preserve Fourth 18, 1976. This order was intended
(excluding the chairman) from the
Amendment protections against not only to create clear guidelines
majority party and nine from the
unreasonable searches of US citizens for the intelligence agencies but also
minority party. Similarly, while the
by instituting a review mechanism to protect the IC from more drastic
SSCI vice chairman was drawn from
to ensure that only validated foreign curtailments Congress appeared set
the minority party, the next ranking
intelligence targets were subject to to impose. In an effort to address the
member of the majority party chairs
non-consensual eavesdropping. real and alleged excesses revealed
approved setting up the Church Committee with minuscule opposition and the next year established the SSCI in an overwhelming vote.
Four years later, the Senate passed the Intelligence Oversight Act by an 89-1 vote.
v v v
Endnotes
1. Report to the President by the Commission on CIA Activities Within the United States (GPO, June 1975; hereafter Rockefeller Commis-
sion Report), chap. 9; US Senate, Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence
Activities, Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans (GPO, 23 April 1976;
hereafter Church Committee Report), 559636; “Mail Intercept Program,” January 21, 1975, CADRE doc. no. C01420864.
2. Rockefeller Commission Report, chap. 11; Church Committee Report, 688–721; Frank J. Rafalko, MH/CHAOS: The CIA’s Campaign
Against the Radical New Left and the Black Panthers (Naval Institute Press, 2011); Robert M. Hathaway and Russell Jack Smith, Rich-
ard Helms as Director of Central Intelligence, 1966-1973 (CIA History Staff, 1993), 14–21.
3. Harold P. Ford, William E. Colby as Director of Central Intelligence, 1973-1976 (CIA History Staff, 1993), chap. 7; William Colby
and Peter Forbath, Honorable Men: My Life in the CIA (Simon and Schuster, 1978), chaps. 11 and 13; Cynthia M. Noland, “Seymour
Hersh’s Impact on the CIA,” International Journal of Intelligence and Counterintelligence, 12:1 (1999), 18–34.
4. “Memorandum to All CIA Employees,” May 9, 1973, copy in CIA History Staff files.
5. CADRE doc. no. C01283341.
6. Thomas R. Johnson, American Cryptology During the Cold War, 1945–1989 (NSA Center for Cryptologic History, 1995; declassified
2013), 362–65; Church Committee Report, 735–76.
7. Ibid., 1–80; Hearings Before the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities of
the United States, Volume 6, Federal Bureau of Investigation, 18, 19 November, 2, 3, 9, 10, 11 December 1975 (GPO, 1976).
8. Joan M. Jensen, Army Surveillance in America, 1775–1980 (Yale University Press, 1991), 240-47; Karl E. Campbell, “Senator Sam
Ervin and the Army Spy Scandal of 1970–1971: Balancing National Security and Civil Liberties in a Free Society,” https://web.archive.
org/web/20050829231657/http://www.cmhpf.org/senator-sam-ervin.htm; US Senate, Military Surveillance of Civilian Politics: A Re-
port of the Subcommittee on Constitutional Rights, Committee on the Judiciary (GPO, 1973).
9. Rockefeller Commission Report, 10.
10. L. Britt Snider, The Agency and the Hill: CIA’s Relationship with Congress, 1946–2004 (CIA History Staff, 2008), 35–37, 177–78,
233–35, 275–77; Frank J. Smist Jr., Congress Oversees the United States Intelligence Community, Second Edition, 1947–1994 (Uni-
versity of Tennessee Press, 1994), chap. 2; Gerald K. Haines, “The CIA and Congress: Years of Change, 1966–1980,” unpublished
manuscript (CIA History Staff, 1993), chap. 2; Ford, chap. 10; Loch K. Johnson, A Season of Inquiry: Congress and Intelligence (Dors-
ey Press, 1988); James Risen with Thomas Risen, The Last Honest Man: The CIA, the FBI, and Mafia, and the Kennedys—and One
Senator’s Fight to Save Democracy (Little, Brown, 2023), chaps. 12–27; Kathryn S. Olmsted, Challenging the Secret Government: The
Post-Watergate Investigations of the CIA and the FBI (University of North Carolina Press, 1996), chaps. 5, 7, 8..
11. Gerald K. Haines, “The Pike Committee Investigations and the CIA,” Studies in Intelligence 41, No. 3 (Summer 1997), 81–92; Snider,
37–39, 178–79, 199–201, 236, 278–79; Ford, chap. 11; Smist, chap. 4; Olmsted, chaps. 6–8.
12. CIA: The Pike Report (Spokesman Books, 1977).
13. Snider, 51–52; Smist, 82–84; Haines, 154–61.
14. Snider, 53–54; Smist, 214–16; Haines, 218–27.
15. Snider, 56–60, 179–82, 201-04, 236–39, 279–82; Smist, 115–31, 242–50; Haines, chaps. 4 and 5.
16. Snider, 143–44; Smist, 234–35.
17. http://irpfas.org/offdocs/eo/eo-12036.htm.
18. The Literary Spy: The Ultimate Source for Quotations on Espionage and Intelligence, Charles E. Lathrop, comp. (Yale University
Press, 2004), 57.
19. CADRE doc. no. C01283341.
v v v
A special task force set up to exploit these documents has completed its val-
idation and analysis of the new evidence, and this memorandum is the first
product resulting from that effort. This memorandum presents revisions of the
estimates made in IM 70-126 of the volume of military supplies delivered via
Sihanoukville from December 1966 to April 1969 as well as new data on some
overland deliveries via Laos.1
v v v
The views, opinions, and findings of the author expressed in this article should not be construed as asserting or implying US
government endorsement of its factual statements and interpretations or representing the official positions of any component of
the United States government.
Analytic Tug-of-War
IC made a major misjudgment with in February 1971, CIA revised its that most of the cargo was arms and
respect to the Vietnam War.”2 This estimate to state more than 21,000 ammunition intended for transship-
essay uses declassified CIA and tons of munitions actually had been ment to enemy forces in much of
military records to account for the delivered along the Sihanoukville South Vietnam. CIA argued that the
failure while attempting to assess Route. (See bar graph below.)6 tonnage of munitions being delivered
why MACV’s estimates were closer could not be reliably estimated from
to the mark. As we will see in this article, the available sources, but it was likely
the divergences in CIA and MACV to be much less than the amounts
assessments reflected differences in MACV estimated.
The Beginning of the Un- how both organizations used evi-
raveling of CIA’s Position dence to answer key intelligence
questions about the Sihanoukville The Problem of Sourc-
As the introduction to ER IM Route. The questions pertained
70-188 tacitly noted, CIA’s failure es and Analytic Rigor
to the amount, composition, and
became apparent after improvements ultimate destination for unidenti- The multi-year debate between
in human intelligence (HUMINT) fied cargo delivered during at least CIA (and other elements of the IC)
reporting begun by 1968 on the so- nine port visits of Chinese-flagged and MACV shows that understand-
called Sihanoukville Route led to the ships to Sihanoukville following a ing the Sihanoukville issue was not
acquisition of more than 12,000 pages military agreement signed between straightforward, given major intel-
of manifests and shipping documents Cambodia and China in October ligence gaps and troves of human
of Chinese merchant ships offloading 1966. Subsidiary questions included intelligence reports of questionable
arms in Sihanoukville. This material the role of the alternative delivery provenance. The suspect nature of the
provided extraordinarily detailed and route overland down the Ho Chi available evidence helps explain why
reliable evidence about the magnitude Minh Trail, the amount of non-mil- a top-notch team of seasoned logis-
of the Sino-Cambodian transshipment itary cargo included in the Chinese tics analysts at CIA fared so poorly in
effort.3 deliveries, and the split in deliveries assessing a critical line of communi-
between the Cambodian military and cation while counterparts in MACV
The evidence provided a new,
the NVA/VC. MACV would argue
reliable baseline for assessing the
validity of MACV and CIA estimates
on the flow of munitions into South
Vietnam. The shipping manifests
and other documents supported
the conclusion that CIA analysts
had repeatedly underestimated the
extent of PRC arms deliveries to
Sihanoukville, its relative importance,
and the quantity of weapons and am-
munition transshipped from there to
enemy forces in South Vietnam.
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
a. The general’s comment suggest that BA 610 was located 350 kilometers north of the Cambodian border.
b. At this point, Prince Sihanouk had been ousted and shipping of Chinese weaponry to Cambodia had ended.
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Analytic Tug-of-War
Hanoi would be unwilling to rely on mechanism” that DCI William according to a CIA history of the
the Sihanoukville Route because it Colby attempted to create after the Directorate of Intelligence.100
would be vulnerable to closure by the intelligence surprise of the October
neutralist Prince Sihanouk. In fact, 1973 Arab-Israeli War. Although The CIA’s experiments with
there was little cost in relying heavily the declassified record simply does alternative analysis continued during
on the route, which offered an easier not reveal what reforms—if any— the Nixon administration, despite
way of shipping munitions to south- were implemented following the the stormy relationship between the
ern South Vietnam than did use of the Sihanoukville failure, contemporary Nixon and CIA. By 1970, CIA had
overland route through Laos. When records reveal that CIA was consider- drafted alternative analysis on Soviet
Sihanouk was ousted in March 1970 ing such techniques as early as during strategic weapons programs for the
and Cambodia’s arrangement with the Lyndon B. Johnson adminis- White House, according to Marchio.
China ended, North Vietnam read- tration, when in 1966 it produced a The effort demonstrated a tentative
ily returned to the overland route to report on the Vietnamese communist interest in alternative analysis, which
transport ordnance to South Vietnam, will to persist that employed a red ultimately became institutionalized
according to Ahern’s account, which team approach, according to James in so-called “Structured Analytical
he focused on “a failure to modify Marchio’s recent study on devil’s Techniques” as discussed by Heuer
conventional wisdom.”98 advocacy in IC analysis.99 Analysts and others and addressed in a
had used “solid alternative analysis monograph, A Tradecraft Primer:
Such shortfalls called for CIA techniques (red team, devil’s advo- Structured Analytic Techniques for
to deploy more rigorous alternative cate, and competing hypotheses),” Improving Intelligence Analysis, pub-
analytic techniques, such as the lished by CIA’s Center for the Study
implementation of the “challenge of Intelligence in March 2009.101
v v v
The author: Richard A. Mobley was a career naval intelligence officer before entering and then completing a second
career as a military analyst in CIA’s Directorate of Analysis. With publication of this article, Mobley will have contrib-
uted six articles to Studies in Intelligence since his first one, “UK Indications and Warning: Gauging the Iraqi Threat to
Kuwait in the 1960s,” appeared in volume 45, no. 3 in 2001. At the time he was still on active duty with the Navy. All
of his work has drawn heavily on officially declassified material.
Endnotes
All released documents can be found in CIA.GOV’s Freedom of Information Act Reading Room ((https://www.cia.gov/readingroom/
search/site/) by inserting the complete released document number in the search field at the top of the search page. For example the
intelligence memorandum cited in endnote 1 below would be searched by inserting “CIA-RDP78T02095R000200050001-1” into the
search field. (N.b. Do not include the bracketed numbers found below in front of document numbers. Those are intended for ease of ref-
erence in the following bibliography.) In most cases, each released item contains more than one document, along with transmittal slips
and memos. The documents contained in the released packages are listed, along with release information, in the bibliography following
these notes. The URLs for all documents available in CIA.GOV are shown in the bibliography.
1. CIA, Directorate of Intelligence, Intelligence Memorandum, ER IM 70-188, December 1970, “Communist Deliveries to Cambodia for
the VC/NVA Forces in South Vietnam, December 1966-April 1969,” 1–15; contained in [2] CIA-RDP78T02095R000200050001-1
COMMUNIST MILITARY DELIVERIES TO CAMBODIA (hereafter ER IM 70-188, December 1970).
2. Gen. Bruce Palmer, “US Intelligence and Vietnam,” Studies in Intelligence (Special Edition), 1984, 78. Four years after Palmer retired
from the Army, he was invited to become a member of the CIA’s Senior Review Panel. In that position he suggested the study.
3. ER IM 70-188, December 1970, and CIA Memorandum, Subject: “Communist Supply Deliveries to Cambodia for the Viet
Cong/North Vietnamese Forces in South Vietnam, December 1966-April 1969,” February 5, 1971, 17–37. Both are in [2] CIA-
RDP78T02095R000200050001-1.
4. Ibid.
5. CIA Blind memo [a briefing script], “The North Vietnamese Logistical System—Capabilities and Vulnerabilities,” August 5, 1970,
2–16, in [6] CIA-RDP78T02095R000600290001-1.
6. CIA DI ER IM 70-188, December 1970.
Analytic Tug-of-War
7. George Carver Memorandum for the Director, Subject: [Notes on] “Sihanoukville Post Mortem,” November 10, 1970, in [13] CIA-RD-
P80R01720R000600090052-6, 33.
8. Thomas L. Ahern, Jr. Good Questions, Wrong Answers: CIA’s Estimates of Arms Traffic Through Sihanoukville, Cambodia, During the
Vietnam War (CIA, Center for Study of Intelligence, 2004), xi.
9. Ibid.
10. Ahern, Nothing If Not Eventful, 103.
11. CIA Memorandum for the Director, “Cambodian Involvement in the Supply of Arms and Ammunition to Communist Forces in South
Vietnam” (“Graham Report”), December 13, 1968, in [8] CIA-RDP79R00904A001400020001-6.
12. DCI memorandum to SECDEF Laird forwarding blind memorandum, “Logistics Flows to the Enemy in South Vietnam,” January 28,
1970, in [5] CIA-RDP78T02095R000600200001-1).
13. CIA, Enclosure to memorandum to Director from Carver, “Notes on Background Matters Pertinent to Current ARVN and U.S. Opera-
tions in Cambodia,” June 15, 1970, in [12] (CIA-RDP80R01720R000200030002-1.
14. MACV J-2, “VC/NVA Use of Cambodia for Logistics Support,” November 22, 1968, 7 (archives in US Army Heritage and Education
Center).
15. MACV Combined Intelligence Center, “VC/NVA Use of Cambodia as a Source for Arms and Ammunition,” May 15, 1968, 8 (ar-
chives in U.S. Army Heritage and Education Center).
16. MACV J-2, “VC/NVA Use of Cambodia for Logistics Support,” November 22, 1968, 7.
17. Ted Gettinger, Oral history interview with Phillip Davidson, 30 June 1982, II–25 (1071628002), Vietnam Virtual Archive (https://
www.vietnam.ttu.edu/virtualarchive/).
18. Paul Stillwell, Reminiscences of Admiral Elmo R. Zumwalt, Jr., U.S. Navy (Retired),” (US Naval Institute, 2003), 502–503.
19. Elmo R. Zumwalt, On Watch (New York Times Books, 1976), 38.
20. Paul Stillwell, Draft of interview with VAdm. Earl F. Rectanus, 19 November 1982, 44–45 , accessed in Texas Tech University Viet-
nam Virtual Archive on 9 May 2024 (https://www.vietnam.ttu.edu/virtualarchive/items.php?item=6260111001).
21. General Creighton Abrams, “Personal for” message to General Wheeler, “Enemy Reliance on Cambodia,” December 15, 1968
(CK2349127747), U.S. Declassified Documents Online.
22. Ibid.
23. CIA, Memorandum for the Director, “Cambodian Involvement in the Supply of Arms and Ammunition to Communist Forces in South
Vietnam” (the “Graham Report”), December 31, 1968, in [8] CIA-RDP79R00904A001400020001-6.
24. Ibid.
25. Ibid.
26. CIA, “OER Comments on Current MAC-V Views of VC/NVA/Logistics,” November 11, 1968, in [4] CIA-
RDP78T02095R000300180001-7.
27. CIA Directorate of Intelligence, Intelligence Memorandum, “The Impact of Change in US Bombing Programs on Communist Logistics
Activities,” October 4, 1968, in [4] CIA-RDP78T02095R000300180001-7.
28. CIA, Enclosure to memorandum to CIA Director from Carver, “Notes on Background Matters Pertinent to Current ARVN and U.S.
Operations in Cambodia,” June 15, 1970, in [12] CIA-RDP80R01720R000200030002-1.
29. Ibid.
30. Abrams, “Personal for” message to General Wheeler.
31. Ibid.
32. Ibid.
33. CIA, “Attachment to Memorandum on Cambodia as a Source of VC/NVA Arms and Ammunition,” October 31, 1968, 8, in [9]
CIA-RDP79R00967A001200030013-2.
34. CIA, “OER Comments on Current MAC-V Views of VC/NVA/Logistics,” November 11, 1968, in [4] CIA-
RDP78T02095R000300180001-7.
35. CIA, “Blind Memo re DCI Briefing Memo on the Communist Use of Sihanoukville,” May 18, 1970, 5, in [3] CIA-
RDP78T02095R000200090001-8.
36. CIA, Enclosure to memorandum to Director from Carver, “Notes on Background Matters Pertinent to Current ARVN and U.S. Opera-
tions in Cambodia,” June 15, 1970, in [12] CIA-RDP80R01720R000200030002-1.
37. CIA, Memorandum for the Director, “Cambodian Involvement in the Supply of Arms and Ammunition to Communist Forces in South
Vietnam” (the “Graham report”), December 31, 1968, in [8] CIA-RDP79R00904A001400020001-6.
38. Ibid.
39. Ibid.
40. Ibid.
41. CIA, Blind memorandum, “The North Vietnamese Logistical System—Capabilities and Vulnerabilities,” August 5, 1970, in [5] CIA-
RDP78T02095R000600290001-1.
42. CIA, Memorandum, “OER Comments on Current MAC-V Views of VC/NVA Logistics,” November 11, 1968, in [4] CIA-
RDP78T02095R000300180001-7.
Analytic Tug-of-War
43. CIA, “Attachment to Memorandum on Cambodia as a Source of VC/NVA Arms and Ammunition,” October 31, 1968, in [9] CIA-RD-
P79R00967A001200030013-2.
44. CIA Memorandum, “OER Comments on Current MAC-V Views of VC/NVA Logistics,” November 11, 1968, in [4] CIA-
RDP78T02095R000300180001-7.
45. CIA, “Attachment to Memorandum on Cambodia as a Source of VC/NVA Arms and Ammunition,” October 31, 1968, in [9] CIA-RD-
P79R00967A001200030013-2.
