<<

DIAGNOSING DISTORTION IN SOURCE REPORTING: LESSONS FOR HUMINT RELIABILITY FROM OTHER FIELDS

GEORGE P. NOBLE, JR.

A Thesis

Submitted to the Faculty of Mercyhurst College

In Partial Fulfillment of the Requirements for

The Degree of

MASTER OF SCIENCE IN APPLIED INTELLIGENCE

DEPARTMENT OF INTELLIGENCE STUDIES MERCYHURST COLLEGE ERIE, PENNSYLVANIA MARCH 2009 DEPARTMENT OF INTELLIGENCE STUDIES MERCYHURST COLLEGE ERIE, PENNSYLVANIA

DIAGNOSING DISTORTION IN SOURCE REPORTING: LESSONS FOR HUMINT RELIABILITY FROM OTHER FIELDS

A Thesis Submitted to the Faculty of Mercyhurst College In Partial Fulfillment of the Requirements for The Degree of

MASTER OF SCIENCE IN APPLIED INTELLIGENCE

Submitted By:

GEORGE P. NOBLE, JR.

Certificate of Approval:

______Stephen Marrin Assistant Professor Department of Intelligence Studies

______William Welch Instructor Department of Intelligence Studies

______Phillip J. Belfiore Vice President Office of Academic Affairs

March 2009 Copyright © 2009 by George P. Noble, Jr. All rights reserved.

iii DEDICATION

This work is dedicated to my dear friend and colleague Nancy Calzaretta, who taught me

most everything I know about the handling of sensitive source information.

iv ACKNOWLEDGEMENTS

I would like to thank Allen Bostdorff for his encouragement and ideas. I would also like

to thank my primary reader, Stephen Marrin, for his adroit direction and many hours of wise counsel. Finally, I am grateful to my family and my employer for allowing me this

time for dedicated study and reflection on the field of intelligence.

v ABSTRACT OF THE THESIS

Diagnosing Distortion in Source Reporting:

Lessons for HUMINT Reliability from Other Fields

By

George P. Noble, Jr.

Master of Science in Applied Intelligence

Mercyhurst College, 2009

Assistant Professor Stephen Marrin, Chair

The views expressed in this thesis do not necessarily represent the views of the FBI.

This paper explores how source reporting can be distorted at each stage of the human intelligence (HUMINT) process within the Intelligence

(USIC) and how that distortion may impact perceptions of source reliability. It first explores the many, sometimes conflicting, meanings of reliability, seeking useful descriptions from other fields to bolster the definition within intelligence. The paper continues with a look at the HUMINT process, followed by detailed discussions of the potential for distortion of source reporting by and between the source, collector, analyst, and editor, again looking at other fields for contributions to understanding. It concludes with observations and recommendations.

The target audience includes the USIC, especially the Central

(CIA) and the Federal Bureau of Investigation (FBI), which both rely heavily on

HUMINT collection. Social scientists, journalists, and legal scholars may be interested in the discussion of reliability and how their fields compare with intelligence.

vi TABLE OF CONTENTS

Page COPYRIGHT PAGE………………………………………………………………. iii DEDICATION…………………………………………………………………...... iv ACKNOWLEDGEMENTS……………………………………………………...... v ABSTRACT……………………………………………………………………...... vi TABLE OF CONTENTS………………………………………………………….. vii LIST OF ABBREVIATIONS…………………………………………………...... x CHAPTER 1 INTRODUCTION……………………………………...... 1 2 LITERATURE REVIEW………………………………... 3 3 PROCEDURES….……………………………………..... 8 4 RESULTS………………………………………………... 10 The HUMINT Process…………………………………… 10 The HUMINT Source……………………………………. 18 The HUMINT Collector…………………………………. 29 The Editor………………………………………………... 56

5 CONCLUSION……….………………………………….. 61 Recommendations………………………………………... 65 Conclusions………………………………………………. 67 BIBLIOGRAPHY…………………………………………………………………. 68 APPENDICES……………………………………………………………………... 74 Appendix A………………………………………………. 75 Appendix B………………………………………………. 77 Appendix C………………………………………………. 78 Appendix D………………………………………………. 79 Appendix E………………………………………………. 80 Appendix F………………………………………………. 81

vii LIST OF ABBREVIATIONS

BCE Before the Common Era BND German Intelligence Service CIA Central Intelligence Agency CPUSA Communist Party USA D&D Denial and DCIA Director, Central Intelligence Agency DIA Defense Intelligence Agency DNI Director of National Intelligence FI Foreign Intelligence FBI Federal Bureau of Investigation FCI Foreign GRU Russian/Soviet Military Intelligence HIS Hostile Intelligence Service HUMINT Human Intelligence INFOSEC Information Security IMINT ISR Intelligence, and Reconnaissance JAG Judge Advocate General (USAF) KGB Committee for State Security (Soviet) MACE Method for Assessing the Credibility of Evidence MID Military Information Division; Military Intelligence Division (US Army) NTSB National Transportation Safety Board ONI Office of Naval Intelligence OPC Office of Policy Coordination (CIA) OPSEC Operational Security OSS Office of Strategic Services

viii RIP Recruitment-in-Place SS Surveillance Specialist (FBI) SSG Special Surveillance Group (FBI) SVR Foreign Intelligence Service (Russian) TECHINT US United States USAF US Air Force USIC US Intelligence Community USN US Navy WFO Washington Field Office (FBI) WMD Weapons of Mass Destruction

ix

1

INTRODUCTION

This paper explores how the routine development of source reporting within the

USIC through targeting, acquisition, documentation, evaluation, and exploitation can lead to the deterioration of product reliability wholly unrelated to purposeful deception by sources. The source reliability caveat contained in most reporting and finished intelligence products1 speaks only to the characteristics of the spy, including his/her trustworthiness, competence, accuracy, and duration of service, while failing to address the loss of reliability that emerges in the intelligence process itself.

The collector and/or dedicated evaluators use the caveat to sum up their evaluation of the ’s motives, abilities, access, and the accuracy of his/her actual output. But are there others involved in the HUMINT process who may potentially distort source reporting? Do intelligence agencies misrepresent the reliability of the source reporting they pass through liaison channels to other domestic and foreign agencies?

This paper will explore the many, sometimes conflicting, meanings of reliability, seeking useful descriptions from other fields to bolster the definition within intelligence.

It will continue with a look at the HUMINT cycle, followed by detailed discussions of the potential for distortion of source reporting by and between the source, collector, analyst, and editor. It concludes with some observations and recommendations.

The target audience for this thesis includes the United States Intelligence

Community, especially the Central Intelligence Agency (CIA) and the Federal Bureau of

Investigation (FBI), which both rely heavily on HUMINT collection. Social scientists, 1 In the writer’s experience, when an analyst draws from a segment of source reporting for use in certain intelligence products, the analyst inserts a warning notice ahead of the specific text to highlight the sensitivity and reliability of the source of that part of the overall text. A brief end of warning statement lets the reader know that the highlighted text is complete. 2 journalists, and legal scholars may be interested in the discussion of reliability and how their fields compare with intelligence. 3

LITERATURE REVIEW

This writer has discovered nothing written specifically on how HUMINT from clandestine sources might be distorted by those who collect, analyze, and publish it.

No discussion of human reconnaissance and surveillance intelligence was found in the context of the vulnerability of their data to distortion as they are collected, processed, analyzed, and disseminated. In this age of spy satellites, the literature tends to focus on TECHINT and dismisses human reconnaissance and surveillance as only tangential to HUMINT collection. Richard A. Best, of the Congressional Research

Service (CRS), focuses exclusively on TECHINT in his 2005 review of surveillance and reconnaissance.2

No literature was uncovered that outlines a specific HUMINT process and how the reliability of source reporting can be distorted through that process. Such a process would apply the collection, processing, analysis, production, and dissemination nodes of the traditional . Biographies of , , John

Walker, among others, tell individual stories of but say little about the elements of the intelligence cycle beyond the interaction between source and handler. Even general studies of HUMINT, like Frederick Hitz’s Importance and Future of Espionage,3 focus primarily on operational security (OPSEC) and covert operations.

Literature was found on quantitative assessment of human source evidence in intelligence, but it focuses on assessing the source and thus has little applicability to this thesis. In particular, David A. Schum and Jon R. Morris developed the MACE (Method 2 Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs : Issues for Congress, CRS Report for Congress, 22 February 2005. 3 Hitz, Frederick P. “The Importance and Future of Espionage,” in Strategic Intelligence Vol. 2: The Intelligence Cycle, ed. Loch K. Johnson (Westport, Connecticut: Praeger Security International, 2007). 4 for Assessing the Credibility of Evidence) system, which uses Baconian and Bayesian analysis to rate incremental pieces of evidence to discern the probability that a human source is providing competent and credible information. Schum and Morris’s interest in applying lessons learned in cross examination of witnesses may have some application in future research based on this paper’s conclusion that asset vetting ought to adopt the courtroom model.4

The intelligence literature lacks coverage of the operational side of the HUMINT process, especially the period between the meeting of source and handler and the production of source reporting and finished intelligence. CIA methodologists such as

Sherman Kent5 and Arthur Hulnick6 from the CIA’s Directorate of Intelligence (DI), and even Richards J. Heuer, Jr.7 from the CIA Directorate of Operations, have written much of the scholarly literature on the intelligence process over the past fifty years from the inside the Beltway perspective of national . Their writings have a DI- centric view that focuses on the CIA’s obligation to communicate with the highest levels of government. They do not elaborate on the operational side of the intelligence cycle.

The DI perspective has so overwhelmed the literature that intelligence method has begun to normalize the analytical priority of the intelligence cycle. Hulnick’s dismissal of 4 Schum, David A. and Jon R. Morris. “Assessing The Competence and Credibility Of Human Sources Of Intelligence Evidence: Contributions From Law And Probability.” Law, Probability, and Risk, Vo. 6 No. 1- 4, pp. 247-274, 7 April 2007. 5 For further information, see "Sherman Kent and the Profession of Intelligence Analysis." (Davis, Jack. Occasional Papers 1, no. 5. Washington, DC: CIA, The Sherman Kent Center for Intelligence Analysis, November 2002). Davis says, "Of the many individuals who paved a pathway for the development of intelligence analysis as a profession, [Sherman] Kent stands out -- both for his own contributions to analytic doctrine and practice, and for inspiring three generations of analysts to build on his efforts to meet changing times.... If intelligence analysis as a profession has a Founder, the honor belongs to Sherman Kent.” Prominent writings include his Strategic Intelligence For American World Policy (Princeton: Princeton University Press, 1949). 6 Hulnick’s writings include “The Intelligence Producer-Policy Consumer Linkage: A Theoretical Approach” (Intelligence and National Security, vol. 1 no. 2, 1986); “Managing Analysis: Strategies For Playing The End Game” (Journal of Intelligence and Counterintelligence, vol. 2 no. 3, 1988). 7 Heuer is especially well known for his Psychology of Intelligence Analysis (Washington, DC: CIA, Center for the Study of Intelligence, 1999). 5 the intelligence cycle writ large suggests that the absence of writings about fieldwork have made the distortion complete. With a strong DI bias, Hulnick finds the intelligence cycle unrepresentative of how national intelligence analysis operates and he offers no possibility that the model may be useful to operations.8

Frederick P. Hitz, a classmate of Aldrich Ames with a successful career at the

CIA, provides a good example of how the available writings lack coverage of the internal process. His book, The Great Game: The Myth And Reality of Espionage, compares what the author knows and can say about the real world of espionage with its coverage in . Unfortunately, spy novels do not delve into the HUMINT process beyond the more exciting operational interactions between intelligence and counterintelligence officers and their assorted agents and contacts. The internal elements of the construction and processing of source reporting will not sell many books. HUMINT reliability is more likely affected in an agent handler’s boring struggle with word processing software as he/she recounts the details of a clandestine meeting than in his/her adventures with signals, dead drops, and .

One book that does cover the internal process, if to a limited degree, is Ronald

Kessler’s Spy vs. Spy, the sensational 1988 exposé of FBI counterintelligence operations against the Soviets.9 Unfortunately, while Kessler set the scene and told stories of arrests, expulsions, and prosecutions, he offered little description of the inner workings of the

HUMINT process at the Washington Field Office. Kessler was not seeking to write an academic piece, so it is probably unfair to suggest that he squandered his opportunity, but

8 Hulnick, Arthur S. “What’s Wrong With The Intelligence Cycle?” in Strategic Intelligence (Vol. 2): The Intelligence Cycle, edited by Loch K. Johnson (Westport, Connecticut: Praeger Security International, 2007), pp. 1-21. 9 Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies In America. : Charles Scribner’s Sons, 1988. 6 few other books have gotten that close to operations. This report gleans what it can from

Kessler’s book.

In conclusion, the existing literature fails to look at how the intelligence community might distort source information through its collection and processing.

As an aside, the writer found the sociologist Erving Goffman10 and his study of small-scale human social interactions11 to have considerable potential applicability to analysis of the HUMINT process. Goffman puts life’s players on an imaginary stage and examines their social behavior in assorted contexts12, so it is easy to overlay the roles and behaviors of intelligence sources, their handlers, and analysts on these social situations and learn something new and useful.13

Goffman’s chapters on performances, teams, and discrepant roles are prime examples of the overlay of intelligence players. In one example, Goffman describes an indiscreet informer who plays a discrepant role by going backstage on opening night to discover the exciting secret climax of the show (performance) that the cast (team) has been keeping from the public for months. Goffman says that when the informer goes back to his seat to expose the big secret to his neighbors in adjoining rows, he/she spoils the surprise for the audience and ultimately ruins the opening.14

10 Goffman’s works include The Presentation of Self in Everyday Life New York: Doubleday Anchor Books, 1959; Frame Analysis: An Essay on the Organization of Experience. New York: Harper Colophon Books, 1974; Interaction Ritual: Essays in Face-to-Face Behavior. Chicago: Adline Publishing Co, 1967; and Strategic Interaction. Philadelphia: University of Pennsylvania Press, 1969. Goffman’s work, rooted in philosophy’s phenomenology, prompted the development of both ethnomethodology and symbolic interactionism. 11 His field is called microsociology. 12 Goffman, The Presentation of Self, p. 72. 13 Goffman, The Presentation of Self, p. 72. The author is famous for examining life’s interactions as if people were players on a stage, something called the dramaturgical perspective. As he says, “All the world is not a stage, of course, but the crucial ways in which it is not are not easy to specify.” 14 Goffman, The Presentation of Self, p. 145. 7

Goffman’s book is useful because it specifically discusses information , espionage, and the negative results of an inadequate defense against a potential threat in a model of human interaction that can be readily overlaid on intelligence themes.15 His microsociological framework offers a valuable tool for future intelligence researchers attempting to fill gaps in the discussion of source reliability.

15 Goffman, The Presentation of Self, p. 141-145. 8

PROCEDURES

Given that the existing literature is deficient in the study of how the intelligence community can distort source reporting as it targets, acquires, documents, evaluates, and exploits HUMINT sources, this paper will conduct an interdisciplinary exploration of a rich body of books, scholarly articles, media, and other qualitative sources in the social sciences, journalism, and the law to see how other fields deal with this problem. The paper will look at a variety of meanings of reliability, then review the elements of the

HUMINT process before moving on to examine the players in that process: source, collector, analyst, and editor. It will conclude with observations and recommendations.

This paper will be non-experimental.

Definitions and examples will be drawn from an array of published works resulting from a literature search. The writer’s thirty years of on-the-job experience in

FBI counterintelligence qualify him to make expert observations of field operations. A degree of bias is inevitable given that the researcher will personally select the writings to be included. Such bias will be mitigated by the inclusion of a wide assortment of writings, most of which are authored by specialists in their fields.

Since the preponderance of writings on HUMINT source reliability is unavailable at the unclassified level, this researcher intends to examine the writings of other disciplines with substantially similar framing and attempt to reach useful conclusions for the benefit of the USIC.

The interdisciplinary aspect of this research assumes that the HUMINT process has its equivalent elements in other fields. For example: 9

• The Courtroom: The eyewitness to a crime (source) provides information to the

prosecutor (collector), who is challenged by the defense attorney (analyst) before

a judge (editor) and jury (decision maker).

• The Newsroom: The source of a news story (source) provides information to the

reporter (collector) covering a story. The journalist (analyst), who may be

identical with the reporter, writes the article and submits it to fact checkers and

the news editor (editor), who publishes the article for his/her organization’s

readership (decision maker).

• Social Research: In sociology and anthropology, a researcher (collector/analyst)

observes and interviews a target society (source), creating and maintaining logs

and notes, and then publishing his/her findings. The logs and notes are eventually

processed and published for use by other researchers (analyst). A peer review

board (editor) oversees the publication of social research studies in a journal for

their readership (decision maker). The social scientist – sociologist,

anthropologist, or ethnographer – and the person or people he/she studies, are the

final comparison in this study. 10

RESULTS

The HUMINT Process

The collection, writing, analysis, and editing of source reporting within the intelligence community can have as negative an affect on source reliability as an enemy’s purposeful deception campaign. While a source might provide incorrect reporting or outright lie, a collector can just as easily misquote the source, fail to make note of something critical, or even misrepresent a source’s information for personal reasons. It is important for all concerned to recognize that the HUMINT process can be led astray by the collector as well as the source.

Of the sixteen US intelligence agencies, less than a third have a significant

HUMINT focus, but that effort is sizeable and important. Each develops an individuated internal process for day-to-day operations geared to its agency’s particular responsibilities for meeting national intelligence requirements. To overcome these differences in process, the military intelligence services, the Central Intelligence Agency (CIA), and the Federal

Bureau of Investigation (FBI) coordinate their inter-agency obligations in this area through the CIA’s National HUMINT Manager. According to General Michael Hayden, who introduced the position to the Congress, “This official will set Community-wide policies, guidelines, and standards, ensuring that our human intelligence collectors are well-trained and effective.”16

The CIA’s HUMINT process might be called the Foreign Intelligence (FI) Model.

In his article “What’s Wrong With the Intelligence Cycle?”17 Arthur S. Hulnick explains 16Office of the DNI. General Michael V. Hayden Before House Permanent Select Committee Subcommittee on Oversight, 28 July 2005, (http://www.dni.gov/testimonies/20050728_testimony.htm) 17 Hulnick, Arthur S. “What’s Wrong With The Intelligence Cycle?” in Strategic Intelligence (Vol. 2): The Intelligence Cycle, edited by Loch K. Johnson (Westport, Connecticut: Praeger Security International, 11 some elements of the CIA’s HUMINT process. The most remarkable part is his discussion of the alienation between agent handlers and analysts, who were for years compartmented from each other for security reasons. Even though the two elements have now been commingled, Hulnick opines that the union of forces remains shaky, a situation that bodes ill for the reliable conveyance of source reporting through the HUMINT process. Undoubtedly his discussion is focused on all-source analysts, who in any intelligence organization can feel isolated from recruitment operations due to OPSEC considerations. With a focus on the Directorate of Intelligence, Hulnick fails to mention in the above article whether CIA operational analysts work closely with agent handlers. 18

Ronald Kessler offers a rare glimpse into the HUMINT process in Spy vs Spy:

Stalking Soviet Spies in America, in which he describes Soviet foreign counterintelligence

(FCI) work at the FBI’s Washington Field Office (WFO) late in the .19 The FCI model discussed below provides a useful vehicle to discuss the basic outline of a

HUMINT process.