46. CIA, Memorandum for the Director, “Cambodian Involvement in the Supply of Arms and Ammunition to Communist Forces in South
Vietnam” (the “Graham report”), December 31, 1968, in [8] CIA-RDP79R00904A001400020001-6.
47. Ibid., 3–4.
48. CIA Blind memo, “DCI Briefing Memo on the Communist Use of Sihanoukville,” May 18, 1970, in [3] CIA-
RDP78T02095R000200090001-8.
49. Abrams, “Personal for” message to General Wheeler, “Enemy Reliance on Cambodia,” December 15, 1968 (CK2349127747), U.S.
Declassified Documents Online.
50. Ibid.
51. Robert Hathaway, Richard Helms as Director of Central Intelligence, 1966-1973 (Center for Study of Intelligence, 1993), 33–34.
52. Ibid., 34.
53. Ahern, Nothing if not Eventful, 103.
54. CIA Intelligence Memorandum, ER IM 7-126, “New Evidence on Military Deliveries to Cambodia: December 1966–April 1969,” 3,
in [7] CIA-RDP78T02095R00200040001-3.
55. CIA Blind memo, “Communist Supply Deliveries to Cambodia for the Viet Cong/North Vietnamese Forces in South Vietnam, Decem-
ber 1966-April 1969,” February 5, 1971, attached to ER IM 70-188, December 1970, in [2] CIA-RDP78T02095R000200050001-1.
56. Ibid.
57. ER IM 70-188, December 1970, 2, in [2] CIA-RDP78T02095R000200050001-1.
58. Ibid., Table 1.
59. CIA memorandum, “Communist Supplies Deliveries to Cambodia for the Viet Cong/North Vietnamese Forces in South Vietnam,
December 1966–April 1969,” 5 February 1971 in [2] CIA-RDP78T02095R000200050001-1.
60. CIA memorandum from Chief of Trade and Aid Branch, “Possibility of Communist Military Deliveries to Sihanoukville Destined for
the Cambodian Armed Forces,” May 9, 1969, in [1] CIA-RDP78T02095R000200030001-4.
61. ER IM 70-188, December 1970, Table 1, in [2] CIA-RDP78T02095R000200050001-1, 3.
62. Ibid., 9–10.
63. Ibid., “The Sihanoukville Route,” 5.
64. Ibid.
65. Ibid., 8.
66. Ibid., 4.
67. Ibid.
68. Hathaway, Richard Helms, 35.
69. Ibid.
70. Ibid.
71. “Record of President’s Meeting with the Foreign Intelligence Advisory Board, “Southeast Asia,” (Document 344) July 18, 1970 in
U.S. State Department, Foreign Relations of the United States [Hereafter FRUS], 1969–1976, Volume VI, Vietnam, January 1969–July
1970; Memorandum from the President’s Assistant for National Security Affairs (Kissinger) to President Nixon, Washington, January
21, 1971 (Document 107), Subject: Sihanoukville Intelligence Failure, in FRUS, 1969–1976, Volume VII, Vietnam, July 1970–January
1972.
72. Ibid.
73. Ibid.
74. FRUS, 1969–1976, Volume II, Organization and Management of U.S. Foreign Policy, 1969–1972, Document 210. Editorial Note.
75. CIA, Memorandum for the Director, untitled, February 8, 1971, in [11] CIA-RDP80M01133A000900040010-5.
76. Ibid.
77. Document 224 “Editorial Note,” FRUS, 1969–1976, Volume II.
78. Ibid.
79. Hathaway, Richard Helms, 35–37.
80. Ibid., 35.
81. Ahern, Good Questions, Wrong Answers, 47, vii, 42.
82. Ibid., 42, 48
83. CIA, Office of National Estimates, “1967s Estimative Record—Five Years Later,” August 16, 1972, in [10] CIA-RD-
P79R00967A001500040010-1.
84. Ibid.
Analytic Tug-of-War
85. CIA, Memorandum for the Director, “Sihanoukville Post Mortem,” 10 November 1970, in [13] CIA-RD-
P80R01720R000600090052-6.
86. Ibid.
87. Palmer, “U.S. Intelligence and Vietnam,” 78.
88. CIA, Memorandum for the Director, untitled, February 8, 1971, in [11] CIA-RDP80M01133A000900040010-5.
89. R. Jack Smith, The Unknown CIA, 211.
90. “Editorial Note” (Document 224), FRUS, Volume II, 1969–76, Organization and Management of U.S. Foreign Policy, 1969–1972.
91. Ibid.
92. Enclosure to memorandum to Director from Carver, “Notes on Background Matters Pertinent to Current ARVN and U.S. Operations
in Cambodia,” June 15, 1970, in [12] CIA-RDP80R01720R000200030002-1.
93. Ahern, Good Questions, Wrong Answers, 47.
94. ER IM 70-188, December 1970, in [2] CIA-RDP78T02095R000200050001-1.
95. Ahern, Nothing If Not Eventful, 103.
96. CIA, Memorandum for the Director, “Sihanoukville Post Mortem,” November 10, 1970, in [13] CIA-RD-
P80R01720R000600090052-6.
97. Ahern, Good Questions, Wrong Answers, 22–25.
98. Ibid., vii.
99. James Marchio, “Instituting Devil’s Advocacy in IC Analysis after the Arab-Israeli War of October 1973,” Studies in Intelligence 67,
no. 4 (December 2023). (https://www.cia.gov/resources/csi/static/610d592f509c5ad03f5a999827dd9bdb/Article-Instituting-Devils-Ad-
vocacy-in-IC-Analysis-after-October-1973-War.pdf).
100. CIA, The Directorate of Intelligence: Fifty Years of Informing Policy, 1952–2002 (Central Intelligence Agency, 2002), 40–45.
101. Available at https://cia.gov/resources/csi/static/955180a45afe3f5013772c313b16face/Tradecraft-Primer-apr09.pdf
v v v
Bibliography
CIA Declassified Documents
Numbers in brackets are not part of document numbers on file; they are for reference in this article only. The documents can
be found by searching the document numbers at https://www.cia.gov/readingroom/. Specific URLs are listed in the column
describing the key documents in each release.
Document number Description of key contents
[1] CIA-RDP78T02095R000200030001-4 CIA memorandum from Chief of Trade and Aid Branch, “Possibility of
COMMUNIST SUPPLY SHIPMENTS Communist Military Deliveries to Sihanoukville Destined for the Cambodian
THROUGH CAMBODIA AND LAOS APR- Armed Forces,” 9 May 1969. (https://www.cia.gov/readingroom/search/site/
MAY 1969; Released 2006/01/03; 50 pages. CIA-RDP78T02095R000200030001-4).
[2] CIA-RDP78T02095R000200050001-1 DI Intelligence Memorandum, ER IM 70-188, December 1970, “Communist
COMMUNIST MILITARY DELIVERIES TO Deliveries to Cambodia for the VC/NVA Forces in South Vietnam, Decem-
CAMBODIA; 2007/10/23; 56 pages. ber 1966-April 1969,” 1–15; Also attached blind Memorandum of same title,
dated 5 February 1971, detailing points in ER IM 70-188, with more tables,
graph, and map showing “The Sihanoukville Route,” 17–37; unclassified
transmittal letters to senior military officers transmitting ER IM 70-126, Sep-
tember 1970, dated 8 September 1970; Intelligence Memorandum, ER IM
69 -177, “Chinese and Soviet Military Deliveries To Cambodia,” December
1969, 53–44 (Introduction only, 47 pages denied). (https://www.cia.gov/read-
ingroom/search/site/CIA-RDP78T02095R000200050001-1).
[3] CIA-RDP78T02095R000200090001-8 CIA memorandum, “Blind Memo re DCI Briefing Memo on the Com-
COMMUNIST MILITARY DELIVERIES TO munist Uses of Sihanoukville,” 18 May 1970, 5; CIA report, “An Evalu-
CAMBODIA; 2004/11/30; 15 pages. ation of Recent Clandestine Reporting on Cambodia,” October 1969,
iii (Foreword only). (https://www.cia.gov/readingroom/search/site/CIA-
RDP78T02095R000200090001-8).
Analytic Tug-of-War
[4] CIA-RDP78T02095R000300180001-7 Boggs memorandum, including the key Abrams quote at its end, 6; CIA
(GENERAL ABRAMS ([various] COMMENTS memorandum, “OER Comments on Current MAC-V Views of VC/NVA Lo-
ON ABRAMS CABLES RE VIETNAM WAR); gistics,” 11 Nov 68; CIA IM: Impact of Change in US Bombing Programs on
2004/11/30; 66 pages. Communist Logistics Activities, 10–20; SCSAIGON 669 Oct 1968, Com-
ments on General Abrams assessment [dated 15 December 68] [“overly op-
timistic”] (Four Section Cable, 40-53); Blind memo, “Comments on General
Abrams’ Response to Mr. Rostow on the Effects of Ending the Bombing of
North Vietnam”; 26 August 68, 57–60. (https://www.cia.gov/readingroom/
search/site/CIA-RDP78T02095R000300180001-7).
[5] CIA-RDP78T02095R000600200001-1 CIA memorandum, DCI Helms to Sec Def Laird, forwarding blind memo,
LOGISTICS FLOW ANALYSIS; 2007/03/07; “Logistics Flows to the Enemy in South Vietnam,” 28 January 1970, 2–14;
23 pages. Undated [ca. 24 March 1970], memorandum, “Communist Logistics in the
Laotian Panhandle and South Vietnam,” 19–23. (https///www.cia.gov/readin-
groom/search/site/CIA-RDP78T02095R000600200001-1).
[6] CIA-RDP78T02095R000600290001-1 Blind memo (briefing script) “The North Vietnamese Logistical System—Ca-
THE NORTH VIETNAMESE LOGISTICAL pabilities and Vulnerabilities,” 5 August 1970. Addresses how “the system
SYSTEM- -CAPABILITIES AND VULNERA- has stood up under US bombing campaigns with reference to period be-
BILITIES; 2006/11/07; 16 pages. tween March and November 1968,” 10. (https///www.cia.gov/readingroom/
search/site/ CIA-RDP78T02095R000600290001-1).
[7] CIA-RDP78T02095R00200040001-3 CIA ER IM 70-126, September 1970, “New Evidence on Military Deliver-
NEW EVIDENCE ON MILITARY DELIVER- ies to Cambodia: December 1966-April 1969,” 2–16; Memorandum for the
IES TO CAMBODIA: DECEMBER 1966 - Director, “Distribution of ER IM 70-126, September 1970,” 5 Sep 1970,
APRIL 1969; 2007/03/06; 23 pages. 17–21; Memo to DD/OER re. “second installment of Sihanoukville paper”,
33 pages all redacted. (https://www.cia.gov/readingroom/search/site/CIA-
RDP78T02095R00200040001-3).
[8] CIA-RDP79R00904A001400020001-6 CIA, Memorandum for the Director, “Cambodian Involvement in the Supply
CAMBODIAN INVOLVEMENT IN THE of Arms and Ammunition to Communist Forces in South Vietnam” (the “Gra-
SUPPLY OF ARMS AND AMMUNITION TO ham Report” re. consultations with MACV and other in-country intelligence
COMMUNIST FORCES IN SOUTH VIET- components), 31 December 1968. (https://www.cia.gov/readingroom/search/
NAM; 2009/03/17; 18 pages. site/ CIA-RDP79R00904A001400020001-6).
[9] CIA-RDP79R00967A001200030013-2 Two CIA memorandums, “Attachments to Memorandum on Cambodia as a
ATTACHMENT TO MEMORANDUM ON Source of VC/NVA Arms and Ammunition,” [1] Memorandum: “Discussion
CAMBODIA AS A SOURCE OF VC/NVA of the Evidence,” 31 October 1968, 1-8; [2] Memorandum, “Summary and
ARMS AND AMMUNITION; 2007/03/06; 14 Conclusions,” 31 October 1968, 10–14. (https://www.cia.gov/readingroom/
pages. search/site/CIA-RDP79R00967A001200030013-2).
[10] CIA-RDP79R00967A001500040010-1 CIA Office of National Estimates, “1967s Estimative Record—Five Years
1967’S ESTIMATIVE RECORD - - FIVE Later,” 16 August 1972. (https://www.cia.gov/readingroom/document/cia-rd-
YEARS LATER; 2006/12/15; 37 pages. p79r00967a001500040010-1).
[11] CIA-RDP80M01133A000900040010-5 CIA, Memorandum for the Director, untitled, unsourced, re meeting with
MEMORANDUM FOR THE DIRECTOR; Henry Kissinger on planning of a Laos operation, including Kissinger com-
2002/08/21; 1 page. mentary on Sihanoukville as “one of our greatest intelligence failures,” 8
February 1971. (CIA-RDP80M01133A000900040010-5) (https://www.cia.
gov/readingroom/search/site/CIA-RDP80M01133A000900040010-5).
[12] CIA-RDP80R01720R000200030002-1 Transmittal to Director from Carver of “Notes on Background Matters Per-
MEMO TO THE DIRECTOR FROM G. A. tinent to Current ARVN and U.S. Operations in Cambodia” given to David
CARVER, JR.; 2004/06/14; 10 pages. Packard on 15 June 70. (https://www.cia.gov/readingroom/search/site/
CIA-RDP80R01720R000200030002-1).
[13] CIA-RDP80R01720R000600090052-6 CIA, Memorandum for the Director, [presumably from George Carver,
UNTITLED; 2004/10/12; 3 pages. SAVA, “[Notes on] Sihanoukville Post Mortem,” 10 November 1970 [shows
only 1 page of 4]. (https://www.cia.gov/readingroom/search/site/CIA-RD-
P80R01720R000600090052-6).
Analytic Tug-of-War
US Army Declassified Document “Personal for” message from General Abrams to General Wheeler, “Enemy
Reliance on Cambodia,” 15 December 1968 (CK2349127747), U.S. Declas-
sified Documents Online (gale.com/apps/doc/CK2349127747/USDD?u=loc_
main&sid=bookmark-USDD&xid=e3d6533a&pg+2).
U.S. Department of State Histories
State Department’s History site, https://history.state.gov/historicaldocuments, is readily searchable. A simple search from its
home page on the word “Sihanoukville” produces 72 results.
Foreign Relations of the United States, 1969–1976, Volume II, Organization and Management of U.S. Foreign Policy,
1969–1972.
Foreign Relations of the United States, 1969–1976, Volume VI, Vietnam, January 1969–July 1970.
Foreign Relations of the United States, 1969–1976, Volume VII, Vietnam, July 1970–January 1972.
Other Published Material
Ahern, Thomas L., Jr. Good Questions, Wrong Answers: CIA’s Estimates of Arms Traffic Through
Sihanoukville, Cambodia, During the Vietnam War, (CIA, Center for the
Study of Intelligence, 2004). (https://www.cia.gov/readingroom/docs/4_
GOOD_QUESTIONS_WRONG_ANSWERS.pdf).
Ahern, Thomas L., Jr. Nothing if not Eventful: A Memoir of a Life in CIA (CIA, Center for Study
of Intelligence, 2023). (https://www.cia.gov/static/c7189a03edf1b72f-
fa0897f2b19120bf/AhernMemoir-14Dec2023-1.pdf).
Anonymous A Tradecraft Primer: Structured Analytic Techinques for Improving Intelli-
gence Analysis (Center for the Study of Intelligence, 2009). https://cia.gov/
resources/csi/static/955180a45afe3f5013772c313b16face/Tradecraft-Prim-
er-apr09.pdf.
Gettinger, Ted Oral history interview with Phillip Davidson, 30 June 1982, ii-25
(1071628002) Vietnam Virtual Archive. (https://www.vietnam.ttu.edu/virtu-
alarchive/).
Hathaway, Robert and R. J. Smith Richard Helms as Director of Central Intelligence, 1966-1973 (CIA, Center
for Study of Intelligence, 1993). (https://www.cia.gov/readingroom/docu-
ment/0005307558).
Marchio, James “Instituting Devil’s Advocacy in IC Analysis after the Arab-Israeli War of Octo-
ber 1973,” Studies in Intelligence 67, no. 4 (December 2023). (https://www.
cia.gov/resources/csi/static/610d592f509c5ad03f5a999827dd9bdb/Article-In-
stituting-Devils-Advocacy-in-IC-Analysis-after-October-1973-War.pdf).
Nguyen Duy Tuong History of the Annamite Mountain Troops of the Ho Chi Minh Trail (Hanoi,
People’s Publishing House, 1994).
Palmer, Bruce (BG USA Ret.) “U.S. Intelligence and Vietnam,” Studies in Intelligence (Special Edition),
1984. (https://www.cia.gov/readingroom/docs/DOC_0001433692.pdf).
Smith, R. Jack The Unknown CIA: My Three Decades with the Agency (Pergam-
on-Brassey’s International Defense Publishers, Inc., 1989).
Stillwell, Paul Reminiscences of Admiral Elmo R. Zumwalt, Jr., U.S. Navy (Retired) (U.S.
Naval Institute, 2003).
Stillwell, Paul Draft of interview with VAdm. Earl F. Rectanus, 19 November 1982, 44–45 ,
accessed in Texas Tech University Vietnam Virtual Archive on 9 May 2024.
(https://www.vietnam.ttu.edu/virtualarchive/items.php?item=6260111001).
Zumwalt, Elmo R. On Watch (New York Times Books, 1976).