The Foreign Counterintelligence Model

The FBI’s FCI Model contains the elements of a typical HUMINT cycle and serves adequately to show how source reliability fits into the process. FCI-related

HUMINT collection responds to national intelligence requirements, which target the three main facets of the threat faced by the United States from any sophisticated hostile intelligence service (HIS): 1) its officers and their agents, especially their recruitments within the USIC; 2) its collection requirements; and 3) its operational methodologies.

Since HIS officers are traditionally found under diplomatic or commercial cover in 2007), p. 2. Hulnick seems to mistakenly limit the definition of HUMINT to the operation of clandestine agents. 18 Hulnick, pp. 2-5. 19 Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies In America. New York: Charles Scribner’s Sons, 1988. 12

Washington, DC; New York, NY; and a few other major cities, the FBI’s largest FCI operations are found in these locations. The HUMINT collection effort involves FBI

Special Agents conducting and recruitment operations, interviews, , surveillance, and reconnaissance against known or suspected HIS officers, their agents and contacts. 20

In the 1980s, Special Agents and analysts at FBI headquarters conducted all- source analysis, the vetting of clandestine foreign sources, and the dissemination of finished intelligence outside of the agency. The FBI’s Washington and New York field offices dedicated Special Agent staff to work with FCI squads as operational analysts. In the mid-1990s, and especially since 9/11, the Bureau’s ranks have filled with professional intelligence analysts conducting all-source and operational analysis both at FBI headquarters and in the field.

Special Agents and operational analysts work in the following three areas of

HUMINT collection to produce and refine source reporting: observation, interaction, and reporting and evaluation.

Observation

Surveillance Specialists (SS)21 and Special Surveillance Group (SSG) personnel routinely watch FCI targets from fixed-site and mobile surveillance platforms and make note of their observations in formal reports. Special Agents occasionally conduct their own surveillance and reconnaissance. The activity is described as HUMINT because human observations are filed in official reports. While photography and beacons may be used to support these observations, the activity is not overwhelmingly photographic in

20 Kessler, Spy vs. Spy, p. 16. 21 Fixed site surveillance is typically conducted from a convenient office or apartment nearby. Within the FBI, the operation, the site, and the operator can each be referred to colloquially as a lookout. 13 nature, like aerial photography and satellite imagery, and is therefore not labeled as imagery intelligence (IMINT). Operational analysts sort through the collected observations seeking patterns of behavior and assorted anomalies to provide additional perspectives on FCI targets and their contacts. 22

Interaction

Information can be lost or misconstrued once contact is made with a source, so it is important to comprehend the scope of the interaction phase of the HUMINT process. A

Special Agent, for example, might discern HIS collection requirements by interviewing a target’s recent contacts to learn what sort of questions the target is asking. The FBI would control the target’s contacts in any future meetings. The Special Agent might even dangle a military officer as a potential contact, such as WFO’s successful SHOCKER case against Soviet military intelligence (GRU) in the 1950s. In that operation, the FBI used a

US Army master sergeant “as a double agent channel to supply deceptive information to mislead, disrupt, and reduce the effectiveness of the Soviet chemical weapons program.”23

Established informants, walk-ins and volunteers from the general public can provide the Special Agent with a goldmine of useful information. Unreliable sources in this category can just as easily redirect a case to disastrous and embarrassing results, such as the volunteer who led the FBI to an unwarranted but wide-ranging investigation of terrorism charges against the Committee in Solidarity with the People of El Salvador

(CISPES). “[T]he key informer in the investigation, Frank Varelli, on a number of occasions provided F.B.I. agents with information that was later found to be 'blatantly

22 Kessler, Spy vs. Spy, pp. 36-37. 23 Bennett, Michael and Edward Waltz. Counterdeception Principles and Applications For National Security. Norwood: Artech House, 2007, pp. 131-132. 14 false’ or ‘concocted,’ ” according to a senior FBI official in testimony before the US

Senate Select Committee on Intelligence.24

Occasionally a Special Agent will recruit a foreign official as a clandestine foreign agent. A reliable recruitment-in-place (RIP)25 can provide restricted information and valuable insights on HIS planning and operations. A RIP can be both a feedback and feedforward channel in a deception operation, letting the FBI know what is happening inside an HIS operation and injecting new information meant to confuse that operation still further. A disloyal source in such a position can upend the deception operation by turning those channels in a direction favorable to the HIS, turning advantage into defeat.26

A Special Agent can become an undercover operative or serve in a liaison capacity and thus be both collector and source. An undercover operative can be doubled back against the USIC, fed controlled or deceptive information, or fail to maintain discipline and begin to report unreliably. An FBI liaison officer provides the opportunity for an HIS to run a deception operation against the USIC.

Operational analysts rarely interact with an asset during a debriefing, but all- source analysts occasionally attend to interview the asset about one or more topics pertinent to the completion of a pending finished intelligence product. Their relative inexperience in an operational environment can theoretically result in distortion of interview results or observations.

Reporting and Evaluation

A Special Agent will routinely document a source debriefing soon after the meeting to minimize the loss or misrecollection of data. Such reports contain an 24 Shenon, Philip. “FBI Admits Informer Misled Inquiry.” The New York Times, 24 February 1988. 25A recruitment-in-place is an agent of a foreign intelligence service who remains in his/her job in order to collect and provide current information, typically through clandestine meetings with an agent handler. 26 Bennett and Waltz, pp. 129-131. 15 intelligence section, which provides the objective product of the interview – what was asked and what was said in response – as well as the interviewer’s opinions and extrapolations from the event. Notation is also made of any documents or other items passed between the parties during the meeting. Source reporting also includes an administrative portion, which speaks to the asset’s health and mental state, the time and place of the meeting, attendees, countersurveillance, and other such details. Operational analysts sort through this reporting to fill in incomplete or unclear information, develop follow up questions, confirm accuracy, discern inconsistencies, and verify that collection is pertinent to requirements and worth the costs of the operation.

The Special Agent and operational analyst will collaborate to judge the source for reliability. Headquarters analysts may also review the file to determine source reliability.

All-source analysis is used to vet an asset’s information against reliable sources. If a source is determined to be controlled and deceptive, the operation may be continued or stopped. If most or all sources are deceptive, these confirmations can be meaningless.

Multiple sources saying the same thing proves reliability, not validity.

Editing and Approval

Source reporting can lose reliability as editors and managers review the document prior to dissemination. Editors can be peers, team leaders, or reports officers.

Management can include the collector’s immediate supervisor or any lateral or vertical management colleague that the approving official shows deference towards. The editing and approval processes can each distort HUMINT through alterations made to source reporting without sufficient referral back to the original. Details may be added or removed, or changes made in emphasis, not merely edits for grammar and style. Haste 16 causes many errors at this stage, as draft versions proliferate and reviews become more cursory. Politics and expediency can be insidious factors of distortive change. Some reporting has something to say that is deemed inconvenient or otherwise not supportive of management’s agenda. Managers can resist the novel, innovative, or counter-intuitive out of an overabundance of caution. Reliability might not survive the argument, “It has never been done that way before.”

The next stage of the process is when all-source analysts write finished intelligence products relying at least in part on this clandestine foreign HUMINT source reporting. The all-source analyst is typically compartmented from the original source, so the declaration of reliability of the intelligence is based on a source caveat.

Parallel Processes

The HUMINT process has its equivalents in other fields, from which this paper hopes to draw out useful parallels and contrasts. The roles of source, collector, analyst, and editor are not only found in intelligence work. In a social science like anthropology, the villagers are both target and source, the anthropologist is the collector and analyst, and the scientific journal is the editor. In the television entertainment news business, the starlet is the target, her neighbor is the source, the reporter is the collector, the TV news anchor is the analyst, and the Nielsen ratings are the editor. In the criminal courtroom, the defendant is the target, the witness is the source, the police are the agent handler and operational analysts, the district attorney is the case agent/officer, the defense attorney is the strategic analyst, the jurors are those who evaluate the reporting, and the judge is the oversight element. The vetting process takes place during cross-examination. 17

This paper will briefly explain the HUMINT process from the perspective of the collector, analyst, and editor, and then elaborate on the lessons learned by their effective counterparts in anthropology, journalism, and the courts. 18

The HUMINT Source

A HUMINT source conducts collection clandestinely or overtly; commits specific operational acts or simply observes things of strategic value; can be a government employee, soldier, fellow countryman, or a foreign government official or other foreigner; recruited or a volunteer; and be sent on a mission or tapped for what he/she happens to already know due to circumstances or position. A HUMINT source may be a soldier on reconnaissance, a lookout on surveillance, an émigré with target knowledge, a recruited foreign clandestine agent with access, or a trained intelligence officer.

Diplomats, defense attaches, liaison, émigrés, travelers, target contacts, established informants, and prisoners can also provide useful HUMINT.

A valuable HUMINT source provides accurate, useful, sensitive, and timely information to a foreign intelligence service. The information is often of restricted access and sensitive, often about his/her own intelligence service, armed forces, terrorist organization, leadership, or critical national assets.

A human source of intelligence is called an agent, an asset, a recruitment, a trusted contact, or, colloquially and somewhat pejoratively, a spy. His/her espionage is admired by the collector and despised by the victimized state.

The major known American traitors by espionage have been USIC insiders:

Aldrich Ames, Robert Hanssen, John Walker, Jonathan Pollard, and Christopher Boyce.

They each volunteered, meaning these sources stepped up and offered their services to a foreign government without a recruitment approach. And each served clandestinely, some for many years, working “in place” for a foreign intelligence service from within their respective organizations. 19

At the other end of the scale are intelligence-controlled volunteers, such as the dangle, the turned recruitment (double agent), and the turned double agent (triple agent).

Before representatives of an intelligence organization have the chance to distort source reporting through the HUMINT Process, reliability can suffer from a more basic flaw: the source may be deceptive or unintentionally provide incorrect information. One way or the other, the information funneled into the system is wrong from the very beginning. The interaction between source and collector as a nexus for loss of reliability is addressed elsewhere in this paper.

The unreliable source can be categorized based on his/her motives. The source can intentionally lie or provide a potent admixture of half-truths and fabrication as part of a wider deception campaign. Such can cause intelligence services or armies to direct valuable resources towards bogus threats and leave nations vulnerable to genuine dangers. Or the source can be well meaning but unintentionally provide misinformation, causing equal harm to intelligence and national defense. Problems of recollection, perspective, and self-deceit are some of the causes of misinformation.

Schum and Morris suggest parallels between HUMINT reliability and witness testimony in law, as well as between HUMINT and source statements in journalism. They probe the history of the “testimony credibility problem” in some depth, but give little attention to the journalism issue. They proceed to explain aspects of probability calculations of credibility using the MACE system.27

Misrepresentation and Deception

There are many purposeful deceits in the world of HUMINT. For example, a counterintelligence service can dangle a faux volunteer to an HIS in the hopes of

27 Schum and Morris. 20 establishing a double agent case. A corrupt volunteer can cause the opponent to expend valuable resources and make incorrect threat assessments. And once the deception is discovered, the HIS is less willing to readily accept the next volunteer.

The KGB defector, Anatoliy Golitsyn, sowed seeds of paranoia that prompted the

CIA to dismiss subsequent Soviet defectors, like Yuriy Nosenko, as agent provocateurs and its director, James Jesus Angleton, to launch a damaging mole hunt within the agency.28

The victim of an HIS recruitment pitch can report the approach and be doubled back under counterintelligence control to provide useless and misleading information to the recruiting agency. The reliability of a developmental can only be assessed over time.

For example, in the last days of the Cold War, the CIA thought its recruitment-in- place nicknamed CURLY was its East station’s first active duty asset in East

German surveillance. But CURLY was controlled by the Stasi and only feigned recruitment. The CIA met with this double agent for months “as the German poured out everything he knew about Stasi surveillance.” An unexpected gap in CURLY’s regular meeting pattern was quickly resolved with a warm personal meeting between the source and the agent handler. The latter wrote in his report to headquarters, “I looked into his eyes and I realized that he was good.”29 Oddly enough, internal reporting of what the CIA was willing to pay such an asset provoked another Stasi officer to offer his services and expose the double agent operation. “He in turn would soon become the most important

American spy in , turning over thousands of pages of documents from inside the Stasi….”30 28 Hitz, “The Importance and Future of Espionage,” pp. 82-83. 29 Bearden, Milt and James Risen. The Main Enemy: The Inside Story of the CIA’s Final Showdown With the KGB. New York: Random House, 2003, pp. 388-389, 394, 437. 30 Bearden and Risen, p. 394. 21

The maverick Juan Pujol (Appendix B) dangled himself to the Nazis during

World War II without the assistance of an Allied intelligence agency.31 Desperate to deceive a hostile government, Pujol was eventually taken under the control of Allied intelligence and successfully operated against the Germans. Operation GARBO would become famous for its role in the deception of the Nazis during the Normandy invasion.

Convinced that Normandy was a diversionary tactic, Chancellor maintained his powerful tank divisions near the Pas de Calais in anticipation of a main invasion force that would never come.

Effective deception can be disorienting. Soviet spy infiltrated the

German Embassy in , providing with highly valuable intelligence throughout the pre-war period.32 When the Japanese arrested Sorge in October 1941, the

German diplomatic corps in found the betrayal unfathomable. Major-General

Eugen Ott, Ambassador of Germany to Japan, was shocked, having assessed Sorge as a patriot and friend. (Appendix C) 33

The audience is in large part to blame for any connivance that they allow, according to the sociologist Erving Goffman. He suggests that those around such a person

“may be suitably impressed by the individual’s efforts to convey something, or may misunderstand the situation and come to conclusions that are warranted neither by the individual’s intent nor by the facts.”34 He suggests that more would be exposed were it not for social graces, like tact, and fear of embarrassment on the part of

31 Pujol, Juan and Nigel West. Operation GARBO: The Personal Story of the Most Successful Double Agent of World War II. New York: Random House, 1985, pp. 44-46. 32 Sorge is particularly renowned for his timely but unheeded warning of , the Nazi’s surprise attack against the . 33 Deakin, F. W. and G. R. Storry. The Case of Richard Sorge. New York: Harper and Row, 1966, p. 17. 34Goffman, Presentation of Self, p. 6. 22 the victims. The eventual exposure of false identity, Goffman says, causes a “definitional disruption” for its victims. 35

Goffman’s sociological scale of misrepresentation allows for the ranking of deception and betrayal along a scale of audacity that ranges from the bald-faced lie to the white lie.36 A skillful communicator can misdirect while avoiding lies altogether through the use of “innuendo, strategic ambiguity, and crucial omissions….”37

Goffman suggests that humans are constantly projecting and receiving impressions of themselves and others, and to varying degrees are aware of each other’s actions. The projection can be purposeful, even when unwitting, and the reception can be effective, even if it the activity is deemed repugnant.38

With the addition of an intelligence context, Goffman’s theories of social interaction can be transposed to accurately describe elements of a standard Denial and

Deception (D&D) operation:

[An intelligence source] may wish [his/her intelligence collector and associated agency] to think highly of him, or to think that he thinks highly of them, or to perceive how in fact he feels toward them, or to obtain no clear-cut impression; he may wish to ensure sufficient harmony so that the interaction can be sustained, or to defraud, get rid of, confuse, mislead, antagonize, or insult them.39

Irrespective of his/her intentions, an intelligence source, not unlike Goffman’s individual, will find it to his/her benefit to control the collector and his/her agency, especially how they define the relationship, how they respond to him/her, and, fundamentally, how they treat him/her.40

35Goffman, Presentation of Self, pp. 13-14. 36 Goffman, Erving. The Presentation of Self In Everyday Life.Garden City, NY: Anchor Books, 1959, p. 62. 37 Goffman, Presentation of Self p. 62. 38Goffman, Presentation of Self, p. 6. 39Goffman, Presentation of Self, pp. 3-4. 40Goffman, Presentation of Self, pp 3-4. Goffman states that the author owes much to an unpublished paper by Tom Burns of the University of Edinburgh. “He presents the argument that in all interactions a basic 23

An unreliable HUMINT volunteer may turn out to have had little or no access and questionable motives. Some sources offer information out of a sense of patriotism, while others seek to bolster their ego or image. Some want to be part of the game, while others seek to be helpful. Despite a lack of useful information, the informant may either dangle his/her nonexistent access as a carrot to the authorities or manufacture information out of whole cloth. A volunteer who files a false report is not only deceitful, he/she misdirects the intelligence process and, if not discovered early, can waste valuable investigative and analytical resources. In criminal cases, filing a false report can even be illegal.41

Journalists encounter deceptive news sources that rival those in the world of espionage. Business executives may stonewall or mislead the media during critical periods in the company’s life to preserve goodwill and protect the corporate image. Word of changes in leadership in the boardroom or regulator inquiries can damage individual reputations and lead stockholders to flee and prices to plummet.42

Popular entertainers may toy with veracity when confronted by the media, according to John Brady, former editor-in-chief of Writer’s Digest.43 John Lennon started the ball rolling, Brady says, when the popular member of the Beatles rock group on a US tour was asked, “How do you find America?” Lennon teasingly replied, ”Turn left at

Greenland.” And not unlike a defector who has tired of endless debriefings, or the prisoner under unceasing , Brady says a star may “lie you blind” just to pass the time through a tedious interview. Brady quoted Alice Cooper, another rock star, as underlying theme is the desire of each participant to guide and control the responses made by the others present….” 41 Bobo, Jeff. Would-be Informant Charged With Filing a False Report. Kingsport, Tennessee: Kingsport Times-News, 14 February 2007. http://www.timesnews.net/article.php?id=3731380 42 Adams, Sally, and Wynford Hicks. Interviewing For Journalists. London: Routledge, 2001, pp. 63-64. 43 Brady, John. The Craft of Interviewing. Cincinnati: Writer's Digest, 1976, p. 189; Brady’s biography is currently available online at the website of the E. W. Scripps School of Journalism, where he is a visiting professor. http://scrippsjschool.org/faculty/faculty_details.php?oak=bradyj 24 saying, “I really like lying…. Vogue magazine asked me what was the biggest lie I had ever told, and I could not think of one, so I lied about that.”44

Error and Misinformation

Sources need not be deceitful to lead an intelligence agency astray. Even well intentioned sources can be wrong due to poor recollection or lack of perspective. As

Francis Wellman wrote of eyewitnesses in court over a hundred years ago, “People as a rule do not reflect upon their meager opportunities for observing facts, and rarely suspect the frailty of their own powers of observation.”45

Recollection

Before the early twentieth century, few challenged the reliability of those who were by all appearances well-meaning citizens offering eyewitnesses testimony in court.

According to Hugo Munsterberg, the first sociologist to study the dismal record of eyewitness testimony, anyone can grasp intentional lying, but “confidence in the reliability of memory is so general” that no one in court is prepared to accept that a witness “could remember the wrong thing.” 46

In recounting his own flawed testimony as witness to the burglary of his home,

Munsterburg makes the point that the source need not be deceptive, only misinformed, or, as in his case, encouraged by the police to reach conclusions useful to the prosecution’s case through the power of suggestion. 47

44 Brady, p. 189. 45 Wellman, Francis L. The Art of Cross-Examination. New York: Macmillan Company, 1904, p. 25. Reprint, Birmingham: Legal Classics Library, 1983. 46Munsterberg, Hugo. On The Witness Stand. (1908) (http://psychclassics.yorku.ca/Munster/Witness/) 47 Munsterburg, On The Witness Stand, “The Memory of the Witness.” (http://psychclassics.yorku.ca/Munster/Witness/memory.htm) 25

In 1974, Elizabeth Loftus wrote Reconstructing Memory: The Incredible

Eyewitness for Psychology Today, which launched her career as an expert defense witness on the fallibility of eyewitness testimony.48

Loftus says that humans participate in a never-ending process of memory reconstruction, not unlike “playful, curious children” packing and unpacking dresser drawers. Memories are not a filmed record that is stored deep in the brain but snippets of recollection that must be adjusted to resolve the details that do not seem to fit until “a coherent construction of the facts is gradually created that may bear little resemblance to the original event.”49

Loftus says that each time a human summons a memory, he/she processes the available elements through a subjective filter that may fill in the gaps, remove some or all of the uncomfortable aspects, and/or even recombine the snippets to tell a more convincing tale. The memories that surface through this interpretative process vary from those previously packed away and over time gradually obscure our original impressions.

“[O]ur representation of the past takes on a living, shifting reality,” Loftus explains, adding, “[Our memory] is not fixed and immutable, not a place way back there that is preserved in stone, but a living thing that changes shape ….”50

In 1983, Arye Rattner, of Ohio State University, reported in his doctoral thesis that mistaken eyewitness testimony was responsible for over half of wrongful convictions in US cases involving indexed crimes, resulting in as many as 8,500 incarcerations of the innocent.51

48 Loftus, Elizabeth and Katherine Ketcham. Witness For the Defense: The Accused, The Eyewitness, And The Expert Who Puts Memory On Trial. New York: St. Martin’s Press, 1991, p. 7. 49 Loftus and Ketcham, p. 20. 50 Loftus and Ketcham, p. 20. 51 Loftus and Ketcham, pp. 26-27. 26

Loftus suggests that some witnesses can be expected to modify their recollections of events to make better sense of what they’ve seen or to bring their recollections more in line with the testimony of other witnesses. As they permanently alter their long-term memories through this reconstruction process, these witnesses become more and more confident that their altered recollections are an accurate record of what actually occurred.

Witnesses to violent crime may desperately want to be helpful but are traumatized by the event and possess only a vague mental image of the culprit. In such cases, witnesses are vulnerable to improperly conducted photo arrays, line-ups, and show-ups52 that suggest the culpability of the authorities’ prime suspect.53

Loftus tells the story of how Bobby Joe Leaster spent sixteen years in prison for the murder of a storeowner based solely on the faulty eyewitness testimony of the widow in a one-person show-up outside the hospital where her husband had just died. The police walked her up to the car window and asked her to make the identification. Trembling and still shaken from all that had happened, the widow peered into the car and said he “looks like the man who shot and killed my husband.”54

Misinformation from eyewitnesses abounds after a plane crash, hold up, or school shooting. It is typically set aside as the authorities seek out forensic evidence and other, firmer clues. Witness testimony often leads in conflicting directions, so it is not a priority when evidence from a surveillance camera or a black box can provide solid documentation.

52Lipton, Jack P. “Legal Aspects of Eyewitness Testimony,” in Psychological Issues in Eyewitness Identification, ed. Siegfried Ludwig Sporer, Roy S. Malpass, and Guenter Koehnken,. (Mahwah: Lawrence Eerlbaum Associates, 1996.) According to Lipton, a photo array allows the police to verify the identification of a suspect with the help of an eyewitness through the use of a set of mug shots. A line-up substitutes live subjects for photographs but otherwise has the same purpose. A show-up involves the witness and the suspect and is often done on the scene of the crime. 53 Loftus and Ketcham, pp. 20, 23-25. 54 Loftus and Ketcham, pp. 24-25. 27

“For many investigators, the only infallible witness is a twisted piece of metal,” one correspondent said, summing up the National Transportation Safety Board (NTSB)’s feelings about first reports. Ted Lopatkiewicz, an NTSB spokesman, remarked, ''I do not think I'm making any news by saying that eyewitness testimony at a plane crash and probably at many traumatic events is unreliable.'' 55 Eyewitnesses often provide wildly varying reports in a crisis, such as in the wake of the 12 November 2001 crash of

American Airlines Flight 587 in Far Rockaway, New York.56 (Appendix D)

Dr. Charles R. Honts, a professor of psychology at Boise State University and the editor of The Journal of Credibility Assessment and Witness Psychology, says “The biggest mistake you can make is to think about a memory like it's a videotape; there's not a permanent record there.'' Instead, Honts suggests that plane crash witnesses fill in what they do not understand. And they apply previous experience to a current situation, even if all they know about plane crashes is what they’ve seen on television or in the movies.57

This is not to say that first reports of witnesses are not accepted and eventually processed by federal, state, and local agencies. ''Can you imagine if we did not interview the witnesses?'' an unidentified NTSB official said incredulously in a comment to The

New York Times, which was covering the board’s investigation of the Flight 587 crash. 58

Perspective

55 Cable News Network. “Breaking News: Gunman Fires On Another San Diego School.” CNN.com Transcripts, 22 March 2001. (http://transcripts.cnn.com/TRANSCRIPTS/0103/22/bn.09.html) 56Woodberry, Jr, Warren. “Many Saw Flight 587 On Fire Before Crash.” The New York Daily News, 5 June 2002. (http://www.nydailynews.com/archives/news/2002/06/05/2002-06- 05_many_saw_flight_587_on_fire_.html) 57Wald, Matthew L. “Ideas and Trends: For Air Crash Detectives, Seeing Isn’t Believing.” The New York Times, 23 June 2002. (http://query.nytimes.com/gst/fullpage.html?res=9A04E6DB133FF930A15755C0A9649C8B63&scp=33& sq=%22twa+flight+800%22&st=nyt) 58 “Gunman Fires On Another San Diego School.” CNN.com Transcripts, 22 March 2001. 28

A legitimate source can misapprehend events due to distortions resulting from the source’s physical vantage point or biases stemming from the source’s circle of associates, experience, or access to information.

Investigators of the mid-air explosion of TWA Flight 800 on Long Island Sound found that the physical vantage point of witnesses affected their perception of events in the sky. The physics of sound and light caused witnesses at varying distances from the explosion to look up to see what was happening as much as a minute earlier. What they heard at the relatively slow speed of sound triggered witnesses to turn their eyes skyward to view what was happening in virtually real time with their eyes. According to Matthew

Wald, “[H]undreds of people saw an upward streak that they assumed was a missile, although investigators said it was the body of the plane itself, streaking upward after the forward portion had fallen off following a fuel tank explosion.”59

Bias also played a role in suggesting testimony to potential witnesses. The NTSB criticized the FBI’s witness interview process in the TWA Flight 800 investigation after receiving testimony that for some period of time FBI agents had inappropriately led witnesses to support the so-called missile theory through their questioning and failed to collect other information.60

The HUMINT Collector

The use of foreign spies is the most rare and least reliable of the HUMINT options. While it can yield rich rewards, it can also lead to utter disaster or accomplish

59 Wald, Seeing Isn’t Believing. 60National Transportation Safety Board. Aircraft Accident Report: In-flight Breakup Over the Atlantic Ocean, Trans World Airlines Flight 800 Boeing 747-131, N93119 Near East Moriches, New York July 17, 1996 (NTSB/AAR-00/03 DCA96MA070 PB2000-910403 Notation 6788G Adopted 23 August 2000), Witness Document Issues (1.18.4.2). Washington, DC: Diane Publishing, pp. 233-234. (http://books.google.com/books?id=Sd9rSiFtSwIC&pg=PA232&lpg=PA232&dq=%22twa+flight+800%22 +%22sound+to+travel%22&source=web&ots=n6Rq6W-bCn&sig=5T5tTMMg6l2b-6uE-ex52g34- Is&hl=en#PPA233,M1) 29 nothing. For thousands of years, source reliability merely involved the proper training and use of a decision maker’s own staff, soldiers, or other fellow countrymen, who would be sent on missions to reconnoiter the opponent and return with information of strategic importance. Only in modern times have nations routinely developed, recruited and operated clandestine foreign sources using agent handlers. (Appendix F)

Reliability of the HUMINT source can be problematic for the collector. Consider for a moment the sorts of nagging questions that an agent handler would like to ask about his/her source’s latest nugget of information.

• CONTENT: What exactly do you know? How do you know it? When and

where did you learn it? Whom did you learn it from? This includes issues of

source access, accuracy, knowledgeability, qualifications, and validity.

• MOTIVE: Why do you know it? And why are you telling me? Are you

genuine? This includes issues of source authenticity, calculability, credibility,

motivation, trustworthiness, and veracity.

• ABILITY: Can and will you continue to get information for me? This includes

issues of source stability, availability, willingness, capability, and trainability.

But there is also the issue of source reporting reliability, a diminishment of value through inaccuracy or distortion that can be caused by the collector.

There are two critical junctures beyond the source’s control where the HUMINT collector can distort source reporting. The first point is during the interaction between source and collector, when the latter receives and absorbs intelligence from the former through an interview, interrogation, or overt/covert participant observation. The second critical nexus is that moment when the collector sets down his/her memories, notes, 30 and/or recordings of the interaction phase in an official written form called source reporting. The second phase may include the participation of an operational analyst, who helps to sort, assemble, and otherwise make sense of raw collection as it is processed for dissemination as source reporting.

Sociological fieldwork involves “people studying people”. Whether the collector is an outsider or a member of the group being studied, and whether the culture and appearance of his/her subjects is utterly familiar or quite different, he/she may still distort information through the collection phase. 61

The collector and operational analyst use what limited time is available to them to refine and exploit the HUMINT yield prior to its official documentation and dissemination. This process can introduce distortion to source reporting as collector and analyst hastily resolve the inevitable ambiguities and incomplete thoughts resulting from the typical exchange between source and collector. A supervisor or reports officer, serving as editor, will offer corrections and elaborations that can also potentially distort the source reporting before its dissemination.

Interviewing

Clandestine meetings in the intelligence world are a dangerous, nerve-wracking business that can affect the reliability of source reporting. The well-trained agent handler maintains the source’s relative calm by keeping the support team out of sight and the meeting place comfortable and quiet. Any number of other agents, intelligence analysts, and technicians participate in the staging of the debriefing of a HUMINT source, but the handler always minimizes exposure of the team to the source. A secure meeting under

61Georges, Robert A. and Michael O. Jones. People Studying People: The Human Element In Fieldwork. Berkeley, CA: University of California Press, 1980, p. 23. 31 hostile conditions can ramp up the source’s anxiety and lead to errors and misrepresentations. The agent handler’s team can also become anxious as they arrange

OPSEC for the debriefing of a RIP or defector at a safe house. Despite everyone’s best efforts, the overall emotional noise level can be high.

Errors and omissions can also emerge when the collector takes notes during a source meeting, as well as when he/she later converts his/her notes and memories to formal reporting. While technical means can capture an audiovisual recording of a debriefing, there is no guarantee that the collector will more carefully summarize a recording than a live person. Either way, the completion of a successful clandestine agent interview can make its documentation seem tedious in comparison, leading to potential errors and omissions.

Use of the interview as a form of human inquiry is so common in the United

States today that some label America the “Interview Society”.62 The interview has

"become the most feasible mechanism for obtaining information about individuals, groups, and organizations in a society characterized by individuation, diversity, and specialized role relations.”63 But the collector can take the interview process for granted and not prepare adequately, leading to errors and misjudgments.64 Its routine usage belies how difficult it is to conduct a good interview, how easily both the questions and the responses can be misunderstood. Andrea Fontana and James H. Frey suggest that there is

62Fontana, Andrea and James H. Frey. “The Interview: From Structured Questions to Negotiated Text,” as Chapter 24 of Handbook of Qualitative Research, edited by Norman K. Denzin and Yvonna S. Lincoln (Thousand Oaks: Sage Publications, 2000), p. 646. 63Mishler, E. G. Research Interviewing: Context and Narrative. Cambridge, MA: Harvard University Press, 1986, p. 23. 64Mishler, p. 23. 32

“always a residue of ambiguity, no matter how carefully we word the questions and how carefully we report or code the answers.”65

We have come to rely on the interview and tend to trust its results as valid, dismissing the possibility that bias might creep into source reporting due to the relationship that inevitably develops between the interviewer and source.66

Collection of qualitative research in the social sciences can be conducted first- hand, with the fieldworker participating as an embedded observer or interviewing individuals in-depth. Data collection consists of the observations and quotes the fieldworker records, like the coded survey responses collected by the quantitative researcher. Unlike a survey, the fieldworker’s detailed notes are more individuated and the results more varied in both quality and substance. 67

In the social sciences, according to Cole, in-depth interviews allow the researcher and source to freely discuss a few selected topics in a less structured manner.68 Cole says this technique can encourage the source to expound on issues that might get only cursory coverage in a standard interview with a list of questions.69 This can be especially useful when the topic is unfamiliar to the agent handler, who can feel free to interact with the source and learn more.70 While this might produce an interview report with uneven coverage of the scheduled topics for discussion, Cole suggests the richer results can easily be extracted for use in specific research.71

65Fontana and Frey, p. 645. 66Fontana and Frey, p. 646. 67Cole, Stephen. The Sociological Method (Second Ed.). Chicago: Rand McNally College Publishing Company, 1976, p. 161. 68Cole, The Sociological Method, p. 161. 69Cole, The Sociological Method, p. 161. 70Cole, pp. 193-194. 71Cole, p. 161. 33

On the other hand, Cole cautions that in-depth interviews can encourage the source to fabricate information that will please the interviewer and/or make the source seem important. The source can also elaborate from a poor vantage point, responding to a line of questioning with opinions that lack a competent perspective.72

An intelligence collector can only use the in-depth interview technique when time is relatively abundant for asset meetings, as with a defector. An agent handler typically has to prioritize a veritable battery of questions for an RIP, so the only way to make room for in-depth interviewing in such a case would be to meet longer or more frequently with the source, a rare luxury under typical OPSEC procedures. Depending on the case, it may be impossible to delve deeply into individual questions, but an agent handler should be open to the prospect.

The sociologists Fontana and Frey encourage the investment of time in give and take discussions between the collector and source. Feedback in the interview process, including the presentation and correction of field notes, assures the collector that he/she has developed valid and reliable information. The source also gains confidence that the collector has understood his/her message.73 Interactive communication can actually transform a collector and his/her source into collaborators in the construction of new knowledge, according to Fontana and Frey.74

Feedback in the interview process is also valued in journalism. Brady recommends the “stop-and-go method” to clarify issues as they arise, unless “a verification, however important, would distract the interviewee who is beginning to open

72Cole, pp. 193-194. 73Fontana and Frey, p. 646. 74Fontana and Frey, p. 646. 34 up.”75 If “rapport is good and your subject methodical,” Brady adds, “your man would probably be flattered by your close listening, and by your attention to detail.”76

Due to laziness or bias, a journalist may produce routine source reporting that is shallow and misleading to his/her audience. Biased reporting can also express a world view that protects and defends the political interests of the journalist’s native land. The foreign press corps covered Japan's offensive at in November 1937, by publishing the sensational accounts of personal tragedy favored by their editors and readership. They developed a callous routine, providing daily coverage of the Japanese front and Japanese and Chinese press conferences from their "ringside seat" in and near the International Settlement. "For a break in this routine, they could sit in the Park Hotel, drinks in hand, and watch the Japanese dive-bombers, or go up on the roofs of apartment blocks and see Japanese gun batteries in action." Their newspapers sought stories like:

"Corpses are as thick as flies on fly paper in the summer-time. Limbs and mutilated bodies are piled high in utter confusion."77

A reporter has a responsibility to dig deep enough to develop the important stories and not be misled. Talking to the wrong sources (or no sources) and not asking the difficult questions of the right sources will often result in a distorted view of affairs.

According to Phillip Knightley, news correspondent Edgar Snow reported the politics behind the Japanese invasion of while his colleagues sensationalized the gruesome carnage. Knightley says Snow was the first to interview Mao Tse-Tung and

75 Brady, p. 186. 76 Brady, p. 186. 77 Knightley, Phillip. The First Casualty: From the Crimea to : The War Correspondent as Hero, Propagandist, and Myth Maker. New York: Harcourt, Brace, Jovanovich, 1975, p. 270. 35

Chou En-lai, taking great risks to find them in the field and bring their Communist viewpoint to a Western news audience for the first time.78

Wall Street reporters likewise must probe deeply for the story or be fooled by self- serving pundits. James Surowiecki, in his reporting on the sub-prime loan crisis and one particularly loathsome offender, says there is no dearth of biased financial gurus with conveniently timed insider information to mislead the media on Wall Street.79 Surowiecki decries the poor reporting methods of his colleagues, saying, “[T]he picture we’re getting of the market—and of the economy as a whole—may reflect what people want to happen as much as it reflects what is actually happening.”80

An exasperated Marek Fuchs, pursuing this same story, complained that the media and investors did not exercise due diligence when accepting the “one-man campaign of self-interest” of this one source, noting that the source “did not get to where he is by lacking the gift of blarney.”81

Participant Observation

Participant observation is one of a number of approaches social scientists can use towards the collection of reliable qualitative research.82 That collection can be overt or covert, depending on whether or not the sociologist chooses to disclose his/her collection activities, not unlike the declared vs. undercover work of a HUMINT collector.83

78 Knightley, The First Casualty, pp. 271-272. 79Surowiecki, James. “Profits of Doom,” The New Yorker, 3 September 2007. (http://www.newyorker.com/online/2007/09/03/070903on_onlineonly_surowiecki) 80Surowiecki, James. “Profits of Doom,” The New Yorker, 3 September 2007. (http://www.newyorker.com/online/2007/09/03/070903on_onlineonly_surowiecki) 81 Fuchs, Marek. “Media Taken For a Ride by Countrywide CEO.” TheStreet.com, 24 August 2007. (http://www.thestreet.com/newsanalysis/maven/10376247.html) 82Cole, p. 161. 83Cole, p. 161. 36

The major nineteenth century European powers developed today’s system of trading military attaches to conduct what Maureen O’Connor Witter calls sanctioned spying in both times of war and peace.84 Armed forces intelligence services routinely task their military attachés, who are declared intelligence officers for all practical purposes, to passively collect while on assignment overseas. This may or may not preclude recruitment operations, depending on the sensitivity of the bilateral relationship. They must take extraordinary care in the conduct of espionage operations, for fear of causing an international incident if they are caught. Declared intelligence officers are known to the host country and are expected to nose around a bit but otherwise behave themselves.