It is well documented and In traveling through Tonkin, to examine the sources of CIA
well known that for de- every village flew the Viet Minh analyses’ doubts about successive
cades CIA analysts were flag, and had armed soldiers, administrations’ repeated assurances
skeptical of official pro- many with Japanese weapons and claims.
taken in raids. The women and
nouncements about the Not all CIA analysts thought
children were also organized,
Vietnam war and consis- and all were enthusiastic in alike, and at times there were
tently fairly pessimistic their support. The important substantial differences of view.
about the outlook for “light thing is that all were cognizant Skepticism and pessimism about
at the end of the tunnel.” of the fact that independence was Vietnam were present chiefly among
not to be gained in a day, and those officers who produced fin-
were prepared to continue their ished intelligence in the form of
struggle for years. In the rural National Intelligence Estimates and
areas, I found not one instance in Intelligence Directorate (then the
of opposition to the Viet Minh, DDI) publications: that is, analysts
even among former government in the Office of National Estimates
officials. (ONE), the Office of [Economic]
Research and Reports, and the
—0SS Report, October19452 South Vietnam Branch of the Office
of Current Intelligence (OCI).Such
It is well documented and well views were generally a bit less
known that for decades CIA analysts evident among officers of the North
were skeptical of official pronounce- Vietnam Branch of OCI, many of
ments about the Vietnam war and whom had been transferred there
consistently fairly pessimistic about from previous Soviet and North
the outlook for “light at the end of the Korean assignments. The situation
tunnel.” Less well known is why the among the Agency’s operational of-
Agency’s analysts were so doubtful, fices at home and abroad was mixed:
especially because CIA was all the some enthusiastically shared official
while a central player in US opera- White House views, while others
tional efforts to create and strengthen were remarkably caustic. In more
South Vietnam. Thus, it is important than a few cases, the Intelligence
The views, opinions, and findings of the author expressed in this article should not be construed as asserting or implying US
government endorsement of its factual statements and interpretations or representing the official positions of any component of
the United States government.
The fact that CIA judgments often were more candid than
those of most other offices was due in important measure in Vietnam and experienced firsthand
to the bureaucratic advantage the Agency’s culture and such distortion by some senior US
officials there. The resulting candor
purpose afforded.
of CIA judgments flowed also from
the fact that the reports Headquarters
Community’s (IC) coordination Agency’s analysts simply, if unscien-
analysts received from CIA’s Saigon
processes and top CIA officers muted tifically, distilled their many sources
station were much more factual and
doubts about Vietnam expressed in of doubt into judgments that often did
exacting in their demanded authen-
CIA’s analytic ranks, yet the finished not square with official pronounce-
ticity than was much of the other
intelligence produced by the DDI and ments—a record that the authors of
reporting from Vietnam.
ONE maintained definitely pessimis- The Pentagon Papers and numerous
tic, skeptical tones over the years. other historians have documented. Recognition of the Vietnamese Com-
munists’ (VC) enormous advantages.
The danger always existed that The following principal factors CIA’s analysts were aware that the
individual CIA analysts could get and forces are among the many basic stimulus among the politically
locked into constant dark points of reasons for the doubts exhibited by so conscious Vietnamese was national-
view, reluctant to accept new evi- many of CIA’s Vietnam analysts: ism and that, following World War
dence to the contrary. Also, at times
CIA’s cultural advantages. II, the VM had largely captured the
some CIA analysts overreacted to cer-
The fact that CIA judgments often nationalist movement. Ho Chi Minh’s
tain assertive personalities from other
were more candid than those of most apparatus came to be better led, better
offices who happened to be arguing
other offices was due in important organized, and more united than any
wholly unsupportable optimism. And
measure to the bureaucratic advan- of the other competing, divided na-
there were a few occasions where
tage the Agency’s culture and purpose tionalist Vietnamese parties. Through
CIA judgments on Vietnam badly
afforded. The job of CIA analysts a combination of some reforms
missed the boat, or where Agency
was to tell it like it is, freer from the and ruthless elimination of politi-
judgments were too wishy-washy to
policy pressures with which their cal rivals, the VM/VC dominated
serve the needs of policymaking or,
colleagues in Defense, the military the countryside. Local populations
in a handful of cases, where analytic
intelligence agencies, and, to a lesser seldom volunteered intelligence to
officers caved in to pressures from
extent, the Department of State had to the French, the South Vietnamese, or
above and produced mistakenly rosy
contend. Many CIA Vietnam analysts
3 the Americans about Communistled
judgments. Despite these hazards,
had been working on Indochina prob- forces in their midst.
and, as Robert McNamara’s recent
book In Retrospect maintains, the lems for some time, often longer than
Then, too, the VM’s 1954 victory
war’s outcome justified many of the most military intelligence officers.
over the French at Dien Bien Phu
CIA analyses’ doubts and warnings. Those Agency officers were familiar
and the end of French rule had been
with how intelligence reporting had
tremendous boosts to nationalist sen-
Officials in other entities, espe- been distorted during France’s fight
timent and Ho Chi Minh’s status and
cially in the Department of State’s against the Communist-led Viet Minh
popularity. At that time, most observ-
Bureau of Intelligence and Research, (VM) and how such unfounded opti-
ers of Indochina affairs, including US
often came up with similar doubting mism had contributed to the French
intelligence agencies, judged that if
judgments. At times, their doubts defeat.
nationwide elections were held, the
also were shared by certain officers in
CIA analysts subsequently wit- VM would win by a large margin.
DIA and elsewhere in the Department
of Defense and by certain junior nessed nearly identical patterns in
A similar view was even shared
and field grade intelligence officers much of the US military and diplo-
by DCI Allen Dulles, who, accord-
in Vietnam. CIA’s analysts had no matic reporting from Saigon. In addi-
ing to the record of a 1954 NSC
special sources of data not available tion,they were at times told confiden-
meeting, told that senior group that
to other US Government offices, no tially by middle-grade US military
“The most disheartening feature of
unique analytic methodologies, no and Saigon Mission officers of such
the news from Indochina ... was the
pre-computer–age Window 95s. The practices. A few CIA analysts served
Illustrative Quotations
• [CIA Intelligence Memorandum, 1950]: “The Vietnamese insurgents are predominantly nationalists rather than
Communists,but Communist leadership of the movement is firmly established. . . .These insurgents have long con-
trolled most of the interior of Vietnam. Before 1954, they will probably have gained control of most, if not all, of
Indochina..”19
• [General Bruce Palmer, Jr., 1984]: “The first national estimate on Indochina, NIE 5, 29 December 1950, Indochina:
Current Situation and Probable Developments, was a very pessimistic estimate.”20
• [General Palmer]: “During the period 1950–October 1964, ONE produced 48 NIEs and SNIEs . . . dealing with
Vietnam. In addition to estimates, ONE produced 51 Memorandums for the DCI concerning Vietnam over the same
period. Indeed, ONE published more on Vietnam than any other single subject.”21
• [NIE 35/1, 1952]: “Through mid-1952, the probable outlook in Indochina is one of gradual deterioration of the
Franco-Vietnamese military position. . . . The longer term outlook is for continued improvement in the combat ef-
fectiveness of the Viet Minh and an increased Viet Minh pressure against the Franco-Vietnamese defenses.” Unless
present trends are reversed, this growing pressure, coupled with the difficulties which Franee may continue to face
in supporting major military efforts in both Europe and Indochina, may lead to an eventual French withdrawal from
Indochina.”22
• [NIE 91, 1953]: “If present trends . . . continue through mid-1954, the French Union political and military position
may subsequently deteriorate very rapidly.”23
• [Senator John F. Kennedy, 1954]: “I am frankly of the belief that no amount of American military assistance in In-
dochina can conquer an enemy which is everywhere and at the same time nowhere, ‘an enemy of the people’ which
has the sympathy and covert support of the people. . . . In November of 1951, I reported upon my return from the
Far East as follows: ‘In Indochina we have allied ourselves to the desperate effort of a French regime to hang on to
the remnants of empire. There is no broad, general support of the native Vietnam Government among the people of
that area. . . . [To try to win military victory] apart from and in defiance of innately nationalistic aims spells fore-
doomed failure.’”24
• [Former CIA officer Joseph Burkhalter Smith, 1978]: “I was stationed in Singapore then [1954], and British intelli-
gence officers told me that they thought the United States was mad to prop up South Viernam.”25
• [General Palmer]: “Overall, the situation in Vietnam inherited by the United States from France in 1955 was disad-
vantageous, if not hopeless. It is difficult to escape the conclusion that the United States in deliberately pushing the
French out of the way and replacing them in Vietnam acted unwisely.”26
• [ONE Memorandum, 1960]: “The catalog of public discontent [in South Vietnam] includes a widespread dislike and
distrust of Ngo family rule . . . Diem’s tightly centralized control and his unwillingness to delegate authority . . . the
growing evidence of corruption in high places;the harsh manner in which many persons, particularly the peasants,
have been forced to contribute their labor to government programs . . . and the government’s increasing resort to
harsh measures as a means of stifling criticism.”27
• [Gen. William E. DePuy, undated]: “Well, there wasn’t a Vietnamese government as such. There was a military junta
that ran the country. Most of the senior Vietnamese officers, as you know, had served in the French Army. A lot of
them had been sergeants. Politically, they were inept. The various efforts at pacification required a cohesive, efficient
government, which simply did not exist. Furthermore, corruption was rampant. There was coup after coup, and mil-
itarily, defeat after defeat. . . . The basic motivation of the ARVN seldom equaled the motivation of the VC and the
NVA [North Vietnamese] . . . the ARVN was losing the war just the way the French had lost the war, and for many
of the same reasons.”28
• [Former Director of the CORDS program in South Vietnam, Amb. Robert W. Komer, 1986]: “In the first analysis,
the US effort in Vietnam failed largely because it could not sufficiently revamp or adequately substitute for a South
Vietnamese leadership, administration, and armed forces inadequate to the task. . . . As George Ball put it in his well
known 1964 memorandum on ‘Cutting Our Losses in South Vietnam,’ ‘Hanoi has a government and a purpose and
a discipline. The ‘government’ in Saigon is a travesty.’ In a very real sense, South Vietnam is a country with an army
and no government.”29
• [The authors of The Pentagon Papers, undated ]: “In this instance, and as we will see, later, the Intelligence Com-
munity’s estimates of the likely results of US moves are conspicuously more pessimistic (and more realistic) than
the other staff papers presented to the President. This SNIE [October 1961] was based on the assumption that the
SEATO force would total about 25,000 men. It is hard to imagine a more sharp contrast between this paper, which
foresees no serious impact on the [VC] insurgency from proposed intervention, and Supplemental Note 2, to be
quoted next . . . ” the JCS estimate that 40,000 US forces will be needed to cleanup the Viet Cong threat.”30
• [ONE Memorandum, 1962]: “The real threat, and the heart of the battle, is in the villages and jungles of Vietnam
and Laos. That battle can be won only by the will, energy, and political acumen of the resisting governments them-
selves. US power can supplement and enlarge their power, but it cannot be substituted. Even if the US could defeat
the Communists militarily by a massive injection of its own forces, the odds are that what it would win would be not
a political victory which created a stable and independent government, but an uneasy and costly colony.”31
• [Judgment by the intelligence panel of an NSC interagency working group, March 1964]: “It is not likely that North
Vietnam would (if it could) call off the war in the South even though US actions [systematically bombing North
Vietnam] would in time have serious economic and political impact. Overt action against North Vietnam would be
unlikely to produce reduction in VC activity sufficiently to make victory on the ground possible in South Vietnam
unless accompanied by new US bolstering actions in South Vietnam and considerable improvement in the govern-
ment there.”32
• [NSC Action Memorandum 288,17 March 1964]: “We seek an independent non-Communist South Vietnam. Unless
we can achieve this objective in South Vietnam, almost all Southeast Asia will probably fall under Communist dom-
inance . . . accommodate to Communism so as to remove effective US and anti-Communist influence or fall under
the domination of forces not now explicitly Communist but likely then to become so. Even the Philippines would
become shaky, and the threat to India on the west, Australia and New Zealand to the south, and Taiwan, Korea, and
Japan to the north and east would be greatly increased.”33
• [ONE Memorandum for the Director, June 1964]: “We do not believe that the loss of South Vietnam and Laos
would be followed by the rapid, successive communization of the other states of the Far East. . . . With the possible
exception of Cambodia, it is likely that no nation in the area would quickly succumb to Communism as a result of
the fall of Laos and South Vietnam. Furthermore,a continuation of the spread of Communism in the area would not
be inexorable, and any spread which did occur would take time—time in which the total situation might change in
any of a number of ways unfavorable to the Communist cause. . . . [Moreover]the extent to which individual coun-
tries would move away from the US towards the Communists would be significantly affected by the substance and
manner of US policy in the area following the loss of Laos and South Vietnam.”34
• [CIA officers’ comment on JCS war game, April 1964]: “Widespread at the war games were facile assumptions that
attacks against the North would weaken DRV capability to support the war in South Vietnam, and that such attacks
would cause the DRV leadership to call off the VC. Both assumptions are highly dubious, given the nature of the
VC war. . . . The impact of US public and Congressional [and world] opinion was seriously underestimated. There
would be widespread concern that the US was risking major war, in behalf of a society that did not seem anxious to
save itself, and by means not at all certain to effect their desired ends in the South. In sum, we feel that US thinking
should grind in more careful consideration than has taken place to date. This does not mean that the United States
should not move against the DRV, but that . . . we do so only if it looks as if there is enough military-political po-
tential in South Vietnam to make the whole Vietnam effort worthwhile. Otherwise, the United States would only be
exercising its great, but irrelevant, armed strength.”35
• [The authors of The Pentagon Papers]: “However, the intelligence panel [of an NSC interagency working group,
November 1964] did not concede very strong chances for breaking the will of Hanoi [by instituting a program of
sustained US bombing of North Vietnam]. They thought it quire likely that the DRV was willing to suffer damage
‘in the course of a test of wills with the United States over the course of events in South Vietnam.’ . . . The panel
also viewed Hanoi as estimating that the United States’ will to maintain resistance in Southeast Asia could in time be
eroded—that the recent US election would provide the Johnson administration with ‘greater policy flexibility’ than
it previously felt it had.”36
• [ONE officer memorandum, April 1965, written shortly after President Johnson’s decision to begin bombing North
Vietnam and committing US troops to combat in the South]: “This troubled essay proceeds from a deep concern that
we are becoming progressively divorced from reality in Vietnam, that we are proceeding with far more courage than
wisdom toward unknown ends. . . . There seems to be a congenital American disposition to underestimate Asian
enemies. We are doing so now. We cannot afford so precious a luxury. Earlier, dispassionate estimates, war games,
and the like told us that the DRV/VC would persist in the face of such pressures as we are now exerting on them. Yet
we now seem to expect them to come running to the conference table, ready to talk about our high terms. The chanc-
es are considerably better than even that the United States will in the end have to disengage in Vietnam, and do so
considerably short of our present objectives.”37
• [General Palmer, 1984]: “[In late 1965,] W. W. Rostow requested an analysis of the probable political and social
effect of a postulated escalation of the US air offensive. CIA’s somber reply was that even an escalation against all
major economic targets in North Vietnam would not substantially affect Hanoi’s ability to supply its forces in South
Vietnam, nor would it be likely to persuade the Hanoi regime to negotiate. Similar judgments were to be repeated
consistently by CIA for the next several years.”38
• [General Palmer, 1984]: “With respect to Vietnam, the head of the CIA was up against a formidable array of senior
policymakers . . . all strong personalities who knew how to exercise the clout of their respective offices. . . . [But]
McNamara was not entirely satisfied with his intelligence from the Defense Department and beginning in late 1965,
relied more and more on the CIA for what he believed were more objective and accurate intelligencejudgments.”39
• [Former NSC staff officer Chester L. Cooper, 1984]: “It is revealing that President Johnson’s memoirs, which are
replete with references to and long quotations from documents which influenced his thinking and decisions on Viet-
nam, contain not a single reference to a National Intelligence Estimate or, indeed,to any other intelligence analysis.
Except for Secretary McNamara, who became a frequent requester and an avid reader of Estimates dealing with So-
viet military capabilities and with the Vietnam situation, and McGeorge Bundy, the ONE had a thin audience during
the Johnson administration.”40
• [From a US Army-sponsored history, 1985]: “Added to this propensity to try to make something out of nothing was
an American ignorance of Vietnamese history and society so massive and all-encompassing that two decades of fed-
erally funded fellowships, crash language programs, television specials, and campus teachins made hardly a dent. . .
. If there is any lesson to be drawn from the unhappy tale of American involvement in Vietnam it is that, before the
United States sets out to make something out of nothing in some other corner of the world, American leaders might
consider the historical and social factors involved.41
v v v
Endnotes
1. Editor’s Note: The author of this study drafted his first National Intelligence Estimate on Indochina in 1952, and subsequently had
Vietnam-related duties as staff chief of CIA’s Office of National Estimates and as a CIA representative to certain interagency working
bodies. Since retiring from CIA in 1986, when he was Acting Chairman of CIA’s National Intelligence Council, he has prepared classi-
fied studies on Vietnam for CIA’s History Staff.
2. OSS (Secret Intelligence Branch), “Political Information [from Swift],” October 17, 1945; Appendix to Causes, Origins, and
Lessons of the Vietnam War, Hearings Before the Senate Committee on Foreign Relations, 92nd Congress, 2nd Session, May 9, 10,
and 11, 1972 (USGPO, 1973), 319.
3. There were a few occasions where certain Directors of Central Intelligence (DCIs) brought pressure on Agency officers to make their
Vietnam analyses more palatable to policymakers. In addition, numerous authorities attest that George A . Carver, who was CIA’s
Special Assistant for Vietnam Affairs (SAVA) for several years following 1966 and who enjoyed remarkable entree among the
USG’s top decisionmakers, fairly regularly gave them more optimistic judgments than CIA’s analysts were holding at the time.
4. Report of NSC meeting of February 4, 1954. Foreign Relations of the United States, 1952–1954, Volume -XIII, Indochina, Part I, 1,014
(Hereafter, FRUS.)
5. As of 1959, for example, CIA’s Saigon station officers were distraught because the then US military advisory group was bent upon train-
ing the nascent South Vietnamese in corps maneuvers rather than in effective small-unit counterinsurgency tactics. (This is from the
author’s personal experience.)
6. JCS Chairman Adm. Arthur Radford, Memorandum to the Secretary of Defense, May 20, 1954. FRUS, 1952–1954, Volume XIII, Indo-
china, Part 2, 1,591.
7. Lemnitzer, Memorandum for the Secretary of Defense, January 13, 1962. US Department of Defense, 1962. US Department of
Defense, United States-Vietnam Relations, (The Pentagon Papers), Book 12, “US Involvement in the War, Internal Documents, The
Kennedy Administration: January 1961–November 1963,” Book II, 449, 450.
8. The author’s personal experience. In holding their dissenting views, these counterintelligence officers and their boss, James
Angleton, had been heavily influenced by the testimony of a defecting Soviet officer. By contrast, other offices of CIA’s clandestine
service had for a decade before 1969 been doing a superb job of reporting serious back stage rifts in the Sino-Soviet relationship.