Such was the story of James Lilley, the first US intelligence officer in China and a declared CIA operative. 85 As Henry Kissinger’s man in Beijing, nothing Lilley might collect clandestinely would be worth the loss of the new relationship between the United

States and China, so his extracurricular duties, while productive, were decidedly unprovocative.86 He limited his HUMINT activities to surveillance and reconnaissance related activities, as well as the development of Eastern European officials based in the

Chinese capital.87

A covert agent, like any good performer, works hard to leave a highly consistent impression on an audience that is contrary to reality in some significant ways and thereby achieve his/her objectives. 88 The traitor is committed to the selected persona because the

84 “Sanctioned Spying: The Development of the Military Attaché in the Nineteenth Century,” contained in Intelligence and Statecraft: The Use and Limits of Intelligence in International Society, Peter J. Jackson and Jennifer L. Siegel, ed. Westport, Connecticut: Praeger, 2005, pp. 87-103. 85 Lilley, James with Jeffrey Lilley. China Hands: Nine Decades of Adventure, Espionage, and Diplomacy In Asia. New York: Public Affairs (Perseus Group), 2004, p. 177. 86 Lilley, p. 177. 87 Lilley, p. 177. 88Goffman, Presentation of Self, pp. 4-11. 37 web of deceit is too complex to absorb haphazard alterations.89 “[A] discreditable disclosure in one area of an individual’s activity will throw doubt on the many areas of activity in which he may have nothing to conceal.”90 Once his/her legend has been developed, the undercover agent can and should expect to be treated according to the cover story persona. At the same time, the undercover agent should be competent to perform competently in the role he/she has accepted.91

According to Kenneth S. Goldstein, a sociologist may choose nondisclosure of his/her position and/or intentions and use confederates as fieldworkers in order to “induct natural context” through deception. This is much the same as an intelligence officer utilizing an operational asset against a target to prompt a response.92

The use of notetaking materials or audiovisual technology “can facilitate the fieldworker’s information-gathering tasks and provide the potential for more thorough descriptions and analyses because of the comprehensiveness and permanency of the records they produce,” according to sociologists Georges and Jones.93 But unlike a sociologist, an intelligence collector is unlikely to take notes in the company of his/her target or use overt surveillance techniques like a camera or tape recorder. Intelligence professionals can still learn from the problems faced by sociological fieldworkers related to the use of observation technology. Georges and Jones provide the following four examples.

1. The presence or suspected presence of fixed site, mobile, or technical

surveillance may have “deleterious” effects on the behavior of a target.94

89Goffman, Presentation of Self, p. 66. 90Goffman, Presentation of Self, pp. 64-65. 91Goffman, Presentation of Self, p. 13. 92Georges and Jones, p. 142. 93Georges and Jones, p. 143. 94Georges and Jones, p. 143. 38

2. Undue curiosity or other attentive behaviors by a collector can cause a target

to become suspicious, prompting guardedness and even deception.95

3. Feelings of guilt over perceived intrusions can prompt the collector to alter or

discontinue his/her behavior, affecting the collection results.96

4. A heavy reliance on the memory and note-taking capabilities of the collector

can introduce gaps in coverage and distortion of information in a participant

observation situation. “[I]ndividuals who rely exclusively upon memory and

notes always stand the chance of being charged with incompleteness or

bias.”97

Beyond the use of technology, the intelligence target may simply become resentful of collectors altogether, not unlike the tribesmen in New Mexico who rejected observation after accusing a group of anthropological researchers of “always sneak[ing] about [to] learn secrets about people and write funny stories.”98

The observed may even completely turn the tables on the collector, effectively reversing the direction of information flow away from the collector and diminishing the collector’s effectiveness in meeting requirements. The distinction between collector and observed is never as clearly drawn in the field as it is in the literature, Georges and Jones explain. “[It can be] a continual reversal of roles … that [leaves] sometimes one, and sometimes another, party to the act …in a position of dominance or control.”99

95Georges and Jones, p. 143. 96Georges and Jones, p. 143. 97Georges and Jones, p. 144. 98Georges and Jones, pp. 19-20. 99Georges and Jones, p. 21. 39

The observed may have had previous negative encounters with collectors, prompting anticipation of similar treatment or simply bad memories, neither of which is likely to promote collaboration towards a productive relationship.100

The target community or its leadership may become annoyed at the intrusions of collectors into their privacy, causing the censure or expulsion of fieldworkers and possible long-term damage to the operation itself.101 In the case of the Zuni, a tribal leader offered his overall disappointment with the arrangement when he said, ”Nobody comes here to help us. Everyone who comes has his own self-interest at heart.”102

Unlike the rapid-fire feedback that occurs in an interview, a social scientist only requests feedback on participant observation reports after memorializing his/her commentary for the record. 103 Feedback can prompt defensive responses from the source, according to Miles, and is thus generally not productive as a means towards refining collection validity. Reliability instead rests not on feedback but on the skills of the collector and the initial cooperation of the source. 104

Documenting

The agent handler memorializes each asset meeting by summarizing the pertinent intelligence collected, recording all the administrative details surrounding the particular debriefing event, and evaluating the overall operation. The handler creates separate reports for administrative and intelligence purposes, the latter typically being referred to as source reporting. The asset never sees this documentation, which restricts HIS

100Georges and Jones, p. 19. 101Georges and Jones, p. 19. 102Georges and Jones, pp. 19-20. 103Miles, Matthew B. “Qualitative Data As An Attractive Nuisance: The Problem of Analysis,” in Qualitative Methodology, edited by John Van Maanen (Newbury Park, California: Sage Publications, 1979, 1983, sixth printing 1990), p. 128. 104Miles, p. 128. 40 evaluation of internal methods and capabilities through a double agent; however, there is also less chance for collection errors to be caught and corrected.

Before disseminating source reporting to a wider audience, the agent handler or an analyst will edit for singularity by removing obvious details that tend to identify the clandestine source. The writer may even break up the reporting into smaller, disseminable pieces and/or disguise the origination point of the intelligence to disguise a sudden inflow of intelligence that could put a source at risk. Persons other than the agent handler, his/her operational team, and selected managers and staff ought not to see unexpurgated debriefing documents.

The administrative portion contains the handler’s periodic assessment of the source's reliability, both in context of the source's entire reporting record and any recent incremental changes the handler or others have observed. The handler looks at criteria such as access, accuracy, motives, etc, as part of a vetting process.

The handler and his/her supervisor, along with analysts and other managers, will develop a formal statement of source reliability called a caveat, which is paired with the information whenever it is disseminated. Such ratings have been commonplace since

President Truman established permanent intelligence organizations in the United States some sixty years ago.

A consumer relies heavily on the source caveats within disseminated documents for accurate evaluation of source reliability. Consumers want to know that the intelligence they are reading is worth the paper it is written on. Beyond that, consumers who routinely read the latest intelligence reports will inevitably attempt to discern trends in the underlying source reporting that might boost their confidence in the intelligence. 41

The typical consumer of journalism bestows great confidence in the reliability of high profile media organizations. An analyst citing a Washington Post piece, for example, may value the vaunted reputation of the newspaper over the records of the individual journalists, research assistants, and editors who prepared, checked, and tweaked the article before it was approved for publication. Yet journalists continue to be caught fabricating their stories at reputable publications, such as Stephen Glass and Jayson Blair, at New Republic and The New York Times.

Abuse of Authority

Source reporting can be distorted through official malfeasance. An agent handler can manipulate source reporting to advance his/her career and/or political objectives.

Depending on the objective, this abuse of authority can reach into management and beyond. Such a breakdown of integrity in the HUMINT process can boost the face value of unreliable sources and lead to bad outcomes.

The 1982 investigation and trial of two men for an Oklahoma murder is a perfect example of such prosecutorial malfeasance. Due to poor detective work and the misuse of confidential sources, two innocent men ended up in prison, one on death row, while the real murderer received scant investigative attention despite obvious connections to the case. The murderer even provided evidence against one of the defendants.105 Later investigations revealed that the local police regularly relied on jailhouse snitches to provide convenient if dubious testimony against their fellow prisoners to aid the authorities in the conviction of defendants.106

105 Grisham, John. Innocent Man: Murder and Injustice in a Small Town. New York: Doubleday, 2006. 106 Grisham, Innocent Man, p. 161. 42

Alan M. Dershowitz laments the widespread practice of police perjury in a 1994 op-ed piece in the New York Times. Familiar to those in judicial and legal circles in New

York and elsewhere, this abuse of authority is referred to colloquially as “testilying,” a blend of the words testifying and lying. Dershowitz blames the lawyers that routinely take advantage of such tainted testimony as well as the judges who look the other way.

Dershowitz says the police compel false testimony from coerced witnesses and shore up illegally obtained evidence with their own dubious sworn statements.

Dershowitz told the story of one police officer who was caught on tape threatening a witness with bodily harm (“he would run him over ‘with a truck’”) if he testified truthfully in court. The tape clearly contained the police officer’s promise to deny having ever made this threat if it came out. When the recording was played in

Federal court in New York, the police officer stood his ground and denied having said it,

“and despite the tape the judge pretended to believe him.”107

Abuse of authority can reach the highest levels of government. Consider the case of Vice President Dick Cheney, who orchestrated a system of leaks through which he infused unreliable source reporting with the credibility of The New York Times and other major national media outlets in order to promote his goal of war in Iraq.108 Speaking to

Frontline, Tom Rosenstiel, Director, Project for Excellence in Journalism, pointed out how the Times’ unique position as an authoritative outlet for national security stories

107 Dershowitz, Alan M. “Controlling the Cops: Accomplices To Perjury.” The New York Times, 2 May 1994. 108 Buying the War, Bill Moyers Journal, 25 April 2007. (Full video, description, and transcript http://www.pbs.org/moyers/journal/btw/watch.html) (Pertinent section from You Tube http://www.youtube.com/watch?v=p1TliKIRcy4) News War: Part II: The Reporting on Iraq’s WMD, Frontline, 13 February 2007. (Full series, with description http://www.pbs.org/wgbh/pages/frontline/newswar/view/) (Pertinent section from You Tube http://www.youtube.com/watch?v=VnMW4K-JYgs) 43 offered an “echo effect” that bolstered the credibility of the administration’s intelligence.109 This questionable deception practice, which could also be called source reliability augmentation, is a HUMINT process with five identifiable stages:

1. Stretch classified source reporting to tell a version of the story that

supports your goals and objectives;

2. Leak your version of the story off the record to a credible but hungry

reporter of a reputable media outlet;

3. Once published, use your leaked information as an unclassified and

seemingly independent secondary source with quality credentials to

bolster your media campaign in support of your goals and objectives;

4. Be sure to cite the reputable media source in public forums to bolster

the credibility of your leaked information;

5. Give one or more speeches, buoyed by the new public awareness of

your version of the story, to promote your goals and objectives.

Abuse of authority includes a journalist’s abandonment of objectivity, which can occur as a result of political considerations. Knightley suggests that a newspaper’s readership can remain totally unaware that their correspondent’s dispatches resemble government news releases and should be met “with some skepticism.”110

In the rush of patriotic fervor, a collector can take sides and lose all impartiality in his/her reporting. What level of objectivity could be expected in the reporting from intelligence collectors and embedded war correspondents in

109 News War: Part II: The Reporting on Iraq’s WMD, Frontline, 13 February 2007.

110 Knightley, The First Casualty, p. 319. 44

Afghanistan and Iraq in the wake of the September 11th terrorist attacks?

According to Knightley, some World War II war correspondents flew bombing missions, carried and used guns, parachuted behind enemy lines, captured whole towns, and even received medals.111 Knightley tells the extreme example of

Ronald Monson, a war correspondent who "became so angry after seeing Belsen concentration camp that, as he said, 'I drove my car into a column of German prisoners. My God, did they scream!" 112 Reporting can become distorted in such emotional environments.

Personnel and the Personal

The quality of source reporting depends heavily on the collector. A host of circumstances surrounding the collector can negatively affect collection and reporting.

For example, a new agent handler may find the job difficult to master, maybe even distasteful or otherwise unsuitable. This collector may produce unreliable reporting for several years until a new assignment comes along. Turmoil in a veteran collector’s personal life can bring on sudden changes in product quality that may distort source reporting. The collector may lack an appreciation for the target nation’s culture. Or the rigors of the operational environment may be so personally abhorrent that the collector becomes distracted and unintentionally distorts reporting.

Likewise the novice anthropologist might get the impression in training that the job is fairly straightforward. But, according to Georges and Jones, the newcomer to fieldwork can be startled to learn that mastering the basics of the interview and observation were only the beginning of learning. They note, “Fieldwork guides tend to

111 Knightley, The First Casualty, p. 316. 112 Knightley, The First Casualty, p. 316. 45 leave the impression that the logic of inquiry, which the authors have reconstructed, is the same as logic-in-use.” Whether in intelligence or anthropology, apprentice or journeyman, adequate supervision is required lest the reliability of source reporting suffer.113

Bias and Subjectivity

Intelligence collection can be victimized by the personal bias and subjectivity of a collector. Lowenthal, in his Intelligence: From Secrets to Policy, says diverse collection on the all-source model can provide a synergy that helps overcome the shortcomings of particular collection methods114, but this only pertains to scope and depth of coverage and not bias and subjectivity. It is important to remember that there is no average collector; each has his/her own personal background, interests, and desires.

Georges and Jones suggest that anthropologists are encouraged to document their personal biases and subjectivity in their reporting to illuminate for the consumer the collector’s perspectives and mindsets. Even issues such as the reasons for the collector’s choice of assignment could affect reporting and were therefore listed.115 In intelligence, this could be an addition to the administrative portion of source reporting. It would require a bit of personal reflection on the part of the collector.

Georges and Jones favor the recording of methodology as well as substance in order to document possible biases. For example, they complain that the anthropologist

Ruth Benedict “implies in her writings that she had probed the minds and actions of individuals […] but evaluation of her work is difficult without knowledge of her

113Georges and Jones, p. 9. 114 Lowenthal, From Secrets To Policy, pp. 70-71. 115Georges and Jones, p. 33 46 methods.” Benedict relied on interpreters, they added, but she “never identifies them, explains how they were chosen, or indicates their role in her investigations.”116

In conclusion, a HUMINT collector can distort source reporting while conducting an interview, during overt or covert observation of behavior or communications, or when documenting his/her reporting. A collector may also distort reporting by letting power, personal difficulties, or bias interfere with the proper fulfillment of his/her duties.

The Analyst

The analyst wrestles with others’ estimates of source reliability in his/her daily reading of current intelligence reporting and carries forward others’ source reliability caveats while researching and composing new intelligence products for dissemination.

But the analyst can also affect the reliability of source reporting.

Low Tolerance for Aggregation and Generalization

In the opening chapter of Quantitative Approaches to Political Intelligence,

Richards J. Heuer, Jr. says that CIA analysts simply do not believe that HUMINT data can be standardized and aggregated because too much detail is lost in the process.

Intelligence analysis contends with many distinct pieces of information that are often difficult to generalize and aggregate for broader study. Attempts to quantify data in individual HUMINT cases can lead to data distortion and loss of reliability. Government analysts do not believe that unique events can be uniformly measured and processed,

Heuer explains, leading many to favor subjective distortion over the statistical kind.117

In most of science, reliability is approached quantitatively. Experiments must be repeatable in order to test hypotheses, so measurements are taken and the data aggregated

116Georges and Jones, p. 8. 117 Heuer, “Adapting Academic Methods,” pp. 4-5. 47 so other scientists can repeat the research and attempt to disprove a theory. Reliability is based on repeatability and consistency. Distortion is factored into the results as a margin of error. Unfortunately, standardized measurement does not guarantee validity or avoid distortion. It also tends to generalize and weaken the evidence regarding specific individuals or groups.

Heuer describes the work of government intelligence analysts as qualitative research, something fundamentally different from the quantitative analysis done by most social scientists at the time.118 Social science scholarship has in fact broken free of its bindings to scientific measurement, according to Valerie Janesick, developing new descriptive terminologies that allow more precise study of people, places, and events.119

This is especially valuable for intelligence, where the behavior of specific humans in their native environments is often preferable to estimates regarding average populations.

Kirk and Miller make the point that “the description of reliability and validity ordinarily provided by nonqualitative social scientists rarely seems appropriate to the way in which qualitative researchers conduct their work.”120 While they admit that the numbers vs. no numbers argument is a bit of a contrivance, Kirk and Miller stress the unique path that qualitative methodology has taken in the social sciences and how vital the method is to field research.121 Sociological methodologies, including “analytic induction, content analysis, semiotics, hermeneutics, elite interviewing, the study of life

118 Heuer, Richards J., Jr. “Adapting Academic Methods and Models to Governmental Needs,” as Chapter 1 of Heuer, ed. Quantitative Approaches to Political Intelligence: The CIA Experience. Boulder: Westview Press, 1978, pp. 1-10. 119Janesick, Valerie J. “The Choreography of Qualitative Research Design - Minuets, Improvisations, and Crystallization,” as Chapter 13 of Handbook of Qualitative Research, 2nd edition, edited by Norman K. Denzin and Yvonna S. Lincoln. Thousand Oaks: Sage Publications, 2000, p. 393. 120 Kirk, Jerome and Marc L Miller. Reliability and Validity in Qualitative Research. Beverly Hills: Sage Publications, 1986, p. 14. 121Kirk and Miller, p. 10. 48 histories, and certain archival, computer, and statistical manipulations,”122 share a common goal with intelligence research.

Low Tolerance for Inaccuracy

Kirk and Miller explain the difference between reliability through repeatability versus validity by using the story of two thermometers and a pot of boiling water (100 degrees C). In their example, a malfunctioning thermometer registers the same incorrect

82 degree C temperature each time, while a more accurate one provides a range of temperatures that average the correct 100 degree C temperature. “The second thermometer would be unreliable but relatively valid, whereas the first would be invalid but perfectly reliable,” they conclude, adding, “It is easy to obtain perfect reliability with no validity at all.”123 In the realm of intelligence analysis, a series of reinforcing errors and misperceptions can quickly become a foundation for unreliable knowledge.

A pair of analysts that favor opposing (quantitative vs. qualitative) research approaches often lack a common vocabulary to help regulate their expectations for reliability.124 Sam D. Sieber stresses the importance of validity in qualitative research and argues against strict adherence to repeatability, suggesting that “[c]ertain kinds of reliability must be intentionally violated in order to gain a depth of understanding about the situation.” 125

Validity is important in much of HUMINT, so distortion cannot be relegated to a percentage margin of error. Tests for repeatability are inadequate to detect deception and

122Kirk and Miller, p. 10. 123 Kirk and Miller, p. 19. 124Sieber, Sam D. "A Synopsis and Critique of Guidelines for Qualitative Analysis Contained in Selected Textbooks,” Project on Social Architecture in . New York: Center for Policy Research, 1976. Sieber is cited by Matthew B. Miles in “Qualitative Data As An Attractive Nuisance: The Problem of Analysis,” in Qualitative Methodology, edited by John Van Maanen. Newbury Park, California: Sage Publications, 1979, 1983, sixth printing 1990; p. 126. 125Sieber, p. 126. 49 error. Users of HUMINT demand that a source not just be consistent in his/her reporting but that accurate in that reporting. The USIC favors knowledgeability, accuracy, and veracity in its HUMINT sources. Repeatability is used as a validation tool, comparing and contrasting information provided by multiple sources, but it certainly isn’t a foolproof methodology. When most sources are lying as part of an active deception campaign, repeatability serves deception, not validity.

Fact Checking

An operational analyst familiar with a case can play an important collaborative role with an agent handler, both before and after an asset meeting. Preparation for the interview can prompt the development of good questions for the agent handler. More importantly, the analyst can research pertinent topics and make sure the agent handler is well briefed. The operational analyst can also help the agent handler check through the results of the asset meeting, crosschecking details with other source reporting and clarifying incomplete names, vague dates, and unfamiliar places and organizations. The process can include an assessment of the asset’s bona fides, the status of INFOSEC if not

OPSEC, and the ultimate direction and value of the case.

In journalism these notions are called research and fact checking. Allan E

Goodman, the chief presidential briefing coordinator for Jimmy Carter, testified before the Commission on the Roles and Capabilities of the United States Intelligence

Community on how much more rigorous journalistic fact checking was in comparison to what he had experienced in government. For a Foreign Policy article, Goodman said,

“The intern [assigned to fact-check his article] proceeded to ask for the source of virtually everything that I was saying in the article that could be construed to be a matter of fact as 50 well as the interpretations based on those facts that I was presenting. She also said she would be calling other experts in the field to verify both my sources and my analysis.”126

Goodman recommends that intelligence analysts fact check an equivalent number of their peers’ intelligence products to the number they themselves produce.127

According to Brady, some Hollywood reporters who interview famous movie stars do their homework and things go smoothly, while others risk disaster because they fail to conduct adequate preliminary research. A journalist like Gloria Steinem “reads everything of importance written about her interviewees, and talks to their acquaintances,” Brady says, adding, “[S]he starts her interviews by asking her subjects what they think has been accurate and inaccurate in previous writings about them.”128 An exasperated Humphrey Bogart expressed his frustration with journalists circulating gossip and innuendo when he told a cub reporter, “'Let it be known around town that just because someone says something -- regardless of how big a star he is -- you are not necessarily going to accept it on face value.”129 Whether in journalism or intelligence, diligent research preparation, followed by an interview consisting of thoughtful and properly formed questions, can develop useful information as well as stop the perpetuation of erroneous information.

Fact checking takes place after the reporter’s interview. If fact checking is weak or nonexistent, published articles will likely be incomplete or perpetuate inaccuracies found elsewhere in the media. According to Neil MacNeil of The New York Times, "The reporter who believes all that he is told will not last long. The competent reporter takes all

126 Goodman, Allan E. “Testimony: Fact-checking at the CIA.” Washington: Foreign Policy, Spring 1996, p. 180. 127 Goodman, p. 181. 128 Brady, p. 191. 129 Brady, p. 186. 51 the data he can get. He may ask embarrassing questions. He checks one person's statement against another's and against the known facts. ... He makes certain that he has exhausted all available information before he writes a word of his story."130

“Reasonable journalism” encourages weak libel laws to address the media’s fear of litigation but leads them at the same time to poor fact checking practices and ultimately unreliable reportage. The Canadian courts have lightened the burden on the media in a recent judgment: if the source provides misinformation but a reasonable effort is made by the journalist to discern the facts—and that reasonableness is defined by the courts – then libel cannot be charged. This is an unfortunate development, considering the major cases of reporter misrepresentation at major media outlets in recent years.131

Fact checking is incorporated in the courtroom through cross-examination. The defense attorney challenges the witness much the same as an analyst challenges reporting from a HUMINT source. The courtroom parallel offers much to the study of distortion in the field of intelligence.

Low Tolerance for Decisions Based on Stale Information

When current intelligence is unavailable, the most recent piece of dependable source reporting is asked to fill the void until something fresher can be collected. A long gap in applicable current intelligence can leave that last useful strand of reporting dog- eared and strained.

The perpetuation of truly dated but once reliable HUMINT is a sign of poor analytic methodology. Director of the CIA (DCIA) Michael Hayden recently stressed how the Iraq War intelligence failure was caused in part by the perpetuation of dated

130 Brady, p. 185. 131 McQueen, Mark. Has Justice Robert J. Sharpe Put Process Before Truth in Libel Ruling? Best Way to Invest, 19 November 2007. http://www.bestwaytoinvest.com/display/6733. 52 source reporting. A continual lack of fresh intelligence should have prompted analysts to lower their confidence levels, but this did not happen. “Even though our recent reporting had been very thin, we still kind of carried the old conclusions forward without frankly holding them up enough to the light in order to see whether or not they were still valid.”

Hayden mentioned that his analysts have now learned to recalibrate analytic confidence in intelligence estimates in such cases, citing one example in particular where a CIA analyst told him that an estimate was downgraded “because the intelligence on which it was based has aged off.” 132

Freshness of source reporting can affect the reliability of advice given to combat pilots seeking legal justification for a pending air strike, according to Judge Advocate

General (JAG) Charles Dunlap (USAF). JAG lawyers are embedded in military operations centers to grant pilots permission to launch weaponry and kill people. They must remain aware of the latest source reporting and cannot rely solely on the highly technical equipment in front of them. A blip on a television screen is not sufficient information to authorize the taking of a life. Dunlap says the military must apply the lesson of poor eyewitness accuracy to this command post situation. Embedded JAG lawyers must develop “other intelligence indicators that would tell [them] that that [blip] really is the enemy and that [the pilots] really do need to kill that human being.”133

Exclusion from a Privileged Relationship

There is a privileged relationship between agent handler and source that an analyst cannot easily pierce. The handler and source develop an exclusive bond of trust

132 Meet The Press, 30 March 2008. (http://www.msnbc.msn.com/id/21134540/vp/23867579#23867579) 133 CSPAN. JAG Charles Dunlap (USAF) spoke on 16 November 2007 at the American Bar Association, Washington, DC on the subject "Law In Times of War,” as part of the America and the Courts series on CSPAN. (The video begins with Sandra Day O'Connor speaking at another event. JAG Dunlap begins speaking at 45:14. Link auto-invokes Real Player: javascript:playClip('rtsp://video.c- span.org/60days/ac012708.rm') 53 that promotes reliable communication. The source depends on the handler for security, and they spend much time together. The agent handler has legitimate OPSEC concerns and will limit outside contacts with the source to minimize risk, effectively becoming the source’s guardian and overseer. Beyond this, a agent handler’s career may skyrocket through the development of a major recruitment case, so there are personal reasons for keeping the asset cloistered.

This custodial relationship can make it difficult for analysts to discern a source’s reliability first hand, to study non-verbal cues and mannerisms that do not appear in reporting documents. As Goffman says, "Many crucial facts lie beyond the time and place of interaction or lie concealed within it. For example, the 'true' or 'real' attitudes, beliefs, and emotions of the individual can be ascertained only indirectly, through his avowals or through what appears to be involuntary expressive behavior."134

Low Tolerance for Individual Perspectives

Six blind men in an Indian proverb (Appendix A) failed to discern that they beheld an elephant because they each assessed a different part of the beast and could not reconcile their findings from their unique perspective. They failed to realize that the scale and complexity of their problem made their individual reports appear in conflict and unreliable. Intelligence analysis requires a framework or theory of cognition through which to evaluate collection collaboratively. Only then can reliability be rated. 135

In open source intelligence, an analyst can stumble on idle rumor or speculation parading as fact simply because the media published irresponsible remarks. Arthur

Herzog, author of the B. S. Factor, said, 'When people sound knowledgeable, others

134 Goffman, The Presentation of Self, p. 2. 135Kirk and Miller, pp. 49-51. 54 believe them. ... So much in modern life is guesswork and confusion that almost anybody who seems to know what he is talking about will be promptly smuggled between quotation marks."136

Jack D. Douglas, an early ethnomethodologist137, asserts that sociologists unintentionally index138 even the most mundane aspects of social life, producing hopelessly biased reporting in the process.139 While criticized by some, Douglas seems particularly appropriate for the study of intelligence collection.140

A source will sometimes make strong, persistent claims but lack evidence that might substantiate his/her dog-eared hypothesis. While it is the duty of the agent handler to make a serious effort to separate fact from supposition while composing source reporting, it becomes the responsibility of the analyst to meticulously avoid including any such assertions in his/her finished intelligence products. This is not an ideal situation, as all-source analysts often have no contact with sources and may inadvertently distort the meaning of original reporting.

136 Brady, p. 185. 137 A term coined in the 1960s by sociologist Harold Garfinkel, ethnomethodology suggests that social investigators impose their own frameworks and values on the components of life. 138Indexicality derives from pragmatics, a field of linguistics, which suggests that meaning can be inferred in other ways than direct semantic argument. 139Douglas, Jack D. Investigative Social Research: Individual and Team Field Research. Beverly Hills: Sage, 1976. 140 Bainbridge, William Sims. Review. Social Forces. Chapel Hill: University of North Carolina Press, September 1977, Vol. 56, No. 1, pp. 300-301. Bainbridge, of the University of Washington, gave Douglas’s book a harsh review, dismissing it as emotional in its substance (“The only proper aim of social science, we are told, is the discovery of the human experience.”) and deficient in its measurements (“No talk of variables, causal models, or hypothesis testing here.”), not to mention its tendency to be autobiographical in its nature. Bainbridge seems to criticize it for its qualitative aspects. The very qualities of the book that Bainbridge found most dangerous to the probationary sociologist (“The neophyte may come away … with a dangerous and unscientific superspy model of how field work should be done.”) are particularly applicable to this thesis. 55

The Editor

The reliability of HUMINT can be negatively affected through the editing process, which can occur at several points after clandestine source information has been received and before it is sent to consumers. The writer has unpacked the dissemination stage to see where the distortion of clandestine source information might occur after agent handlers and analysts have completed their drafts of source reporting and finished intelligence products. This chapter is thus designated The Editor, which captures this level of the publication process in journalism and the social sciences.

Peer Review

Informal peer review and other report editing schemes, as well as the formal fact checking and standardization procedures of reports officers, play important intermediate roles in the preparation of intelligence drafts heading to management.

When editors, reports officers, and management make revisions to drafts, they too can potentially distort the HUMINT in source reporting and finished intelligence products. It is incumbent upon the submitting writer to review any changes to the draft to assure that the revised document continues to convey the spirit and substance of the source’s original statements.

In journalism, reporters submit their drafts to fact checkers so statements regarding people, places, and events can be verified. The media are motivated by a fear of lawsuits. New Republic reporter Stephen Glass was able to manipulate his publication’s fact checking system by conducting personal interviews, which were not subject to review under the magazine’s guidelines. An online magazine’s fact checkers discerned 56 the deception and published an embarrassing exposé, criticizing both Glass and the editors of the New Republic. 141

Along those same lines, management is responsible to watch for employee misconduct. The New York Times correspondent Jayson Blair created sources out of thin air, embarrassing the reputable newspaper. It is important that all intelligence personnel remain vigilant for such excesses, which can misdirect operations and cause untold harm.142

Where the Buck Stops

The management review and approval process provides the USIC with its final bulwark against the dissemination of HUMINT that is either purposely deceptive, well meaning but erroneous, or distorted by agent handlers and analysts in their collection, processing, and writing of source reporting and finished intelligence products. The obligation of management to assure quality disseminations is real but cannot substitute for quality workmanship by collectors and analysts in the preparation of drafts, especially given the many other responsibilities of today’s intelligence managers.

The dissemination of improperly caveated HUMINT, and inadequate vetting by receiving agencies, can lead to catastrophe. Consider the case of international liaison between Germany and the United States regarding Germany’s CURVEBALL source.143

141 60 Minutes. “Stephen Glass: I Lied For Esteem.” 17 August 2003. (http://www.cbsnews.com/stories/2003/05/07/60minutes/main552819.shtml); Ebert, Roger. Review of “Shattered Glass” (http://rogerebert.suntimes.com/apps/pbcs.dll/article?AID=/20031107/REVIEWS/311070305/1023) 142 Editors of The New Atlantis. “Technology: The Great Enabler? How Jayson Blair Conned The New York Times.” The New Atlantis (No. 2, Summer 2003), pp. 110-111 (http://www.thenewatlantis.com/publications/technology-the-great-enabler) ; Nwazota, Kristina. “Jayson Blair: A Case Study of What Went Wrong At The New York Times,” Online NewsHour (Website of the PBS program NewsHour With Jim Lehrer) (http://www.pbs.org/newshour/media/media_ethics/casestudy_blair.php) 143 The Bundesnachrichtendienst (BND) internally assessed this Iraqi defector source as unreliable but circulated dozens of reports to the USIC anyway, according to David Kay. Kay noted that the German intelligence agency refused access to the source for proper vetting. The CIA, which used this source to 57

Error and confusion in the international transference of one source reliability assessment caused the Defense Intelligence Agency (DIA) and CIA to produce shaky intelligence that became the basis for war in Iraq in 2003. In a New York Times Book Review article on

Robert Drogin’s Curveball: Spies, Lies, and the Con Man Who Caused A War,

Christopher Dickey details the incomprehensible failure of the HUMINT vetting process in this case, both within individual intelligence agencies and in international and interagency liaison.

The Germans warned the Americans [CURVEBALL] might be unreliable but would not let any American intelligence officer interview him. After 9/11, as the Bush administration focused its “war on terror” against Saddam Hussein as well as Osama bin Laden, and despite all the warning signals, the Central Intelligence Agency bought into Curveball sight unseen. Its experts in weapons of mass destruction endorsed his deception as truth. The skeptics within the agency were ignored.144

David Kay, charged with finding Saddam Hussein’s weapons of mass destruction

(WMD) as head of the Iraq Survey Group, heaps a significant share of the blame for the confusion caused within the USIC regarding Iraqi WMD on the BND and the more than

100 unreliable CURVEBALL reports it issued. The Germans not only failed to properly vet their asset, but they inexplicably complicated the matter by failing to identify him to the USIC or provide access to him, according to Kay, adding, “It was a blockade that made it impossible for any other service to validate his information. The German service did not live up to their responsibilities or to the level of integrity you would expect from such a service.”145

support part of Secretary of State Colin Powell’s presentation to the United Nations in the US justification for war, is chastised for its assumption of the source’s reliability. 144 Dickey, Christopher. “Artificial Intelligence”. The New York Times Book Review, 18 November 2007. (http://www.nytimes.com/2007/11/18/books/review/Dickey-t.html?_r=1&oref=slogin) 145 Goetz, John and Marcel Rosenbach. “Spiegel Interview With Iraq WMD Sleuth David Kay,” Spiegel Online International, 22 March 2008. (http://www.spiegel.de/international/world/0,1518,542888,00.html) 58

While CURVEBALL was an obvious fabricator and source reporting based on this asset should unquestionably have been labeled unreliable, the intelligence agencies involved so mishandled the HUMINT process that current accusations of CURVEBALL’s unreliability miss the point. Within the concept of source reliability must be an assessment not only of the asset but the HUMINT process employed, including the responsibility of the final editors. Management bears the burden to assure that source reliability caveats are accurate on outgoing disseminations and that their staff do everything within their power to detect deceitful and erroneous foreign sources, as well as the distortions of source reporting by foreign handlers and analysts.

Office Politics and Career Advancement

Management may be tempted to alter content or quash the dissemination of source reporting or HUMINT-based analytical pieces when they either disagree with the prevailing views or fail to support the known positions of higher-level authorities. There can be considerable pressure on managers to be team players, avoid rocking the boat, and not make trouble. Approving innovative intelligence products that fly in the face of upper management’s conventional wisdom can be fatal to mid-level managers’ careers, especially if these products diminish the perceived threat and/or negatively affect budget allocations.

Eugen F. Burgstaller suggests that analysts might err on the side of caution and undervalue or ignore critical reporting if it is “at variance with a larger body of information available from other collection sources, diplomatic reporting and public media.” And he allows that policymakers might choose to show “effective disregard for the substance of … reports simply because an administration is firmly committed to an 59 established general line of policy … or judges that basing a policy decision on such intelligence reports would conflict seriously with domestic political considerations deemed of overriding importance….”146

One should also assume that intelligence management, set squarely between analysis and policymaking, might tinker with intelligence output in order to reduce uncomfortable conflict, avoid career-ending mistakes, and/or curry favor in important places towards career advancement.

146 Burgstaller, Eugen F. “Major Future Problems and Limitations Of Human Collection” in Intelligence Requirements for the 1980’s (No. 5): Clandestine Collection, edited by Roy Godson (New Brunswick, USA: Transaction Books, 1982), pp. 78-79. 60

CONCLUSION

This paper has explored how source reporting can be distorted at each stage of the

HUMINT process within the USIC and how that distortion may impact perceptions of source reliability. It is clear that source reliability pertains not only to the trustworthy, deceptive, or misinformed human source of intelligence but also to the process through which HUMINT is collected, analyzed, and disseminated.

The writer found no specific writings on this subject. The field of operational practices is severely underrepresented. There is a bias towards writings on the “inside the

Beltway” battle between analysts and policymakers, with little focus on the HUMINT process, a problem that needs to be remedied (see Recommendation #5 below).

History (Chapter 4) demonstrates that decision makers who use HUMINT for answers have always preferred to deploy their own agents, resorting to the use of clandestine foreign sources only when agent access is denied. National leaders as far back as Moses sent soldiers, diplomats, and executive agents into the field to see what an opponent is up to.

The United States spends most of its intelligence budget on technical collection, so there is an understandable focus on ISR, but many intelligence writers discount or completely ignore human reconnaissance and surveillance, a problem that ought to be remedied (see Recommendation #4 below).

But HUMINT collection in times of war is more challenging. American have recruited spies against the British in the American Revolution, the

Confederacy in the US Civil War, and the Soviets in the Cold War. As non-governmental 61 organizations, today’s terrorist groups are a new and particularly difficult type of

HUMINT target, but the basics of HUMINT collection against a hard target in time of war remain the same: the recruitment and operation of dependable foreign spies, and that process demands special skills that only a dedicated or intelligence organization can provide.