9. Memorandum to DCI John McCone, 9 June 1964. FRUS, 1964–68, Vol. I, 485. See fuller quotation in Illustrative Quotations section.
Without quoting that part of the memorandum, Robert McNamara claimed that ONE supported the domino thesis. In Retrospect: The
Tragedy and Lessons of Vietnam (New York Times Books, 1995), 124–25.
10. Cooper, The Lost Crusade: America in Vietnam (Dodd, Mead & Co., 1970), 196. (Emphases in the original).
11. ”Because most of the people of Vietnam were Buddhists, President Eisenhower asked whether it was possible to find a good Buddhist
leader to whip up some real fervor. . . . It was pointed out to the President that, unhappily, Buddha was a pacifist rather than a fighter
(laughter).” Report of NSC meeting of February 4, 1954. FRUS, 1952–54, Volume XIII, Indochina, Part I, 1,014.
12. Trip Report by the Vice President, May 1961. FRUS, 1961–63, Vol. I, 154.
13. Harold P. Ford, “The US Decision to Go Big in Vietnam,” Studies in Intelligence 29, No. 1 (Spring 1985), 3. (Originally Secret,
declassified August 27, 1986).
14. CIA was not the only recipient of such policymaker wrath. Eight months after the above episode, INR issued a sharp critique of
claimed ARVN military progress, which “evoked a monumental outcry” from Secretary McNamara and Gen. Maxwell Taylor.
McNamara, heavily influenced by the testimony, phoned Secretary Rusk, denouncing INR for second-guessing military analysis; Rusk
apologized to McNamara. Thomas L. Hughes (who had been INR’s chief at the time), “Experiencing McNamara,” Foreign Policy, No.
100 (Fall 1995), 161–62.
15. Ronald H. Spector, Advice and Support: The Early Years of the United States Army in Vietnam, 1941–60, rev. ed. (The Free Press, 1985), X,
xi.
16. In Retrospect, (passim).
17. Statement made 1 August 1, 1988, to William C. Gibbons, principal author of The US Government and the Vietnam War: Executive and
Legislative Roles and Relationships, Part III, January–July 1965, prepared for the Senate Committee on Foreign Relations by the Con-
gressional Research Service, Library of Congress, (USGPO, 1988), 455. General DePuy had been J-3 of General Westmoreland’s
MACV, and later commanded the Army’s 1st Division in Vietnam.
18. See the Illustrative Quotations section.
19. Intelligence Memorandum No. 271: “Initial Alignments in the Event of War Before 1954,” March 24, 1950. (Initially Secret, declassi-
fied January 4, 1978).
20. “US Intelligence and Vietnam,” Studies in Intelligence (special issue, 1984), 4. (Initially Secret, subsequently declassified). General
Palmer had been General Westmoreland’s deputy in Vietnam and Army Vice Chief of Staff. After retiring, he was a member of the
DCI’s Senior Review Panel.
21. “US Intelligence and Vietnam,” 12.
22. “Probable Developments in Indochina Through Mid-1952,” March 3, 1952. FRUS, 1952–54, Vol. XIII, 54, 55.
23. “Probable Developments in Indochina Through Mid-1954,” June 4, 1953. FRUS, 1952–54, Vol. XIII, 594.
24. Congressional Record-Senate, April 6, 1954, 4,673.
25. “Nation-Builders, Old Pros, Paramilitary Boys, and Misplaced Persons,” The Washington Monthly, February 1978, 25.
26. “US Intelligence and Vietnam,” 23.
27. Memorandum for the DCI, “Approaching Crisis in South Vietnam?,” July 28, 1960. (Originally Secret; declassified 6 November 1980).
28. Lt. Cols. Romie L. Brownlee and William J. Mullen III, An Oral History of General William E. DePuy, USA, Retired (United States Mili-
tary History Institute, n.d.), 123.
29. Robert Komer, Bureaucracy at War: US Performance in the Vietnam Conflict (Westview Press, 1986), 21.
30. (Govt. ed.), Book II, 82, 83.
31. Memorandum for the Director, “The Communist Threat in Southeast Asia,” May 24, 1962. (Originally Confidential; declassified
June 25, 1980).
32. As quoted in The Pentagon Papers, Gravel, ed. (Beacon Press, 1975), Vol. III, 156. The author of this article was a CIA member of that
working group.
33. As quoted in The Pentagon Papers (Bantam/New York Times, ed., 1971), 283, 285. That portion of NSC 288 repeated, verbatim,
a text which Secretary of Defense McNamara had written the day before. McNamara, Memorandum to the President, March 16,
1964. FRUS, 1964–68, Vietnam, Vol. I, 154.
34. As quoted in FRUS, 1964–68, Vol. I, 485.
35. Memorandum for the Record sent to the DCI [by an ONE analyst and an FE operations officer], “Comment on the Vietnam War
Games, SIGMA I-64, April 6–9, 1964,” April 16, 1964. As quoted in Ford, “The US Decision to Go Big in Vietnam,” 7–8.
36. Gravel, ed., Vol. III, 213. The author of this article chaired that intelligence panel.
37. Memorandum sent to the DCI, “Into the Valley,” April 8, 1965, as cited in Ford, ”The US Decision to Go Big in Vietnam,” 10,
11.
38. “US Intelligence and Vietnam,” 43.
39. Palmer, The 25-Year War: America’s Military Role in Vietnam (Simon & Schuster, Inc., 1984), 166.
40. Cooper, ”The CIA and Decision-Making,” Foreign Affairs, January 1972, 227.
41. Ronald H. Spector, Advice and Support: The Early Years of the United States Army in Vietnam, 1941–60, rev. ed. (The Free Press,
1985), x, xi.
v v v
The views, opinions, and findings of the author expressed in this article should not be construed as asserting or implying US
government endorsement of its factual statements and interpretations or representing the official positions of any component of
the United States government.
manikin that would look like a of the DS&T and began sharing ideas Unique Aspects
passenger in a car seat. These projects on teaching project management.
Looking back, a few things
were successful without the full suite Len’s concept of a project cycle and
distinguished the PMC from general
of project management and system Hal’s PM elements model along
courses.
integration processes needed on the with a repertoire of techniques were
larger more complex endeavors. combined to form the beginning of a Government and industry part-
unique PM model. ners (buyers and sellers) jointly
During the early 1980s, when
attending an in-residence two-week
the CIA was experiencing a growth During the PMC development
course. The PMC introduced the
in budgets under President Reagan, Hal and Kevin formed the Center for
practice of teamwork through a novel
a many DS&T projects were expe- Systems Management (CSM) dedi-
teaching concept that emphasized
riencing budget overruns and late cated to serving the government, in-
managing the relationship between
deliveries. To address this issue, R. dustry, and academia in all matters re-
the CIA buyer and industry seller.
Evans Hineman, the deputy director lating to managing complex technical
Recognizing the issues caused by
of the DS&T, asked Len Malinowski developments. Clients ranged from
a lack of a mutual understanding
to develop a project management CIA, NSA, NASA, and Department
and differing goal, the PMC trained
training course for the directorate. of State to most CIA partner con-
buyers and sellers together to fos-
Len was a senior intelligence officer tractors and academic institutions
ter teamwork focusing on mission
in the DS&T with more than 20 years including George Washington
success. The team focus was on
of CIA experience managing complex University, Massachusetts Institute of
mission success while maintaining a
technical projects in the directorate. Technology, Stanford University, and
professional, ethical business rela-
Len also had industry experience prior the Naval Postgraduate School.
tionship. To our knowledge the PMC
to joining the CIA.
Initially the PMC was jointly is the first and only course dedicated
Len solicited help from Consulting taught by these three individuals, to improving the communication and
Resources International (CRI) in enabling the students to gain experi- understanding of the relationship be-
San Francisco. Hal Mooz was the enced insight into both the world of tween government and industry part-
founder of CRI, and had a master’s industry as well as the Agency. Later, ners throughout the project lifecycle.
degree in in engineering and more the CIA and CSM added qualified
This joint training was imple-
than 25 years’ experience as a chief instructors to handle the increasing
mented in three ways. First, the
systems engineer and project man- demand for the PMC. Discourse often
instructor team was composed of an
ager at Lockheed Missiles and Space evolved into a lively back and forth
experienced DS&T officer and an
Corporation (LMSC), now Lockheed debate exploring both industry and
experienced industry project man-
Martin Corporation. Most of Hal’s CIA perspectives and rational for the
ager. Second, CIA officers and their
experience was on CIA projects. Later actions taken by each.
industry development project man-
Dr. Kevin Forsberg joined Hal as a
Both Hal and Kevin received a CIA ager attended the course together,
principal in the company. Kevin had
seal medallion in recognition for their worked class exercises together,
more than 30 years of experience
unique contribution to project manage- took identical final examinations,
as a materials engineer and project
ment methodology and to the CIA’s and shared meals together. Third, the
manager of NASA’s Space Shuttle tile
mission. The CIA Seal Medallion officer–industry pair were provided
program. Both Hal and Kevin worked
(now the Agency Seal Medal) is with living arrangements containing a
with Len to develop the PMC and the
awarded to non-CIA personnel who private area to discuss the application
three jointly taught the first running of
have made significant contributions of their learning experience to their
the course.
to the CIA’s intelligence efforts. Hal specific project.
Len was introduced to Hal at a and Kevin were also awarded the
The course attendees started
PM course Hal was teaching at TRW. International Council on Systems
skeptical on day one of what value
Len felt the ideas being taught by Hal Engineering (INCOSE) Pioneer Award
the course could provide them but
were consistent with the philosophy for their pioneering work.
were vocal with praise at the end of
required different contractor capabil- have a purpose to keep the project • Proceed as planned; all required
ities along with options preserved in on plan and are more appropriately accomplishments were almost
each and yet be able to be integrated called “corrective action reviews.” achieved, and plans are execut-
into a system. Strong system engi- This requires the project have a plan, able, with minor corrections to be
neering talent in the government as a mechanism for authorizing activity resolved within a set date.
well as project management capabil- to expend resources against the plan,
ity was required to frame and direct reporting project status by comparing • Redo the control gate after all
the system definition studies. activity accomplished to the plan, and required accomplishments have
then taking the actions necessary to been achieved and plans execut-
Once the definition studies were get the project on plan or keeping on able.
complete the requirements and in- plan. Students often commented that
terface documents had to be updated • Terminate the project. Industry
action items assigned at the routine
requiring robust system engineering was expected to provide evidence
“periodic” reviews often do not relate
talent in the government. The de- that the criteria had been met.
to getting the project back or keep-
velopment of this system required Control gates were scheduled
ing on plan and become unplanned
integrated system engineering and when the evidence was complete,
work that contributes to cost and
project management on the DS&T not at an arbitrary target date. The
schedule overruns on completion type
and industry sides to build and suc- message was that both govern-
contracts.
cessfully integrate the seven seg- ment and industry had active roles
ments into an operational system. The Active project leadership. at a control gate with a joint focus
successful development and operation Project leadership was emphasized as on mission success.
of this system fostered the integration an active role in managing a project.
of system engineering and project One memorable Hal Mooz quote:
management throughout the DS&T. “Project management is not a specta- Importance to Stakeholders
tor sport.” The image of a symphony One of the PM elements in the
The integration of system engi- conductor was used to convey the model is the project team. The natural
neering and project management was important role of the project manager. tendency is to think about the person-
implemented into the course in two nel executing the project, but there
ways: through the technical aspect of are often many additional personnel
the project cycle (the Vee diagram) Control Gates that have a stake in the project. The
and through the project requirements course provided insight and tools
Another key innovation intro-
that covered all aspects of managing necessary to involve all critical
duced in the course was the use of
requirements in a systematic and logi- stakeholders.
joint control gates rather than mile-
cal way.
stones. A control gate was labeled as
The first two phases of a project
Cards-on-the-wall planning “a milestone with teeth” meaning a
are typically performed by the CIA
technique. Planning is a key part of decision had to be made at a control
system engineer, COTR, and industry
any project, but difficult to accom- gate. The purpose of a control gate
contractor. The role of operations and
plish with a team larger than a few was twofold; measure accomplish-
mission data user personnel is typi-
people. The course introduced the ment and establish an executable
cally not well understood, and many
Cards-on-the-Wall technique, which plan. Criteria for completing the con-
times not considered during these
used the wall as a planning landscape trol gate was established by the gov-
phases. The course provided role
enabling teams to visibly interact, ernment and included in the contract
definition of system validation for
establish, and challenge the plan. Statement of Work. The decision-
the operations officer and intelligence
maker was the government project
analyst during these initial periods of
Periodic corrective action manager who had four options:
a project life cycle.
reviews. The course clarified the
purpose of periodic reviews used on • Proceed as planned; all required
The transition from development
cost reimbursable contracts by in- accomplishments were achieved,
COTR to operations personnel is
troducing the idea that these reviews and plans are executable.
often “throw it over the transom” be- used. They also shared experiences to the multi-billion satellite
havior. Instead, PMC treated the man- and gained insight into each other’s development programs) that
agement of this transition activity as environment. An important aspect staff members began to see the
control gates—dubbed readiness and for an executive is the critical points value of applying the project
acceptance reviews—with criteria to engage with a project and the management precepts, even if
established by the operations officers types of resources needed. Robert notionally. The gap between no
and intelligence analysts to be satis- Wallace, an experienced Directorate formal oversight processes and
fied by the COTR prior to transition. of Operations and DS&T leader, full-blown oversight processes
The course material was written in attended the executive course and gradually closed. Application of
engineering terms, but instructors recounted: project management guidelines
were able to convert this terminol- on a level suited to the scope
ogy into terms used by the CIA’s The criticality of a positive, and cost of projects became
non-technical workforce using “war mutually respectful COTR-con- more routine.
stories” and case studies to enable the tractor relationship, technical
understanding and application to the and personal, the lack of which When industry partners returned
entire life cycle of a project. became an element of every to their companies after attending the
project requiring attention. PMC, their positive feedback often
On the industry side, compa- prompted their companies to contract
nies are initially concerned with For Office of Technical Services with CSM to teach the PMC mes-
winning the competition and invest (OTS) project managers, “fluen- sages to their internal project teams.
corporate independent research and cy” in project management was This secondary effect enabled partner
development funds to increase their as important to their success industries to incorporate PMC tech-
probability of winning. The course as language training was to a niques for managing projects and to
emphasized the value of integrating case officer being assigned to a have a clearer understanding of how
system engineering into these early foreign county.” to work with the CIA.
activities and highlighted the need to
ensure these activities were on track Project management is a natural
with what the customer was requiring PMC’s Legacy partner to all aspects of the agency
by utilizing internal corporate control The Office of Technical Collection because it is about doing things and
gates with criteria important to the (OTC) had a mix of projects, some doing things “right.” While the joint
capture team. complex and some simple. The chal- training has been lost, the value of
lenge the OTC director had was how teamwork to the agency both in its
The language used in projects is to consistently apply adequate and relationships with industry and other
not always understood by the broader efficient PM practices across this mix entities is an important characteristic
industrial and CIA communities. To of projects. Peter Daniher, the OTC and value to accomplishing its mis-
remedy this, there was a three-day director, commented: sion. These unique PMC practices are
course for executives, partnered with key to the CIA project management
industry senior executive to explain At some point, circa 1993, philosophy, continue to be taught, and
the PM model, terminology, and need enough staff members had been will benefit the agency long into the
for senior management commitment. through the Project Manage- future, especially for today’s mis-
Executive attendees commented that ment Course to reach a tipping sion-center structure where multiple
the executive course allowed them point where the training caught cultures must be integrated.
to quickly learn the broad concept on. There had been enough
of how projects were executed, the issues in many small to me-
logic of the steps, and the language dium cost programs (relative
v v v
The authors: Joe Keogh and Richard Roy were career staff officers in CIA’s Directorate of Science and Technology who
helped develop and teach the PMC during the early 1990s. Both are now retired.
a. Recently, there has been positive energy and movement around OSINT in the IC, includ-
ing promulgation of the IC OSINT Strategy 2024–2026 in March 2024. Framing OSINT
more as an analytic discipline, in addition to collection, would add to the momentum. The
strategy document is available on both odni.gov and cia.gov.
The views, opinions, and findings of the author expressed in this article should not be construed as asserting or implying US
government endorsement of its factual statements and interpretations or representing the official positions of any component of
the United States government.
a. Intelink was organized under ODNI’s Central Information Office after the standup of ODNI. This was fertile agency-neutral territory
where Web 2.0 tools were protected and grown.
word in the IC since 9/11 has been it has been executed as a support In 2006, ICD 301 was drafted in
integration. Even outside the IC, the function within the other silos that an effort to make OSINT the “INT of
concept of breaking silos in the busi- have formed over time. More simply, first resort.” However, note that the
ness world is viewed primarily as an OSINT is a support function of the 300 series deals with collection, not
unalloyed good. The negative mental other INTs and is therefore not really analysis (200 series). ICD 301 was a
image of information hoarding and an INT at this time. progressive move at the time—it was
the connected power plays within rescinded in 2012—to nudge along
an organization is the dominant one, Substantial OSINT silos can be the discipline of OSINT, but the
but the positive aspects of silos when formed within existing organizations, ordering as a 300 series shows that
it comes to professionalizing and but this has not materialized to date even helpful OSINT moves in the
effectively executing a discipline or in the IC as the residue of embedding past were viewed through the col-
function is often overlooked. For minor OSINT functions with other lection lens. This collection framing
substantial tasks, you need specialists classified INTs hinders the evolution undermines the professionalization of
working closely together. To do this, of the silos needed for OSINT to OSINT as a real analytic discipline
silos frequently form within orga- professionalize and scale. To restate in the long term. Collection is a part
nizations to focus expenditures and the elements of siloing mentioned of any holistic INT, but not the whole
execute core functions: recruiting, previously in the context of OSINT thing in the way that OSINT has been
training and development, profes- professionalization as questions: Is defined. I would add the term collec-
sional standards, customer service, there a substantial OSINT recruitment tion to the list of the words we need
knowledge management, labor pipeline? Are there many OSINT to rethink in the context of OSINT
segmentation, and so forth. Jargon jobs available in the IC? Are new job professionalization.
emerges to convey specialized tasks. titles being developed to handle labor
specialization? Is there an OSINT
Looking back at the history and school? Is there an OSINT journal?
evolution of SIGINT, GEOINT, and Does OSINT have specialized and
IC as Large Publisher
HUMINT, one can see how silos large IT investments? Does OSINT The US IC is arguably one of
formed over time to effectively exe- have a content or product voice? the larger publishers in the world
cute the function of the INT, just as in Does OSINT have official narrative measured by the number of analysts.
other sectors. OSINT is often called outputs? Are there clear promotion The IC is substantially larger than
an INT but few of the things noted in paths for OSINT specialization? the reporting arms of the New York
the silos above exist in the current ex- Compared to the other INTs, the Times, Los Angeles Times, Wall Street
ecution of OSINT in IC, nor does the answer is no to all the above. Journal, Bloomberg News, and CNN
history of OSINT match the history combined.a However, when it comes
of professionalization compared to to doing more OSINT work at greater
the other INTs. From Collection Mind- scale, a common retort is “we don’t
have the resources.” This is reflective
OSINT needs its own silos and set to Analytic Mindset
of the groupthink around classi-
must go through the evolution of OSINT’s framing as a collection fied-first workflows; it is not solely
siloed formation and function noted discipline to supplement classified about money. As one of the largest
previously just like every other INT. operations needs to shift to thinking publishing labor forces, the IC has
If OSINT is not “siloed,” OSINT of OSINT as full-fledged analytic dis- the existing resources to create more
in the IC will never be effectively cipline on its own. For example, the quality and shareable OSINT content.
professionalized because without ordering of Intelligence Community It is time to reimagine workflow and
the elements noted previously, no Directives (ICDs) as shown above labor. Additional funding requests
enterprise can effectively operate at reinforces the idea of OSINT as col- should be pursued after classi-
scale. Because OSINT lacks silos, lection, not analysis. fied-centric workflows have been
a. Judging from various corporate and journalism websites, the New York Times, Los Angeles Times, Wall Street Journal, Bloomberg News,
and CNN employ approximately 10,000–13,000 reporters and editorial staff as of early 2024. Conservatively, IC analysts number in the
tens of thousands.
reimagined with OSINT production and places leadership at the ODNI Bigger Silos for OSINT
serving as the base of operations. level where OSINT professionaliza- Production
tion belongs, not buried within other By deliberate design stretching
agencies’ functions.a The “INT of over seven decades, OSINT in the
Culture is not an Excuse first resort” claim would finally be IC has been primarily regarded as
OSINT, a hot topic within the IC credible. an input to classified production, not
and industry conference circuit for a coequal. In fact, the majority of
Building on the first-resort
several years, garnered new atten- IC OSINT functions are housed in
concept, IC research and writing
tion after Russia invaded Ukraine collection or technology components,
labor would be focused to answer
in February 2022. Commercial not analytic components. OSINT
and publish official OSINT reports
GEOINT, social media, and other collection informs classified analysis
tackling the intelligence topics with
open sources created new avenues for but is not formally involved in its
judgements drawn only from unclas-
open-source analysis. When the ques- production. This traditional workflow
sified sources.
tion is asked of panel members why should be inverted. OSINT collectors,
OSINT is not the INT as first resort After this professionalized OSINT who typically work mostly in the
or why OSINT does not receive equal output is published, a classified annex open domain, should start the OSINT
billing with other INTs, the answer can fill any remaining gaps and linked production effort with analytic line
typically given is “culture.” By this, together with registration numbers workers joining them on the unclas-
people seem to mean there’s a lack of for pairing and discovery. The official sified domain to create OSINT-first
desire to put unclassified work on a OSINT report version is then distrib- analysis. This would cluster OSINT
par with traditional, classified work. uted to the widest possible audience expertise together in larger silos and
to include allies and coalition part- help professionalize OSINT.
The culture argument is too vague,
ners on unclassified networks and the
in my view. Instead, the core issues Because the analytic product
classified version is then distributed
are twofold. First, we lack flagship would reside on unclassified domains,
on classified networks, which reduces
analytic products. Second, OSINT the IC could shift workers off of the
exquisite expenditures with OSINT
in the IC is centered within the “high side” (i.e., classified) to the
truly leading as the first analytic
classified domain, rather than in the “low side,” where most data resides.
resort. The reduction in classified re-
unclassified domain where OSINT It would have the added benefit of
search labor would be channeled into
originates. Let me elaborate. reducing the amount of work spent
unclassified work; classified inputs
would be added toward the end of the verifying or debunking open-source
I posit that creating an ODNI-
production process. analysis produced outside of the IC.
hosted OSINT product line akin
The IC’s current classified-first de-
to CIA’s WIRe or DIA’s Defense
This new OSINT report would sign principles must be reimaginged
Intelligence Digest on unclassified
be a real professionalized INT that with new design principles, otherwise
networks would help jumpstart
can be cross-referenced and cited we will continue to tinker around the
broader OSINT professionalization.
after going through a professional- edges as we have for decades.
It would elevate OSINT above just
ized quality control process like the
collection, making the unclassified
other INTs. OSINT is now co-equal,
domain the locus of open-source
officially. Fusion or integration
work, focus multi-agency labor
is achieved through citation, not
against common topics and priorities,
nested unofficial collection formats
a. Based on my Intelink experience, I posit that substantial OSINT moves should also be protected and grown initially within agency-neu-
tral space under the ODNI.
Tools-driven Discipline and has responded primarily by develop- of practitioners, founding an OSINT
Misaligned Industry Incentives ing front-end portals aimed to “save journal, and upskilling the workforce.
time” from “information overload,” Some of these fundamentals require
Viewing OSINT as collection
which has been a sales rallying cry tech investments but most are not
has produced an environment where
for over 20 years with mixed results. tech related but desperately needed to
chasing the latest data-management
If the IC internally shifts its focus on truly professionalize OSINT.
technology has obscured the focus
OSINT toward a full-fledged analytic
on analytic fundamentals. Staying In addition, a robust training
discipline backed by officially written
current on tools and technology is a program focused on creating OSINT
products, the messaging to industry
large part of any knowledge work- analysis should be established to help
would change more toward the deliv-
er’s portfolio, but the focus on tools launch this new OSINT production
ery of fully analyzed and shareable
in the OSINT world seems to top line. Existing courses on analytic
OSINT content rather than collection
most discussions in OSINT circles standards, writing, user design, and
dashboards, data scraping, or embed-
when compared to other INT work- data science could be consolidated
ding cleared personnel in secure facil-
ing-group meetings and conferences and integrated with private-sector
ities to assist with collection-centric
that are less tools-focused. OSINT consulting advice and other
workflows.
IC OSINT creation exemplars to es-
Because OSINT in the IC lacks
tablish a prestigious “schoolhouse.”
product lines and the number of
OSINT practitioners is limited, Focus on Fundamentals
I ask all readers moving forward
technology discussions often fill the OSINT is a technical discipline to reduce and rethink terms like inte-
void. This tech and contracting focus and all practitioners need a high gration, tipping and cueing, enhance-
in OSINT is somewhat logical as it data IQ and must stay current on ment, foundational, and collection
can be easier to put millions on con- the evolving tech landscape such as when talking about OSINT. As a
tracts to buy services and tools from advances in AI. However, buying community, we need to construct
industry than it is to create or redirect more AI-fueled tech is like buying a new vocabulary that matches the
government billets and labor to write a baseball pitching machine when goals of making OSINT a real INT
narrative intelligence in official chan- OSINT in the IC cannot hit well off a that can stand shoulder to shoulder
nels. However, perpetual outsourcing batting tee. OSINT needs to focus on with the other INTs, with official
and chasing the latest technology the fundamentals of professionaliza- products, analytic disciplines, official
delay the critical reforms needed for tion first and then work technological citations, professionalized work roles,
OSINT to professionalize. advancements with haste. OSINT and even organizational silos.
fundamentals include creating official
The emphasis on collection and product lines, growing the number
tools has also meant that industry
v v v
The author: Chris Rasmussen is a Department of Defense Agency officer and the creator of the public-facing OSINT
product platform, www.tearline.mil.
Conflict has two purposes: tracking the uneven evolu- Another lesson is the paradox of war’s regressions.
tion of conflict and emphasizing the importance of lead- The use of gas in the Iran-Iraq War (1980–88) is one
ership in command. The authors describe war’s protean example; the use of famine in Somalia (1991–) another. In
nature; on one hand, its increasing reliance on high-tech, Yugoslavia (1991–96), militias employed rape and death
civilian-driven technology, and on the other, its inexora- squads and commandeered UN peacekeepers as human
ble tendency to regress to more brutal forms. War’s rapid shields. (Meanwhile, their NATO opponents employed
advances can shock—as can its sudden reversals. precision guided munitions.) (219). In the South Ossetian
War (1991–92), virulent nationalism, ethnic cleansing,
At 442 pages of main text, the book is hardly short, yet deliberate attacks on civilians, cities divided into warring
it is selective in what it covers, focusing on conflicts the zones—all sinister elements that reappear in later con-
authors judge contributed to warfare’s evolution. (2) The flicts. (209)
book surveys a variety of unique conflicts of our era, such
as the “slow burn” of Kashmir (39), and near-forgotten Modern sensibilities about war also come into play.
wars in Borneo (1963–66) and Oman (1962–76), which The authors claim a new feature—especially seen in
later influenced counterinsurgency theory. This reader the 1991 Gulf War—is “democracies worried about the
would have welcomed the authors’ views on the Middle acceptable level of enemy deaths.” (199) Likewise, if a
East twilight wars now led by Iran’s “axis of resistance” democratic government fails to recognize that “all wars
militias. are profoundly political,” (230) its army may be under-
mined by betraying its nation’s principles, as happened to
What are the main lessons of war in our era? The the French Army in the Algerian War (1954–62). (65)
authors point out that the Korean conflict (1950–53)
foreshadowed how modern wars end “more messily.” Modern commanders must understand the type of war
(35) Likewise, they maintain that superior technology not that they’re in—not always an easy feat. (44) As disciples
always—or even often—is the deciding factor. Training of Clausewitz, Petraeus and Roberts insist that strategic
and morale still are decisive. In the Arab-Israeli War leaders master four major tasks: grasp the overall strategic
of October 1973, the superb training of Israeli soldiers situation, the “big idea”; communicate sound strategy
enabled them to prevail. High morale was key to Britain’s effectively; press the campaign “relentlessly and
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
Conflict
determinedly;” and adapt strategy to changing circum- progress with the Sunni Arab tribes and opened the door
stances, “again and again.” (4) Successful leaders like to the ISIS insurgency.
Mao Zedong in the Chinese Civil War (1927–49) and
David Ben Gurion in Israel’s war for independence (1948) Petraeus argues he executed the major tasks of coun-
intuitively executed these tasks; unsuccessful command- terinsurgency theory, and he clearly believes sound strat-
ers, like General Westmoreland in Vietnam, did not. (130) egy leads to success. But after two attempts employing
his counterinsurgency model, Petraeus might have offered
In Vietnam, we “failed the Clausewitz test” (79) by more analysis on how theory matched practice. Did our
misunderstanding the nature of the conflict. The authors lack of ultimate success in Afghanistan and Iraq reveal
believe a better strategy emerged after 1968, which also some inherent flaws in modern counterinsurgency strate-
featured the CIA-led Phoenix program to weaken the Viet gy? Can we win in the long run against an enemy fight-
Cong. But efforts were made too late to secure the pop- ing for their homes—a key factor he recognizes in other
ulation. Vietnam ended messily indeed; the Paris Peace conflicts—with an American public tired of long-running
Accords in 1973 permitted 200,000 North Vietnamese conflict and unclear of the “big picture”? Petraeus laments
troops to remain in the south. (123) Getting “the big idea” the inconsistent support from Barack Obama for US
right ultimately might not have mattered against a more efforts in Afghanistan and Iraq. But Obama did seem to
determined enemy. recognize that wars are indeed political, especially those
fought by our impatient democracy.
The Afghanistan chapter is a frank portrayal of the
challenges of counterinsurgency. With its tradition-mind- Conflict offers an inspiring chapter on Ukraine’s
ed population and mountainous terrain, obstacles to innovative and spirited defense against Russia’s clumsy
success in Afghanistan were well known. Petraeus invasion in 2022. The book underscores the importance of
acknowledges our rapid early success outstripped policy. President Zelensky’s inspiring leadership and the “moral
(246). We never solved the Taliban sanctuary problem, forces” of people fighting for their homes. Russians, the
and many of our warlord allies were abusive and corrupt. supposed asymmetric-war masters, were surprised by
We lacked an able and willing partner in the distrust- their own non-military tactics. (363) The authors high-
ful President Hamid Karzai. Moreover, the war never light this first “open-source war” and enthuse about the
achieved the wholehearted commitment of Presidents Ukrainians’ embrace of new technology. As of now, the
Bush and Obama. After a major troop reinforcement, Russians are still in Ukraine and far from beaten. Yet the
Obama compromised by announcing a timetable for with- authors strike a hopeful note. Since 1914, they ask, when
drawal. Petraeus calls this a failure of policy and strategy. has a war of aggression ended in a positive result? (361)
(274) He still believes success was possible if we had
maintained our commitment while the Afghan National How do modern wars end? They don’t, really. War
Army matured. (277) and peace are blurred, perhaps because new technolo-
gy and hybrid-war concepts make it easier to compete
Petraeus also presents the painful tragedy of errors in without open combat. (406) Petraeus and Roberts em-
Iraq. The policy of firing Saddam’s military and civil- phasize that money spent on deterrence is well spent,
ian leaders— “de-Baathfication” —led to self-created and we should not skimp on air-power dominance—no
insurgency, an outcome CIA predicted. (297) Eventually F-35 second-guessing here. Nuclear weapons have placed
by employing a new counterinsurgency doctrine and the undefined limits on war (435), but otherwise, the authors
surge of more troops, we better secured the population avoid contemplating the worst outcomes of the nuclear
and reduced violence. Theory can look a lot smarter with age. As for disinformation, we must get there “first with
more well-armed and highly motivated battalions behind the truth.” (439) Conflict says little about what war might
it. As in Afghanistan, we were foiled by a local partner, look like for modern navies, but if Beijing maintains its
the vengeful Shia Prime Minister Nouri al-Maliki (iron- Taiwan ambition, we may find out before long.
ically backed by our enemy Iran), who dismantled our
v v v
The reviewer: Michael J. Ard is director of intelligence analysis studies at Johns Hopkins University.
North Korea & the Global Nuclear Order: When Bad Behaviour Pays
Edward Howell (Oxford University Press, 2023) 300 pages, bibliography.
The United States–South Korea Alliance: Why It May Fail and Why It Must Not
Scott A. Snyder (Columbia University Press, 2023), 318 pages, notes, index.
The two Koreas are a study in and threatening the world order bring
contradiction. In the northern half of benefits. North Koreans who suffer
the peninsula is a hermit kingdom ruled from economic sanctions and chronic
by a despotic, hereditary dictatorship. food shortages are not priorities for
In the south, the most free, abundant, Kim Jong Un and his elites. Kim may
and successful political entity in Korean genuinely care for his people and want
history. One thing they have in common to improve their lives but this desire
is that relations with the United States, takes the backseat in policymaking,
positive or negative, are key influences when eternal perpetuation of the Kim
in their national security thinking. First- family rule remains the top goal.
time author Edward Howell and long-
time Korea watcher Scott Snyder offer Howell shows that North Korea
readers a close look at how different made its nuclear goals clear as early as
opinions about Washington shape this the 1990s, when the United States and
debate in Pyongyang and Seoul. its allies began their hopeful engage-
ment with Pyongyang. An unnamed US
North Korea’s transgressions are official told Howell that Pyongyang’s
well documented: prison camps, drug lead negotiator claimed that a nucle-
and wildlife trafficking, counterfeiting, ar-armed North Korea could be a US
cyber-attacks, and now selling missiles ally and the North could become “your
to Russia for use against Ukraine. Kim Jong Un is the Israel in East Asia.” (107) A decade later, during the Six-
third generation of Kims to lead the North, founded by his Party Talks, former US officials claimed that the North
grandfather Kim Il Song in 1949. Already there is spec- wanted to be accepted as a legal nuclear weapons state
ulation that a fourth generation is in training: Kim Jong and saw the talks with the US, China, Japan, Russia, and
Un’s young daughter lately has been seen accompanying South Korea as an opportunity to draw attention and get
him on inspections of factories and farms. free goods. (138)
North Korea & the Global Nuclear Order traces the North Korea & the Global Nuclear Order is Edward
history of the North’s nuclear program and its negoti- Howell’s first book. A lecturer in politics at New College,
ations with the United States. Howell describes North University of Oxford, he places North Korea’s foreign
Korea’s stratagem as “strategic delinquency” and asks policy behavior of the last 30 years in a theoretical
“how North Korea has become a nuclear-armed state and framework. The book does not offer solutions; instead,
how we might account for its behavior over the past thirty it spotlights, dissects, and examines a story well known
years?” (2) Howell argues that Pyongyang has benefited among international observers and assumed as an inevita-
materially and socially from delinquency and flouting ble cycle of threats, negotiations, and lies. Readers are left
international norms. Its weapons of mass destruction deter with little doubt that this is a course of action the leaders
rivals, help to shore up the regime, and convey status in Pyongyang will continue in the future.
in negotiations during bilateral and multilateral talks.
(72–81) The collective lessons the international communi- What is left out in Howell’s excellent debut is dis-
ty taught Pyongyang’s leaders is that breaking global rules cussions about North Korea’s strategic credibility. North
Korea has not bargained in good faith and most experts
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
agree that it is not likely to give up nuclear weapons, yet Nuclear Order as vindication of their analysis that
policymakers are drawn to the negotiating table again Pyongyang has lied and cheated for the last 30 years.
and again, looking for a deal or are encouraged to do so. While analysts can feel proud for telling truth to power,
Pyongyang is able to get away with bad behavior because facts and hard-nosed analysis do not help policymakers
it has convinced the world that it will follow through come up with a solution nor make military action on
with its threats to drown its neighbors in a “sea of fire” the Korean Peninsula any more palatable. How far can
if the United States and its allies try to forcibly disarm all-source intelligence help policymakers discern North
the regime. The North’s strategic credibility goes hand in Korea’s threats? How much assurance can the Intelligence
hand with its strategic delinquency. Washington and its Community provide? And, how are our leaders supposed
allies may have overwhelming military advantage over to balance threats of delinquency with possible loss of
the North, but Pyongyang has managed to erode this lead thousands of lives and billions of dollars in damage to one
by developing nuclear weapons and ballistic missiles. of the most populous corners of the world? Regardless of
who wins the 2024 US presidential election, one thing is
Former and current intelligence analysts who worked for sure in North Korea policy: Washington’s choices are
on Korea issues will grin and cringe while reading likely to remain the least worst options in a warehouse
Howell. Some may see North Korea & the Global full of bad options.
v v v
With so much attention focused the United States and South Korea are
on North Korea’s bad behavior, South eroding this foundation, according to
Korea is frequently overlooked. Scott Snyder.