It may seem a truism, but espionage also requires an opponent. Today’s world requires estimates of national threat and a steady stream of indicators and warning, but decision makers will reduce efforts in clandestine HUMINT collection and revert to surveillance and reconnaissance whenever the diminished sense of threat allows it. This writer expects that, once the War on Terrorism has passed fifty years hence, the USIC will have insufficient clandestine HUMINT collection in place, reliable or otherwise, to shift directions and avoid the next surprise attack. As concerned as he was about Osama bin

Laden and Al Qaeda, Richard A. Clarke offers no “lessons learned” from the build up to

9/11 that might teach the USIC how to smoothly shift directions.147

HUMINT collection (Chapter 5) is fundamentally a qualitative process, which can draw from the experiences of other fields with similar frame works, such as anthropology, journalism, and the law. The intelligence field has only begun to look to other social sciences, journalism, and the courtroom to bolster its theory and application.

Future researchers must venture into the best practices of anthropologists, sociologists, criminologists, district attorneys and defense lawyers, reporters, and their editors and overlay what they have learned onto the intelligence realm. Goffman’s The Presentation

147 Clarke, Richard A. Against All Enemies: Inside America’s War on Terror. New York: Free Press (Simon & Schuster), 2004. 62

Of Self In Everyday Life and other microsociological writings ought to be required reading for new USIC analysts.

Further exploration of the definition and scope of source reliability in intelligence seems warranted before attempts to quantify reliability, including the development of a source reliability scale, can be made. The writer hopes that this thesis provides the foundations for work on such a scale.

The collection of HUMINT (Chapter 6) includes observation, interaction, and the conversion of those observations and interactions into source reporting. The HUMINT process involves the development of that source reporting, which is then pooled for the use of all-source analysts to develop finished intelligence products. Distortion of source reporting can occur anywhere in the process, including the editing and approval stages prior to final dissemination of source reporting or finished intelligence products.

The role of the source in HUMINT reliability (Chapter 7) is a matter of intent: what are the motives of the source in providing this information? The reliable source provides accurate and useful information. The unreliable source either misrepresents the facts or unintentionally gets the information wrong, often due to poor recollection or perspective.

The distortion of HUMINT reporting begins with the collector (Chapter 8) and his/her interaction with the source during an interview. Anthropologists recommend a thorough exchange of ideas between the two parties to an interview, including feedback and follow up (see Recommendation #2 below). 63

An embedded collector can clarify information more readily in a participant observer situation but lacks the interviewer’s ability to promptly record his/her findings.

Delays in report writing can cause distortion of information.

A poorly supervised collector can abuse his/her authority or become distracted or disgruntled over personal issues and generate an assortment of distorted source reporting.

Unchallenged bias and subjectivity can produce great distortion of HUMINT collection.

The analyst (Chapter 9) plays the role of journalistic fact checker or the defense attorney cross-examining an errant witness (see Recommendation #3 below). The analyst also keeps an eye on the shelf life of old, once reliable source reporting. Access to the source may be limited to the agent handler, putting the analyst outside the privileged relationship, thus limiting the analyst’s ability to assess both source reliability and the quality of source reporting. The analyst may use source information to buttress an unsupportable argument, thereby casting a shadow on the reporting itself.

Source reporting and finished intelligence products go through an editing process

(Chapter 10), which can cause distortion. Writers are encouraged to offer their publications for peer review. Reports officers may adjust a document for content or style before disseminating it to other agencies. And the supervisor and his/her upper management can weigh in on the writings of their staff. A manager might take the “better safe than sorry” approach and tone down particular statements for political reasons, or the manager may seek rapid advancement by exaggerating findings to support his/her agenda.

Finally, the consumer needs a better awareness of the pitfalls of source reporting.

The courtroom’s experience with false eyewitness testimony provides a unique solution 64 to this problem. Jurors are either instructed by the judge or provided an overview by an expert defense witness (see Recommendation #1 below).

Recommendations

The writer makes the following recommendations based on his research.

Awareness Training

Intelligence consumers need to be better informed regarding the potential unreliability of HUMINT sources in finished intelligence products. The Director of

National Intelligence (DNI) might offer awareness training to legislators, executive branch appointees, and their staffs. The curriculum could include an explanation of caveats and a review of case studies.

We learn from Loftus that her expert court testimony and/or a judge’s detailed instructions can warn jurors of their vulnerability to mistaken or deceptive eyewitness testimony. Increased awareness, especially in capital crime cases, can ratchet down the prejudicial nature of eyewitness testimony, especially where a witness is key to the prosecutor’s case.148 A similar advantage might be gained in the intelligence field.

Feedback and Follow-up

The information flow between agent handler and source is necessarily one-way.

No collector wants expose his/her list of intelligence gaps to a double agent, for example.

But journalism and anthropology can teach the intelligence field something about improving the reception of source information through feedback and logical follow-up. A participant observer in a tribal village might bring his/her report back to the subject to verify that his/her observations are accurate and complete. There may be follow-up questions on both sides that can be addressed in such secondary discussions. A journalist

148 Loftus and Ketcham, pp. 27-28. 65 may do extensive research and then present his/her findings to the subject of the investigation, as well as witnesses and contacts. This feedback and follow-up is noted in the final report. Too often this is not done in the intelligence realm. To be sure, both anthropology and journalism have some cautionary tales of this sort of practice backfiring on collectors, but writers never encourage its abandonment.

Cross-Examination

Asset vetting could be conducted in a model courtroom, with the agent handler taking the role of the prosecuting attorney and representing the operational side of the house, and an all-source analyst playing the defense lawyer would represent the analytical position. On the witness stand would be someone well versed in the asset’s testimony, demeanor, and overall situation, preferably someone, as they say, without a horse in the race. The judge, another independent role, could be the master of ceremonies and prompt the flow of discussion. Operational and analytical management would play the more political roles of the district attorney’s office and public interest groups.

Surveillance and Reconnaissance

Human surveillance and reconnaissance deserve a place in the HUMINT process yet receive barely a mention in most intelligence publications. The US Army’s

Intelligence Field Manual ought to include surveillance and reconnaissance as specific

HUMINT techniques and separate it from their attempts to incorporate TECHINT into operations. Recent popular intelligence analysis books by Mark Lowenthal (From Secrets to Policy) and Robert M. Clark (A Target-Centric Approach) totally ignore the role of human surveillance and reconnaissance in the intelligence cycle.

Operational Theory 66

There need to be more scholarly writings from the operational perspective.

Sources and methods must be protected, but a way must be found to open the discussion of the fundamentals. This writer suspects there may be a structural bias within the USIC that encourages analytical writing at the cost of operational exposition.

Conclusions

The reliability of source reporting is affected not only by the character of the

HUMINT source but also by the process through which that reporting is collected, analyzed, and edited. The fields of journalism, sociology, and the law provide a rich base of experience through which the IC can learn more about the obtaining and delivering of source information. 67

BIBLIOGRAPHY

Adams, Sally, and Wynford Hicks. Interviewing For Journalists. London: Routledge, 2001.

Bainbridge, William Sims, review of Investigative Social Research: Individual and Team Field Research, by Jack D. Douglas, Social Forces. Chapel Hill, NC: University of North Carolina Press, September 1977, Vol. 56, No. 1.

Bearden, Milt and James Risen. The Main Enemy: The Inside Story of the CIA’s Final Showdown With the KGB. New York: Random House, 2003.

Bennett, Michael and Edward Waltz. Counterdeception Principles and Applications for National Security. Norwood, MA: Artech House, 2007.

Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs: Issues for Congress, CRS Report for Congress, February 22, 2005. www.fas.org/sgp/crs/intel/RL32508.pdf (accessed March 18, 2009).

Bill Moyers Journal. Buying the War, April 25, 2007. http://www.pbs.org/moyers/journal/btw/watch.html (accessed March 18, 2009).

Bobo, Jeff. “Would-be Informant Charged With Filing a False Report.” Kingsport Times- News, February 14, 2007. http://www.timesnews.net/article.php?id=3731380 (accessed March 18, 2009).

Brady, John. The Craft of Interviewing. Cincinnati, OH: Writer's Digest, 1976.

Burgstaller, Eugen F. “Major Future Problems and Limitations of Human Collection.” In Intelligence Requirements for the 1980’s (No. 5): Clandestine Collection, edited by Roy Godson, pp. 74-79. New Brunswick, NJ: Transaction Books, 1982.

Cable News Network. “Breaking News: Gunman Fires on Another San Diego School.” CNN.com Transcripts, 22 March 2001. http://transcripts.cnn.com/TRANSCRIPTS/0103/22/bn.09.html (accessed March 18, 2009).

Cole, Stephen. The Sociological Method. 2nd ed. Chicago: Rand McNally College Publishing Company, 1976.

Dunlap, Charles. “Law in the Times of War.” American Bar Association address as part of the America and the Courts series on CSPAN, November 16, 2007. 68

Deakin, Frederick W. and G. Richard Storry. The Case of Richard Sorge. New York: Harper and Row, 1966.

Dershowitz, Alan M. “Controlling the Cops: Accomplices to Perjury.” The New York Times, May 2, 1994.

Dickey, Christopher. “Artificial Intelligence”. The New York Times Book Review, November 18, 2007. http://www.nytimes.com/2007/11/18/books/review/Dickey- t.html?_r=1&oref=slogin (accessed March 18, 2009)

Douglas, Jack D. Investigative Social Research: Individual and Team Field Research. Beverly Hills, CA: Sage, 1976.

Ebert, Roger. “Shattered Glass” Roger Ebert.com. http://rogerebert.suntimes.com/apps/pbcs.dll/article?AID=/20031107/REVIEWS/ 311070305/1023 (accessed March 18, 2009).

Fontana, Andrea and James H. Frey. “The Interview: From Structured Questions to Negotiated Text.” Chap. 24 in Handbook of Qualitative Research, edited by Norman K. Denzin and Yvonna S. Lincoln, pp. 645-672. Thousand Oaks, CA: Sage Publications, 2000.

Frontline. “News War: Part II: The Reporting on Iraq’s WMD.” 13 February 2007. Full series, with description http://www.pbs.org/wgbh/pages/frontline/newswar/view/ (accessed March 18, 2009).

Fuchs, Marek. “Media Taken For a Ride by Countrywide CEO.” TheStreet.com, August 24, 2007. http://www.thestreet.com/newsanalysis/maven/10376247.html (accessed March 18, 2009).

Georges, Robert A. and Michael O. Jones. People Studying People: The Human Element in Fieldwork. Berkeley, CA: University of California Press, 1980.

Goetz, John and Marcel Rosenbach, “Spiegel Interview With Iraq WMD Sleuth David Kay,” Spiegel Online International, March 22, 2008 http://www.spiegel.de/international/world/0,1518,542888,00.html (accessed March 18, 2009).

Goffman, Erving. Frame Analysis: An Essay on the Organization of Experience. New York: Harper Colophon Books, 1974. ------. Interaction Ritual: Essays in Face-to-Face Behavior. Chicago: Adline Publishing Co, 1967. ------. The Presentation of Self in Everyday Life. New York: Doubleday Anchor Books, 1959. ------. Strategic Interaction. Philadelphia: University of Pennsylvania Press, 1969. 69

Goodman, Allan E. “Testimony: Fact-checking at the CIA.” Foreign Policy, Spring 1996.

Green, Christopher, D. “Classics in the History of Psychology.” http://psychclassics.yorku.ca/Munster/Witness/ (accessed March 18, 2009).

Grisham, John. Innocent Man: Murder and Injustice in a Small Town. New York: Doubleday, 2006.

Heuer, Richards J., Jr. “Adapting Academic Methods and Models to Governmental Needs.” Chap. in Quantitative Approaches to Political Intelligence: The CIA Experience, edited by Richards J. Heuer. Boulder, CA: Westview Press, 1978.

Hitz, Frederick P. “The Importance and Future of Espionage.” In Strategic Intelligence Vol. 2: The Intelligence Cycle, edited by Loch K. Johnson, pp. 75-94. Westport, CT: Praeger Security International, 2007.

Hulnick, Arthur S. “What’s Wrong With The Intelligence Cycle?” in Strategic Intelligence (Vol. 2): The Intelligence Cycle, edited by Loch K. Johnson , pp. 1- 22. Westport, CT: Praeger Security International, 2007.

Janesick, Valerie J. “The Choreography of Qualitative Research Design - Minuets, Improvisations, and Crystallization.” Chap. 13 of Handbook of Qualitative Research, 2nd ed., edited by Norman K. Denzin and Yvonna S. Lincoln, pp. 379- 399. Thousand Oaks, CA: Sage Publications, 2000.

Kessler, Ronald. Spy vs. Spy: Stalking Soviet Spies in America. New York: Charles Scribner’s Sons, 1988.

Kirk, Jerome and Marc L. Miller. Reliability and Validity in Qualitative Research. Beverly Hills: Sage Publications, 1986.

Knightley, Phillip. The First Casualty: From the Crimea to Vietnam: The War Correspondent as Hero, Propagandist, and Myth Maker. New York: Harcourt, Brace, Jovanovich, 1975.

Lilley, James and Jeffrey Lilley. China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia. New York: Public Affairs, 2004.

Lipton, Jack P. “Legal Aspects of Eyewitness Testimony.” In Psychological Issues in Eyewitness Identification, edited by Siegfried Ludwig Sporer, Roy S. Malpass, and Guenter Koehnken, pp. 7-22. Mahwah, NJ: Lawrence Erlbaum Associates, 1996.

Loftus, Elizabeth and Katherine Ketcham. Witness For the Defense: The Accused, The Eyewitness, And The Expert Who Puts Memory On Trial. New York: St. Martin’s Press, 1991. 70

Lowenthal, Mark M. Intelligence: From Secrets to Policy. 3rd ed. Washington, DC: CQ Press, 2006.

McQueen, Mark. Has Justice Robert J. Sharpe Put Process Before Truth in Libel Ruling? Best Way to Invest, 19 November 2007. http://www.bestwaytoinvest.com/display/6733. (accessed March 18, 2009)

Meet The Press, 30 March 2008, an interview with DCIA Michael Hayden on Iraqi WMD. http://www.msnbc.msn.com/id/21134540/vp/23867579#23867579 (accessed 18 March 2008).

Miles, Matthew B. “Qualitative Data as an Attractive Nuisance: The Problem of Analysis.” In Administrative Science Quarterly, v. 24 n. 4 (December 1979): pp. 590-601.

Mishler, E. G. Research Interviewing: Context and Narrative. Cambridge, MA: Harvard University Press, 1986.

National Transportation Safety Board. Aircraft Accident Report: In-flight Breakup Over the Atlantic Ocean, Trans World Airlines Flight 800 Boeing 747-131, N93119 Near East Moriches, New York July 17, 1996 (NTSB/AAR-00/03 DCA96MA070 PB2000-910403 Notation 6788G Adopted 23 August 2000), Witness Document Issues (1.18.4.2). Washington, DC: Diane Publishing.

Editors of The New Atlantis. “Technology: The Great Enabler? How Jayson Blair Conned The New York Times.” The New Atlantis 2 (Summer 2003): 110-111 http://www.thenewatlantis.com/publications/technology-the-great-enabler (accessed March 18, 2009).

Nwazota, Kristina. “Jayson Blair: A Case Study of What Went Wrong at The New York Times,” Online NewsHour. http://www.pbs.org/newshour/media/media_ethics/casestudy_blair.php (accessed March 18, 2009).

Office of the DNI. General Michael V. Hayden Before House Permanent Select Committee Subcommittee on Oversight, 28 July 2005. http://www.dni.gov/testimonies/20050728_testimony.htm (accessed March 18, 2009).

Pujol, Juan and Nigel West. Operation GARBO: The Personal Story of the Most Successful Double Agent of World War II. New York: Random House, 1985.

Schum, David A. and Jon R. Morris. “Assessing The Competence and Credibility Of Human Sources Of Intelligence Evidence: Contributions From Law And Probability.” Law, Probability, and Risk 6, no. 1-4, (2007): pp. 247-74. 71

Shenon, Philip. “FBI Admits Informer Misled Inquiry.” The New York Times, February 24, 1988.

Sieber, Sam D. "A Synopsis and Critique of Guidelines for Qualitative Analysis Contained in Selected Textbooks,” Project on Social Architecture in Education. New York: Center for Policy Research, 1976.

Leung, Rebecca. “Stephen Glass: I Lied For Esteem.” 60 Minutes, August 17, 2003. http://www.cbsnews.com/stories/2003/05/07/60minutes/main552819.shtml (accessed March 18, 2009).

Surowiecki, James. “Profits of Doom,” The New Yorker, September 3, 2007 http://www.newyorker.com/online/2007/09/03/070903on_onlineonly_surowiecki (accessed March 18, 2009).

Wald, Matthew L. “Ideas and Trends: For Air Crash Detectives, Seeing Isn’t Believing.” The New York Times, June 23, 2002 http://query.nytimes.com/gst/fullpage.html?res=9A04E6DB133FF930A15755C0 A9649C8B63&scp=33&sq=%22twa+flight+800%22&st=nyt (accessed March 18, 2009).

Wellman, Francis L. The Art of Cross-Examination. New York: Macmillan Company, 1904. Reprint, Birmingham: Legal Classics Library, 1983.

Woodberry, Jr, Warren. Many Saw Flight 587 On Fire Before Crash. New York Daily News, June 5, 2002. http://www.nydailynews.com/archives/news/2002/06/05/2002-06- 05_many_saw_flight_587_on_fire_.html (accessed March 18, 2009). 72

APPENDICES

A. Blind Men and the Elephant (Indian Proverb)

B. Juan Pujol (GARBO)

C. Richard Sorge

D. American Airlines Flight 587

E. Edgar Snow

F. A Brief History of HUMINT 73

A - An ode by John Godfrey Saxe, based on an Indian proverb

It was six men of Indostan To learning much inclined, Who went to see the Elephant (Though all of them were blind), That each by observation Might satisfy his mind

The First approached the Elephant, And happening to fall Against his broad and sturdy side, At once began to bawl: “God bless me! but the Elephant Is very like a wall!”

The Second, feeling of the tusk, Cried, “Ho! what have we here So very round and smooth and sharp? To me ’tis mighty clear This wonder of an Elephant Is very like a spear!”

The Third approached the animal, And happening to take The squirming trunk within his hands, Thus boldly up and spake: “I see,” quoth he, “the Elephant Is very like a snake!”

The Fourth reached out an eager hand, And felt about the knee. “What most this wondrous beast is like Is mighty plain,” quoth he; “ ‘Tis clear enough the Elephant Is very like a tree!”

The Fifth, who chanced to touch the ear, Said: “E’en the blindest man Can tell what this resembles most; Deny the fact who can This marvel of an Elephant Is very like a fan!” 74

The Sixth no sooner had begun About the beast to grope, Than, seizing on the swinging tail That fell within his scope, “I see,” quoth he, “the Elephant Is very like a rope!”

And so these men of Indostan Disputed loud and long, Each in his own opinion Exceeding stiff and strong, Though each was partly in the right, And all were in the wrong!