Snyder in The United States-South
Korea Alliance: Why It May Fail and The United States-South Korea
Why It Must Not argues that a key Alliance is focused on the here and
linchpin of the US security system in now. Snyder touches on but does not
Asia is often taken for granted and dive into the history of US-South
provides a passionate argument for why Korea relations, which provides helpful
it must not. context when trying to understand the
dilemma Washington and Seoul face
Snyder is a Korea specialist who has today. The Cold War made for strange
spent a large part of his career studying bedfellows, and the United States
South Korea. His last book was South supported leaders who were less than
Korea at the Crossroads: Autonomy democratic but were staunchly an-
and Alliance in an Era of Rival Powers ti-communist and pledged allegiance to
(Columbia University Press, 2018). Washington. In South Korea, longtime
While North Korea frequently hijacks US support for brutal dictatorships
the center stage, South Korea has fueled left-wing radicals in the 1970s
moved from an impoverished devel- and the 1980s, who distrusted US
oping country to a G20 nation, its consumer electronics motives and are now in positions of influence and power.
and pop culture exports ubiquitous worldwide. South
Korea today is also a thriving democracy, having shed its Broadly labeled as progressives, most of the current
authoritarian roots. US aid, investment, and access to op- leaders and future progressive presidential candidates for
portunities abroad played a big role in South Korea’s rise, the foreseeable future suffered under US-backed South
and the US-South Korean alliance was the bedrock of its Korean dictators either as labor activists, human rights
economic, social, and political transformation. However, lawyers, or student protesters. The progressives are cur-
domestic political antagonism and populist politics within rently in the opposition after losing the 2022 presidential
election by less than 1 percent to the conservatives, who
are generally pro-US in their world view. Progressives pro-North Korea to anti-North Korea—makes longterm
returning to power in Seoul is a question of when, not if, planning and trust-building difficult. In the end, such a
and distrust of the United States and improving relations schizophrenic approach only benefits North Korea and
with North Korea are their core national security prin- China, which share the strategic goal of eroding US influ-
ciples. Snyder writes, “South Korean progressives have ence in Asia. Snyder shows that deeply divided and po-
tended to believe that the United States perceives contin- larized domestic politics is not only an American problem
ued Korean division as being in its interest because it pro- but a global phenomenon; it is not any less disconcerting
vides a pretext for maintaining US forces on the Korean for it.
Peninsula.” (89)
The United States-South Korea Alliance outlines
The progressive-conservative divide in Korean politics the key drivers of domestic politics in US-South Korea
extends to Japan as well, especially the issue of “how relations, with precise analysis of how they shaped the
to deal with the legacy of the Japanese imperial rule.” alliance in the last five years. It is a wonderful addition to
(108) The starkest example of this is how quickly Seoul’s the field, and Snyder shows his mettle as a key observer
ties to Tokyo changed following the election of conser- of Korean affairs. In the end, Snyder falls victim to his
vative President Yoon Suk Yeol, who shelved historical own successes. He does such a great job identifying the
grievances to prioritize security relations with Japan and challenges facing the alliance, his policy recommen-
the United States to counter North Korea. This was in dations come across as shallow and unconvincing. The
stark contrast with his predecessor progressive President author, in the last chapter, recommends that “as part of its
Moon Jae-in who weaponized historical grievances alliance-strengthening efforts, the United States should
against Japan for domestic political purposes. (115) As consistently make the case for forward-deployed influ-
South Korean dictators once unfairly labeled progressive ence on the Korean Peninsula through the deepening of
activists “communists,” the Moon administration labeled institutionalized policy coordination between the two
critics of its Japan policy as “Japanese sympathizers,” sides” and that the United States should “critically evalu-
evoking “historical analogies to play on Korean emotions ate domestic South Korean obstacles to the perpetuation
in opposition to Japan.” (115) of the alliance and pursue counters to overcome such
obstacles.” (270) Internationalists in the United States and
Hotly contested elections and changes in policy South Korea who value allies and alliances can hope for
orientation are characteristics of a healthy democracy. such an outcome, but this reader is left to wonder if it’s
However, the possibility of a dramatic shift in Washington not a bridge too far.
and Seoul—from pro-alliance to anti-alliance or from
v v v
The reviewer: Yong Suk Lee is a visiting scholar at the Hoover Institution, Stanford University.
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
Russia in Africa
By the mid-2000s, Russia began devoting even more Russian-supported security. a b African countries partner-
attention to Africa, supporting development through ing with Russia on security may soon learn the hard way
institutions such as the UN, the African Union, various that Russia’s poor record in transnational counterterrorism
African regional organizations, and the BRICS alliance. and its disastrous “Grozny Model” of counterinsurgency
Russia presented its Africa policy as principled. It increas- could very well accelerate terrorist and popular threats to
ingly used soft power such as foreign aid and commercial their regimes.
relations to advance its interests. This allowed Russia to
portray itself as an alternative partner to the West, a critic The book’s chronicle of Russia’s return as a great
of France on the continent, a bridge between underdevel- power in Africa can make readers conclude that Moscow
oped and developed economies, and a crisis mediator. capitalized off a corresponding drop in Western interest
in the continent, perhaps due to wars, threats, and crises
As Ramani points out, at the same time, Russia often elsewhere. This conclusion has merit. As Ramani points
showed counterrevolutionary tendencies by dithering out, in recent years the United States has been more
on popular uprisings against old regimes during the focused on China’s actions in Africa and has dealt with
Arab Spring and by opposing Libyan dictator Gaddafi’s Russian initiatives there on an ad hoc basis. At least
overthrow and international efforts to intervene on symbolically, the US position in Africa was not helped
behalf of popularly elected Ivoirian President Ouattara when then President Trump omitted any mention of
when incumbent Laurent Gbagbo refused to step down. Africa during his 2019 address to the UN. Some observ-
Russia’s anti-Western tone in Africa also became more ers believe Russia is filling a vacuum left by the West in
pronounced. Russia opposed and undermined US initia- the Sahel and in the Central African Republic (CAR).
tives in Africa and capitalized on apparent US neglect. It Russia may in fact be chiefly responsible for this vacuum
reached out to smaller nations to garner more support (or through disinformation that incites fragile and exploitable
less opposition) in the UN to its global activities. African governments into believing the narratives that the
West is unreliable and that Russia offers a panacea to their
Ramani documents how, by Vladimir Putin’s fourth problems.
term as president, Russia appeared to have regained its
status as a continent-wide great power in Africa. A highly Russia is often the partner of last resort for African
symbolic event, the first Russia-Africa Summit in 2019 pariah states and countries that have exhausted the
in Sochi, highlighted Russia’s accomplishments on the budgets and patience of traditional partners in develop-
continent and its commitment to Africa’s future. Amid the ment. These regimes still need basic assistance to operate
flash and the customary anti-Western hyperbole, Russia (or to protect their skins from their own people) and tend
trumpeted $12.5 billion in new ventures with African to under-price their mineral wealth in return for Russian
partners. Ramani carefully researched Russian commer- security lifelines. As a préfet (governor equivalent) in a
cial activity across the continent and their mixed results. particularly violent area of the CAR told the BBC, “When
your house burns and you shout: ‘Fire! Fire!’ You don’t
Russia’s bread and butter, however, remains its mili- care if the water you are given is sweet or salty. All you care
tary sales. Intervention in Syria created new opportunities about is that it extinguishes the flames.” c
for security cooperation across Africa and showcased
Russian military equipment and capabilities it then Russia’s poor record of delivering on its promises calls
promoted on the continent. Credible reports of civilian into question the longterm sustainability of its model in
massacres conducted by Russian mercenaries in the Africa. By the time of the second Russia-Africa Summit
Sahel, however, called into question the effectiveness of in 2023 in St. Petersburg, Russia direct investment in
a. Catrina Doxsee, Jared Thompson, “Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost
in Mali,” Center for Strategic & International Studies, May 11, 2022. https://www.csis.org/analysis/massacres-executions-and-falsi-
fied-graves-wagner-groups-mounting-humanitarian-cost-mali.
b. “Central African Republic: Human Rights Violations against Civilians by the Central African Armed Forces (FACA) Are Unacceptable,
Says UN Expert.” February 20, 2023, https://www.ohchr.org/en/press-releases/2023/02/central-african-republic-human-rights-viola-
tions-against-civilians-central. Accessed April 15, 2024.
c. Yemisi Adegoke, “Why Russia Is Winning Hearts in the Central African Republic” BBC News, December 10, 2023. https://www.bbc.
com/news/world-africa-67625139.
Africa remained at about 1 percent of the continent’s total Ramani finished this work before the Wagner mutiny
inflow. Despite the lofty promise Putin made four years and before Prigozhin had cause to worry too much about
earlier in Sochi to double trade with Africa in five years, air travel. Therefore, the book does not cover Russia in
Russian trade with Africa had in fact fallen.a Seventy Africa in the post-Prigozhin era, but Ramani addresses
percent of that trade was with four countries: Egypt, the minimal adverse impact Russia’s now two-year war
Algeria, Morocco, and South Africa. b in Ukraine has had on its Africa strategy and relations.
Indeed, as this review was written, Russia continued pre-
Ramani also analyzes how Russia used instruments of paring its summer offensive against Ukraine and Russian
national power in six of its interventions in Africa from military advisers had arrived in Niger at a time when the
2018 to 2020: Guinea, CAR, Libya, Sudan, Madagascar US-Niger security partnership was under unprecedented
and Mozambique. Not all the interventions were suc- stress.
cessful, but the Russian approaches were illuminating.
Ramani’s examples of Moscow’s diplomatic, informa- Russia in Africa is well written and straightforward.
tional, military, and economic levers would be suitable Readers who are not steeped in Russia or Africa will
for military war college students researching the DIME find it easy to follow. In addition to the book’s thorough
framework. His chapters on Russia’s COVID-19 policy research and balanced analysis, Ramani does a service to
and the new frontiers of Russian security in Africa are readers wanting to undertake further study by listing his
timely retrospectives of significant recent Russian actions wide range of sources. Had there been room for another
on the continent. chapter or two in this book, Africa watchers would have
probably welcomed a longer and deeper look at the
In Africa at least, Russia’s default is to act unilaterally. history of Russia in Africa to better appreciate Russia’s
Russia and China may appear to have common interests, long legacy. Intelligence officers working Africa will find
but the two countries do not really cooperate with each this book exceptionally useful in gaining a solid under-
other on Africa outside of UN Security Council voting. standing of Russia’s national strategy and its methods in
As Ramani points out, Russia sees instability in Africa Africa.
as a geopolitical opportunity while China sees it as an
existential threat to its Belt and Road Initiative, which is Perhaps African governments and regimes that partner
intended to expand China’s economic and political power with Russia will find another Finnish proverb useful:
(249). Despite its attention-getting recent gains, Russia “When you’ll try to be a friend with a Russian, keep the
may ultimately be destined to remain a second-tier power knife near!”
in Africa, alongside the UK, India, Japan and Turkey and
looking up at the US, China, and France (246).
v v v
The reviewer: Charles Long is the pen name of a retired CIA operations officer who served in Africa.
a. Vadin Zaytsev, “Second Russia-Africa Summit Lays Bare Russia’s Waning Influence,” Carnegie Endowment for International Peace,
July 31, 2022. https://carnegieendowment.org/politika/90294.
b. Joseph Siegle, “The Russia-Africa Summit is coming, but Putin barely invests in the continent while the mercenary Wagner Group rages
across the countryside,” Fortune, July 24, 2023, https://fortune.com/europe/2023/07/24/why-russia-africa-summit-vladimir-putin-yevge-
ny-prigozhin-wagner-group/.
“Even in the darkest of times we have the right to expect or blazing suns,” that
some illumination,” states Hannah Arendt in her introduc- illuminates the past
tion to Men in Dark Times (1968). As a German Jew who and challenges the
observed the rise to power of Hitler and the Third Reich, Western misconcep-
Arendt herself knew well what the “darkest of times” tion that China today
meant. After she fled Germany in 1933 and emigrated to is merely an authori-
the United States in 1941, Arendt became one of the 20th tarian monolith. (xv)
century’s most esteemed philosophers and historians. To de-
scribe how a seemingly ordinary man like Adolf Eichmann Spark also was
could become so heavily implicated in the Nazi atrocities of the name of a short-
the Holocaust, Arendt coined the now famous phrase “the lived, 1960 stu-
banality of evil.” Yet alongside such men existed others dent-run journal in
who gave Arendt hope: “Whether their light was the light of the town of Tianshui
a candle or that of a blazing sun.” (near Wuhan) that challenged official accounts of the Great
Leap Forward (1958–62). While the CCP claimed it was a
It may come as a surprise that Ian Johnson used resounding success, it tragically became the greatest man-
Arendt’s quote to open a book not on early to mid-20th made famine in world history.a The first issue of Spark
century Europe, but rather 20th and 21st century China. draws on the theme of flickering light to illuminate the
Furthermore, Johnson’s protagonists are not well-known crimes of an oppressive regime through a poem written by
dissidents such as Rosa Luxemburg or Karl Jaspers one of its founders, Peking University student Lin Zhao. In
or others chronicled in Arendt’s book, but rather ordi- “A Day in Prometheus’s Passion,” Lin details an encounter
nary Chinese such as Ai Xiaoming and Jiang Xue who between the Olympian god Zeus and Prometheus, who
often remain inside the system to attempt to “correct the is eternally damned for daring to give humans fire. Zeus
[Chinese Communist] Party’s misrepresentation of the explains it thus to Prometheus:
past and change their country’s slide toward ever-stron-
ger authoritarian control.”(x) This, however, is precisely But you ought to know, Prometheus,
why Johnson chooses to open his latest book with Arendt. for the mortals, we do not want to leave even a spark.
These ordinary Chinese, who Johnson calls “histori- Fire is for the gods, for incense and sacrifice.
ans”—meaning “shorthand for a broad group of some How can the plebeians have it for heating or lighting in
of China’s brightest minds: university professors, inde- the dark? (74)
pendent filmmakers, underground magazine publishers,
Spark would challenge the presumption that “fire is
novelists, artists, and journalists.”(x) To Johnson, these
for the gods” and provide at least a “spark” of truth to the
historians represent a “spark,” whether “flickering candles
“plebeians.”b Although Spark was quickly snuffed out,
a. The Great Leap Forward was originally envisioned as a two-pronged campaign by Mao for rapid collectivization and industrialization.
However, it failed on both counts – the intensive “backyard furnace” campaign meant that farmers were even “stripped of the tools they
needed to farm.” Furthermore, efforts at collectivization within a system that brooked no opposition meant that statistics of grain yields
were often inflated in order to placate higher-ups. This, in turn, led to the heavy taxation of the countryside for grain that did not, in fact, ex-
ist, meaning that people starved to death. (49–50) For one of the most complete works on this period, Johnson recommends Yang Jisheng’s
Tombstone: The Great Chinese Famine, 1958–1962, translated by Stacy Mosher and Guo Jian (Farrar, Straus and Giroux, 2013)
b. Perhaps ironically, the name of the journal Spark invoked a phrase popularized by Mao Zedong’s writings: “xinghuo liaoyuan,” or “a
single spark can start a prairie fire” (75).
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
Sparks
its rediscovery decades later by underground historians However, I prefer to use the English translation “sites
such as Hu Jie and Cui Weiping unearthed the bravery of memory” rather than “places of memory” to empha-
of individuals such as Lin Zhao, Zhang Chunyuan, and size that while many of these “sites” are indeed physical
Tan Chanxue, who were ultimately martyred for daring to locations, Nora’s original definition is actually more
speak out. all-encompassing. According to Nora, a “site of memory”
includes “any significant entity, whether material or
Between 2008 and 2020, Johnson visited many under- nonmaterial in nature, which by dint of human will or
ground historians in their homes and as they worked in the work of time has become a symbolic element in any
the fields to uncover the truth about China’s recent history community.”a Thus, while a concrete physical site such
in the vein of the jianghu—a term that literally means as the notorious Ditch (Jiabiangou)—at the edge of the
“rivers and lakes,” connoting an untamed wilderness and Gobi Desert in Gansu Provinceb—or a museum such as
a place of escape for bandits who lived outside of the law. the National Museum of Chinac can be “sites of memory,”
Yet these jianghu bandits in traditional Chinese culture so, too, could the journal Sparks or even the concept
often lived by their own strict code of moral conduct, of the jianghu that informs so much of the zeitgeist of
acting as Robin Hood figures who stole from the rich underground historians in China today. While the dozen
and corrupt and championed the poor and downtrodden. vignettes that Johnson includes were indeed powerful, I
Jianghu historians, as Johnson calls them, have existed do wish that each “site of memory” was a bit more dis-
since the beginning years of the People’s Republic of tinctly defined.
China but, he asserts, more recently have “melded into
a nation-wide network that has survived repeated crack- This quibble aside, I highly recommend Sparks to
downs,”(xi) in part thanks to new digital technologies and anyone who wants to understand China better today. In
other techniques that more successfully bypass the CCP’s Johnson’s in-depth coverage of so many inspiring in-
sophisticated censorship apparatus. dividuals and their important work, Sparks challenges
the notion that the CCP has succeeded in thoroughly
In chronicling these historians and their work, Sparks whitewashing history to adhere to its perspective.d The
is divided not only chronologically (past, present, and books chronological span, from the Yan’an era of the
future), but also geographically (the book takes us from 1930s to the Covid-19 pandemic, is impressive, as is the
the northwest Hexi Corridor in a roughly clockwise direc- diversity of its subjects. Moreover, I particularly ap-
tion to the north, east, and south, until we end up on the preciated Johnson’s conclusion, which challenges us to
Tibetan Plateau to the southwest) and by a dozen evoca- “retire certain cliched ways of seeing China” (298). We
tive vignettes that Johnson labels as “memories.” Here, must engage with China’s “counter-historians” and their
Johnson borrows from Pierre Nora’s early 20th century important contributions to global conversations about
concept of “places of memory,” or lieux de mémoire. the past, present, and future. Furthermore, we must avoid
Johnson defines these “places of memory” as “physical making the mistake, which the CCP is all too keen to
locations where history resonates – battlefields, museums, promote, that the party is China and the sole representa-
or execution grounds” (xiii). tive of 1.4 billion people. With increased authoritarian
rule under Xi Jinping in China and threats to democracy
a. Pierre Nora, ‘Preface to English Language Edition: From Lieux de Mémoire to Realms of Memory,’ in Pierre Nora, ed., Realms of Mem-
ory: Rethinking the French Past (Vol. 1: Conflicts and Divisions) (Columbia University Press, 1996), xvii.
b. This was the “most notorious labor camp in China, a place where thousands were worked and starved to death in the late 1950 and early
1960s” (16). For a detailed description, see Richard Brody, Dead Souls, Reviewed: A Powerful New Documentary About Political Persecu-
tion in China” in New Yorker, December 19, 2018.
c. Xi Jinping made his famous visit here in 2012 to visit the exhibit “The Road to Rejuvenation” (fuxing zhilu), which summarizes the
CCP’s legitimizing narrative – after the Century of Humiliation by Western powers and Japan, the CCP saved the Chinese people from
disgrace and destruction after coming to power in 1949. The Great Leap Forward and the equally tragic Cultural Revolution, however, are
all but skipped over. (130)
d. According to the CCP, its armies did the majority of the fighting against Japan; the party’s campaign of land reform was just; Lei Feng
did indeed write the patriotic diary entries published by the People’s Liberation Army as a model of loyalty and selflessness; and China
entered the Korean War in self-defense. Although Johnson admits that “some of these issues might seem trivial,” he effectively argues that
“allowing a discussion on these topics would challenge key tenets of why the Chinese Communist Party ruled China” (123).
on a global scale, Johnson has reminded intelligence and for positive change, even in places as tightly controlled as
national security professionals to nevertheless remain on China.
the lookout for the “sparks” that might ignite the passion
v v v
The reviewer: Emily Matson is assistant teaching professor of Modern Chinese History at Georgetown University’s
Edmund A. Walsh School of Foreign Service and Georgetown College of Arts & Science, Department of History.
Reviewed by JR Seeger
v v v
The reviewer: JR Seeger is a retired CIA operations officer.
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
until the arrival of Ronald Reagan 30 years later. As he offers a brilliant narrative of how all the different strands
entered the race for the party’s presidential nomination in of Eisenhower’s governing strategy—an enduring Cold
1952, he blocked the Old Guard around Senator Robert War defense posture resting on a continuum from nuclear
Taft, a wing that with the help of McCarthyism had threats to covert action combined with balanced budgets
come to dominate the Republicans. Taft, and by exten- and sober administration—began to fall apart under the
sion McCarthy, represented the small-town Midwestern onslaught of a reinvigorated Democratic Party with a
form of conservatism: suspicious of government and youthful leader in John F. Kennedy.
virulently anti-communist. To relative moderates in the
party who felt more comfortable with two-time nominee Eisenhower’s approach had always been vulner-
Thomas Dewey, Eisenhower saved the party and able to the widespread fear during the 1950s that the
big-business capitalism from the radical populists. As Soviets represented a larger, almost omnipresent threat.
president, Eisenhower shaped a consensus later known as Unbeknown to most of the public until 1960, Eisenhower
Rockefeller Republicanism that ideologically pushed back administration officials and some in Congress benefited
against the dynamic of the New Deal while retaining its from the groundbreaking U-2 intelligence that revealed
popular programs, with balanced budgets and pro-market the Soviet Union’s nuclear forces were not as robust as
ideology. commonly thought. When the Soviets launched Sputnik
in 1957, however, the dam holding back the sum of all
CIA played a crucial role not just in Eisenhower’s fears broke and the administration struggled to address
Cold War strategy, but indirectly in his overall govern- public pressures to acknowledge—inaccurately, accord-
ing philosophy of keeping costs low; a prime motive for ing to CIA assessments at the time—that Eisenhower had
making use of CIA’s covert action capabilities was to underestimated the Soviet threat. Democrats, including
achieve vital foreign policy ends on the cheap. Hitchcock Kennedy, who had access to CIA analysis, hammered the
adopts a critical view of CIA’s role within Eisenhower’s Eisenhower administration relentlessly on all manner of
overall Cold War strategy. He implies that DCI Allen domestic and foreign policies, especially Eisenhower’s
Dulles, who took over from Bedell Smith in 1953 and led containment strategy as both too dangerous (as it relied
the CIA until John F. Kennedy fired him after the Bay of too much on nuclear retaliation), and too weak (with
Pigs disaster, capitalized on Eisenhower’s effort to avoid insufficient conventional forces to counter Soviet proxy
a hot war with communist forces after the Korean War wars in the developing world), including in Southeast
ended in 1953, while pushing back on perceived commu- Asia. With this in mind, the Bay of Pigs invasion,
nist inroads into what Eisenhower administration officials green-lighted by the Eisenhower administration in 1960,
and the coalescing foreign policy establishment referred represented an ignominious end to Eisenhower’s foreign
to as the “free world.” Dulles spotted this willingness of policy and the Allen Dulles era at CIA.
Eisenhower to embrace covert action with the 1953 coup
against Iranian premier Mohammed Mossadegh, a feat Hitchcock offers a comprehensive and helpful history
repeated in Guatemala with the ouster of Jacobo Arbenz of the Eisenhower administration that should resonate
Guzman in 1954. Along with covert action, Eisenhower among readers who may not specialize in any particular
enthusiastically embraced Dulles’s sponsorship of the U-2 aspect of the Eisenhower era but who require a good
program, which provided a gold mine of intelligence on overview to guide them to the larger arena of historical
Soviet strategic capabilities. literature on the 1950s and America’s role in the Cold
War. For intelligence historians and readers of this publi-
By the late 1950s, Eisenhower’s system began cation in particular, The Age of Eisenhower offers a well
to unravel. Hitchcock’s account of the last years of written, judicious, and appropriately critical account of
Eisenhower’s presidency is the book’s most dramatic and Eisenhower presidency that is well worth the read.
v v v
The reviewer: James Van Hook is an analyst in CIA’s Transnational and Technology Mission Center.
Former assistant CIA inspector general Howard Cox’s but later removed
look at one of America’s worst—and the highest placed— him for “lack of
traitors in the nation’s nearly 250-year history is a well aptitude.”
researched, thorough volume that stands as the definitive
work on this unfortunate figure. Although most Americans Settling in
know about Benedict Arnold, Rick Ames, and other infa- Kentucky after the
mous spies’ treachery, Wilkinson’s has long gone unno- war, Wilkinson
ticed, even though it had the potential to inflict significant led efforts to split
damage on the United States. Moreover, unlike those trai- the region from
tors, Wilkinson repeatedly evaded justice throughout his Virginia. In 1787
long life. Cox’s volume examines not only Wilkinson’s he traveled to the
deceit but, perhaps most importantly, how and why he Spanish colonial
evaded justice for so long. It marks a welcome contrast to capital New Orleans to arrange trade deals for Kentucky
some earlier biographies. but found instead an unexpected opportunity for personal
profit and advancement. Meeting with Spanish officials,
Cox weaves the fascinating story of Wilkinson’s life he proposed leading Kentucky not into statehood but
throughout. Born March 24, 1757, in Charles County, rather into becoming a Spanish possession—which he
Maryland, Wilkinson studied medicine before the would head—and offered to spy for Spain in exchange
Revolution interrupted and in 1775 was commissioned an for support and money. Spain quickly accepted, dubbing
infantry captain. He took part in the Battle of Bunker Hill Wilkinson “Agent 13.” This bit of good timing was
and operations around Boston. Exceptionally ambitious, followed by another when Wilkinson’s failed business
he quickly realized that line command was thankless work efforts led him back into the US Army at just the moment
and instead obtained a position as an aide to Generals President Washington needed to rebuild the military from
Nathaniel Greene and later Benedict Arnold during the the Continental Army’s remains. By swearing allegiance
retreat from Canada. In 1777, Wilkinson became General to the United States as a military officer, having just
Horatio Gates’ adjutant-general, carrying messages sworn allegiance to the king of Spain, James Wilkinson
between Gates, Arnold, and other senior commanders at became a spy and traitor to the United States.
the Battles of Saratoga. This role took Wilkinson’s natural
penchant for self-serving intrigue and backstabbing to a Rising exceptionally rapidly through the ranks of the
new level, leading to his playing a central role in infight- infant US Army, in 1792 Wilkson was appointed sec-
ing between the top Continental generals that denied ond-in-command to army chief and Revolutionary War
Arnold credit for his leadership accomplishments, feeding hero General Anthony Wayne. This assignment offered
bitterness that played into the onetime patriot hero’s later new possibilities for his career and for spying for Spain.
treason. Rising again through scheming, Wilkinson played Tension between the two appeared instantly, and upon
a central role in the Conway Cabal, which used back- discovering his deputy’s Spanish ties, Wayne moved to
channel maneuvering to attempt to replace Washington file charges. But Wayne’s sudden death—Wilkinson was
with Gates as army commander. Forced by the Cabal’s suspected of poisoning him—not only ended the investi-
exposure to resign his commission, Congress appointed gation but at once made Spain’s Agent 13 the US Army’s
Wilkinson the army’s “clothier-general” supply master, commander.
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be con-
strued as asserting or implying US government endorsement of its factual statements and interpretations.
American Traitor
Switching his political affiliation and the Founders’ either useful or inconvenient to political leaders’ agendas.
disdain for things military enabled Wilkinson’s to remain Wilkinson became helpful in Jefferson’s ongoing strug-
as head of the army through four presidential adminis- gle with Burr, but leaders like Washington, Adams, and
trations. Throughout much of that time Agent 13 was Madison seemingly chose to ignore inconvenient facts
reporting to his Spanish handlers and readily taking about their army commander lest those issues further
their money in return. Although Wilkinson flirted with complicate or undermine their administrations’ policy
Aaron Burr’s cabal, which was planning to create a new efforts. Cox, a former trial attorney, brings a unique mix
nation beyond the Appalachians, in the end calculated of legal and historical analysis in evaluating and explain-
self-interest led him to abandon Burr and become one of ing each of these cases that will stand for years as the best
Jefferson’s key witnesses in advancing charges against the explanation for Wilkinson’s surviving these professional
former vice president. Yet Wilkinson was more loyal to legal storms.
Spanish gold than to President Jefferson, not only reveal-
ing to Spain the routes of American exploration parties of If Cox wrote this volume in part to fill a void left by
Lewis and Clark and others, but advising Spain to attack the only other recent biography of Wilkinson—a work
or capture them and offering other ideas to boost Spain at that has been criticized for being too indecisive and
America’s expense. Although later Spain’s retreat from “fair” in weighing Wilkinson’s actions—then he succeeds
much of North America gradually ended his value as a spy, admirably.a Readers never wonder about Cox’s view that
Wilkinson never ceased pursuing a pension from the king. Wilkinson’s life was one of self-serving treachery, betray-
ing the nation that had given him so much. Reflecting this,
Cox explains and explores these and many more of nearly every chapter carries subhead quotes by contempo-
Wilkinson’s failed and often despicable acts—lapsed raneous fellow Wilkinson critics that will have the reader
leadership during the War of 1812, leaving his troops in periodically laughing aloud with their intended snark.
starving squalor so he could pursue his wealthy soon-to-
be second wife, and backstabbing rivals, colleagues, and My only quibbles with Cox’s work are minor. His
presidents—through the 1815 end of his army career and pursuit of detail sometimes heads so deep into rabbit
his 1825 death in Mexico City, where he was trying to holes that a reader must pause to recall how it fits with
exploit that nation’s political upheaval for his own gain. the main narrative, although patience is rewarded in each
Nowhere will readers find a more detailed, thorough biog- case. Infrequently, the author misuses intelligence termi-
raphy of James Wilkinson. nology—for example, labeling Wilkinson in one instance
a double agent, when in fact he was never doubled and
Perhaps of even greater value, however, are the book’s spied only for Spain—but this is offset by applying his
later chapters that explore the 1808, 1811, and 1815 legal valuable legal insight to these historic intelligence issues.
inquiries and courts martial convened to weigh charges
brought against Wilkinson for spying, malfeasance, Cox’s book is particularly valuable as the nation
and corruption. That despite the weight of considerable begins celebrating its 250th birthday, adding scholarly
evidence in each of these cases Wilkinson managed to insight about a little known—if despicable—figure whose
dodge justice each time has long challenged historians’ account deserves to be recalled honestly and accurately.
understanding. Cox’s conclusion shows that Wilkinson Intelligence officers interested in the early American role
was as lucky as he was deceitful, in each case benefit- of their craft will particularly find Cox’s American Traitor
ing from facing imperfect and nascent US laws or being an informative, enjoyable read.
v v v
The reviewer: David A. Welker is a member of the CIA History Staff.
General
A New Vision of Spycraft: Or Necessary Notations on Espionage, by Daniele-Hadi Irandoost
Memoir
CLASSIFIED!: The Adventures of a Molehunter, by Nigel West
History
Alfred Dreyfus: The Man at the Center of the Affair, by Maurice Samuels
The Red Hotel: Moscow 1941, the Metropol Hotel, and the Untold Story of Stalin’s Propaganda War,
by Alan Philps
Women In Intelligence: The Hidden History of Two World Wars, by Helen Fry
World War I and the Foundations of American Intelligence, by Mark Stout
Fiction
Ilium, by Lea Carpenter
All statements of fact, opinion, or analysis expressed in this article are those of the reviewers. Nothing in the article should be
construed as asserting or implying US government endorsement of its factual statements and interpretations.
General
A New Vision of Spycraft: Or Necessary Notations on Espionage, by Daniele-Hadi Irandoost (Manticore Press,
2023), 184 pages, endnotes, bibliography, no index.
In his preface to this book, British poet and essayist His semantic difficulties continue when he turns to what
David William Parry notes, after some muddled irrelevant he terms the mechanics of espionage. After outlining the
commentary, that “Spycraft and the world of espionage traditional basic functions of intelligence, he concludes
have always been very far from me.” But this doesn’t that “mass of practical inferences that flow from it in
stop him from “heartily recommending” A New Vision of moral and political calculation, and the method I adopt is
Spycraft to anyone interested in the mechanics of espio- to clear the ground, more rigorously than ever, penetrated
nage including its institutional links to the “deepest and by the genial dew of the soil in which socio-political-
darkest type of occultism.” (11) cultural melioration is found to germinate.” (25)
Aberystwyth University historian, Daniele-Hadi With similar clarity, the balance of the narrative discuss-
Irandoost does state that a connection between intelli- es the ethics of intelligence, as exemplified by the ticking
gence and occultism—oracles—is affirmable in ancient bomb scenario, the “deontology of torture,” Irandoost’s
societies, though he doesn’t suggest any contemporary version of the “Just Intelligence Theory,” the legal
relevance. But he does add semantically confusing com- weaknesses of cyberspace, and intelligence oversight in a
ment on the notion that spying is the second oldest profes- democratic society.
sion: “in reality, what a strain of astonishment and terror,
a concerted hypocrisy and conspiracy, an ambition of Throughout, his views on espionage remain well con-
intrigue and secret influence, and a series of servility and cealed and the precise parameters of his new vision of
cabal, does this scene present to the present state of mod- spycraft are never articulated. His afterword strengthens
ern times!” This assessment leads to the equally ambigu- these assessments. Caveat Lector!
ous statement that the “civilizing of intelligence opens a
door to the revisal of our intelligence community.” (14)
Memoir
CLASSIFIED!: The Adventures of a Molehunter, by Nigel West (Biteback Publishing, 2024), 362 pages, endnotes,
photos, index.
Before he had any thought of becoming Nigel West, Profumo case had diminished, but young Rupert’s interest
Rupert Allason, in his early teens, became aware of the in intelligence matters was permanently established.
British intelligence services—MI5 and MI6—during
the Profumo Affair. That scandal contributed to the fall Classified! tells the story of how his interests developed
of the Macmillan government in 1963 and the disgrace at school, thanks in part to a teacher, Henry Coombe-
of John Profumo, secretary of state for war, after he lied Tennant, a former Benedictine monk and MI6 officer who
to Parliament about his affair with 19 year old Christine also served OSS as a Jedburgh during the war. Coombe-
Keeler who was also seeing a GRU officer. Tennant’s best friend from MI6 was David Cornwell (aka:
John le Carré), who had retired in 1965 and occasionally
Allason’s interest followed naturally from two facts of spoke to the class. Seeking further information, a trip to
the case. The first was that Profumo’s personal private the library revealed a single volume on intelligence: The
secretary was young Allason’s father, also an MP. The Venlo Incident (1951), by former MI6 officer, Sigismund
second fact was that the Profumos and Allasons were Payne Best.
close family friends. By 1964 public attention in the
This was a defining moment for Allason in several re- Geoffrey Elliott to name a few. One that he came to know
spects. First it led to a job as researcher for espionage au- well, in a sense—though never met—was Guy Liddell,
thor Richard Deacon. Second, the Best book was engulfed who became MI5 deputy-director general. Liddell kept
in controversy and efforts to sort things out, including diaries of his MI5 duties—often involving US agencies—
Allason’s finding and interviewing the reclusive Best him- for the last 14 years of his service. After MI5 released
self, established part of his research methodology. Third, them, West edited and published those covering the war
on Deacon’s recommendation, he became an adviser on a years in two volumes.
six-part BBC film series and then wrote the book version
SPY! by Richard Deacon and Nigel West (1980). This was West’s account of the Tsarev connection is interesting
the first appearance of that pen name. West would write and informative in its origins and execution. Two ex-
more than 30 more books over the next 44 years. traordinary, co-authored books, both published by Yale
University Press and based on KGB documents—transla-
The broad scope of West’s work includes intelligence tions included—were the result. The Crown Jewels (1999)
service histories, molehunts, World War II double agents, revealed the existence of an Oxford spy ring analogous
defectors, cryptography, published fabricated accounts, to the Cambridge Five, but provided no names. It also
biographies, military intelligence, and the occasional explained the recruiting roles of the illegal rezidents
teaser. For example, West shows how he confirmed that Alexander Orlov, Arnold Deutsch (Philby’s case of-
Admiral Canaris’ mistress, Halina Szymańska, served as ficer), and other KGB agents. Triplex: Secrets From the
his link to MI6. (147) Whatever the topic, he includes Cambridge Spies (2009) exposed Blunt’s role among
related cases, books and legal battles, thus providing valu- others, in the MI5–MI6 Triplex project, which routinely
able ancillary and bibliographic data. opened the diplomatic pouches of foreign missions in
London during the war.