Moral: So oft in theologic wars, The disputants, I ween, Rail on in utter ignorance Of what each other mean, And prate about an Elephant Not one of them has seen! 149

149Saxe, John Godfrey. Blind Men and the Elephant. (Word Info) (http://www.wordinfo.info/words/index/info/view_unit/1/?letter=B&spage=3) 75

B - An excerpt from Operation Garbo , by Juan Pujol with Nigel West

My humanist convictions would not allow me to turn a blind eye to the enormous suffering that was being unleashed by this psychopath Hitler and his band of acolytes… Unable to express my feelings, I yearned for justice. From the medley of tangled ideas and fantasies going around and around in my head, a plan slowly began to take shape. I must do something, something practical; I must make my contribution toward the good of humanity. One January day in 1941, I presented myself without further ado at the British embassy in Madrid…. No one at the British embassy seemed interested in me, so out of amour propre I decided to prepare the ground more carefully before I approached them again; clearly I must be much more specific about exactly what I was going to do and how it would adapt itself to the end I had in mind: helping the Allies. I decided to attempt to sound out the opposite side, but using a different approach to the one I had tried with the British, which had ended in rejection. Bit by bit I worked out my plan of attack until I thought it was good enough. I did not ask anyone else’s advice. In order to offer myself to the Nazis, I first studied their doctrines; then I telephoned the German embassy [and said] I was willing to offer my services to the Axis cause and to that of the “New Europe.”150

150 Pujol with West, pp. 44-46. 76

C - Soviet spy Richard Sorge at German Embassy in Tokyo

[[Major-General , Ambassador of Germany to Japan]] had known [Richard Sorge] since 1934 when Ott had been military attaché in Japan. Sorge was a constant visitor to the Embassy, and a member of the Ambassador’s circle of friends. The two men often played chess together, dined in the same houses, breakfasted together in the Embassy compound, and traveled in the Japanese countryside.

Sorge’s views, and sources of information, were received and discussed regularly with the Ambassador and his advisers. He was treated and accepted as a personal friend and a reliable compatriot.

After the outbreak of the European war, Sorge was invited to edit a German Embassy news bulletin, and occupied an office for this purpose, where he read the official press telegrams from Berlin. He received a formal payment for this service. As an enterprising newspaperman, and as a former soldier with a brilliant war record, he established close relations with the successive military and naval attaches, and exchanged with them material and opinions on technical problems.

It seemed inconceivable that a man with this reputation and social connections could be the subject of the present accusations. 151

151 Deakin, F. W. and G. R. Storry. The Case of Richard Sorge. New York: Harper and Row, 1966, p. 17. 77

D - New York Daily News Excerpt on Flight 587 Witnesses

More than 180 people reported seeing American Airlines Flight 587 on fire before it slammed into the Rockaways after takeoff from Kennedy Airport last fall, according to a new report. The National Transportation Safety Board says 181 witnesses - 52% of the 349 interviewed - said they saw the jet on fire before it plunged into the Belle Harbor, Queens neighborhood on the morning of Nov. 12. Twenty-two percent interviewed reported seeing flames near the plane's fuselage. Other witnesses reported seeing fire on an engine or wing of the Airbus A300-600 jet. The findings were released yesterday as investigators continue to examine why the jet broke apart in midair and crashed, killing all 260 people on board and five on the ground. The report said that 8% of witnesses interviewed saw an explosion; 20% reported seeing no fire at all; 22% observed smoke, and 20% said they saw no smoke at all. Also, 74% of witnesses reported seeing the plane descend; 57% said they saw something separate from the plane; 13% reported seeing the right wing, left wing or an unidentified wing separate, and 9% reported seeing no parts separate. 152

152Woodberry, Jr, Warren. Many Saw Flight 587 On Fire Before Crash. New York Daily News, 5 June 2002. (http://www.nydailynews.com/archives/news/2002/06/05/2002-06- 05_many_saw_flight_587_on_fire_.html) 78

E - An Excerpt from Knightley’s The First Casualty

With eye-witness and personal-exploit stories at a premium, only one correspondent looked beyond the immediate story to what was really happening in China -- Edgar Snow. ... He was the first foreign correspondent to make the trip to headquarters, where he met Mao Tse-Tung and Chou En-lai, personal contacts that lasted until Snow's death in 1972. His account of the meeting, printed in the China Weekly Review and then widely reprinted, gave the world the first news of the Long March and the first idea of the Communist leaders, their life, and their intentions. Snow saw the hypocrisy of the British and American expressions of sympathy at what was occurring in China. Although newspapers gave prominence to the Japanese aggression, they did not write that the United States was the main supplier of war materials to Japan until as late as July 1939. They did not mention the British companies that had contracts to supply the Japanese in China or the common British view that Chinese resistance was delaying a restoration of trade in the area. Snow saw through Chiang Kai-shek's publicity, arranged for him by Hollington K. Tong, a graduate of the Columbia School of Journalism, to the corruption and brutality of the Nationalist regime, and he documented Chiang's ruthless suppression of Chinese trade unions. He even saw beyond the immediate horror of the rape of Nanking ... to the fact that this would lessen political antagonisms between various Chinese groups and intensify the opposition to Japan. You cannot disembowel men at one end of the town, he wrote, while preaching Pan-Asianism at the other.153

153 Knightley, The First Casualty, pp. 271-272. 79

F - A History of Human Intelligence

Distortion in the HUMINT process can be better understood by looking back at its historical context. Before the emergence of intelligence organizations in the late 19th century to handle HUMINT collection, analysis, and dissemination, the decision maker and his/her immediate staff would handle source reporting directly, or, most recently, with the coordination of a designated spymaster. While deception could be introduced through the foreign travelers and soldiers subjected to interview, interrogation, and tortured, the main risk to source reliability was through HUMINT collection and processing by the decision maker and his/her staff.

Soldiers and Agents

Before the modern era of intelligence collection, distortion was primarily an internal problem as most sources were on the government’s payroll. Government sources have always included the soldiers who watch vigilantly at the borders and report unusual events. But before intelligence organizations and spymasters created elaborate systems for the collection, analysis, and dissemination of intelligence, decision makers would dispatch soldiers and private agents to answer specific intelligence requirements. They were their personal spies, selected for their skills of cunning, stealth, and observation, as well as their loyalty to the regime and overall trustworthiness. The early decision maker would thus rely on the most basic forms of surveillance and reconnaissance to collect the

HUMINT he/she required for strategic planning.

In large part, the decision maker achieved HUMINT source reliability by using his/her own people to collect and by keeping the collection tasks exceedingly simple and 80 straightforward. Initial intelligence reports from combat patrols and border guards would have typically been delayed and distorted in their transmission to the leadership through the chain of command, but these were unsophisticated systems and little thought would have been given to such weaknesses. As for spies sent abroad, early leaders could hardly have considered using what were often untrained and inexperienced spies for the development of clandestine foreign agents or the conduct of covert operations abroad.

History had yet to devise the agent handler or insurgency coordinator. The decision maker would have been content to have loyal domestic agents who could be trusted with the spy mission’s reconnaissance goals and expected to return with raw, unfiltered strategic information about the opponent that was reasonably accurate, timely, and applicable to planning objectives.

Surveillance and Reconnaissance

History documents intelligence collection through surveillance and reconnaissance as early as the 16th century BCE, when, Biblical scholars estimate, Moses sent men from his tribe to reconnoiter the land of Canaan.154 Moses provided them with a detailed list of economic and military collection requirements to assess the land, its towns and its people.155 In preparation for the Battle of Jericho, Joshua also sent spies on a reconnaissance mission. A woman of ill repute hid Joshua’s men from the authorities while they made their strategic observations, and she abetted their departure from the walled city in exchange for promises of protection during the coming Israeli attack.156

In these cases, the spies were fellow countrymen and well known to Moses and

Joshua, making them exceedingly trustworthy agents. The Bible makes no mention of

154 Numbers 13:1–14:9. 155 Numbers 13:17-20. 156Joshua 2:1-22. 81 their skills as observers and notetakers, nor does it attribute to them any ability to recruit and operate clandestine foreign agents. Presumably they accomplished their objectives through passive reconnaissance methods and returned with adequate notes. The Bible suggests that the tribe assessed their reporting, but there are no details of the process involved.

Espionage through reconnaissance by a reliable fellow countryman surfaces again in Greek mythology’s coverage of the 11th century Trojan War. The story of the Trojan spy Dolon (“the trickster”) appears in both the tenth book of Homer’s 8th century BCE classic Iliad and Euripedes’ 5th century BCE The Rhesus. 157 Homer tells the story of the pre-emptive ambush of Dolon by Odysseus behind his own lines. While Dolon is also captured and killed in the Euripedes version, he is by contrast in Greek-held territory disguised as a wolf, intent to fool their sentinels and overhear the plans of the Greek leadership in war council.158

Surveillance and reconnaissance were the preferred forms of HUMINT collection for centuries. While the term spy is used in the above instances, these men were not clandestine foreign sources. J. A. Richmond debates whether Dolon’s actions constituted reconnaissance or espionage. He defines the first as an open effort to view the enemy, either alone, with ground forces, or aboard ship. Espionage is the realm of “disguised or otherwise hidden agents,” according to Richmond. While Richmond weighs the evidence and decides that when Dolon cloaked himself in animal skin garb this “put him more

157 Myres, Sir John, F.B.A., review of Emile Miriaux: Les Poemes d’Homere et l’Histoire Grecque, II. L’Iliade, l’Odyssee, et les rivalites colonials , by Albin Michel, Greece and Rome, Vol. 21 No. 61 (January 1952), pp. 1, 8; G. Richards. “The Problem of the Rhesvs”. Classical Quarterly, Vol. 10, No. 4 (1916), p. 192; Adele J. Hart. “ ‘The City-Sacker Odysseus’ in Iliad 2 and 10”. Transactions of the American Philological Association (1974-), Vol. 120 (1990), pp. 50-52; G. Elderkin. “Dolon’s Disguise in The Rhesus,” Classical Philology, Vol. 30, No. 4 (1935), pp. 349-350. 158 Myres review; Richards, “The Problem of the Rhesvs”; Hart. “The City-Sacker Odysseus”; Elderkin, “Dolon’s Disguise”. 82 clearly in the category of a disguised, despised spy!”159, it seems clear that Dolon was a soldier on a covert reconnaissance mission and not a spy in today’s sense of the word.

In another example, the Macedonian king Alexander the Great prepared for war with the Persian Empire in the 4th century BCE by dispatching trusted diplomats into the region as his spies, according to Donald Engels.160 Alexander would have also counted upon intelligence gleaned from high-ranking Persian exiles living comfortably in

Macedonia, who owed their existence in large part to Alexander’s father and would have had no motivation to betray his son, Engels explains. Alexander would have also relied on reporting from Greek soldiers who had previously waged war in the area, Engels says, as well as the published accounts of previous visitors to Persia. “[S]trategic information might also have been obtained from merchants, travelers, artisans, and Macedonian and

Greek diplomats to the Persian royal court and satrapal courts.”161

There are current examples of the routine collection of HUMINT through the use of dedicated, well-trained reconnaissance and surveillance personnel, both civilian and military. The FBI employs lookout and Special Surveillance Group (SSG) personnel as surveillance and reconnaissance specialists to maximize the reliability of HUMINT collection.162 The jury is out on their effectiveness in major cases, as Soviet agents

Aldrich Ames (CIA officer), John Walker (US Navy), Robert Hanssen (FBI agent), and

Felix Bloch (State Department official) respectively ignored, tempted, avoided, and

159 Richmond, J. A.. Spies in Ancient Greece. Greece & Rome, 2nd Ser. Vol. 45, No. 1, 1998, pp. 2-3. 160 Engels, Donald. “Alexander’s Intelligence System,” Classical Quarterly, New Series, Vol. 30, No. 2 (1980), pp. 328-329. 161 Engels, “Alexander’s Intelligence System,” pp. 328-329. 162Walker, David M., Comptroller General of the United States, in testimony before the Subcommittee on Commerce, Justice, State, and the Judiciary, Committee on Appropriations, House of Representatives, in FBI Reorganization: Progress Made in Efforts to Transform, but Major Challenges Continue. (GAO-03- 759T, 18 June 2003) (http://www.gao.gov/htext/d03759t.html); Wise, David. Spy: Inside Story Of How The FBI’s Robert Hanssen Betrayed America. New York, Random House, 2002, pp. 208-209. 83 outlasted FBI surveillance and reconnaissance operations directed against them.163 In today’s US military, human surveillance164 and reconnaissance165 have been subsumed by and virtually lost in the new Intelligence, Surveillance and Reconnaissance (ISR)166 concept, which is substantially a technical intelligence (TECHINT) systems terminology.167 The US Army’s Intelligence Field Manual mentions that combat patrols and other ISR operations must report their findings to HUMINT collectors, but it does not label surveillance and reconnaissance among its six specific HUMINT techniques.168

Mark M. Lowenthal’s From Secrets to Policy makes only one reference to surveillance and reconnaissance, in which it equates ISR with the totality of intelligence collection.169

Robert M. Clark’s Intelligence Analysis: A Target-Centric Approach makes no mention of surveillance or reconnaissance, period.170

Foreign Spies

163 Crime Library. “CIA Traitor Aldrich Ames,” p. 3 (http://www.crimelibrary.com/terrorists_spies/spies/ames/3.html); Peter Earley. Family of Spies: Inside the John Walker Spy Ring. Toronto: Bantam Books, 1988, pp. 62, 66. Wise, Spy, pp. 54, 116-117. Hanssen used the mail and traditional spy methods (dead drops) to avoid entering a diplomatic establishment. Bloch was surveiled by FBI agents. 164 “Surveillance: The systematic observation of aerospace, surface, or subsurface areas, places, persons, or things, by visual, aural, electronic, photographic, or other means.” (DOD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/) 165 “Reconnaissance: A mission undertaken to obtain, by visual observation or other detection methods, information about the activities and resources of an enemy or adversary, or to secure data concerning the meteorological, hydrographic, or geographic characteristics of a particular area. Also called RECON.” (DOD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/) 166 “Intelligence, Surveillance, and Reconnaissance: An activity that synchronizes and integrates the planning and operation of sensors, assets, and processing, exploitation, and dissemination systems in direct support of current and future operations. This is an integrated intelligence and operations function. Also called ISR.” (DOD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/) 167 Best, Richard A., Jr. Intelligence, Surveillance, and Reconnaissance (ISR) Programs : Issues for Congress, CRS Report for Congress, 22 February 2005, p. 1. 168 Intelligence Field Manual (FM 2.0), Headquarters, Department of the Army, May 2004, Chapter 6. The field manual names six HUMINT techniques: debriefing, screening, liaison, HUMINT contact operations, document exploitation (DOCEX), and interrogation. 169 Lowenthal, From Secrets to Policy, p. 68. Lowenthal’s definitions of intelligence, surveillance, and reconnaissance come directly from a footnote to CRS Report For Congress RL 32508. 170 Clark, Robert M. Intelligence Analysis: A Target-Centric Approach, Second Edition. Washington, DC: CQ Press, 2007. 84

Distortion of source reporting becomes more likely when Sun Tzu, the 6th century

BCE Chinese author of The Art of War, suggests that decision makers begin to rely on foreigners for some of their intelligence needs. Sun Tzu recommends that a ruler turn foreign spies against their governments and use this newfound access to examine the reliability of other spies. Sun Tzu felt that a government must also recruit natives of foreign lands, especially key government insiders. He encouraged leaders to provide great rewards to their spies to maintain loyalty. His writings provide possibly the first guidance to decision makers on the value of using foreigners as clandestine sources of intelligence.171

The 9th century Chinese poet Tu Mu commented on the writings of Sun Tzu, elaborating on the subtleties of managing clandestine foreign sources.172 Tu Mu points out that recruited foreign government officials can be “two-faced, changeable, and deceitful,” so they must be properly compensated to assure dedicated and reliable service as informants. The collector must be “deep and subtle” to discern what is accurate and useful (and what is not) in such source reporting, so as to avoid paying great rewards for empty words.173

Spymasters

In the 16th century, Francis Walsingham took an enormous step forward in the use of HUMINT as Queen Elizabeth I of England’s principal spymaster as he developed and maintained a surprisingly effective covert collection program. Through his use of a reliable network of spies and his significant oversight of information within the kingdom,

Walsingham preserved Elizabeth’s reign against numerous plots hatched by the

171 Griffith, Samuel B., The Art of War. trans. New York: Oxford University Press, 1971, Chapter 13. 172 Martin Frost website. http://www.martinfrost.ws/htmlfiles/sun_tzu.html 173 Griffith, Chapter 13. 85 imprisoned Mary Queen of Scots and aided by France, Spain, and the Catholic Church at

Rome.174

According to Stephen Budiansky, Walsingham put himself at the center of all information flow at the palace so as to be informed of virtually every rumor, plot, and tryst.175 Walsingham kept all manner of book, guide, and directory in his office. His people monitored arrivals from abroad and checked correspondence they might be carrying. His minions were at the ports and on horseback in the countryside to inquire into the travels of both strangers and the well known. And, to collect the latest intelligence from abroad, he maintained a stable of clandestine sources “who, out of desperation or vanity or longing to believe in their own importance – or, the cooler ones, out of simple business calculation of what they possessed and what someone else would be willing to pay for – were prepared to undertake more shadowy tasks.”176

Most of his agents, however, were “men of affairs and men of the world … not even paid for their troubles … less spies than reporters.”177 These were simply expatriates residing overseas and foreigners living in England. They wrote to him constantly of what they had seen and heard.178

Few of these spies were under Walsingham’s control as an agent handler, although some were obliged to him by remuneration. As can be seen in his examination of the case of treason against Sir Edward Stafford, Walsingham could weigh the reliability of his sources against each other’s reporting. By having so many spies, he gained a great many

174 Andrew, Christopher. Her Majesty's Secret Service: The Making of the British Intelligence Community. New York: Elisabeth Sifton Books (Viking), 1986, p. 1. 175 Budiansky, Stephen. Her Majesty's Spymaster: Elizabeth I, Sir Francis Walsingham, and the Birth of Modern Espionage. New York: Viking Books, 2005, pp. 90-94. 176 Budiansky, pp. 93-94. 177 Budiansky, pp. 93-94. 178 Budiansky, pp. 90-94. 86 perspectives on what was happening and could discern trends and isolate lies and distortions. With his sources and through his position near the throne, Walsingham could cross check source reporting, elicit clarifications from sources, witnesses, and even the accused, and thereby fill gaps in his knowledge better and faster than anyone else in the kingdom.179

Nearly two centuries after Walsingham first began tracking spies in London, 180

George Washington entered that same world through his HUMINT experiences in the

French and Indian War, eventually becoming America’s first spymaster during the

American Revolution. According to Douglas Southall Freeman, Washington “had never seen a day’s service as a soldier” when he approached Governor Dinwiddie and his

Council at Williamsburg to deliver their message to the French regarding the latter’s unwelcome encroachment into the Ohio country.181 Washington had clear intelligence collection requirements: to “procure all the information he could of the numerical strength, armament, defenses, communications, and plans of the intruders. … and to