West’s first independent book, MI5: British Security
Service Operations 1909–1945 (1981) set several prec- When New York banker Geoffrey Elliott wrote West
edents. First, its subject did not officially exist. Second, in 1996 requesting information on Elliott’s father, who
its very interesting case studies were not sourced. Third, had served in the Special Operations Executive (SOE),
ironically, scholars cited the book anyway. Classified! neither man could have anticipated that they would create
finally identifies the sources, many of them senior of- St. Ermin’s Press and publish a number of important intel-
ficers, and explains how he gained their confidence, why ligence books.
he couldn’t mention them earlier, and how they assisted in
later books. Classified! mentions them all, and West’s comments
about one, The Private Life of Kim Philby: The Moscow
While doing his research, West observed that many Years, by Rufina Philby with Mikhail Lyubimov and
books about WWII intelligence operations excluded Hayden Peake (1999), require clarification. West explains
interviews with the agents involved—they were hard to that we took Rufina to dinner in Moscow to encourage
find. He worked to fill the gap and tells how he found and her to accept me as a co-author of the English edition and
debriefed 40 WWII sources, including Anthony Blunt, St. Ermin’s as the publisher. He then explains that she
John Cairncross, and George Blake. The most difficult agreed after learning we shared the same birthday and
case concerned GARBO, the Doublecross agent who year. (319) That discovery was indeed a factor in her deci-
made a difference in the success of D-Day. GARBO was sion she later told me, but the conversation occurred at the
long thought to be dead, but West tells how he found and Philby flat the following day, not at the restaurant.
presented GARBO to Prince Philip at Buckingham Palace
and later co-authored the story with GARBO. Classified!—that title is not explained—tells too little
about the most prolific contemporary intelligence his-
Not all topics in Classified! deal directly with espionage torian, a great deal about his writings, and much about
agents. West recounts interesting contacts with Sir Dick his sources and related books, some not well known. A
White—the only officer to head both MI5 and MI6— unique and valuable contribution to intelligence literature.
CIA Director Bill Casey, KGB officer Oleg Tsarev, and
History
Alfred Dreyfus: The Man at the Center of the Affair, by Maurice Samuels (Yale University Press, 2024), 224 pages,
notes, acknowledgments, index. Reviewed by John Ehrman.
Few of the dozens of books on the Dreyfus Affair pay to the point of blandness, had an enormous impact on
much attention the man at the core of the political convul- his times and the decades that followed. Samuels brings
sion that engulfed France at the end of the nineteenth cen- Dreyfus to life and does a masterful job of explaining him
tury. After all, as the drama unfolded, Alfred Dreyfus— in his various contexts—as a Frenchman, an Alsatian, an
the Jewish French army captain wrongly accused of army officer, and a French Jew—as well as the object of
espionage and then railroaded in a rigged trial—was thou- hope and hatred.
sands of miles offstage, rotting in a small hut on Devil’s
Island off the coast of French Guiana. Some 130 years Samuels assumes a familiarity with the Affair, so Alfred
later the Dreyfus Affair continues to affect French politics, Dreyfus is not for readers new to Dreyfus. But for any-
but Alfred Dreyfus himself remains little understood. one seeking to learn more about the life and times of an
important figure in counterintelligence history, it is well
This is why Maurice Samuels’s short biography of worth reading.
Dreyfus, part of Yale University Press’s Jewish Lives
series, is so welcome. At about 170 pages of text, it is The reviewer: John Ehrman is a retired CIA intelligence
admirably concise but still packed with detail and insights analyst and frequent contributor to Studies.
about Dreyfus who, though in many respects ordinary
The Red Hotel: Moscow 1941, the Metropol Hotel, and the Untold Story of Stalin’s Propaganda War, by Alan
Philps (Pegasus Books, 2023), 451 pages, footnotes, photos, index.
In the summer of 1998, retired DIA senior intelligence As the Wehrmacht advanced, Prime Minister Winston
executive Jack Dziak and I had lunch at the Metropole Churchill persuaded Stalin to allow some journalists to be
Hotel in Moscow with the former case officer of the based in Moscow and to visit the battlefield to document
Cambridge Five, retired KGB Colonel Yuri Modin. the heroic Soviet resistance. Few will argue with Philps
Although the announced reason for the meeting was to that Stalin’s concurrence was not a tribute to the principle
discuss Kim Philby and his colleagues, Modin’s initial of a free press but given to keep the flow of British, and
comments were about the Metropole which he had last eventually American, aid coming. The journalists were
visited in the Stalin era. Somewhat in awe, he said it was one of three groups working in and from the Metropole.
now refurbished though it retained many of its signature
features, especially the fountain in the dining room with The second group consisted of translators, usually mul-
its glass dome. As the conversation shifted to Modin’s tilingual women. Each journalist was assigned one, who
relations with the Cambridge Five, thoughts about the became their eyes and ears. Some, at huge personal risk
Metropole in Stalin’s time faded. In The Red Hotel, revealed the truth about life under Stalin to their journal-
British journalist Alan Philps tells the story we missed. ist. Philps writes that their story is told here for the first
time. (3) The third group, NKVD security officers, moni-
Opened in 1905, the Metropole became the playground tored the first two in the hotel and in the field.
of wealthy Tsarist era merchants and high society. After
the Bolshevik revolution it served as a home for the “girls To the surprise of all the journalists—British and
of the Metropole.” (48) By the time Germany invaded the American, communist and non-communist—who had
Soviet Union on June 22, 1941, it had seen much better struggled to be assigned to Moscow, not a one ever saw
days, although it was still the best hotel in town. the Red Army in action. Every word they wrote was
censored to meet Stalin’s propaganda objectives. Philps
shows they were treated well and went on many field
trips, but reporting on the war was not permitted. The survived the war. Tanya’s story follows a different path
most outspoken and dedicated communist of the group and depended at first on her English language skills. She
on arrival, Charlotte Haldane, eventually returned to would marry her correspondent in the hotel and despite
England frustrated and disillusioned with communism. her anti-communist views, survive. Philps makes her an
George Bernard Shaw saw things differently and dined important character in the story.
with Stalin, though he didn’t stay long. One British cor-
respondent and Moscow friend of Guy Burgess, Ralph The Red Hotel conveys a detailed view of Stalin’s Soviet
Parker, was apparently converted from a trustworthy MI6 Union as it dealt with the press at the working level. It
informant to a Kremlin asset. (149, 195) will come as no surprise that Philps finds many parallels
with contemporary Russia. The Metropole has been refur-
The translators were in a precarious situation. Some bished but, Philps concludes, the Russian government has
had served the NKVD and GRU for years. All had valu- not.
able language skills. GRU agents Alex and Nadya (aka:
Ulanovsky), worked with Richard Sorge in China and Well written, well documented, and a valuable and un-
later recruited Whittaker Chambers in America. (198) usual contribution.
Nadya’s quiet opposition to Stalin is impressive and she
Women In Intelligence: The Hidden History of Two World Wars, by Helen Fry (Yale University Press, 2023), 435
pages, endnotes, bibliography, photos, index.
While researching British intelligence operations prior But these accounts are exceptions. The presumptive
to WWI, historian Helen Fry became convinced that for entry level position for women was as a secretary. Fry
intelligence leaders the idea of “employing women in in- describes many cases of “well educated, highly efficient
telligence … was absolutely unthinkable.” (5) Of neces- and feisty characters,” overcoming this potential limita-
sity, this view would change forever during WWI, though tion and successfully running agent networks, serving as
in many cases the details of their contributions, and those analysts, field radio operators, codebreakers, debriefing
of their successors in WWII, received relatively little at- defectors, and photo-interpreters. (88ff) An outstanding
tention. Based on interviews with participants and recent- example is Jane Archer, who became one of the first MI5
ly released official documents, Women In Intelligence tells staff officers and also served in MI6. (103)
stories of previously unknown contributions by women
and adds operational detail to some formerly reported. With two exceptions, Mata Hari and Virginia Hall, Fry’s
The case of the British nurse is an example of the latter. subjects are British. Mata Hari is included to contrast the
popular misconceptions of the spy-seductress with the
Google “Edith Cavell,” and one discovers she was a realities of cases Fry presents. Virginia Hall, although
British nurse who operated a medical clinic and nursing American, is included because of her distinguished
school in Brussels at the start of the war in August 1914. service in Britain’s Special Operations Executive (SOE)
But as some historians have noted, she was also prob- before she joined OSS.
ably a spy, and that is the reason she was killed by the
Germans. Fry uses recently released archival material to Women In Intelligence contains a most curious and
document her espionage and names her sub-agents for the unexplained factual error: Fry’s observation that “France
first time. remained neutral and unoccupied” during WWI. (10)
The WWII account of Lesley Wyle’s unusual recruit- A principal conclusion of Women In Intelligence is that
ment and her secret recording, transcription, and transla- the contributions of women to the secret world of intel-
tion of Nazi communications finally places her in the ligence, too long obscured by official secrecy, are now
public record. Fry notes that she is just one of many who known to history. A valuable contribution to the literature.
performed similar tasks.
World War I and the Foundations of American Intelligence, by Mark Stout (University Press of Kansas, 2023), 388
pages, endnotes, bibliography, photos, index.
Former CIA analyst and lecturer at Johns Hopkins after WWII, that is when modern American intelligence
University, Mark Stout, has written an interesting and pro- began.
vocative account reconsidering the origins of “American
intelligence.” The use of quotes here is intended to em- Stout doesn’t accept either view and World War I and the
phasize the importance of the term to Stout’s thesis, which Foundations of American Intelligence presents a chronol-
he articulates first in his introduction. ogy of the sometimes bumpy growth of intelligence in the
United States from the Civil War to WWII that he argues
On page one Stout writes: “Ask an American intelli- supports his position. The development of new military
gence officer to tell you when the country started doing intelligence organizations such as the Office of Naval
modern intelligence, and you will probably hear some- Intelligence “some fifty-eight years before the OSS was
thing about the Office of Strategic Services in World War created,” and the War Department’s Military Intelligence
II or the National Security Act of 1947 and the formation Division shortly thereafter (13) are principal examples,
of the Central Intelligence Agency (CIA).” (1) though the State and Justice Department had intelligence
units. And when necessary, ad hoc groups were created to
Stout attributes this view to the general acceptance of assist the president.
two “CIA-centric” myths about modern American intel-
ligence that originated more than 25 years after World In this thoroughly documented account, Stout dis-
War I. “According to the first, the United States neglected cusses the principal intelligence concepts and functions,
intelligence for far too long, and it really took World the foreign liaison relationships developed, the players
War II to change things … little of importance happened involved, and how the units were employed in all the wars
before the establishment in 1941 of the Office of the and threats before WWII. He concludes that by the end
Coordinator of Information, which was reorganized as of World War I, almost all the ideas that define modern
the Office of Strategic Services (OSS).” (2) Stout quotes American intelligence, including the moral necessity
several intelligence officers who have expressed related of espionage, were commonplace among intelligence
views including former director Allen Dulles, who wrote personnel and that “World War I laid the foundations for
“in each of our crises, up to Pearl Harbor, workers in the establishment of a self-conscious profession of intel-
intelligence have had to start in all over again.” (264) ligence.” (14)
Also cited: “a glossy publication from the CIA’s History
Staff—which should know better—is titled The Office of The one question not addressed concerns the need for a
Strategic Services: America’s First Intelligence Agency.” central source of national intelligence for the president as
recognized by Presidents Roosevelt and Truman. WWI
The second myth focuses on the Intelligence Community intelligence certainly helped, as Stout makes clear, but at
and the National Security Act of 1947. “This myth says the outbreak of WWII the military intelligence organiza-
that a necessary component of modern American intel- tions were still independent and competing. Donovan’s
ligence is the existence of a community of agencies that Central Intelligence Group was the first step toward that
somehow exhibits centralization, a function of how intel- goal and one reason modern American intelligence is
ligence agencies interact rather than what goes on inside reckoned from that event. In short, the answer depends on
them.” (3) Since these organizations did not exist until whether one views “American intelligence” as a reference
to national or subordinate unit control.
Fiction
Ilium, by Lea Carpenter (Alfred A. Knopf, 2024), 220 pages. Reviewed by John Ehrman.
Lea Carpenter’s Ilium at first glance appears to be a in the hands of Raja—“the one person on whom I had, in
straightforward novel of espionage, love, and revenge. It an instant, become entirely dependent.”
is all those things, but also an ambitious novel, with much
to say. It doesn’t work quite as well as Carpenter must Most of the remaining two-thirds of the book is a com-
have hoped, but before we get to that, here’s something to plex story of personalities and relationships. Edouard is
keep in mind: Ilium is the Latin name for Troy, the setting an artist and lover of the classics who instructs his visitor
of Homer’s epic poem. on the finer points of Homer and the Iliad; she, in turn,
becomes ever closer to Edouard’s wife, her daughter and,
Carpenter’s story revolves around an unnamed woman especially, Felix, Edouard’s young soccer-obsessed son
narrator who relates events from two decades ago, when from a previous relationship.
she was 21. Already orphaned by then, she had grown
up in London, where her mother had been a housekeeper Eventually Raja lets her in on the rest of the secret,
for a wealthy widow but tried to elevate her status by which we need not go into here, and our narrator, in turn,
claiming to be a “personal assistant.” Thus, our narrator embraces her new world and self. “Espionage is simply
explains, she learned early in life how to pretend to be human interaction performed under exceptional circum-
someone she wasn’t, and that “pretending is freedom.” stances…at its essence, [it is] observation, seduction,
Later, too, she’s told that “espionage loves an orphan,” patience…you have to be willing to forget who you are
and especially one who is naïve, poor, and still lack- in order to inhabit someone else.” Indeed, it turns out that
ing in self-awareness. In other words, she was born for almost everyone else in Ilium also has transformed their
espionage. identity at some point and has a secret past. The gradual
revelation of who has done what to whom and what moti-
Espionage, and love, come in the form of Marcus. He’s vates them makes this a very human tale.
a mysterious man, some 30 years older than our narrator,
whom she meets at a party in London. Marcus sweeps her But it’s also a very complicated story, especially with
off her feet and they quickly marry, seeming to be des- Carpenter’s thoughts about the nature of espionage and
tined to live happily ever after in Paris. the fluidity of identity running through the narrative.
“Most people take a lifetime to find themselves,” our
Of course, it’s not that simple. Before our narrator can heroine says, even as she admits that Marcus “was hand-
live her dream, Marcus’s equally mysterious Lebanese ing me an identity I had been looking for without knowing
friend Raja asks her to do a small favor for them—visit it.” Shifting identities is not a new theme in spy novels
some friends at their family compound at Cap Ferret, on but, perhaps in a reflection of today’s concerns, these
the Atlantic coast of France, and report back on the com- musings about its fluidity sometimes go on a bit too long.
ings and goings of the father of the family, a mysterious You’ll mostly forgive this, however, as Carpenter is a
Russian named Edouard. We want to know everything writer of great skill and subtlety. Her prose is elegant and
you can learn about him,” Raja tells her. Naturally, there’s she never lets things get bogged down. Indeed, the story
also a cover story and a legend for her new identity. moves along, the tension builds and, at under 250 pages
in the print edition, it is concise by today’s standards. The
Now realizing that Marcus has recruited her into espio- climax of the book is what you expect, though the end
nage, our heroine slips into her role and performs per- contains some interesting surprises.
fectly. On her return from Cap Ferret, she reports to Raja
and he, in turn, begins to let her in on the secret behind But then there is the part doesn’t quite work. Carpenter
her mission. Unfortunately, however, Marcus is man with says in her author’s note that Ilium is about “war’s es-
health problems and he dies almost immediately after the sential subjectivity, how a hero to one side is an assassin
Cap Ferret assignment, leaving our narrator pregnant and to another.” For Carpenter, the Trojan War and the Iliad
are templates for using the worlds of intelligence and
espionage to make this point. Edouard recounts the story not just giver her protagonist a name—Helen would do
of the rage of Achilles after Hector kills his close friend, nicely—and be done with it? And what’s with introduc-
Patroclus. Achilles kills Hector in revenge, and Hector’s ing a character, late in the story, a CIA officer called Tracy
father, Priam, sneaks into Achilles tent to confront him Barnes, the name of the man who oversaw the Bay of Pigs
and convince him to return the body. “Priam knew he and invasion? Is this a less-than-subtle hint that all intelligence
Achilles shared in the slaughter, in different ways,” says operations tend toward disaster? If so, I’m pretty sure it’s
Edouard. Carpenter agrees and, ultimately, comes to see lost on almost all of Carpenter’s readers, few of whom are
it all as pointless. If only the spies in Ilium had “been able likely to know the reference.
to sit, and talk, like Piram and Achilles, they might have
discovered the things they shared, like loss. They might Ilium isn’t for everyone. Those looking for realism or
have wept and seen at once the joy and futility in their thriller-style action had best go elsewhere. If your taste
work, that the reckoning they sought was the real chime- runs toward psychological or literary approaches—think
ra.” Carpenter lays it on a bit thick, and I suspect that few Graham Greene—you’ll enjoy this, despite its flaws. But
readers of Studies will find this convincing. if you want something Homeric, stick with the original.
Carpenter isn’t above playing a few more literary games. The reviewer: John Ehrman is a retired CIA analyst and
With all the talk of Greeks, love, war, and revenge, why frequent contributor to Studies.
v v v