‘return immediately back’.”182 Distortion was at a minimum as Washington met the

French, passed the message and received the French reply. Dinwiddie and the Council were the primary consumers of Washington’s reporting, including his observation of

French preparations for a larger incursion into northwestern Pennsylvania.183

179 Neale, J. “The Fame of Sir Edward Stafford.” English Historical Review, Vol. 44, No. 174 (1929), pp. 203-219. 180 Pollard, A. F. “Sir Francis Walsingham,” in Encyclopedia Britannica, 11th ed. Vol. XXVIII (Cambridge: Cambridge University Press, 1910), pp. 295-296 (http://www.luminarium.org/encyclopedia/walsingham.htm) 181 Freeman, Douglas Southall. George Washington, Vol. 1: Young Washington. New York: Charles Scribner’s Sons, 1948, pp.266, 268, 273, 275-276. 182 Freeman, pp.266, 268, 273, 275-276. 183 Freeman, pp.266, 268, 273, 275-276; Fort Huachuca. Masters of the Intelligence Art: Major George Washington’s Reconnaissance. (http://huachuca-www.army.mil/History/PDFS/mwashing.pdf) 87

When the American Revolution began twenty years later, Washington applied his

HUMINT skills against England and found his intelligence operation effective and its sources reliable. For example, Washington pursued clandestine source operations, personally running recruitment-in-place (RIP) operations, such as James Rifington, the

Royal Printer of New York, as well as local patriots like John Honeyman. Washington built a HUMINT network by assigning several spymasters to head reconnaissance operations throughout the greater New York City area, including New Jersey,

Connecticut, and New York State. Major Benjamin Tallmadge ran the Culper Ring,

Colonel Elias Dayton operated the Merserau Ring, and Lieutenant Colonel Thomas

Knowlton managed Knowlton’s Rangers. Washington’s manipulation of intelligence, including the use of HUMINT, (D&D) and counterintelligence, was vital to the war effort and the British defeats at both Trenton, which saved the American cause, and Yorktown, which sealed its victory.184

Washington maintained a sizable intelligence budget during his term as President of the United States to facilitate reliable HUMINT collection. Named the Contingent

Fund of Foreign Intercourse by Act of Congress in 1790 (and later called the Secret

Service Fund), this money was used by the Executive branch for years, primarily to send agents abroad or to pay bribes to foreign officials.185 Doubtless few of the funds were applied to improving the intake and processing of HUMINT by the government. In a

February 1831 debate in the US Senate, US Senator John Forsyth tells a colleague quite

184Finley, James P., ed. US Army Military Intelligence History: A Sourcebook. Fort Huachuca: US Army Intelligence Center, 1995, p. 16. http://huachuca-www.army.mil/History/PDFS/reader.pdf; Lawson, John. “The Remarkable Mystery of James Rivington, Spy.” Journalism Quarterly, 35 (1958), pp. 316-323; Holloway, Charlotte Molyneux. “The First Sacrifice of the Revolution: Nathan Hale, The Patriot Martyr Spy.” Connecticut Magazine, 6 (May-June 1900), pp. 224-236. 185Miller, p. 57. 88 plainly that the fund is “[f]or spies, if the gentleman pleases,” providing a healthy roster of common uses involving agents, messengers, and diplomats.186

Despite the establishment of this fund, the development and use of clandestine foreign sources could not be managed by the chief executive and so went on hiatus. With the exception of the Civil War period, the US government would not conduct effective

HUMINT collection until the armed forces established intelligence organs in the 1880s.187

Instead, the President and Governors preferred to nominate their own agents for specific situations and analyze the intelligence reporting themselves. Distortion was once again confined within the government’s own HUMINT process as foreigners were excluded.

In the aftermath of the Louisiana Purchase, for example, the Thomas Jefferson administration dispatched Zebulon Pike, a second-generation military man with considerable experience on the frontier, to explore the southwest border of the new territory. Napoleon had only recently compelled Spain to sign over its Louisiana holdings, so the borders of the purchase from France were still in dispute. The Spaniards captured Pike as he explored the origins of the Arkansas and Red rivers, but he eventually returned with much needed reconnaissance of the Spanish defenses at Santa Fe after his

186 Benton, Thomas Hart. Abridgement of the Debates of Congress, from 1789 to 1856, Vol. XI, pp. 244- 245.http://books.google.com/books?id=SicPAAAAYAAJ&pg=PA244&lpg=PA244&dq=%22Contingent+F und+of+Foreign+Intercourse%22&source=web&ots=hqqT7S1dFt&sig=ZCy8dCCwXGcsiv_HGVJ9pcqG xNA&hl=en#PPA244,M1 “It was given for all purposes to which a secret service fund should or could be applied for the public benefit. For spies, if the gentleman pleases; for persons sent publicly and secretly to search for important information, political or commercial; for agents to carry confidential instructions, written or verbal, to our foreign Ministers, in negotiations where secrecy was the element of success; for agents to feel the pulse of foreign Governments, to ascertain if treaties, commercial or political, could be formed with them, and with power to form them, if practicable.” 187 Bethell, Elizabeth. “The Military Information Division: Origin Of The Intelligence Division,” in James P. Finley, ed. US Army Military Intelligence History: A Sourcebook. Fort Huachuca: US Army Intelligence Center, 1995, pp. 62-63. http://huachuca-www.army.mil/History/PDFS/reader.pdf According to Bethell, the US Navy’s Office of Naval Intelligence (ONI), founded in 1882, is the longest continuously running intelligence organ in the USIC. The US Army’s Military Information Division (MID), established in 1889, oversaw the military attaché program, which was established by Act of Congress in 1888 and began in 1889 with the placement of attaches in London and Berlin. MID was abolished in 1908 and was replaced in 1917 by the Military Intelligence Division (MID). 89 captors thoroughly exposed their operations to Pike while holding him prisoner.

Distortion of source reporting was likely as Pike’s handler, Governor of the Upper

Louisiana Territory James Wilkinson, turned out to have been a double agent for Spain and a “scoundrel.” Wilkinson and Aaron Burr would later conspire in an attempt to use the military to split the western territories from the rest of the United States.188

The occasional volunteer would submit reporting, which was accepted by the government without significant interaction or distortion. Hunter/trapper Jedediah Smith submitted a detailed letter to the US Secretary of War in 1830 to announce his discovery along the Oregon Trail of the South Pass to the Pacific Ocean. As an aside, he also provided the results of his reconnaissance of British operations at Fort Vancouver.

Smith’s letter was praised by the US Senate as an “excellent intelligence report” 189 and prompted the War Department to adopt similar methods, if with a more reliable source.

The US Army sent its own man, Benjamin Bonneville, under deep cover as a fur trader, to reconnoiter California and other western lands. For deniability purposes, Bonneville officially separated from the US Army but took with him a long list of the military’s intelligence requirements. His wide-ranging report, submitted to the department upon his return in 1833, assured America’s westward expansion.190

Early in the Civil War, the US Army continued to find reliable sources only from within the military. Union General Winfield Scott sent Lafayette C Baker to Richmond on a covert reconnaissance mission. Baker’s cover was as an itinerant photographer, the son

188Ameringer, Charles D. US Foreign Intelligence: The Secret Side of American History. Lexington, Massachusetts: Lexington Books, 1990, pp. 35-36; US National Park Service. Zebulon Pike: Hard-Luck Explorer or Successful Spy? The Lewis and Clark Journey of Discovery.(http://www.nps.gov/archive/jeff/LewisClark2/Circa1804/WestwardExpansion/EarlyExplorers/Z ebulonPike.htm) 189 Ameringer, pp. 36-37. 190 Ameringer, pp. 36-37. 90 of a Tennessee judge. He was captured and suspected of espionage, but eventually convinced President Jefferson Davis of his innocence and escaped back to the North.191

Intelligence Organizations

For a few years the Civil War became too complex to manage without the establishment of intelligence organizations. When General Grenville M. Dodge was appointed by General Ulysses S. Grant to head the US Army’s Military Intelligence

Bureau, the use of HUMINT became noticeably more sophisticated. Dodge was rated highly innovative and effective for his use of African-American slaves as spies and couriers to travel and observe the enemy throughout Alabama, Missouri, and Tennessee.

These former slaves were not unlike foreign sources to a heretofore-white military, but their reliability was proven as Dodge’s intelligence reports received high praise. These

Negro agents were formed into the First Alabama Infantry Regiment and the First

Alabama Cavalry, both units dedicated to intelligence work. Among their many credits, they proved effective at Vicksburg, where they supported General Grant by infiltrating the city and providing the Union command with the latest assessments on the impact of the siege.192

Dodge was also willing to rely on reporting from Union sympathizers in the

South. He recruited Phillip Henson, a supporter of the Union living in Vicksburg. Henson not only provided reconnaissance reports to Union forces but, due to his Southern roots and cultivated connections, was able to infiltrate Confederate military planning and provide useful strategic intelligence as well.193 Likewise, Elizabeth Van Lew, a wealthy

191Schlup, Leonard. “Lafayette C. Baker and His Association with Abraham Lincoln and Andrew Johnson.” Lincoln Herald, vol. 98, 2 (summer 1996), 54-59. 192Miller, Nathan. Spying for America: The Hidden History of U.S. Intelligence. New York: Paragon House, 1989, pp. 138-140. 193Markle, Donald. Spies and Spymasters of the Civil War. New York: Hippocrene Books, 1994, pp. 126- 130. 91 resident of Richmond and a fervent Abolitionist, used her own money and risked her life to establish a large spy ring, pass intelligence out of the city to Union forces, and help both Union prisoners and escaped slaves make their way to the North.194

Henry S. Sanford, a US minister in Belgium, ran a covert network of Union spies in Europe to track Confederate diplomatic and commercial efforts across the Atlantic.195

The United States established its first permanent intelligence organization with the founding of the Office of Naval Intelligence (ONI) in 1882. The Army would follow in 1884, but would not resolve its need for continuous intelligence operations until the eve of America’s entry into in 1917.

For the acquisition of intelligence information during the Spanish American War, the US Navy sent its own agents to conduct human collection. Commodore George

Dewey dispatched his personal aide to to interview arriving ships’ crews regarding the Spanish naval position in the Philippines. Dewey also relied for intelligence on O. F. Williams, the US Consul in . Naval operatives were active in Cuba, conducting reconnaissance and covert action with insurgents.196

But the US Navy also saw the importance of clandestine foreign sources. ONI sent undercover naval intelligence officers William Buck and Henry Ward to Spain and assigned Lieutenant William Sims, the naval attaché in Paris, to oversee them as they developed a sophisticated HUMINT collection operation against the Spanish. “Sims organized an intelligence network that stretched from the Canary Islands to Port Said and

194 Intelligence Collection – The North. Central Intelligence Agency, 2007. https://www.cia.gov/library/publications/additional-publications/civil-war/p11.htm 195Miller, p. 116. 196Casey, Dr. Dennis. A Little Espionage Goes A Long Way. Air Intelligence Agency (AIA) http://www.fas.org/irp/agency/aia/cyberspokesman/99-11/history1.htm ; Miller, p. 167. 92 to several locations in the Mediterranean. Sims even had spies working in the Spanish

Naval Depot in Cadiz.”197

When Europe exploded into the First World War, the United States was soon drawn into the fray. There were rumors of possible German involvement in the Mexican detention of a US naval vessel at Veracruz in 1914, yet the United States was unable to effectively respond. The US Army’s HUMINT program consisted of military attaché reports being filed at the Army War College from 1908 until 1917. And ONI’s HUMINT collection was focused on foreign navies. Eventually Argentina, Brazil, and Chile intervened to retrieve the United States from its embarrassing predicament.198

Foreign governments were now sending covert intelligence officers to the United

States to conduct HUMINT operations in peacetime, a “disreputable and underhanded” activity that “no state openly admitted” at the time.199 Lacking diplomatic relations with the US, Soviet intelligence established Amtorg Trading Corporation in New York in 1924 as commercial front for its spying operations.200 The FBI suddenly found itself in the foreign counterintelligence (FCI) business in earnest in 1929, when Amtorg spy Georgiy

Agabekov defected and exposed the operation.201

With the onset of the Second World War, the US military and naval intelligence services, joined by the Office of Strategic Services (OSS), began to use all manner of

HUMINT collection vehicles: diplomatic and commercial officials; military attachés; clandestine intelligence officers and their agents; émigré interviews; prisoner interrogations; reconnaissance; and surveillance.

197 Casey. 198 Miller, pp. 182-183. 199 Rafalko, Frank J. A Counterintelligence Reader, Vol. III, Chapter 1, p. 21. (http://www.fas.org/irp/ops/ci/docs/ci3/index.html) 200 Ropes, E. C. “American-Soviet Trade Relations,” Russian Review, Vol. 3, No. 1 (Autumn 1943), p. 91 201 Rafalko, pp. 21-22. 93

The British were prominent wartime specialists in the use of HUMINT as deception. Of particular note, they ran two now famous bogus spy networks: The Twenty

Committee (XX or Double Cross) system and Operation: GARBO. The Double Cross system began with a Welshman named Arthur Owens, who briefly explored working with the Germans but changed his mind and turned himself in. A Spaniard named Juan Pujol took the personal initiative to dangle himself to the Germans and was eventually run by the British as the double agent GARBO. The British ran both operations throughout the war, along with some doubled Nazi spies, disinforming and misdirecting countless Nazi operations. Pujol was especially valuable to Operation FORTITUDE in the lead up to the

D-Day invasion, when he reinforced the deception of the Calais landing and the

Normandy feint.202

While the level of clandestine HUMINT collection expanded with the onset and expansion of the Cold War, “the slow, painstaking process of recruiting spies” was discounted and the butt of jokes from those who favored the high profile realm of covert action. “[S]py recruiters and handlers … were dubbed ‘the patient professionals’ and were not as esteemed or promoted as quickly as the … ‘action’ types.”203

The West’s most prominent HUMINT penetrations of the Soviet Union and

Russia include the operation of these clandestine sources: Oleg Penkovskiy (AGENT

HERO), Adolf Tolkachev, Dmitriy F. Polyakov (BOURBON/ROAM/TOPHAT), Sergey

Tretyakov, and Morris Child (SOLO) of the Communist Party USA (CPUSA).204 The

202 Pujol, Juan with Nigel West. Operation GARBO: The Personal Story of the Most Successful Double Agent of World War II. New York: Random House, 1985, pp. 56-67, 115-151. 203Hitz, Frederick P. “The Importance and Future of Espionage,” in Strategic Intelligence Vol. 2: The Intelligence Cycle, ed. Loch K. Johnson (Westport, Connecticut: Praeger Security International, 2007), pp.76-77. 204Penkovskiy, Oleg. The Penkovskiy Papers. New York: Random House, 1982; Hitz, “The Importance and Future of Espionage,” pp. 78-79, 86. Earley, Pete. Comrade J: The Untold Secrets of Russia’s Master Spy in America After the End of the Cold War. New York: G. P. Putnam’s Sons, 2007; Barron, John. Operation 94

East’s best-known recruitments include of the , Aldrich Ames

(CIA), Robert Hanssen (FBI), and John Walker (USN).205

For the last ten years of the Cold War, the USIC emphasis was on technical collection. While the Soviets devoted five times the personnel to intelligence collection, the United States used its financial wherewithal to build spy satellites and other devices to mechanically observe the Soviets and the Pact. As America increased its use of spy satellites for military and arms control treaty verification purposes in its rivalry with the East, Christopher Andrew virtually rang the death knell for HUMINT when he wrote, “The role of humans in intelligence collection will no doubt decline still further.

… Defense attaches as intelligence gatherers belong to a by-gone day of gentlemen amateurs. … Even professional spies are on the decline. The limited range of human eyes and ears compares rather poorly with the ability of spy satellites…. Worse still, spies can never be entirely trusted.”206

A great many spy handlers and area specialists left the intelligence services, both

East and West, when the Soviet Union collapsed and the Cold War ended. . Russia’s

Foreign Intelligence Service (SVR) alone lost 40% of its senior staff between 1991 and

1993.207 It was a time of transition, an inter-regnum in which the community downsized its Soviet operations and sought to expand its efforts against terrorism, drugs, crime, and weapons proliferation.208

SOLO: The FBI’s Man in the Kremlin. Regnery Publishing, 1997. 205 Hitz, “The Importance and Future of Espionage,” pp. 81-82, 83, 85-86. 206Andrew, Christopher. “Whitehall, Washington, and the Intelligence Services,” International Affairs (Royal Institute of International Affairs 1944-), Vol. 53, No. 3 (Jul., 1977), pp. 391-392. To be sure, Andrew might be credited with being the first to predict the reinvigoration of HUMINT post 9/11 with these words, “Spies will not disappear altogether. But their decline will doubtless continue. Their future uses lie perhaps more in infiltrating terrorist groups than in penetrating foreign governments.” 207 Earley, Comrade J, p. 158. 208 Hitz, “The Importance and Future of Espionage,” p. 87. 95

In the wake of terror attacks in New York and Washington, DC, the 9/11

Commission recommended that the CIA pick up the pieces of its dysfunctional clandestine HUMINT capabilities.209 And the FBI began to reorganize itself.210

As Andrew predicted in the late 1970s211, the emphasis of clandestine

HUMINT collection was redirected to the infiltration of terrorist groups, where decision makers desperately need reliable sources. Low-budget, highly disciplined non-state actors were a new kind of target for an Intelligence Community that had dealt for years with nation states with large armed forces and intelligence bureaucracies like their own. Even the lines between domestic and foreign intelligence were now blurred.212

And due to the poor performance of interagency communication in the lead-up to the al-Qaeda attacks on the World Trade Center and the Pentagon on 11

September 2001, the USIC was mandated to maximize intelligence sharing through the use of risk management techniques that weigh the consumer need for reliable access to source reporting against the potential loss of valuable clandestine sources.213

The jury is still out on whether the USIC can perpetuate the development and use of reliable clandestine HUMINT sources in the present environment.

209 The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States. New York: W. W. Norton and Company, p. 415. 210 Walker, David M. Statement of the Comptroller General of the United States, in testimony before the Subcommittee on Commerce, Justice, State, and the Judiciary, Committee on Appropriations, House of Representatives, released on 18 June 2003 as GAO report number GAO-03-759T, entitled FBI Reorganization: Progress Made in Efforts to Transform, but Major Challenges Continue. (http://www.gao.gov/htext/d03759t.html). 211 Andrew, “Whitehall, Washington, and the Intelligence Services,” pp. 391-392. “Spies will not disappear altogether. But their decline will doubtless continue. Their future uses lie perhaps more in infiltrating terrorist groups than in penetrating foreign governments.” 212 Hitz, “The Importance and Future of Espionage,” pp. 87-88. 213 DCID 8/1, Intelligence Community Policy On Intelligence Information Sharing, effective 4 June 2004. (http://www.fas.org/irp/offdocs/dcid8-1.html) 96